CN111954216A - Wireless access method, device, system and storage medium - Google Patents

Wireless access method, device, system and storage medium Download PDF

Info

Publication number
CN111954216A
CN111954216A CN202010831558.XA CN202010831558A CN111954216A CN 111954216 A CN111954216 A CN 111954216A CN 202010831558 A CN202010831558 A CN 202010831558A CN 111954216 A CN111954216 A CN 111954216A
Authority
CN
China
Prior art keywords
access
association
equipment
result
access point
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010831558.XA
Other languages
Chinese (zh)
Inventor
杨学星
易敏
闫雅婷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Microphone Holdings Co Ltd
Shenzhen Transsion Holdings Co Ltd
Original Assignee
Shenzhen Microphone Holdings Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Microphone Holdings Co Ltd filed Critical Shenzhen Microphone Holdings Co Ltd
Priority to CN202010831558.XA priority Critical patent/CN111954216A/en
Publication of CN111954216A publication Critical patent/CN111954216A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the application provides a wireless access method, equipment, a system and a storage medium. The method comprises the following steps: sending an association request, wherein the association request is used for requesting to establish association connection with the access point equipment; receiving an association result corresponding to the association request, wherein the association result is provided by the access point device; and executing corresponding operation according to the correlation result. The method of the embodiment of the application can accelerate the access process and improve the efficiency of accessing the network.

