WO2011144174A1 - 配置接入设备的方法、装置及系统 - Google Patents
配置接入设备的方法、装置及系统 Download PDFInfo
- Publication number
- WO2011144174A1 WO2011144174A1 PCT/CN2011/075351 CN2011075351W WO2011144174A1 WO 2011144174 A1 WO2011144174 A1 WO 2011144174A1 CN 2011075351 W CN2011075351 W CN 2011075351W WO 2011144174 A1 WO2011144174 A1 WO 2011144174A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- access device
- access
- master key
- terminal device
- type
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/04—Arrangements for maintaining operational condition
Definitions
- the present invention relates to the field of communications technologies, and in particular, to a method, an apparatus, and a system for configuring an access device. Background technique
- a commonly used network is a broadband broadband network, including a local area network (LAN) and an Asymmetric Digital Subscriber Loop (ADSL).
- LAN local area network
- ADSL Asymmetric Digital Subscriber Loop
- wireless networks power line communications
- coaxial communications have also developed rapidly.
- the basic configuration of setting up a wireless network is to use a wireless network card and a wireless access node (AP, Access Point) to adopt a wireless mode to share network resources with an existing wired network architecture.
- AP also known as a bridge, plays the role of a wireless workstation and a wired LAN bridge in the Media Access Control (MAC), similar to a Hub (HUB) in a wired LAN.
- MAC Media Access Control
- the wireless network is erected in the following manner: First, the cable broadband network (ADSL, cell LAN) operator implements broadband to the home by installing a gateway device in the user's home, and then connects an AP to the gateway (or the gateway integrates the AP function).
- ADSL cable broadband network
- a wired network card is installed in the terminal device such as the user's computer.
- the terminal device can connect to the AP through the wireless network and connect to the operator's wired broadband network.
- WiFi Wireless Fidelity
- the application scenarios such as home network, enterprise network and hotspot coverage.
- the wired communication technology such as power line communication and coaxial communication using the National Telecommunication Union (ITU) International Telecommunication Union (G.hn) adopts a network structure similar to that of a wireless local area network.
- the basic configuration is to use the network adapter and network coordinator (or network master management device). Similar to an AP, a network coordinator (or network master management device) acts as a network bridge.
- power line communication and coaxial communication are erected in the following ways: First, the cable broadband network operator implements broadband to the home by installing a gateway device in the user's home, and then connects to the network coordinator (or network master management device) at the gateway, and then at the user.
- the terminal device such as a computer is connected to a power line or a network adapter (or network card) for coaxial communication.
- the terminal device can connect to the network coordinator through the power line communication and the coaxial communication network. (or the network master management device) is in turn connected to the operator's wired broadband network.
- WiFi alliances, ITU and other organizations have not only added security mechanisms to technologies such as WiFi and G.hn, but have also continuously improved security mechanisms.
- the general principle of the security mechanism is as follows: The terminal device and the access device pre-configure the master key, and derive a temporary key according to the master key of the communication parties through a trusted secure key exchange protocol. The communication data is encrypted by a temporary key.
- the user terminal device In actual communication, the user terminal device must know the network identifier of the access device and its access password (key before accessing the AP, the network coordinator, or the primary management device (hereinafter collectively referred to as the access device). ). For example, in the case of WiFi, the user must know the Service Set Identifier (SSID) of the WLAN to be accessed and the password (master key) of the encryption method to be accessed. Moreover, different terminal keys are required for the terminal device to access different access devices.
- SSID Service Set Identifier
- master key master key
- the user Before the terminal device of the user is to be connected to an access device, the user must perform certain configuration on the access device, that is, input the identification information of the access device and the access password (ie, the master key) to obtain After the device is licensed, its terminal device can access the access device.
- a user's home network may be equipped with multiple access devices, so the user must know and remember the network identifiers of all access devices and their master keys to configure each access device separately.
- the above process of configuring the access device requires certain technical common sense, and may require the operator (or the vendor) to solve the problem or provide guidance through the telephone; and the process of configuring each access device separately needs to consume the user. More energy and time, in this process the user must know the network of all access devices ID and master key. Summary of the invention
- Embodiments of the present invention provide a method, device, and system for configuring an access device.
- a method for configuring an access device includes:
- the access device is configured according to the master key and the identification information of the access device.
- a gateway device comprising:
- An obtaining unit configured to acquire a type of the access device and a master key
- a sending unit configured to send the type of the access device to the terminal device
- a receiving unit configured to receive a response message of the terminal device, where the response message carries the identifier information that the terminal device specifies for the access device according to the type of the access device;
- the configuration unit is configured to configure the access device according to the master key and the identifier information of the access device.
- a terminal device comprising:
- a receiving unit configured to receive a type of the access device sent by the gateway device
- a specifying unit configured to specify identification information for the access device according to the type of the access device
- the sending unit is configured to send a response message to the gateway device, where the response message carries the identifier information specified by the access device.
- a communication system includes a gateway device, a terminal device, and an access device, where the gateway device is respectively connected to the terminal device and the access device;
- the gateway device is configured to obtain the type of the access device and the master key, and send the type of the access device to the terminal device, and receive a response message of the terminal device, where the response message carries the terminal device according to the type of the access device as the access device.
- the specified identification information is configured according to the master key and the identification information of the access device;
- the terminal device is configured to receive the type of the access device that is sent by the gateway device, and specify the identifier information for the access device according to the type of the access device, and send a response message to the gateway device, where the response message is carried Enter the identification information specified by the device.
- the gateway device acquires the type and the master key of the access device, sends the type of the access device to the terminal device, and receives the identifier information specified by the terminal device for the access device, and then accesses according to the access device.
- the master key and identification information of the device configure the access device.
- FIG. 1 is a schematic flowchart of a method for configuring an access device according to Embodiment 1 of the present invention
- FIG. 2 is a schematic flowchart of a method for configuring an access device according to Embodiment 2 of the present invention
- FIG. 3 is a schematic flowchart of a method for configuring an access device according to Embodiment 3 of the present invention
- FIG. 4 is a schematic flowchart of a method for configuring an access device according to Embodiment 4 of the present invention.
- FIG. 5 is a schematic flowchart of a method for configuring an access device according to Embodiment 5 of the present invention.
- FIG. 6 is a schematic flowchart of a method for configuring an access device according to Embodiment 6 of the present invention.
- FIG. 7 is a schematic diagram of a network structure of a method for configuring an access device according to Embodiment 3 of the present invention.
- FIG. 8 is a schematic diagram of a network structure of a method for configuring an access device according to Embodiment 4 of the present invention.
- FIG. 9 is a schematic diagram of a network structure of a method for configuring an access device according to Embodiment 5 of the present invention.
- FIG. 10 is a schematic diagram of a network structure of a method for configuring an access device according to Embodiment 6 of the present invention
- FIG. 11 is a schematic diagram showing a logical structure of a gateway device according to Embodiment 7 of the present invention
- FIG. 12 is a schematic diagram showing the logical structure of a terminal device according to Embodiment 8 of the present invention.
- FIG. 13 is a schematic diagram showing the logical structure of a communication system according to Embodiment 9 of the present invention. detailed description
- An embodiment of the present invention provides a method for configuring an access device, including: acquiring a type of an access device and a master key, and transmitting the type of the access device to the terminal device, and receiving a response message of the terminal device, where the response message carries the terminal
- the device configures the access device according to the identity information of the access device and the identity information of the access device.
- the embodiments of the present invention further provide corresponding devices and systems, including a gateway device, a terminal device, and a communication system. The details are described below separately.
- Embodiment 1 A method for configuring a gateway device to access an access device, please refer to FIG. 1 , which mainly includes the following steps:
- the gateway device acquires an access device type and a master key.
- the gateway device sends the topology detection packet to the access device, and the access device responds to the first information packet after receiving the topology detection packet, and reports the type of the access device and the null configuration information to the gateway device, and the gateway device After receiving the null configuration information, the device sends an authentication request to the access device. After the authentication is passed, the access device responds to the second information packet and reports the master key of the access device to the gateway device.
- the authentication method can be a certificate (CA, Certificate Authority).
- CA Certificate Authority
- the access device may encrypt the master key of the access device by using the key of the certificate and then send it to the gateway device.
- the gateway device sends the type of the access device to the terminal device.
- the gateway device can connect to the terminal device through the Ethernet or other established secure channel, such as the Secure Shell Protocol (SSH) channel, and report the device type of the access device to the terminal device.
- SSL Secure Shell Protocol
- the identification information that is specified by the terminal device according to the type of the access device may be displayed by the terminal device, and the terminal device displays the type of the access device, and the user confirms whether to access and according to the access device.
- the access device is an AP
- the identifier information is service set identifier information (SSID) of the network to be accessed
- the access device is a network coordinator or a master management device
- the identifier information is the network coordinator or the master Manage device identification number information of the device.
- the terminal device can access the access device by using the master key of the access device.
- the access device may be an AP, a network coordinator, a main management device, a router, a Digital Subscriber Line Access Multiplexer (DSLAM), and a Multiplexer Unit (MXU, Multiplexer Unit). ), an optical line terminal (OLT), etc.
- the gateway device may be a home gateway, etc.
- the terminal device may be a personal computer, a mobile phone, a set top box, or the like.
- the technical solution of the embodiment of the invention implements automatic configuration of the access device by the gateway device. After the configuration is complete, the terminal device can access the access device through the master key of the access device. Throughout the configuration process In this case, the user does not need to remember the master key of each access device, nor does it need to manually configure the access device before connecting the terminal device to each access device.
- Embodiment 2
- a method for configuring an access device for a terminal device please refer to FIG. 2, which mainly includes the following steps:
- the terminal device receives a type of the access device sent by the gateway device.
- the terminal device can connect to the gateway device through an Ethernet or other established secure channel, such as a Secure Shell Protocol (SSH) channel, and receive the type of access device sent by the gateway device.
