TWI331464B - - Google Patents
Download PDFInfo
- Publication number
- TWI331464B TWI331464B TW96116411A TW96116411A TWI331464B TW I331464 B TWI331464 B TW I331464B TW 96116411 A TW96116411 A TW 96116411A TW 96116411 A TW96116411 A TW 96116411A TW I331464 B TWI331464 B TW I331464B
- Authority
- TW
- Taiwan
- Prior art keywords
- wireless network
- access point
- network device
- network access
- request
- Prior art date
Links
Landscapes
- Mobile Radio Communication Systems (AREA)
- Small-Scale Networks (AREA)
Description
1331464 九、發明說明: 【發明所屬之技術領域】 本發明係關於一種無線網路系統認證 ^ 々去,尤指一種 餡在一定時間内確保至少一無線網 ^ ^ ^ 點與複數無線網 路裝置元成身份認證之認證方法。 【先前技術】 一般無線網路裝置會設置不同s V Service Set1331464 IX. Description of the invention: [Technical field of the invention] The present invention relates to a wireless network system authentication, in particular to a filling that ensures at least one wireless network and a plurality of wireless network devices within a certain period of time. Yuancheng identity authentication method. [Prior Art] General wireless network devices will set different s V Service Sets
Identifier)碼,以供進入不同網路,Identifier) code for accessing different networks,
^ 入有设定相同SSID 碼的電腦才能互相通信,而同—礙商所推出的無線路由器 或無線網路存取點(Access p〇int; Ap)都會先於其中内 建相同的ssm,1未有加密功能,因此一旦企圖非法連 接的攻擊者利用通用的初始化字符串來連接無線網路,即 能建立起-條非法的連接,讓網路安全受到威脅。 又,由於無線網路存取,點(Access p〇int; Ap)會將 其ssm碼廣播出來,因此欲防止非法連接的攻擊者汝取 ssm碼,使用者可以關閉^的廣播功能或者手動 具有不同的SSID碼。 目則条设热線網路最受到重視不外是無線網路的安全 性而由上述。兄明可知目前建立無線網路連線若要達到基 本的安全性設定,必項车仏π — t 土 ^ 須手動设定相關條件,因此有相關廠 商係推出不僅方便使用去% 便用者間早建立連線,更提供較安全的 無線網路。以 Buffa丨η ,. 推出的AOSS技術來說,係於盗線 網路存取點(ΑΡ)上今罢女 ^ 上叹置有一同步按鍵,使用者的無線網 1331464 路裝置欲與該無線網路存取點構成連線前,必須先進入使 用者介面(Llser Interface; UI)且經一道認證,其中在進 订認證程序時’❹者只要按下AP的同步按鍵,即可令 其無線網路裝置(如無線網卡)與該無線網路存取點完成 認證,以構成一加密的無線網路連線。惟,此—技 !仍有其使用上的缺點,由於AOSS技術在執行認證程序 時,當使用者按下無線網路存取點的同步按鍵後,會將原 本内建的SSID碼更換為Essm_A〇ss,而此一程序會長 達約二分鐘之久,直到支援AOSS無線網路裝置與該無線 網路存取點構成連線為止;&以,已完成連線的無線網路 裝置將因為無線網路存取點已將原SS|D改變,而造成傳 輸中斷。因此,若該無線網路存取點配合多媒體的產 用時,將造成多媒體產品使用者使用上相當不冑;因:, 雖然該AOSS技術提供方便且安全的無線網路但其認證 程序仍造成使用上的困擾。 a^ Computers with the same SSID code can communicate with each other, and the same wireless router or wireless network access point (Access p〇int; Ap) will have the same ssm built in. There is no encryption, so if an attacker who attempts to connect illegally uses a common initialization string to connect to the wireless network, it can establish an illegal connection and threaten network security. Moreover, due to wireless network access, the point (Access p〇int; Ap) will broadcast its ssm code. Therefore, in order to prevent an illegally connected attacker from taking the ssm code, the user can turn off the broadcast function of ^ or manually Different SSID codes. The hotline network is most valued because of the security of the wireless network. Brother Ming knows that if you want to establish a basic security setting for wireless network connection, you must manually set the relevant conditions. Therefore, there are related manufacturers that are not only convenient to use, but also use it. Establish a connection and provide a more secure wireless network. In the AOSS technology introduced by Buffa丨η,., it is linked to the pirate network access point (ΑΡ) on the smashing woman ^ sigh with a synchronization button, the user's wireless network 1331464 device wants to be with the wireless network Before the access point constitutes the connection, it must first enter the user interface (Llser Interface; UI) and be authenticated. In the process of ordering the authentication process, the user can press the AP's synchronization button to make the wireless network. The device (such as a wireless network card) and the wireless network access point complete the authentication to form an encrypted wireless network connection. However, this technology still has its shortcomings. Because the AOSS technology performs the authentication process, when the user presses the synchronization button of the wireless network access point, the original built-in SSID code is replaced with Essm_A. 〇ss, and this program will last for about two minutes until the AOSS wireless network device is connected to the wireless network access point; &, the completed wireless network device will be The wireless network access point has changed the original SS|D, causing the transmission to be interrupted. Therefore, if the wireless network access point cooperates with the production of multimedia, it will cause the user of the multimedia product to use it quite well; because: although the AOSS technology provides a convenient and secure wireless network, the authentication procedure still causes Trouble with use. a
