CN107231673A - Electronic equipment and its communication means - Google Patents

Electronic equipment and its communication means Download PDF

Info

Publication number
CN107231673A
CN107231673A CN201610168853.5A CN201610168853A CN107231673A CN 107231673 A CN107231673 A CN 107231673A CN 201610168853 A CN201610168853 A CN 201610168853A CN 107231673 A CN107231673 A CN 107231673A
Authority
CN
China
Prior art keywords
electronic equipment
information
beacon frame
encryption
probe request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610168853.5A
Other languages
Chinese (zh)
Inventor
邹涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Original Assignee
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Century Trading Co Ltd, Beijing Jingdong Shangke Information Technology Co Ltd filed Critical Beijing Jingdong Century Trading Co Ltd
Priority to CN201610168853.5A priority Critical patent/CN107231673A/en
Publication of CN107231673A publication Critical patent/CN107231673A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a kind of electronic equipment, including:Beacon frame information device, transmission includes the beacon frame of encryption information;Probe request reception device, receives probe request, the link information that probe request is encrypted including the use of encryption information, and link information is used to allow the electronic equipment to be connected to target access;And link information extracts extraction element, the link information of encryption is extracted from the probe request, and link information is decrypted using the solution confidential information corresponding with encryption information.Present invention also offers a kind of electronic equipment, including:Beacon frame reception device, reception includes the beacon frame of encryption information;Encryption information extraction element, extracts encryption information from beacon frame;And probe requests thereby frame generating apparatus, probe request is generated and sent, the link information that the probe request is encrypted including the use of encryption information, the link information is used to allow the electronic equipment to be connected to target access.Present invention also offers the communication means between both equipment.