Description

Wireless access method, device, system and storage medium
Technical Field
Embodiments of the present disclosure relate to communications technologies, and in particular, to a wireless access method, a device, a system, and a storage medium.
Background
With the continuous development of communication and information technology, the application of short-distance wireless communication technology is accelerating and becoming mature. In general, as long as both communication transceivers transmit information by radio waves and the transmission distance is limited to a short range (for example, several tens of meters), they are referred to as short-range wireless communication.
In short-distance wireless communication, a certain safety mechanism needs to be established before data transmission is carried out between two devices through a wireless technology, so that the transmission safety is ensured. At present, Access equipment first needs to discover surrounding Access Point (AP) equipment through active/passive scanning, and then can establish connection with the AP equipment through two processes of authentication and association, and finally accesses a wireless network. However, when the number of access devices reaches a certain number, association failure may occur, which may cause the access device to fail to access the network, and if the access device reselects another AP device to access the network, the time consumed for the authentication process in the previous access failure is long, which may cause the total time for the user to access the network to be long.
The foregoing description is provided for general background information and is not admitted to be prior art.
Disclosure of Invention
The embodiment of the application provides a wireless access method, equipment, a system and a storage medium, so as to accelerate the network access process.
In a first aspect, an embodiment of the present application provides a wireless access method, which is applied to an access device, and the method includes:
s11, sending an association request, wherein the association request is used for requesting to establish association connection with the access point equipment;
s12, receiving an association result corresponding to the association request, wherein the association result is provided by the access point device;
and S13, executing corresponding operation according to the correlation result.
In a second aspect, an embodiment of the present application provides a wireless access method, which is applied to an access point device, and the method includes:
s21, determining a corresponding association result according to the received association request, wherein the association request is provided by the access equipment;
s22, sending the association result to enable the access device to execute corresponding operation according to the association result;
s23, detecting whether an access authentication request is received;
and S24, if yes, executing corresponding authentication processing.
In a third aspect, an embodiment of the present application provides a wireless access apparatus, which is applied to an access device, and includes:
a sending module, configured to send an association request, where the association request is used to request an association connection to be established with an access point device;
a receiving module, configured to receive an association result corresponding to the association request, where the association result is provided by the access point device;
and the processing module is used for executing corresponding operation according to the correlation result.
In a fourth aspect, an embodiment of the present application provides a wireless access apparatus, which is applied to an access point device, and includes:
the processing module is used for determining a corresponding association result according to the received association request, wherein the association request is provided by the access equipment;
a sending module, configured to send the association result, so that the access device executes a corresponding operation according to the association result;
the processing module is further configured to detect whether an access authentication request is received;
if yes, corresponding authentication processing is executed.
In a fifth aspect, an embodiment of the present application provides an access device, including: a memory and a processor;
the memory is used for storing computer execution instructions;
the computer executable instructions, when executed by the processor, implement the method of any of the first aspects.
In a sixth aspect, an embodiment of the present application provides an access point device, including: a memory and a processor;
the memory is used for storing computer execution instructions;
the computer executable instructions, when executed by the processor, implement the method of any of the second aspects.
In a sixth aspect, an embodiment of the present application provides a communication system, including:
at least one access device for implementing the wireless access method according to any one of the first aspect; and the number of the first and second groups,
at least one access point device for implementing the wireless access method according to any one of the second aspect.
In a seventh aspect, an embodiment of the present application provides a readable storage medium, where the readable storage medium has stored thereon computer-executable instructions; computer-executable instructions, when executed, implement the method of any one of the first aspect or the method of any one of the second aspect.
In an eighth aspect, the present embodiments also provide a program product, where the program product includes a computer program, where the computer program is stored in a readable storage medium, and a processor can read the computer program from the readable storage medium, and execute the computer program to implement the method according to any one of the first aspect and the second aspect.
According to the wireless access method, the wireless access device, the wireless access system and the storage medium, the access device sends an association request, and the association request is used for requesting to establish association connection with the access point device; and receiving the association result corresponding to the association request, and further executing corresponding operation according to the association result, namely, in the process that the access equipment accesses the network corresponding to the access point equipment, advancing the association process with less time consumption, and if association fails, reselecting other access point equipment for access.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and together with the description, serve to explain the principles of the application.
Fig. 1 is a schematic diagram of a communication system according to an embodiment of the present application;
fig. 2 is a flowchart of a wireless access method according to an embodiment of the present application;
fig. 3 is an interaction flowchart of a wireless access method according to an embodiment of the present application;
fig. 4 is a schematic view of an operation interface of an access device according to an embodiment of the present application;
fig. 5 is a schematic view of an operation interface of an access device according to another embodiment of the present application;
fig. 6 is a flowchart of a wireless access method according to another embodiment of the present application;
fig. 7 is a flowchart of a wireless access method according to another embodiment of the present application;
fig. 8 is a block diagram of a wireless access device according to an embodiment of the present application;
fig. 9 is a block diagram of a wireless access device according to another embodiment of the present application;
fig. 10 is a block diagram of an access device according to an embodiment of the present application;
fig. 11 is a block diagram of an access point device according to an embodiment of the present application.
With the above figures, there are shown specific embodiments of the present application, which will be described in more detail below. These drawings and written description are not intended to limit the scope of the inventive concepts in any manner, but rather to illustrate the inventive concepts to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
