US20220116775A1 - Method and system for automatic access to wi-fi network - Google Patents

Method and system for automatic access to wi-fi network Download PDF

Info

Publication number
US20220116775A1
US20220116775A1 US17/559,247 US202117559247A US2022116775A1 US 20220116775 A1 US20220116775 A1 US 20220116775A1 US 202117559247 A US202117559247 A US 202117559247A US 2022116775 A1 US2022116775 A1 US 2022116775A1
Authority
US
United States
Prior art keywords
password
mobile device
sound information
access point
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US17/559,247
Inventor
Shih-Jung Yen
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanning Fulian Fugui Precision Industrial Co Ltd
Original Assignee
Nanning Fulian Fugui Precision Industrial Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanning Fulian Fugui Precision Industrial Co Ltd filed Critical Nanning Fulian Fugui Precision Industrial Co Ltd
Priority to US17/559,247 priority Critical patent/US20220116775A1/en
Assigned to NANNING FUGUI PRECISION INDUSTRIAL CO., LTD. reassignment NANNING FUGUI PRECISION INDUSTRIAL CO., LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: YEN, SHIH-JUNG
Assigned to NANNING FULIAN FUGUI PRECISION INDUSTRIAL CO., LTD. reassignment NANNING FULIAN FUGUI PRECISION INDUSTRIAL CO., LTD. CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: NANNING FUGUI PRECISION INDUSTRIAL CO., LTD.
Publication of US20220116775A1 publication Critical patent/US20220116775A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L25/00Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00
    • G10L25/48Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00 specially adapted for particular use
    • G10L25/51Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00 specially adapted for particular use for comparison or discrimination
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/61Time-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/19Connection re-establishment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/30Connection release
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L25/00Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00
    • G10L25/03Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00 characterised by the type of extracted parameters
    • G10L25/18Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00 characterised by the type of extracted parameters the extracted parameters being spectral information of each sub-band
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L25/00Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00
    • G10L25/48Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00 specially adapted for particular use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Definitions

