US20220116775A1 - Method and system for automatic access to wi-fi network - Google Patents
Method and system for automatic access to wi-fi network Download PDFInfo
- Publication number
- US20220116775A1 US20220116775A1 US17/559,247 US202117559247A US2022116775A1 US 20220116775 A1 US20220116775 A1 US 20220116775A1 US 202117559247 A US202117559247 A US 202117559247A US 2022116775 A1 US2022116775 A1 US 2022116775A1
- Authority
- US
- United States
- Prior art keywords
- password
- mobile device
- sound information
- access point
- access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L25/00—Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00
- G10L25/48—Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00 specially adapted for particular use
- G10L25/51—Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00 specially adapted for particular use for comparison or discrimination
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/068—Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/61—Time-dependent
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/19—Connection re-establishment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/30—Connection release
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L25/00—Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00
- G10L25/03—Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00 characterised by the type of extracted parameters
- G10L25/18—Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00 characterised by the type of extracted parameters the extracted parameters being spectral information of each sub-band
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L25/00—Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00
- G10L25/48—Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00 specially adapted for particular use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
Definitions
- the subject matter herein generally relates to wireless security.
- a name and password must be given to the AP. Users need turn on the WI-FI function of their mobile device and scan for the local AP. To create the connection between mobile device and the AP, users need to choose the AP and key-in name and password. The process of connection can be more convenient for the user.
- Free WI-FI can be found in the bus stations, the restaurants, the convenience stores, etc.
- the user device can record the password after connecting to the AP.
- the mobile device can be connected to the AP automatically when the mobile device again enters the coverage of the wireless signal.
- wireless signal quality may be low when there are many devices connected to the AP, the Administrator of the AP may change the password frequently in such situations, to improve the signal quality and avoid non-customers using the AP.
- Such a system is inconvenient in management and in use.
- FIG. 1 illustrates a method for automatic access to WI-FI network according to an embodiment of the disclosure
- FIG. 2 illustrates a method for automatic access to WI-FI network in another embodiment of the disclosure
- FIG. 3 illustrates a method for automatic access to WI-FI network in block form, according to an embodiment of the disclosure
- FIG. 4 illustrates a block diagram of the WI-FI access point in a method for automatic access
- FIG. 5 illustrates a flow chart of a method for automatic access by a mobile device to a WI-FI network, according to an embodiment of the disclosure
- FIG. 6 illustrates a flow chart of a method for a WI-FI access point to automatically allow access according to an embodiment of the disclosure
- FIG. 7 illustrates a method for generating a password for automatic access to a WI-FI network according to an embodiment of the disclosure.
- Coupled is defined as connected, whether directly or indirectly through intervening components, and is not necessarily limited to physical connections.
- the connection can be such that the objects are permanently connected or releasably connected.
- comprising when utilized, means “including, but not necessarily limited to”; it specifically indicates open-ended inclusion or membership in the so-described combination, group, series, and the like.
- FIG. 1 illustrates a method for automatic access to WI-FI network according to an embodiment of the disclosure.
- the method and system of WI-FI network 100 comprises a mobile device 110 and a WI-FI access point (AP) 120 .
- the ambient noise around a WI-FI AP 120 (traffic noise for example, or the sound of people in a mall) is ambience sound information 130 .
- the ambience sound information 130 is recorded by a first microphone 121 of the WI-FI AP 120 and the second microphone 111 of the mobile device 110 .
- Wireless signal 101 of the WI-FI AP 120 has bigger coverage than that of the audible range of ambience sound information 130 .
- the mobile device 110 and the location of the WI-FI AP 120 are in the same environment and close together.
- the mobile device 110 and the WI-FI AP 120 receive the same ambience sound information 130 , which is unique to that locality.
- the ambience sound information 130 is converted into a password as an authentication of the mobile device 110 which is requesting a connection to the WI-FI AP 120 .
- FIG. 2 illustrates a method for automatic access to WI-FI network in another embodiment of the disclosure.
- the mobile device 110 is within the coverage of the wireless signal 101 of the WI-FI AP 120 , but the mobile device 110 is outside of the coverage of the ambience sound 102 .
- the ambience sound information 130 being received by the WI-FI AP 120 is not the same as the ambience sound information 130 being received by the mobile device 110 , therefore any password generated by one of them will not be the same as a password generated by the other of them, and wireless access will be refused.
- This manner of authorization limits wireless connections to a WI-FI AP 120 .
- the WI-FI AP 120 can regularly check the ambient sound being received by the mobile device 110 , to confirm the presence or absence of the mobile device 102 in the locality.