【發明内容】 有鑑於上述現行設有點 認證缺失,本發明主要目的係提供一 之認證方法,能在—定時間内確保至 與複數無線網路裝置完成身份認證。 按連線功能之無線網路產品 種新的無線網路裝 少一無線網路存取 之 置 點 欲達上述目的所使用的主 係於一無線網路系統中被實現 有至少一無線網路裝置及至少 要技術手段係令該認證方法 之,其中該無線網路係包含 一無線網路存取點,其中該 1331464 認證方法係主要包含有: 由該無線網路裝置發送一含有廠別識別碼之探詢請求 予各無線網路存取點; 一各無線網路存取點接收到此一探詢請求時,會根據廠 別硪別碼決定是否發送一含有無線網路存取點之裝置名稱 的探詢回t,並經判斷後將此-探詢回覆回傳至該無線網 路裝置; 當無線網路裝置接收到此一探詢回覆時,會發送一含SUMMARY OF THE INVENTION In view of the above-mentioned lack of existing point-of-sale authentication, the main object of the present invention is to provide an authentication method capable of ensuring identity authentication with a plurality of wireless network devices within a certain period of time. Wireless network products with connection function, new wireless network, less wireless network access, and the main system used for the above purposes. At least one wireless network is implemented in a wireless network system. The device and at least the technical means for the authentication method, wherein the wireless network comprises a wireless network access point, wherein the 1331464 authentication method mainly comprises: transmitting, by the wireless network device, a site identification The code query request is sent to each wireless network access point; when each wireless network access point receives the inquiry request, it determines whether to send a device name including the wireless network access point according to the site identification code. The inquiry returns to t, and after the judgment, the replies are sent back to the wireless network device; when the wireless network device receives the inquiry reply, it sends a
有無線網路裝置之裝置名稱的同步探詢請求至該無線網路 存取點; 當無線網路存取點接收此一同步探詢請求時會等待 其p步按鍵按下後,再將其密鑰、丨p位址、分配給無線網 路裝置的丨P位址加以加密後’回應一同步探詢回覆; 热線網路裝置接收到此一同步探詢回覆時,對其解密 亚擷取其中的密鑰、無線網路存取點的丨P位址、該無線網 路裝置的IP位址,再轉換為另一無線網路加密模式(如 WPAPSK-AES加密模式);及 進行制式化的認證交握程序,以完成整個連線認證 序。 本發明係當使用者購得本發明的無線網路系統以架構 一安全加密之無線區域網路時,因為上述無線網路裝置在 與複數無線網路存取點進行連線認證程序期間雙方均會 同時取得彼此的丨P位址,是以,當完成連線認證程序後, 即能順利地進行資料交換連線,而不需要再浪費時間去取 1331464 得丨p位址。 【實施方式】 請參閱第-圖所示,係為實現本發明認證方 網路(1 0 )的系統之一,其包含有一且亡# ,、,、踝 3有 具有使用者介面(User I他「face;⑴)的第一、第二無線網路裝置(STA1 ) ( STA2) 以及至少一台無線網路存取點’於本實施例中係揭示第— 至弟N台無線網路存取點(Αρι〜Apn),又第— 線網路裝置(STA1 ) ( STA2、士 一 ·''、 )I STA2 )均内建有廠別識別碼、使 用者介面碼及裝置名稱,其中該裝置名㈣可㈣s/n石馬 的組合碼、MAC碼或使用者輸入的字串等。又,第一至第 N無線網路存取點(AP卜APn)勒建錢㈣別碼、裝 置名稱、丨P位址及密鑰’並均設置有一同步按鍵。 應用於上述系統架構的認證方法請進一步配合參閱第 二圖A、B所示,其包含有: 由第一無線網路裝晉f ς Τ Δ 1、& , 崎装置(STA1 )發出一搜尋無線網路上 所有第-至第N無線網路存取點(Ap卜Apn)的探詢請求 (〇be「equest),其係包含該第一無線網路裝置(STA1) 的廠別識別碼及含使用者介面碼(S1彳); 當第一至第N無線網路存取點(AP1〜APn)任一台接 收到此-探詢請求時,會操取其廠別識別碼並判斷是否為 可回设之薇⑺識別碼’若是則向第—無線網路裝置(w ) 發出含有其裝置名稱的探詢回覆(Pr〇be ) (S12); 第—無線網路裝置(STA1)即 ^ ^ J取仔目刖所有回霜夕 弟—至弟N無線網路存取點(Ap卜 覆之 -妻廿从 η)的裝置名稱,光 透過其使用者介面顯示之(S13),供使用者 並 台進行連線程序(S14) ; ^ ~ 當點選無線網路裝置(STA1)使用者介面的其 然線網路存取點f A p 1^ 仔取占(AP”而進灯連線認證程序時 無線網路裝置f S T A 1、合4 id $ 一 …/ )會進—步確料否曾與目前待連線 5忍4之第一無線網路存取點(Ap ^ Φ 疋成連線過έ登,亦gp, 可確認是否儲存有該第-無線網路存取點(AP1)的 (_),若有則進行制式化的認證交握程序(S15) 否,則進行以下步驟: ’右 第一無線網路裝置(STA1)係提示使用者按下待連線 認證第一無線網路存取點(AP1)的同步按鍵,即會顯示 A同步㈣,即可於使用者介面顯示「請按同步按 鍵」並同日彳發达一含有該第—無線網路裝I ( )之 參 裝置名㈣同步探詢請求(Syncp「0berequest) (S16); 此時待使用者於第-無線網路存取點(AP1)按下同 步按鍵後’該第-無線網路存取點(AP1)分配lp位址給 第-無線網路裝置(STA1),並回傳一含有密鑰、無線網 路裝置(STA1 )的IP位址、無線網路存取點(AP1 )的 位址的同步探詢回覆(Syncpr〇beresp〇nse),該同步探 詢回覆係經過AES加密後再對外發出(S1 7 );a synchronous inquiry request with the device name of the wireless network device to the wireless network access point; when the wireless network access point receives the synchronous inquiry request, it waits for the p-step button to be pressed, and then the key The 丨p address, the 丨P address assigned to the wireless network device is encrypted, and then responds to a synchronous inquiry reply; when the hot network device receives the synchronous inquiry reply, it decrypts the secret. The key, the 丨P address of the wireless network access point, the IP address of the wireless network device, and then converted to another wireless network encryption mode (such as WPAPSK-AES encryption mode); and the authentication of the standardization Hold the program to complete the entire connection authentication sequence. The present invention is when the user purchases the wireless network system of the present invention to construct a securely encrypted wireless local area network, because the wireless network device performs both the connection authentication process with the plurality of wireless network access points. At the same time, each other's 丨P address is obtained. Therefore, when the connection authentication procedure is completed, the data exchange connection can be smoothly performed without wasting time to obtain the 1331464 丨p address. [Embodiment] Please refer to the figure - shown as one of the systems for implementing the authenticator network (10) of the present invention, which includes a user interface (User I). His "face; (1)) first and second wireless network devices (STA1) (STA2) and at least one wireless network access point 'in this embodiment reveals the first - to the N wireless network Take the point (Αρι~Apn), and the first line network device (STA1) (STA2, 士一·'', ) I STA2) has built-in site identification code, user interface code and device name, where The device name (4) can be (4) s/n stone horse combination code, MAC code or user input string, etc. Also, the first to the Nth wireless network access point (AP AP) to build money (four) other code, device The name, 丨P address and key' are both set with a synchronization button. The authentication method applied to the above system architecture should be further referred to as shown in the second figure A and B, which includes: f ς Τ Δ 1, & , Saki device (STA1 ) sends out a search for all the first to Nth wireless network access points on the wireless network (Ap Apn) inquiry request (〇be "equest", which includes the site identification code of the first wireless network device (STA1) and the user interface code (S1彳); when the first to the Nth wireless network When any of the access points (AP1~APn) receives this inquiry request, it will operate its site identification code and determine whether it is a retrievable Wei (7) identification code. If yes, then to the first wireless network device ( w) Issue a polling reply (Pr〇be) containing its device name (S12); the first - wireless network device (STA1) is ^ ^ J to take care of all the back-fresh brothers - to the younger N wireless network access The device name of the point (Ap 之 之 - 廿 廿 η ,) is displayed through the user interface (S13) for the user to perform the connection procedure (S14); ^ ~ When selecting the wireless network device (STA1) The user interface's its own network access point f A p 1^ Take the (AP) and enter the light connection authentication procedure when the wireless network device f STA 1, 4 id $ a... / ) Will advance - step to determine whether it has been connected to the current wireless network access point 5 to be connected to the line (Ap ^ Φ 疋 连 连 , , , , , , , , , , , , , , , , , , , , (_) of the first wireless network access point (AP1), if any, the standard authentication handshake procedure (S15), otherwise, the following steps are performed: 'Right first wireless network device (STA1) Prompt the user to press the synchronization button of the first wireless network access point (AP1) to be authenticated, that is, A synchronization (4) will be displayed, and the user can display "please press the synchronization button" and develop the same day. Name of the device containing the first wireless network device I ( ) (4) synchronous inquiry request (Syncp "0berequest" (S16); at this time, after the user presses the synchronization button at the first wireless network access point (AP1) 'The first wireless network access point (AP1) allocates the lp address to the first wireless network device (STA1), and returns a key containing the IP address of the wireless network device (STA1), the wireless network a synchronous inquiry reply (Syncpr〇beresp〇nse) of the address of the access point (AP1), and the synchronous inquiry reply is sent out by AES encryption (S1 7);
當第-無線網路裝置(STA1)接收此一同步探詢回覆, 即可將該同步探詢回覆加以解密,並取出wpApsK_AESWhen the first wireless network device (STA1) receives the synchronous inquiry reply, the synchronous inquiry reply can be decrypted and the wpApsK_AES is taken out.
8 1331464 密鑰、無線網路裝置(STA1 )的IP位址、無線網路存取 點(A P1 )的| P位址; 第一無線網路裝置(STA1)將此一無線網路存取點的 MAC位址、SSID、WPAPSK-AES密鑰予以儲存後,再轉 換為WPAPSK-AES加密模式(S18); 進行制式化的認證交握程序(S1 9〜S24 )。 上述制式化的認證交握程序係先發出正常探詢請求 (Normal probe request)至該無線網路存取點(AP1) (519) ’ 若獲得探詢回覆(Normal probe response) (520) ,則再進行AES加密認證請求(⑽⑽引aes8 1331464 key, IP address of wireless network device (STA1), |P address of wireless network access point (A P1 ); first wireless network device (STA1) accesses this wireless network The MAC address of the point, the SSID, and the WPAPSK-AES key are stored, and then converted into the WPAPSK-AES encryption mode (S18); the standardized authentication handshake procedure (S1 9 to S24) is performed. The above-mentioned standard authentication handshake program first sends a normal probe request to the wireless network access point (AP1) (519) ' If a normal probe response (520) is obtained, then AES encryption authentication request ((10)(10) cited aes
request)( S21 )’若獲得AES加密認證回覆(N〇rma| AES response) (S22),最後再發出一連線請求(N〇rma丨 association request) (S23),若獲得無線網路存取點 的連線回覆(Normal association response) (S24), 即完成連線認程序。 又’上述第一無線網路裝置(STA1)與第一網路存取 "·•占(AP1)進行連線過程中,若第二無線網路裝置() 發送一探詢請求(Probe request)予第一無線網路存取點 (Ap1 ) ( S161 ),則第一無線網路存取點(Αρι )會發 出忙線訊息(Busy「esponse )予第二無線網路裝置 (STA2) (S162),第二無線網路裝£ (STA2)收到此 一忙線回覆時,該第二無線網路裝置(STA2 )會停止與第 一無線網路存取點(AP1)進行認證程序(S163)。” 由上述說明可知,當使用者購得本發明的無線網路系 1331464 統以架構一安全加密之無線 J哈、丄υ)時,因為上述盔 線網路裝置(STA1)在與複數無線網路存取點(Αρι〜Αρη·) ^丁連線認證料時,雙方均會㈣取得彼此的丨Ρ位址, 是以’當完成連線賴程序後,即能順利地進行資料傳輸, 因此本發明之連線認證程序係可快速完成之。Request)( S21 )' If an AES encrypted authentication reply (N〇rma| AES response) is obtained (S22), a connection request (N〇rma丨association request) is finally issued (S23), if wireless network access is obtained The normal association response (S24) completes the connection confirmation process. Further, in the process of connecting the first wireless network device (STA1) to the first network access "AP1, if the second wireless network device () sends a probe request (Probe request) To the first wireless network access point (Ap1) (S161), the first wireless network access point (Αρι) sends a busy message (Busy "esponse" to the second wireless network device (STA2) (S162) When the second wireless network device (STA2) receives the busy line reply, the second wireless network device (STA2) stops the authentication process with the first wireless network access point (AP1) (S163). It can be seen from the above description that when the user purchases the wireless network system 1331464 of the present invention to construct a secure encrypted wireless J, 丄υ, because the above-mentioned helmet network device (STA1) is in the plural Wireless network access point (Αρι~Αρη·) ^ When the connection is authenticated, both parties will (4) obtain each other's address, which is to enable smooth data transmission after completing the connection procedure. Therefore, the connection authentication program of the present invention can be completed quickly.
請參閱第三圖所示,係為本發明另-較佳實施例,係 主要_-非含使用者介面之第二無線網路裝置(sta2), 其包含有-確認按鍵,該第二無線網路裝置(sta2)係鱼 複數第-至第N無㈣路存取點(Ap卜Apn)構成—無線 網路(1 〇 a ),請配合參閱第四圖A、B所示,係為應 用於此一無線網路系統架構的認證方法: 由第二無線網路袈置(STA2)發出一搜尋無線網路上 所有無線網路存取點的探詢請求(Pr〇be,其係 包含有該無線網路裝置(STA2)的廠別識別碼及非含使用 者介面碼(S31 ); 當複數第一至第N無線網路存取點(AP1〜APn )任一 台接收到此-探詢請求時,會擷取其廠別識別碼以判斷是 否為可回覆之廠別識別碼,若是,則複數第—至第N無線 網路存取點(AP卜APn)會發出含有其裝置名稱的探詢回 覆(Probe response) (S32); 第二無線網路裝置(STA2)若僅獲得一台第一無線網 路存取點(AP1 )回覆時,即與該無線網路存取點(a…) 進仃連線認證,若無任何無線網路存取點回覆,則回到第 —步驟;又,若收到複數第—至第N無線網路存取點 10 1JJ1464 (A p 1 〜a p n)的探詢回覆,則依照無線訊號強度排序並依 序對有回覆的複數第一至第N無線網路存取點 (AP1〜APn)進行連線認證(S33); 當第二無線網路裝置(STA2)對其中一台第一無線網 ^存取點(api)進行連線㈣程料,網路Referring to the third embodiment, which is another preferred embodiment of the present invention, is a second wireless network device (sta2) mainly including a user interface, and includes a - confirmation button, the second wireless The network device (sta2) is a wireless network (1 〇a) composed of the first to the Nth (four) access points (Ap), please refer to the fourth figure A and B. An authentication method applied to the wireless network system architecture: a second wireless network device (STA2) sends an inquiry request for searching all wireless network access points on the wireless network (Pr〇be, which includes the The station identifier of the wireless network device (STA2) and the non-user interface code (S31); when any of the first to Nth wireless network access points (AP1~APn) receives this - the inquiry request At the same time, the site identification code is retrieved to determine whether it is a repeatable site identification code, and if so, the plurality of first to the Nth wireless network access points (APs, APn) will issue an inquiry containing the device name thereof. Probe response (S32); the second wireless network device (STA2) obtains only one first wireless network When the point (AP1) replies, it is connected to the wireless network access point (a...) for authentication. If there is no reply from any wireless network access point, it returns to the first step; The first to the Nth wireless network access point 10 1JJ1464 (A p 1 ~ apn) query reply, according to the wireless signal strength ordering and sequentially reply to the plurality of first to Nth wireless network access points ( AP1~APn) perform connection authentication (S33); when the second wireless network device (STA2) connects one of the first wireless network access points (api), the network
^置(STA2)會進—步確認是否曾與目前待連線認證之第 :無線網路存取點(AP1) %成連線認證,亦即,可確認 :否儲存有該第-無線網路存取點(AP1 )的㈣(key); 右有則進行制式化的認證交握程序(S34 );若否,則進 行以下步驟: 、 該第二無線網路裝置(STA2)送出一同步探詢請求 (syncproberequest) (S35),此時若由第—無線網路 存取點(AP1 )接收後,會自嗜闾 $目°豕问步探詢請求擷取出第二 無線網路裝置(STA2 )的裝置名魈饴 LL 士 氓置石柄後,此時,假設使用者 藉由判斷後決定按下第一盔结m 乐無線網路存取點(AP1 )的同步 按鍵,令該無線網路存取點(AP1、^Set (STA2) will step forward to confirm whether it has been connected with the current wireless connection access point (AP1)%, that is, it can be confirmed: No storage of the first wireless network (4) (key) of the access point (AP1); on the right, the authentication handshake procedure (S34) is performed; if not, the following steps are performed: The second wireless network device (STA2) sends a synchronization Query request (syncproberequest) (S35), at this time, if received by the first wireless network access point (AP1), the second wireless network device (STA2) is taken out from the user's request. After the device name 魈饴 LL 氓 石 石 石 , , , , 假设 假设 假设 假设 假设 假设 假设 假设 假设 假设 假设 假设 假设 假设 假设 假设 假设 假设 假设 假设 假设 假设 假设 假设 假设 假设 假设 假设 假设 假设 假设 假设 假设 假设Take point (AP1
仔取點(AP1)回覆第二無線網路裝 置(STA2 ) —個同步探詢回覆(s 復(Sync p「〇be response) (S36); —λ w 广'乙;霄;5 認請求(Confin 裝置(STA2 )按下確認按鍵後,發Pick up point (AP1) to reply to the second wireless network device (STA2) - a synchronous inquiry reply (s complex (Sync p "〇be response" (S36); - λ w wide 'B; 霄; 5 acknowledgment request (Confin After the device (STA2) presses the confirmation button, it sends
交赞送—確認請求(C request)予第一無線網路存取點(Api) (s3^ ; 當第一無線網路存取點(A p ι、> 該第一無線網 網路裝置(STA2 占(Ap1)接收到確認請求後 路存取點(A P1、pd a • ) P刀配丨P位址給第二無 Λ〇、,並回偉一冬女6 Α 有世鑰、第二無線網路 11 < ,ς. 1331464 置(STA2)的|p位址、無線網路存取點(Αρι )的丨p位 址的確認回覆(Confirm response) (S38),該確認回 覆係經過AES加密後再對外發出; 篇第一热線網路裝置(STA2)接收此一確認回覆,即 可將該確認回覆加以解密,並取出WPAPSK-AES密錄、 第二無線網路裝置(STA2 )的丨p位址、第一無線網路存 取點(AP1 )的ιρ位址(S39); 第一無線網路裝置(STA2 )將此一無線網路存取點的 MAC位址' SSID、WPAPSK-AES密鑰予以儲存後,再轉 換為WPAPSK-AES加密模式;及 進行制式化的認證交握程序(S40 ) ( S41 )。 上述所舉兩實施例均是一台無線網路裝置與一台無線 網路存取點進行連線認證的程序流程,請參閱第五圖所 示’係舉一以第一無線網路(1 〇 )為基礎系統架構的無 線網路(1 〇 b ),即新增一具有使用者介面的第三無線 網路裝置(STA3) ’而第一無線網路裝置(STA1)已與 第一無線網路存取點(AP1 )完成連線認證(S51 ),請 參閱第六圖A ' B所示: 第二無線網路较置(STA3)同樣先發出含有其裝置名 稱的探詢請求(Probe request)予複數第一至第N無線 網路存取點(AP1~APn) (S52); 當複數第一至第N無線網路存取點(AP1 ~APn )任一 台接收到此一探詢請求時’會操取其廠別識別碼以判斷是 否為可回覆之廠別識別碼,若是則分別發出含有其裝置名A request to send a C request to the first wireless network access point (Api) (s3^; when the first wireless network access point (A p ι, > the first wireless network device) (STA2 occupies (Ap1) after receiving the acknowledgment request, the access point (A P1, pd a • ) P 丨 丨 P address to the second innocent, and back to Weiyi winter female 6 Α have the world key, The second wireless network 11 <, ς. 1331464 sets the STA address of (STA2), and the confirmation response of the 丨p address of the wireless network access point (Αρι) (S38), the confirmation reply After being encrypted by AES, it is sent out; the first hotline network device (STA2) receives the confirmation reply, and then decrypts the confirmation reply, and takes out the WPAPSK-AES secret record and the second wireless network device ( STA2) 丨p address, first wireless network access point (AP1) ι ρ address (S39); first wireless network device (STA2) this wireless network access point MAC address ' After the SSID and WPAPSK-AES keys are stored, they are converted into the WPAPSK-AES encryption mode; and the standardized authentication handshake procedure (S40) (S41) is performed. It is a program flow for connecting a wireless network device to a wireless network access point. Please refer to the figure in Figure 5 for the first wireless network (1 〇) based system architecture. Wireless network (1 〇b), that is, a third wireless network device (STA3) having a user interface is added, and the first wireless network device (STA1) has been connected to the first wireless network access point ( AP1) Complete the connection authentication (S51), please refer to the figure A'B in the sixth figure: The second wireless network comparison (STA3) also first sends a probe request containing its device name to the first number to Nth wireless network access point (AP1~APn) (S52); when any of the plurality of first to Nth wireless network access points (AP1 ~ APn) receives this inquiry request, 'will operate it The factory identification code to determine whether it is a retrievable site identification code, and if so, the device name is included
12 13J1464 稱的探 5旬回覆(P「〇be response ) ( S53 ); 第三無線網路裝置(STA3)會將所有探詢回覆對應的 至弟~無線,網路存取點(AP卜APn)的裝置名稱顯示 、/、使用者介面上(S54) ’供使用者點選之; 當第一無線網路存取點(AP1)於使用者介面上被使 用者點選時(S55 ),該第三無線網路裝置(STA3 )會先 自仃確5忍疋否已儲存該第—無線網路存取點(納)之密 鑰。右有則直接與該無線網路存取點執行制式化的認證交 握程序(S65);反之,若無則執行以下步驟; 第三無、線網路裝置(STA3)係提示使转按下待連線 線網路存取點(AP1)的同步按鍵,即可於使用者 ”面·4不§f按同步按鍵」,並同時發出—含有第三益線 網路裝置(STA3)之裝置名稱的同步探詢請求(sync—pn;be request) ( S57 ); 此恰右使用者透過第一無線網路裝置(STA1 )之使 喿乍"面的確6忍杈式,向第一無線網路存取點(1 ) 發运同步裝置請求(Syncingdevjce叫獅)(㈣), 以瞭解目前第„益^ Agj w …、線‘用路存取點(AP1 )是否被其它無線 網路裝置要求進行連線; 由於第-無線網路存取點(Αρι)已被第三無線網路 裝置(STA3 )要求連線,故會發送一含有第三無線網路裝 置(STA3)之裝置名稱的同步裝置回覆(〜⑽η。_丨⑶ reSP〇nSe)予第—無線網路裝置(STA1) (S59) ·, 當第一無線網路裝置(STA1)接收到已認證第一無線 13 1331464 網路存取點(AP1 )傳送的同步裝置回覆(Syncing device response )時,會將第三無線網路裝置(STA3 )的裝置 名稱取出(S60 ),並顯示於使用者介面上,供使用者自 打判斷是否允許或拒絕第三無線網路裝置(STA3 )之連線 要求’右使用者選擇拒絕連線,則第一無線網路裝置 (STA1 )發出—拒絕裝置請求(Skip request)予已認證 第一無線網路存取點(AP1 ) ( S61 ),此時,該第一無 線網路存取點(AP1)會將第三無線網路裝置(STA3)之 MAC位址加以儲存(S62 ),永遠不回覆此一第三無線網 路裝置(ST A3 )的同步探詢請求;反之,若使用者允許已 認證第一無線網路存取點(AP1 )接收此一同步探詢請求 (S63),則第—無線網路裝置(STA1 )會發出一允許請 求(Grant request)至該已認證無線網路存取點(AP1 ); 當第一無線網路存取點(AP1 )接收到允許請求時, 該第一無線網路存取點(AP1)分配丨p位址給第三無線網 路裝置(STA3) ’並回傳一含有wpapsK-AES密鑰、第 三無線網路裝置(STA3 )的IP位址、無線網路存取點(AP1 ) 的丨P位址的同步探詢回覆(Sync pr〇be「esp〇nse),該 同步探詢回覆係經過AES加密後再對外發出(S64 ); 當第三無線網路裝置(STA3 )接收此一同步探詢回覆, 即可將同步捸3旬回覆加以解密,並取出wpApsK_AEs密 綠、第三無線網路裝置(STA3)的|p位址、卜無線網 路存取點(AP1 )的ιρ位址; 第-無線網路裝置(STA3 )將此第—無線網路存取點 14 1331464 一 (AP1 )的 MAC 位址、SSID、WPAPSK-AES 密鑰予以儲 ' 存後’再轉換為WPAPSK-AES加密模式(S65 ); 之後再進行制式化的認證交握程序,待完成後,此— 第一無線網路存取點(AP1 )即與第三無線網路裝置 (STA3)完成連線認證(S66) ( S67)。 由上述說明可知,本發明所採具有使用者介面之第— 無線網路裝置(STA1 )係進一步内建有同步裝置請求的安 全機制,即其使用者介面增加有一確認模式(G「am • m〇de );當無線網路裝置一旦曾與第一無線網路存取點 (AP1 )疋成連線認證程序後,使用者可透過使用者介面 • 之確5忍模式,向已認證的第一無線網路存取點(AP1 )發 出同γ扃置明求,令已認證之第一無線網路存取點(A p】) 接收後’且恰右新的笼二:&从咖m ______12 13J1464 called the 5th reply (P "〇be response" (S53); the third wireless network device (STA3) will respond to all the corresponding responders ~ wireless, network access point (AP AP) Device name display, /, user interface (S54) 'for user to click; when the first wireless network access point (AP1) is selected by the user on the user interface (S55), The third wireless network device (STA3) will automatically determine whether the key of the first wireless network access point (nano) has been stored. The right side directly executes the system with the wireless network access point. The authentication handshake procedure (S65); otherwise, if not, the following steps are performed; the third no-wire network device (STA3) prompts to press the synchronization of the network access point (AP1) to be connected. By pressing the button, the user can "synchronize the button" and simultaneously send a synchronous inquiry request (sync_pn; be request) containing the device name of the third line network device (STA3) ( S57); the right user passes the first wireless network device (STA1) to make the 喿乍" Line network access point (1) Ships the synchronization device request (Syncingdevjce called lion) ((4)) to know if the current access point (AP1) is the other wireless network. The device requires connection; since the first wireless network access point (Αρι) has been requested by the third wireless network device (STA3), a device name containing the third wireless network device (STA3) is sent. Synchronization device reply (~(10)η._丨(3) reSP〇nSe) to the first wireless network device (STA1) (S59), when the first wireless network device (STA1) receives the authenticated first wireless 13 1331464 network When the Syncing device response is transmitted by the access point (AP1), the device name of the third wireless network device (STA3) is taken out (S60) and displayed on the user interface for the user to play. Determining whether to allow or reject the connection request of the third wireless network device (STA3) 'The right user chooses to refuse the connection, then the first wireless network device (STA1) sends a - reject device request (Skip request) to the authenticated a wireless network access point (AP1) (S61), at this time, the first wireless network access point (AP1) stores the MAC address of the third wireless network device (STA3) (S62), and never replies to the third wireless network. a synchronous inquiry request of the device (ST A3 ); conversely, if the user allows the authenticated first wireless network access point (AP1) to receive the synchronous inquiry request (S63), the first wireless network device (STA1) Sending a Grant request to the authenticated wireless network access point (AP1); when the first wireless network access point (AP1) receives the permission request, the first wireless network access point ( AP1) assigns the 丨p address to the third wireless network device (STA3)' and returns an IP address containing the wpapsK-AES key, the third wireless network device (STA3), and the wireless network access point ( Synchronous polling reply of 丨P address of AP1) (Sync pr〇be "esp〇nse", the synchronous polling reply is sent out after AES encryption (S64); when the third wireless network device (STA3) receives this A synchronous inquiry reply, you can decrypt the synchronization 捸 3 回 reply, and take out wpApsK_AEs dense green, the first The |p address of the wireless network device (STA3), the address of the wireless network access point (AP1), and the first wireless network device (STA3), the first wireless network access point 14 1331464 (AP1) The MAC address, SSID, and WPAPSK-AES key are stored in 'Save' and then converted to WPAPSK-AES encryption mode (S65); then the standardized authentication handshake procedure is performed. The first wireless network access point (AP1) completes the connection authentication with the third wireless network device (STA3) (S66) (S67). As can be seen from the above description, the first wireless network device (STA1) having the user interface of the present invention further has a security mechanism for the synchronization device request, that is, the user interface is added with a confirmation mode (G "am m 〇de); once the wireless network device has been connected to the first wireless network access point (AP1), the user can pass the user interface to the authenticated A wireless network access point (AP1) issues the same gamma setting, so that the authenticated first wireless network access point (Ap) is received after the 'right and new cage 2: & m ______
此一同步裝置請求程序加 心思逆深的非合法之無線網路 存取點發出同步探詢請求時,經 以拒絕連線後,無線網路存取點 15 1331464 日後即能自行判斷拒絕此—不合法無線網路裳置之同步探 δ旬a青求’有效提向安全性。 上述的第三無線網路裝置係與第一無線網路裝置相 同,均設置有使用者介面,因此各無線網路裝置均能提供 使用者選擇欲連線認證的無線網路存取點,惟目前益線網 路裝置並非所有產品均設置t ' ' 一 」°又罝有便用者介面,因此若上述第 三無線網路裝置係採用非内建有使用者介面之產品則本 發明的此-無線網路裝置的連線認證流程係會加以改變, 以下以第四無線㈣裝置(STA4)稱之,由於其不具有使 用者介面’故增設有—確認按鍵,並以搜尋無線訊號強度 辨識週遭是否有無線網路存取點。請參閱第七圖所示,係 為另一無線網路(1 fj P、 Β 0 c) ’即新增一不具有使用者介面 的第四無線網路裝置(STA4),而第一無線網路裝置 (STA1)已與第—無線網路存取點(AP1)完成連線認證 S7〇),睛參閱第八圖A、B所示: 第四無線網路梦g / …、 、置(STA4)發出含有廠別識別碼及非 含使用者介面碼的禊 如為 S月求(Probe request) ( S71 );When the synchronization device requests the program to add a synchronous inquiry request to the non-legitimate wireless network access point, the wireless network access point 15 1331464 can judge the rejection after the connection is refused. The legal wireless network is set to be synchronized and explored. The third wireless network device is the same as the first wireless network device, and is provided with a user interface. Therefore, each wireless network device can provide a wireless network access point for the user to select the connection authentication. At present, not all products of the benefit network device are set to have a user interface, so if the third wireless network device is a product that does not have a user interface built in, the present invention - The connection authentication process of the wireless network device will be changed. The following is called the fourth wireless (four) device (STA4). Since it does not have a user interface, it is added with a confirmation button and is searched for the wireless signal strength. Is there a wireless network access point around? Referring to the seventh figure, it is another wireless network (1 fj P, Β 0 c) 'that is, adding a fourth wireless network device (STA4) without a user interface, and the first wireless network The road device (STA1) has completed the connection authentication with the first wireless network access point (AP1), and the eye is shown in Figure 8A and B: The fourth wireless network dream g / ..., , ( STA4) issue a factory identification code and a non-user interface code, such as a Probe request (S71);
當複數第一至坌MA 乐N無線網路存取點(api〜APn)的任 一接收到此一探詢+主出± ° μ水時,會擷取其廠別識別碼以判斷是 否為可回覆之麻 •巧識別碼’若是則無線網路存取點 (ΑΡ1〜ΑΡη )會路山a 出含有其裝置名稱的探詢回覆(p「〇be response ) ( S72 ) · 第四無線網路举罢γ。τ Λ β、 、置(STA4 )若僅獲得一台第一無線網 路存取點(AP1 ) 口覆% ’即與該第—無線網路存取點 16 (A P1 )進行連線認證,若益杯h纪说力 …、任何無線網路存取點回覆時, 則回到弟—步驟(S71 );又,芒妆5丨丨$私 έ, ^ 右收到複數第一至第Ν無 …:存取點(終Αρη) ’則依照無線訊號強度排序並 \ = Ρ至第Ν無線網路存取點(ΑΡ卜ΑΡη)進行連 綠έ忍證(S 7 3 ); 當第四無線網路裝置(STA4)㈣—無線網路存取點 pi)進行連線認證時(S74),會先確認是否曾餘存 此一無線網路存取點(AP1)之㈣,若冑,則直接進行 制式化連線認證程序(S75);反之,則執行以下步驟; 第四無線網路裝置(STA4)直接發出—含有第四無線 網路裝置(STA4 )之裝置名稱的同步探詢請求(Sync pr〇be request) (S76); 此%若使用者透過第一無線網路裝置(STAι )之使 者紅作;I面的確§忍模式,向第一無線網路存取點(】) 七送同步扁置凊求(Syncjng device「叫^㈣)(S77), 以瞭解目前第—無'線網路存取點(AP1) {否被其它無線 網路裝置要求進行連線; 由於第一無線網路存取點(Ap彳)已被第四無線網路 裝置(STA4 )要求連線,故會發送—含有第四無線網路裝 置(STA4)之裝置名稱的同步裝置回覆(已乂加丨叫device response)予第一無線網路裝置(STA1) (S78); 當第一無線網路裝置(STA1 )接收到已認證第一無線 ’洞路存取(AP1)傳送的同步裝置回覆(Syncingdevjce response )’則會將第四無線網路裝置(sTA4 )的裝置When any of the first to 坌MA 乐 N wireless network access points (api~APn) receives this inquiry + the main output ± ° μ water, it will retrieve its site identification code to determine whether it is OK Reply to the •····································································································· Γγ.τ Λ β, 、 (STA4) if only one first wireless network access point (AP1) is overwritten, ie, it is connected with the first wireless network access point 16 (A P1 ) Line certification, if the benefit of the cup h Ji Li ..., any wireless network access point reply, then return to the brother - step (S71); again, Mang makeup 5 丨丨 $ private, ^ right received the first Until the third no...: access point (final Α η) ' then sort according to the wireless signal strength and \ = Ρ to the third wireless network access point (ΑΡ卜ΑΡη) for the green έ έ (S 7 3); When the fourth wireless network device (STA4) (four) - wireless network access point pi) performs connection authentication (S74), it is first confirmed whether the wireless network access point (AP1) has been saved (4) If 胄, the standardization connection authentication procedure is directly performed (S75); otherwise, the following steps are performed; the fourth wireless network device (STA4) directly issues the synchronization of the device name containing the fourth wireless network device (STA4) Sync pr〇be request (S76); If the user passes through the messenger of the first wireless network device (STAι); the I side is indeed the mode of the forbearance to the first wireless network access point ( 】) Seven-synchronous flat request (Syncjng device "called ^ (four)) (S77), to understand the current first - no 'line access point (AP1) {No connection required by other wireless network devices; Since the first wireless network access point (Ap彳) has been requested to be connected by the fourth wireless network device (STA4), a synchronization device reply containing the device name of the fourth wireless network device (STA4) is transmitted ( The device response is added to the first wireless network device (STA1) (S78); when the first wireless network device (STA1) receives the synchronization of the authenticated first wireless 'hole access (AP1) transmission Device reply (Syncingdevjce response)' will be the fourth wireless network Device of device (sTA4)
17 1331464 (STA1 )的使用者介面17 1331464 (STA1) user interface
request)予已認證無線網路存取點(AP1) (S8〇),而 名稱顯示予第一無線網路裝置 (S79), 用者選擇 會將第四無線網路裝置 (S81 ) ’永遠不回覆此 的同步探詢請求;反之,若 取點(AP1 )接收此一同步 此一無線網路存取點(AP1 )會 (STA4 )之MAC位址加以储存( 一第四無線網路裝置(STA4 )的同 使用者允5午已遇證無線網路存取點 • 探詢請求’則會發出一允許請求(Grant「eqUest)至該認Request) to the authenticated wireless network access point (AP1) (S8〇), and the name is displayed to the first wireless network device (S79), and the user selects the fourth wireless network device (S81) to never Replying to this synchronous inquiry request; otherwise, if the point (AP1) receives the synchronization, the wireless network access point (AP1) will store the MAC address of (STA4) (a fourth wireless network device (STA4) ) The same user allowed the wireless network access point to be authenticated at 5 noon • The inquiry request will issue an allow request (Grant "eqUest" to the recognition
當無線網路存取點(AP1)接收到允許請求時’將傳 送同步探詢回覆(syncproberesponse)至第四無線網路 裝置(STA4) ( S83); 當第四無線網路裝置(STA4)收到此一同步探詢回覆 時,等待使用者於第四無線網路裝置(STA4 )按下確認按 鍵;當確認按鍵被按下時,該第四無線網路裝置(STA4 ) 會送出一確認請求(Confirm request) ( S84 ); 當第一無線網路存取點(AP1 )接收到確認請求時, 該第一無線網路存取點(AP1)分配丨p位址給第四無線網 路裝置(STA4),並回傳一含有密錄、第四無線網路裝置 (STA4 )的| P位址、無線網路存取點(Ap彳)的丨p位址 的確5忍回覆(Confirm response),該確認回覆係經過Aes 加密後再對外發出(S 8 5 ); 當第四無線網路裝置(STA4 )接收此一確認回覆,即 18 1331464 可將該確認回覆加以解密,並取出VVPAPSK-AES密鑰 第四無線網路裝置(STA4)的丨P位址、無線網路存 (AP1 )的丨p位址; 第四無線網路裝置(STA4 )將此一無線網路存取點 (AP1 )的MAC位址、SSID、WPAPSK-AES密鑰予以儲 存後’再轉換為WpApSK_AES加密模式(S86); 進行制式化的認證交握程序(S87) (S88)。 由於第四無線網路裝置係於首次發出探詢請求時,該 探詢請求已包含有指示其係無使用者介面的識別碼因此 配&採用非具使用者介面的無線網路裝置的無線網路存取 點’係進一步増加上述判斷及回應確認回覆之機制,即加 密認證程序係在第四無線網路裝置發出確認回覆後才開始 進灯之·’是以,本發明配合不具有使用者介面之無線網路 裝置’則同樣可快速完成連線認證。 【圖式簡單說明】 第 圖·係本發明第一較佳實施例的無線網路系統架 構圖。 第一圖A、B :係本發明應用於第一圖系統架構的連 線認證方法時序流程圖。 第一圖:係本發明第二較佳實施例的無線網路系統架 構圖。 圖A、B :係本發明應用於第三圖系統架構的連 線認證方法時序流程圖。When the wireless network access point (AP1) receives the permission request, 'synchronous inquiry reply (syncproberesponse) is transmitted to the fourth wireless network device (STA4) (S83); when the fourth wireless network device (STA4) receives When the synchronous inquiry is replied, the user waits for the fourth wireless network device (STA4) to press the confirmation button; when the confirmation button is pressed, the fourth wireless network device (STA4) sends a confirmation request (Confirm) Request)) (S84); when the first wireless network access point (AP1) receives the confirmation request, the first wireless network access point (AP1) allocates the 丨p address to the fourth wireless network device (STA4) And returning a CM address containing the cipher, the fourth wireless network device (STA4), and the 网路p address of the wireless network access point (Ap彳), which is a confirm response, The confirmation reply is sent out after Aes encryption (S 8 5 ); when the fourth wireless network device (STA4) receives the confirmation reply, 18 1331464 can decrypt the confirmation reply and take out the VVPAPSK-AES key. The fourth wireless network device (STA4) 丨P address, wireless network丨p address of (AP1); The fourth wireless network device (STA4) stores the MAC address, SSID, WPAPSK-AES key of the wireless network access point (AP1) and then converts it to WpApSK_AES Encryption mode (S86); Perform a standardized authentication handshake procedure (S87) (S88). Since the fourth wireless network device sends the inquiry request for the first time, the inquiry request already includes an identification code indicating that it has no user interface, and therefore uses a wireless network with a non-user interface wireless network device. The access point is a mechanism for further adding the above judgment and responding to the confirmation reply, that is, the encryption authentication program starts to enter the light after the fourth wireless network device issues a confirmation reply. The wireless network device' can also quickly complete the connection authentication. BRIEF DESCRIPTION OF THE DRAWINGS Fig. 1 is a diagram showing the architecture of a wireless network system in accordance with a first preferred embodiment of the present invention. The first figure A, B is a timing chart of the connection authentication method applied to the system architecture of the first figure. First Figure: A block diagram of a wireless network system in accordance with a second preferred embodiment of the present invention. Figures A and B are timing charts of the connection authentication method applied to the system architecture of the third figure.
19 1331464 - 第五圖:係本發明第三較佳實施例的無線網路系統架 、 構圖。 第六圖A、B :係本發明應用於第五圖系統架構的連 線認證方法時序流程圖。 第七圖:係本發明第四較佳實施例的無線網路系統架 構圖。 第八圖A、B :係本發明應用於第七圖系統架構的連 線認證方法時序流程圖。 【主要元件符號說明】 (10) (10a) (l〇b) (l〇c)無線網路 2019 1331464 - FIG. 5 is a diagram showing the structure and composition of a wireless network system according to a third preferred embodiment of the present invention. The sixth figure A, B is a timing chart of the connection authentication method applied to the system architecture of the fifth figure. Figure 7 is a block diagram of a wireless network system in accordance with a fourth preferred embodiment of the present invention. The eighth figure A, B is a timing chart of the connection authentication method applied to the system architecture of the seventh figure. [Key component symbol description] (10) (10a) (l〇b) (l〇c) Wireless network 20
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW96116411A TW200845650A (en) | 2007-05-09 | 2007-05-09 | Authentication method in wireless network system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW96116411A TW200845650A (en) | 2007-05-09 | 2007-05-09 | Authentication method in wireless network system |
Publications (2)
Publication Number | Publication Date |
---|---|
TW200845650A TW200845650A (en) | 2008-11-16 |
TWI331464B true TWI331464B (en) | 2010-10-01 |
Family
ID=44822904
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW96116411A TW200845650A (en) | 2007-05-09 | 2007-05-09 | Authentication method in wireless network system |
Country Status (1)
Country | Link |
---|---|
TW (1) | TW200845650A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI426808B (en) * | 2011-02-18 | 2014-02-11 | Primax Electronics Ltd | Method of piaring a computer and wireless electronic devices |
TWI692228B (en) * | 2018-10-24 | 2020-04-21 | 啟碁科技股份有限公司 | Connection establishing system and method for mesh network |
US11032143B2 (en) | 2018-08-03 | 2021-06-08 | Netapp, Inc. | Assignment of network configuration for a wired network using a wireless network |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI424727B (en) * | 2009-08-27 | 2014-01-21 | Arcadyan Technology Corp | Method for network connection |
TWI462607B (en) * | 2011-06-02 | 2014-11-21 | Wistron Neweb Corp | Wireless communication method and system |
TWI478613B (en) * | 2011-09-26 | 2015-03-21 | Connection establishing management methods and related apparatuses |
-
2007
- 2007-05-09 TW TW96116411A patent/TW200845650A/en not_active IP Right Cessation
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI426808B (en) * | 2011-02-18 | 2014-02-11 | Primax Electronics Ltd | Method of piaring a computer and wireless electronic devices |
US11032143B2 (en) | 2018-08-03 | 2021-06-08 | Netapp, Inc. | Assignment of network configuration for a wired network using a wireless network |
US11611476B2 (en) | 2018-08-03 | 2023-03-21 | Netapp, Inc. | Assignment of network configuration for a wired network using a wireless network |
TWI692228B (en) * | 2018-10-24 | 2020-04-21 | 啟碁科技股份有限公司 | Connection establishing system and method for mesh network |
Also Published As
Publication number | Publication date |
---|---|
TW200845650A (en) | 2008-11-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2016201811A1 (en) | Identity authentication method, apparatus and system | |
US8589372B2 (en) | Method and system for automated document registration with cloud computing | |
RU2409853C2 (en) | Management of access control in wireless networks | |
JP5005674B2 (en) | Wireless local area network administration | |
TWI331464B (en) | ||
EP2745207B1 (en) | Apparatus and method for supporting family cloud in cloud computing system | |
US8341141B2 (en) | Method and system for automated document registration | |
EP2635993B1 (en) | Registration server, gateway apparatus and method for providing a secret value to devices | |
KR20220148934A (en) | Techniques for enabling computing devices to identify when they are in proximity to one another | |
CN102739643A (en) | Permitting access to a network | |
CN102739642A (en) | Permitting access to a network | |
JP2005102163A5 (en) | ||
US20140081932A1 (en) | Method and system for secure automated document registration from social media networks | |
JP2005323070A (en) | Authentication method for home information appliance by portable telephone | |
KR102098370B1 (en) | Car sharing service providing system based on social network service and method thereof | |
US20220006648A1 (en) | Contract apparatus and method of blockchain using digital contents orginal key | |
EP2874422B1 (en) | Simplified wi-fi setup | |
US20210105337A1 (en) | Profile information sharing | |
US20160234214A1 (en) | Establishing a Secure Connection between a Master Device and a Slave Device | |
JP4847483B2 (en) | Personal attribute information providing system and personal attribute information providing method | |
JP2004274359A (en) | Communication network system, communication terminal device, authenticating device, authentication server and electronic authentication method | |
CN101312397B (en) | Wireless network system authentication method | |
WO2019052153A1 (en) | Data access method and system | |
CN110505210B (en) | Intelligent household data asset safe transaction method and device based on block chain | |
US20110150222A1 (en) | Portable electronic device and associated method for making information available |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MM4A | Annulment or lapse of patent due to non-payment of fees |