It should be understood that although the terms first, second, third, etc. may be used herein to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope herein. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context. Also, as used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context indicates otherwise. It will be further understood that the terms "comprises," "comprising," "includes" and/or "including," when used in this specification, specify the presence of stated features, steps, operations, elements, components, items, species, and/or groups, but do not preclude the presence, or addition of one or more other features, steps, operations, elements, components, species, and/or groups thereof. The terms "or" and/or "as used herein are to be construed as inclusive or meaning any one or any combination. Thus, "A, B or C" or "A, B and/or C" means "any of the following: a; b; c; a and B; a and C; b and C; A. b and C ". An exception to this definition will occur only when a combination of elements, functions, steps or operations are inherently mutually exclusive in some way.
It should be understood that, although the respective steps in the flowcharts in the above-described embodiments are sequentially shown as indicated by arrows, the steps are not necessarily performed sequentially as indicated by the arrows. The steps are not performed in the exact order shown and may be performed in other orders unless explicitly stated herein. Moreover, at least some of the steps in the figures may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, in different orders, and may be performed alternately or at least partially with respect to other steps or sub-steps of other steps.
It should be noted that step numbers such as S11 and S12 are used herein for the purpose of more clearly and briefly describing the corresponding content, and do not constitute a substantial limitation on the sequence, and those skilled in the art may perform S12 first and then S11 in specific implementation, which should be within the scope of the present application.
First, an application scenario and a part of vocabulary related to the embodiments of the present application will be described.
Fig. 1 is a schematic diagram of a communication system according to an embodiment of the present application. As shown in fig. 1, the communication system includes an access device and an access point device. The access device is located in the coverage area of the access point device, and communicates with the access point device to implement the following technical solutions provided by the embodiments of the present application. Wherein:
the access device may be a wireless terminal or a wired terminal. A wireless terminal may refer to a device that provides voice and/or other traffic data connectivity to a user, a handheld device having wireless connection capability, or other processing device connected to a wireless modem. The wireless terminal can be deployed on land, including indoors or outdoors, hand-held or vehicle-mounted; can also be deployed on the water surface (such as a ship and the like); and may also be deployed in the air (e.g., airplanes, balloons, satellites, etc.). The terminal device may be a mobile phone (mobile phone), a tablet computer (Pad), a computer with wireless transceiving function, a VR (Virtual Reality) terminal device, an AR (Augmented Reality) terminal device, a wireless terminal device in industrial control (industrial control), a wireless terminal device in self driving (self driving), a wireless terminal device in remote medical treatment (remote medical), a wireless terminal device in smart grid (smart grid), a wireless terminal device in transportation safety (transportation safety), a wireless terminal device in smart city (smart city), a wireless terminal device in smart home (smart home), and the like, which are not limited herein. It can be understood that, in the embodiment of the present application, a terminal device may also be referred to as a UE (User Equipment).
An access point device may be a device that accesses an access device to a wireless network.
The specific application scenario in the embodiment of the application may be short-distance wireless Communication, for example, wireless fidelity WiFi (IEEE 802.11 protocol), wireless Mesh network Mesh, bluetooth, ZigBee, Thread, Z-Wave, Near Field Communication (NFC), Ultra Wide Band (UWB), visible light Communication LiFi, and the like all belong to a short-distance wireless Communication range.
In short-distance wireless communication, a certain safety mechanism needs to be established before data transmission is carried out between two devices through a wireless technology, so that the transmission safety is ensured. At present, Access equipment first needs to discover surrounding Access Point (AP) equipment through active/passive scanning, and then can establish connection with the AP equipment through two processes of authentication and association, and finally accesses a wireless network. However, when the access device reaches a certain number, association failure occurs, which results in that the access device cannot access the network, and a relatively long time is wasted in the previous authentication process. In an environment with many users and under the condition of limited network resources, the network may not be accessed.
In the embodiment of the application, the time consumed in the association process can be ignored compared with the authentication process. Therefore, in the embodiment of the present application, the sequence of authentication and association is adjusted, and only after association is passed, the access device that acquires the pass from the access point device can perform subsequent operations, such as an access authentication link, that is, the access authentication link can be performed after association is successful. Meaningless access authentication procedures due to association failures are avoided.
The following describes in detail the technical solutions of the embodiments of the present application and how to solve the above technical problems with specific embodiments. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
Fig. 2 is a flowchart of a wireless access method according to an embodiment of the present application. The embodiment of the application provides a wireless access method which is applied to access equipment. As shown in fig. 2, the method of the present embodiment includes the following steps:
and S11, sending an association request, wherein the association request is used for requesting to establish association connection with the access point equipment.
Specifically, the access device may send an association request to the access point device before establishing a connection with the access point device, so as to request to establish an association connection with the access point device.
Various parameters of the access device may be included in the association request, such as, but not limited to, the rate, channel (frequency), and QoS capabilities supported by the access device, and encryption algorithm for access authentication (especially for 802.11 technology).
As shown in fig. 3, before sending an association request, it is necessary to detect an access point device, for example, a Beacon frame sent by the access point device. As shown in fig. 4, taking WIFI networks as an example, a plurality of available WIFI networks are detected.
As shown in fig. 4, an association request is sent to the access point device in response to a user operation, such as a voice operation or a touch operation, and the association request is sent to the access point device of the corresponding network by the user operation selection.
And S12, receiving an association result corresponding to the association request, wherein the association result is provided by the access point device.
Specifically, the access device receives an association result provided by the access point device, where the association result corresponds to an association request sent by the access device.
The association result is, for example, result information of association success or association failure.
Wherein the association result can be determined based on the resource, policy, etc. of the access point device. For example, if the number of access devices currently accessed by the access point device is small and the remaining resources are large, the association is successful, for example, if the rate supported by the access device does not match with the access point device, the association fails.
And S13, executing corresponding operation according to the correlation result.
Specifically, the access device may perform an access authentication operation for accessing the access point device, or end the operation for accessing the access point device, for example, when the association result indicates that the association is successful, the access device performs the access authentication operation for accessing the access point device; and the association result indicates that the association fails, and the access equipment ends the operation of accessing the access point equipment.
In the method of the embodiment, an access device sends an association request, where the association request is used to request an association connection to be established with the access device; and receiving the association result corresponding to the association request, and further executing corresponding operation according to the association result, namely, in the process that the access equipment accesses the network corresponding to the access point equipment, advancing the association process with less time consumption, and if association fails, reselecting other access point equipment for access.
In an embodiment, the performing the respective operation includes at least one of:
the access equipment executes access authentication of access point equipment;
and the access equipment finishes accessing the access point equipment.
Specifically, if the association result indicates that the association is successful, the access device executes access authentication of the access point device;
and if the association result indicates that the association fails, the access equipment finishes accessing the access point equipment.
In one embodiment, the step of S13 further includes:
acquiring a correlation mark;
and if the association mark meets the preset condition, the access equipment executes corresponding operation.
Specifically, the association result is indicated by an association flag, and optionally, the association result includes an association flag, for example, the association flag indicates that the association is successful or the association flag indicates that the association is failed.
Wherein, the association mark meeting the preset condition comprises at least one of the following:
the association flag is successful;
the association flag is association failure.
And the access equipment executes corresponding operation according to the association mark. If the association mark meets the preset condition of successful association, the access equipment executes access authentication of the access point equipment; and if the association mark meets the preset condition of association failure, the access equipment finishes accessing the access point equipment.
In an embodiment, the association flag indicates association success when the association flag is a first preset value, and indicates association failure when the association flag is a second preset value, for example, the association flag is 1, and the association flag bit is 0.
In an embodiment, before the step of S13, the method further includes:
and updating the association flag according to the association result.
Specifically, the association flag corresponding to the access point device may be stored in the access device, and if the association is successful, the association flag is updated to the first preset value, and if the association is identified, the association flag is updated to the second preset value.
In the above embodiment, in the process of accessing the access device to the network corresponding to the access point device, the association process with less time consumption is advanced, that is, the association process is performed before the access authentication process, and if the association fails, other access point devices can be reselected for access.
In an embodiment, the association request further includes an encryption algorithm, and the encryption algorithm is used for encrypting data transmitted in the access authentication process.
Specifically, if the association is successful, the access device executes an access authentication operation, and data needs to be encrypted and decrypted in the access authentication process, so that the association request includes an encryption algorithm for performing access authentication.
In an embodiment, as shown in fig. 3, the step of performing, by the access device, access authentication for accessing the access point device includes:
sending an access authentication request to enable the access point equipment to authenticate the access equipment according to the access authentication request;
receiving first information, wherein the first information is fed back by the access point device based on the access authentication request;
encrypting the first information according to the encryption algorithm to obtain second information;
sending the second information;
receiving an access authentication result, wherein the access authentication result is fed back by the access point device based on the second information;
if the access authentication result is authentication success, the access equipment is accessed to the access point equipment; or the like, or, alternatively,
and if the access authentication result is authentication failure, the access equipment finishes the operation of accessing the access point equipment.
Specifically, after the association is successful, the access device sends an access authentication request to the access point device;
the access equipment receives first information fed back by the access point equipment based on the access authentication request; the first information is, for example, a parameter required for access authentication, and the first information may be a random number.
Encrypting the first information according to an encryption algorithm to obtain second information; sending second information to the access point device; the access point equipment decodes the second information by using an encryption algorithm to obtain third information, compares the first information with the third information and determines an access authentication result; for example, if the first information and the third information are consistent, the access authentication result is successful, and if the first information and the third information are inconsistent, the access authentication result is failed.
And the access point equipment sends an access authentication result to the access equipment, wherein the access authentication result is used for indicating that the access point equipment successfully authenticates the access equipment or fails to authenticate the access equipment.
If the access authentication result is that the authentication is successful, the access equipment is accessed to the access point equipment; or the like, or, alternatively,
and if the access authentication result is authentication failure, the access equipment ends the operation of accessing the access point equipment.
In one embodiment, after the step of S13, the method further includes:
and outputting prompt information to prompt the success of the access or the failure of the access.
Specifically, the access device may output a prompt message to the user, and prompt the user that the access is successful or failed, where the prompt message may be a text message and/or a voice message.
As shown in fig. 5, the access device outputs a prompt message of "access successful".
In the above embodiment, in the process of accessing the access device to the network corresponding to the access point device, the association process is first performed, and the access authentication process is performed, and if the association fails, another access point device may be reselected for access.
Fig. 6 is a flowchart of a wireless access method according to another embodiment of the present application. The embodiment of the application provides a wireless access method which is applied to access point equipment. As shown in fig. 6 and 7, the method of the present embodiment includes the following steps:
s21, determining a corresponding association result according to the received association request, wherein the association request is provided by the access equipment;
specifically, the access point device receives an association request from the access point device, and determines an association result corresponding to the association request, where the association result is, for example, a result of association success or association failure.
For example, the corresponding association result is determined according to the processing capability, policy, etc. of the access device, such as available device resources.
S22, sending the association result to make the access device execute corresponding operation according to the association result;
specifically, a corresponding association result is sent to the access device, and the access device executes corresponding operation according to the association result; if the association is successful, the access equipment executes the access authentication operation for accessing the access point equipment, and if the association is identified, the access equipment finishes the operation for accessing the access point equipment.
S23, detecting whether an access authentication request is received;
and S24, if yes, executing corresponding authentication processing.
Specifically, when the association is successful, the access device performs an access authentication operation, sends an access authentication request to the access point device, and if the access point device receives the access authentication request, performs a corresponding authentication process, that is, performs an access authentication process.
The method of this embodiment is similar to the method of the access device side, and the implementation principle and technical effect thereof are similar, and are not described herein again.
In one embodiment, the step of S21 includes:
according to the association request, confirming that the access point equipment associates the equipment resources of the access equipment;
if the equipment resource is greater than or equal to the preset equipment resource, determining a correlation result; and/or the presence of a gas in the gas,
and if the equipment resource is smaller than the preset equipment resource, the access point equipment sends an association request so that the server determines an association result according to the association request.
Specifically, when the processing capability of the access point device is strong (for example, the device resource for associating with the access point device is more), the association result is determined by the access point device; when the processing capability of the access point device is weak (for example, the device resource for associating the access point device is less), the association result is determined by the background server.
That is, if the access point device has more device resources for associating with the access point device, and if the device resources are greater than and/or equal to the preset device resources, the access point device determines an association result, and if the device resources are less than the preset device resources, the access point device sends an association request to the server, so that the server determines the association result according to the association request.
In one embodiment, for a plurality of access devices, the association result of some access devices may be determined by the access point device, and the association result of other access devices may be determined by the server.
In the above embodiment, according to the device resource of the access device associated by the access point device, it is determined to determine the association result by the access point device itself, or to confirm the association result by the server, so as to improve the reliability.
In an embodiment, the step "the access point device sends an association request to enable the server to determine an association result according to the association request" may be specifically implemented in the following manner:
sending an association request;
and receiving an association result based on the association request, wherein if the association result is successful, the association result further comprises a device identifier allocated to the access device by the server.
Specifically, the access point device generally registers information of the access point device and assigns a unique identifier to the access point device during the association process.
When the device resources of the access device are not enough for association, the server determines the association result and allocates a device identifier for the access device. And further including the device identifier allocated by the server for the access device in the association result.
In an embodiment, determining the association result according to the association request may specifically be implemented as follows:
after the access point equipment receives the association request, determining the residual equipment resources of the access point equipment;
when the residual equipment resources are greater than or equal to the preset equipment resources, determining that the association result is successful; or the like, or, alternatively,
and when the residual equipment resources are smaller than the preset equipment resources, determining that the association result is association failure.
In particular, the remaining device resources of the access point device, for serving one or more access devices,
and if the remaining device resources are less than the preset device resources, that is, if the remaining device resources are less and cannot provide service for the access device, determining that the association result is association failure.
For example, when a plurality of access devices want to access the access device, a part of the access devices may be selected, and when the remaining device resources needed by the part of the access devices are greater than or equal to the preset device resources, the association results corresponding to the access devices are determined as association success, and the association results corresponding to other access devices are determined as association failure.
Further, as shown in fig. 7, after determining that the association result is that the association is successful, allocating a device identifier to the access device; wherein the association result further includes a device identifier allocated to the access device.
In the above embodiment, in the process of accessing the access device to the network corresponding to the access point device, an association process is first performed, and an access authentication process is performed, if the remaining device resources of the access point device are available, association fails, and the access device can reselect another access point device for access.
For example, in an environment with many users, such as a large conference, a concert, etc., when networking is performed through a wireless WiFi router, a long connection failure process can be effectively avoided.
For example, in the field of internet of things, each node (i.e., access device) arranged in a network can be connected to an access point device quickly, so that the connection process is accelerated, and the efficiency of data transmission between objects is improved.
In an embodiment, as shown in fig. 3, the step S24 may be specifically implemented as follows:
outputting first information based on the access authentication request; wherein the access authentication request is provided by the access device;
detecting whether second information is received, wherein the second information is obtained by encrypting the first information by the access equipment according to the encryption algorithm;
if so, decrypting the second information to obtain third information;
determining an access authentication result according to the third information and the first information, wherein the access authentication result is used for indicating that the access point equipment successfully authenticates the access equipment or fails to authenticate the access equipment;
and outputting the access authentication result.
Specifically, after the association is successful, the access device sends an access authentication request to the access point device; the access equipment receives first information fed back by the access point equipment based on the authentication request; the first information is, for example, a parameter required for access authentication, and the first information may be a random number.
Encrypting the first information according to an encryption algorithm to obtain second information; sending second information to the access point device; after receiving the second information, the access point equipment decodes the second information by using an encryption algorithm to obtain third information, compares the first information with the third information and determines an access authentication result; for example, if the first information and the third information are consistent, the access authentication result is successful, and if the first information and the third information are inconsistent, the access authentication result is failed.
And the access point equipment sends an access authentication result to the access equipment, wherein the access authentication result is used for indicating that the access point equipment successfully authenticates the access equipment or fails to authenticate the access equipment.
If the access authentication result is that the authentication is successful, the access equipment is accessed to the access point equipment; or the like, or, alternatively,
and if the access authentication result is authentication failure, the access equipment ends the operation of accessing the access point equipment.
As shown in fig. 7, after the authentication is successful, for some wireless networks, an IP needs to be allocated to the access device, and the access device accesses the wireless network of the access point device.
Fig. 8 is a structural diagram of a wireless access apparatus according to an embodiment of the present application, and as shown in fig. 8, the wireless access apparatus according to the embodiment is applied to an access device, and the wireless access apparatus includes:
a sending module 801, configured to send an association request, where the association request is used to request an association connection to be established with an access point device;
a receiving module 802, configured to receive an association result corresponding to the association request, where the association result is provided by the access point device;
and the processing module 803 is configured to execute a corresponding operation according to the association result.
In one possible implementation, the performing the corresponding operation includes at least one of:
the access equipment executes access authentication for accessing the access point equipment;
and the access equipment finishes accessing the access point equipment.
In one possible implementation manner, the processing module 803 is configured to:
acquiring a correlation mark;
and if the association mark meets the preset condition, the access equipment executes corresponding operation.
In a possible implementation manner, the processing module 803 is configured to:
and updating the association mark according to the association result.
In a possible implementation manner, the association flag satisfying the preset condition includes at least one of:
the association flag is successful;
the association flag is association failure.
In a possible implementation manner, the association request further includes an encryption algorithm, and the encryption algorithm is used for encrypting data transmitted in the access authentication process.
In one possible implementation manner, the processing module 803 is configured to:
sending an access authentication request to enable the access point equipment to authenticate the access equipment according to the access authentication request;
receiving first information, wherein the first information is fed back by the access point device based on the access authentication request;
encrypting the first information according to the encryption algorithm to obtain second information;
sending the second information;
receiving an access authentication result, wherein the access authentication result is fed back by the access point device based on the second information;
if the access authentication result is authentication success, the access equipment is accessed to the access point equipment; or the like, or, alternatively,
and if the access authentication result is authentication failure, the access equipment finishes the operation of accessing the access point equipment.
In one possible implementation manner, the processing module 803 is configured to:
and outputting prompt information to prompt the success of the access or the failure of the access.
The apparatus of this embodiment may be configured to implement the technical solutions of the above method embodiments, and the implementation principles and technical effects are similar, which are not described herein again.
Fig. 9 is a structural diagram of a wireless access apparatus according to another embodiment of the present application, and as shown in fig. 9, the wireless access apparatus according to the present embodiment is applied to an access point device, and the wireless access apparatus includes:
a receiving module 901, configured to receive an association request, where the association request is provided by an access device;
a processing module 902, configured to determine, according to the received association request, a corresponding association result;
a sending module 903, configured to send the association result, so that the access device executes a corresponding operation according to the association result;
the processing module 902 is further configured to detect whether an access authentication request is received;
if yes, corresponding authentication processing is executed.
In a possible implementation manner, the association request includes an encryption algorithm, and the encryption algorithm is used for encrypting data transmitted in the access authentication process.
In one possible implementation, the processing module 902 is configured to:
confirming that the access point equipment is associated with the equipment resource of the access equipment according to the association request;
if the equipment resource is greater than or equal to the preset equipment resource, determining a correlation result; and/or the presence of a gas in the gas,
if the device resource is smaller than the preset device resource, the sending module 903 is configured to: and the access point equipment sends the association request so that the server determines an association result according to the association request.
In one possible implementation, the sending module 903 is configured to:
sending the association request;
the receiving module 901 is configured to:
and receiving an association result based on the association request, wherein if the association result is successful, the association result further includes a device identifier allocated by the server to the access device.
In one possible implementation, the processing module 902 is configured to:
determining the remaining device resources of the access point device after the access point device receives the association request;
when the residual equipment resources are greater than or equal to preset equipment resources, determining the association result as successful association; and/or the presence of a gas in the gas,
and when the residual equipment resources are smaller than preset equipment resources, determining the association result as association failure.
In one possible implementation, the processing module 902 is further configured to:
after determining that the association result is successful, allocating a device identifier for the access device; wherein the association result further includes a device identifier allocated to the access device.
In a possible implementation manner, the processing module 902 is specifically configured to:
outputting first information based on the access authentication request; wherein the access authentication request is provided by the access device;
detecting whether second information is received, wherein the second information is obtained by encrypting the first information by the access equipment according to the encryption algorithm;
if so, decrypting the second information to obtain third information;
determining an access authentication result according to the third information and the first information, wherein the access authentication result is used for indicating that the access point equipment successfully authenticates the access equipment or fails to authenticate the access equipment;
and outputting the access authentication result.
The apparatus of this embodiment may be configured to implement the technical solutions of the above method embodiments, and the implementation principles and technical effects are similar, which are not described herein again.
As shown in fig. 10, the present application further provides an access device, including: a memory, a processor;
the memory stores computer-executable instructions;
the computer executed instructions, when executed by the processor, implement the steps of the method described above, and the specific implementation process of the method may refer to the foregoing method embodiments, which are not described herein again.
As shown in fig. 11, the present application also provides an access point device, including: a memory, a processor;
the memory stores computer-executable instructions;
the computer executed instructions, when executed by the processor, implement the steps of the method described above, and the specific implementation process of the method may refer to the foregoing method embodiments, which are not described herein again.
The present application further provides a communication system, comprising:
at least one access device for implementing the wireless access method according to any one of the preceding embodiments; and the number of the first and second groups,
at least one access point device for implementing the wireless access method according to any of the preceding embodiments.
The present application also provides a computer storage medium having stored thereon computer executable instructions which, when executed by a processor, implement the steps of the method as described above.
Embodiments of the present application also provide a computer program product, which includes computer program code, when the computer program code runs on a computer, the computer is caused to execute the method as described in the above various possible embodiments.
An embodiment of the present application further provides a chip, which includes a memory and a processor, where the memory is used to store a computer program, and the processor is used to call and run the computer program from the memory, so that a device in which the chip is installed executes the method described in the above various possible embodiments.
Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. The embodiments of the present application are intended to cover any variations, uses, or adaptations of the application following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the application pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.
It will be understood that the present application is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the application is limited only by the appended claims.

Claims (19)

1. A wireless access method applied to an access device, the method comprising:
s11, sending an association request, wherein the association request is used for requesting to establish association connection with the access point equipment;
s12, receiving an association result corresponding to the association request, wherein the association result is provided by the access point device;
and S13, executing corresponding operation according to the correlation result.
2. The method of claim 1, wherein performing the respective operation comprises at least one of:
the access equipment executes access authentication for accessing the access point equipment;
and the access equipment finishes accessing the access point equipment.
3. The method according to claim 1, wherein the step of S13 further comprises:
acquiring a correlation mark;
and if the association mark meets the preset condition, the access equipment executes corresponding operation.
4. The method of claim 3, wherein the step of S13 is preceded by the steps of:
and updating the association mark according to the association result.
5. The method of claim 3, wherein the association flag satisfying a predetermined condition comprises at least one of:
the association flag is successful;
the association flag is association failure.
6. The method according to any one of claims 1 to 5, wherein the association request further comprises an encryption algorithm for encrypting data transmitted in the access authentication process.
7. The method of claim 6, wherein the step of the access device performing access authentication for accessing the access point device comprises:
sending an access authentication request to enable the access point equipment to authenticate the access equipment according to the access authentication request;
receiving first information, wherein the first information is fed back by the access point device based on the access authentication request;
encrypting the first information according to the encryption algorithm to obtain second information;
sending the second information;
receiving an access authentication result, wherein the access authentication result is fed back by the access point device based on the second information;
if the access authentication result is authentication success, the access equipment is accessed to the access point equipment; or the like, or, alternatively,
and if the access authentication result is authentication failure, the access equipment finishes the operation of accessing the access point equipment.
8. The method according to any one of claims 1 to 5, wherein after the step of S13, the method further comprises:
and outputting prompt information to prompt the success of the access or the failure of the access.
9. A wireless access method applied to an access point device, the method comprising:
s21, determining a corresponding association result according to the received association request, wherein the association request is provided by the access equipment;
s22, sending the association result to enable the access device to execute corresponding operation according to the association result;
s23, detecting whether an access authentication request is received;
and S24, if yes, executing corresponding authentication processing.
10. The method of claim 9, wherein the association request includes an encryption algorithm used to encrypt data transmitted during the access authentication procedure.
11. The method according to claim 9 or 10, wherein the step S21 includes:
confirming that the access point equipment is associated with the equipment resource of the access equipment according to the association request;
if the equipment resource is greater than or equal to the preset equipment resource, determining a correlation result; and/or the presence of a gas in the gas,
and if the equipment resource is smaller than the preset equipment resource, the access point equipment sends the association request so that the server determines an association result according to the association request.
12. The method of claim 11, wherein the step of the access point device sending the association request to enable the server to determine the association result according to the association request comprises:
sending the association request;
and receiving an association result based on the association request, wherein if the association result is successful, the association result further includes a device identifier allocated by the server to the access device.
13. The method according to claim 9 or 10, wherein the step of determining the association result according to the association request further comprises:
determining the remaining device resources of the access point device after the access point device receives the association request;
when the residual equipment resources are greater than or equal to preset equipment resources, determining the association result as successful association; and/or the presence of a gas in the gas,
and when the residual equipment resources are smaller than preset equipment resources, determining the association result as association failure.
14. The method of claim 13, wherein after determining that the association result is successful, further comprising:
allocating a device identifier to the access device; wherein the association result further includes a device identifier allocated to the access device.
15. The method according to claim 9 or 10, wherein the step S24 includes:
outputting first information based on the access authentication request; wherein the access authentication request is provided by the access device;
detecting whether second information is received, wherein the second information is obtained by encrypting the first information by the access equipment according to an encryption algorithm;
if so, decrypting the second information to obtain third information;
determining an access authentication result according to the third information and the first information, wherein the access authentication result is used for indicating that the access point equipment successfully authenticates the access equipment or fails to authenticate the access equipment;
and outputting the access authentication result.
16. An access device, comprising: a processor and a memory;
the memory stores computer-executable instructions;
the computer executable instructions, when executed by the processor, implement the wireless access method of any one of claims 1 to 8.
17. An access point device, comprising: a processor and a memory;
the memory stores computer-executable instructions;
the computer executable instructions when executed by the processor implement the wireless access method of any of claims 9 to 15.
18. A communication system, comprising:
at least one access device for implementing the wireless access method according to any one of claims 1 to 8; and the number of the first and second groups,
at least one access point device for implementing the wireless access method according to any one of claims 9 to 15.
19. A computer-readable storage medium having stored thereon computer-executable instructions for implementing the wireless access method of any one of claims 1 to 15 when executed by a processor.
CN202010831558.XA 2020-08-18 2020-08-18 Wireless access method, device, system and storage medium Pending CN111954216A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010831558.XA CN111954216A (en) 2020-08-18 2020-08-18 Wireless access method, device, system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010831558.XA CN111954216A (en) 2020-08-18 2020-08-18 Wireless access method, device, system and storage medium

Publications (1)

Publication Number Publication Date
CN111954216A true CN111954216A (en) 2020-11-17

Family

ID=73343640

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010831558.XA Pending CN111954216A (en) 2020-08-18 2020-08-18 Wireless access method, device, system and storage medium

Country Status (1)

Country Link
CN (1) CN111954216A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101192929A (en) * 2006-11-27 2008-06-04 华为技术有限公司 An access method, system and device for short distance wireless network
CN104080150A (en) * 2014-07-04 2014-10-01 广州杰赛科技股份有限公司 WLAN access method for equipment sharing
US20160112944A1 (en) * 2014-10-17 2016-04-21 Qualcomm Incorporated Access point selection based on association performance
CN107231632A (en) * 2017-06-21 2017-10-03 上海斐讯数据通信技术有限公司 WDS connection methods, WAP and terminal device based on Portal certifications
CN110401951A (en) * 2018-04-25 2019-11-01 华为技术有限公司 Authenticate the methods, devices and systems of terminal in WLAN

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101192929A (en) * 2006-11-27 2008-06-04 华为技术有限公司 An access method, system and device for short distance wireless network
CN104080150A (en) * 2014-07-04 2014-10-01 广州杰赛科技股份有限公司 WLAN access method for equipment sharing
US20160112944A1 (en) * 2014-10-17 2016-04-21 Qualcomm Incorporated Access point selection based on association performance
CN107231632A (en) * 2017-06-21 2017-10-03 上海斐讯数据通信技术有限公司 WDS connection methods, WAP and terminal device based on Portal certifications
CN110401951A (en) * 2018-04-25 2019-11-01 华为技术有限公司 Authenticate the methods, devices and systems of terminal in WLAN

Similar Documents

Publication Publication Date Title
CN110267327B (en) Service transmission method and device
CN110830925B (en) Session management method and device for user group
EP3531793B1 (en) Repeating method of wireless repeating device, and wireless repeating device
US20120076072A1 (en) System and method for maintaining privacy in a wireless network
US10299115B2 (en) Selection and use of a security agent for device-to-device (D2D) wireless communications
CN110366112B (en) Positioning method and related equipment
US20110205956A1 (en) Wireless lan system, wireless lan device, and storage medium having stored therein wireless lan program
US20090274065A1 (en) Method and apparatus for setting wireless local area network by using button
US11233817B2 (en) Methods and apparatus for end device discovering another end device
CN104967595A (en) Method and apparatus for registering devices on Internet of things platform
WO2018120566A1 (en) Wave beam selection method, apparatus and system
CN104619040A (en) Method and system for quickly connecting WIFI equipment
WO2019085737A1 (en) Method and device for obtaining and providing access information of wireless access point, and medium
CN114342332A (en) Communication method, device and system
CN114071452B (en) Method and device for acquiring user subscription data
CN111182546A (en) Method, equipment and system for accessing wireless network
US20230232228A1 (en) Method and apparatus for establishing secure communication
US11265708B2 (en) Method and device for joining access node group
CN112019489B (en) Verification method and device
CN112153599B (en) Message transmission method and device, internet of vehicles equipment and management node
CN116746181A (en) Method for generating key identifier and related device
CN111182512B (en) Terminal connection method, device, terminal and computer readable storage medium
CN113518475A (en) Communication method, device and system
CN111954216A (en) Wireless access method, device, system and storage medium
CN113055353B (en) Data transmission method, device, equipment and computer readable medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20201117

RJ01 Rejection of invention patent application after publication