- the WI-FI AP 120 cannot grant the access request of the mobile device 102 if the mobile device 102 cannot obtain the password generated from the same ambience sound information 130 .
- This restriction on access controls the wireless network resources effectively, and reserves the resources of the wireless network to the local users.
- FIG. 3 illustrates a method for automatic access to WI-FI network in block form, according to an embodiment of the disclosure.
- the mobile device 110 comprises a first microphone 111 , a first processing unit 112 , and a first communicating unit 113 .
- the first microphone 111 constantly obtains ambience sound information 130 and can deliver the same to the first processing unit 112 .
- the first processing unit 112 can generate a first password according to a password-generating command received from the WI-FI AP 120 .
- the password-generating command includes start time and sampling frequency. When commanded, the processing unit 112 generates the first password.
- An accessing request is first transmitted to the WI-FI AP 120 by the first communicating unit 113 of the mobile device 110 .
- the password-generating command is transmitted to the first communication unit 113 of the mobile device 110 after the WI-FI AP 120 receives the accessing request from the device 110 .
- the first password which is generated by the first processing unit 112 can be transmitted to the WI-FI AP 120 by the first communicating unit 113 of the mobile device 110 .
- FIG. 4 illustrates a function block of the WI-FI access point of a method for automatic access to WI-FI network according to an embodiment of the disclosure.
- the WI-FI AP 120 comprises a second microphone 121 , a second processing unit 122 , and a second communicating unit 123 .
- the second microphone 121 obtains ambience sound information 130 and passes same to the processing unit 122 , for the generation of a second password.
- the WI-FI AP receives accessing request from device 110 through the second communicating unit 123 .
- the second communicating unit 123 will also receive the first password which is generated by the mobile device 110 .
- the second processing unit 122 obtains the accessing request and the first password from the device 110 through the second communicating unit 123 .
- the second processing unit 122 constantly obtains ambience sound information 130 by the second microphone. A start time and sampling frequency in the password-generating command is decided by the WI-FI AP 120 for the purpose of synchronizing same.
- the second processing unit 122 generates a second password, and the mobile device 110 can be permitted to access the WI-FI AP 120 if the first password of the mobile device 110 matches with the second password of the WI-FI AP 120 .
- the mobile device 110 is not permitted to access the WI-FI AP 120 if the first password of the mobile device 110 does not match with the second password of the WI-FI AP 120 .
- FIG. 5 illustrates a flow chart of a method for automatic access by a mobile device to a WI-FI network, according to an embodiment of the disclosure.
- the method includes the steps of the mobile device searching for an accessible WI-FI access point and transmitting an accessing request to a WI-FI AP which may be discovered (step S 501 ).
- the WI-FI AP transmits a password-generating command to the mobile device after receiving the accessing request. Therefore, after transmitting the accessing request the mobile device waits to receive the password-generating command which is transmitted from WI-FI AP (step S 502 ). After receiving the password-generating command, the mobile device executes the password-generating command (step S 503 ).
- the mobile device generates the first password according to the password-generating command (step S 504 ).
- the mobile device transmits the generated first password to the WI-FI AP (step S 505 ).
- the first password is authenticated by the WI-FI AP (step S 506 ).
- the mobile device retransmits the accessing request and repeats request when the first password does not pass the authentication.
- the number of retrying repetitions will be checked against a maximum number.
- the maximum number of retry repetitions times is defined by the users (step S 507 ).
- the processes for automatically accessing WI-FI network will be ended when the number of retries is more than the maximum number (step S 308 ).
- the mobile device can make retries by retransmitting the accessing request to WI-FI AP (return to step S 501 ) until the number of retries reaches the maximum number.
- the mobile device is permitted to access the WI-FI AP when the first password passes authentication.
- the mobile device is permitted to access the WI-FI AP for a certain permitted time (step S 509 ).
- the WI-FI AP can check and apply further authentication processes during and after the certain permitted time (step S 510 ).
- the first password will be invalid beyond the certain permitted time (step S 511 ).
- the mobile device can retransmit the accessing request to WI-FI AP (return to step S 501 ) if access by the mobile device to the WI-FI AP is cut off.
- FIG. 6 illustrates a flow chart of a method for a WI-FI access point to automatically allow access according to an embodiment of the disclosure.
- the WI-FI AP receives the accessing request from the mobile device (step S 601 ).
- the WI-FI AP transmits the password-generating command to the mobile device for asking the mobile device generates the first password (step S 602 ).
- the WI-FI AP generates the second password from the second sound information according to the password-generating command (step S 603 ).
- the WI-FI AP receives the first password from the mobile device (step S 604 ).
- the WI-FI AP checks the first password as same as the second password.
- the WI-FI AP waits for receiving the accessing request from the mobile device when the first password is not the same as the second password (return to step S 601 ).
- the mobile device and the WI-FI AP obtain the same sound information in the same space.
- the first password is the same as the second password because of the same sound information (step S 605 ).
- the mobile device is permitted to access the WI-FI AP when the first password is the same as the second password (step S 606 ).
- the mobile device is permitted to access the WI-FI AP for a valid time.
- the WI-FI AP checks the authentication of the first password over valid time or not (step S 607 ).
- the first password will be invalid over the valid time.
- the mobile device retransmits the accessing request to WI-FI AP (return to step S 501 ) when the mobile device can not access to the WI-FI AP (step S 608 ).
- FIG. 7 illustrates a schematic diagram of the password generating of a method for automatically access to WI-FI network according to an embodiment of the disclosure.
- the ambience sound information is directly used as the basis for the password generation.
- the ambience sound information is converted into audio characteristic.
- the password is generated according to the audio characteristic.
- the password-generating command includes the parameter of start time and the parameter of sampling frequency.
- the first sound information and the second sound information within a specified time are obtained according to the parameter of start time.
- the first sound information and the second sound information transfer to frequency signal of sound.
- the first processing unit obtains values of first sound information on N sampling points according to the sampling time and the parameter of sampling frequency, a first 1 st string is obtained by value of 1 st sampling point of the first sound information subtract value of initial sampling point of the first sound information, a first N th string is obtained by value of N th sampling point of the first sound information subtract value of N ⁇ 1 th sampling point of the first sound information (N is a positive integer greater than 0).
- the first password is generated by making CRC transformation with a first string which strings by the first 1 st string to the first N th string.
- the second processing unit obtains values of second sound information on N sampling points according to the sampling time and the parameter of sampling frequency, a second 1 st string is obtained by value of second 1 st sampling point of the second sound information subtract value of initial sampling point of the second sound information, a second N th string is obtained by value of second N th sampling point of the second sound information subtract value of second N ⁇ 1 th sampling point of the second sound information (N is a positive integer greater than 0).
- the second N th string is presented in the form of XYY.
- the second password is generated by making CRC transformation with a second string which strings by the second 1 st string to the second N th string.
- an initial sampling point 700 value is 80 dB
- a 1 st sampling point 701 value is 70 dB.
- the absolute value of the quotient is 3 when the 1 st sampling point 701 subtract the initial sampling point 700 divided by 3 (
- /3 3).
- the X of a 1 st string is set as 0
- the YY of the 1 st string is set as 03
- the 1 st string is 003.
- the absolute value of the quotient is 2 when a 2 nd sampling point 702 subtract the 1 st sampling point 701 divided by 3 (
- /3 2).
- the X of a 2 nd string is set as 0, the YY of the 2 nd string is set as 02, the 1 st string is 003.
- the absolute value of the quotient is 2 when a N th sampling point 704 subtract a N ⁇ 1 th sampling point 703 divided by 3 (
- /3 2).
- the X of a N th string is set as 1
- the YY of the N th string is set as 02
- the N th string is 102.
- the 1 st string to the N th string in the frequency signal of sound in FIG. 7 is 003 002 101 101 005 002 105 003 001 102.
- the system and method for automatically access the WI-FI network enable the WI-FI AP to obtain environmental sound information by the WI-FI AP or the microphone on the same network.
- the mobile device is permitted to access to the WI-FI AP according to the characteristics of sound information.
- the authentication of the mobile device to access the WI-FI AP is invalid when the mobile device leaves the environment.
- the disclosure does not use the sound information of the environment directly in order to avoid the influence caused by the different sound source distances.
- the disclosure obtains the characteristics of the sound information of the environment according to analysis the difference of the sampling frequency data.
- the disclosure not only provides a method for automatically access to the WI-FI AP, but also reserves the wireless resource to the most needed users.
Abstract
Description
- This application is a Continuation of pending U.S. patent application Ser. No. 16/363,729, filed on Mar. 25, 2019 and entitled “METHOD AND SYSTEM FOR AUTOMATIC ACCESS TO WI-FI NETWORK”, the entirety content of which is incorporated by reference herein.
- The subject matter herein generally relates to wireless security.
- To establish a connection between a WI-FI access point (AP) and a mobile device, a name and password must be given to the AP. Users need turn on the WI-FI function of their mobile device and scan for the local AP. To create the connection between mobile device and the AP, users need to choose the AP and key-in name and password. The process of connection can be more convenient for the user.
