WO2013097348A1 - Procédé et dispositif d'authentification d'accès à protocole d'authentification extensible - Google Patents

Procédé et dispositif d'authentification d'accès à protocole d'authentification extensible Download PDF

Info

Publication number
WO2013097348A1
WO2013097348A1 PCT/CN2012/072155 CN2012072155W WO2013097348A1 WO 2013097348 A1 WO2013097348 A1 WO 2013097348A1 CN 2012072155 W CN2012072155 W CN 2012072155W WO 2013097348 A1 WO2013097348 A1 WO 2013097348A1
Authority
WO
WIPO (PCT)
Prior art keywords
parameter
app
terminal device
authentication
eap
Prior art date
Application number
PCT/CN2012/072155
Other languages
English (en)
Chinese (zh)
Inventor
刘少华
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2013097348A1 publication Critical patent/WO2013097348A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Definitions

  • the present invention relates to the field of communications, and in particular to a scalable authentication protocol authentication access method and apparatus.
  • An Extensible Authentication Protocol is a user access network authentication protocol based on a Universal Subscriber Identity Module (USIM) card.
  • the protocol can be directly applied to the data link layer, such as 802.11, 802.3, and Point to Point Protocol (PPP), providing mechanisms for retransmitting and eliminating duplicate messages.
  • PPP Point to Point Protocol
  • All types of authentication can be supported. Different authentication access methods are implemented by extending EAP request response messages and introducing different authentication methods, including EAP-SIM, EAP-authentication, and key agreement. Authentication and Key Agreement (AKA).
  • AKA Authentication and Key Agreement
  • EAP-SIM uses the Global System for Mobile Communication (GSM) authentication method and SIM's key distribution mechanism to implement two-way authentication of terminals and networks based on GSM one-way authentication.
  • GSM Global System for Mobile Communication
  • EAP-AKA uses the AKA rights method and the USIM key distribution mechanism to implement two-way authentication between the terminal and the network.
  • EAP authentication must be based on the USIM card. Therefore, this authentication method mainly appears in terminal devices embedded in USIM cards, such as mobile phones, data cards, modules, and tablets.
  • the EAP authentication process of the current data card is mostly integrated in the UI.
  • the access point (Access Point, AP for short) is selected on the UI, the authentication mode is selected, the SIM card information is queried and recorded, and the authentication parameters are used. Organization, processing of connection results, etc.
  • AP Access Point
  • the present invention provides a scalable authentication protocol authentication access method and apparatus, to at least solve the problem that the EAP authentication in the related art causes the terminal device to have a large dependence on the external environment.
  • an extensible authentication protocol authentication access method including: receiving a connection request from an APP of a terminal device, wherein the connection request is used by an APP to request access to a designated AP thereof;
  • the parameter of the AP and the parameter of the USIM card of the terminal device generate an EAP authentication request message; and send an EAP authentication request message to the DRIVER of the terminal device.
  • the method Before receiving the connection request from the APP of the terminal device, the method further includes: receiving a scan instruction from the APP for instructing scanning of the AP; scanning to one or more APs according to the scan instruction; sending one or more to the APP
  • the parameters of the AP wherein the parameters of one or more APs include at least one of the following: authentication type, encryption mode, network mode, physical address, and signal strength.
  • the method further includes: determining that the access status of the APP requesting access to the designated AP is the accessed state; A message indicating the termination of the connection.
  • the method further includes: determining that the access state of the APP requesting access to the specified AP is a pending access state, where the access mode is to be accessed.
  • the status includes one of the following: searching AP status, disconnecting status, initializing status; indicating that the APP delays waiting for the access status of its designated AP to exit the pending status.
  • the method Before generating the EAP authentication request message according to the parameter of the specified AP and the parameter of the USIM card of the terminal device, the method further includes: determining whether the specified AP supports EAP authentication; if the determination result is yes, performing the The parameter and the parameters of the USIM card of the terminal device generate an operation of the EAP authentication request message. Before the EAP authentication request message is generated according to the parameter of the specified AP and the parameter of the USIM card of the terminal device, the method further includes: determining whether the signal strength of the specified AP meets the requirement of the terminal device; if the determination result is yes, performing the The operation of the EAP authentication request message is generated by the parameters of the specified AP and the parameters of the USIM card of the terminal device.
  • the generating an EAP authentication request message according to the parameter of the specified AP and the parameter of the USIM card of the terminal device includes: determining an EAP authentication mode according to the type of the USIM card, where the EAP authentication mode includes one of the following: EAP-SIM, EAP-AKA;
  • the authentication request message carries the EAP authentication mode.
  • the method further includes: starting a timer, wherein the timer is configured to monitor whether the EAP authentication result from the DRIVER is received within a predetermined time.
  • an extensible authentication protocol authentication access apparatus comprising a first receiving module configured to receive a connection request from an application layer APP of a terminal device, wherein the connection request is used for APP request access a specified AP; a generating module, configured to generate an extensible authentication protocol EAP authentication request message according to a parameter of the specified AP and a parameter of the USIM card of the terminal device; the first sending module is configured to send the EAP to the driving layer DRIVER of the terminal device Authentication request message.
  • the device further includes: a second receiving module, configured to receive a scan instruction from the APP for instructing scanning of the AP; a scanning module configured to scan to one or more APs according to the scan instruction; and a second sending module configured to The APP sends parameters of one or more APs, where the parameters of one or more APs include at least one of the following: authentication type, encryption mode, network mode, physical address, and signal strength.
  • a second receiving module configured to receive a scan instruction from the APP for instructing scanning of the AP
  • a scanning module configured to scan to one or more APs according to the scan instruction
  • a second sending module configured to The APP sends parameters of one or more APs, where the parameters of one or more APs include at least one of the following: authentication type, encryption mode, network mode, physical address, and signal strength.
  • FIG. 1 is a flowchart of an extensible authentication protocol authentication access method according to an embodiment of the present invention
  • FIG. 2 is an overall flowchart of EAP authentication access according to an embodiment of the present invention
  • FIG. 4 is a structural block diagram of an extensible authentication protocol authentication access apparatus according to an embodiment of the present invention
  • FIG. 5 is an extensible authentication protocol authentication access apparatus according to a preferred embodiment of the present invention
  • FIG. 6 is a structural block diagram 2 of an extensible authentication protocol authentication access apparatus according to a preferred embodiment of the present invention
  • FIG. 7 is a structural block diagram of an extensible authentication protocol authentication access apparatus according to a preferred embodiment of the present invention.
  • Step S102 Receive a connection request from an APP of the terminal device, where the connection request is used by the APP to request access to the designated AP.
  • Step S104 Generate an EAP authentication request message according to the parameter of the specified AP and the parameter of the USIM card of the terminal device.
  • Step S106 sending an EAP authentication request message to the DRIVER of the terminal device.
  • the EAP authentication causes the terminal device to have a greater dependence on the external environment.
  • an EAP authentication-based EAP authentication access module is integrated in the terminal device, which can reduce the dependence of the terminal on the external environment and improve the performance of the entire system.
  • the information related to the SIM card and the terminal exposed by the present invention is small, and the security performance can be greatly improved.
  • the integration of the module greatly reduces various abnormal faults, the stability of the entire system is improved.
  • the method before receiving the connection request from the APP of the terminal device, the method further includes: receiving a scan instruction from the APP for instructing scanning of the AP; scanning to one or more APs according to the scan instruction; sending to the APP A parameter of one or more APs, where the parameters of one or more APs include at least one of the following: an authentication type, an encryption mode, a network mode, a physical address, and a signal strength.
  • the scan instructions do not need to pass any parameters.
  • the following describes the EAP authentication access process of the present invention by using the WLAN connection process as an example, including the following steps 1 to 7. Step 1.
  • the WIFI driver layer is successfully initialized.
  • Step 2 Scan the APs available in the current network, and record related parameters of each AP into the AP list.
  • Step 3 After receiving the specified AP connection command, determine the validity of the AP and obtain the parameters of the AP.
  • Step 4 Obtain the USIM card information and determine the authentication mode, and assemble the EAP authentication message parameters.
  • Step 5 Correctly process and feedback the authentication result, and reset the connection status.
  • Step 6. Initiate a DHCP request and apply for a network address.
  • Step 7. Complete the data transfer. That is, the following method is adopted in the embodiment: The card side receives the commands of scanning, connecting, disconnecting, etc. delivered by the APP, completes the EAP authentication of the AP, and accesses the AP, and feeds back the connection result.
  • the first 5 steps are necessary to complete EAP authentication. It should be noted that before the WIFI driver layer is initialized, the WIFI switch must be turned on before WIFI can start working. Before connecting to the AP, you need to scan the APs available in the network and obtain some authentication parameters provided by the AP for connection. If there is no USIM. If the card or USIM does not open the related service, it cannot be authenticated. If the authentication result is successful, failure, timeout, etc., the subsequent processing of the module itself and feedback of the corresponding result should be completed to the APP. The next two steps are necessary to transfer data.
  • the function module can correctly receive the message instruction of the APP, convert it into a command type that can be recognized by the WIFI driver layer, and complete data transfer between the APP and the WIFI driver layer.
  • the EAP authentication access method may be presented in the form of a function module, where the module is responsible for receiving and feeding back various command messages of the upper layer, and directly transmitting data and commands to and from the WIFI driver layer (the WIFI driver layer is a WIFI chip).
  • the provider provides a set of interface layers that can handle various WIFI-related operations, which is not the focus of this patent.
  • the module can provide WIFI connection, disconnection, scanning AP and other AT command interfaces (for UI) and API interface (for secondary development) at the same time.
  • the number of interfaces is relatively small, and the form and incoming parameters are relatively simple. It can effectively reduce the workload of secondary development, while reducing the dependence on the UI. For example, as long as the AT command connected to an AP is sent, the entire connection process can be completed; when the API interface is called, the name of the AP is also passed.
  • the method further includes: determining that the access state of the APP requesting access to the designated AP is the accessed state; The APP sends a message indicating the termination of the connection.
  • the connection state is already established, the connection action is terminated to avoid waste of system resources.
  • the method further includes: determining that the access state of the APP requesting access to the designated AP is a pending state, where The to-be-accessed state includes one of the following: searching for an AP state, a disconnecting state, and an initializing state; indicating that the APP delays waiting for an access state of its designated AP to exit the pending access state.
  • the method before the generating an EAP authentication request message according to the parameter of the specified AP and the parameter of the USIM card of the terminal device, the method further includes: determining whether the specified AP supports EAP authentication; If yes, an operation of generating an EAP authentication request message according to the parameters of the specified AP and the parameters of the USIM card of the terminal device is performed.
  • the designated operation is performed in the case of judging the support of the authentication, thereby avoiding waste of system resources.
  • the method before the generating the EAP authentication request message according to the parameter of the specified AP and the parameter of the USIM card of the terminal device, the method further includes: determining whether the signal strength of the specified AP meets the requirement of the terminal device; if the determination result is yes, Then, an operation of generating an EAP authentication request message according to the parameters of the specified AP and the parameters of the USIM card of the terminal device is performed.
  • the specified operation is performed in the case where it is judged that the signal strength satisfies the requirement, thereby avoiding waste of system resources.
  • generating the EAP authentication request message according to the parameter of the specified AP and the parameter of the USIM card of the terminal device includes: determining an EAP authentication mode according to the type of the USIM card, where the EAP authentication mode includes one of the following: EAP-SIM, EAP-AKA The EAP authentication mode is carried in the EAP authentication request message.
  • the method further includes: starting a timer, wherein the timer is configured to monitor whether the EAP authentication result from the DRIVER is received within a predetermined time.
  • Step S202 in the MODEM, the module is powered on, and the data port is inserted into the USB port.
  • Step S204 initializing system resources, including platform initialization, creating system resources, and the like.
  • Step S206 creating a message processing thread, the thread is the main working thread of the module.
  • the operations of connecting, scanning, disconnecting, etc., and the results of these operations are all received by the module thread in the form of a message.
  • the thread receives the message, it performs corresponding
  • the next step is to set the current operating state, such as the connected state, disconnected state, idle state, and so on.
  • the MODEM underlying driver is initialized.
  • the APP sends a scan AP command.
  • the MODEM receives the scan instruction of the APP, and performs the scanning operation.
  • the module can receive the APP command and work normally. You must scan before connecting. Because it must be obtained
  • the APs in the current network and the related parameters of each AP can be used as the basis for access to successfully connect to the AP.
  • step S214 the DRIVER learns the available APs in the current network and sends them to the WLAN-AN.
  • DRIVER records information about each AP from the node and sends it to the MODEM.
  • step S218, the APs and their key parameters are fed back to the APP in a list form, and the key parameters refer to the authentication type, the encryption mode, and the signal strength. This allows the upper layer to determine which APs are available for use.
  • step S220 the APP obtains the AP list.
  • step S222 the APP specifies an AP to connect.
  • step S224 the MODEM starts to initiate an EAP authentication request and waits for the DRIVER layer to return the authentication result.
  • the EAP authentication interaction also involves many more detailed details, which will be further explained in subsequent Figure 3.
  • Step S226 the DRIVER layer will complete the interaction of the protocol message related to the EAP authentication with the network.
  • step S230 the MODEM layer receives the authentication result and the processing details, which will be described in detail in FIG. Return the connection result to the APP.
  • step S232 the APP acquires the connection result.
  • Step S234 if the authentication is successful, the APP can apply for the network address.
  • Step S236, the MODEM receives the network address request of the APP, and sends various data packets related to the DHCP request to the DRIVER.
  • Step S238, the DRIVER layer encapsulates the data and sends it to apply for a network address (including DS, IP address, gateway address, etc.).
  • Step S240 if the network card device can be enumerated when the data card is connected to the PC, the DHCP request can be completed by the PC.
  • MODEM only needs to perform data transfer.
  • the MODEM can report the network address to the APP, or directly forward the DHCP packet to the PC, and the PC resolves the network address by itself.
  • the AP connection process is completed.
  • Step S250 after receiving the instruction, the MODEM sends an offline message to the DRIVER layer.
  • step S252 DRIVER encapsulates the data and sends it to the WLAN-AN. Because the general EAP certified server has a billing system.
  • step S254 DRIVER forwards the data to the MODEM.
  • step S256 the MODEM analyzes the response of the offline message.
  • step S260 DRIVER sends a disconnect request to the AP.
  • step S262 the APP receives further processing of the disconnection result, including related timer reset, connection status setting, and result reporting APP.
  • DRIVER returns the disconnection result to the MODEM and processes the report.
  • step S264 the MODEM processes the disconnection result and reports it.
  • step S266 the disconnection ends.
  • FIG. 3 is a detailed flowchart of performing EAP authentication according to an embodiment of the present invention. As shown in FIG. 3, the following steps S302 to S338 are included. Step S302, receiving a specified AP connection request of the APP, marking the start of an EAP authentication.
  • Step S304 the MODEM determines the validity of the AP that is sent by the APP.
  • Step S306 determine whether the AP exists in the network, and then determine whether the AP supports EAP authentication; then check whether the signal strength analysis is suitable for connection.
  • Step S306 obtaining an AP parameter, and some parameters of the AP are used for accessing, such as an authentication type, an encryption mode, a network mode, and the like.
  • the DRIVER layer has already recorded these parameters, and the MODEM is directly acquired and saved to DRIVER.
  • Step S308 detecting the current state.
  • step S310 it is determined whether the connection is in progress. If the process of the last connection is not completed, that is, the connection state is still currently in progress, step S312 is performed; if not, the step S314 is performed. Step S312, returning information that the APP is currently busy.
  • step S314 it is determined whether the current is idle. If yes, go to step S316; if no, go to step S336.
  • Step S316 determining an EAP authentication mode, generally having two types of EAP-SIM and EAP-AKA. The selection of the mode can be determined by the user or by determining the type of the SIM card.
  • IMSI International Mobile Subscriber Identification
  • Step S320 organizing the authentication parameter, because the DRIVER layer and the AP need a series of authentication information, such as an AP name, an authentication type, an encryption mode, a network mode, an IMSI number, a key, etc., so the MODEM must be from various The way to get these parameters is effectively organized and sent to the DRIVER layer.
  • the MODEM initiates an authentication request, and all the required parameters are brought in at this time.
  • Step S324 starting a timer.
  • the MODEM introduces a timeout mechanism, and does not receive the authentication result within a certain period of time to perform timeout failure processing.
  • the MODEM determines whether the authentication result returned by the DRIVER is received within the specified timeout period.
  • Step S328 stopping and resetting the timer.
  • Step S330 resetting the connection state.
  • the result of the authentication is reported to the APP, which is a successful connection, a connection failure, or a connection timeout. Different authentication results determine the next operation of the APP, such as reconnection, disconnection, and network address application.
  • the result of the determination is a connection timeout.
  • other states such as searching for the AP state, the disconnecting state, and the initializing state, delay waiting to return to the idle state and then performing the connection. Also, if you are currently connected to the network.
  • step S3308 the connection ends.
  • the EAP certification is basically completed.
  • MODEM implements a complete set of WLAN access procedures. There are only a few simple message instructions provided to the APP. The scanning AP does not need to pass any parameters, and can return all available APs and various required authentication parameters for AP reference. The AP only needs to specify the AP name. If necessary, the key is re-introduced. The MODEM side fully considers the various situations that may occur during the access. The APP only needs to wait for the connection result. The MODEM can even inform the AP of the reason for the failure in the case of a connection failure.
  • the open connection also does not need to carry other parameters, and the MODEM also considers the function of terminating server billing. If the APP needs, the MODEM can also inform the AP of the changes in the AP list and parameters, the signal strength of each AP, and let the APP select the appropriate AP to connect, the theoretical rate that each AP can bear, and so on. In this way, whether it is secondary development or UI design, the interface with MODEM has become very simple. It also reduces the development amount and debugging difficulty of the APP side. Even if you change the app, the card side can be fully adapted with a few changes. In addition, the MODEM side can also consider non-EAP authentication mode access to adapt to the user's connection to the ordinary AP.
  • FIG. 4 is a structural block diagram of an extensible authentication protocol authentication access apparatus according to an embodiment of the present invention. As shown in FIG. 4, the first receiving module 42, the generating module 44, and the first sending module 46 are included.
  • the first receiving module 42 is configured to receive a connection request from the application layer APP of the terminal device, where the connection request is used for the APP to request access to its designated AP;
  • the generating module 44 is connected to the first receiving module 42 and configured to be specified according to the The parameter of the AP and the parameter of the USIM card of the terminal device generate an extensible authentication protocol EAP authentication request message;
  • the first sending module 46 is connected to the generating module 44, and is configured to send an EAP authentication request message to the driver layer DRIVER of the terminal device.
  • 5 is a structural block diagram of an extensible authentication protocol authentication access device according to a preferred embodiment of the present invention. As shown in FIG.
  • the device further includes: a second receiving module 48, configured to receive an indication scan from the APP. Scanning instruction of the AP; the scanning module 410 is connected to the second receiving module 48, and is set to scan according to the scanning instruction
  • the first sending module 412 is connected to the scanning module 410, and is configured to send parameters of one or more APs to the APP, where the parameters of the one or more APs include at least one of the following: authentication type, encryption Mode, network mode, physical address, signal strength.
  • FIG. 6 is a block diagram showing the structure of an extensible authentication protocol authentication access device according to a preferred embodiment of the present invention. As shown in FIG.
  • the device further includes: a first determining module 414 connected to the first receiving module 42 and configured to be configured as Determining that the access status of the APP requesting access to its designated AP is the accessed state; the third sending module 416 is connected to the first determining module 414, and is configured to send a message to the APP for indicating termination of the connection.
  • FIG. 7 is a structural block diagram 3 of an extensible authentication protocol authentication access apparatus according to a preferred embodiment of the present invention. As shown in FIG.
  • the apparatus further includes: a second determining module 418 connected to the first receiving module 42 and configured to Determining that the access status of the APP requesting access to the specified AP is a pending access state, wherein the to-be-accessed state includes one of the following: searching for an AP state, a disconnecting state, and an initializing state; the indicating module 420, connecting to the second determining The module 418 is configured to indicate that the APP delays waiting for the access state of the designated AP to exit the pending state.
  • the extensible authentication protocol authentication access device described in the device embodiment corresponds to the foregoing method embodiment, and the specific implementation process has been described in detail in the method embodiment, and details are not described herein again.
  • an extended authentication protocol authentication access method and apparatus are provided.
  • an EAP authentication-based EAP authentication access module is integrated in the terminal device, which reduces the dependence of the terminal on the external environment and improves the performance of the entire system.
  • the above modules or steps of the present invention can be implemented by a general-purpose computing device, which can be concentrated on a single computing device or distributed over a network composed of multiple computing devices.
  • the invention is not limited to any specific combination of hardware and software.
  • the above is only the preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes can be made to the present invention. Any modifications, equivalent substitutions, improvements, etc. made within the spirit and scope of the present invention are intended to be included within the scope of the present invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention porte sur un procédé et un dispositif d'authentification d'accès à protocole d'authentification extensible (EAP). Le procédé consiste à : recevoir une requête de connexion en provenance d'une APP d'un dispositif terminal, la requête de connexion étant utilisée par l'APP pour demander d'accéder à un AP spécifié de celle-ci ; générer un message de requête d'authentification EAP conformément à un paramètre de l'AP spécifié et à un paramètre USIM du dispositif terminal ; et envoyer le message de requête d'authentification EAP à un pilote du dispositif terminal. Selon la présente invention, des modules d'accès à authentification EAP basés sur une authentification EAP sont intégrés dans le dispositif terminal, la dépendance d'un terminal à l'environnement externe est réduite et les performances du système globales sont améliorées.
PCT/CN2012/072155 2011-12-29 2012-03-09 Procédé et dispositif d'authentification d'accès à protocole d'authentification extensible WO2013097348A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201110452235.0A CN103188676B (zh) 2011-12-29 2011-12-29 可扩展认证协议认证接入方法及装置
CN201110452235.0 2011-12-29

Publications (1)

Publication Number Publication Date
WO2013097348A1 true WO2013097348A1 (fr) 2013-07-04

Family

ID=48679563

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2012/072155 WO2013097348A1 (fr) 2011-12-29 2012-03-09 Procédé et dispositif d'authentification d'accès à protocole d'authentification extensible

Country Status (2)

Country Link
CN (1) CN103188676B (fr)
WO (1) WO2013097348A1 (fr)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105187391B (zh) * 2015-08-10 2018-10-16 上海迈外迪网络科技有限公司 App及其登录网络接入点方法、服务器及系统
CN107148019B (zh) * 2017-05-12 2019-06-21 上海连尚网络科技有限公司 一种用于连接无线接入点的方法与设备

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1688124A (zh) * 2005-05-16 2005-10-26 中国科学院计算技术研究所 基于端口技术和认证协议的无线网络接入控制方法
CN101562814A (zh) * 2009-05-15 2009-10-21 中兴通讯股份有限公司 一种第三代网络的接入方法及系统
CN101631354A (zh) * 2008-07-18 2010-01-20 华为技术有限公司 一种分组数据网络选择的方法、装置与系统
CN101656661A (zh) * 2008-08-18 2010-02-24 华为技术有限公司 实现可信信息传递的方法、系统和设备

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7505596B2 (en) * 2003-12-05 2009-03-17 Microsoft Corporation Automatic detection of wireless network type

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1688124A (zh) * 2005-05-16 2005-10-26 中国科学院计算技术研究所 基于端口技术和认证协议的无线网络接入控制方法
CN101631354A (zh) * 2008-07-18 2010-01-20 华为技术有限公司 一种分组数据网络选择的方法、装置与系统
CN101656661A (zh) * 2008-08-18 2010-02-24 华为技术有限公司 实现可信信息传递的方法、系统和设备
CN101562814A (zh) * 2009-05-15 2009-10-21 中兴通讯股份有限公司 一种第三代网络的接入方法及系统

Also Published As

Publication number Publication date
CN103188676A (zh) 2013-07-03
CN103188676B (zh) 2017-12-26

Similar Documents

Publication Publication Date Title
CN106535288B (zh) 一种发送和获取wifi联网信息的方法和对应装置
US9774704B2 (en) Home gateway, cloud server, and method for communication therebetween
KR101120731B1 (ko) 확장가능 무선 프레임워크
US8743903B2 (en) Hybrid networking simple-connect setup using forwarding device
WO2011150782A1 (fr) Procédé, dispositif et système de configuration d'un paramètre de fidélité sans fil (wifi)
US8700780B2 (en) Group owner selection with crossing requests
US20130346553A1 (en) Apparatus and method for providing universal plug and play service based on wi-fi direct connection in portable terminal
JP2014501057A (ja) ネットワークインターフェースの自動設定に基づいてインターネット連結を共有する方法及び装置
WO2014183404A1 (fr) Procédé, appareil, système et terminal de transmission de données
EP4104489A1 (fr) Configuration easymesh d'un ap à l'aide de la norme ieee 1905,1
CN112566113B (zh) 密钥生成以及终端配网方法、装置、设备
US9025448B2 (en) Methods and apparatuses for accessing internet
WO2014036933A1 (fr) Procédé, dispositif, et système de partage de contenu entre dispositifs
WO2013075415A1 (fr) Procédé et système de téléchargement au moyen d'une diffusion dans un réseau omniprésent
WO2014169670A1 (fr) Procédé et système de réseautage wlan
WO2012175024A1 (fr) Procédé, système et dispositif de réalisation d'un accès simultané de transmission de données sans fil et d'émission-réception de messages courts
WO2011009339A1 (fr) Procédé, système et dispositif de transmission de données
WO2013097348A1 (fr) Procédé et dispositif d'authentification d'accès à protocole d'authentification extensible
EP2475199A1 (fr) Procédé et service de transfert pour réseau d'accès au service
US20160095143A1 (en) Remote provisioning of wireless stations with confirmation
WO2012155571A1 (fr) Procédé et dispositif de configuration automatique de station de base
WO2022174652A1 (fr) Procédé et système de découverte automatique de configuration de réseau par un terminal intelligent
WO2011015049A1 (fr) Procédé et dispositif d’établissement d’un canal de données entre des éléments d’un réseau de service d’accès
WO2013170816A1 (fr) Procédé et dispositif pour gérer la libération d'un port réseau d'un terminal mobile
WO2011020323A1 (fr) Procédé et dispositif d’établissement de sortie de mode repos pour un réseau de service d’accès

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12863350

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 12863350

Country of ref document: EP

Kind code of ref document: A1