  • the subject matter herein generally relates to wireless security.
  • a name and password must be given to the AP. Users need turn on the WI-FI function of their mobile device and scan for the local AP. To create the connection between mobile device and the AP, users need to choose the AP and key-in name and password. The process of connection can be more convenient for the user.
  • Free WI-FI can be found in the bus stations, the restaurants, the convenience stores, etc.
  • the user device can record the password after connecting to the AP.
  • the mobile device can be connected to the AP automatically when the mobile device again enters the coverage of the wireless signal.
  • wireless signal quality may be low when there are many devices connected to the AP, the Administrator of the AP may change the password frequently in such situations, to improve the signal quality and avoid non-customers using the AP.
  • Such a system is inconvenient in management and in use.
  • FIG. 1 illustrates a method for automatic access to WI-FI network according to an embodiment of the disclosure
  • FIG. 2 illustrates a method for automatic access to WI-FI network in another embodiment of the disclosure
  • FIG. 3 illustrates a method for automatic access to WI-FI network in block form, according to an embodiment of the disclosure
  • FIG. 4 illustrates a block diagram of the WI-FI access point in a method for automatic access
  • FIG. 5 illustrates a flow chart of a method for automatic access by a mobile device to a WI-FI network, according to an embodiment of the disclosure
  • FIG. 6 illustrates a flow chart of a method for a WI-FI access point to automatically allow access according to an embodiment of the disclosure
  • FIG. 7 illustrates a method for generating a password for automatic access to a WI-FI network according to an embodiment of the disclosure.
  • Coupled is defined as connected, whether directly or indirectly through intervening components, and is not necessarily limited to physical connections.
  • the connection can be such that the objects are permanently connected or releasably connected.
  • comprising when utilized, means “including, but not necessarily limited to”; it specifically indicates open-ended inclusion or membership in the so-described combination, group, series, and the like.
  • FIG. 1 illustrates a method for automatic access to WI-FI network according to an embodiment of the disclosure.
  • the method and system of WI-FI network 100 comprises a mobile device 110 and a WI-FI access point (AP) 120 .
  • the ambient noise around a WI-FI AP 120 (traffic noise for example, or the sound of people in a mall) is ambience sound information 130 .
  • the ambience sound information 130 is recorded by a first microphone 121 of the WI-FI AP 120 and the second microphone 111 of the mobile device 110 .
  • Wireless signal 101 of the WI-FI AP 120 has bigger coverage than that of the audible range of ambience sound information 130 .
  • the mobile device 110 and the location of the WI-FI AP 120 are in the same environment and close together.
  • the mobile device 110 and the WI-FI AP 120 receive the same ambience sound information 130 , which is unique to that locality.
  • the ambience sound information 130 is converted into a password as an authentication of the mobile device 110 which is requesting a connection to the WI-FI AP 120 .
  • FIG. 2 illustrates a method for automatic access to WI-FI network in another embodiment of the disclosure.
  • the mobile device 110 is within the coverage of the wireless signal 101 of the WI-FI AP 120 , but the mobile device 110 is outside of the coverage of the ambience sound 102 .
  • the ambience sound information 130 being received by the WI-FI AP 120 is not the same as the ambience sound information 130 being received by the mobile device 110 , therefore any password generated by one of them will not be the same as a password generated by the other of them, and wireless access will be refused.
  • This manner of authorization limits wireless connections to a WI-FI AP 120 .
  • the WI-FI AP 120 can regularly check the ambient sound being received by the mobile device 110 , to confirm the presence or absence of the mobile device 102 in the locality.
  • the WI-FI AP 120 cannot grant the access request of the mobile device 102 if the mobile device 102 cannot obtain the password generated from the same ambience sound information 130 .
  • This restriction on access controls the wireless network resources effectively, and reserves the resources of the wireless network to the local users.
  • FIG. 3 illustrates a method for automatic access to WI-FI network in block form, according to an embodiment of the disclosure.
  • the mobile device 110 comprises a first microphone 111 , a first processing unit 112 , and a first communicating unit 113 .
  • the first microphone 111 constantly obtains ambience sound information 130 and can deliver the same to the first processing unit 112 .
  • the first processing unit 112 can generate a first password according to a password-generating command received from the WI-FI AP 120 .
  • the password-generating command includes start time and sampling frequency. When commanded, the processing unit 112 generates the first password.
  • An accessing request is first transmitted to the WI-FI AP 120 by the first communicating unit 113 of the mobile device 110 .
  • the password-generating command is transmitted to the first communication unit 113 of the mobile device 110 after the WI-FI AP 120 receives the accessing request from the device 110 .
  • the first password which is generated by the first processing unit 112 can be transmitted to the WI-FI AP 120 by the first communicating unit 113 of the mobile device 110 .
  • FIG. 4 illustrates a function block of the WI-FI access point of a method for automatic access to WI-FI network according to an embodiment of the disclosure.
  • the WI-FI AP 120 comprises a second microphone 121 , a second processing unit 122 , and a second communicating unit 123 .
  • the second microphone 121 obtains ambience sound information 130 and passes same to the processing unit 122 , for the generation of a second password.
  • the WI-FI AP receives accessing request from device 110 through the second communicating unit 123 .
  • the second communicating unit 123 will also receive the first password which is generated by the mobile device 110 .
  • the second processing unit 122 obtains the accessing request and the first password from the device 110 through the second communicating unit 123 .
  • the second processing unit 122 constantly obtains ambience sound information 130 by the second microphone. A start time and sampling frequency in the password-generating command is decided by the WI-FI AP 120 for the purpose of synchronizing same.
  • the second processing unit 122 generates a second password, and the mobile device 110 can be permitted to access the WI-FI AP 120 if the first password of the mobile device 110 matches with the second password of the WI-FI AP 120 .
  • the mobile device 110 is not permitted to access the WI-FI AP 120 if the first password of the mobile device 110 does not match with the second password of the WI-FI AP 120 .
  • FIG. 5 illustrates a flow chart of a method for automatic access by a mobile device to a WI-FI network, according to an embodiment of the disclosure.
  • the method includes the steps of the mobile device searching for an accessible WI-FI access point and transmitting an accessing request to a WI-FI AP which may be discovered (step S 501 ).
  • the WI-FI AP transmits a password-generating command to the mobile device after receiving the accessing request. Therefore, after transmitting the accessing request the mobile device waits to receive the password-generating command which is transmitted from WI-FI AP (step S 502 ). After receiving the password-generating command, the mobile device executes the password-generating command (step S 503 ).
  • the mobile device generates the first password according to the password-generating command (step S 504 ).
  • the mobile device transmits the generated first password to the WI-FI AP (step S 505 ).
  • the first password is authenticated by the WI-FI AP (step S 506 ).
  • the mobile device retransmits the accessing request and repeats request when the first password does not pass the authentication.
  • the number of retrying repetitions will be checked against a maximum number.
  • the maximum number of retry repetitions times is defined by the users (step S 507 ).
  • the processes for automatically accessing WI-FI network will be ended when the number of retries is more than the maximum number (step S 308 ).
  • the mobile device can make retries by retransmitting the accessing request to WI-FI AP (return to step S 501 ) until the number of retries reaches the maximum number.
  • the mobile device is permitted to access the WI-FI AP when the first password passes authentication.
  • the mobile device is permitted to access the WI-FI AP for a certain permitted time (step S 509 ).
  • the WI-FI AP can check and apply further authentication processes during and after the certain permitted time (step S 510 ).
  • the first password will be invalid beyond the certain permitted time (step S 511 ).
  • the mobile device can retransmit the accessing request to WI-FI AP (return to step S 501 ) if access by the mobile device to the WI-FI AP is cut off.
  • FIG. 6 illustrates a flow chart of a method for a WI-FI access point to automatically allow access according to an embodiment of the disclosure.
  • the WI-FI AP receives the accessing request from the mobile device (step S 601 ).
  • the WI-FI AP transmits the password-generating command to the mobile device for asking the mobile device generates the first password (step S 602 ).
  • the WI-FI AP generates the second password from the second sound information according to the password-generating command (step S 603 ).
  • the WI-FI AP receives the first password from the mobile device (step S 604 ).
  • the WI-FI AP checks the first password as same as the second password.
  • the WI-FI AP waits for receiving the accessing request from the mobile device when the first password is not the same as the second password (return to step S 601 ).
  • the mobile device and the WI-FI AP obtain the same sound information in the same space.
  • the first password is the same as the second password because of the same sound information (step S 605 ).
  • the mobile device is permitted to access the WI-FI AP when the first password is the same as the second password (step S 606 ).
  • the mobile device is permitted to access the WI-FI AP for a valid time.
  • the WI-FI AP checks the authentication of the first password over valid time or not (step S 607 ).
  • the first password will be invalid over the valid time.
  • the mobile device retransmits the accessing request to WI-FI AP (return to step S 501 ) when the mobile device can not access to the WI-FI AP (step S 608 ).
  • FIG. 7 illustrates a schematic diagram of the password generating of a method for automatically access to WI-FI network according to an embodiment of the disclosure.
  • the ambience sound information is directly used as the basis for the password generation.
  • the ambience sound information is converted into audio characteristic.
  • the password is generated according to the audio characteristic.
  • the password-generating command includes the parameter of start time and the parameter of sampling frequency.
  • the first sound information and the second sound information within a specified time are obtained according to the parameter of start time.
  • the first sound information and the second sound information transfer to frequency signal of sound.
  • the first processing unit obtains values of first sound information on N sampling points according to the sampling time and the parameter of sampling frequency, a first 1 st string is obtained by value of 1 st sampling point of the first sound information subtract value of initial sampling point of the first sound information, a first N th string is obtained by value of N th sampling point of the first sound information subtract value of N ⁇ 1 th sampling point of the first sound information (N is a positive integer greater than 0).
  • the first password is generated by making CRC transformation with a first string which strings by the first 1 st string to the first N th string.
  • the second processing unit obtains values of second sound information on N sampling points according to the sampling time and the parameter of sampling frequency, a second 1 st string is obtained by value of second 1 st sampling point of the second sound information subtract value of initial sampling point of the second sound information, a second N th string is obtained by value of second N th sampling point of the second sound information subtract value of second N ⁇ 1 th sampling point of the second sound information (N is a positive integer greater than 0).
  • the second N th string is presented in the form of XYY.
  • the second password is generated by making CRC transformation with a second string which strings by the second 1 st string to the second N th string.
  • an initial sampling point 700 value is 80 dB
  • a 1 st sampling point 701 value is 70 dB.
  • the absolute value of the quotient is 3 when the 1 st sampling point 701 subtract the initial sampling point 700 divided by 3 (
  • /3 3).
  • the X of a 1 st string is set as 0
  • the YY of the 1 st string is set as 03
  • the 1 st string is 003.
  • the absolute value of the quotient is 2 when a 2 nd sampling point 702 subtract the 1 st sampling point 701 divided by 3 (
  • /3 2).
  • the X of a 2 nd string is set as 0, the YY of the 2 nd string is set as 02, the 1 st string is 003.
  • the absolute value of the quotient is 2 when a N th sampling point 704 subtract a N ⁇ 1 th sampling point 703 divided by 3 (
  • /3 2).
  • the X of a N th string is set as 1
  • the YY of the N th string is set as 02
  • the N th string is 102.
  • the 1 st string to the N th string in the frequency signal of sound in FIG. 7 is 003 002 101 101 005 002 105 003 001 102.
  • the system and method for automatically access the WI-FI network enable the WI-FI AP to obtain environmental sound information by the WI-FI AP or the microphone on the same network.
  • the mobile device is permitted to access to the WI-FI AP according to the characteristics of sound information.
  • the authentication of the mobile device to access the WI-FI AP is invalid when the mobile device leaves the environment.
  • the disclosure does not use the sound information of the environment directly in order to avoid the influence caused by the different sound source distances.
  • the disclosure obtains the characteristics of the sound information of the environment according to analysis the difference of the sampling frequency data.
  • the disclosure not only provides a method for automatically access to the WI-FI AP, but also reserves the wireless resource to the most needed users.