- Free WI-FI can be found in the bus stations, the restaurants, the convenience stores, etc. The user device can record the password after connecting to the AP. The mobile device can be connected to the AP automatically when the mobile device again enters the coverage of the wireless signal. However, wireless signal quality may be low when there are many devices connected to the AP, the Administrator of the AP may change the password frequently in such situations, to improve the signal quality and avoid non-customers using the AP. Such a system is inconvenient in management and in use.
- Many aspects of the present disclosure are better understood with reference to the following drawings. The components in the drawings are not necessarily drawn to scale, the emphasis instead being placed upon clearly illustrating the principles of the present disclosure. It will be appreciated that for simplicity and clarity of illustration, where appropriate, reference numerals have been repeated among the different figures to indicate corresponding or analogous elements.
-
FIG. 1 illustrates a method for automatic access to WI-FI network according to an embodiment of the disclosure; -
FIG. 2 illustrates a method for automatic access to WI-FI network in another embodiment of the disclosure; -
FIG. 3 illustrates a method for automatic access to WI-FI network in block form, according to an embodiment of the disclosure; -
FIG. 4 illustrates a block diagram of the WI-FI access point in a method for automatic access; -
FIG. 5 illustrates a flow chart of a method for automatic access by a mobile device to a WI-FI network, according to an embodiment of the disclosure; -
FIG. 6 illustrates a flow chart of a method for a WI-FI access point to automatically allow access according to an embodiment of the disclosure; -
FIG. 7 illustrates a method for generating a password for automatic access to a WI-FI network according to an embodiment of the disclosure. - It will be appreciated that for simplicity and clarity of illustration, where appropriate, reference numerals have been repeated among the different figures to indicate corresponding or analogous elements. In addition, numerous specific details are set forth in order to provide a thorough understanding of the embodiments described herein. However, it will be understood by those of ordinary skill in the art that the embodiments described herein can be practiced without these specific details. In other instances, methods, procedures, and components have not been described in detail so as not to obscure the related relevant feature being described. Also, the description is not to be considered as limiting the scope of the embodiments described herein. The drawings are not necessarily to scale and the proportions of certain parts have been exaggerated to better illustrate details and features of the present disclosure.
- The disclosure is illustrated by way of example and not by way of limitation in the figures of the accompanying drawings, in which like references indicate similar elements. It should be noted that references to “an” or “one” embodiment in this disclosure are not necessarily to the same embodiment, and such references mean “at least one”.
- The term “coupled” is defined as connected, whether directly or indirectly through intervening components, and is not necessarily limited to physical connections. The connection can be such that the objects are permanently connected or releasably connected. The term “comprising,” when utilized, means “including, but not necessarily limited to”; it specifically indicates open-ended inclusion or membership in the so-described combination, group, series, and the like.
-
FIG. 1 illustrates a method for automatic access to WI-FI network according to an embodiment of the disclosure. As shown inFIG. 1 , the method and system of WI-FI network 100 comprises amobile device 110 and a WI-FI access point (AP) 120. The ambient noise around a WI-FI AP 120 (traffic noise for example, or the sound of people in a mall) isambience sound information 130. Theambience sound information 130 is recorded by afirst microphone 121 of the WI-FI AP 120 and thesecond microphone 111 of themobile device 110.Wireless signal 101 of the WI-FI AP 120 has bigger coverage than that of the audible range ofambience sound information 130. Therefore, being located within such audible range means that themobile device 110 and the location of the WI-FIAP 120 are in the same environment and close together. Themobile device 110 and the WI-FI AP 120 receive the sameambience sound information 130, which is unique to that locality. Theambience sound information 130 is converted into a password as an authentication of themobile device 110 which is requesting a connection to the WI-FI AP 120. -
FIG. 2 illustrates a method for automatic access to WI-FI network in another embodiment of the disclosure. As shown inFIG. 2 , themobile device 110 is within the coverage of thewireless signal 101 of the WI-FI AP 120, but themobile device 110 is outside of the coverage of theambience sound 102. Theambience sound information 130 being received by the WI-FIAP 120 is not the same as theambience sound information 130 being received by themobile device 110, therefore any password generated by one of them will not be the same as a password generated by the other of them, and wireless access will be refused. This manner of authorization limits wireless connections to a WI-FI AP 120. The WI-FIAP 120 can regularly check the ambient sound being received by themobile device 110, to confirm the presence or absence of themobile device 102 in the locality. The WI-FIAP 120 cannot grant the access request of themobile device 102 if themobile device 102 cannot obtain the password generated from the sameambience sound information 130. This restriction on access controls the wireless network resources effectively, and reserves the resources of the wireless network to the local users. -
FIG. 3 illustrates a method for automatic access to WI-FI network in block form, according to an embodiment of the disclosure. As shown inFIG. 3 , themobile device 110 comprises afirst microphone 111, afirst processing unit 112, and a first communicatingunit 113. Thefirst microphone 111 constantly obtainsambience sound information 130 and can deliver the same to thefirst processing unit 112. Thefirst processing unit 112 can generate a first password according to a password-generating command received from the WI-FI AP 120. The password-generating command includes start time and sampling frequency. When commanded, theprocessing unit 112 generates the first password. - An accessing request is first transmitted to the WI-FI
AP 120 by the first communicatingunit 113 of themobile device 110. The password-generating command is transmitted to thefirst communication unit 113 of themobile device 110 after the WI-FI AP 120 receives the accessing request from thedevice 110. The first password which is generated by thefirst processing unit 112 can be transmitted to the WI-FIAP 120 by the first communicatingunit 113 of themobile device 110. -
FIG. 4 illustrates a function block of the WI-FI access point of a method for automatic access to WI-FI network according to an embodiment of the disclosure. As shown inFIG. 4 , the WI-FIAP 120 comprises asecond microphone 121, asecond processing unit 122, and a second communicatingunit 123. Thesecond microphone 121 obtainsambience sound information 130 and passes same to theprocessing unit 122, for the generation of a second password. The WI-FI AP receives accessing request fromdevice 110 through the second communicatingunit 123. The second communicatingunit 123 will also receive the first password which is generated by themobile device 110. Thesecond processing unit 122 obtains the accessing request and the first password from thedevice 110 through the second communicatingunit 123. Thesecond processing unit 122 constantly obtains ambiencesound information 130 by the second microphone. A start time and sampling frequency in the password-generating command is decided by the WI-FI AP 120 for the purpose of synchronizing same. Thesecond processing unit 122 generates a second password, and themobile device 110 can be permitted to access the WI-FI AP 120 if the first password of themobile device 110 matches with the second password of the WI-FI AP 120. Themobile device 110 is not permitted to access the WI-FI AP 120 if the first password of themobile device 110 does not match with the second password of the WI-FI AP 120. -
FIG. 5 illustrates a flow chart of a method for automatic access by a mobile device to a WI-FI network, according to an embodiment of the disclosure. As shown inFIG. 5 , the method includes the steps of the mobile device searching for an accessible WI-FI access point and transmitting an accessing request to a WI-FI AP which may be discovered (step S501). The WI-FI AP transmits a password-generating command to the mobile device after receiving the accessing request. Therefore, after transmitting the accessing request the mobile device waits to receive the password-generating command which is transmitted from WI-FI AP (step S502). After receiving the password-generating command, the mobile device executes the password-generating command (step S503). The mobile device generates the first password according to the password-generating command (step S504). The mobile device transmits the generated first password to the WI-FI AP (step S505). The first password is authenticated by the WI-FI AP (step S506). The mobile device retransmits the accessing request and repeats request when the first password does not pass the authentication. The number of retrying repetitions will be checked against a maximum number. The maximum number of retry repetitions times is defined by the users (step S507). The processes for automatically accessing WI-FI network will be ended when the number of retries is more than the maximum number (step S308). The mobile device can make retries by retransmitting the accessing request to WI-FI AP (return to step S501) until the number of retries reaches the maximum number. The mobile device is permitted to access the WI-FI AP when the first password passes authentication. The mobile device is permitted to access the WI-FI AP for a certain permitted time (step S509). The WI-FI AP can check and apply further authentication processes during and after the certain permitted time (step S510). The first password will be invalid beyond the certain permitted time (step S511). The mobile device can retransmit the accessing request to WI-FI AP (return to step S501) if access by the mobile device to the WI-FI AP is cut off. -
FIG. 6 illustrates a flow chart of a method for a WI-FI access point to automatically allow access according to an embodiment of the disclosure. As shown inFIG. 6 , the WI-FI AP receives the accessing request from the mobile device (step S601). The WI-FI AP transmits the password-generating command to the mobile device for asking the mobile device generates the first password (step S602). The WI-FI AP generates the second password from the second sound information according to the password-generating command (step S603). The WI-FI AP receives the first password from the mobile device (step S604). The WI-FI AP checks the first password as same as the second password. The WI-FI AP waits for receiving the accessing request from the mobile device when the first password is not the same as the second password (return to step S601). The mobile device and the WI-FI AP obtain the same sound information in the same space. The first password is the same as the second password because of the same sound information (step S605). The mobile device is permitted to access the WI-FI AP when the first password is the same as the second password (step S606). The mobile device is permitted to access the WI-FI AP for a valid time. The WI-FI AP checks the authentication of the first password over valid time or not (step S607). The first password will be invalid over the valid time. The mobile device retransmits the accessing request to WI-FI AP (return to step S501) when the mobile device can not access to the WI-FI AP (step S608). -
FIG. 7 illustrates a schematic diagram of the password generating of a method for automatically access to WI-FI network according to an embodiment of the disclosure. The ambience sound information is directly used as the basis for the password generation. In the embodiment, the ambience sound information is converted into audio characteristic. The password is generated according to the audio characteristic. The password-generating command includes the parameter of start time and the parameter of sampling frequency. The first sound information and the second sound information within a specified time are obtained according to the parameter of start time. The first sound information and the second sound information transfer to frequency signal of sound. - The first processing unit obtains values of first sound information on N sampling points according to the sampling time and the parameter of sampling frequency, a first 1st string is obtained by value of 1st sampling point of the first sound information subtract value of initial sampling point of the first sound information, a first Nth string is obtained by value of Nth sampling point of the first sound information subtract value of N−1th sampling point of the first sound information (N is a positive integer greater than 0). The first Nth string is presented in the form of XYY. X is set 1 when value of Nth sampling point of the first sound information subtract value of N−1th sampling point of the first sound information greater than 0 (set X=1 when (first Nth string−first N−1th string)≥0). X is set 0 when value of first Nth sampling point of the first sound information subtract value of first N−1th sampling point of the first sound information less than 0 (set X=0 when (first Nth string−first N−1th string)<0). YY is set as a quotient when value of first Nth sampling point of the first sound information subtract value of first N−1th sampling point of the first sound information divided by 3 (set YY=(first Nth string−first N−1th string)/3). The first password is generated by making CRC transformation with a first string which strings by the first 1st string to the first Nth string.
- The second processing unit obtains values of second sound information on N sampling points according to the sampling time and the parameter of sampling frequency, a second 1st string is obtained by value of second 1st sampling point of the second sound information subtract value of initial sampling point of the second sound information, a second Nth string is obtained by value of second Nth sampling point of the second sound information subtract value of second N−1th sampling point of the second sound information (N is a positive integer greater than 0). The second Nth string is presented in the form of XYY. X is set 1 when value of second Nth sampling point of the second sound information subtract value of second N−1th sampling point of the second sound information greater than 0 (set X=1 when (second Nth string−second N−1th string)≥0). X is set 0 when value of second Nth sampling point of the second sound information subtract value of second N−1th sampling point of the second sound information less than 0 (set X=0 when (second Nth string−second N−1th string)<0). YY is set as a quotient when value of second Nth sampling point of the second sound information subtract value of second N−1th sampling point of the second sound information divided by 3 (set YY=(second Nth string−second N−1th string)/3). The second password is generated by making CRC transformation with a second string which strings by the second 1st string to the second Nth string.
- As shown in
FIG. 7 as an example, an initial sampling point 700 value is 80 dB, a 1stsampling point 701 value is 70 dB. The absolute value of the quotient is 3 when the 1stsampling point 701 subtract the initial sampling point 700 divided by 3 (|(70 dB−80 dB)|/3=3). Thus the X of a 1st string is set as 0, the YY of the 1st string is set as 03, the 1st string is 003. The absolute value of the quotient is 2 when a 2ndsampling point 702 subtract the 1stsampling point 701 divided by 3 (|(64 dB−70 dB)|/3=2). Thus the X of a 2nd string is set as 0, the YY of the 2nd string is set as 02, the 1st string is 003. The absolute value of the quotient is 2 when a Nth sampling point 704 subtract a N−1thsampling point 703 divided by 3 (|(64 dB−57 dB)|/3=2). Thus the X of a Nth string is set as 1, the YY of the Nth string is set as 02, the Nth string is 102. Such as the above rules, the 1st string to the Nth string in the frequency signal of sound inFIG. 7 is 003 002 101 101 005 002 105 003 001 102. A password is 95fdec29 which is obtained by CRC transfer the string which strings by the 1st string to the Nth string. (CRC(003 002 101 101 005 002 105 003 001 102)=95fdec29) - The system and method for automatically access the WI-FI network according to an embodiment of the disclosure enable the WI-FI AP to obtain environmental sound information by the WI-FI AP or the microphone on the same network. The mobile device is permitted to access to the WI-FI AP according to the characteristics of sound information. The authentication of the mobile device to access the WI-FI AP is invalid when the mobile device leaves the environment. The disclosure does not use the sound information of the environment directly in order to avoid the influence caused by the different sound source distances. The disclosure obtains the characteristics of the sound information of the environment according to analysis the difference of the sampling frequency data. The disclosure not only provides a method for automatically access to the WI-FI AP, but also reserves the wireless resource to the most needed users.