Description

Electronic equipment and its communication means
Technical field
Present invention relates in general to the communications field, and in particular to a kind of electronic equipment and its communication party Method.More particularly it relates to which a kind of electronic equipment and its acquisition will set up connection therewith The method of the link information of target access.
Background technology
Use of the smart machine in life is more and more extensive.Intelligent sound box, intelligent appliance, intelligence The equipment such as energy scale, intelligent sphygmomanometer enter the people visual field as emerging rapidly in large numbersBamboo shoots after a spring rain.Especially WiFi class smart machines, they are congenital to possess the characteristic directly connected with the mobile phone of user, Many facilities are provided for the life of user.But, the networking first of these equipment needs user SSID and password are inputted, and these equipment are often interacted substantially without keyboard and screen etc. in itself Equipment, thus network be always one it is troubling the problem of.
The configuration networking of one key is widely adopted, and this technology distribution is more convenient quick, user's body Test very well, it is not required that special device, but its essence is actually equipment by account or close Code is broadcast in open space after encoding in some way, because this communication mode can only be single To transmission information, and speed is relatively low, and all in the electromagnetic wave coverage that equipment is sent set It is standby monitored data bag and acquisition password to be decoded, it is impossible to realize the higher cipher mode of intensity, Security is poor.Therefore, this technology has the risk of leakage of information when household field is used.
SoftAP modes are also widely used, and its technical principle is:Equipment is logical when needing to network Cross certain mode to trigger into access point (AP) pattern, at this moment mobile phone connection equipment is created AP, complete password exchange, end-use device using password set up connection.This mode is most Big shortcoming is poor user experience.Mobile phone will undergo AP handoff procedures twice, and this is cut Changing process can only be manual on the mobile phone of iOS system, can on Android mobile phones With semi-automatic, but because mobile phone platform has differences, it is impossible to accomplish automatic completely.
An also class mode is to transmit password by sound wave or light wave mode, and these modes need Some communication devices are additionally configured on circuit boards, nor mode well.
The content of the invention
One aspect of the present invention provides a kind of electronic equipment, including:Beacon frame information device, Beacon frame is sent, the beacon frame includes encryption information;Probe request reception device, receives and visits Survey claim frame, the link information that the probe request is encrypted including the use of encryption information, the connection Information is used to allow the electronic equipment to be connected to target access;And link information is extracted Device, the link information of encryption is extracted from the probe request, and using relative with encryption information The solution confidential information answered decrypts link information.
Another aspect of the present invention provides a kind of electronic equipment, including:Beacon frame receives dress Put, received beacon frame, the beacon frame includes encryption information;Encryption information extraction element, from letter Encryption information is extracted in mark frame;And probe requests thereby frame generating apparatus, generating and sending detection please Frame is sought, the link information that the probe request is encrypted including the use of encryption information, the link information For allowing the electronic equipment to be connected to target access.
Another aspect of the present invention provides the communication means of a kind of electronic equipment, including:Hair Beacon frame is sent, the beacon frame includes encryption information;Receive probe request, the probe request The link information encrypted including the use of encryption information, the link information is used to allow the electronic equipment It is connected to target access;And the link information of encryption is extracted from the probe request, and make Link information is decrypted with the solution confidential information corresponding with encryption information.
Another aspect of the present invention provides the communication means of a kind of electronic equipment, including:Connect Beacon frame is received, the beacon frame includes encryption information;Encryption information is extracted from beacon frame;And Probe request is generated and sent, the connection that the probe request is encrypted including the use of encryption information Information, the link information is used to allow the electronic equipment to be connected to target access.
Brief description of the drawings
For a more complete understanding of the present invention and its advantage, referring now to reference to the following of accompanying drawing Description, wherein:
Fig. 1 diagrammatically illustrates the first electronic equipment and the second electronics according to embodiments of the present invention The block diagram of equipment;And
Fig. 2 diagrammatically illustrates the first electronic equipment and the second electronics according to embodiments of the present invention The flow chart of communication between devices.
Embodiment
According to reference to accompanying drawing to the described in detail below of exemplary embodiment of the present, it is of the invention Other side, advantage and prominent features will become obvious for those skilled in the art.
In the present invention, term " comprising " and " containing " and its derivative mean including rather than Limitation;Term "or" is inclusive, mean and/or.
In this manual, following various embodiments for being used to describe the principle of the invention are explanation, It should not be construed in any way the scope for limitation invention.Referring to the drawings described below is used for The exemplary embodiment of the invention for helping comprehensive understanding to be limited by claim and its equivalent. It is described below to help to understand including a variety of details, but these details are considered as being only to show Example property.Therefore, it will be appreciated by those of ordinary skill in the art that in the model without departing substantially from the present invention In the case of enclosing and being spiritual, embodiment described herein can be made various changes and modifications. In addition, for clarity and brevity, eliminating the description of known function and structure.In addition, Through accompanying drawing, same reference numbers are used for identity function and operation.
The invention provides a kind of solution that fast and safely networks.Fig. 1 is shown according to this hair The first electronic equipment (for example, smart machine to be networked) of bright embodiment and the second electronics are set It is standby (for example, mobile phone, router or other there is the equipment of communication capacity) block diagram, Wherein, the link information needed for the first electronic equipment is networked by the second electronic equipment.
As shown in figure 1, the first electronic equipment 100 includes:Beacon (Beacon) frame sends dress Put 110, probe requests thereby (Probe REQ) frame reception device 120 and link information is extracted Device 130.
Second electronic equipment 200 includes:Beacon frame reception device 210, encryption information extract dress Put 220 and probe requests thereby frame generating apparatus 230.
Embodiments in accordance with the present invention, are touched when electricity on the first electronic equipment 100 or by particular event When sending out (for example, receiving the specific input of user), the broadcast letter of beacon frame information device 110 Mark frame.First electronic equipment 100 can have the public key and private key of the pairing pre-set. The beacon frame can include the public key of the first electronic equipment 100 in scheduled field.For example, working as , can be with when first electronic equipment 100 and the second electronic equipment 200 are using WiFi protocol communications The public key is included in the ssid field of beacon frame.It is appreciated that, although used here as public key Illustrated with private key, but the first electronic equipment 100 can also have the correspondence of other forms Encryption/decryption information, only need to meet the data encrypted using the encryption information must use the decryption Information is decrypted.The beacon frame can be just generate before transmitting or It is stored in advance in the first electronic equipment 100.
The beacon frame reception device 210 of second electronic equipment 200 receives the beacon frame, encryption letter Cease extraction element 220 and extract public key from the beacon frame.Then, probe requests thereby frame generating apparatus 230 Using the public key encryption link information, the link information after encryption is included in probe request, Then the probe request is sent.The link information is to allow the first electronic equipment 100 to be used for The information being connected with target access (for example, target AP) is set up, for example, target connects The mark and connection password of access point.Embodiments in accordance with the present invention, when the first electronic equipment 100 When using WiFi protocol communications with target access, the link information includes target access SSID and access pin.
The probe request reception device 120 of first electronic equipment 100 receives the probe request. Embodiments in accordance with the present invention, after the first electronic equipment 100 sends beacon frame, are put into Sniff pattern, monitors probe request.The detection is received in probe request reception device 120 After claim frame, link information extraction element 130 extracts the company of encryption from the probe request Information is connect, and is decrypted using private key, to obtain the link information of target access.Then, First electronic equipment 100 sets up link information of the device 140 using target access by connection Set up the connection with target access.
Embodiments in accordance with the present invention, the first electronic equipment 100 can also include connection mode control Device 150 processed.In some cases, the first electronic equipment 100 can not connect in the given time Receive the probe request of the link information comprising encryption.For example, when the second electronic equipment 200 When can not send the probe request with encrypted focus SSID and encrypted message, it is sent out The probe request gone out is normal networking packet, i.e., do not include encrypted focus SSID During with encrypted message, at this moment the first electronic equipment 100 can not obtain link information.In this feelings Under condition, connection mode control device 150 can control the first electronic equipment 100 to be switched to SoftAP tupes, enable the second electronic equipment 200 to add first electronic equipment 100 In the network of SoftAP Model Establishments.Then, the first electronic equipment 100 is set with the second electronics Standby 200 LANs that can be formed by SoftAP exchange the SSID and password of target access Information.The network process that enters of SoftAP tupes is known technology, be will not be repeated here.
Fig. 2 shows that the first electronic equipment 100 according to embodiments of the present invention is set with the second electronics The flow chart communicated between standby 200.
In step S1, the first electronic equipment 100 generation beacon frame.First electronic equipment 100 Can have the public key and private key of the pairing pre-set.The beacon frame can be in scheduled field Include the public key of the first electronic equipment 100.For example, when the first electronic equipment 100 and the second electricity When sub- equipment 200 is using WiFi protocol communications, it can be included in the ssid field of beacon frame The public key.It is appreciated that, although illustrated used here as public key and private key, but the first electricity Sub- equipment 100 can also have the corresponding encryption/decryption information of other forms, need to only meet and use The data of encryption information encryption must use the solution confidential information to be decrypted.It is appreciated that If beacon frame is previously generated and is stored in the first electronic equipment 100, the step can To omit.
In step S2, the first electronic equipment 100 sends the beacon frame.According to the reality of the present invention Example is applied, the first electronic equipment 100 sends the beacon frame in the form of broadcast.
In step S3, the second electronic equipment 200 receives the beacon frame of the broadcast.
In step S4, the second electronic equipment 200 extracts public key from the beacon frame.
In step S5, the second electronic equipment 200 uses the public key encryption link information, will encrypted Link information afterwards is included in probe request.The link information is to allow the first electronics to set Standby 100 are used for setting up the information being connected with target access (for example, target AP), example Such as, the mark of target access and connection password.Embodiments in accordance with the present invention, when the first electricity When sub- equipment 100 uses WiFi protocol communications with target access, the link information includes The SSID and access pin of target access.
In step S6, the second electronic equipment 200 sends probe request.
In step S7, the first electronic equipment 100 receives probe request.
In step S8, the first electronic equipment 100 extracts the connection of encryption from the probe request Information, and decrypted using private key, to obtain the link information of target access.
Embodiments in accordance with the present invention, if the first electronic equipment 100 in the given time can not The probe request of the link information comprising encryption is received, then the first electronic equipment 100 can be with SoftAP tupes are switched to, the second electronic equipment 200 is added first electronics and sets Standby 100 in the network of SoftAP Model Establishments.Then, the first electronic equipment 100 and second The LAN that electronic equipment 200 can be formed by SoftAP exchanges the SSID of target access And encrypted message.The network process that enters of SoftAP tupes is known technology, be will not be repeated here.
Electronic equipment and its communication means according to embodiments of the present invention, it is not only safe and reliable (public Key is revealed or open does not influence security), and can speed it is fast, be not only restricted to cell phone platform, In addition also without extra configuration hardware resource, take full advantage of the equipment such as mobile phone original function and Resource.
Can be by there is calculating according to the above method of various embodiments of the present invention, equipment and/or device The electronic equipment of ability performs the software comprising computer instruction to realize.It is described to have computing capability Electronic equipment can comprising general processor, digital signal processor, application specific processor, can Reconfigure the device that processor etc. is able to carry out computer instruction, but not limited to this.Perform this The instruction of sample causes electronic equipment to be configured as performing the above-mentioned operations according to the present invention.On Stating each equipment and/or module can realize in an electronic equipment, can also be set in different electronics Standby middle realization.These softwares can be stored in a computer-readable storage medium.It is computer-readable Storage medium stores one or more programs (software module), one or more of program bags Instruction is included, when being instructed described in one or more of electronic equipment computing device, the finger Order causes the method that electronic equipment performs the present invention.
These softwares can be stored as volatile memory or the form of Nonvolatile memory devices (storage device such as such as similar ROM), it is whether erasable or rewritable, or Person is stored as the form (such as RAM, memory chip, equipment or integrated circuit) of memory, Or (such as, CD, DVD, disk are stored on light computer-readable recording medium or magnetic computer-readable recording medium Or tape etc.).It should be appreciated that storage device and storage medium be adapted for storage one or The embodiment of the machine-readable storage device of multiple programs, one program or multiple program bags Instruction is included, when executed, embodiments of the invention are realized.Embodiment provides journey Sequence and the machine-readable storage device for storing this program, described program include being used to realize this hair The code of device or method described in bright any one claim.Furthermore, it is possible to via appoint What medium (signal of communication such as, carried via wired connection or wireless connection) incoming call is transmitted These programs, multiple embodiments suitably include these programs.
It can also be used according to the method, equipment and/or device of various embodiments of the present invention for example live Programmable gate array (FPGA), programmable logic array (PLA), on-chip system, substrate On system, the system in encapsulation, application specific integrated circuit (ASIC) or can be for electricity Road carries out the hardware such as integrated or encapsulation any other rational method or firmware to realize, or with Software, the appropriately combined of hardware and firmware three kinds of implementations are realized.In such ways When realizing, used software, hardware and/or firmware is programmed or is designed as to perform according to this The corresponding above method, step and/or the function of invention.Those skilled in the art can be according to reality Need to come suitably by one or more of these systems and module, or a part therein or Some is realized using different above-mentioned implementations.These implementations each fall within this hair Bright protection domain.
Although the present invention has shown and described with reference to the certain exemplary embodiments of the present invention, It will be appreciated by those skilled in the art that without departing substantially from appended claims and its equivalent limit , can be in carry out form and details of the present invention in the case of fixed the spirit and scope of the present invention A variety of changes.Therefore, the scope of the present invention should not necessarily be limited by above-described embodiment, but should Not only it is determined, is also carried out by the equivalent of appended claims by appended claims Limit.

Claims (18)

1. a kind of electronic equipment, including:
Beacon frame information device, sends beacon frame, and the beacon frame includes encryption information;
Probe request reception device, receive probe request, the probe request including the use of The link information of encryption information encryption, the link information is used to allow the electronic equipment to be connected to mesh Tag splice access point;And
Link information extracts extraction element, and the link information of encryption is extracted from the probe request, And decrypt link information using the solution confidential information corresponding with encryption information.
2. electronic equipment according to claim 1, wherein:
The encryption information is the public key of the electronic equipment, and solution confidential information is the private matched with public key Key.
3. electronic equipment according to claim 1, wherein:
The encryption information is comprised in the ssid field of beacon frame.
4. electronic equipment according to claim 1, wherein:
The link information is the SSID and connection password of target access.
5. electronic equipment according to claim 1, in addition to:
Connection mode control device, when the electronic equipment does not receive detection within a predetermined period of time During claim frame, connection mode control device control electronics enter SoftAP patterns.
6. a kind of electronic equipment, including:
Beacon frame reception device, received beacon frame, beacon frame includes encryption information;
Encryption information extraction element, extracts encryption information from beacon frame;And
Probe requests thereby frame generating apparatus, generates and sends probe request, the probe request bag The link information encrypted using encryption information is included, the link information is used to allow the electronic equipment to connect It is connected to target access.
7. electronic equipment according to claim 6, wherein:
The encryption information is public key.
8. electronic equipment according to claim 6, wherein:
The encryption information is comprised in the ssid field of beacon frame.
9. electronic equipment according to claim 6, wherein:
The link information is to send another electronic equipment target to be accessed access of the beacon frame The SSID and connection password of point.
10. the communication means of a kind of electronic equipment, including:
Beacon frame is sent, the beacon frame includes encryption information;
Receive probe request, the connection letter that the probe request is encrypted including the use of encryption information Breath, the link information is used to allow the electronic equipment to be connected to target access;And
The link information of encryption is extracted from the probe request, and using corresponding with encryption information Solution confidential information decrypt link information.
11. communication means according to claim 10, wherein:
The encryption information is the public key of the electronic equipment, and solution confidential information is the private matched with public key Key.
12. communication means according to claim 10, wherein:
The encryption information is comprised in the ssid field of beacon frame.
13. communication means according to claim 10, wherein:
The link information is the SSID and connection password of target access.
14. communication means according to claim 10, in addition to:
When the electronic equipment does not receive probe request within a predetermined period of time, electronics is controlled Equipment enters SoftAP patterns.
15. the communication means of a kind of electronic equipment, including:
Received beacon frame, the beacon frame includes encryption information;
Encryption information is extracted from beacon frame;And
Probe request is generated and sent, the probe request is encrypted including the use of encryption information Link information, the link information is used to allow the electronic equipment to be connected to target access.
16. communication means according to claim 15, wherein:
The encryption information is public key.
17. communication means according to claim 15, wherein:
The encryption information is comprised in the ssid field of beacon frame.
18. communication means according to claim 15, wherein:
The link information is to send another electronic equipment target to be accessed access of the beacon frame The SSID and connection password of point.
CN201610168853.5A 2016-03-23 2016-03-23 Electronic equipment and its communication means Pending CN107231673A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610168853.5A CN107231673A (en) 2016-03-23 2016-03-23 Electronic equipment and its communication means

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610168853.5A CN107231673A (en) 2016-03-23 2016-03-23 Electronic equipment and its communication means

Publications (1)

Publication Number Publication Date
CN107231673A true CN107231673A (en) 2017-10-03

Family

ID=59932220

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610168853.5A Pending CN107231673A (en) 2016-03-23 2016-03-23 Electronic equipment and its communication means

Country Status (1)

Country Link
CN (1) CN107231673A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113347580A (en) * 2021-06-07 2021-09-03 美的集团股份有限公司 Intelligent device network distribution method and device, electronic device and storage medium
CN116049855A (en) * 2023-02-09 2023-05-02 广州万协通信息技术有限公司 Data encryption and decryption method, security chip, electronic equipment and medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100779800B1 (en) * 2002-12-06 2007-11-27 엘지노텔 주식회사 Method for Providing Authentication Service in the Wireless LAN
CN104010352A (en) * 2014-05-19 2014-08-27 百度在线网络技术(北京)有限公司 Method and device for connecting router with intelligent device
CN104618988A (en) * 2015-01-21 2015-05-13 青岛海尔智能家电科技有限公司 Smart device network access method and device
CN104780045A (en) * 2015-03-11 2015-07-15 小米科技有限责任公司 Management method and management device for intelligent devices
CN104837132A (en) * 2015-04-17 2015-08-12 北京奇艺世纪科技有限公司 Wi-Fi (Wireless-Fidelity) network sharing method and device
CN104869612A (en) * 2015-04-30 2015-08-26 小米科技有限责任公司 Method and device for accessing network
CN105025472A (en) * 2014-04-25 2015-11-04 Tcl集团股份有限公司 Method and system for encrypting, hiding and discovering of WIFI access point
US20160029215A1 (en) * 2014-07-23 2016-01-28 Samsung Electronics Co., Ltd. Electronic device and method for discovering network in electronic device
CN105392133A (en) * 2015-11-26 2016-03-09 北京奇虎科技有限公司 Method and system for wireless function device to automatically access to wireless access point

