WO2012016473A1 - 无线保真接入方法、接入点及无线保真接入系统 - Google Patents

无线保真接入方法、接入点及无线保真接入系统 Download PDF

Info

Publication number
WO2012016473A1
WO2012016473A1 PCT/CN2011/074959 CN2011074959W WO2012016473A1 WO 2012016473 A1 WO2012016473 A1 WO 2012016473A1 CN 2011074959 W CN2011074959 W CN 2011074959W WO 2012016473 A1 WO2012016473 A1 WO 2012016473A1
Authority
WO
WIPO (PCT)
Prior art keywords
access
access point
wireless client
user
command
Prior art date
Application number
PCT/CN2011/074959
Other languages
English (en)
French (fr)
Inventor
李劲
Original Assignee
华为终端有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为终端有限公司 filed Critical 华为终端有限公司
Publication of WO2012016473A1 publication Critical patent/WO2012016473A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to a Wi-Fi access method, an access point, and a Wi-Fi access system.
  • Wi-Fi Wireless Fidelity
  • Wi-Fi technology has been widely used in notebook computers, netbooks, smart phones and personal navigation devices since its inception. With the increase of wireless client STAs (STAtion) using Wi-Fi technology, the availability of Wi-Fi hotspots is also higher. How to provide reliable and continuous Wi-Fi connection for STA users anytime and anywhere. It has become a concern of major operators and equipment manufacturers.
  • the functional block diagram of the wireless data terminal is as shown in FIG. 1 , including a wireless module and a CPU (Center). Processing Unit, central processing unit) and Wi-Fi access point module.
  • the wireless module is used for connecting with a wireless wide area network
  • the CPU is responsible for transmitting data between the wireless module and the Wi-Fi access point module
  • the Wi-Fi access point module is used for providing an access point (Access) The Point, AP) function, such that the wireless data terminal acting as the access point AP can connect the STA applying the Wi-Fi technology to the wireless wide area network.
  • FIG. 2 is a schematic diagram showing the appearance of the wireless data terminal, and the wireless data terminal has a screen and a button (including a button 1 and a button 2).
  • the screen is used to display various statuses of the wireless data terminal, such as wireless network connection status, traffic indication, battery power and other information.
  • the buttons can be used to switch wireless data terminals or to select wireless data terminal functions.
  • the wireless data terminal has a battery, which can meet the Internet access requirement of 3 to 5 hours, so that the wireless data terminal has portability and can be carried to a place other than the home for wireless network connection.
  • the networking structure of the wireless data terminal and other devices is as follows: a Wi-Fi device such as a mobile phone or a mobile Internet access device accesses a wireless data terminal as an access point AP through a Wi-Fi protocol, and then a wireless data terminal. Access to the wireless WAN.
  • a Wi-Fi device such as a mobile phone or a mobile Internet access device accesses a wireless data terminal as an access point AP through a Wi-Fi protocol, and then a wireless data terminal. Access to the wireless WAN.
  • the Wi-Fi protocol has defined several access security mechanisms, such as MAC (Media Access). Control, Media Access Control) Address Filtering Mechanism and WPA (Wi-Fi Protected Access, Wi-Fi Protected Access), WPA2 mechanism.
  • MAC Media Access
  • Control Media Access Control
  • WPA Wi-Fi Protected Access
  • WPA2 Wi-Fi Protected Access
  • WPA Wi-Fi Protected Access
  • WPA2 Wi-Fi Protected Access, Wi-Fi Protected Access
  • WPA and WPA2 have PSK (per-shared Key) mode. When this mode is used, multiple STAs share the same key, so there is a risk of leaking and the security is poor.
  • PSK mode is not used, the process of setting a password in the access point AP is complicated, which is troublesome for the user and has poor usability.
  • Wi-Fi Protected Setup the standard proposed by the Wi-Fi Alliance in January 2007 to simplify wireless home network security settings. This standard is to allow home users with less knowledge of wireless network security to simply set up Wi-Fi. Secure access. This protocol should be supported by all Wi-Fi certified STA devices.
  • WPS Wi-Fi Protected Setup, Wi-Fi Protected Setup
  • the PIN information comes from the STA.
  • PBC Push-Button Configuration
  • NFC Near Field Communication
  • USB Universal Serial Bus
  • AOSS AirStation One-Touch Secure
  • PBC Push Button
  • Configuration, button configuration directly press the button set on the access point AP, and then press the button on the STA, then the connection between the AP and the STA is established.
  • the security authentication scheme connected between the AP and the STA automatically selects the highest standard supported by both.
  • Both WPS and AOSS technologies achieve the ease of access and security by adding Wi-Fi protocols and adding features to the Wi-Fi protocol.
  • the direct result of this is that at least the access point AP and STA devices need to be upgraded on the software to support the specification content of WPS technology and AOSS technology.
  • neither technology can be used when only the access point AP supports and the STA device does not.
  • the access point AP is located on the network side, and the number of uses is relatively small, and the cost of the upgrade support is low.
  • the number of client devices on the STA device as the end user is large and scattered. It is difficult to upgrade the support and the upgrade cost is large. Therefore, it is necessary to design a safe access method that is simple and easy to use.
  • Embodiments of the present invention provide a Wi-Fi access method, an access point, and a Wi-Fi access system to implement secure access of a Wi-Fi device using a lower cost while ensuring access security.
  • a Wi-Fi access method includes:
  • the received access control instruction is an allowed access instruction issued by the access point user, performing access processing according to the allowed access instruction, establishing a Wi-Fi connection between the wireless client and the access point; or, when receiving The access point control command is a denial of access command issued by the access point user, and the access to the wireless client is denied according to the denied access command.
  • An access point AP includes:
  • a receiving unit configured to receive an access request initiated by a wireless client; or receive an access control instruction returned by the access point user;
  • a prompting unit configured to send an access prompt to the access point user according to the access request, where the access prompt is used to prompt the access point user to initiate an access request by the wireless client, so that the access point user determines whether Allow access to wireless clients;
  • the access unit is configured to perform access processing according to the allowed access instruction when the received access control command is an allowed access command sent by the access point user, and establish a Wi-in of the wireless client and the access point. Fi connection;
  • the accessing unit is configured to refuse to access the wireless client according to the denied access command when the received access control command is a denial of access command sent by the access point user.
  • a Wi-Fi access system includes: the foregoing access point, and a wireless client;
  • the wireless client STA is configured to initiate an access request to the access point AP, and establish the wireless client and access the access point when the access point AP allows access to the wireless client. Wi-Fi connection of the access point AP.
  • the Wi-Fi access method, the access point, and the Wi-Fi access system provided by the embodiments of the present invention can send an access prompt to the access point user according to the access request initiated by the wireless client, so that the access point user can Determining whether to allow access to the wireless client according to the access prompt, so as to determine whether to allow access to the wireless client by means of human-computer interaction, ensuring security of access, and reducing upgrade of the secure client to the wireless client Requirements make Wi-Fi secure access at a lower cost.
  • FIG. 1 is a functional block diagram of a wireless data terminal in the prior art
  • FIG. 2 is a schematic structural diagram of the appearance of the wireless data terminal shown in FIG. 1;
  • FIG. 3 is a schematic structural diagram of networking of the wireless data terminal shown in FIG. 1;
  • FIG. 4 is a schematic diagram of a Wi-Fi access method according to an embodiment of the present invention.
  • FIG. 5a is a detailed flowchart of the Wi-Fi access method shown in FIG. 4; FIG.
  • FIG. 5b is a schematic flowchart of a specific implementation of the Wi-Fi access method shown in FIG. 5a;
  • FIG. 5c is a schematic flowchart of another specific implementation of the Wi-Fi access method shown in FIG. 5a;
  • FIG. 5d is a schematic flowchart of still another specific implementation of the Wi-Fi access method shown in FIG. 5a;
  • FIG. 6 is a schematic diagram of an access point AP according to an embodiment of the present invention.
  • FIG. 7 is a schematic structural diagram of the access point AP shown in FIG. 6;
  • FIG. 8 is a schematic diagram of a Wi-Fi access system according to an embodiment of the present invention.
  • Wi-Fi access method The Wi-Fi access method, the access point, and the Wi-Fi access system according to the embodiment of the present invention are described in detail below with reference to the accompanying drawings.
  • a Wi-Fi access method includes:
  • S42 Send an access prompt to the access point user according to the access request, where the access prompt is used to prompt the access point user to initiate an access request by the wireless client, so that the access point user determines Whether to allow access to the wireless client;
  • step S44 When the received access control command is an access permission command issued by the access point user, step S44 is performed; when the received access control command is a denial access command issued by the access point user, step S45 is performed;
  • the Wi-Fi access method in this embodiment can send an access prompt to an access point (ie, an AP) user according to an access request initiated by a wireless client (ie, a STA), so that the AP user can determine according to the access prompt.
  • a wireless client ie, a STA
  • the security of the access is ensured, the upgrade requirement of the secure access to the STA is reduced, and the secure access of the Wi-Fi is compared. Low cost.
  • the execution entity of the Wi-Fi access method in this embodiment may be an access point AP, and the Wi-Fi access method is particularly applicable to a wireless data terminal, which is more portable and has more ordinary users.
  • the Wi-Fi access method is particularly applicable to a wireless data terminal, which is more portable and has more ordinary users.
  • the AP In the AP.
  • the Wi-Fi access method in this embodiment is specifically described below by taking an AP as a wireless data terminal as an example. However, it should be noted that the method can also be used in other APs other than the wireless data terminal.
  • the method includes:
  • the STA initiates an access request to the wireless data terminal in the standby state to request access to the wireless data terminal by using the Wi-Fi technology.
  • the wireless data terminal After receiving the access request initiated by the STA, the wireless data terminal sends an access prompt to the AP user (ie, the owner of the wireless data terminal) according to the access request, where the access prompt is used to prompt the AP user STA.
  • An access request is initiated, so that the AP user determines whether to allow access to the STA;
  • the access prompt is sent by a button, a screen, a webpage or an indicator light.
  • the prompt “There is a STA device requesting access, is it allowed?” can be displayed on the screen.
  • the AP user can know the current Wi-Fi technology device according to the prompt.
  • the wireless data terminal is being requested to access to determine whether the device is allowed to access.
  • the wireless data terminal receives an access control instruction returned by the AP user.
  • the AP user After seeing the access prompt sent by the wireless data terminal, the AP user determines whether to allow access to the STA, and then sends an access control command to the wireless data terminal. Wherein, when the access control command received by the wireless data terminal is an allowed access command sent by the AP user, that is, when the AP user allows access to the STA, step S54 is performed; when the access control command received by the wireless data terminal is accessed When the user rejects the access command, that is, when the AP user is not allowed to access the STA, step S57 is performed.
  • the wireless data terminal receives the allowed access command sent by the AP user, and performs access processing according to the allowed access command, and establishes Wi-Fi connection between the wireless client and the access point AP;
  • the allowed access command is specifically an input provided by the AP user to the wireless data terminal, and the wireless data terminal can perform the input triggered action after receiving the input.
  • the AP user can input the wireless data terminal by pressing a button. For example, when the wireless data terminal sends a prompt to the AP user through the screen, the AP user can input through the physical button; when the wireless data terminal sends a prompt to the AP user through the webpage. When the AP user can input through the virtual button.
  • the performing the access processing according to the allowed access command in step S54 may specifically be:
  • the wireless data terminal directly accesses the STA that initiates the access request.
  • no further secure access settings are made to the wireless data terminal, for example, no encryption mechanism or MAC address filtering mechanism is set in the wireless data terminal. In this way, as long as the AP user allows the STA to access the wireless data terminal, the STA can be successfully accessed.
  • an encryption mechanism may be set in the wireless data terminal, and the encryption mechanism may be WEP (Wired). Equivalent Privacy, one of WPA or WPA2.
  • the performing the access processing according to the allowed access instruction in step S54 may specifically be:
  • S542. Store a set of passwords in the wireless data terminal in advance, and the wireless data terminal checks whether the password of the STA that initiates the access request is consistent with one of the pre-stored passwords of the group. The STA accesses the wireless data terminal when they are consistent, and rejects the STA from accessing the wireless data terminal when they are inconsistent.
  • the wireless data terminal does not immediately access the STA, but first checks the password of the STA to be accessed according to the encryption mechanism set therein, and the password check result is inconsistent. At the same time, the STA still cannot access the wireless data terminal, thereby further ensuring the secure access of the STA.
  • a MAC address filtering mechanism may be set in the wireless data terminal. After the MAC address filtering mechanism is set in the wireless data terminal, the performing the access processing according to the allowed access instruction in the step S54 may be specifically:
  • S543. Store a set of MAC addresses in the wireless data terminal in advance, and the wireless data terminal checks whether the MAC address of the STA that initiates the access request is consistent with one of the pre-stored MAC addresses. The STA accesses the wireless data terminal when they are consistent, and rejects the STA from accessing the wireless data terminal when they are inconsistent.
  • the wireless data terminal does not immediately access the STA, but first checks the MAC address of the STA to be accessed according to the MAC address filtering mechanism set therein, when the MAC When the address check result is inconsistent, the STA still cannot access the wireless data terminal, thereby further ensuring the secure access of the STA.
  • the wireless data terminal receives an access duration setting command sent by the AP user, so that the wireless client and the access point are allowed to connect to the Wi-Fi within the access duration, that is, within the access duration. Allow access to the STA.
  • the operation of setting the access duration in the embodiment shown in FIG. 5a to FIG. 5d is performed after the STA accesses the wireless data terminal, it is not limited thereto.
  • the setting operation of the access duration can also be completed before the STA initiates the access request.
  • the default value may be set for the access duration when the wireless data terminal is in the standby state. Once the STA accesses the wireless data terminal, the STA accesses the wireless data terminal by default within the access duration.
  • the wireless data terminal receives the termination access command sent by the AP user, and terminates the Wi-Fi connection between the STA and the wireless data terminal within a time set by the access duration according to the termination access command. That is, after the AP user issues a termination access command to the wireless data terminal, the wireless data terminal terminates the access of the STA regardless of whether the access duration set in step S55 has arrived.
  • the Wi-Fi connection between the STA and the wireless data terminal may also be terminated after the time set by the access duration is reached. .
  • the access control command received by the wireless data terminal is the access denied command sent by the access point user
  • the receiving access command sent by the AP user is received, and the accessing the STA is denied according to the denied access command.
  • the STA may also issue an access request to access the wireless data terminal again after the current access request initiated by the STA is rejected.
  • the Wi-Fi access method in this embodiment may further include:
  • the MAC address of the STA that is denied access is added to the address blacklist.
  • the wireless data terminal After the MAC address of the STA that is denied access is added to the address blacklist, when the STA initiates the access request again, the wireless data terminal will not prompt the AP user, but directly reject the access of the STA.
  • step S59 after adding the MAC address of the STA that is denied access to the address blacklist in step S58, leaving the MAC address of the STA that is denied access in the address blacklist for a set time, and then The MAC address of the wireless client that is denied access is deleted from the address blacklist.
  • the wireless data terminal does not permanently reject the access of the STA, but rejects the access of the STA only for a set period of time. After the set time expires, when the STA initiates an access request to the wireless data terminal, the STA still sends a prompt to the AP user to enable the AP user to determine whether to allow access to the STA.
  • the Wi-Fi access method in this embodiment can send an access prompt to the AP user according to the access request initiated by the wireless client STA, so that the AP user can determine whether to allow access according to the access prompt.
  • the STA determines whether to allow access to the STA by means of human-computer interaction, ensures the security of the access, reduces the upgrade requirement of the secure access to the STA, and makes the secure access of the Wi-Fi have a lower cost.
  • the storage medium may be a magnetic disk, an optical disk, or a read-only storage memory (Read-Only) Memory, ROM) or Random Access Memory (RAM).
  • the access point AP includes:
  • the receiving unit 61 is configured to receive an access request initiated by the wireless client STA, or receive an access control instruction returned by the access point user;
  • the prompting unit 62 is configured to send an access prompt to the AP user according to the access request, where the access prompt is used to prompt the AP user to initiate an access request, so that the AP user determines whether to allow access to the STA;
  • the accessing unit 63 is configured to: when the received access control command is an allowed access command sent by the AP user, perform access processing according to the allowed access command, and establish a Wi-Fi between the wireless client and the access point. connection;
  • the accessing unit 64 is configured to refuse to access the STA according to the denied access command when the received access control command is a reject access command sent by the AP user.
  • the access point AP in this embodiment can send an access prompt to the AP user according to the access request initiated by the wireless client STA, so that the AP user can determine whether to allow access to the STA according to the access prompt, so that the human-computer interaction is performed.
  • the method of determining whether to allow access to the STA ensures the security of the access, reduces the upgrade requirement of the secure access to the STA, and makes the secure access of the Wi-Fi have a lower cost.
  • the accessing unit 63 includes: a first access module 631, configured to directly access an STA that initiates an access request. There is no further secure access setting for the access point AP at this time, for example, no encryption mechanism or MAC address filtering mechanism is set in the access point AP. In this way, as long as the AP user allows the STA to access the access point AP, the STA can be successfully accessed.
  • the permission access unit 63 includes (as indicated by a broken line in FIG. 7): a second storage module 632 for pre-storing a set of passwords; and a second verification module 633 For checking whether the password of the STA that initiates the access request is consistent with the pre-stored password; the second access module 634 is configured to access the STA when it is consistent; and the second rejecting module 635 is configured to reject the inconsistency Access to the STA.
  • an encryption mechanism is set in the access point AP, so that even if the AP user allows the access point AP to access the STA, the access point AP still checks whether the password of the STA to be accessed is consistent with the password stored in advance. If not, the access to the STA is denied.
  • the permission access unit 63 includes (as indicated by a broken line in FIG. 7): a third storage module 636 for pre-storing a set of MAC addresses; a third check The module 637 is configured to check whether the MAC address of the STA that initiates the access request is consistent with the pre-stored MAC address, the third access module 638 is configured to access the STA when the interface is consistent, and the third reject module 639 is configured to: Denying access to the STA when inconsistent.
  • a MAC address filtering mechanism is set in the access point AP, so that even if the AP user allows the access point AP to access the STA, the access point AP still checks the MAC address of the STA to be accessed and the MAC stored in advance. Whether the addresses are consistent. If they are inconsistent, they are denied access to the STA.
  • the access point AP in this embodiment may further include: an access duration setting unit 65, configured to receive an access duration setting command to set a duration of accessing the STA, so that the connection is performed.
  • the Wi-Fi connection between the wireless client and the access point is allowed to be established within the incoming time, that is, access to the STA is allowed.
  • the access point AP in this embodiment further includes: a termination access unit 66, configured to terminate the Wi-Fi connection between the wireless client and the access point after the time set by the access duration is reached, that is, terminate Accessing the STA, or receiving a termination access command, and terminating access to the STA within a time set by the access duration according to the termination access command.
  • a termination access unit 66 configured to terminate the Wi-Fi connection between the wireless client and the access point after the time set by the access duration is reached, that is, terminate Accessing the STA, or receiving a termination access command, and terminating access to the STA within a time set by the access duration according to the termination access command.
  • the access point AP when the AP user does not allow the access point AP to access one of the specific STAs, in order to improve the security of the access and simplify the operation of the AP user, the MAC of the STA that is rejected when requesting access is generally recorded. The address, the next time the STA sends an access request again, the access request of the STA can be automatically rejected again according to the recorded MAC address.
  • the access point AP further includes a blacklist adding unit 67, configured to add a MAC address of the STA that is denied access according to the denied access instruction to the address blacklist.
  • the MAC address of the wireless client that is denied access may also be blacklisted from the address. Deleted. Therefore, after the set time expires, when the STA initiates an access request to the access point AP, the STA still sends a prompt to the AP user to enable the AP user to determine whether to allow access to the STA.
  • the prompting unit 62 in this embodiment may include a button, a screen, a webpage or an indicator light, and the like.
  • the access point AP in this embodiment can send an access prompt to the AP user according to the access request initiated by the wireless client STA, so that the AP user can determine whether to allow access to the STA according to the access prompt.
  • the human-computer interaction is used to determine whether access to the STA is allowed, the security of the access is ensured, and the upgrade requirement of the secure access to the STA is reduced, so that the secure access of the Wi-Fi has a lower cost.
  • the present invention further provides an embodiment of a Wi-Fi access system, where the Wi-Fi access system includes:
  • the access point AP 81 is configured to receive an access request initiated by the wireless client STA, and send an access prompt to the AP user according to the access request, where the access prompt is used to prompt the AP user to initiate an access request by the STA.
  • the AP user determines whether to allow access to the STA; and to receive an access control command returned by the access point user, when the received access control command is an allowed access command issued by the AP user, according to the allowed access
  • the inbound command performs an access process, and establishes a Wi-Fi connection between the STA and the AP user, and when the received access control command is a denial of access command sent by the AP user, the access terminal is denied access to the STA according to the denied access command;
  • the wireless client STA 82 is configured to initiate an access request to the access point AP 81, and access the access point AP 81 when the access point AP 81 allows access to the STA, and establish the Wi of the STA 82 and the access point AP 81. -Fi connection.
  • the AP 81 in the embodiment of the Wi-Fi access system may be the access point AP as described in the foregoing embodiment, and details are not described herein again.
  • the Wi-Fi access system in this embodiment can send an access prompt to the AP user according to the access request initiated by the wireless client STA, so that the AP user can determine whether to allow access to the STA according to the access prompt, such that the person passes
  • the mode of the device interaction determines whether access to the STA is allowed, ensures the security of the access, reduces the upgrade requirement of the secure access to the STA, and makes the secure access of the Wi-Fi have a lower cost.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Description

[根据细则37.2由ISA制定的发明名称] 无线保真接入方法、接入点及无线保真接入系统
本申请要求于2010年08月05日提交中国专利局、申请号为CN 201010245985.6、发明名称为“Wi-Fi接入方法、接入点及Wi-Fi接入系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本发明涉及通信技术领域,尤其涉及一种Wi-Fi接入方法、接入点及Wi-Fi接入系统。
背景技术
Wi-Fi(WirelessFidelity,无线保真)技术自产生以来,广泛用在笔记本电脑、上网本、智能手机及个人导航设备中。目前随着应用Wi-Fi技术的无线客户端STA(STAtion)的增多,对Wi-Fi热点的可获得性也提出了更高的要求,如何随时随地为STA用户提供可靠连续的Wi-Fi连接,成为各大运营商和设备厂商关心的问题。
为此市场上开发出了新一代的无线宽带产品:无线数据终端。所述无线数据终端的功能框图如图1所示,包括无线模块、CPU(Center Processing Unit,中央处理器)以及Wi-Fi接入点模块等。其中无线模块用于和无线广域网进行连接,CPU负责在所述无线模块和所述Wi-Fi接入点模块之间传输数据,Wi-Fi接入点模块则用于提供接入点(Access Point,AP)功能,这样作为接入点AP的无线数据终端就可以将应用Wi-Fi技术的STA连接到无线广域网。
如图2所示,图2为所述无线数据终端的外观结构示意图,所述无线数据终端具有屏幕和按键(包括按键1和按键2)。屏幕用于显示无线数据终端的各种状态,如无线网络连接状态、流量指示、电池电量等信息。按键则可以用于开关无线数据终端或者对无线数据终端功能进行选择。需要说明的是,所述无线数据终端中带有电池,能够满足3至5个小时的上网需求,这样就使得无线数据终端具有便携性,可以携带至家庭以外的地方进行无线网络连接。
如图3所示,无线数据终端和其他设备的组网结构如下:手机、移动上网装置等Wi-Fi设备通过Wi-Fi协议接入作为接入点AP的无线数据终端,再由无线数据终端接入无线广域网。
Wi-Fi协议已经定义了几种接入安全机制,如MAC(Media Access Control,媒体接入控制)地址过滤机制和WPA(Wi-Fi Protected Access,Wi-Fi保护接入)、WPA2机制。其中,使用MAC地址过滤机制时只有指定的STA设备才能接入到接入点AP中,当有新的STA设备需要临时接入时,找到该新的STA设备的MAC地址并将该MAC地址输入到接入点AP的过程比较复杂,易用性较差。WPA和WPA2具有PSK(per-shared key)模式,使用这种模式时多个STA共用同一个密钥,因此存在泄密的风险,安全性较差。而不使用PSK模式时,在接入点AP中设置密码的过程比较复杂,对用户来讲比较麻烦,易用性较差。
因此需要在既有的接入安全机制之上,设计出简单易用的安全接入机制。于是出现了WPS技术,全称Wi-Fi Protected Setup,是Wi-Fi联盟在07年1月提出的简化无线家庭网络安全设置的标准。这项标准就是允许具有较少无线网络安全知识的家庭用户能够简单地设置Wi-Fi 安全接入功能。而这个协议应该被所有通过Wi-Fi认证的STA设备支持。
WPS(Wi-Fi Protected Setup,Wi-Fi保护设置)技术强调易用性和安全性,并且考虑到了家庭网络的四个应用场景:
WPS场景 场景描述
PIN(Personal Identification Number) PIN信息来自STA,当PIN在AP或者网络上登记后,STA接入AP的允许。
PBC(Push-Button Configuration) 按键方式,在AP和STA上面同时按键,然后设备接入AP
NFC(Near Field Communication) 利用STA和AP之间的NFC标签完成接入配置
USB(Universal Serial Bus) 利用U盘在AP和STA之间传递接入配置信息
此外,日本的一家公司还提出了一种AOSS(AirStation One-Touch Secure System,一键式无线网络简单设置系统)技术。AOSS技术是一种WPS技术的PBC(Push Button Configuration,按键配置)方式,直接按下设在接入点AP上的按键,然后再按下STA上面的按键,则AP和STA的连接就建立起来了。AP和STA连接的安全鉴权方案会自动选择两者都支持的最高制式。
但是在实现上述使用的过程中,发明人发现现有技术中至少存在如下问题:
WPS和AOSS这两种技术都是通过完善Wi-Fi协议,为Wi-Fi协议增加特性来实现接入的易用性和安全性的。这样带来的直接结果就是对接入点AP和STA设备而言都至少需要在软件上进行升级以支持WPS技术和AOSS技术的规范内容。特别地,当仅有接入点AP支持而STA设备不支持的时候,这两项技术都无法使用。其中,接入点AP位于网络侧,使用数量相对较少,升级支持的成本较低。而STA设备作为终端用户手上的客户端设备,数量较大而且分散,难以统一进行升级支持,升级成本较大。因此需要设计出一套既简单易用的安全接入方法。
发明内容
本发明的实施例提供一种Wi-Fi接入方法、接入点及Wi-Fi接入系统,以在保证接入安全的同时使用较低的成本来实现Wi-Fi设备的安全接入。
为达到上述目的,本发明的实施例采用如下技术方案:
一种Wi-Fi接入方法,包括:
接收无线客户端发起的接入请求;
根据所述接入请求向接入点用户发出接入提示,所述接入提示用于向所述接入点用户提示无线客户端发起了接入请求,以便所述接入点用户判断是否允许接入无线客户端;
接收所述接入点用户返回的接入控制指令;
当接收的接入控制指令是接入点用户发出的允许接入指令时,根据所述允许接入指令执行接入处理,建立无线客户端与接入点的Wi-Fi连接;或者,当接收的接入点控制指令是接入点用户发出的拒绝接入指令时,根据所述拒绝接入指令拒绝接入无线客户端。
一种接入点AP,包括:
接收单元,用于接收无线客户端发起的接入请求;或接收接入点用户返回的接入控制指令;
提示单元,用于根据所述接入请求向接入点用户发出接入提示,所述接入提示用于向接入点用户提示无线客户端发起了接入请求,以便接入点用户判断是否允许接入无线客户端;
允许接入单元,用于在接收的接入控制指令是接入点用户发出的允许接入指令时,根据所述允许接入指令执行接入处理,建立无线客户端与接入点的Wi-Fi连接;
拒绝接入单元,用于在接收的接入控制指令是接入点用户发出的拒绝接入指令时,根据所述拒绝接入指令拒绝接入无线客户端。
一种Wi-Fi接入系统,包括:上述接入点,和无线客户端;
其中,所述无线客户端STA,用于向所述接入点AP发起接入请求,并在所述接入点AP允许接入无线客户端时,建立所述无线客户端与接入所述接入点AP的Wi-Fi连接。
本发明实施例提供的Wi-Fi接入方法、接入点及Wi-Fi接入系统,由于能够根据无线客户端发起的接入请求向接入点用户发出接入提示,以便接入点用户根据该接入提示判断是否允许接入该无线客户端,这样通过人机交互的方式来判断是否允许接入无线客户端,保证了接入的安全性,降低了安全接入对无线客户端的升级要求,使得Wi-Fi的安全接入具有较低的成本。
附图说明
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1为现有技术中无线数据终端的功能框图;
图2为图1所示无线数据终端的外观结构示意图;
图3为图1所示无线数据终端的组网结构示意图;
图4为本发明实施例Wi-Fi接入方法的示意图;
图5a为图4所示Wi-Fi接入方法的详细流程示意图;
图5b为图5a所示Wi-Fi接入方法的一种具体实现的流程示意图;
图5c为图5a所示Wi-Fi接入方法的另一种具体实现的流程示意图;
图5d为图5a所示Wi-Fi接入方法的再一种具体实现的流程示意图;
图6为本发明实施例接入点AP的示意图;
图7为图6所述接入点AP的详细结构示意图;
图8为本发明实施例Wi-Fi接入系统的示意图。
具体实施方式
下面结合附图对本发明实施例Wi-Fi接入方法、接入点及Wi-Fi接入系统进行详细描述。
应当明确,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其它实施例,都属于本发明保护的范围。
如图4所示,本发明实施例Wi-Fi接入方法,包括:
S41,接收无线客户端发起的接入请求;
S42,根据所述接入请求向接入点用户发出接入提示,所述接入提示用于向所述接入点用户提示无线客户端发起了接入请求,以便所述接入点用户判断是否允许接入无线客户端;
S43,接收所述接入点用户返回的接入控制指令;
当接收的接入控制指令是接入点用户发出的允许接入指令时,执行步骤S44;当接收的接入控制指令是接入点用户发出的拒绝接入指令时,执行步骤S45;
S44,根据所述允许接入指令执行接入处理,建立无线客户端与接入点的Wi-Fi连接;
S45,根据所述拒绝接入指令拒绝接入无线客户端。
本实施例中的Wi-Fi接入方法,由于能够根据无线客户端(即STA)发起的接入请求向接入点(即AP)用户发出接入提示,以便AP用户根据该接入提示判断是否允许接入STA,这样通过人机交互的方式来判断是否允许接入STA,保证了接入的安全性,降低了安全接入对STA的升级要求,使得Wi-Fi的安全接入具有较低的成本。
本实施例中Wi-Fi接入方法的执行主体可以是接入点AP,而且所述Wi-Fi接入方法特别适用于无线数据终端这种便携移动性较强、拥有更多普通用户的接入点AP中。
如图5a所示,下面以AP为无线数据终端为例具体描述本实施例中的Wi-Fi接入方法。但需要说明的是,所述方法也可以用在除无线数据终端之外的其他接入点AP中。所述方法包括:
S51,STA向处于待机状态的无线数据终端发起接入请求,以请求通过Wi-Fi技术接入无线数据终端;
S52,无线数据终端接收到STA发起的接入请求后,根据所述接入请求向AP用户(即,无线数据终端的所有者)发出接入提示,所述接入提示用于提示AP用户STA发起了接入请求,以便AP用户判断是否允许接入STA;
其中,所述接入提示通过按键、屏幕、网页或指示灯发出。例如当使用屏幕发出接入提示时,可以在屏幕上显示“有STA设备请求接入,是否允许?”的提示字样,AP用户可以根据该提示字样来得知目前某个应用Wi-Fi技术的设备正在请求接入无线数据终端,从而判断是否允许该设备接入。
S53,无线数据终端接收上述AP用户返回的接入控制指令;
AP用户看到无线数据终端发出的接入提示后判断是否允许接入STA,然后向无线数据终端发出接入控制指令。其中,当无线数据终端接收的接入控制指令是AP用户发出的允许接入指令时,即在AP用户允许接入STA时,执行步骤S54;当无线数据终端接收的接入控制指令是接入点用户发出的拒绝接入指令时,即在AP用户不允许接入STA时,执行步骤S57。
S54,当无线数据终端接收的接入控制指令是AP用户发出的允许接入指令时,无线数据终端接收AP用户发出的允许接入指令,并根据所述允许接入指令执行接入处理,建立无线客户端与接入点AP的Wi-Fi连接;
其中,该允许接入指令具体而言为AP用户向无线数据终端提供的一个输入,无线数据终端接收到该输入后可以执行该输入触发的动作。实际使用中,AP用户可以通过按键对无线数据终端进行输入,例如当无线数据终端通过屏幕向AP用户发出提示时,AP用户可以通过实体按键进行输入;当无线数据终端通过网页向AP用户发出提示时,AP用户可以通过虚拟按键进行输入。
具体而言,参考图5b,在AP用户向无线数据终端发出允许接入指令后,步骤S54中所述根据所述允许接入指令执行接入处理具体可以为:
S541,无线数据终端直接接入发起接入请求的STA。
此时,没有对无线数据终端进行进一步的安全接入设置,例如没有在无线数据终端中设置加密机制或MAC地址过滤机制。这样,只要AP用户允许STA接入无线数据终端,则即可顺利实现STA的接入。
为了进一步提高STA接入的安全性,可以在无线数据终端中设置加密机制,该加密机制可以为WEP(Wired Equivalent Privacy,有线等效加密)、WPA或WPA2中的一种。
例如,参考图5c,在无线数据终端中设置加密机制之后,步骤S54中所述根据允许接入指令执行接入处理具体可以为:
S542,预先在无线数据终端中存储一组密码,无线数据终端核对发起接入请求的STA的密码是否与该组预先存储的密码中的一个密码相一致。在一致时所述STA接入无线数据终端,在不一致时拒绝所述STA接入无线数据终端。
这样,即使在接收到AP用户的允许接入指令后,无线数据终端也不会立即接入STA,而是首先根据其中设置的加密机制核对欲接入的STA的密码,当密码核对结果为不一致时,STA仍然不能接入无线数据终端,从而进一步保证了STA的安全接入。
或者,参考图5d,可以在无线数据终端中设置MAC地址过滤机制,在无线数据终端中设置MAC地址过滤机制之后,步骤S54中所述根据允许接入指令执行接入处理具体可以为:
S543,预先在无线数据终端中存储一组MAC地址,无线数据终端核对发起接入请求的STA的MAC地址是否与该组预先存储的MAC地址中的一个MAC地址相一致。在一致时所述STA接入无线数据终端,在不一致时拒绝所述STA接入无线数据终端。
同样地,即使在接收到AP用户的允许接入指令后,无线数据终端也不会立即接入STA,而是首先根据其中设置的MAC地址过滤机制核对欲接入的STA的MAC地址,当MAC地址核对结果为不一致时,STA仍然不能接入无线数据终端,从而进一步保证了STA的安全接入。
S55,无线数据终端接收AP用户发出的接入时长设定指令,以使得在所述接入时长内允许所述无线客户端与接入点的Wi-Fi连接,即在所述接入时长内允许接入所述STA。
需要说明的是,虽然图5a至图5d所示的实施例中接入时长设定的操作是在STA接入无线数据终端之后进行的,但并不局限于此,在其他的实施例中,接入时长的设定操作也可以在STA发起接入请求之前完成。例如,可以在无线数据终端处于待机状态时为接入时长设定默认值,一旦STA接入无线数据终端,则该STA就默认在该接入时长内接入无线数据终端。
S56,无线数据终端接收AP用户发出的终止接入指令,并根据所述终止接入指令在所述接入时长设定的时间内终止所述STA与无线数据终端的Wi-Fi连接。即,AP用户向无线数据终端发出终止接入指令后,无线数据终端就终止STA的接入,而不管步骤S55中设定的接入时长是否到达。
除图5a至图5d所示的实施例之外,在本发明的其他实施例中,也可以在所述接入时长设定的时间到达后终止所述STA与无线数据终端的Wi-Fi连接。
S57,当无线数据终端接收的接入控制指令是接入点用户发出的拒绝接入指令时,接收AP用户发出的拒绝接入指令,并根据所述拒绝接入指令拒绝接入STA。
其中,当STA本次发起的接入请求被拒绝之后,STA还可以再次发出接入请求以接入无线数据终端。
为了提高接入的安全性并简化AP用户操作,一般可以记录本次请求接入时被拒绝的STA的MAC地址,下一次当该STA再次发出接入请求时,根据记录的MAC地址可以自动地再次拒绝该STA的接入请求;参考至图5d,本实施例Wi-Fi接入方法还可以包括:
S58,在步骤S57根据所述拒绝接入指令拒绝接入STA之后,将被拒绝接入的STA的MAC地址添加到地址黑名单中。
在将被拒绝接入的STA的MAC地址添加到地址黑名单中之后,当STA再次发起的接入请求时,无线数据终端将不再提示AP用户,而是直接拒绝STA的接入。
S59,在步骤S58将被拒绝接入的STA的MAC地址添加到地址黑名单中之后,使所述被拒绝接入的STA的MAC地址在所述地址黑名单中保留一段设定时间,然后将所述被拒绝接入的无线客户端的MAC地址从所述地址黑名单中删除。
这样就使得无线数据终端不是永久性的拒绝该STA的接入,而是仅在一段设定时间内拒绝该STA的接入。且在该一段设定时间过后,当该STA向无线数据终端发起接入请求时,该STA仍然向AP用户发出提示,使AP用户自己判断是否允许接入该STA。
综上所述,本实施例中的Wi-Fi接入方法,由于能够根据无线客户端STA发起的接入请求向AP用户发出接入提示,以便AP用户根据该接入提示判断是否允许接入STA,这样通过人机交互的方式来判断是否允许接入STA,保证了接入的安全性,降低了安全接入对STA的升级要求,使得Wi-Fi的安全接入具有较低的成本。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指令相关的硬件来完成,所述的程序可存储于一计算机可读取存储介质中,该程序在执行时,可包括如上述各方法的实施例的流程。其中,所述的存储介质可为磁碟、光盘、只读存储记忆体(Read-Only Memory,ROM)或随机存储记忆体(Random Access Memory,RAM)等。
如图6所示,还提供了一种接入点AP的实施例。本实施例中,所述接入点AP包括:
接收单元61,用于接收无线客户端STA发起的接入请求;或接收接入点用户返回的接入控制指令;
提示单元62,用于根据所述接入请求向AP用户发出接入提示,所述接入提示用于向AP用户提示STA发起了接入请求,以便AP用户判断是否允许接入STA;
允许接入单元63,用于在接收的接入控制指令是AP用户发出的允许接入指令时,根据所述允许接入指令执行接入处理,建立无线客户端与接入点的Wi-Fi连接;
拒绝接入单元64,用于在接收的接入控制指令是AP用户发出的拒绝接入指令时,根据所述拒绝接入指令拒绝接入STA。
本实施例中的接入点AP,由于能够根据无线客户端STA发起的接入请求向AP用户发出接入提示,以便AP用户根据该接入提示判断是否允许接入STA,这样通过人机交互的方式来判断是否允许接入STA,保证了接入的安全性,降低了安全接入对STA的升级要求,使得Wi-Fi的安全接入具有较低的成本。
其中从图7可知,在本发明的一个具体实施例中,所述允许接入单元63包括:第一接入模块631,以用于直接接入发起接入请求的STA。此时没有对接入点AP进行进一步的安全接入设置,例如没有在接入点AP中设置加密机制或MAC地址过滤机制。这样,只要AP用户允许STA接入到接入点AP中,则即可顺利实现STA的接入。
或者,在本发明的另一个具体实施例中,所述允许接入单元63包括(如图7中虚线所示):第二存储模块632,用于预先存储一组密码;第二核对模块633,用于核对发起接入请求的STA的密码是否与预先存储的密码一致;第二接入模块634,用于在一致时接入所述STA;第二拒绝模块635,用于在不一致时拒绝接入所述STA。
此时,在接入点AP中设置了加密机制,这样即使AP用户允许接入点AP接入STA,接入点AP仍然会核对欲接入的STA的密码与其中预先存储的密码是否一致,如果不一致则拒绝接入STA。
或者,在本发明的在再一个具体实施例中,所述允许接入单元63包括(如图7中虚线所示):第三存储模块636,用于预先存储一组MAC地址;第三核对模块637,用于核对发起接入请求的STA的MAC地址是否与预先存储的MAC地址一致;第三接入模块638,用于在一致时接入所述STA;第三拒绝模块639,用于在不一致时拒绝接入所述STA。
此时,在接入点AP中设置了MAC地址过滤机制,这样即使AP用户允许接入点AP接入STA,接入点AP仍然会核对欲接入的STA的MAC地址与其中预先存储的MAC地址是否一致,如果不一致则拒绝接入STA。
从图7中可知,本实施例中的接入点AP还可以包括:接入时长设定单元65,用于接收接入时长设定指令以设定接入STA的时长,使得在所述接入时长内允许建立无线客户端与接入点的Wi-Fi连接,即允许接入所述STA。
此外,本实施例中的接入点AP还包括:终止接入单元66,用于在所述接入时长设定的时间达到后终止无线客户端与接入点的Wi-Fi连接,即终止接入所述STA,或者用于接收终止接入指令,并根据所述终止接入指令在所述接入时长设定的时间内终止接入所述STA。
本实施例中,在AP用户不允许接入点AP接入其中一个具体STA时,为了提高接入的安全性并简化AP用户操作,一般可以记录本次请求接入时被拒绝的STA的MAC地址,下一次当该STA再次发出接入请求时,根据记录的MAC地址可以自动地再次拒绝该STA的接入请求。这样所述接入点AP还包括:黑名单添加单元67,用于将根据所述拒绝接入指令而拒绝接入的STA的MAC地址添加到地址黑名单中。
此外,本实施例中被拒绝接入的STA的MAC地址在所述地址黑名单中保留一段设定时间后,还可以将所述被拒绝接入的无线客户端的MAC地址从所述地址黑名单中删除。因此在该段设定时间过后,当该STA向接入点AP发起接入请求时,该STA仍然向AP用户发出提示,使AP用户自己判断是否允许接入该STA。
其中需要说明的是,本实施例中所述提示单元62可以包括按键、屏幕、网页或指示灯等。
综上所述,本实施例中的接入点AP,由于能够根据无线客户端STA发起的接入请求向AP用户发出接入提示,以便AP用户根据该接入提示判断是否允许接入STA,这样通过人机交互的方式来判断是否允许接入STA,保证了接入的安全性,降低了安全接入对STA的升级要求,使得Wi-Fi的安全接入具有较低的成本。
如图8所示,本发明还提供了一种Wi-Fi接入系统的实施例,所述Wi-Fi接入系统包括:
接入点AP81,用于接收无线客户端STA发起的接入请求,根据所述接入请求向AP用户发出接入提示,其中所述接入提示用于向AP用户提示STA发起了接入请求,以便AP用户判断是否允许接入STA;并用于接收所述接入点用户返回的接入控制指令,当接收的接入控制指令是AP用户发出的允许接入指令时,根据所述允许接入指令执行接入处理,建立STA与AP用户的Wi-Fi连接,且当接收的接入控制指令是AP用户发出的拒绝接入指令时,根据所述拒绝接入指令拒绝接入STA;
无线客户端STA82,用于向所述接入点AP81发起接入请求,并在所述接入点AP81允许接入STA时接入所述接入点AP81,建立STA82与接入点AP81的Wi-Fi连接。
其中,Wi-Fi接入系统的实施例中的AP81可以是如前述实施例中所述的接入点AP,在此不再赘述。
本实施例中的Wi-Fi接入系统,由于能够根据无线客户端STA发起的接入请求向AP用户发出接入提示,以便AP用户根据该接入提示判断是否允许接入STA,这样通过人机交互的方式来判断是否允许接入STA,保证了接入的安全性,降低了安全接入对STA的升级要求,使得Wi-Fi的安全接入具有较低的成本。
以上所述,仅为本发明的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本发明的保护范围之内。因此,本发明的保护范围应所述以权利要求的保护范围为准。

Claims (12)

  1. 一种Wi-Fi接入方法,其特征在于,包括:
    接收无线客户端发起的接入请求;
    根据所述接入请求向接入点用户发出接入提示,所述接入提示用于向所述接入点用户提示无线客户端发起了接入请求,以便所述接入点用户判断是否允许接入无线客户端;
    接收所述接入点用户返回的接入控制指令;
    当接收的接入控制指令是接入点用户发出的允许接入指令时,根据所述允许接入指令执行接入处理,建立所述无线客户端与接入点的Wi-Fi连接;或者,当接收的接入控制指令是接入点用户发出的拒绝接入指令时,根据所述拒绝接入指令拒绝接入所述无线客户端。
  2. 根据权利要求1所述的Wi-Fi接入方法,其特征在于,根据所述接入请求向接入点用户发出接入提示包括:
    根据所述接入请求并通过按键、屏幕、网页或指示灯向接入点用户发出接入提示。
  3. 根据权利要求2所述的Wi-Fi接入方法,其特征在于,在所述接收无线客户端发起的接入请求之前,或在接入所述无线客户端之后,所述方法还包括:
    接收接入时长设定指令,并在所述接入时长内允许所述无线客户端与接入点的Wi-Fi连接。
  4. 根据权利要求3所述的Wi-Fi接入方法,其特征在于,在所述接收接入时长设定指令之后,所述方法还包括:
    在所述接入时长设定的时间到达后,终止所述无线客户端与接入点的Wi-Fi连接;或
    接收终止接入指令,并根据所述终止接入指令在所述接入时长设定的时间内终止所述无线客户端与接入点的Wi-Fi连接。
  5. 根据权利要求1所述的Wi-Fi接入方法,其特征在于,在所述根据所述拒绝接入指令拒绝接入无线客户端之后,所述方法还包括:
    将被拒绝接入的无线客户端的媒体接入控制MAC地址添加到地址黑名单中。
  6. 根据权利要求5所述的Wi-Fi接入方法,其特征在于,在所述将被拒绝接入的无线客户端的MAC地址添加到地址黑名单中之后,所述方法还包括:
    将所述被拒绝接入的无线客户端的MAC地址在所述地址黑名单中保留一段设定时间后,将所述被拒绝接入的无线客户端的MAC地址从所述地址黑名单中删除。
  7. 一种接入点,其特征在于,包括:
    接收单元,用于接收无线客户端发起的接入请求;或接收接入点用户返回的接入控制指令;
    提示单元,用于根据所述接入请求向接入点用户发出接入提示,所述接入提示用于向接入点用户提示无线客户端发起了接入请求,以便接入点用户判断是否允许接入无线客户端;
    允许接入单元,用于在接收的接入控制指令是接入点用户发出的允许接入指令时,根据所述允许接入指令执行接入处理,建立所述无线客户端与接入点的Wi-Fi连接;
    拒绝接入单元,用于在接收的接入控制指令是接入点用户发出的拒绝接入指令时,根据所述拒绝接入指令拒绝接入所述无线客户端。
  8. 根据权利要求7所述的接入点,其特征在于,所述提示单元包括按键、屏幕、网页或指示灯。
  9. 根据权利要求7所述的接入点,其特征在于,所述接入点还包括:
    接入时长设定单元,用于根据接收的接入时长设定指令,设定接入无线客户端的时长,使得在所述接入时长内允许所述无线客户端与接入点的Wi-Fi连接。
  10. 根据权利要求9所述的接入点,其特征在于,所述接入点还包括:
    终止接入单元,用于在所述接入时长设定的时间达到后,终止接入所述无线客户端与接入点的Wi-Fi连接,或用于接收终止接入指令,并根据所述终止接入指令在所述接入时长设定的时间内终止所述无线客户端与接入点的Wi-Fi连接。
  11. 根据权利要求7所述的接入点,其特征在于,所述接入点还包括:
    黑名单添加单元,用于将根据所述拒绝接入指令而拒绝接入的无线客户端的MAC地址添加到地址黑名单中。
  12. 一种Wi-Fi接入系统,其特征在于,包括:权利要求7至11任一项所述的接入点,和无线客户端;
    所述无线客户端,用于向所述接入点发起接入请求,并在所述接入点允许接入所述无线客户端时,建立所述无线客户端与所述接入点的Wi-Fi连接。
PCT/CN2011/074959 2010-08-05 2011-05-31 无线保真接入方法、接入点及无线保真接入系统 WO2012016473A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2010102459856A CN101895962A (zh) 2010-08-05 2010-08-05 Wi-Fi接入方法、接入点及Wi-Fi接入系统
CN201010245985.6 2010-08-05

Publications (1)

Publication Number Publication Date
WO2012016473A1 true WO2012016473A1 (zh) 2012-02-09

Family

ID=43104983

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2011/074959 WO2012016473A1 (zh) 2010-08-05 2011-05-31 无线保真接入方法、接入点及无线保真接入系统

Country Status (5)

Country Link
US (1) US20120036557A1 (zh)
EP (1) EP2416600A1 (zh)
JP (1) JP5281128B2 (zh)
CN (1) CN101895962A (zh)
WO (1) WO2012016473A1 (zh)

Families Citing this family (62)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101895962A (zh) * 2010-08-05 2010-11-24 华为终端有限公司 Wi-Fi接入方法、接入点及Wi-Fi接入系统
EP2723145B1 (en) 2011-06-17 2015-12-30 Huawei Technologies Co., Ltd. Method for address processing, gateway device and access point
JP5853478B2 (ja) * 2011-08-04 2016-02-09 株式会社バッファロー アクセスポイント装置および通信設定提供方法
KR101915314B1 (ko) * 2011-10-25 2018-11-07 삼성전자주식회사 휴대단말기에서 WPS(Wi-Fi Protecte d Setup)을 이용한 와이파이 연결 방법 및 장치
US9339691B2 (en) 2012-01-05 2016-05-17 Icon Health & Fitness, Inc. System and method for controlling an exercise device
CN104039401B (zh) * 2012-01-06 2016-05-11 艾肯运动与健康公司 具有用于与外部计算设备连接的通信连接装置的锻炼设备
CN103079186B (zh) * 2012-03-05 2015-07-22 上海寰创通信科技股份有限公司 一种基于无线网络环境的许可证信息传输方法
CN102624725B (zh) * 2012-03-07 2016-04-20 深圳市共进电子股份有限公司 一种pin码接入方式的安全保护方法
CN102791016B (zh) * 2012-07-04 2014-12-10 大唐移动通信设备有限公司 一种接入处理方法及装置
CN102821439A (zh) * 2012-07-18 2012-12-12 中兴通讯股份有限公司 一种无线网络的接入方法和装置
GB2506170B (en) * 2012-09-24 2014-10-08 British Telecomm Wireless access point
CN102984705A (zh) * 2012-11-13 2013-03-20 广东欧珀移动通信有限公司 一种移动终端控制无线网络状态的方法及系统
CN103067920B (zh) * 2012-12-28 2015-12-23 上海寰创通信科技股份有限公司 一种ap反向控制非授权ac的系统及方法
WO2014153158A1 (en) 2013-03-14 2014-09-25 Icon Health & Fitness, Inc. Strength training apparatus with flywheel and related methods
CN104219081B (zh) * 2013-06-05 2018-11-30 富泰华工业(深圳)有限公司 网络连接管理设备及网络连接管理方法
CN104284334B (zh) * 2013-07-01 2018-10-30 华为终端有限公司 一种WiFi保护设置的控制方法及设备
WO2015016627A1 (ko) * 2013-07-31 2015-02-05 삼성전자 주식회사 동일한 네트워크 상의 복수개의 ap 장치 중 하나의 ap 장치와 단말기를 연결하는 방법 및 장치
CN104427500A (zh) * 2013-09-10 2015-03-18 上海果壳电子有限公司 Wi-Fi连接授权方法及系统
US9843886B2 (en) * 2013-09-16 2017-12-12 Qualcomm Incorporated User interactive application enabled gateway
CN103475667A (zh) * 2013-09-24 2013-12-25 小米科技有限责任公司 一种控制访问路由器的方法、装置及系统
US9686819B2 (en) 2013-09-24 2017-06-20 Xiaomi Inc. Methods, devices and systems for router access control
CN104519020B (zh) 2013-09-29 2017-10-13 阿里巴巴集团控股有限公司 管理无线网络登录密码分享功能的方法、服务器及系统
EP3086865B1 (en) 2013-12-26 2020-01-22 Icon Health & Fitness, Inc. Magnetic resistance mechanism in a cable machine
CN103781074B (zh) * 2014-02-08 2017-01-04 北京极科极客科技有限公司 无线局域网安全接入方法及设备
WO2015138339A1 (en) 2014-03-10 2015-09-17 Icon Health & Fitness, Inc. Pressure sensor to quantify work
US9794261B2 (en) 2014-03-28 2017-10-17 Xiaomi Inc. Method and apparatus for controlling access to a server
CN103945499B (zh) * 2014-04-17 2017-11-14 美的集团股份有限公司 Wifi模块工作模式的切换方法及装置
CN104010309B (zh) * 2014-05-19 2018-12-21 百度在线网络技术(北京)有限公司 接入点和终端之间建立连接的方法及终端
EP3007477B1 (en) 2014-05-31 2021-04-28 Huawei Technologies Co., Ltd. Network connection method, hotspot terminal, and management terminal
WO2015191445A1 (en) 2014-06-09 2015-12-17 Icon Health & Fitness, Inc. Cable system incorporated into a treadmill
CN105451228A (zh) * 2014-06-16 2016-03-30 联想(北京)有限公司 一种信息处理方法及装置
WO2015195965A1 (en) 2014-06-20 2015-12-23 Icon Health & Fitness, Inc. Post workout massage device
US10448317B2 (en) 2014-08-21 2019-10-15 Huawei Technologies Co., Ltd. Wireless network access control method, device, and system
CN104284391B (zh) * 2014-09-17 2018-01-09 新华三技术有限公司 无线客户端接入方法及装置
CN104284332A (zh) * 2014-09-26 2015-01-14 中兴通讯股份有限公司 一种鉴权方法及无线路由器
CN105577506B (zh) * 2014-10-17 2020-03-24 中兴通讯股份有限公司 一种安全提醒方法和网络接入设备
EP3035741A1 (en) 2014-12-17 2016-06-22 Thomson Licensing WLAN user quality of experience control in a multi-access point environment
CN105813080A (zh) * 2014-12-31 2016-07-27 阿里巴巴集团控股有限公司 控制设备接入网络的方法及装置
US10391361B2 (en) 2015-02-27 2019-08-27 Icon Health & Fitness, Inc. Simulating real-world terrain on an exercise device
CN104768204A (zh) * 2015-03-25 2015-07-08 广东欧珀移动通信有限公司 一种网络接入管理方法、可穿戴设备及系统
CN105101349A (zh) * 2015-05-12 2015-11-25 中兴通讯股份有限公司 一种无线局域网的接入控制方法及装置、终端
CN105025484B (zh) * 2015-06-12 2018-07-06 广东欧珀移动通信有限公司 接入Wi-Fi热点的方法及装置
CN105554756A (zh) * 2016-01-05 2016-05-04 太仓市同维电子有限公司 一种利用家庭网关防止无线蹭网的方法
FR3047374B1 (fr) 2016-01-28 2018-07-27 Overkiz Procede de configuration, de controle ou de supervision d’une installation domotique
US10313351B2 (en) 2016-02-22 2019-06-04 At&T Intellectual Property I, L.P. Dynamic passcodes in association with a wireless access point
CN105812270A (zh) * 2016-03-09 2016-07-27 联想(北京)有限公司 一种信息处理方法和无线路由设备
US10493349B2 (en) 2016-03-18 2019-12-03 Icon Health & Fitness, Inc. Display on exercise device
US10272317B2 (en) 2016-03-18 2019-04-30 Icon Health & Fitness, Inc. Lighted pace feature in a treadmill
US10625137B2 (en) 2016-03-18 2020-04-21 Icon Health & Fitness, Inc. Coordinated displays in an exercise device
US10671705B2 (en) 2016-09-28 2020-06-02 Icon Health & Fitness, Inc. Customizing recipe recommendations
CN106454841A (zh) * 2016-10-19 2017-02-22 青岛海信移动通信技术股份有限公司 无线接入点处理方法和终端
KR102387822B1 (ko) * 2016-12-09 2022-04-15 후아웨이 테크놀러지 컴퍼니 리미티드 핫스팟 접속 구축 방법 및 단말 장치
CN106454834A (zh) * 2016-12-23 2017-02-22 宇龙计算机通信科技(深圳)有限公司 无线接入点连接方法及系统
FR3061400A1 (fr) * 2016-12-28 2018-06-29 Overkiz Procede de configuration d’acces, de commande et de supervision a distance d’au moins un dispositif domotique appartenant a une installation domotique
FR3061399B1 (fr) 2016-12-28 2023-04-21 Overkiz Procede de configuration d’acces, de commande et de supervision a distance d’au moins un dispositif domotique appartenant a une installation domotique
FR3061390B1 (fr) 2016-12-28 2022-12-16 Overkiz Procede de configuration, de controle ou de supervision d’une installation domotique
US10841314B2 (en) * 2018-04-09 2020-11-17 Cisco Technology, Inc. Identifying and blacklisting problem clients using machine learning in wireless networks
CN108777879A (zh) * 2018-05-02 2018-11-09 四川斐讯信息技术有限公司 一种访客网络登录的管理方法和装置
US11683312B2 (en) * 2018-11-08 2023-06-20 Arris Enterprises Llc Client device authentication to a secure network
US11578244B2 (en) 2018-12-17 2023-02-14 Carmel Olefins Ltd. Thermoplastic shape-stable polymer compositions for storing thermal energy
KR20220104421A (ko) * 2021-01-18 2022-07-26 삼성전자주식회사 액세스 포인트와의 연결을 통제하는 전자 장치 및 그 방법
JP2022147466A (ja) * 2021-03-23 2022-10-06 セイコーエプソン株式会社 電子機器及び通信方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1553656A (zh) * 2003-06-06 2004-12-08 华为技术有限公司 无线局域网中用户接入授权的方法
US20050175019A1 (en) * 2004-02-06 2005-08-11 Tatara Systems, Inc. Wi-Fi service delivery platform for wholesale service providers
CN101005359A (zh) * 2006-01-18 2007-07-25 华为技术有限公司 一种实现终端设备间安全通信的方法及装置
CN101895962A (zh) * 2010-08-05 2010-11-24 华为终端有限公司 Wi-Fi接入方法、接入点及Wi-Fi接入系统

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU666411B2 (en) * 1992-11-27 1996-02-08 Commonwealth Scientific And Industrial Research Organisation A wireless LAN
JP3585422B2 (ja) * 2000-06-01 2004-11-04 シャープ株式会社 アクセスポイント装置及びその認証処理方法
JP4025126B2 (ja) * 2002-06-28 2007-12-19 株式会社リコー 無線lanシステム及びアクセスポイント並びに無線lan接続方法
SE522483C2 (sv) * 2002-11-28 2004-02-10 Appear Networks Systems Ab Metod och arrangemang i ett nätverk för att bestämma en zon, i vilken en kommunikationsenhet är ansluten
JP4251620B2 (ja) * 2003-04-23 2009-04-08 キヤノン株式会社 通信装置及び通信装置の接続方法
US7142851B2 (en) * 2003-04-28 2006-11-28 Thomson Licensing Technique for secure wireless LAN access
CN1604523A (zh) * 2003-09-30 2005-04-06 华为技术有限公司 无线终端接入网络的方法
JP2006332833A (ja) * 2005-05-24 2006-12-07 Yazaki Corp 無線lanシステムおよびスイッチングハブ
CN100550739C (zh) * 2007-02-14 2009-10-14 华为技术有限公司 一种为用户终端发起认证请求的方法、系统和路由设备
CN101227359A (zh) * 2008-01-25 2008-07-23 华为技术有限公司 控制用户接入的方法、接入点设备和系统
JP2009188849A (ja) * 2008-02-08 2009-08-20 Buffalo Inc アクセスポイントおよびその動作方法
JP2009267749A (ja) * 2008-04-24 2009-11-12 Kyocera Corp 通信システム、携帯通信端末および端末管理方法
CN101674293B (zh) * 2008-09-11 2013-04-03 阿里巴巴集团控股有限公司 一种分布式应用中处理非正常请求的方法及系统
US8625552B2 (en) * 2008-12-31 2014-01-07 Microsoft Corporation Wireless provisioning a device for a network using a soft access point
EP2446654A2 (en) * 2009-06-24 2012-05-02 Nokia Corp. Methods and apparatuses for avoiding denial of service attacks by rogue access points

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1553656A (zh) * 2003-06-06 2004-12-08 华为技术有限公司 无线局域网中用户接入授权的方法
US20050175019A1 (en) * 2004-02-06 2005-08-11 Tatara Systems, Inc. Wi-Fi service delivery platform for wholesale service providers
CN101005359A (zh) * 2006-01-18 2007-07-25 华为技术有限公司 一种实现终端设备间安全通信的方法及装置
CN101895962A (zh) * 2010-08-05 2010-11-24 华为终端有限公司 Wi-Fi接入方法、接入点及Wi-Fi接入系统

Also Published As

Publication number Publication date
JP5281128B2 (ja) 2013-09-04
EP2416600A1 (en) 2012-02-08
JP2012054918A (ja) 2012-03-15
US20120036557A1 (en) 2012-02-09
CN101895962A (zh) 2010-11-24

Similar Documents

Publication Publication Date Title
WO2012016473A1 (zh) 无线保真接入方法、接入点及无线保真接入系统
US7039021B1 (en) Authentication method and apparatus for a wireless LAN system
WO2011014043A2 (en) Method and apparatus for creating security context and managing communication in mobile communication network
CN1781099B (zh) 在公共热点中的客户终端的自动配置
US11153755B2 (en) Method for adapting the security settings of a communication station, communication station and identification module
WO2016148548A1 (ko) 연결요구 장치와 연결수용 장치의 초기 셋업을 지원하는 기법
WO2015147547A1 (en) Method and apparatus for supporting login through user terminal
WO2015070638A1 (zh) 无线路由器及其快速接入控制方法、认证连接方法
KR20160114620A (ko) 동적 네트워크 액세스 관리를 위한 방법들, 디바이스들 및 시스템들
RU2003134279A (ru) Собственная wi-fi архитектура для сетей 802.11
WO2019143044A1 (ko) 약전계 환경에서 콜 연속성을 제공하는 전자 장치 및 제어 방법
BRPI0609971A2 (pt) método para gerenciar acesso a uma rede sem fio, sistema, um ou mais meios legìveis por computador, terminal móvel, dispositivo de controle de acesso, e, método para um dispositivo confiável gerenciar acesso a uma rede sem fio
JP2007533277A (ja) ローカル無線ネットワーク内で緊急接続を確立する方法
JP5781232B2 (ja) 通信装置およびネットワーク接続方法
CN103716795A (zh) 一种无线网络安全接入方法、装置和系统
WO2014094300A1 (zh) 远程控制通讯终端工作的服务器和方法及通讯终端
WO2016127551A1 (zh) 基于可穿戴设备的通信方法及系统
CN111050415B (zh) 一种操作便捷的无线数据传输方法
WO2018000674A1 (zh) 网络连接方法、网络连接装置和终端
KR100763131B1 (ko) 공중 무선랜 서비스를 위한 망접속 및 서비스 등록 방법
KR20050026509A (ko) 무선 로컬 네트워크를 umts 터미널 스테이션에접속하기 위한 방법 및 데이터 시스템
JP3964338B2 (ja) 通信ネットワークシステム、通信端末機、認証装置、認証サーバ、及び電子認証方法
WO2018028479A1 (zh) 热点快速连接方法及系统
KR100428964B1 (ko) 무선 랜에서의 인증 제공을 위한 로그인 id 인증 방법및 시스템
CN101155106B (zh) 一种组建wlan安全系统的方法和装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11814056

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 11814056

Country of ref document: EP

Kind code of ref document: A1