- SSL Secure Shell Protocol
- the terminal device may automatically specify the identification information for the access device according to the type of the access device by using a pre-configured program, or the user may specify the identification information for the access device according to the type of the access device.
- the identifier information is specified by the user, the following steps are included:
- the terminal device displays the type of the access device and an option of whether to allow the access device to be connected, and the user confirms whether to access the access device, and then inputs a selection signal and inputs as the identification information.
- the terminal device receives the selection signal and information input by the user, and assigns the information input by the user as the identification information to the access device.
- the identifier information is service set identifier information (SSID) of the wireless network to be accessed; when the access device is a network coordinator or a master management device, the identifier information is the network coordinator Or the device identification number information of the primary management device.
- SSID service set identifier information
- the terminal device sends a response message to the gateway device, where the response message carries the identifier information specified by the access device.
- the terminal device sends the identification information that has been designated for the access device to the gateway device through the channel established by the terminal device with the gateway device.
- the terminal device After the gateway device configures the access device, the terminal device can access the access device by using the master key of the access device.
- the terminal device further receives a master key of the access device sent by the gateway device.
- the method further includes the step 204 of configuring the terminal device itself according to the master key and the identification information of the access device.
- the gateway device configures the access device
- the terminal device is self-configured After the configuration is completed, the terminal device can automatically access the access device.
- the entire configuration access process no user operation is required, and the identification information and the primary key of each access device need to be remembered in the prior art.
- the problem of manually configuring the key for each access device reduces the requirements on the user and reduces the burden on the user.
- the access device may be an AP, a network coordinator, a main management device, a router, a Digital Subscriber Line Access Multiplexer (DSLAM), and a Multiplexer Unit (MXU, Multiplexer Unit). ), an optical line terminal (OLT), etc.
- the gateway device may be a home gateway, etc.
- the terminal device may be a personal computer, a mobile phone, a set top box, etc.
- the network adapter connected to the terminal device includes a power adapter or the like as a terminal device. a part of.
- the terminal device obtains the type of the access device by using the gateway device, and specifies the identifier information of the access device according to the type of the access device, and the gateway device configures the access device by the gateway device. ; thus achieving automatic configuration of the access device.
- the terminal device further configures the access device by using the master key and the identification information of the access device. After the configuration is complete, the terminal device can access the access device; during the entire configuration process, the user does not need to remember The master key of each access device does not need to be manually configured before the terminal device is connected to each access device.
- the method of the embodiment of the present invention is further extended by using the embodiments 3 to 6.
- the third embodiment is as follows:
- the method for configuring an access device is applied to the following application scenarios:
- Broadband operators provide broadband access services to users, and home gateway devices are installed.
- the home network built by users is connected to the broadband network through gateway devices.
- the user purchases the access device AP to prepare to set up the wireless network.
- the terminal device used by the user is described by taking a personal computer as an example, and may be a terminal device such as a set top box.
- the access device is described by taking an AP as an example.
- the embodiment is also applicable to the case where the user prepares to set up a power line network or a coaxial line network, and the difference at this time is that the access device is a network coordinator or a main management device.
- the AP is connected to the home gateway device, which requires a note. It is meant that the gateway device and the terminal device computer are connected to form an existing home network, and then the access device, ie, the AP, is configured, and the terminal device computer can be connected to the AP through the wireless network.
- the method for configuring an access device is as shown in FIG. 3, and the details are as follows:
- the gateway device periodically sends a topology detection packet to the network to detect a newly added network device in the network.
- the gateway device sends the topology detection packet through the 802.1 AB Link Layer Discovery Protocol (LLDP) or the Universal Plug and Play protocol (UPnP).
- LLDP Link Layer Discovery Protocol
- UFP Universal Plug and Play protocol
- the AP After receiving the topology detection packet sent by the gateway device, the AP sends a first information packet to the gateway device, where the first information packet carries an AP parameter, where the parameter includes the device type and device identifier of the AP.
- Information such as communication address and empty configuration.
- the gateway device receives the parameter of the AP sent by the AP. If the configuration of the AP is empty, the AP sends an authentication request to the AP for two-way authentication:
- the gateway device box AP sends an inquiry message for obtaining a specific authentication mode.
- the AP sends a response query message to the gateway device, and reports the supported authentication mode, such as a certificate (CA) authentication.
- CA certificate
- the AP and the gateway device exchange certificates with each other, and both parties confirm that they are trusted by the certificate, and the authentication process is completed, and the two establish a secure channel.
- the AP sends its master key to the gateway device.
- the AP's master key can be sent in an encrypted manner, for example, using the certificate's key to encrypt the AP's master key.
- the gateway device After receiving the master key of the AP, the gateway device first performs decryption, and then establishes a mapping relationship with the parameters of the AP, specifically, a mapping relationship between the communication address, the device identifier, and the master key.
- the communication address of the AP may be the media access address of the AP.
- the gateway device and the terminal device establish a secure channel by using authentication.
- the process is as follows:
- the terminal device receives the account and password input by the user and sends it to the gateway device, and connects to the gateway device through an Ethernet or other established secure channel, such as a Secure Shell Protocol (SSH) channel;
- SSH Secure Shell Protocol
- the gateway device verifies the account and password. If the account and password are correct, the terminal device is considered to be trusted, and a secure channel is established with the terminal device.
- the gateway device sends the parameters of the AP to the terminal device.
- This parameter includes the type of AP, usually also It may include the device identification and communication address of the AP, and the like.
- the terminal device receives a parameter of the AP sent by the gateway device.
- the terminal device specifies identifier information for the AP according to the type of the AP.
- the identification information may be automatically assigned to the access device by the terminal device according to a pre-configured program, or the identification information may be manually designated by the user through the terminal device.
- the steps are as follows:
- 3091 Display parameter information of the AP and an option for the user to determine whether to access the AP.
- 3092. Receive a determination signal input by the user. If the determination is yes, the identifier information specified by the user for the AP is received; the identifier information is The SSID of the wireless network to be accessed.
- the terminal device sends the identifier information (SSID) specified for the AP to the gateway device.
- SSID identifier information
- the gateway device receives the identifier information (SSID) specified for the AP, and performs corresponding configuration for the AP according to the master key and the identifier information (SSID) of the AP.
- SSID identifier information
- the gateway device sends the master key of the AP to the terminal device. This step can be performed before, after, or after step 311.
- the gateway device can encrypt the AP's master key and then send it to the terminal device.
- the AP's master key is encrypted by using the user's account and password.
- the terminal device After receiving the master key of the AP, the terminal device first decrypts and stores the encrypted AP's master key (that is, records locally). A prompt option is then displayed for the user to select whether to access the AP.
- the terminal device If the user chooses to access the AP, the terminal device notifies the network card for the WiFi to initiate the connection to the AP identified by the SSID, and uses the master key of the AP to negotiate the temporary key with the AP, and establishes security with the AP through the wireless manner. Connect the channel.
- the AP After the connection between the terminal device and the AP is successful, the AP notifies the gateway device to connect to the broadband broadband network of the broadband provider. After the connection between the terminal device and the AP is successful, the terminal device displays the connection success message; after the gateway device connects to the external broadband network successfully, the terminal device also displays the connection success message.
- the terminal device has been connected to the external broadband network through the Ap and the gateway device, and the user can freely swim the network.
- This embodiment describes the configuration of the AP when the wireless network is set up. It should be noted that the configuration of the physical device is as follows. In addition, in the method of this embodiment, all steps requiring the user to confirm or input information The steps can be replaced by pre-setting the corresponding program in the device for automatic configuration.
- Embodiment 4
- the method for configuring an access device is applied to the following application scenarios:
- the new AP must be added for supplementation to extend the coverage of the original wireless network. Therefore, in the home network of the embodiment, two APs are included, one of which is a previously configured AP that is connected to the home network, and the other is an unconfigured AP that is later connected to the home network, in order to avoid generation.
- the previously configured APs are referred to as the first AP
- the unconfigured APs that are accessed later are referred to as the second AP
- the second AP and the first AP use the same SSID.
- the second AP is connected to the gateway device, and the network structure is as shown in FIG. 8.
- step 311 is replaced by step 411.
- the gateway device After receiving the identifier information (SSID) specified by the second AP, the gateway device first checks whether the SSID corresponds to two APs (ie, the first AP and the second AP), and if yes, allocates an idle time to the second AP.
- Working channel or a new channel to avoid overlapping with the working channel of the first AP; then configuring the AP according to the master key and the identification information (SSID) of the second AP, and configuring the successful second AP to work On a different working channel than the first AP.
- step 314 may be replaced by step 414.
- the terminal device checks the broadcast frame sent by the second AP, finds the master key corresponding to the second AP in the second AP according to the MAC address in the broadcast frame, and then notifies the user to use the WiFi.
- the NIC starts to connect to the second AP identified by the SSID, and uses the master key of the second AP to negotiate a temporary key with the second AP, and establishes a secure channel with the AP through the wireless manner.
- the broadcast frame sent by the second AP usually carries the basic configuration information of the wireless network represented by the SSID and the communication address of the second AP.
- the terminal device passes through an Ethernet or other established secure channel, such as a security shell.
- the protocol (SSH, Secure Shell) channel is connected to the gateway device.
- the terminal device can also be connected to the gateway device through the already established wireless network.
- the method for configuring an access device is applied to the following application scenarios:
- the wireless network that has been set up still cannot be effectively covered, but at this time, the user's home network includes or supports the power line network, and accesses the new AP of the user's home network (hereinafter referred to as the third).
- the AP integrates a power line network adapter (power adapter) that supports the G.hn protocol, and the gateway device inherits a master management device that supports the G.hn protocol. Therefore, a suitable location can be selected for the third AP, and the third AP is connected to the gateway device through the power line network, and the network structure is as shown in FIG.
- steps 305-310 are the same as the third embodiment, and step 310 is the same as the second embodiment, and the difference is mainly In steps 301-304.
- steps 301-304 are replaced by steps 501-504.
- a registration window is opened;
- the gateway device integrated with the primary management device After the third AP integrated with the power adapter actively detects the registration window, apply for joining, and send an information message to the gateway device integrated with the primary management device, where the information packet carries the parameter of the third AP, and the parameter includes the third Vendor information such as the device type and device serial number of the AP and its integrated power adapter may also include parameter information such as device identification, communication address, and empty configuration.
- the gateway device queries the remote server of the third device according to the vendor information of the third AP to query the master key of the third device (the gateway device can establish a secure channel with the remote server of the vendor through a protocol such as TR069), using the provider's
- the response information of the remote server is found in the third AP according to the vendor information of the third AP, such as the device serial number, and obtains the master key of the third AP.
- the gateway device uses the master key of the third AP to initiate the two-way authentication to the third AP.
- the authentication may be performed by using the X.1035 protocol specified by the ITU.
- the process of the authentication is similar to the step 303, and details are not described herein.
- the gateway device establishes a secure channel with the third AP.
- the third AP uses the same master key corresponding to the two networks because it is used to establish a wireless WiFi network and a power line network at the same time.
- a power line network is taken as an example for description. It should be noted that the method described in this embodiment is also applicable to the coaxial network.
- the method for configuring an access device is applied to the following application scenarios:
- the user's home network is expanding, and the terminal device computer needs to access the access device through the power line network, and the main management device as the access device is already built in the home.
- the gateway device the main management device is used to manage the power line network, but since the terminal device computer does not have a built-in power adapter for power line communication, it is necessary to access the power adapter in the home network, and then Related devices are configured.
- the power adapter is first connected to the home network, and the network structure is as shown in FIG. 10. One end of the power adapter is connected to the computer through the Ethernet, and the other end is connected to the home gateway device through the power line network.
- the primary management device is connected.
- the basic technical solution of the method in this embodiment is as follows:
- the power adapter cannot establish a secure channel with the primary management device because it does not know the master key of the primary management device; but the primary management device can allow the information packet sent by the power adapter to be accessed through the power line network.
- the specified destination address such as a home gateway device; the user terminal device can then access the gateway device through the power adapter to obtain a master key of the master management device integrated in the gateway device.
- the terminal device can configure the power adapter by using the master key of the master management device, and the configured power adapter can establish a secure channel with the master management device.
- the method for configuring an access device is as shown in Figure 6, which is described in detail as follows:
- the main management device built in the gateway device for managing the power line network periodically sends a registration window message to the power line network.
- the terminal device also periodically sends a topology discovery message for detecting the newly accessed network device.
- the power adapter After receiving the registration window message, the power adapter sends the registration message to the primary management device in the gateway device, where the parameters of the registration message carrying the power adapter include the device type and the unconfigured information. 603.
- the primary management device allows the power adapter to register but does not initiate the authentication process, only authorizing the power adapter to restrict access (eg, only allowing the power adapter to access the gateway device) to establish a temporary channel.
- the power adapter After receiving the topology discovery packet sent by the terminal device, the power adapter sends the information packet to the terminal device, where the information carrying the power adapter includes the device type and the unconfigured information.
- the terminal device After receiving the information message sent by the power adapter, the terminal device starts the certificate authentication with the power adapter, and after the authentication is passed, establishes a secure channel with the power adapter.
- the terminal device connects to the gateway device by using a secure channel established by the power adapter and a temporary channel established by the power adapter and the primary management device.
- the process includes:
- the terminal device receives the account and password input by the user and sends the account and password to the gateway device. 6062.
- the gateway device verifies the account and the password. If the account and the password are correct, the terminal device is considered to be trusted, and the terminal device is established on the application layer. Letter channel.
- the gateway device sends the parameter of the power adapter and the parameter of the primary management device to the terminal device, where the parameter may specifically include information such as a device type, a device identifier, and a communication address.
- the terminal device receives the parameter of the power adapter sent by the gateway device and the parameter of the primary management device, and determines whether the parameter of the power adapter sent by the gateway device is consistent with the parameter of the power adapter sent by the power adapter, and if yes, executing Next step.
- the terminal device specifies the identifier information for the power adapter, where the identifier information is specifically a device identifier number.
- the identification information may be automatically specified by the terminal device according to a pre-configured program for the access device, or may be manually specified by the user through the terminal device. When manually specifying identification information, the steps are as follows:
- the 6092 Receive a determination signal input by the user. If the determination is yes, the identifier information specified by the user for the power adapter is received; the identifier information may be a device identification number.
- the terminal device ⁇ sends the identification information specified by the power adapter to the gateway device.
- the gateway device may perform corresponding configuration on the built-in primary management device according to the identifier information.
- the gateway device sends the master key of the primary management device to the terminal device before, after, or after the step of configuring the primary management device.
- the gateway device may encrypt the master key of the primary management device and send it to the terminal device, for example, encrypt the master key of the primary management device by using the user's account and password. 613.
- the terminal device After receiving the master key of the master management device, if the master key is encrypted, the terminal device decrypts first, and then stores it locally. A prompt option is then displayed for the user to select whether to access the access device.
- the terminal device configures the power adapter according to the power adapter's master key and device identification information through a secure channel established with the power adapter.
- the power adapter initiates a registration and authentication process to the primary management device according to the master key and the device identification information of the primary management device, and the authentication process is the same as the authentication process of the gateway device and the AP in the third embodiment (step 303). The same, no longer here - repeat. After the authentication is successful, the two establish a secure channel.
- the power adapter After the safety channel is successfully established, the power adapter sends a connection success message to the terminal device and is displayed by the terminal device. After the security channel is successfully established, the gateway device also sends the connection success message terminal device and is displayed by the terminal device. At this time, the gateway device is connected. After the broadband provider's external broadband network, the terminal can connect to the external broadband network through the power adapter and the gateway device of the built-in main management device in turn, and the user can freely swim the network.
- all steps requiring the user to confirm or input information can be replaced by automatically configuring the corresponding program in the device in advance.
- a gateway device mainly includes an obtaining unit 701, a sending unit 702, a receiving unit 703, and a configuration unit 704. Further, a determining unit may be further included.
- the obtaining unit 701 is configured to obtain a type of the access device and a master key.
- the sending unit 702 is configured to send the type of the access device to the terminal device.
- the receiving unit 703 is configured to receive a response message of the terminal device, where the response message carries the identifier information specified by the terminal device according to the type of the access device.
- the configuration unit 704 is configured to configure the access device according to the master key and the identifier information of the access device.
- the determining unit is configured to determine whether there is a configured access device corresponding to the identifier information, and if yes, allocate an idle channel for the unconfigured access device, otherwise randomly allocate a channel for the unconfigured access device.
- the obtaining unit 701 may further include:
- a first sending unit configured to send a topology detection message to the access device
- the first receiving unit is configured to receive a first information packet that is sent by the access device, where the first information packet carries the type of the access device and the null configuration information;
- An authentication unit configured to send an authentication request to the access device after receiving the null configuration information
- the second receiving unit is configured to receive a second information message that is sent by the access device after the authentication, and the second information message carries the master key of the access device.
- the gateway device can obtain the type of the access device and the master key, and send the type of the access device to the terminal device, and receive the identifier information specified by the terminal device for the access device, according to the master key and the identifier information of the access device.
- Configure the access device The gateway device automatically configures the access device. After the configuration is complete, the terminal device can access the access device through the master key of the access device. During the entire configuration process, the user does not need to remember the master of each access device. The key does not need to be manually configured before the terminal device is connected to each access device. Example VIII.
- a terminal device mainly includes a receiving unit 801, a specifying unit 802, and a sending unit 803, and further includes a configuration unit 804.
- the receiving unit 801 is configured to receive a type of the access device that is sent by the gateway device, and is further configured to receive a master key of the access device that is sent by the gateway device.
- the specifying unit 802 is configured to specify identification information for the access device according to the type of the access device.
- the sending unit 803 sends a response message to the gateway device, where the response message carries the identifier information specified by the access device.
- the configuration unit 804 is configured to configure the terminal device itself according to the master key and the identifier information of the access device.
- the specifying unit may further include:
- the receiving unit is configured to receive the selection signal of the user and the information input by the user
- the processing unit is configured to specify the information input by the user as the identification information to the access device.
- the terminal device may specifically be a computer, a mobile phone or a set top box.
- the terminal device obtains the type and the master key of the access device by using the gateway device, and specifies the identifier information for the access device according to the type of the access device, and sends the identifier information to the gateway device, and the gateway device configures the access device, and then
- the terminal device can configure the access device by using the master key and the identification information of the access device. After the configuration is complete, the terminal device can access the access device.
- the user does not need to remember the master key of each access device, nor does it need to manually configure the access device before connecting the terminal device to each access device.
- a communication system please refer to FIG. 13, which mainly includes a gateway device 901, a terminal device 902, and an access device 903.
- the gateway device 901 is connected to the terminal device 902 and the access device 903, respectively.
- the gateway device 901 is configured to acquire a type master key of the access device, send the type of the access device to the terminal device, and receive a response message of the terminal device, where the response message carries the identifier information specified by the terminal device for the access device, according to the identifier information.
- the access device is configured with the master key and identification information of the device.
- the terminal device 902 is configured to receive the type of the access device sent by the gateway device, and specify the identifier information for the access device according to the type of the access device, and send a response message to the gateway device, where the response message carries the identifier information specified by the access device. .
- the access device is automatically configured by the gateway device, and then the terminal device can access the access device by using the master key of the access device.
- the technical solution eliminates the need for the user to remember the master key of each access device, and does not need to manually configure the access device before accessing the terminal device to each access device, thereby reducing the user's Requirement, reducing the burden on users.
- Field Jintong sorcerer can
- the program can be executed by instructing related hardware.
- the program can be stored in a computer readable storage medium.
- the storage medium can include: Read-Only Memory (ROM), Random Access Memory (RAM, Random) Access Memory ), disk or CD, etc.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Description
配置接入设备的方法、 装置及系统 本申请要求于 2010年 9月 9日提交中国专利局、申请号为 201010279931.1、 发明名称为"配置接入设备的方法、装置及系统"的中国专利申请的优先权,其全 部内容通过引用结合在本申请中。 技术领域
本发明涉及通信技术领域, 具体涉及接入设备的配置方法、 装置及系统。 背景技术
随着网络业务的蓬勃发展, 如何更好的利用现有网络的资源, 安全、 高速、 方便、 快捷的接入网络正在得到广泛的关注。 在现有技术中, 常用的网络为有 线宽带网络, 包括小区局域网 (LAN, Local Area Network )和非对称数字用户 环路 (ADSL, Asymmetric Digital Subscriber Loop )。 为提高网络性能和用户体 验, 其它类型的网络如无线网络、 电力线通信、 同轴通信等也都得到了迅速发 展。
一般架设无线网络的基本配置是利用无线网卡和无线访问节点( AP, Access Point ), 采用无线的模式, 配合既有的有线网络架构来分享网络资源。 AP又称 为桥接器, 在媒体存取控制层(MAC, Media Access Control ) 中扮演无线工作 站和有线局域网络桥梁的角色, 类似于有线局域网络中的集线器(HUB )。 通常 无线网络采用以下方式进行架设: 首先有线宽带网络(ADSL、 小区 LAN )运营 商通过在用户的家庭安装网关设备实现宽带到户, 其次在网关连接一台 AP (或 者网关集成有 AP功能), 然后在用户的电脑等终端设备中安装一块有线网卡, 对 AP进行配置后终端设备即可通过无线网络连接 AP进而连接到运营商的有线 宽带网络中。 由于无线网络的移动性好, 且架设费用和复杂程度远远低于传统 的有线网络, 因而在家庭网络、 企业网络和热点覆盖等应用场景开始大量采用 无线局域网技术(WiFi, Wireless Fidelity )作为接入手段。 近年来, WiFi技术 得到普及发展逐步成为主流技术, 智能手机、 便携机、 打印机等多种终端设备 也都开始集成 WiFi技术。
采用国际电信联盟 ( ITU, International Telecommunication Union )的家庭有 线网络标准( G.hn )的电力线通信和同轴通信等有线通信技术( ITU G.hn )的架 设采用与无线局域网络类似的网络结构, 其基本配置是利用网络适配器和网络 协调器(或者网络主管理设备)。 与 AP类似, 网络协调器 (或者网络主管理设 备)扮演网络桥梁的角色。 通常电力线通信和同轴通信采用以下方式进行架设: 首先有线宽带网络运营商通过在用户的家庭安装网关设备实现宽带到户, 其次 在网关连接网络协调器(或者网络主管理设备), 然后在用户的电脑等终端设备 连接一个电力线或者同轴通信的网络适配器(或网卡), 对网络协调器(或者网 络主管理设备)进行配置后终端设备即可通过电力线通信和同轴通信网络连接 网络协调器(或者网络主管理设备)进而连接到运营商的有线宽带网络中。
随着网络业务的日益丰富, 用户通过网络进行购物、 转账、 拍卖等行为的 增加, 人们对网络的安全要求越来越高。 WiFi联盟、 ITU等组织不仅在 WiFi、 G.hn等技术中加入了安全机制, 而且在不断改进改安全机制。 现有技术中, 该 安全机制的大致原理如下: 终端设备和接入设备预先配置主密钥, 通过可信的 安全密钥交换协议, 根据通信双方的主密钥衍生出临时密钥, 在通信中通过临 时密钥对通信数据进行加密。
在实际的通信中,用户终端设备在接入到 AP、网络协调器或主管理设备(以 下统称为接入设备)之前, 用户必须要知道接入设备的网络标识及其接入密码 (密钥)。 以 WiFi 为例, 用户必须要知道待接入无线局域网络的服务集标识 ( SSID, Service Set Identifier )及其所属加密方式的密码(主密钥), 才能接入 AP中。 并且, 终端设备要接入到不同的接入设备, 就需要不同的密钥。
当用户的终端设备要接入到某接入设备之前, 用户必须要对给接入设备进 行一定的配置, 即输入该接入设备的标识信息及其接入密码(即主密钥), 获得 接入设备的许可后, 其终端设备才能接入该接入设备。 通常, 用户的家庭网络 中可能配备有多台接入设备, 那么用户就必需要知道并记住所有接入设备的网 络标识及其主密钥, 以分别对每台接入设备进行一定的配置。 上述对接入设备 进行一定配置的过程需要一定的技术常识, 可能需要运营商 (或销售商)上门 解决或者通过电话进行指导; 并且分别对每个接入设备进行一定配置的过程需 要消耗用户较多精力和时间, 在此过程中用户必须要知道所有接入设备的网络
标识和主密钥。 发明内容
本发明实施例提供一种配置接入设备的方法、 装置及系统。
一种配置接入设备的方法, 包括:
获取接入设备的类型和主密钥;
将接入设备的类型发送给终端设备;
接收终端设备的响应消息, 该响应消息携带终端设备根据接入设备的类型 为接入设备指定的标识信息;
根据接入设备的主密钥和标识信息对接入设备进行配置。
一种网关设备, 包括:
获取单元, 用于获取接入设备的类型和主密钥;
发送单元, 用于将接入设备的类型发送给终端设备;
接收单元, 用于接收终端设备的响应消息, 该响应消息携带终端设备根据 接入设备的类型为接入设备指定的标识信息;
配置单元, 用于根据接入设备的主密钥和标识信息对接入设备进行配置。 一种终端设备, 包括:
接收单元, 用于接收网关设备发送的接入设备的类型;
指定单元, 用于根据接入设备的类型为接入设备指定标识信息;
发送单元, 用于发送响应消息给网关设备, 该响应消息携带为接入设备指 定的标识信息。
一种通信系统, 包括网关设备、 终端设备及接入设备, 网关设备分别与终 端设备和接入设备相连;
网关设备, 用于获取接入设备的类型和主密钥, 将接入设备的类型发送给 终端设备, 接收终端设备的响应消息, 该响应消息携带终端设备根据接入设备 的类型为接入设备指定的标识信息, 根据接入设备的主密钥和标识信息对接入 设备进行配置;
终端设备, 用于接收网关设备发送的接入设备的类型, 根据接入设备的类 型为接入设备指定标识信息, 发送响应消息给网关设备, 该响应消息携带为接
入设备指定的标识信息。
本发明实施例采用的技术方案中 , 网关设备获取接入设备的类型和主密钥, 将接入设备的类型发送给终端设备并接收终端设备为接入设备指定的标识信 息, 然后根据接入设备的主密钥和标识信息对接入设备进行配置。 该技术方案 实现了由网关设备对接入设备统一进行自动配置, 使用户不需要在将终端设备 接入每台接入设备之前对该接入设备进行手工配置, 从而降低了对用户的要求, 减轻了用户的负担。 附图说明
图 1是本发明实施例一的配置接入设备的方法的基本流程示意图;
图 2是本发明实施例二的配置接入设备的方法的基本流程示意图;
图 3是本发明实施例三的配置接入设备的方法的基本流程示意图;
图 4是本发明实施例四的配置接入设备的方法的基本流程示意图;
图 5是本发明实施例五的配置接入设备的方法的基本流程示意图;
图 6是本发明实施例六的配置接入设备的方法的基本流程示意图;
图 7是本发明实施例三的配置接入设备的方法的网络结构示意图;
图 8是本发明实施例四的配置接入设备的方法的网络结构示意图;
图 9是本发明实施例五的配置接入设备的方法的网络结构示意图;
图 10是本发明实施例六的配置接入设备的方法的网络结构示意图; 图 11是本发明实施例七的网关设备的逻辑结构示意图;
图 12是本发明实施例八的终端设备的逻辑结构示意图;
图 13是本发明实施例九的通信系统的逻辑结构示意图。 具体实施方式
本发明实施例提供一种配置接入设备的方法, 包括: 获取接入设备的类型 和主密钥, 将接入设备的类型发送给终端设备, 接收终端设备的响应消息, 该 响应消息携带终端设备根据接入设备的类型为接入设备指定的标识信息, 根据 接入设备的主密钥和标识信息对接入设备进行配置。 本发明实施例还提供相应 的装置和系统, 包括网关设备和终端设备及通信系统。 以下分别进行详细说明。 实施例一、
一种网关设备配置接入设备的方法, 请参考图 1, 主要包括以下步骤:
101、 网关设备获取接入设备的类型和主密钥。
网关设备发送拓朴侦测报文给接入设备, 接入设备收到该拓朴侦测报文后 回应第一信息报文, 上报接入设备的类型和空配置信息给网关设备, 网关设备 收到该空配置信息后向接入设备发送认证请求, 认证通过后, 接入设备回应第 二信息报文, 上报接入设备的主密钥给网关设备。 认证的方式可以是证书(CA, Certificate Authority )认证。 为了提高安全性, 接入设备可以利用证书的密钥对 接入设备的主密钥加密后再发送给网关设备。
102、 网关设备将接入设备的类型发送给终端设备。
网关设备可以通过以太网或者其它已建立的安全通道, 例如安全外壳协议 ( SSH, Secure Shell )通道连接到终端设备, 上报接入设备的设备类型给终端设 备。
103、 接收终端设备的响应消息, 该响应消息携带终端设备根据接入设备的 类型为接入设备指定的标识信息。
为接入设备指定的标识信息, 可以是终端设备根据接入设备的类型自动指 定的标识信息, 也可以是终端设备将接入设备的类型显示出来, 由用户确认是 否接入并根据接入设备的类型输入的标识信息。 当接入设备为 AP时, 该标识信 息是待接入网络的服务集标识信息(SSID ); 当接入设备为网络协调器或主管理 设备时, 该标识信息则是该网络协调器或主管理设备的设备标识号信息。
104、 根据接入设备的主密钥和标识信息对接入设备进行配置。
对接入设备进行相应配置后, 终端设备即可利用接入设备的主密钥接入该 接入设备。
本发明实施例中, 接入设备可以是 AP、 网络协调器、 主管理设备、 路由器、 数字用户线路接入复用器( DSLAM, Digital Subscriber Line Access Multiplexer )、 复用器单元(MXU, Multiplexer Unit )、光线路终端(OLT, optical line terminal ) 等, 网关设备可以是家庭网关等, 终端设备可以是个人电脑、 移动电话、 机顶 盒等。
本发明实施例的技术方案实现了网关设备对接入设备的自动配置。 在配置 完成后终端设备即可以通过接入设备的主密钥访问接入设备; 在整个配置过程
中, 用户不需要去记住每台接入设备的主密钥, 也不需要在将终端设备接入每 台接入设备之前对该接入设备进行手工配置。 实施例二、
一种终端设备配置接入设备的方法, 请参考图 2, 主要包括以下步骤:
201、 终端设备接收网关设备发送的接入设备的类型。
终端设备可以通过以太网或者其它已建立的安全通道, 例如安全外壳协议 ( SSH, Secure Shell )通道与网关设备连接,接收网关设备发送的接入设备的类 型。
202、 根据接入设备的类型为接入设备指定标识信息。
可以由终端设备利用预先配置的程序根据接入设备的类型为接入设备自动 指定标识信息, 也可以由用户根据接入设备的类型为接入设备指定标识信息。 由用户指定标识信息时, 包括以下步骤: 终端设备显示接入设备的类型和是否 允许连接接入设备的选项, 由用户确认是否接入该接入设备, 是则输入选择信 号并输入作为标识信息的信息, 终端设备接收用户输入的选择信号和信息, 将 用户输入的信息作为标识信息指定给接入设备。 当接入设备为 AP时, 该标识信 息即是待接入无线网络的服务集标识信息(SSID ); 当接入设备为网络协调器或 主管理设备时, 该标识信息则是该网络协调器或主管理设备的设备标识号信息。
203、 终端设备发送响应消息给网关设备, 该响应消息携带为接入设备指定 的标识信息。
终端设备将已为接入设备指定的标识信息通过其与网关设备建立的通道发 送给网关设备。
在网关设备对接入设备进行相应配置后, 终端设备即可利用接入设备的主 密钥接入该接入设备。
在本实施例的一个优选方案中:
步骤 201中, 终端设备还接收网关设备发送的接入设备的主密钥;
还包括步骤 204、 根据接入设备的主密钥和标识信息对终端设备自身进行配 置。
采用该优选方案, 在网关设备对接入设备配置完毕后, 以及终端设备对自
身配置完毕后, 终端设备即可自动接入该接入设备; 在整个配置接入过程中, 无需用户操作, 解决了现有技术中用户需要记住每台接入设备的标识信息和主 密钥并手工为每台接入设备进行配置的问题, 减轻了对用户的要求, 降低了对 用户的负担。
本发明实施例中, 接入设备可以是 AP、 网络协调器、 主管理设备、 路由器、 数字用户线路接入复用器( DSLAM, Digital Subscriber Line Access Multiplexer )、 复用器单元(MXU, Multiplexer Unit )、 光线路终端(OLT, optical line terminal ) 等, 网关设备可以是家庭网关等, 终端设备可以是个人电脑、 移动电话、 机顶 盒等, 与终端设备相连的网络适配器包括电力适配器等视为终端设备的一部分。
本发明实施例的技术方案中终端设备通过网关设备获取接入设备的类型, 根据接入设备的类型为接入设备指定标识信息, 将该标识信息发送网关设备由 网关设备对接入设备进行配置; 从而实现了对接入设备的自动配置。 在优选方 案中, 终端设备还利用接入设备的主密钥和标识信息对自身进行相应的配置, 配置完成后终端设备即可访问接入设备; 在整个配置过程中, 用户不需要去记 住每台接入设备的主密钥, 也不需要在将终端设备接入每台接入设备之前对该 接入设备进行手工配置。 下面利用实施例三至六对本发明实施例的方法做进一步扩展说明: 实施例三、
根据实施例一和实施例二描述的方法, 在本实施例中对配置接入设备的方 法进行更加详细的说明。 请参考图 3和图 7。
本实施例中, 配置接入设备的方法应用于如下的应用场景中:
宽带运营商为用户提供宽带接入服务, 安装了家庭网关设备, 用户自行组 建的家庭网络通过网关设备连接到宽带网络中。 为了更加方便的接入和使用网 络, 用户购买了接入设备 AP准备架设无线网络。 本实施例中, 用户使用的终端 设备以个人电脑为例进行描述, 当然也可以是机顶盒等终端设备; 接入设备则 以 AP为例进行说明。 当然, 本实施例也适用于如下情况, 即用户准备架设的是 电力线网络或同轴线网络时, 此时的区别在于接入设备为网络协调器或主管理 设备。 首先按照图 7所示的网络结构示意图, 将 AP连接到家庭网关设备, 需要注
意的是网关设备和终端设备电脑已连接构成了已有的家庭网络, 然后对接入设 备即 AP进行配置后终端设备电脑即可通过无线网络接入到 AP中。 本实施例中, 配置接入设备的方法如图 3所示, 详述如下:
301、 网关设备定期向网络中发送拓朴侦测报文, 侦测网络中新增加的网络 设备。 该网关设备发送拓朴侦测报文是通过 802.1 AB链路层发现协议(LLDP, Link Layer Discovery Protocol )或通用即插即用协议 (UPnP, Universal Plug and Play)进行的。
302、 当 AP收到网关设备发送的拓朴侦测报文后, 向网关设备发送第一信息 报文, 该第一信息报文携带 AP的参数, 该参数包括 AP的设备类型、 设备标识、 通信地址和空配置等信息。
303、 网关设备接收 AP发送的 AP的参数, 若收到空配置信息即发现 AP的配 置是空的时, 则向 AP发送认证请求, 进行双向认证:
3031、 首先, 网关设备箱 AP发送用于获取具体认证方式的查询报文;
3032、 AP发送回应查询报文给网关设备, 报告其支持的认证方式, 如 证书 (CA )认证;
3033、 该步骤中, AP和网关设备相互交换证书, 双方通过证书确认彼 此都是可信的, 则认证过程完成, 两者建立安全通道。
304、 认证通过后, AP发送其主密钥给网关设备。 为了提高安全性, 可以采 取加密的方式发送 AP的主密钥, 例如利用证书的密钥加密 AP的主密钥。
305、 网关设备接收到 AP的主密钥后, 首先进行解密, 然后建立与 AP的参 数的映射关系, 具体为通信地址、 设备标识和主密钥的映射关系。 其中, AP的 通信地址可以是 AP的媒体访问地址。
306、 网关设备和终端设备通过认证建立安全通道, 该过程详述如下:
3061、首先,终端设备接收用户输入的账号和密码并发送给网关设备, 通过以太网或者其它已建立的安全通道,例如安全外壳协议(SSH, Secure Shell )通道连接到网关设备;
3062、 网关设备验证该账号和密码, 若账号和密码正确, 则认为终端 设备可信, 与终端设备建立安全通道。
307、 网关设备发送 AP的参数给终端设备。 该参数包括 AP的类型, 通常还
可以包括 AP的设备标识和通信地址等。
308、 终端设备接收网关设备发送的 AP的参数。
309、 终端设备根据 AP的类型为该 AP指定标识信息。 可以由终端设备根据 预先配置的程序为接入设备自动指定标识信息, 也可以由用户通过终端设备人 工指定标识信息。 当采用人工指定标识信息时, 步骤如下:
3091、 显示 AP的参数信息和用于用户判断是否接入该 AP的选项; 3092、 接收用户输入的判断信号, 若判断为是, 则接收用户输入的为 AP指定的标识信息; 该标识信息为待接入无线网络的 SSID。
310、 终端设备把为 AP指定的标识信息(SSID )发送给网关设备。
311、 网关设备接收为 AP指定的标识信息(SSID ), 并根据 AP的主密钥和标 识信息(SSID ) 为 AP进行相应的配置。
312、 网关设备发送 AP的主密钥给终端设备。 该步骤可以在步骤 311之前、 同步或者之后执行。 网关设备可以对 AP的主密钥加密后再发送给终端设备, 例 如利用用户的账号和密码对 AP的主密钥进行加密。
以上步骤 301至 312已经对配置接入设备的方法进行了较为详细和完整的说 明。 下面对完成配置之后接入网络的过程进行说明:
313、 终端设备接收到 AP的主密钥后, 首先对加密的 AP的主密钥进行解密 并储存(即记录于本地)。 然后显示提示选项用于用户选择是否接入该 AP。
314、若用户选择接入该 AP, 则终端设备通知其用于 WiFi的网卡启动连接到 SSID所标识的 AP, 利用 AP的主密钥与 AP协商临时密钥, 与 AP通过无线方式建 立起安全连接通道。
315、 终端设备与 AP的连接成功后, AP即通知网关设备连接宽带供应商的 外部宽带网络。 其中, 终端设备与 AP的连接成功后, 终端设备显示连接成功消 息; 网关设备连接外部宽带网络成功后, 终端设备同样显示连接成功消息。
此时, 终端设备已通过 Ap和网关设备连接到外部宽带网络, 用户即可以自 由畅游网络了。
本实施例以架设无线网络时配置 AP为例进行了说明, 需要注意的是, 本实 理设备的配置。 另外, 本实施例的方法中, 所有需要用户确认或输入信息的步
骤都可以通过在设备中预先设置相应的程序进行自动配置来替代。 实施例四、
根据实施例三描述的方法, 在本实施例中对配置接入设备的方法做进一步 详细的说明。 请参考图 4和图 8。
本实施例中, 配置接入设备的方法应用于如下的应用场景中:
在实施例三的基础上, 假设已经架设好的无线网络不能做到有效覆盖, 此 时, 必须接入新 AP进行补充, 以扩展原有无线网络的覆盖范围。 因此在本实施 例的家庭网络中将包括两台 AP, 其中一台为之前接入家庭网络的且已配置的 AP, 另一台为在后接入家庭网络的尚未配置的 AP, 为避免产生歧义, 后文将之 前接入的已配置的 AP称为第一 AP, 将在后接入的未配置的 AP称为第二 AP, 并 且第二 AP和第一 AP使用相同 SSID。 首先, 将第二 AP接入到网关设备, 网络结 构如图 8所示。
本实施例的方法, 如图 4所示, 大部分步骤与实施例三相同, 不同之处主要 在于步骤 311。 本实施例中, 以步骤 411取代步骤 311。
411、 网关设备接收为第二 AP指定的标识信息(SSID )后, 首先检查该 SSID 是否对应有两台 AP (即第一 AP和第二 AP ), 若是, 则为第二 AP分配一个空闲的 工作信道(或新的信道), 以避免与第一 AP的工作信道重叠; 然后根据第二 AP 的主密钥和标识信息(SSID )为 AP进行相应的配置, 配置成功的第二 AP工作在 与第一 AP不同的工作信道上。
本实施例的方法与实施例三的不同之处还可以在于步骤 314, 本实施例中, 可以以步骤 414取代步骤 314。
414、 若用户选择接入第二 AP, 终端设备检查第二 AP发送的广播帧, 根据 广播帧中的 MAC地址在第二 AP中找到对应第二 AP的主密钥, 然后通知其用于 WiFi的网卡启动连接到 SSID所标识的第二 AP , 利用第二 AP的主密钥与第二 AP 协商临时密钥, 与 AP通过无线方式建立起安全通道。 其中, 第二 AP发送的广播 帧通常携带该 SSID所表示无线网络的基本配置信息和第二 AP的通信地址。
本实施例的方法与实施例三的不同之处还可以在于步骤 306, 在实施例三的 步骤 3061中, 终端设备通过以太网或者其它已建立的安全通道, 例如安全外壳
协议(SSH, Secure Shell )通道连接到网关设备; 本实施例中, 终端设备还可以 通过已经架设好的无线网络连接到网关设备。 实施例五、
根据实施例三和实施例四描述的方法, 在本实施例中对配置接入设备的方 法做更进一步详细的说明。 请参考图 5和图 9。
本实施例中, 配置接入设备的方法应用于如下的应用场景中:
在实施例三和四的基础上, 假设已经架设好的无线网络仍不能做到有效覆 盖, 但此时用户的家庭网络包括或支持电力线网络, 接入用户家庭网络的新 AP (以下称第三 AP )集成有支持 G.hn协议的电力线网络适配器(电力适配器), 网 关设备则继承有支持 G.hn协议的主管理设备。 于是, 可以为第三 AP选择合适的 位置, 将第三 AP通过电力线网络连接到网关设备, 网络结构如图 9所示。
本实施例的方法, 如图 5所示, 大部分步骤与实施例三和四相同 (具体为步 骤 305— 310与实施例三相同, 步骤 310之后则与实施例二相同), 不同之处主要 在于步骤 301— 304。 本实施例中, 以步骤 501— 504取代步骤 301— 304。 息, 以检测网络中新增加的网络设备, 当检测到新增加的网络设备时, 开放一 个注册窗口;
502、 集成有电力适配器的第三 AP主动检测到注册窗口后, 申请加入, 发送 信息报文给集成有主管理设备的网关设备, 该信息报文携带第三 AP的参数, 该 参数包括第三 AP及其集成的电力适配器的设备类型及设备序列号等供应商信 息, 还可以包括设备标识、 通信地址及空配置等参数信息。
503、网关设备根据第三 AP的供应商信息连接供应商的远程服务器查询第三 设备的主密钥(网关设备可以通过 TR069等协议与供应商的远程服务器建立起安 全通道), 利用供应商的远程服务器的回应信息,根据第三 AP的供应商信息如设 备序列号在第三 AP中找到并获得第三 AP的主密钥。
504、 网关设备利用第三 AP的主密钥向第三 AP发起双向认证, 该认证可以 通过 ITU指定的 X.1035协议进行, 认证的过程与步骤 303类似, 此处不再赘述。 认证过程完成, 网关设备与第三 AP建立安全通道。
本实施例中, 第三 AP由于同时用于建立无线 WiFi网络和电力线网络, 优选 对应于该两种网络使用相同的主密钥。
本实施例, 以电力线网络为例进行了说明, 需要注意的是, 同轴线网络同 样适用本实施例描述的方法。 实施例六、
根据实施例一和实施例二描述的方法, 在本实施例中对配置接入设备的方 法做详细的说明。 请参考图 6和图 10。
本实施例中, 配置接入设备的方法应用于如下的应用场景中:
在实施例一和二的基石出上, 用户的家庭网络在不断扩展过程中, 其终端设 备电脑需要通过电力线网络接入到接入设备中, 而作为接入设备的主管理设备 已经内置于家庭网关设备中, 该主管理设备用于管理电力线网络, 但终端设备 电脑中由于并未内置用于电力线通信的起桥接作用的电力适配器, 这时便需要 在家庭网络中接入电力适配器, 进而对相关设备进行配置。 本实施例方法实施 前, 首先将电力适配器接入家庭网络中, 网络结构如图 10所示, 该电力适配器 的一端通过以太网和电脑连接, 另一端则通过电力线网络和集成于家庭网关设 备中的主管理设备连接。
本实施例方法的基本技术方案如下: 电力适配器由于不知道主管理设备的 主密钥, 无法与主管理设备建立安全通道; 但是主管理设备可以允许由电力适 配器发送的信息报文经过电力线网络访问指定的目的地址, 例如家庭网关设备; 然后用户终端设备就可以通过电力适配器访问网关设备以获得集成于网关设备 中的主管理设备的主密钥。 之后, 终端设备就可以利用主管理设备的主密钥配 置电力适配器, 配置完成的电力适配器即可与主管理设备建立安全通道。 本实 施例中, 配置接入设备的方法如图 6所示, 详述如下:
601、 内置在网关设备中的用于管理电力线网络的主管理设备周期发送注册 窗口报文到电力线网络。 同时, 终端设备也周期发送拓朴发现报文, 用于侦测 新接入的网络设备。
602、 电力适配器收到注册窗口报文后, 发送注册报文给网关设备中的主管 理设备, 该注册报文携带电力适配器的参数包括其设备类型和未配置信息。
603、 主管理设备允许电力适配器注册但不启动认证过程, 仅授权电力适配 器受限接入(例如, 仅允许电力适配器访问网关设备), 建立临时通道。
604、 电力适配器收到终端设备发送的拓朴发现报文后, 发送信息报文给终 端设备, 该信息报文携带电力适配器的参数包括其设备类型和未配置等信息。
605、 终端设备收到电力适配器发送的信息报文后, 启动与电力适配器的证 书认证, 认证通过后, 与电力适配器建立安全通道。
606、 终端设备通过其与电力适配器建立的安全通道和电力适配器与主管理 设备建立的临时通道连接到网关设备。 该过程包括:
6061、 终端设备接收用户输入的账号和密码并发送给网关设备; 6062、 网关设备验证该账号和密码, 若账号和密码正确, 则认为终端 设备可信, 与终端设备建立在应用层上的可信通道。
607、 网关设备将电力适配器的参数和主管理设备的参数发送至终端设备, 所说参数具体可以包括设备类型、 设备标识, 通信地址等信息。
608、 终端设备接收网关设备发送的电力适配器的参数和主管理设备的参 数, 判断接收自网关设备发送的电力适配器的参数和接收自电力适配器发送的 电力适配器的参数是否一致, 若一致, 则执行下一步。
609、终端设备为电力适配器指定标识信息,该标识信息具体为设备标识号。 可以由终端设备根据预先配置的程序为接入设备自动指定标识信息, 也可以由 用户通过终端设备人工指定标识信息。 当采用人工指定标识信息时, 步骤如下:
6091、显示 AP的参数信息和用于用户判断是否接入该电力适配器的选 项;
6092、 接收用户输入的判断信号, 若判断为是, 则接收用户输入的为 电力适配器指定的标识信息; 该标识信息可以为设备标识号。
610、 终端设备^ ^为电力适配器指定的标识信息发送给网关设备。
611、 网关设备接收该标识信息后, 可以根据该标识信息对内置的主管理设 备进行相应配置。
612、 网关设备在对主管理设备进行配置的步骤之前、 同步或之后发送主管 理设备的主密钥给终端设备。 网关设备可以对主管理设备的主密钥加密后发送 给终端设备, 例如利用用户的账号和密码对主管理设备的主密钥进行加密。
613、 终端设备接收到主管理设备的主密钥后, 若该主密钥进行了加密, 则 首先进行解密, 然后储存在本地。 然后显示提示选项用于用户选择是否接入该 接入设备。
614、 若用户选择接入该接入设备, 则终端设备通过其与电力适配器建立的 安全通道, 根据电力适配器的主密钥和设备标识信息为电力适配器进行相应的 配置。
615、 配置完成后, 电力适配器根据主管理设备的主密钥和设备标识信息向 主管理设备发起注册和认证过程, 该认证过程与实施例三中网关设备与 AP的认 证过程(步骤 303 )基本相同, 此处不再——赘述。 认证成功后, 两者建立安全 通道。
电力适配器在安全通道建立成功后, 发送连接成功消息给终端设备并由终 端设备显示; 网关设备在安全通道建立成功后, 同样发送连接成功消息终端设 备并由终端设备显示; 此时, 网关设备连接宽带供应商的外部宽带网络后, 终 端便可以依次通过电力适配器和内置主管理设备的网关设备连接到外部宽带网 络, 用户即可以自由畅游网络了。
本实施例的方法中, 所有需要用户确认或输入信息的步骤都可以通过在设 备中预先设置相应的程序进行自动配置来替代。
详细说明: 实施例七、
一种网关设备, 请参考图 11, 主要包括获取单元 701、 发送单元 702、 接收 单元 703和配置单元 704, 进一步的, 还可以包括判断单元。
获取单元 701 , 用于获取接入设备的类型和主密钥。
发送单元 702, 用于将接入设备的类型发送给终端设备。
接收单元 703, 用于接收终端设备的响应消息, 该响应消息携带终端设备根 据接入设备的类型为接入设备指定的标识信息。
配置单元 704, 用于根据接入设备的主密钥和标识信息对接入设备进行配 置。
判断单元用于判断是否已有与标识信息对应的已配置接入设备, 若是, 则 为未配置接入设备分配一个空闲信道, 否则为未配置接入设备随机分配一个信 道。
获取单元 701可以进一步包括:
第一发送单元, 用于发送拓朴侦测报文给接入设备;
第一接收单元, 用于接收接入设备回应的第一信息报文, 第一信息报文携 带接入设备的类型和空配置信息;
认证单元, 用于收到空配置信息后, 向接入设备发送认证请求;
第二接收单元, 用于通过认证后, 接收接入设备回应的第二信息报文, 第 二信息报文携带接入设备的主密钥。
该网关设备可以获取接入设备的类型和主密钥, 将接入设备的类型发送给 终端设备, 接收到终端设备为接入设备指定的标识信息, 根据接入设备的主密 钥和标识信息对接入设备进行配置。 该网关设备对接入设备进行自动配置, 配 置完成后终端设备即可以通过接入设备的主密钥访问接入设备; 在整个配置过 程中, 用户不需要去记住每台接入设备的主密钥, 也不需要在将终端设备接入 每台接入设备之前对该接入设备进行手工配置。 实施例八、
一种终端设备, 请参考图 12, 主要包括接收单元 801、 指定单元 802、 发送 单元 803, 进一步的还可以包括配置单元 804。
接收单元 801, 用于接收网关设备发送的接入设备的类型, 还可以用于接收 网关设备发送的接入设备的主密钥。
指定单元 802, 用于根据接入设备的类型为接入设备指定标识信息。
发送单元 803 , 发送响应消息给网关设备, 该响应消息携带为接入设备指定 的标识信息。
配置单元 804, 用于根据接入设备的主密钥和标识信息对终端设备自身进行 配置。
该指定单元可以进一步包括:
指定显示单元, 用于显示接入设备的类型和是否允许连接接入设备的选项;
指定接收单元 , 用于接收用户对选项的选择信号和用户输入的信息; 指定处理单元, 用于将用户输入的信息作为标识信息指定给接入设备。 该终端设备具体可以为电脑、 移动电话或机顶盒等。 该终端设备通过网关 设备获取接入设备的类型和主密钥, 根据接入设备的类型为接入设备指定标识 信息, 将该标识信息发送给网关设备由网关设备对接入设备进行配置 , 随后终 端设备可以利用接入设备的主密钥和标识信息对自身进行相应的配置, 配置完 成后终端设备即可访问接入设备。 在整个配置过程中, 用户不需要去记住每台 接入设备的主密钥, 也不需要在将终端设备接入每台接入设备之前对该接入设 备进行手工配置。 实施例九、
一种通信系统, 请参考图 13, 主要包括网关设备 901、 终端设备 902和接入 设备 903, 网关设备 901分别与终端设备 902和接入设备 903相连。
网关设备 901, 用于获取接入设备的类型主密钥, 发送接入设备的类型给终 端设备, 接收终端设备的响应消息, 该响应消息携带终端设备为接入设备指定 的标识信息, 根据接入设备的主密钥和标识信息对接入设备进行配置。
终端设备 902 , 用于接收网关设备发送的接入设备的类型, 根据接入设备的 类型为接入设备指定标识信息, 发送响应消息给网关设备, 该响应消息携带为 接入设备指定的标识信息。
该通信系统中, 由网关设备对接入设备统一进行自动配置, 随后终端设备 即可凭接入设备的主密钥访问接入设备。 该技术方案使得用户不需要去记住每 台接入设备的主密钥, 也不需要在将终端设备接入每台接入设备之前对该接入 设备进行手工配置, 从而降低了对用户的要求, 减轻了用户的负担。 领域晋通抆术人员可
是可以通过程序来指令相关的硬件来完成, 该程序可以存储于一计算机可读存 储介质中, 存储介质可以包括: 只读存储器 (ROM, Read-Only Memory)、 随机 存取存储器(RAM, Random Access Memory ), 磁盘或光盘等。
以上对本发明实施例所提供的配置接入设备的方法、 装置及系统进行了详细介
, 以上实施
例的说明只是用于帮助理解本发明的方法及其核心思想; 同时, 对于本领域的 一般技术人员, 依据本发明的思想, 在具体实施方式及应用范围上均会有改变 之处, 综上所述, 本说明书内容不应理解为对本发明的限制。
Claims
1、 一种配置接入设备的方法, 其特征在于, 包括:
获取接入设备的类型和主密钥;
将所述接入设备的类型发送给终端设备;
接收所述终端设备的响应消息, 所述响应消息携带所述终端设备根据所述 接入设备的类型为所述接入设备指定的标识信息;
根据所述接入设备的主密钥和标识信息对所述接入设备进行配置。
2、 根据权利要求 1所述的方法, 其特征在于, 所述获取接入设备的类型和 主密钥之后还包括:
将所述接入设备的主密钥发送给终端设备。
3、 根据权利要求 1所述的方法, 其特征在于, 所述获取接入设备的类型和 主密钥具体包括:
发送拓朴侦测报文给接入设备;
接收所述接入设备回应的第一信息报文, 所述第一信息报文携带所述接入 设备的类型和空配置信息;
收到所述空配置信息后, 向所述接入设备发送认证请求;
通过认证后, 接收所述接入设备回应的第二信息报文, 所述第二信息报文 携带所述接入设备的主密钥。
4、 根据权利要求 1所述的方法, 其特征在于, 所述接入设备为未配置接入 设备 , 所述根据所述接入设备的主密钥和标识信息对所述接入设备进行配置之 前还包括:
判断是否已有与所述标识信息对应的已配置接入设备, 若是, 则为所述未 配置接入设备分配一个空闲信道, 否则为所述未配置接入设备随机分配一个信 道。
5、 一种网关设备, 其特征在于, 包括:
获取单元, 用于获取接入设备的类型和主密钥;
发送单元, 用于将所述接入设备的类型发送给终端设备;
接收单元, 用于接收所述终端设备的响应消息, 所述响应消息携带所述终 端设备根据所述接入设备的类型为所述接入设备指定的标识信息;
配置单元, 用于根据所述接入设备的主密钥和标识信息对所述接入设备进 行配置。
6、 根据权利要求 5所述的网关设备, 其特征在于, 所述获取单元进一步包 括:
第一发送单元, 用于发送拓朴侦测报文给接入设备;
第一接收单元, 用于接收所述接入设备回应的第一信息报文, 所述第一信 息报文携带所述接入设备的类型和空配置信息;
认证单元, 用于收到所述空配置信息后, 向所述接入设备发送认证请求; 第二接收单元, 用于通过认证后, 接收所述接入设备回应的第二信息报文, 所述第二信息 4艮文携带所述接入设备的主密钥。
7、 根据权利要求 5所述的网关设备, 其特征在于, 还包括:
判断单元, 用于判断是否已有与所述标识信息对应的已配置接入设备, 若 是, 则为所述未配置接入设备分配一个空闲信道, 否则为所述未配置接入设备 随机分配一个信道。
8、 一种终端设备, 其特征在于, 包括:
接收单元, 用于接收网关设备发送的接入设备的类型;
指定单元, 用于根据所述接入设备的类型为所述接入设备指定标识信息; 发送单元, 用于发送响应消息给所述网关设备, 所述响应消息携带为所述 接入设备指定的标识信息。
9、 根据权利要求 8所述的终端设备, 其特征在于, 还包括配置单元; 所述接收单元, 还用于接收网关设备发送的接入设备的主密钥;
所述配置单元, 用于根据所述接入设备的主密钥和标识信息对终端设备自 身进行配置。
10、 根据权利要求 8或 9所述的终端设备, 其特征在于, 所述指定单元进一 步包括: 备的选项;
指定接收单元, 用于接收用户对所述选项的选择信号和用户输入的信息; 指定处理单元, 用于将所述用户输入的信息作为标识信息指定给所述接入 设备。
11、 一种通信系统, 其特征在于, 包括网关设备、 终端设备及接入设备, 所述网关设备分别与所述终端设备和所述接入设备相连;
所述网关设备, 用于获取接入设备的类型和主密钥, 将所述接入设备的类 型发送给终端设备, 接收所述终端设备的响应消息, 所述响应消息携带所述终 端设备根据所述接入设备的类型为所述接入设备指定的标识信息 , 根据所述接 入设备的主密钥和标识信息对所述接入设备进行配置;
所述终端设备, 用于接收网关设备发送的接入设备的类型, 根据所述接入 设备的类型为所述接入设备指定标识信息, 发送响应消息给所述网关设备, 所 述响应消息携带为所述接入设备指定的标识信息。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010279931.1 | 2010-09-09 | ||
CN201010279931.1A CN102137395B (zh) | 2010-09-09 | 2010-09-09 | 配置接入设备的方法、装置及系统 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2011144174A1 true WO2011144174A1 (zh) | 2011-11-24 |
Family
ID=44297030
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2011/075351 WO2011144174A1 (zh) | 2010-09-09 | 2011-06-03 | 配置接入设备的方法、装置及系统 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN102137395B (zh) |
WO (1) | WO2011144174A1 (zh) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104735813A (zh) * | 2015-03-10 | 2015-06-24 | 小米科技有限责任公司 | 网络连接建立方法和装置 |
US9686128B2 (en) | 2012-10-25 | 2017-06-20 | Schneider Electric Industries Sas | Wireless network adapter and self-configuration method of same |
CN116032591A (zh) * | 2022-12-23 | 2023-04-28 | 迈普通信技术股份有限公司 | 一种哑终端仿冒识别方法及系统 |
Families Citing this family (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP6019950B2 (ja) * | 2011-09-13 | 2016-11-02 | ソニー株式会社 | 電力供給装置および方法、並びにプログラム |
CN102394840A (zh) * | 2011-11-11 | 2012-03-28 | 刘显福 | 一种通信实现方法及其器件 |
CN103079186B (zh) * | 2012-03-05 | 2015-07-22 | 上海寰创通信科技股份有限公司 | 一种基于无线网络环境的许可证信息传输方法 |
ES2565662T3 (es) | 2012-08-24 | 2016-04-06 | Huawei Device Co., Ltd. | Método de configuración de dispositivo de red de área local inalámbrica, dispositivo y sistema correspondientes |
CN102843686A (zh) * | 2012-09-14 | 2012-12-26 | 惠州Tcl移动通信有限公司 | 一种无线网络系统及便携式电子设备 |
WO2015021595A1 (zh) * | 2013-08-13 | 2015-02-19 | 华为技术有限公司 | 业务通道配置方法和光线路终端以及无源光网络 |
CN103634177B (zh) * | 2013-12-05 | 2016-08-17 | 北京东土科技股份有限公司 | 基于网络业务的组态实现方法和系统 |
CN105323598B (zh) * | 2014-07-28 | 2020-03-10 | 中兴通讯股份有限公司 | 一种机顶盒管理方法、装置及系统 |
US9591554B2 (en) * | 2014-09-10 | 2017-03-07 | Microsoft Technology Licensing, Llc | Management capabilities for a wireless docking experience |
US10319215B2 (en) | 2014-12-19 | 2019-06-11 | Huawei Technologies Co., Ltd. | Anti-theft method and apparatus |
CN104869612B (zh) * | 2015-04-30 | 2019-05-10 | 小米科技有限责任公司 | 接入网络的方法及装置 |
CN105182774A (zh) * | 2015-09-15 | 2015-12-23 | 烽火通信科技股份有限公司 | 基于G.hn的智能家庭网关控制系统及方法 |
CN105677418B (zh) * | 2016-01-08 | 2018-10-23 | 烽火通信科技股份有限公司 | 在接入设备中实现多个不同语音协议的方法及系统 |
CN106302415A (zh) * | 2016-08-03 | 2017-01-04 | 杭州晟元数据安全技术股份有限公司 | 一种验证设备合法性和对合法设备自动配网的方法 |
US10530748B2 (en) | 2016-10-24 | 2020-01-07 | Fisher-Rosemount Systems, Inc. | Publishing data across a data diode for secured process control communications |
US10270745B2 (en) * | 2016-10-24 | 2019-04-23 | Fisher-Rosemount Systems, Inc. | Securely transporting data across a data diode for secured process control communications |
CN112910767B (zh) * | 2016-12-22 | 2022-08-26 | 华为技术有限公司 | 选择网关的方法、设备和系统 |
CN109818903B (zh) * | 2017-11-21 | 2021-07-23 | 中国电信股份有限公司 | 数据传输方法、系统、装置和计算机可读存储介质 |
CN109818734B (zh) * | 2017-11-21 | 2021-07-27 | 中国移动通信有限公司研究院 | 一种基本密钥分发方法、装置和介质 |
CN108174401B (zh) * | 2018-01-05 | 2020-12-22 | 深圳市海亿康科技有限公司 | 一种电力线网络中管理设备的识别方法 |
CN108282551B (zh) * | 2018-03-07 | 2021-04-09 | 成都众网行科技有限公司 | 报文识别处理方法、装置、监听设备及可读存储介质 |
CN108900306A (zh) * | 2018-07-02 | 2018-11-27 | 四川斐讯信息技术有限公司 | 一种无线路由器数字证书的产生方法及系统 |
CN111918306B (zh) * | 2020-07-28 | 2022-03-11 | 烽火通信科技股份有限公司 | 一种在ip不可达场景下实现网元通信的方法及系统 |
CN116321195A (zh) * | 2023-03-10 | 2023-06-23 | 先临三维科技股份有限公司 | 无线配网方法、装置、设备及系统 |
CN116527260B (zh) * | 2023-07-03 | 2023-12-01 | 广东电网有限责任公司佛山供电局 | 一种电网通讯系统的接入方法、装置、设备和介质 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101568189A (zh) * | 2008-04-25 | 2009-10-28 | 三星电子株式会社 | 设置装置的无线局域网的方法和设备 |
CN101621433A (zh) * | 2008-07-02 | 2010-01-06 | 上海华为技术有限公司 | 接入设备的配置方法、装置及系统 |
CN101668290A (zh) * | 2008-09-04 | 2010-03-10 | 深圳华为通信技术有限公司 | 一种wlan网络配置方法及装置 |
CN101772053A (zh) * | 2008-12-05 | 2010-07-07 | 华为终端有限公司 | 一种终端设备配置方法、装置、终端及终端设备 |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100527894C (zh) * | 2003-03-27 | 2009-08-12 | 汤姆森许可公司 | 无线接入点之间的安全漫游 |
CN1859085A (zh) * | 2005-08-12 | 2006-11-08 | 华为技术有限公司 | 无线局域网中密钥下发的方法 |
US7746868B2 (en) * | 2008-01-25 | 2010-06-29 | Cisco Technology, Inc. | Transporting multi-basic service set (BSS) frames over wired medium preserving BSS-ID |
CN101772188B (zh) * | 2008-12-29 | 2012-07-11 | 华为技术有限公司 | 配置毫微接入点寻呼组和邻居小区列表的方法、服务器及系统 |
-
2010
- 2010-09-09 CN CN201010279931.1A patent/CN102137395B/zh active Active
-
2011
- 2011-06-03 WO PCT/CN2011/075351 patent/WO2011144174A1/zh active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101568189A (zh) * | 2008-04-25 | 2009-10-28 | 三星电子株式会社 | 设置装置的无线局域网的方法和设备 |
CN101621433A (zh) * | 2008-07-02 | 2010-01-06 | 上海华为技术有限公司 | 接入设备的配置方法、装置及系统 |
CN101668290A (zh) * | 2008-09-04 | 2010-03-10 | 深圳华为通信技术有限公司 | 一种wlan网络配置方法及装置 |
CN101772053A (zh) * | 2008-12-05 | 2010-07-07 | 华为终端有限公司 | 一种终端设备配置方法、装置、终端及终端设备 |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9686128B2 (en) | 2012-10-25 | 2017-06-20 | Schneider Electric Industries Sas | Wireless network adapter and self-configuration method of same |
CN104735813A (zh) * | 2015-03-10 | 2015-06-24 | 小米科技有限责任公司 | 网络连接建立方法和装置 |
CN104735813B (zh) * | 2015-03-10 | 2019-05-21 | 小米科技有限责任公司 | 网络连接建立方法和装置 |
CN116032591A (zh) * | 2022-12-23 | 2023-04-28 | 迈普通信技术股份有限公司 | 一种哑终端仿冒识别方法及系统 |
Also Published As
Publication number | Publication date |
---|---|
CN102137395A (zh) | 2011-07-27 |
CN102137395B (zh) | 2014-07-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2011144174A1 (zh) | 配置接入设备的方法、装置及系统 | |
US9444639B2 (en) | Multi-tier wireless home mesh network with a secure network discovery protocol | |
US10749749B2 (en) | Automatic configuration of a wireless residential access network | |
US8959601B2 (en) | Client configuration during timing window | |
US7302256B1 (en) | Viral wireless discovery and configuration mechanism for wireless networks | |
US8036183B2 (en) | Method and system for transporting configuration protocol messages across a distribution system (DS) in a wireless local area network (WLAN) | |
WO2010096997A1 (zh) | 一种以本地mac模式实现会聚式wapi网络架构的方法 | |
WO2007045147A1 (fr) | Procede, systeme et terminal de reseau d’acces du terminal de reseau local sans fil | |
US8036639B2 (en) | Method and system for confirming secure communication network setup in a wireless local area network (WLAN) | |
WO2013091494A1 (zh) | 一种无线中继设备的中继方法及无线中继设备 | |
WO2018196587A1 (zh) | 融合网络中的用户认证方法及装置 | |
WO2008098510A1 (fr) | Procédé et appareil d'acquisition d'informations de contrôleur d'accès dans un réseau local sans fil | |
WO2006074592A1 (fr) | Procede et dispositif de prise en charge de reseaux logiques multiples dans un reseau wlan | |
WO2007045134A1 (fr) | Systeme de communication et procede de communication | |
WO2009082910A1 (fr) | Procédé et dispositif de configuration de réseau pour un terminal d'utilisateur | |
WO2010096995A1 (zh) | 一种以分离mac模式实现会聚式wapi网络架构的方法 | |
WO2010096996A1 (zh) | 以本地mac模式实现wapi与capwap融合方法 | |
WO2010096998A1 (zh) | 以分离mac模式实现会聚式wapi网络架构的方法 | |
WO2022174652A1 (zh) | 智能终端自动发现配网方法及系统 | |
WO2010097003A1 (zh) | 以分离mac模式实现wapi与capwap融合方法 | |
WO2010097004A1 (zh) | 一种以分离mac模式实现wapi与capwap融合的方法 | |
KR102063819B1 (ko) | Sdn 기반 무선랜 디바이스의 연결성 관리 시스템 | |
WO2015042917A1 (zh) | 无线安全接入方法、装置及系统 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 11783091 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 11783091 Country of ref document: EP Kind code of ref document: A1 |