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100779800B1 (en) * 2002-12-06 2007-11-27 엘지노텔 주식회사 Method for Providing Authentication Service in the Wireless LAN
CN105025472A (en) * 2014-04-25 2015-11-04 Tcl集团股份有限公司 Method and system for encrypting, hiding and discovering of WIFI access point
CN104010352A (en) * 2014-05-19 2014-08-27 百度在线网络技术(北京)有限公司 Method and device for connecting router with intelligent device
US20160029215A1 (en) * 2014-07-23 2016-01-28 Samsung Electronics Co., Ltd. Electronic device and method for discovering network in electronic device
CN104618988A (en) * 2015-01-21 2015-05-13 青岛海尔智能家电科技有限公司 Smart device network access method and device
CN104780045A (en) * 2015-03-11 2015-07-15 小米科技有限责任公司 Management method and management device for intelligent devices
CN104837132A (en) * 2015-04-17 2015-08-12 北京奇艺世纪科技有限公司 Wi-Fi (Wireless-Fidelity) network sharing method and device
CN104869612A (en) * 2015-04-30 2015-08-26 小米科技有限责任公司 Method and device for accessing network
CN105392133A (en) * 2015-11-26 2016-03-09 北京奇虎科技有限公司 Method and system for wireless function device to automatically access to wireless access point

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113347580A (en) * 2021-06-07 2021-09-03 美的集团股份有限公司 Intelligent device network distribution method and device, electronic device and storage medium
CN116049855A (en) * 2023-02-09 2023-05-02 广州万协通信息技术有限公司 Data encryption and decryption method, security chip, electronic equipment and medium
CN116049855B (en) * 2023-02-09 2023-11-03 广州万协通信息技术有限公司 Data encryption and decryption method, security chip, electronic equipment and medium

Similar Documents

Publication Publication Date Title
Vanhoef et al. Why MAC address randomization is not enough: An analysis of Wi-Fi network discovery mechanisms
Zillner et al. ZigBee exploited: The good, the bad and the ugly
CN106161359B (en) It authenticates the method and device of user, register the method and device of wearable device
CN108848112B (en) Cut-in method, equipment and the system of user equipment (UE)
US10462667B2 (en) Method of providing mobile communication provider information and device for performing the same
CN102594555B (en) Security protection method for data, entity on network side and communication terminal
CN106921963A (en) A kind of smart machine accesses the method and device of WLAN
AU2015261578B2 (en) Communication control apparatus, authentication device, central control apparatus and communication system
CN106134231B (en) Key generation method, equipment and system
WO2019077406A1 (en) Privacy preserving tag
CN108270554B (en) Terminal pairing method and system
CN103929748A (en) Internet of things wireless terminal, configuration method thereof and wireless network access point
CN107094293A (en) A kind of device and method for obtaining WiFi terminal real MAC address
CN109890029B (en) Automatic network distribution method of intelligent wireless equipment
CN104619040A (en) Method and system for quickly connecting WIFI equipment
CN104754565A (en) Wireless parameter sending and receiving method and device
CN113840266A (en) Bluetooth pairing method, device, system, electronic equipment and storage medium
CN105376059A (en) Method and system for performing application signature based on electronic key
CN105100268A (en) Security control method and system of Internet-of-things device as well as application server
CN102612030B (en) Wireless access collocation method and system, radio reception device, terminal
CN102711089B (en) Mobile terminal is carried out to method and the device of locking network and card
Song et al. The GSM/UMTS phone number catcher
CN107231673A (en) Electronic equipment and its communication means
CN109756451A (en) A kind of information interacting method and device
US8885557B2 (en) Dynamic selection among algorithms for generating fillers for security of data communications

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20171003

RJ01 Rejection of invention patent application after publication