- The embodiments shown and described above are only examples. Therefore, many such details of the art are neither shown nor described. Even though numerous characteristics and advantages of the present technology have been set forth in the foregoing description, together with details of the structure and function of the present disclosure, the disclosure is illustrative only, and changes may be made in the detail, especially in matters of shape, size, and arrangement of the parts within the principles of the present disclosure, up to and including the full extent established by the broad general meaning of the terms used in the claims. It will therefore be appreciated that the embodiments described above may be modified within the scope of the claims.
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17/559,247 US20220116775A1 (en) | 2019-03-25 | 2021-12-22 | Method and system for automatic access to wi-fi network |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/363,729 US11284256B2 (en) | 2019-03-25 | 2019-03-25 | Method and system for automatic access to WI-FI network |
US17/559,247 US20220116775A1 (en) | 2019-03-25 | 2021-12-22 | Method and system for automatic access to wi-fi network |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/363,729 Continuation US11284256B2 (en) | 2019-03-25 | 2019-03-25 | Method and system for automatic access to WI-FI network |
Publications (1)
Publication Number | Publication Date |
---|---|
US20220116775A1 true US20220116775A1 (en) | 2022-04-14 |
Family
ID=72605393
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/363,729 Active 2040-09-25 US11284256B2 (en) | 2019-03-25 | 2019-03-25 | Method and system for automatic access to WI-FI network |
US17/559,247 Abandoned US20220116775A1 (en) | 2019-03-25 | 2021-12-22 | Method and system for automatic access to wi-fi network |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/363,729 Active 2040-09-25 US11284256B2 (en) | 2019-03-25 | 2019-03-25 | Method and system for automatic access to WI-FI network |
Country Status (3)
Country | Link |
---|---|
US (2) | US11284256B2 (en) |
CN (1) | CN111741460A (en) |
TW (1) | TW202037196A (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113316128B (en) * | 2020-02-26 | 2022-04-05 | 杭州海康威视数字技术股份有限公司 | Screen projection method, receiving terminal equipment and sending terminal equipment |
US20230140517A1 (en) * | 2021-10-28 | 2023-05-04 | Arris Enterprises Llc | Access-point passphrase identification using key matching |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100110837A1 (en) * | 2008-10-31 | 2010-05-06 | Samsung Electronics Co., Ltd. | Method and apparatus for wireless communication using an acoustic signal |
JP2011205194A (en) * | 2010-03-24 | 2011-10-13 | Nec Corp | Radio communication system, radio communication method, program, and recording medium |
US20130308506A1 (en) * | 2012-05-18 | 2013-11-21 | Qualcomm Incorporated | Automatic device-to-device connection control by environmental information |
US20140129231A1 (en) * | 2012-11-02 | 2014-05-08 | International Business Machines Corporation | Authentication based on sound proximity |
CN106792661A (en) * | 2016-04-29 | 2017-05-31 | 新华三技术有限公司 | A kind of WLAN cut-in methods and device |
US20180270592A1 (en) * | 2017-03-16 | 2018-09-20 | Qualcomm Incorporated | Audio correlation selection scheme |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5729161B2 (en) * | 2010-09-27 | 2015-06-03 | ヤマハ株式会社 | Communication terminal, wireless device, and wireless communication system |
US8555047B2 (en) * | 2011-03-16 | 2013-10-08 | Rammohan Malasani | Wi-Fi router with integrated touch-screen and enhanced security features |
JP6182904B2 (en) * | 2013-02-28 | 2017-08-23 | ブラザー工業株式会社 | COMMUNICATION TERMINAL DEVICE, COMMUNICATION CONTROL METHOD, AND COMMUNICATION CONTROL PROGRAM |
US20140283136A1 (en) * | 2013-03-13 | 2014-09-18 | Optio Labs, Inc. | Systems and methods for securing and locating computing devices |
CN104869568B (en) * | 2014-02-26 | 2018-03-02 | 中国科学院软件研究所 | A kind of monitoring system collocation method and system based on audio |
CN103973453A (en) * | 2014-05-19 | 2014-08-06 | 中国联合网络通信集团有限公司 | Vocal print secret key generating method and device and logging-in method and system based on vocal print secret key |
KR102304979B1 (en) * | 2014-06-19 | 2021-09-27 | 삼성전자주식회사 | Electronic apparatus and method for pairing in electronic apparatus |
CN108737172A (en) * | 2018-05-11 | 2018-11-02 | 四川斐讯信息技术有限公司 | A kind of method and system of the automatic modification router Wi-Fi passwords based on intelligent sound box |
CN108718460B (en) * | 2018-06-19 | 2020-09-08 | 广东美的制冷设备有限公司 | Communication method and communication device of wireless local area network and intelligent electronic equipment |
-
2019
- 2019-03-25 US US16/363,729 patent/US11284256B2/en active Active
- 2019-03-29 TW TW108111427A patent/TW202037196A/en unknown
- 2019-04-18 CN CN201910314647.4A patent/CN111741460A/en active Pending
-
2021
- 2021-12-22 US US17/559,247 patent/US20220116775A1/en not_active Abandoned
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100110837A1 (en) * | 2008-10-31 | 2010-05-06 | Samsung Electronics Co., Ltd. | Method and apparatus for wireless communication using an acoustic signal |
JP2011205194A (en) * | 2010-03-24 | 2011-10-13 | Nec Corp | Radio communication system, radio communication method, program, and recording medium |
US20130308506A1 (en) * | 2012-05-18 | 2013-11-21 | Qualcomm Incorporated | Automatic device-to-device connection control by environmental information |
US20140129231A1 (en) * | 2012-11-02 | 2014-05-08 | International Business Machines Corporation | Authentication based on sound proximity |
US9082413B2 (en) * | 2012-11-02 | 2015-07-14 | International Business Machines Corporation | Electronic transaction authentication based on sound proximity |
CN106792661A (en) * | 2016-04-29 | 2017-05-31 | 新华三技术有限公司 | A kind of WLAN cut-in methods and device |
US20180270592A1 (en) * | 2017-03-16 | 2018-09-20 | Qualcomm Incorporated | Audio correlation selection scheme |
Non-Patent Citations (1)
Title |
---|
Somayeh Nikbakhsh; A Novel Approach for Rogue Access Point Detection on the Client-Side; IEEE: 2012; pages:684-687 * |
Also Published As
Publication number | Publication date |
---|---|
US11284256B2 (en) | 2022-03-22 |
CN111741460A (en) | 2020-10-02 |
TW202037196A (en) | 2020-10-01 |
US20200314649A1 (en) | 2020-10-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20220116775A1 (en) | Method and system for automatic access to wi-fi network | |
US7403794B2 (en) | Client terminal having a temporary connection establishing unit | |
CN105303659B (en) | A kind of gate inhibition's personal identification method and device based on ultrasonic wave | |
CN101754215B (en) | Authentication method and system | |
KR20160114620A (en) | Methods, devices and systems for dynamic network access administration | |
AU2002352285A1 (en) | Method and system for authenticating user of data transfer device | |
US20090045943A1 (en) | Authentication system and method thereof for wireless networks | |
US20190238639A1 (en) | Method and apparatus for utilzing nfc to establish a secure connection | |
US9386613B2 (en) | Wireless network system and connecting method thereof | |
US10750369B2 (en) | Method, apparatus, and platform for sharing wireless local area network | |
CN107172620B (en) | Wireless local area network authentication method and device | |
US20050048952A1 (en) | Method and apparatus for distribution of cipher code in wireless LAN | |
KR20020000961A (en) | A wireless authentication method using mobile telecommunication system | |
US20060068756A1 (en) | Mobile user authentication in connection with access to mobile services | |
KR102393500B1 (en) | Login system and authentication method | |
CN110933038B (en) | Conference implementation method, system, service platform and storage medium | |
US7814212B1 (en) | Data delivery system using local and remote communications | |
US20150244912A1 (en) | Camera system and operating method thereof | |
US20200021986A1 (en) | Method of connecting a network apparatus to wifi network and wifi speaker | |
CN107371160B (en) | Method and equipment for carrying out wireless connection pre-authorization on user equipment | |
US20050079859A1 (en) | System and method for remotely accessing a private database | |
CN106850925A (en) | The synchronous method of a kind of mobile unit and cellphone directory based on WiFi | |
KR20050025550A (en) | Mobile home network system | |
KR101941770B1 (en) | Authentication Method using portable device | |
KR101828684B1 (en) | Method for Automating Login Coupled with Medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: NANNING FUGUI PRECISION INDUSTRIAL CO., LTD., CHINA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:YEN, SHIH-JUNG;REEL/FRAME:058461/0358 Effective date: 20190325 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
AS | Assignment |
Owner name: NANNING FULIAN FUGUI PRECISION INDUSTRIAL CO., LTD., CHINA Free format text: CHANGE OF NAME;ASSIGNOR:NANNING FUGUI PRECISION INDUSTRIAL CO., LTD.;REEL/FRAME:058838/0720 Effective date: 20220105 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |