CN113873506A - Method and system for safe networking of intelligent household terminal equipment - Google Patents

Method and system for safe networking of intelligent household terminal equipment Download PDF

Info

Publication number
CN113873506A
CN113873506A CN202110209281.1A CN202110209281A CN113873506A CN 113873506 A CN113873506 A CN 113873506A CN 202110209281 A CN202110209281 A CN 202110209281A CN 113873506 A CN113873506 A CN 113873506A
Authority
CN
China
Prior art keywords
terminal equipment
wireless network
intelligent
home terminal
networking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110209281.1A
Other languages
Chinese (zh)
Inventor
李鹏程
杭云
郭宁
施唯佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianyi Digital Life Technology Co Ltd
Original Assignee
Tianyi Smart Family Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianyi Smart Family Technology Co Ltd filed Critical Tianyi Smart Family Technology Co Ltd
Priority to CN202110209281.1A priority Critical patent/CN113873506A/en
Publication of CN113873506A publication Critical patent/CN113873506A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup

Abstract

The application discloses a safe networking method and system for intelligent home terminal equipment. The method comprises the following steps: primary access, user authentication and secondary access. The primary access is used for transmitting information about the intelligent household terminal equipment through an open wireless network, and the secondary access is used for networking through a hidden wireless network. The multiple access scheme provides multi-step security. Meanwhile, leakage of account numbers and passwords in the networking process is avoided through multiple encryption operations. The application also provides a corresponding system.

Description

Method and system for safe networking of intelligent household terminal equipment
Technical Field
The application relates to the field of wireless communication and information security, in particular to the field of smart home, and more particularly to a secondary access smart home security networking method and system using a hidden SSID-dedicated WiFi network.
Background
With the continuous development and growth of smart home products, the security of the smart home networking system becomes more and more important. In the aspect of the application of smart home products in life, the smart home products can continuously collect life habits and privacy, and once the data are acquired by lawless persons, unexpected consequences can be caused to users.
At present, wireless networking of smart homes is basically performed based on a family open WiFi network. The wireless WiFi has the characteristic of openness, the normal transmission distance of the household wireless router can reach dozens of meters, and the transmission distance of the high-power wireless router can exceed 100 meters or even higher. This results in that the home wireless network can be sniffed for a long distance, which provides a possibility to hack the smart home networking via WiFi attacks and steal user information.
At present, the wireless networking mode of the intelligent home is basically that the wireless networking mode is directly accessed to a home network. The network is a common household internet access channel and an intelligent home network, and is poor in safety. And the direct access mode has simple step flow, poor privacy and lack of necessary protection measures, and the wireless account password and the interactive message are easy to intercept, steal and decipher by a wireless sniffer.
Accordingly, there is a great need in the art for a secure networking method and system involving smart homes.
Disclosure of Invention
The following presents a simplified summary of one or more aspects in order to provide a basic understanding of such aspects. This summary is not an extensive overview of all contemplated aspects, and is intended to neither identify key or critical elements of all aspects nor delineate the scope of any or all aspects. Its sole purpose is to present some concepts of one or more aspects in a simplified form as a prelude to the more detailed description that is presented later.
As described above, to solve the above problems, the present application provides an intelligent home security networking method and system based on a WiFi network dedicated to a hidden SSID. According to the application, through the special mobile phone App, the user does not need to manually input the WiFi password through the intelligent home terminal equipment, and the safe networking can be completed, so that the risk that the password is snooped is avoided.
In addition, this application uses the private network of hiding the SSID as intelligent house network deployment private network, and this wiFi can not send Beacon broadcast message, can not be listened by wireless sniffer, thereby this has avoided intelligent house private network to be listened by wiFi sniffer and has carried out the risk of violent attack. In addition, the hidden SSID network only allows authenticated intelligent terminals which are added into the white list to be connected, so that networking safety is ensured, and the risk that non-authenticated equipment is accessed into the special intelligent home network to influence network safety is avoided. Before accessing the final private network, the home gateway sends the encrypted hidden SSID network name and password to the intelligent terminal, the private TCP link is used, and the unicast encrypted message is sent, so that the data transmission safety and the access safety are guaranteed, and the intelligent home private network is safer and more controllable.
According to a first aspect of the present application, a secure networking method for smart home terminal equipment is disclosed, the method comprising:
primary access of a mobile phone, a gateway and intelligent household terminal equipment;
user authentication; and
the secondary access of the gateway and the intelligent household terminal equipment,
wherein the primary access is used for accessing an open wireless network and the secondary access is used for accessing a hidden wireless network.
According to the preferred embodiment of the application, the management App, the gateway and the intelligent home terminal equipment on the mobile phone perform preliminary communication negotiation through the open wireless network so as to transmit information about the intelligent home terminal equipment.
According to the preferred embodiment of the present application, the primary access comprises the following steps:
s1: the gateway is powered on to open the open wireless network and the hidden wireless network;
s2: powering on the intelligent household terminal equipment to enable a wireless module of the intelligent household terminal equipment to enter a hybrid mode;
s3: selecting and connecting an open wireless network through a management App;
s4: the SSID and the password of the open wireless network are encrypted and broadcast to all intelligent home terminal equipment;
s5: the intelligent home terminal equipment receives and decrypts the SSID and the password of the open wireless network and is connected to the open wireless network;
s6: the intelligent household terminal equipment sends a successful connection message to the mobile phone
According to the preferred embodiment of the application, the user authentication comprises the step of setting an admission principle for the safe networking of the intelligent household terminal equipment.
According to a preferred embodiment of the present application, the admission principles include, but are not limited to: and after the primary access is finished, determining whether the intelligent household terminal equipment is allowed to access the hidden wireless network.
According to a preferred embodiment of the present application, the user authentication comprises the steps of:
s7: acquiring information of intelligent home terminal equipment;
s8: determining that the intelligent home terminal equipment is allowed to be accessed into the intelligent home networking;
s9: and the gateway adds the intelligent household terminal equipment into a white list of the hidden wireless network.
According to a preferred embodiment of the present application, the secondary access comprises:
s10: the gateway sends the encrypted SSID and password of the hidden wireless network to the intelligent home terminal equipment;
s11: the intelligent home terminal equipment disconnects the open wireless network and is connected to the hidden wireless network;
s12: and the intelligent household terminal equipment reports the networking success message.
According to the preferred embodiment of the present application, the secondary access uses security negotiation to deliver encrypted SSID and password via unicast stream.
According to a second aspect of the present application, a system for secure networking of smart home terminal devices is provided, the system comprising:
the first-level access module is used for primary negotiation of the mobile phone, the gateway and the intelligent home terminal equipment;
a user authentication module; and
a secondary access module used for the safe networking of the gateway and the intelligent household terminal equipment,
the first-level access module is used for accessing an open wireless network, and the second-level access module is used for accessing a hidden wireless network.
According to the preferred embodiment of the application, the primary negotiation is used for transmitting information about the intelligent home terminal equipment, the user authentication module is used for setting an admission principle for the security networking of the intelligent home terminal equipment, and the secondary access module uses the security negotiation to issue an encrypted SSID and a password about the hidden wireless network to the intelligent home terminal equipment through a unicast stream.
To the accomplishment of the foregoing and related ends, the one or more aspects comprise the features hereinafter fully described and particularly pointed out in the claims. The following description and the annexed drawings set forth in detail certain illustrative features of the one or more aspects. These features are indicative, however, of but a few of the various ways in which the principles of various aspects may be employed and the present description is intended to include all such aspects and their equivalents.
Drawings
So that the manner in which the above recited features of the present application can be understood in detail, a more particular description of the disclosure briefly summarized above may be had by reference to aspects, some of which are illustrated in the appended drawings. It is to be noted, however, that the appended drawings illustrate only certain typical aspects of this application and are therefore not to be considered limiting of its scope, for the description may admit to other equally effective aspects.
In the drawings:
fig. 1 is a schematic diagram illustrating a secure networking method of a smart home terminal according to an embodiment of the present application, in which a primary access and a secondary access are shown;
fig. 2 is a flowchart illustrating a smart home terminal security networking method according to an embodiment of the present application; and
fig. 3 is a schematic diagram illustrating secondary access according to the method shown in fig. 1.
Detailed Description
The detailed description set forth below in connection with the appended drawings is intended as a description of various configurations and is not intended to represent the only configurations in which the concepts described herein may be practiced. The detailed description includes specific details to provide a thorough understanding of the various concepts. It will be apparent, however, to one skilled in the art that these concepts may be practiced without these specific details. In some instances, well known components are shown in block diagram form in order to avoid obscuring such concepts.
It is to be understood that other embodiments will be evident based on the present disclosure, and that system, structural, process, or mechanical changes may be made without departing from the scope of the present disclosure.
With reference to fig. 1 and 2, aspects are described with reference to one or more components and one or more methods that may perform the actions or functions described herein. In an aspect, the terms "component," "module," as used herein, may be one of the parts that make up a system, may be hardware or software, or some combination thereof, and may be divided into other components. While the operations described below in fig. 2 are presented in a particular order and/or as being performed by example components, it should be understood that the order of the actions and the components performing the actions may vary depending on the implementation. Further, it should be understood that the following acts or functions may be performed by a specially programmed processor, a processor executing specially programmed software or computer readable media, or by any other combination of hardware components and/or software components capable of performing the described acts or functions.
The scheme for the secondary access intelligent home security networking of the private WiFi network using the hidden SSID relates to three components of an intelligent home terminal, a management App and a home gateway. The home gateway can simultaneously start two WiFi devices, wherein one open SSID meets the requirement of normal internet surfing in life and is used as a networking connection intermediate medium; another hidden dedicated SSID acts as the true networking SSID.
According to the method, the intelligent home terminal equipment is connected to the public open WiFi, and at this time, the management App, the gateway and the intelligent home terminal equipment establish three-way communication. The management App authenticates that the intelligent home terminal equipment can be admitted into a hidden WiFi network, a security channel is established between the gateway and the intelligent home terminal equipment, after the account number and the password of the hidden SSID are transmitted, the intelligent home terminal equipment automatically disconnects the open WiFi, simultaneously accesses the intelligent home special network of the hidden SSID, and finally completes networking.
Generally, the method of the present application is mainly divided into three parts, which are: primary access, user authentication and secondary access.
The first-level access means that the management App, the home gateway and the intelligent home terminal equipment are firstly accessed into an open wireless system, and preliminary communication negotiation can be carried out among the three parties.
And user authentication, namely after the primary access is finished, a user can determine whether to allow the intelligent home terminal equipment to access the special intelligent home networking through a mobile phone App and set an admission principle for the intelligent home networking, such as but not limited to a white list, a black list and the like.
And secondary access, namely after user authentication, establishing safe communication between the home gateway and the intelligent home terminal equipment, sending a real hidden intelligent home networking SSID account and a password to the intelligent home terminal equipment, and after receiving a notification, disconnecting the currently connected open WiFi network, accessing the real intelligent home private network, and completing networking.
The detailed flow steps of the smart home security networking method according to the present application are described in detail below with reference to the accompanying drawings.
Fig. 1 illustrates a schematic diagram of a smart home security networking method according to a specific embodiment of the present application.
As shown in fig. 1, the secure networking method includes a primary access and a secondary access.
When the intelligent home terminal is powered on, the wireless chip is in a promiscuous mode and can monitor all messages in the network. An intelligent terminal equipped with a management App, such as a mobile phone, needs to first acquire WiFi information of a home gateway and then encrypt an SSID and a password of the home gateway. And then the information is sent to the intelligent home terminal in a broadcasting or multicasting mode. And the intelligent home terminal receives and decrypts the SSID and the password of the home gateway and then is connected to the open SSID of the home gateway.
Then, the App acquires relevant information of the smart home terminal, such as, but not limited to, a device serial number, a MAC, and the like. And the user determines that the intelligent home terminal is allowed to be connected with the networking, and the gateway adds the intelligent terminal into a white list at the moment and allows the access of the hidden SSID. The wireless gateway sends the encrypted hidden SSID name and the encrypted password to the intelligent home terminal, the intelligent home terminal disconnects the currently connected open SSID network, then the intelligent home terminal connects the hidden SSID network and sends a message to inform that the configuration is successful. And finally, displaying the networking success state on the mobile phone App.
Fig. 2 illustrates a flowchart of a method for securely networking an intelligent home terminal according to an embodiment of the present application. As shown in fig. 2, the method mainly includes the following steps.
Step S1: powering on the home gateway and starting two SSIDs; one is an open SSID network, and the other is a hidden SSID network;
step S2: powering on the intelligent home terminal, and enabling the wireless module to enter a hybrid mode;
step S3: opening a mobile phone App, selecting an open SSID by a user, and inputting a password to connect with an open wireless network of a gateway;
step S4: encrypting the open SSID and the password, and broadcasting the encrypted SSID and the password to all intelligent home terminals;
step S5: the intelligent home terminal receives and decrypts the SSID and the password, and then is connected to the home gateway open type wireless network;
step S6: the intelligent home terminal broadcasts or unicasts a connection success message to the mobile phone;
step S7: the mobile phone App acquires information of the intelligent home terminal;
step S8: a user determines an intelligent terminal which is allowed to be accessed to an intelligent home networking on an App;
step S9: the gateway adds the allowed intelligent home terminal into a white list system hiding the SSID (namely the intelligent home network);
step S10: the gateway sends down the encrypted hidden SSID name and password;
step S11: the intelligent home terminal disconnects the current open SSID connection and then is connected with the hidden SSID wireless network;
step S12: and the intelligent home terminal reports the networking success message, and the networking is successful.
Fig. 3 shows a specific flow of the secondary access part of the smart home terminal security networking method according to fig. 1. The specific process comprises the following steps.
Step 1: establishing TCP connection between the home gateway and the intelligent home terminal;
step 2: negotiating and exchanging secret keys between the home gateway and the intelligent home terminal;
and step 3: the intelligent home terminal initiates a request for acquiring a wireless SSID name and a password to a home gateway;
and 4, step 4: the home gateway encrypts the request content and responds to the intelligent home terminal;
and 5: the intelligent home terminal acquires a response message, analyzes the account number and the password and returns a response;
step 6: the home gateway disconnects the TCP connection after acquiring the response;
and 7: the intelligent home terminal disconnects the currently connected open wireless network and is connected with the hidden intelligent home network;
and 8: after the intelligent home terminal is connected with the hidden network, a message is sent to inform that networking is successful.
Thus, unlike what is commonly used in the prior art, the present application innovatively uses a smart home security networking method and system for secondary access to a private WiFi network based on hidden SSIDs.
Specifically, the method and the device realize safe networking by using three modules of primary access, user authentication and secondary access.
The method and the device use a primary access mode, namely, the device information of the intelligent terminal is transmitted by using the open WiFi, and before the device is accessed into the home networking, user authentication is needed to determine whether the access is allowed.
According to the application, before the intelligent home terminal equipment is accessed into the intelligent home network, the private encryption communication is established by utilizing the public common internet WiFi channel to transmit the account number and the password of the intelligent home network, and the security is stronger. The encryption channel used in the secondary access process of the present application is not limited to a specific encryption and decryption method. Methods for encryption and decryption known in the art are within the scope of the present application.
The method comprises the steps that an intelligent home private network networking mode is designed, and the network only allows access through an authenticated intelligent home terminal; the network is a hidden SSID network, the network cannot send Beacon frame broadcast messages, and external equipment cannot sniff; the network is independent from a common household internet access channel, and the security and privacy are good.
In view of the above, the present application provides significant material features and significant advances over the prior art in the field.
First, this application uses the second grade to insert the mode and carries out intelligent house network deployment, and this structural design is novel, is showing to be different from the access mode among the prior art. Moreover, the multiple access mode can provide multi-step security protection.
Secondly, the method and the device comprise multiple encryption operations, so that the leakage of the intelligent home network account number and the password in the networking process is avoided. And in the secondary access process, the encrypted SSID name and the encrypted password are transmitted through the unicast stream in a security negotiation mode, so that the security of the SSID name and the encrypted password is further guaranteed.
Third, the special WiFi with the hidden SSID name serves as the WiFi of the intelligent home networking, and the independent equipment is limited to be accessed into the special WiFi in the modes of white list limitation, user authentication and the like, so that the safety of the intelligent home networking is guaranteed, and the data safety of the intelligent home can be fully guaranteed.
It is to be understood that the specific order or hierarchy of steps in the methods disclosed is an illustration of exemplary processes. Based upon design preferences, it is understood that the specific order or hierarchy of steps in the methods or methodologies described herein may be rearranged. The accompanying method claims present elements of the various steps in a sample order, and are not meant to be limited to the specific order or hierarchy presented unless specifically recited herein.
The previous description is provided to enable any person skilled in the art to practice the various aspects described herein. Various modifications to these aspects will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other aspects. Thus, the claims are not intended to be limited to the aspects shown herein, but is to be accorded the full scope consistent with the language claims, wherein reference to an element in the singular is not intended to mean "one and only one" (unless specifically so stated) but rather "one or more". The term "some" means one or more unless specifically stated otherwise. A phrase referring to "at least one of a list of items refers to any combination of those items, including a single member. By way of example, "at least one of a, b, or c" is intended to encompass: at least one a; at least one b; at least one c; at least one a and at least one b; at least one a and at least one c; at least one b and at least one c; and at least one a, at least one b, and at least one c. All structural and functional equivalents to the elements of the various aspects described throughout this disclosure that are known or later come to be known to those of ordinary skill in the art are expressly incorporated herein by reference and are intended to be encompassed by the claims. Moreover, nothing disclosed herein is intended to be dedicated to the public regardless of whether such disclosure is explicitly recited in the claims.

Claims (10)

1. A method for secure networking of smart home terminal devices, the method comprising:
the primary access of the mobile phone, the gateway and the intelligent household terminal equipment is realized;
user authentication; and
the secondary access of the gateway and the intelligent household terminal equipment,
wherein the primary access is for accessing an open wireless network and the secondary access is for accessing a hidden wireless network.
2. The method of claim 1, wherein a management App on the handset, the gateway, and the smart home terminal device conduct preliminary communication negotiation over the open wireless network to transmit information about the smart home terminal device.
3. The method of claim 1, wherein the primary access comprises the steps of:
s1: the gateway is powered on to open the open wireless network and the hidden wireless network;
s2: the intelligent household terminal equipment is powered on to enable a wireless module of the intelligent household terminal equipment to enter a promiscuous mode;
s3: selecting and connecting the open wireless network through the management App;
s4: encrypting the SSID and the password of the open wireless network, and broadcasting the SSID and the password to all intelligent home terminal equipment;
s5: the intelligent home terminal equipment receives and decrypts the SSID and the password of the open wireless network and is connected to the open wireless network;
s6: and the intelligent home terminal equipment sends a connection success message to the mobile phone.
4. The method of claim 1, wherein the user authentication comprises setting admission rules for secure networking of the smart home terminal device.
5. The method of claim 4, wherein the admission principle comprises: and after the primary access is finished, determining whether the intelligent household terminal equipment is allowed to access the hidden wireless network.
6. The method of claim 1, wherein the user authentication comprises the steps of:
s7: acquiring information of the intelligent home terminal equipment;
s8: determining that the intelligent home terminal equipment is allowed to be accessed into the intelligent home networking;
s9: and the gateway adds the intelligent household terminal equipment into a white list of the hidden wireless network.
7. The method of claim 1, wherein the secondary access comprises:
s10: the gateway sends the encrypted SSID and password of the hidden wireless network to the intelligent home terminal equipment;
s11: the intelligent home terminal equipment disconnects the open wireless network and is connected to the hidden wireless network;
s12: and the intelligent household terminal equipment reports a networking success message.
8. The method of claim 7, wherein the secondary access issues the encrypted SSID and password using a secure negotiation via a unicast stream.
9. A system for secure networking of smart home terminal devices, the system comprising:
the first-level access module is used for primary negotiation between the mobile phone, the gateway and the intelligent household terminal equipment;
a user authentication module; and
a secondary access module for the safe networking of the gateway and the intelligent household terminal equipment,
the primary access module is used for accessing an open wireless network, and the secondary access module is accessed to a hidden wireless network.
10. The system of claim 9, wherein the primary negotiation is used to transmit information about the smart home terminal device, the user authentication module is used to set admission rules for secure networking of the smart home terminal device, and the secondary access module uses the secure negotiation to issue an encrypted SSID and password about a hidden wireless network to the smart home terminal device via a unicast stream.
CN202110209281.1A 2021-02-24 2021-02-24 Method and system for safe networking of intelligent household terminal equipment Pending CN113873506A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110209281.1A CN113873506A (en) 2021-02-24 2021-02-24 Method and system for safe networking of intelligent household terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110209281.1A CN113873506A (en) 2021-02-24 2021-02-24 Method and system for safe networking of intelligent household terminal equipment

Publications (1)

Publication Number Publication Date
CN113873506A true CN113873506A (en) 2021-12-31

Family

ID=78989825

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110209281.1A Pending CN113873506A (en) 2021-02-24 2021-02-24 Method and system for safe networking of intelligent household terminal equipment

Country Status (1)

Country Link
CN (1) CN113873506A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150139025A1 (en) * 2013-11-15 2015-05-21 Universal Global Scientific Industrial Co., Ltd. Wireless Network Configuration Method and System for Smart Appliance
US20150327052A1 (en) * 2014-05-08 2015-11-12 Benu Networks, Inc. Techniques for Managing Network Access
CN107182053A (en) * 2017-06-08 2017-09-19 上海掌门科技有限公司 A kind of method and apparatus for being used to connect hiding WAP
CN107969003A (en) * 2017-10-31 2018-04-27 上海连尚网络科技有限公司 A kind of wireless access authentication method
CN111132135A (en) * 2019-11-11 2020-05-08 上海思笛恩网络科技有限公司 Wireless network distribution method and system for intelligent household terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150139025A1 (en) * 2013-11-15 2015-05-21 Universal Global Scientific Industrial Co., Ltd. Wireless Network Configuration Method and System for Smart Appliance
US20150327052A1 (en) * 2014-05-08 2015-11-12 Benu Networks, Inc. Techniques for Managing Network Access
CN107182053A (en) * 2017-06-08 2017-09-19 上海掌门科技有限公司 A kind of method and apparatus for being used to connect hiding WAP
CN107969003A (en) * 2017-10-31 2018-04-27 上海连尚网络科技有限公司 A kind of wireless access authentication method
CN111132135A (en) * 2019-11-11 2020-05-08 上海思笛恩网络科技有限公司 Wireless network distribution method and system for intelligent household terminal

Similar Documents

Publication Publication Date Title
EP1787429B1 (en) Device and process for wireless local area network association
US9479935B2 (en) Configurator forced client network rejoining
CN105577680B (en) Key generation method, encrypted data analysis method, device and key management center
US8208455B2 (en) Method and system for transporting configuration protocol messages across a distribution system (DS) in a wireless local area network (WLAN)
US7860485B2 (en) Device and process for wireless local area network association and corresponding products
US8126145B1 (en) Enhanced association for access points
US20060094401A1 (en) Method and apparatus for authentication of mobile devices
CN109413627A (en) A kind of smart home device matches network method and distribution network systems
EP2469753A1 (en) Method, device and network system for negotiating encryption information
WO2005101727A1 (en) Communication device, communication system, and authentication method
CN103581901A (en) Method and device for processing Wi-Fi wireless network access configuration information
CN101765057B (en) Method, equipment and system for providing multicast service to WiFi access terminal
US20130159706A1 (en) Secret communication method and system between neighboring user terminals, terminal, switching equipment
WO2015100974A1 (en) Terminal authentication method, device and system
CN108834137A (en) A kind of distribution method and system of wireless router
CN108601093B (en) Wireless communication method and system
CN109768861A (en) Massive D2D anonymous discovery authentication and key agreement method
CN108834138A (en) A kind of distribution method and system based on voice print database
US20080137553A1 (en) Method of automatic certification and secure configuration of a wlan system and transmission device thereof
CN110943835A (en) Distribution network encryption method and system for sending wireless local area network information
US20110314136A1 (en) Method and System for Improved Communication Network Setup
CN108449758A (en) A kind of binding method and system of Intelligent hardware
CN114615688B (en) Close-distance automatic configuration method between WiFi hotspot device and current access device
CN109565298A (en) The connection method and PLC device of PLC device
CN113873506A (en) Method and system for safe networking of intelligent household terminal equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20220129

Address after: Room 1423, No. 1256 and 1258, Wanrong Road, Jing'an District, Shanghai 200072

Applicant after: Tianyi Digital Life Technology Co.,Ltd.

Address before: 201702 3rd floor, 158 Shuanglian Road, Qingpu District, Shanghai

Applicant before: Tianyi Smart Family Technology Co.,Ltd.