Abstract

A method for automatically allowing access to a WI-FI network by a mobile device can be applied to a mobile device and a WI-FI access point (AP). The mobile device includes a first microphone, first wireless communicating unit, and first processing unit. The first microphone obtains ambient sound, and the first wireless communicating unit can transmit accessing request. The mobile device can receive a password-generating command from a found WI-FI AP. The WI-FI AP comprises second microphone, second wireless communicating unit, and second processing unit. The second microphone also obtains ambient sound. The second wireless communicating unit receives the accessing request and transmits the password-generating command. The second processing unit generates an AP password according to the ambient sound and can compare a device password received from the mobile device. The mobile device is allowed to access the WI-FI AP when the device password matches with the AP password.

Description

    CROSS REFERENCE TO RELATED APPLICATIONS
  • This application is a Continuation of pending U.S. patent application Ser. No. 16/363,729, filed on Mar. 25, 2019 and entitled “METHOD AND SYSTEM FOR AUTOMATIC ACCESS TO WI-FI NETWORK”, the entirety content of which is incorporated by reference herein.
  • FIELD
  • The subject matter herein generally relates to wireless security.
  • BACKGROUND
  • To establish a connection between a WI-FI access point (AP) and a mobile device, a name and password must be given to the AP. Users need turn on the WI-FI function of their mobile device and scan for the local AP. To create the connection between mobile device and the AP, users need to choose the AP and key-in name and password. The process of connection can be more convenient for the user.
  • Free WI-FI can be found in the bus stations, the restaurants, the convenience stores, etc. The user device can record the password after connecting to the AP. The mobile device can be connected to the AP automatically when the mobile device again enters the coverage of the wireless signal. However, wireless signal quality may be low when there are many devices connected to the AP, the Administrator of the AP may change the password frequently in such situations, to improve the signal quality and avoid non-customers using the AP. Such a system is inconvenient in management and in use.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • Many aspects of the present disclosure are better understood with reference to the following drawings. The components in the drawings are not necessarily drawn to scale, the emphasis instead being placed upon clearly illustrating the principles of the present disclosure. It will be appreciated that for simplicity and clarity of illustration, where appropriate, reference numerals have been repeated among the different figures to indicate corresponding or analogous elements.
  • FIG. 1 illustrates a method for automatic access to WI-FI network according to an embodiment of the disclosure;
  • FIG. 2 illustrates a method for automatic access to WI-FI network in another embodiment of the disclosure;
  • FIG. 3 illustrates a method for automatic access to WI-FI network in block form, according to an embodiment of the disclosure;
  • FIG. 4 illustrates a block diagram of the WI-FI access point in a method for automatic access;
  • FIG. 5 illustrates a flow chart of a method for automatic access by a mobile device to a WI-FI network, according to an embodiment of the disclosure;
  • FIG. 6 illustrates a flow chart of a method for a WI-FI access point to automatically allow access according to an embodiment of the disclosure;
  • FIG. 7 illustrates a method for generating a password for automatic access to a WI-FI network according to an embodiment of the disclosure.
  • DETAILED DESCRIPTION
  • It will be appreciated that for simplicity and clarity of illustration, where appropriate, reference numerals have been repeated among the different figures to indicate corresponding or analogous elements. In addition, numerous specific details are set forth in order to provide a thorough understanding of the embodiments described herein. However, it will be understood by those of ordinary skill in the art that the embodiments described herein can be practiced without these specific details. In other instances, methods, procedures, and components have not been described in detail so as not to obscure the related relevant feature being described. Also, the description is not to be considered as limiting the scope of the embodiments described herein. The drawings are not necessarily to scale and the proportions of certain parts have been exaggerated to better illustrate details and features of the present disclosure.
  • The disclosure is illustrated by way of example and not by way of limitation in the figures of the accompanying drawings, in which like references indicate similar elements. It should be noted that references to “an” or “one” embodiment in this disclosure are not necessarily to the same embodiment, and such references mean “at least one”.
  • The term “coupled” is defined as connected, whether directly or indirectly through intervening components, and is not necessarily limited to physical connections. The connection can be such that the objects are permanently connected or releasably connected. The term “comprising,” when utilized, means “including, but not necessarily limited to”; it specifically indicates open-ended inclusion or membership in the so-described combination, group, series, and the like.
  • FIG. 1 illustrates a method for automatic access to WI-FI network according to an embodiment of the disclosure. As shown in FIG. 1, the method and system of WI-FI network 100 comprises a mobile device 110 and a WI-FI access point (AP) 120. The ambient noise around a WI-FI AP 120 (traffic noise for example, or the sound of people in a mall) is ambience sound information 130. The ambience sound information 130 is recorded by a first microphone 121 of the WI-FI AP 120 and the second microphone 111 of the mobile device 110. Wireless signal 101 of the WI-FI AP 120 has bigger coverage than that of the audible range of ambience sound information 130. Therefore, being located within such audible range means that the mobile device 110 and the location of the WI-FI AP 120 are in the same environment and close together. The mobile device 110 and the WI-FI AP 120 receive the same ambience sound information 130, which is unique to that locality. The ambience sound information 130 is converted into a password as an authentication of the mobile device 110 which is requesting a connection to the WI-FI AP 120.
  • FIG. 2 illustrates a method for automatic access to WI-FI network in another embodiment of the disclosure. As shown in FIG. 2, the mobile device 110 is within the coverage of the wireless signal 101 of the WI-FI AP 120, but the mobile device 110 is outside of the coverage of the ambience sound 102. The ambience sound information 130 being received by the WI-FI AP 120 is not the same as the ambience sound information 130 being received by the mobile device 110, therefore any password generated by one of them will not be the same as a password generated by the other of them, and wireless access will be refused. This manner of authorization limits wireless connections to a WI-FI AP 120. The WI-FI AP 120 can regularly check the ambient sound being received by the mobile device 110, to confirm the presence or absence of the mobile device 102 in the locality. The WI-FI AP 120 cannot grant the access request of the mobile device 102 if the mobile device 102 cannot obtain the password generated from the same ambience sound information 130. This restriction on access controls the wireless network resources effectively, and reserves the resources of the wireless network to the local users.
  • FIG. 3 illustrates a method for automatic access to WI-FI network in block form, according to an embodiment of the disclosure. As shown in FIG. 3, the mobile device 110 comprises a first microphone 111, a first processing unit 112, and a first communicating unit 113. The first microphone 111 constantly obtains ambience sound information 130 and can deliver the same to the first processing unit 112. The first processing unit 112 can generate a first password according to a password-generating command received from the WI-FI AP 120. The password-generating command includes start time and sampling frequency. When commanded, the processing unit 112 generates the first password.
  • An accessing request is first transmitted to the WI-FI AP 120 by the first communicating unit 113 of the mobile device 110. The password-generating command is transmitted to the first communication unit 113 of the mobile device 110 after the WI-FI AP 120 receives the accessing request from the device 110. The first password which is generated by the first processing unit 112 can be transmitted to the WI-FI AP 120 by the first communicating unit 113 of the mobile device 110.
  • FIG. 4 illustrates a function block of the WI-FI access point of a method for automatic access to WI-FI network according to an embodiment of the disclosure. As shown in FIG. 4, the WI-FI AP 120 comprises a second microphone 121, a second processing unit 122, and a second communicating unit 123. The second microphone 121 obtains ambience sound information 130 and passes same to the processing unit 122, for the generation of a second password. The WI-FI AP receives accessing request from device 110 through the second communicating unit 123. The second communicating unit 123 will also receive the first password which is generated by the mobile device 110. The second processing unit 122 obtains the accessing request and the first password from the device 110 through the second communicating unit 123. The second processing unit 122 constantly obtains ambience sound information 130 by the second microphone. A start time and sampling frequency in the password-generating command is decided by the WI-FI AP 120 for the purpose of synchronizing same. The second processing unit 122 generates a second password, and the mobile device 110 can be permitted to access the WI-FI AP 120 if the first password of the mobile device 110 matches with the second password of the WI-FI AP 120. The mobile device 110 is not permitted to access the WI-FI AP 120 if the first password of the mobile device 110 does not match with the second password of the WI-FI AP 120.
  • FIG. 5 illustrates a flow chart of a method for automatic access by a mobile device to a WI-FI network, according to an embodiment of the disclosure. As shown in FIG. 5, the method includes the steps of the mobile device searching for an accessible WI-FI access point and transmitting an accessing request to a WI-FI AP which may be discovered (step S501). The WI-FI AP transmits a password-generating command to the mobile device after receiving the accessing request. Therefore, after transmitting the accessing request the mobile device waits to receive the password-generating command which is transmitted from WI-FI AP (step S502). After receiving the password-generating command, the mobile device executes the password-generating command (step S503). The mobile device generates the first password according to the password-generating command (step S504). The mobile device transmits the generated first password to the WI-FI AP (step S505). The first password is authenticated by the WI-FI AP (step S506). The mobile device retransmits the accessing request and repeats request when the first password does not pass the authentication. The number of retrying repetitions will be checked against a maximum number. The maximum number of retry repetitions times is defined by the users (step S507). The processes for automatically accessing WI-FI network will be ended when the number of retries is more than the maximum number (step S308). The mobile device can make retries by retransmitting the accessing request to WI-FI AP (return to step S501) until the number of retries reaches the maximum number. The mobile device is permitted to access the WI-FI AP when the first password passes authentication. The mobile device is permitted to access the WI-FI AP for a certain permitted time (step S509). The WI-FI AP can check and apply further authentication processes during and after the certain permitted time (step S510). The first password will be invalid beyond the certain permitted time (step S511). The mobile device can retransmit the accessing request to WI-FI AP (return to step S501) if access by the mobile device to the WI-FI AP is cut off.
  • FIG. 6 illustrates a flow chart of a method for a WI-FI access point to automatically allow access according to an embodiment of the disclosure. As shown in FIG. 6, the WI-FI AP receives the accessing request from the mobile device (step S601). The WI-FI AP transmits the password-generating command to the mobile device for asking the mobile device generates the first password (step S602). The WI-FI AP generates the second password from the second sound information according to the password-generating command (step S603). The WI-FI AP receives the first password from the mobile device (step S604). The WI-FI AP checks the first password as same as the second password. The WI-FI AP waits for receiving the accessing request from the mobile device when the first password is not the same as the second password (return to step S601). The mobile device and the WI-FI AP obtain the same sound information in the same space. The first password is the same as the second password because of the same sound information (step S605). The mobile device is permitted to access the WI-FI AP when the first password is the same as the second password (step S606). The mobile device is permitted to access the WI-FI AP for a valid time. The WI-FI AP checks the authentication of the first password over valid time or not (step S607). The first password will be invalid over the valid time. The mobile device retransmits the accessing request to WI-FI AP (return to step S501) when the mobile device can not access to the WI-FI AP (step S608).
  • FIG. 7 illustrates a schematic diagram of the password generating of a method for automatically access to WI-FI network according to an embodiment of the disclosure. The ambience sound information is directly used as the basis for the password generation. In the embodiment, the ambience sound information is converted into audio characteristic. The password is generated according to the audio characteristic. The password-generating command includes the parameter of start time and the parameter of sampling frequency. The first sound information and the second sound information within a specified time are obtained according to the parameter of start time. The first sound information and the second sound information transfer to frequency signal of sound.
  • The first processing unit obtains values of first sound information on N sampling points according to the sampling time and the parameter of sampling frequency, a first 1st string is obtained by value of 1st sampling point of the first sound information subtract value of initial sampling point of the first sound information, a first Nth string is obtained by value of Nth sampling point of the first sound information subtract value of N−1th sampling point of the first sound information (N is a positive integer greater than 0). The first Nth string is presented in the form of XYY. X is set 1 when value of Nth sampling point of the first sound information subtract value of N−1th sampling point of the first sound information greater than 0 (set X=1 when (first Nth string−first N−1th string)≥0). X is set 0 when value of first Nth sampling point of the first sound information subtract value of first N−1th sampling point of the first sound information less than 0 (set X=0 when (first Nth string−first N−1th string)<0). YY is set as a quotient when value of first Nth sampling point of the first sound information subtract value of first N−1th sampling point of the first sound information divided by 3 (set YY=(first Nth string−first N−1th string)/3). The first password is generated by making CRC transformation with a first string which strings by the first 1st string to the first Nth string.
  • The second processing unit obtains values of second sound information on N sampling points according to the sampling time and the parameter of sampling frequency, a second 1st string is obtained by value of second 1st sampling point of the second sound information subtract value of initial sampling point of the second sound information, a second Nth string is obtained by value of second Nth sampling point of the second sound information subtract value of second N−1th sampling point of the second sound information (N is a positive integer greater than 0). The second Nth string is presented in the form of XYY. X is set 1 when value of second Nth sampling point of the second sound information subtract value of second N−1th sampling point of the second sound information greater than 0 (set X=1 when (second Nth string−second N−1th string)≥0). X is set 0 when value of second Nth sampling point of the second sound information subtract value of second N−1th sampling point of the second sound information less than 0 (set X=0 when (second Nth string−second N−1th string)<0). YY is set as a quotient when value of second Nth sampling point of the second sound information subtract value of second N−1th sampling point of the second sound information divided by 3 (set YY=(second Nth string−second N−1th string)/3). The second password is generated by making CRC transformation with a second string which strings by the second 1st string to the second Nth string.
  • As shown in FIG. 7 as an example, an initial sampling point 700 value is 80 dB, a 1st sampling point 701 value is 70 dB. The absolute value of the quotient is 3 when the 1st sampling point 701 subtract the initial sampling point 700 divided by 3 (|(70 dB−80 dB)|/3=3). Thus the X of a 1st string is set as 0, the YY of the 1st string is set as 03, the 1st string is 003. The absolute value of the quotient is 2 when a 2nd sampling point 702 subtract the 1st sampling point 701 divided by 3 (|(64 dB−70 dB)|/3=2). Thus the X of a 2nd string is set as 0, the YY of the 2nd string is set as 02, the 1st string is 003. The absolute value of the quotient is 2 when a Nth sampling point 704 subtract a N−1th sampling point 703 divided by 3 (|(64 dB−57 dB)|/3=2). Thus the X of a Nth string is set as 1, the YY of the Nth string is set as 02, the Nth string is 102. Such as the above rules, the 1st string to the Nth string in the frequency signal of sound in FIG. 7 is 003 002 101 101 005 002 105 003 001 102. A password is 95fdec29 which is obtained by CRC transfer the string which strings by the 1st string to the Nth string. (CRC(003 002 101 101 005 002 105 003 001 102)=95fdec29)
  • The system and method for automatically access the WI-FI network according to an embodiment of the disclosure enable the WI-FI AP to obtain environmental sound information by the WI-FI AP or the microphone on the same network. The mobile device is permitted to access to the WI-FI AP according to the characteristics of sound information. The authentication of the mobile device to access the WI-FI AP is invalid when the mobile device leaves the environment. The disclosure does not use the sound information of the environment directly in order to avoid the influence caused by the different sound source distances. The disclosure obtains the characteristics of the sound information of the environment according to analysis the difference of the sampling frequency data. The disclosure not only provides a method for automatically access to the WI-FI AP, but also reserves the wireless resource to the most needed users.
  • The embodiments shown and described above are only examples. Therefore, many such details of the art are neither shown nor described. Even though numerous characteristics and advantages of the present technology have been set forth in the foregoing description, together with details of the structure and function of the present disclosure, the disclosure is illustrative only, and changes may be made in the detail, especially in matters of shape, size, and arrangement of the parts within the principles of the present disclosure, up to and including the full extent established by the broad general meaning of the terms used in the claims. It will therefore be appreciated that the embodiments described above may be modified within the scope of the claims.

Claims (10)

What is claimed is:
1. A mobile device connecting with a WI-FI access point, the mobile device comprising:
a microphone, obtaining a first sound information;
a communicating unit, transmitting an accessing command, receiving a password-generating command, transmitting a first password and receiving a second password wherein the second password is generated from a second sound information by the WI-FI access point;
a processing unit, obtaining the first sound information from to the microphone, generating the first password from the first sound information according to the password-generating command, and comparing the first password with the second password, wherein the processing unit set the mobile device be permitted to access the WI-FI access point if the first password matches with the second password.
2. The mobile device of claim 1, wherein the password-generating command comprises a parameter of start time and a parameter of sampling frequency, the processing unit obtains sampling time of the first sound information according to the parameter of start time.
3. The mobile device of claim 2, wherein the processing unit obtains values of the first sound information on N sampling points according to the sampling time and the parameter of sampling frequency, a first 1st string is obtained by a value of 1st sampling point of the first sound information subtract a value of initial sampling point of the first sound information, a first Nth string is obtained by a value of Nth sampling point of the first sound information subtract a value of N−1th sampling point of the first sound information, N being a positive integer greater than 0, the first password is generated by making cyclic redundancy check (CRC) transformation with a string which strings by the first 1st string to the first Nth string.
4. The mobile device of claim 1, wherein the mobile device is permitted to access a WI-FI access point in a period of time, the first password becomes invalid by the processing unit when the mobile device has accessed the WI-FI access point over the period of time, the mobile device transmits the accessing request to the WI-FI access point when the mobile device is disconnected by the WI-FI access point.
5. A WI-FI access point, comprising:
a communicating unit, receiving an accessing request, transmitting a password-generating command and receiving a first password wherein the first password is generated from a first sound information by a mobile device;
a microphone, obtaining a second sound information;
a processing unit, obtaining the accessing request and the first password according the communicating unit, obtaining the second sound information from the microphone, generating a second password from the second sound information according to the password-generating command, comparing the first password with the second password, wherein the processing unit set the mobile device be permitted to access the WI-FI access point if the first password matches with the second password.
6. The WI-FI access point of claim 5, wherein the password-generating command comprises a parameter of start time and a parameter of sampling frequency, the processing unit obtains sampling time of the second sound information according to the parameter of start time.
7. The WI-FI access point of claim 6, wherein the processing unit obtains values of the second sound information on N sampling points according to the sampling time and the parameter of sampling frequency, a second 1st string is obtained by a value of 1st sampling point of the second sound information subtract a value of initial sampling point of the second sound information, a second Nth string is obtained by a value of Nth sampling point of the second sound information subtract a value of N−1th sampling point of the second sound information, N being a positive integer greater than 0, the second password is generated by making cyclic redundancy check (CRC) transformation with a string which strings by the second 1st string to the second Nth string.
8. The WI-FI access point of claim 5, wherein the WI-FI access point is permitted to access in a period of time, the first password becomes invalid by the processing unit when the mobile device has accessed the WI-FI access point over the period of time, the mobile device transmits the accessing request to the WI-FI access point when the mobile device is disconnected by the WI-FI access point.
9. A method of automatically access to WI-FI network, the method comprising:
transmitting an accessing request to a WI-FI access point by a mobile device;
receiving the accessing request by the WI-FI access point;
obtaining a first sound information of an ambience of the mobile device by a first microphone;
obtaining a second sound information of an ambience of the WI-FI access point by a second microphone;
generating a first password from the first sound information by the mobile device;
generating a second password from the second sound information by the WI-FI access point;
transmitting the first password to the WI-FI access point by the mobile device;
receiving the first password by the WI-FI access point;
comparing the first password and the second password; and
permitting the mobile device to access the WI-FI access point if the first password matches with the second password.
10. The method of claim 9, wherein the mobile device is permitted to access the WI-FI access point in a period of time, the method further comprising:
invalidating the first password when the mobile device has accessed the WI-FI access point longer than the period of time, and
transmitting, by the mobile device, the accessing request to the WI-FI access point when the mobile device is disconnected by the WI-FI access point.
US17/559,247 2019-03-25 2021-12-22 Method and system for automatic access to wi-fi network Abandoned US20220116775A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US17/559,247 US20220116775A1 (en) 2019-03-25 2021-12-22 Method and system for automatic access to wi-fi network

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US16/363,729 US11284256B2 (en) 2019-03-25 2019-03-25 Method and system for automatic access to WI-FI network
US17/559,247 US20220116775A1 (en) 2019-03-25 2021-12-22 Method and system for automatic access to wi-fi network

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US16/363,729 Continuation US11284256B2 (en) 2019-03-25 2019-03-25 Method and system for automatic access to WI-FI network

Publications (1)

Publication Number Publication Date
US20220116775A1 true US20220116775A1 (en) 2022-04-14

Family

ID=72605393

Family Applications (2)

Application Number Title Priority Date Filing Date
US16/363,729 Active 2040-09-25 US11284256B2 (en) 2019-03-25 2019-03-25 Method and system for automatic access to WI-FI network
US17/559,247 Abandoned US20220116775A1 (en) 2019-03-25 2021-12-22 Method and system for automatic access to wi-fi network

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US16/363,729 Active 2040-09-25 US11284256B2 (en) 2019-03-25 2019-03-25 Method and system for automatic access to WI-FI network

Country Status (3)

Country Link
US (2) US11284256B2 (en)
CN (1) CN111741460A (en)
TW (1) TW202037196A (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113316128B (en) * 2020-02-26 2022-04-05 杭州海康威视数字技术股份有限公司 Screen projection method, receiving terminal equipment and sending terminal equipment
US20230140517A1 (en) * 2021-10-28 2023-05-04 Arris Enterprises Llc Access-point passphrase identification using key matching

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100110837A1 (en) * 2008-10-31 2010-05-06 Samsung Electronics Co., Ltd. Method and apparatus for wireless communication using an acoustic signal
JP2011205194A (en) * 2010-03-24 2011-10-13 Nec Corp Radio communication system, radio communication method, program, and recording medium
US20130308506A1 (en) * 2012-05-18 2013-11-21 Qualcomm Incorporated Automatic device-to-device connection control by environmental information
US20140129231A1 (en) * 2012-11-02 2014-05-08 International Business Machines Corporation Authentication based on sound proximity
CN106792661A (en) * 2016-04-29 2017-05-31 新华三技术有限公司 A kind of WLAN cut-in methods and device
US20180270592A1 (en) * 2017-03-16 2018-09-20 Qualcomm Incorporated Audio correlation selection scheme

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5729161B2 (en) * 2010-09-27 2015-06-03 ヤマハ株式会社 Communication terminal, wireless device, and wireless communication system
US8555047B2 (en) * 2011-03-16 2013-10-08 Rammohan Malasani Wi-Fi router with integrated touch-screen and enhanced security features
JP6182904B2 (en) * 2013-02-28 2017-08-23 ブラザー工業株式会社 COMMUNICATION TERMINAL DEVICE, COMMUNICATION CONTROL METHOD, AND COMMUNICATION CONTROL PROGRAM
US20140283136A1 (en) * 2013-03-13 2014-09-18 Optio Labs, Inc. Systems and methods for securing and locating computing devices
CN104869568B (en) * 2014-02-26 2018-03-02 中国科学院软件研究所 A kind of monitoring system collocation method and system based on audio
CN103973453A (en) * 2014-05-19 2014-08-06 中国联合网络通信集团有限公司 Vocal print secret key generating method and device and logging-in method and system based on vocal print secret key
KR102304979B1 (en) * 2014-06-19 2021-09-27 삼성전자주식회사 Electronic apparatus and method for pairing in electronic apparatus
CN108737172A (en) * 2018-05-11 2018-11-02 四川斐讯信息技术有限公司 A kind of method and system of the automatic modification router Wi-Fi passwords based on intelligent sound box
CN108718460B (en) * 2018-06-19 2020-09-08 广东美的制冷设备有限公司 Communication method and communication device of wireless local area network and intelligent electronic equipment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100110837A1 (en) * 2008-10-31 2010-05-06 Samsung Electronics Co., Ltd. Method and apparatus for wireless communication using an acoustic signal
JP2011205194A (en) * 2010-03-24 2011-10-13 Nec Corp Radio communication system, radio communication method, program, and recording medium
US20130308506A1 (en) * 2012-05-18 2013-11-21 Qualcomm Incorporated Automatic device-to-device connection control by environmental information
US20140129231A1 (en) * 2012-11-02 2014-05-08 International Business Machines Corporation Authentication based on sound proximity
US9082413B2 (en) * 2012-11-02 2015-07-14 International Business Machines Corporation Electronic transaction authentication based on sound proximity
CN106792661A (en) * 2016-04-29 2017-05-31 新华三技术有限公司 A kind of WLAN cut-in methods and device
US20180270592A1 (en) * 2017-03-16 2018-09-20 Qualcomm Incorporated Audio correlation selection scheme

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Somayeh Nikbakhsh; A Novel Approach for Rogue Access Point Detection on the Client-Side; IEEE: 2012; pages:684-687 *

Also Published As

Publication number Publication date
US11284256B2 (en) 2022-03-22
CN111741460A (en) 2020-10-02
TW202037196A (en) 2020-10-01
US20200314649A1 (en) 2020-10-01

Similar Documents

Publication Publication Date Title
US20220116775A1 (en) Method and system for automatic access to wi-fi network
US7403794B2 (en) Client terminal having a temporary connection establishing unit
CN105303659B (en) A kind of gate inhibition&#39;s personal identification method and device based on ultrasonic wave
CN101754215B (en) Authentication method and system
KR20160114620A (en) Methods, devices and systems for dynamic network access administration
AU2002352285A1 (en) Method and system for authenticating user of data transfer device
US20090045943A1 (en) Authentication system and method thereof for wireless networks
US20190238639A1 (en) Method and apparatus for utilzing nfc to establish a secure connection
US9386613B2 (en) Wireless network system and connecting method thereof
US10750369B2 (en) Method, apparatus, and platform for sharing wireless local area network
CN107172620B (en) Wireless local area network authentication method and device
US20050048952A1 (en) Method and apparatus for distribution of cipher code in wireless LAN
KR20020000961A (en) A wireless authentication method using mobile telecommunication system
US20060068756A1 (en) Mobile user authentication in connection with access to mobile services
KR102393500B1 (en) Login system and authentication method
CN110933038B (en) Conference implementation method, system, service platform and storage medium
US7814212B1 (en) Data delivery system using local and remote communications
US20150244912A1 (en) Camera system and operating method thereof
US20200021986A1 (en) Method of connecting a network apparatus to wifi network and wifi speaker
CN107371160B (en) Method and equipment for carrying out wireless connection pre-authorization on user equipment
US20050079859A1 (en) System and method for remotely accessing a private database
CN106850925A (en) The synchronous method of a kind of mobile unit and cellphone directory based on WiFi
KR20050025550A (en) Mobile home network system
KR101941770B1 (en) Authentication Method using portable device
KR101828684B1 (en) Method for Automating Login Coupled with Medium

Legal Events

Date Code Title Description
AS Assignment

Owner name: NANNING FUGUI PRECISION INDUSTRIAL CO., LTD., CHINA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:YEN, SHIH-JUNG;REEL/FRAME:058461/0358

Effective date: 20190325

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

AS Assignment

Owner name: NANNING FULIAN FUGUI PRECISION INDUSTRIAL CO., LTD., CHINA

Free format text: CHANGE OF NAME;ASSIGNOR:NANNING FUGUI PRECISION INDUSTRIAL CO., LTD.;REEL/FRAME:058838/0720

Effective date: 20220105

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION