WO2014026356A1 - 无线网络建立连接的方法和设备 - Google Patents
无线网络建立连接的方法和设备 Download PDFInfo
- Publication number
- WO2014026356A1 WO2014026356A1 PCT/CN2012/080230 CN2012080230W WO2014026356A1 WO 2014026356 A1 WO2014026356 A1 WO 2014026356A1 CN 2012080230 W CN2012080230 W CN 2012080230W WO 2014026356 A1 WO2014026356 A1 WO 2014026356A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- response message
- message
- power
- path loss
- terminal
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 99
- 230000004044 response Effects 0.000 claims abstract description 199
- 230000005540 biological transmission Effects 0.000 claims abstract description 55
- 238000001514 detection method Methods 0.000 claims abstract description 41
- 230000008859 change Effects 0.000 claims description 44
- 238000007667 floating Methods 0.000 claims description 26
- 239000000523 sample Substances 0.000 description 140
- 230000008569 process Effects 0.000 description 31
- 238000010586 diagram Methods 0.000 description 20
- 230000011664 signaling Effects 0.000 description 12
- 230000003993 interaction Effects 0.000 description 10
- 230000006870 function Effects 0.000 description 5
- 238000012545 processing Methods 0.000 description 4
- 238000004364 calculation method Methods 0.000 description 3
- 238000000060 site-specific infrared dichroism spectroscopy Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 230000035945 sensitivity Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 230000002238 attenuated effect Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000002194 synthesizing effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/047—Key management, e.g. using generic bootstrapping architecture [GBA] without using a trusted network node as an anchor
- H04W12/0471—Key exchange
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/20—Selecting an access point
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
- H04W48/14—Access restriction or access information delivery, e.g. discovery data delivery using user query or user detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/14—Direct-mode setup
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/20—Information technology specific aspects, e.g. CAD, simulation, modelling, system security
Definitions
- the present invention relates to communications technologies, and in particular, to a method and an apparatus for establishing a connection in a wireless network. Background technique
- WiFi Wireless Fidelity
- Many laptops and mobile phones now support WiFi technology and WiFi.
- the access point (Access Point, AP for short) of the network is spread over hotels, cafes and hospitals.
- the WiFi network When establishing a connection, the WiFi network needs to first configure the network configuration information (such as a key) required for the WiFi network to establish a connection on the terminal, and the terminal and the AP can establish a connection, and the terminal can access the WiFi network.
- the network configuration information is usually manually input by the user; for example, in a store such as McDonald's or a coffee shop, the user needs to obtain a password paper at the service desk, and enter the password on the password paper on his terminal (ie, Network configuration information can be connected to the WiFi network in the store; or, when the enterprise holds an internal conference in the conference room, in order to prevent people outside the conference room from accessing, it is also necessary for the indoor participants to manually input the password (ie, network configuration). Information) After accessing the authentication, the conference room WiFi network can be accessed.
- the WiFi Alliance has developed a WiFi protected setup (WPS) method, and the WPS can implement part of the information required by the network, such as a Service Set Identifier.
- WPS WiFi protected setup
- Automatic configuration of the SSID and the like, and the secure connection of the network is implemented; however, at the beginning of the WPS process, the network configuration information needs to be configured on the terminal, so that the terminal establishes a connection with the AP according to the network configuration information, so as to perform subsequent Transmission of information such as SSID of WPS.
- the method of configuring the network configuration information on the terminal is also manually configured by the user. For example, the user needs to find the Personal Identification Number (PIN) on the AP label from the AP and manually input it to the terminal.
- PIN Personal Identification Number
- Embodiments of the present invention provide a method and a device for establishing a connection in a wireless network, so as to reduce a terminal and
- a first aspect of the present invention provides a method for establishing a connection in a wireless network, including: sending, by a first device, a probe message to a second device by using a first transmit power, and receiving a first response returned by the second device a message, the first response message carries a first received power when the second device receives the probe message;
- the first device sends a probe message to the second device, where the probe message is used to indicate that the second device sends a second response message by using a second transmit power, and the first device receives the second message. Responding to the message and detecting the second received power when the second response message is received; or: the first device sends a probe message to the second device by using the first transmit power, where the probe message is used to indicate the The second device sends a third response message by using the second transmit power, where the first device receives the third response message, where the third response message carries the first received power when the second device receives the probe message. The first device detects that the second received power when the third response message is received is obtained;
- the device determines that the distance between the first device and the second device is within a preset distance according to the path loss, sending, to the second device, network configuration information required to access the wireless network, so that The second device establishes a connection with the wireless network according to the network configuration information.
- the path loss obtained by the first device according to the first transmit power and the first received power is a first path loss, and the first device is configured according to the second transmit power.
- the path loss obtained by the second received power is a second path loss; after the first device determines that the distance between the first device and the second device is within a preset distance range according to the path loss
- the method further includes: comparing, by the first device, the second path loss with the first path loss, if the loss between the two is The value of the change is within the range of the preset loss change value, and the terminal is identified as a real device.
- the method further includes: the first device calculates a floating change value of the multiple path loss, and if the floating change value is within a preset floating change value range, the terminal is identified as a real device.
- the method before the first device sends the probe message to the second device, the method further includes: acquiring, by using a key exchange algorithm, the key between the first device and the second device, to utilize The key pair encrypts the probe message sent by the second device, and decrypts a response message received from the second device, where the response message is the first response message and the second response Message or third response message.
- Another aspect of the present invention provides a method for establishing a wireless network, including: receiving, by a second device, a probe message sent by the first device by using a first transmit power, and returning a first response message to the first device The first response message carries a first received power when the second device receives the probe message;
- the second device receives the probe message sent by the first device, where the probe message is used to indicate that the second device sends a second response message by using the second transmit power, where the second device sends the second Sending, by the device, the second response message, so that the first device detects that the second received power when the second response message is received is obtained;
- the second device receives the probe message sent by the first device by using the first transmit power, where the probe message is used to indicate that the second device sends a third response message by using the second transmit power, where the second device The device sends the third response message to the first device, where the third response message carries the first received power when the second device receives the probe message, so that the first device detects the received and received a second received power to the third response message;
- Network configuration information that is required by the first device to access the wireless network, where the network configuration information is that the first device is according to the first transmit power and the first received power, or according to the Transmitting the second transmit power and the second receive power, and determining that the distance between the first device and the second device is within a preset distance range;
- the second device establishes a connection with the wireless network according to the network configuration information.
- the method before the second device receives the probe message sent by the first device, the method further includes: acquiring, by using a key exchange algorithm, the key between the second device and the first device, Encrypting the response message sent to the first device with the key pair, and The probe message received from the first device is decrypted, and the response message is the first response message, the second response message, or the third response message.
- a further aspect of the embodiments of the present invention provides a first device, including:
- a message transmission unit configured to send a probe message to the second device by using the first transmit power, and receive a first response message returned by the second device, where the first response message carries the second device to receive the probe The first received power at the time of the message;
- a distance determining unit configured to obtain a path loss between the first device and the second device according to the first transmit power and the first received power, or according to the second transmit power and the second receive power; And determining, according to the path loss, that the distance between the first device and the second device is within a preset distance range;
- An information sending unit configured to: when the distance determining unit determines that a distance between the first device and the second device is within a preset distance range, send network configuration information to the second device, so that the The two devices establish a connection with the wireless network according to the network configuration information.
- the path loss obtained by the distance determining unit according to the first transmit power and the first received power is a first path loss, according to the second transmit power and the second receive power.
- the obtained path loss is the second path loss;
- the device further includes: a device identification unit, configured to compare the second path loss with the first path loss, and if the loss change value between the two is within a preset loss change value, identify the terminal as a real device And instructing the information sending unit to send network configuration information to the second device.
- a device identification unit configured to compare the second path loss with the first path loss, and if the loss change value between the two is within a preset loss change value, identify the terminal as a real device And instructing the information sending unit to send network configuration information to the second device.
- the number of the path loss obtained by the distance determining unit is multiple, and the device identifying unit is further configured to calculate a floating change value of the plurality of the path loss, if When the floating change value is within the preset floating change value range, the terminal is identified as a real device, and the information sending unit is instructed to send network configuration information to the second device.
- the key exchange unit is configured to acquire a key by using a key exchange algorithm with the second device to send the probe message to the second device, to use the key. Encrypting the probe message sent to the second device, and decrypting a response message received from the second device, where the response message is the first response message, the second response message, or the third Response message.
- a further aspect of the embodiments of the present invention provides a second device, including:
- a message transmission unit configured to receive a probe message sent by the first device by using the first transmit power, and return a first response message to the first device, where the first response message carries the second device to receive the Describe the first received power when the message is detected;
- An information receiving unit configured to receive network configuration information required by the first device to access the wireless network, where the network configuration information is that the first device is according to the first transmit power and the first received power, or according to The second transmit power and the second receive power are determined to be sent when the distance between the first device and the second device is within a preset distance range;
- a connection establishing unit configured to establish a connection with the wireless network according to the network configuration information.
- the method further includes: a key exchange unit, configured to acquire a key by using a key exchange algorithm with the first device before receiving the probe message sent by the first device, to Decrypting the response message sent to the first device by using the key, and decrypting the probe message received from the first device, where the response message is the first response message and the second response message Or a third response message.
- the technical effects of the wireless network establishing method and device provided by the embodiments of the present invention are: determining, by the first device, the path loss between the second device and the first device When the distance is within the preset distance, the network configuration information is sent to the second device, so that the user only needs to bring both the first device and the second device into close proximity, and the first device can automatically perform the above calculation and Judging the processing and automatically sending the network configuration information to the second device, which greatly simplifies the user participation operation process compared to the prior art user manually searching for the input PIN, and the automatic configuration process also improves the wireless operation compared to the manual configuration. The efficiency of network establishment. DRAWINGS
- FIG. 1 is a schematic flowchart of an embodiment of a method for establishing a wireless network according to the present invention
- FIG. 2 is a schematic flowchart of another embodiment of a method for establishing a wireless network according to the present invention
- FIG. 3 is a schematic diagram of signaling according to still another embodiment of a method for establishing a wireless network according to the present invention
- FIG. 4 is a schematic diagram of signaling according to still another embodiment of a method for establishing a wireless network according to the present invention.
- FIG. 5 is a schematic diagram of signaling according to still another embodiment of a method for establishing a wireless network according to the present invention.
- FIG. 6 is a schematic signaling diagram of still another embodiment of a method for establishing a wireless network according to the present invention.
- FIG. 7 is a schematic diagram of signaling according to still another embodiment of a method for establishing a wireless network according to the present invention.
- FIG. 8 is a schematic diagram of signaling according to still another embodiment of a method for establishing a wireless network according to the present invention.
- FIG. 9 is a schematic structural view of an embodiment of a first device according to the present invention.
- FIG. 10 is a schematic structural diagram of another embodiment of a first device according to the present invention.
- FIG. 11 is a schematic structural diagram of a second device according to an embodiment of the present invention.
- FIG. 12 is a schematic structural view of still another embodiment of a first device of the present invention.
- FIG. 13 is a schematic structural diagram of another embodiment of a second device of the present invention. detailed description
- the first device may be a device having a function of detecting, calculating, and transmitting, for example, a mobile terminal having the above functions, etc.
- the first device is It is called AP mate; the AP mate pre-stores the network configuration information, and the AP mate automatically sends the network configuration information to the second device.
- the second device is, for example, a mobile phone, a notebook computer, or the like, and is required to be added to various terminals of the wireless network.
- the processing performed by the second device is described by taking a terminal as an example.
- the wireless network is not limited to a WiFi network.
- it can also be applied to wireless networks such as WiMax, Zigbee, 3G, and GSM.
- the probe message according to the embodiment of the present invention is a message that is sent by the first device to the second device, and is used to detect a path loss between the first device and the second device.
- the probe message may be separately The sent message, that is, the first device specifically sends the probe message to the second device, or may be a certain message existing between the first device and the second device, and the message also has the requirements of the embodiment.
- the function which is also referred to as a probe message; for example, an indication parameter indicating that the second device returns a response message with a certain transmit power is added to an existing message, and the existing message has the probe message of this embodiment.
- the function can also be called a probe message.
- FIG. 1 is a schematic flowchart of a method for establishing a connection in a wireless network according to the present invention.
- the method in this embodiment is performed by an AP mate.
- the method may include:
- the probe message is transmitted between the terminal and the terminal, and the transmit power and the receive power that are unidirectionally transmitted between the local and the terminal are obtained.
- the unidirectional transmission refers to, for example, that the probe message is sent by the local AP mate, and the terminal receives the probe message, which is transmitted from the AP mate to the terminal; or, the terminal sends the probe message, AP mate A probe message is received, which is transmitted from the terminal to the AP mate.
- the power of the AP mate to send the probe message is the transmit power
- the power of the terminal to receive the probe message is the received power
- the AP mate sends a probe message to the terminal with the first transmit power, and receives the first response message returned by the terminal, where the first response message carries the first received power when the terminal receives the probe message;
- the AP mate sends a probe message to the terminal, where the probe message is used to indicate that the terminal sends the second response message by using the second transmit power, and the AP mate receives the second response message and detects that the second response message is received. Second received power
- the AP mate sends a probe message to the terminal by using the first transmit power, where the probe message is used to indicate that the terminal sends the third response message by using the second transmit power, and the AP mate receives the third response message, the third response.
- the first received power when the message carrying terminal receives the probe message The AP mate detects the second received power when the third response message is received.
- the third way (ie, the other way) is different from the previous two methods in that the first two methods obtain two powers by transmitting two messages, for example, in the first mode, by detecting The transmission of the two messages, the message and the first response message, obtains two powers of the first transmit power and the first receive power.
- the third mode four powers are obtained by transmitting two messages, which is more efficient; for example, by transmitting the two messages of the probe message and the third response message, the first transmit power and the first receive power are obtained.
- the four powers of the second transmit power and the second receive power are obtained.
- the first device can adopt these methods when acquiring power (for example, the first transmit power, the first received power, etc.), each of which The power parameter value can be obtained in the manner of the first device.
- the embodiment does not limit the method to be performed in the method of the embodiment. It is possible to perform one or any combination of the above three methods, or perform a certain manner in a certain manner, etc., depending on the actual execution needs of the first device, for example, when the first device needs to determine whether the second device is a real device. , you may need to combine the above methods or perform some way multiple times to get the relevant parameters.
- the power parameters such as the first transmit power, the first receive power, and the like, in this embodiment may be converted into other measurement units in a specific implementation, and the power described in this embodiment will be This is included: for example, the power value can be equivalently converted to a signal strength value, the signal H complex - 10 Iog 0 (work umbrella value), the signal strength unit is dBm (decibel milliwatts), and the power value unit is mW ( Milliwatts).
- path loss (in dB) 32.5 + 20 * (logf (frequency, in GHz)) + logD (distance) , in meters),, .
- the path loss is related to the distance, and the loss caused by different distances is different. Generally, the farther the distance is, the larger the path loss is.
- the AP mate can obtain the path loss according to the first transmit power and the first received power, and the path loss can also be calculated according to the second transmit power and the second received power. These are all optional methods; , AP mate can choose any way to calculate the path loss. Or both ways are performed to obtain multiple path loss and the like.
- the distance between the terminal and the AP mate is determined by the AP mate according to the path loss. If the distance is within the preset distance, the network configuration information is sent to the terminal, which is equivalent to using the distance as the AP mate direction.
- the terminal when the user wants a terminal to perform a WPS connection with the AP, the terminal can be brought close to the AP mate, or the AP mate is brought close to the terminal, and the AP mate automatically performs the above steps to calculate the path. Loss, according to the path loss to determine the distance between the terminal and the AP mate, to meet the preset distance range, AP mate will automatically send network configuration information to the terminal.
- the user only needs to bring both the AP mate and the terminal close to each other, and the user manually searches for the input PIN and the like in the prior art, which is simpler for the user and greatly reduces the participation of the user; There is also no need to set a label for carrying a PIN on the AP, and the device cost is also reduced.
- the method for determining the distance between the terminal and the AP mate according to the path loss may be various. For example, if the preset distance range is lm ⁇ 1.5m, the AP mate may calculate according to the path loss and the path loss formula described above. Obtaining the distance D, and determining whether the D is in the range of lm ⁇ 1.5m; or, the AP mate is converted into the range of the path loss according to the preset distance range lm ⁇ l.5m, and the path loss formula described above, for example, The path loss corresponding to lm is ql, and the corresponding path loss is q2 at 1.5m, which is equivalent to the default path loss range is ql ⁇ q2. AP mate only needs to judge whether the obtained path loss is within the preset path loss range. That is, if it is in the range, it means that the distance between the terminal and the AP mate is within a preset distance.
- the foregoing preset distance range includes a point value, for example, a distance value, rather than a distance range.
- a distance value for example, a distance value
- the AP mate only needs to determine the path loss. Whether the corresponding distance is lm.
- the preset distance range can be set by the user.
- a user interaction interface can be set in the AP mate, and the user can adjust the appropriate preset distance range at any time through the interface; or adjust the preset. Path loss range, etc.
- the network configuration information may be, for example, a PIN code, a key, or the like of the AP. If it is a key, the key in this embodiment may be set to any length to ensure network security after configuration. Fullness.
- the terminal After obtaining the network configuration information, the terminal establishes a wireless network connection with the AP according to the following; the establishing the wireless network connection is, for example, after the terminal establishes a connection with the AP, performing wireless network security establishment WPS between the terminal and the AP.
- the process such as performing authentication with the AP and transmitting the WIFI configuration information, is the existing processing flow, and will not be described again.
- FIG. 2 is a schematic flowchart of another embodiment of a method for establishing a wireless network according to the present invention.
- the method in this embodiment is performed by a terminal.
- the method may include:
- the terminal when the probe message is transmitted from the AP mate to the terminal, the terminal reports to the AP mate the received power when the probe message is received, and the AP mate itself knows its transmit power; or, when the probe message is transmitted from the terminal to the AP mate
- the terminal can report the transmit power of the message to the AP mate, and the transmit power is that the AP mate indicates that the terminal sends the power, so the terminal can also not report the AP mate, and the AP mate itself can also obtain the probe.
- the network configuration information may be, for example, an PIN code, a key, or the like of the AP; the network configuration information is a path loss when the AP mate calculates the detection message transmission according to the foregoing transmit power and the received power, and according to the path loss. Determines when the distance between the terminal and the AP mate is within the preset range. That is, the AP mate will automatically determine the distance between the terminal through steps 201 and 202, and automatically send the network configuration information to the terminal when the distance is within the preset distance range. In this way, the user only needs to bring both the AP mate and the terminal close, which greatly simplifies the user's operation.
- Embodiment 3 to Embodiment 7 the interaction process between the AP mate and the terminal will be described in detail, and several possible implementation manners are listed; wherein, in each embodiment, the same is involved. The processing is described in detail only in one of the embodiments, and other embodiments will be briefly described.
- the AP mate will automatically perform the following method flow with the customer's terminal, automatically configure the terminal, the customer no longer needs to go to the service desk To receive the password paper; or, in the WPS configuration, the user no longer needs to manually input network configuration information such as a PIN code in the terminal, and the terminal can be close to the AP mate, and the AP mate and the terminal perform the following method flow.
- the AP-mate can automatically identify users within a certain range, such as the conference room range, the store range, or the preset proximity range of the WPS, and automatically send the network configuration information to the terminal, and the terminal automatically connects to the network according to the information.
- a certain range such as the conference room range, the store range, or the preset proximity range of the WPS
- FIG. 3 is a schematic diagram of signaling of a method for establishing a connection in a wireless network according to the present invention.
- the power of the probe message sent by the AP mate is the first transmit power
- the power of the terminal receiving the probe message is first.
- Receiving power; as shown in FIG. 3, the method may include:
- the AP mate and the terminal may obtain the key through the key exchange algorithm before transmitting the probe message.
- the interaction process in this step is mainly to exchange some parameters required for generating the key between the AP mate and the terminal, and then the AP mate and the AP mate
- the terminal generates a key according to the key exchange algorithm according to the exchanged parameters, and the subsequent detection process of the probe message uses the key to encrypt and transmit the probe message, or decrypts the response message returned by the terminal, so as to better Guarantee the security of message transmission.
- the above key exchange algorithm may use a commonly used algorithm, such as a D-H (Diffie-Hellman) key exchange algorithm, an RSA public key encryption algorithm, and the like.
- a trigger button is set on the AP mate and the terminal. After the user approaches the AP mate and the terminal, the trigger button is pressed. Then AP mate and the terminal will perform this step.
- the AP mate sends the probe message to the terminal by using the transmit power P.
- the transmit power P may be referred to as a first transmit power, may be preset in the AP mate, or may be randomly generated by the AP mate, etc., but the transmit power P is known only by the AP mate itself.
- the AP mate sends the probe message, it also instructs the terminal to report and receive the probe.
- the received power when the message is measured may carry an indication identifier in the probe message, so that the terminal reports the received power according to the indication identifier.
- the terminal reports, to the AP mate, the received power PA when the probe message is received.
- the terminal may report the received power that is attenuated by the probe message received by the AP to the AP mate according to the indication identifier carried in the probe message sent by the AP mate; for example, the terminal returns a first response message to the AP mate, where the first The response message carries the first received power when the terminal receives the probe message.
- the AP mate calculates a path loss of the probe message transmitted from the AP mate to the terminal according to the transmit power and the received power of the transmission probe message.
- the transmit power is the first transmit power of the AP mate to send the probe message in 302, and the received power is the first received power reported by the terminal to the AP mate in 303; the power attenuation occurs in the message transmission, usually the distance The larger the power attenuation, the higher the transmit power P (first transmit power) is than the received power PA (first received power).
- AP mate calculates the path loss as "P-PA", which is the path loss that occurs when the probe message is transmitted from the AP mate to the terminal.
- P-PA path loss that occurs when the probe message is transmitted from the AP mate to the terminal.
- the path loss is not necessarily the difference between the transmit power and the received power, as long as it can indicate the change between the transmitted and received power values, for example, between the transmit power and the received power.
- First path loss og i G (first transmit power; og i G (first received power) 305, AP mate determines whether the distance between the terminal and the AP mate is within a preset distance according to the path loss;
- the AP mate After calculating the path loss P-PA, the AP mate will judge the distance between the terminal and the AP mate according to the path loss. As described above, it can be judged according to the preset distance range or the preset loss range.
- the value of the path loss P-PA is a ( dB )
- the AP mate is based on the preset distance range.
- the path loss calculated according to the formula is A1.
- the preset loss range is A1 ⁇ A2
- AP mate will judge P- Whether the value a of the PA is in the range of A1 to A2, if it is, it indicates that the terminal is also within the preset distance range.
- the preset distance range or the preset loss range may be changed.
- the user interface may be set on the AP mate, and the user can adjust the appropriate preset range or preset path loss range at any time through the interface.
- the AP mate sends network configuration information to the terminal.
- the AP mate determines whether to send the network configuration information to the terminal according to the distance between the AP and the terminal.
- the user only needs to connect the terminal that wants to join the WiFi network to the AP mate, and the AP mate automatically performs the above.
- the terminal establishes a network connection with the AP according to the network configuration information.
- the network connection with the AP described herein may be performed by the WPS process with the AP; the WPS process refers to, for example, performing authentication with the AP, transmitting WIFI configuration information, etc., and automatically configuring the SSID, the network key, and the like.
- the interaction process between the process of this step 307 and the AP mate and the terminal described in the foregoing 301 to 306 may be collectively referred to as a WPS implementation process.
- the AP can also perform the function of the registrar, that is, assume network establishment, add/delete devices, etc., to simplify the interaction process between devices and the WPS configuration process.
- the information such as the transmit power or the received power in the embodiment is not limited in any message, and the AP mate can obtain the information as long as it can be reported.
- FIG. 4 is a schematic diagram of signaling according to still another embodiment of a method for establishing a wireless network according to the present invention.
- an AP mate instructs a terminal to return a response message with a second transmit power, and the AP mate receives the power of the response message as a second received power.
- the method may include:
- the key is obtained by using a key exchange algorithm between the AP mate and the terminal. 402.
- the AP mate sends a probe message to the terminal, where the probe message is used to indicate that the terminal sends the response message by using the transmit power P1.
- the AP mate will instruct the terminal to send a probe message with the transmit power P1.
- the transmit power P 1 may be referred to as the second transmit power, and may be carried by the AP mate in the probe message to inform the terminal.
- the terminal returns a response message to the AP mate by using the indicated transmit power P1.
- the response message returned by the terminal may be referred to as a second response message, and the terminal may carry the transmission power P1 in the response message or may not carry it.
- the AP mate obtains the received power P 1 A when the local response message is received.
- the AP mate When receiving the response message sent by the terminal, the AP mate can obtain the received power P1A when receiving the message, and the received power P1A can be referred to as the second received power.
- the AP mate can be configured to allow the terminal to access the wireless network if the terminal does not return a response message.
- the AP mate can set a timer, and if the timeout does not receive the response message returned by the terminal, It can be determined that the terminal is not allowed to access the wireless network.
- the AP mate calculates a path loss of the probe message transmitted from the terminal to the AP mate according to the obtained transmit power and the received power.
- the transmit power is the power P1 of the terminal transmitting the probe message in 403, and the received power is the power P1A when the AP mate receives the probe message in 404; the power attenuation occurs according to the message transmission, so the transmit power P1 Will be greater than the received power P1A.
- the AP mate calculates the path loss as "P1-P1A", which is the path loss that occurs when the probe message is transmitted from the terminal to the AP mate.
- the AP mate determines, according to the path loss, whether the distance between the terminal and the AP mate is within a preset distance range;
- the AP mate After calculating the path loss P 1 -P 1 A, the AP mate determines the distance between the terminal and the AP mate according to the path loss. As described above, the preset distance range or the preset loss range may be used. To judge. The method is the same as that of the third embodiment, and will not be described again.
- the AP mate sends network configuration information to the terminal.
- the terminal establishes a network connection with the AP according to the network configuration information.
- AP mate has realized automatic judgment.
- the distance of the terminal and automatically sends network configuration information to the terminal within the preset distance range, which simplifies the user's operation flow.
- the following problems may also be encountered in the specific implementation:
- the real terminal S1 wants to join the home WiFi network, and the real terminal S1 may be a certain laptop in the room.
- the user only needs to close the terminal S 1 to the AP mate.
- the AP mate performs the above-described process of determining the distance of the terminal S1.
- the counter terminal S2 may take some measures to make the AP mate misjudge the distance from the AP mate within the preset distance, that is, Therefore, the AP mate also sends network configuration information to it, and the fake terminal S2 accesses the home WiFi.
- the fake terminal S2 captures the probe information sent by the AP mate to the terminal S1, which will guess how much path loss should be made so that the AP mate calculates the distance within the preset distance and returns an erroneous reception to the AP mate.
- the power for example, the actual receiving power of the counter terminal S2 is 5 dB, but in order to make the AP mate judge the error, the receiving power returned to the AP mate is 8 dB, so that the path loss calculated by the AP mate is smaller than the actual loss, so that it is possible to judge
- the counter terminal S2 is also located within the preset distance, which causes the counter terminal S2 to successfully access the network.
- Embodiment 5 to Embodiment 7 are for the case of the above-mentioned counterfeit terminal, and several feasible schemes for identifying the real terminal and the counterfeit terminal are listed to better ensure the security of the connection establishment of the WiFi network.
- FIG. 5 is a schematic diagram of signaling according to still another embodiment of a method for establishing a wireless network according to the present invention.
- two times of message transmission is performed, which is transmitted from the AP mate to the terminal once, and from the terminal to the AP mate-time, and Compare the deviations of the path losses of the two times; the judgment is based on the way that the counterfeit terminal relies on the guessing loss, and the path loss caused by the two transmissions usually has a large deviation.
- the AP mate has higher sensitivity and the difference between the two losses. It will be obtained, and the real device usually has two smaller deviations, which are basically the same.
- the process of identifying the authenticity of the terminal and the determination of the distance between the terminal is integrated. Therefore, the third embodiment and the fourth embodiment are combined.
- the execution order of the two transmissions is not limited.
- the example is to perform the transfer from the AP mate to the terminal, and then execute the slave terminal. Transfer to AP mate as an example.
- the method may include: 501: obtaining a key by using a key exchange algorithm between an AP mate and a terminal;
- the AP mate sends a probe message to the terminal by using the first transmit power P.
- the terminal returns a first response message to the AP mate, carrying the first received power PA when receiving the probe message;
- the AP mate calculates a first path loss that is transmitted from the AP mate to the terminal according to the first transmit power P and the first received power PA of the transmission probe message.
- the first path loss is P-PA.
- the AP mate determines, according to the first path loss, whether the distance between the terminal and the AP mate is within a preset distance range;
- the process ends.
- the AP mate sends a probe message to the terminal, where the probe message is used to instruct the terminal to send the second response message by using the second transmit power P1.
- the terminal sends a second response message to the AP mate by using the indicated second transmit power P1.
- the AP mate obtains the second received power P 1 A when the second response message is received locally;
- the AP mate calculates, according to the obtained second transmit power P1 and the second receive power P1A, a path loss of the probe message transmitted from the terminal to the AP mate.
- the second path loss is P1-P1A.
- the AP mate determines, according to the second path loss, whether the distance between the terminal and the AP mate is within a preset distance range
- the path loss of the two transmissions will not be too different, even if there is a slight deviation, it is a small deviation within a reasonable range, and if it is a counterfeit terminal, because it is a guessing path loss , reporting to AP mate is not the actual receiving power, the path loss of these two transmissions will be quite different, the counterfeit terminal is difficult to guess the path loss, and AP mate
- the sensitivity is also high, and large deviations between the path losses of the two transmissions of the counterfeit terminal are usually found.
- the loss change value may be a difference between the first path loss and the second path loss, or a ratio, or other mathematical value that may represent a change.
- the AP mate of this embodiment may set a preset loss variation value range, which is set in consideration of even a small deviation of the real terminal transmission; the AP mate may determine the second Whether the difference between the path loss and the first path loss is within a preset loss range. If yes, it indicates that the terminal is a real device, and continues to execute 512; otherwise, it indicates that the terminal is a fake terminal, and the process can be terminated.
- the network configuration information is sent to the terminal, thereby avoiding the access of the fake terminal and improving the security of the network establishment.
- the AP mate sends network configuration information to the terminal.
- the terminal establishes a network connection with the AP according to the network configuration information.
- FIG. 6 is a schematic diagram of signaling according to still another embodiment of a method for establishing a connection in a wireless network according to the present invention.
- the authenticity of the terminal is identified according to the fluctuation of the path loss, specifically, the variance of the multiple path loss; Assuming that the counterfeit terminal is set outdoors, the outdoor environment is more complicated, and when the counterfeit terminal communicates with the AP mate in the room, the signal also passes through obstacles such as through the wall, so the path loss fluctuation of multiple message interaction is relatively large.
- This embodiment is also a process for synthesizing the authenticity of the terminal and the determination of the distance between the terminals. Therefore, the above-mentioned determination of the path loss variance is combined with the determination of the terminal distance; however, the order of execution of the two aspects is not performed.
- the authenticity of the terminal may be first determined by the path loss variance, and if it is the real terminal, then the terminal distance is determined; or, as in the fifth embodiment, the terminal distance may be determined first, and if the distance satisfies the condition, then the terminal is determined to be true. Or; or, the terminal authenticity and the terminal example can be mixed and judged in various ways.
- This embodiment is an example of the former, that is, the judgment of the authenticity of the terminal is performed first. As shown in FIG. 6, the method may include:
- the key is obtained by using a key exchange algorithm between the AP mate and the terminal. 602.
- the AP mate interacts with the terminal for multiple messages.
- the interaction of the multiple messages refers to performing multiple unidirectional transmission messages with the terminal; for example, the first time is that the AP mate sends the probe message to the terminal with a certain transmit power, and the second time is the AP mate.
- the terminal is instructed to send a response message with a certain transmit power, and the third time is that the AP mate sends a probe message to the terminal or the like with a certain transmit power.
- the AP mate calculates a floating change value of the path loss of the multiple message interaction, for example, a variance.
- the AP mate obtains the transmit power and the received power of the unidirectional transmission message.
- Transmit power and received power calculate the path loss of each unidirectional transmission, a total of multiple path loss values can be obtained; Then, the floating change value of the multiple path losses will be calculated.
- the floating variation value may be a variance of a plurality of path losses, or a standard deviation, or other mathematical value indicating a change, or the like.
- the AP mate determines whether the obtained floating change value is within a preset floating change value range, for example, a preset variance range;
- a preset floating variation value range can be set in the AP mate; as long as the variance obtained in 603 is within the preset floating variation value, it indicates The terminal is a real device, and continues to execute 605; otherwise, it indicates that the fluctuation of the multiple message transmission is relatively large, which is beyond the reasonable range, and the terminal is a fake terminal, and the process ends.
- the AP mate sends the probe message to the terminal by using the transmit power P.
- the terminal reports to the AP mate the received power PA when the probe message is received.
- the AP mate calculates a path loss that is transmitted from the AP mate to the terminal according to the transmit power P and the received power PA of the transmission probe message.
- the path loss is P-PA.
- the AP mate determines, according to the path loss, whether the distance between the terminal and the AP mate is within a preset distance range;
- the AP mate sends network configuration information to the terminal.
- the terminal establishes a network connection with the AP according to the network configuration information.
- Example 7
- FIG. 7 is a schematic diagram of signaling according to still another embodiment of a method for establishing a wireless network according to the present invention.
- the determination of the terminal distance is performed first, and then the authenticity of the terminal is determined according to the path loss variance as an example.
- the method includes:
- the key is obtained by using a key exchange algorithm between the AP mate and the terminal.
- the AP mate sends a probe message to the terminal by using the transmit power P.
- the terminal reports, to the AP mate, the received power PA when the probe message is received.
- the AP mate calculates a path loss P-PA that is transmitted from the AP mate to the terminal according to the transmit power P and the received power PA of the transmission probe message.
- the AP mate determines, according to the path loss, whether the distance between the terminal and the AP mate is within a preset distance range;
- the AP mate interacts with the terminal for multiple messages.
- the AP mate calculates a variance of a path loss of the multiple probe message interactions.
- the variance obtained in 707 is within the preset variance, it indicates that the terminal is a real device, and continues to perform 709; otherwise, it indicates that the fluctuation of multiple message transmission is relatively large, which is beyond a reasonable range, and the terminal is a fake terminal. Then the process ends.
- the AP mate sends network configuration information to the terminal.
- the terminal establishes a network connection with the AP according to the network configuration information.
- FIG. 8 is a schematic diagram of signaling according to still another embodiment of a method for establishing a wireless network according to the present invention. The figure 8 shows that the authenticity of the terminal and the change value according to the two path losses are determined according to the path loss variance.
- the embodiment of the present invention provides a wireless access device, which is an AP mate in the above method embodiment.
- FIG. 9 is a schematic structural diagram of a first device according to an embodiment of the present invention.
- the wireless access device may include: a message transmission unit 81, a distance determining unit 82, and an information sending unit 83;
- the message transmission unit 81 is configured to send the probe message to the second device by using the first transmit power, and receive the first response message returned by the second device, where the first response message carries the second device to receive the The first received power when the message is detected;
- the distance determining unit 82 is configured to obtain a path loss between the first device and the second device according to the first transmit power and the first received power, or according to the second transmit power and the second received power. And determining, according to the path loss, that the distance between the first device and the second device is within a preset distance range;
- the information sending unit 83 is configured to: when the distance determining unit determines that the distance between the first device and the second device is within a preset distance range, send network configuration information to the second device, so that the The second device establishes a connection with the wireless network according to the network configuration information.
- FIG. 10 is a schematic structural diagram of another embodiment of a first device according to the present invention.
- the wireless access device may further include: a device identification unit 84, where
- the path loss obtained by the distance determining unit 82 according to the first transmit power and the first received power is a first path loss
- the path loss obtained according to the second transmit power and the second received power is a second path Loss
- a device identification unit 84 configured to compare the second path loss with the first path loss, if The value of the loss change between the two is within the range of the preset loss change value, and the terminal is identified as a real device, and the information sending unit is instructed to send the network configuration information to the second device.
- the number of the path loss obtained by the distance determining unit 82 is a plurality of; the device identifying unit 84 is further configured to calculate a floating change value of the plurality of path losses, if the floating change value is Within the preset floating change value range, the terminal is identified as a real device, and the information sending unit is instructed to send network configuration information to the second device.
- the first device may further include: a key exchange unit 85, configured to acquire a key by using a key exchange algorithm with the second device before sending the probe message to the second device, to use the The key pair encrypts the probe message sent by the second device, and decrypts the response message received from the second device, where the response message is the first response message, the second response message, or Third response message.
- a key exchange unit 85 configured to acquire a key by using a key exchange algorithm with the second device before sending the probe message to the second device, to use the The key pair encrypts the probe message sent by the second device, and decrypts the response message received from the second device, where the response message is the first response message, the second response message, or Third response message.
- FIG. 11 is a schematic structural diagram of a second device according to an embodiment of the present invention.
- the second device may perform the method according to any embodiment of the present invention.
- the second device in this embodiment may include: a message transmission unit 1001.
- the message transmission unit 1001 is configured to receive a probe message that is sent by the first device by using the first transmit power, and return a first response message to the first device, where the first response message is received by the second device. The first received power when the message is detected;
- the information receiving unit 1002 is configured to receive network configuration information required by the first device to access the wireless network, where the network configuration information is that the first device is according to the first transmit power and the first received power, or Determining the first setting according to the second transmit power and the second receive power Sent when the distance between the backup device and the second device is within a preset distance range;
- the connection establishing unit 1003 is configured to establish a connection with the wireless network according to the network configuration information.
- the second device further includes: a key exchange unit 1004, configured to acquire a key by using a key exchange algorithm with the first device to receive the probe message sent by the first device, to use The key pair encrypts a response message sent by the first device, and decrypts a probe message received from the first device, where the response message is the first response message, the second response message, or Third response message.
- FIG. 12 is a schematic structural diagram of still another embodiment of the first device of the present invention.
- the first device of this embodiment may include: a memory 1101 and a processor 1102;
- the storage 1101 is configured to store a preset distance range between the second device and the wireless device, and network configuration information.
- the processor 1102 is configured to send a probe message to the second device by using the first transmit power, and receive a first response message returned by the second device, where the first response message carries the second device to receive the probe The first received power at the time of the message;
- the path loss determines that the distance between the first device and the second device is within a preset distance range; and the distance determining unit determines that the distance between the first device and the second device is within a preset distance range Sending network configuration information to the second device.
- the memory 1101 is further configured to store a preset loss change value range; the processor 1102 is specifically configured to compare the second path loss with the first path loss, if a loss change value between the two In the range of the preset loss change value, the terminal is identified as a real device, and The second device sends network configuration information.
- the memory 1101 is further configured to store a preset floating change value range.
- the processor 1102 is further configured to calculate a floating change value of the multiple path loss, if the floating change value is at a preset floating change value.
- the terminal is identified as a real device.
- the processor 1102 is further configured to: before the sending the probe message to the second device, acquire a key with the second device by using a key exchange algorithm, to use the key to target the second device.
- the sent probe message is encrypted, and the response message received from the second device is decrypted, and the response message is the first response message, the second response message, or the third response message.
- FIG. 13 is a schematic structural diagram of another embodiment of a second device of the present invention.
- the second device of this embodiment may include: a memory 1201 and a processor 1202;
- the memory 1201 is configured to store network configuration information received from the first device.
- the processor 1202 is configured to receive a probe message that is sent by the first device by using the first transmit power, and return a first response message to the first device, where the first response message carries the second device to receive the Describe the first received power when the message is detected;
- the first device And receiving, by the first device, network configuration information required for accessing the wireless network, where the network configuration information is that the first device is according to the first transmit power and the first received power, or according to the second Transmitting power and second received power, determining that the distance between the first device and the second device is within a preset distance range; and establishing a connection with the wireless network according to the network configuration information.
- the processor 1202 is further configured to: before receiving the probe message sent by the first device, acquire a key by using a key exchange algorithm with the first device, to use the key to face the first
- the response message sent by the device is encrypted, and the probe message received from the first device is decrypted, and the response message is the first response message, the second response message, or the third response message.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
本发明提供一种无线网络建立连接的方法和设备,其中方法包括:第一设备向第二设备发送探测消息,第二设备向第一设备返回响应消息,第一设备获得消息传输的发射功率和接收功率,并根据所述发射功率和接收功率获得所述第一设备和第二设备之间的路径损耗;第一设备在根据所述路径损耗确定所述第一设备与第二设备之间的距离在预设距离范围内时,向所述第二设备发送接入无线网络所需的网络配置信息,以使得所述第二设备根据所述网络配置信息与所述无线网络建立连接。本发明减少了终端与无线网络连接时的用户参与,提高了无线网络建立连接的效率。
Description
无线网络建立连接的方法和设备
技术领域 本发明涉及通信技术, 尤其涉及一种无线网络建立连接的方法和设备。 背景技术
无线局域网 ( Wireless Fidelity, 简称: WiFi ) 以其具有的部署快速、 使 用便利和传输速率高等优势, 发展迅猛, 已被广泛应用于各个行业; 现在的 很多笔记本电脑、手机等都支持 WiFi技术, WiFi网络的接入点( Access Point, 简称: AP )遍布于酒店、 咖啡厅和医院等场所。
WiFi网络在建立连接时, 都需要先在终端上配置 WiFi网络建立连接的 所需的网络配置信息例如密钥,终端与 AP才能建立连接,终端才能接入 WiFi 网络。 现有技术中, 通常是由用户手动输入网络配置信息的; 例如, 在麦当 劳或者咖啡店等商店, 用户需要在服务台领取一张密码纸, 在自己的终端上 输入密码纸上的密码(即网络配置信息 )后才能接入商店内的 WiFi网络; 或 者, 当企业在会议室召开内部会议, 为了防止会议室之外的人接入, 也是需 要室内的参会人员手动输入密码(即网络配置信息)认证后才能接入会议室 WiFi网络的。
尽管为了简化 WiFi网络的建立连接的过程, WiFi联盟制定了无线网络 安全建立 (WiFi protected setup, 简称: WPS )方法, 通过 WPS可以实现网 络所需的部分信息例如服务集标识(Service Set Identifier, 简称: SSID )等的 自动配置, 并且实现网络的安全连接; 但是, 在该 WPS过程的初始, 也是需 要在终端上配置网络配置信息, 使得终端根据该网络配置信息与 AP建立连 接, 才能执行后续的 WPS的 SSID等信息的传输。 而在终端上配置网络配置 信息的方式也是用户手动配置方式, 例如, 用户需要从 AP上查找位于 AP标 签上的身份识别码(Personal Identification Number , 简称: PIN ) , 并手动 输入到终端上。
综上, 目前的 WiFi网络建立连接的时, 在终端上配置网络配置信息的操 作较为繁瑣, 大多需要用户手动参与, 致使无线网络建立连接的效率也较低。
发明内容 本发明实施例提供一种无线网络建立连接的方法和设备, 以减少终端与
AP连接时的用户参与, 提高无线网络建立连接的效率。
本发明实施例的第一个方面是提供一种无线网络建立连接的方法, 包括: 第一设备以第一发射功率向第二设备发送探测消息, 并接收所述第二设 备返回的第一响应消息, 所述第一响应消息携带所述第二设备接收到所述探 测消息时的第一接收功率;
或者, 所述第一设备向所述第二设备发送探测消息, 所述探测消息用于 指示所述第二设备以第二发射功率发送第二响应消息, 所述第一设备接收所 述第二响应消息并检测获得接收到所述第二响应消息时的第二接收功率; 或者, 所述第一设备以第一发射功率向第二设备发送探测消息, 所述探 测消息用于指示所述第二设备以第二发射功率发送第三响应消息, 所述第一 设备接收所述第三响应消息, 所述第三响应消息携带所述第二设备接收到所 述探测消息时的第一接收功率, 所述第一设备检测获得接收到所述第三响应 消息时的第二接收功率;
所述第一设备根据所述第一发射功率和第一接收功率, 或者, 根据所述 第二发射功率和第二接收功率, 获得第一设备和第二设备之间的路径损耗; 所述第一设备在根据所述路径损耗确定所述第一设备与第二设备之间的 距离在预设距离范围内时, 向所述第二设备发送接入无线网络所需的网络配 置信息, 以使得所述第二设备根据所述网络配置信息与所述无线网络建立连 接。
在一种可能的实现方式中, 所述第一设备根据所述第一发射功率和第一 接收功率获得的所述路径损耗是第一路径损耗; 所述第一设备根据所述第二 发射功率和第二接收功率获得的所述路径损耗是第二路径损耗; 在所述第一 设备在根据所述路径损耗确定所述第一设备与第二设备之间的距离在预设距 离范围内之后,向所述第二设备发送接入无线网络所需的网络配置信息之前, 还包括: 所述第一设备将所述第二路径损耗与第一路径损耗相比较, 若二者 之间的损耗变化值在预设损耗变化值范围内, 则标识终端为真实设备。
在另一种可能的实现方式中, 所述第一设备获得的所述路径损耗的数量
为多个; 在所述第一设备在根据所述路径损耗确定所述第一设备与第二设备 之间的距离在预设距离范围内之后, 向所述第二设备发送接入无线网络所需 的网络配置信息之前, 还包括: 所述第一设备计算多个路径损耗的浮动变化 值, 若浮动变化值在预设浮动变化值范围内, 则标识所述终端为真实设备。
在又一种可能的实现方式中,在第一设备向第二设备发送探测消息之前, 还包括: 所述第一设备与所述第二设备之间通过密钥交换算法获取密钥, 以 利用所述密钥对向所述第二设备发送的所述探测消息进行加密, 以及对从所 述第二设备接收的响应消息进行解密, 所述响应消息为所述第一响应消息、 第二响应消息或第三响应消息。
本发明实施例的另一个方面是提供一种无线网络建立方法, 包括: 第二设备接收所述第一设备以第一发射功率发送的探测消息, 并向所述 第一设备返回第一响应消息, 所述第一响应消息携带所述第二设备接收到所 述探测消息时的第一接收功率;
或者, 所述第二设备接收所述第一设备发送的探测消息, 所述探测消息 用于指示所述第二设备以第二发射功率发送第二响应消息, 所述第二设备向 所述第一设备发送所述第二响应消息, 以使得所述第一设备检测获得接收到 所述第二响应消息时的第二接收功率;
或者 ,所述第二设备接收所述第一设备以第一发射功率发送的探测消息 , 所述探测消息用于指示所述第二设备以第二发射功率发送第三响应消息 , 所 述第二设备向所述第一设备发送所述第三响应消息, 所述第三响应消息携带 所述第二设备接收到所述探测消息时的第一接收功率, 以使得所述第一设备 检测获得接收到所述第三响应消息时的第二接收功率;
所述第二设备接收第一设备发送的接入无线网络所需的网络配置信息, 所述网络配置信息是所述第一设备在根据所述第一发射功率和第一接收功 率, 或者根据所述第二发射功率和第二接收功率, 确定所述第一设备与第二 设备之间的距离在预设距离范围内时发送的;
所述第二设备根据所述网络配置信息与所述无线网络建立连接。
在一种可能的实现方式中, 在第二设备接收所述第一设备发送的探测消 息之前, 还包括: 所述第二设备与所述第一设备之间通过密钥交换算法获取 密钥, 以利用所述密钥对向所述第一设备发送的响应消息进行加密, 以及对
从所述第一设备接收的探测消息进行解密, 所述响应消息为所述第一响应消 息、 第二响应消息或第三响应消息。
本发明实施例的又一个方面是提供一种第一设备, 包括:
消息传输单元, 用于以第一发射功率向第二设备发送探测消息, 并接收 所述第二设备返回的第一响应消息, 所述第一响应消息携带所述第二设备接 收到所述探测消息时的第一接收功率;
或者, 向所述第二设备发送探测消息, 所述探测消息用于指示所述第二 设备以第二发射功率发送第二响应消息, 接收所述第二响应消息并检测获得 接收到所述第二响应消息时的第二接收功率;
或者, 以第一发射功率向第二设备发送探测消息, 所述探测消息用于指 示所述第二设备以第二发射功率发送第三响应消息,接收所述第三响应消息 , 所述第三响应消息携带所述第二设备接收到所述探测消息时的第一接收功 率, 检测获得接收到所述第三响应消息时的第二接收功率;
距离确定单元, 用于根据所述第一发射功率和第一接收功率, 或者, 根 据所述第二发射功率和第二接收功率, 获得所述第一设备和第二设备之间的 路径损耗; 并根据所述路径损耗确定所述第一设备与第二设备之间的距离在 预设距离范围内;
信息发送单元, 用于在所述距离确定单元确定所述第一设备与第二设备 之间的距离在预设距离范围内时, 向所述第二设备发送网络配置信息, 以使 得所述第二设备根据所述网络配置信息与所述无线网络建立连接。
在一种可能的实现方式中, 所述距离确定单元根据所述第一发射功率和 第一接收功率获得的所述路径损耗是第一路径损耗, 根据所述第二发射功率 和第二接收功率获得的所述路径损耗是第二路径损耗;
还包括: 设备识别单元, 用于将所述第二路径损耗与第一路径损耗相比 较, 若二者之间的损耗变化值在预设损耗变化值范围内, 则标识所述终端为 真实设备, 并指示所述信息发送单元向所述第二设备发送网络配置信息。
在另一种可能的实现方式中, 所述距离确定单元获得的所述路径损耗的 数量为多个; 所述设备识别单元, 还用于计算多个所述路径损耗的浮动变化 值, 若所述浮动变化值在预设浮动变化值范围内, 则标识所述终端为真实设 备, 并指示所述信息发送单元向所述第二设备发送网络配置信息。
在又一种可能的实现方式中, 密钥交换单元, 用于在向第二设备发送探 测消息之前, 与所述第二设备之间通过密钥交换算法获取密钥, 以利用所述 密钥对向所述第二设备发送的所述探测消息进行加密, 以及对从所述第二设 备接收的响应消息进行解密, 所述响应消息为所述第一响应消息、 第二响应 消息或第三响应消息。
本发明实施例的又一个方面是提供一种第二设备, 包括:
消息传输单元 ,用于接收所述第一设备以第一发射功率发送的探测消息 , 并向所述第一设备返回第一响应消息, 所述第一响应消息携带所述第二设备 接收到所述探测消息时的第一接收功率;
或者, 接收所述第一设备发送的探测消息, 所述探测消息用于指示所述 第二设备以第二发射功率发送第二响应消息, 向所述第一设备发送所述第二 响应消息, 以使得所述第一设备检测获得接收到所述第二响应消息时的第二 接收功率;
或者, 接收所述第一设备以第一发射功率发送的探测消息, 所述探测消 息用于指示所述第二设备以第二发射功率发送第三响应消息, 向所述第一设 备发送所述第三响应消息, 所述第三响应消息携带所述第二设备接收到所述 探测消息时的第一接收功率, 以使得所述第一设备检测获得接收到所述第三 响应消息时的第二接收功率;
信息接收单元, 用于接收第一设备发送的接入无线网络所需的网络配置 信息, 所述网络配置信息是所述第一设备在根据所述第一发射功率和第一接 收功率, 或者根据所述第二发射功率和第二接收功率, 确定所述第一设备与 第二设备之间的距离在预设距离范围内时发送的;
连接建立单元, 用于根据所述网络配置信息与所述无线网络建立连接。 在一种可能的实现方式中, 还包括: 密钥交换单元, 用于在接收所述第 一设备发送的探测消息之前, 与所述第一设备之间通过密钥交换算法获取密 钥, 以利用所述密钥对向所述第一设备发送的响应消息进行加密, 以及对从 所述第一设备接收的探测消息进行解密,所述响应消息为所述第一响应消息、 第二响应消息或第三响应消息。
本发明实施例提供的无线网络建立方法和设备的技术效果是: 通过由第 一设备根据与第二设备之间的路径损耗, 在确定第二设备与第一设备之间的
距离在预设距离范围内时, 向第二设备发送网络配置信息, 这种方式使得用 户仅仅需要将第一设备和第二设备两者靠近即可, 第一设备就可以自动执行 上述的计算和判断处理, 并自动向第二设备发送网络配置信息, 相比于现有 技术的用户手动查找输入 PIN等方式, 大大简化了用户参与的操作过程, 该 自动配置过程相对于手动配置也提高了无线网络建立的效率。 附图说明
图 1为本发明无线网络建立方法一实施例的流程示意图;
图 2为本发明无线网络建立方法另一实施例的流程示意图
图 3为本发明无线网络建立方法又一实施例的信令示意图
图 4为本发明无线网络建立方法又一实施例的信令示意图
图 5为本发明无线网络建立方法又一实施例的信令示意图
图 6为本发明无线网络建立方法又一实施例的信令示意图
图 7为本发明无线网络建立方法又一实施例的信令示意图
图 8为本发明无线网络建立方法又一实施例的信令示意图
图 9为本发明第一设备一实施例的结构示意图;
图 10为本发明第一设备另一实施例的结构示意图;
图 11为本发明第二设备一实施例的结构示意图;
图 12为本发明第一设备又一实施例的结构示意图;
图 13为本发明第二设备另一实施例的结构示意图。 具体实施方式
在本发明的实施例, 第一设备可以是具有检测、 计算和发送功能的设备 即可, 例如是具有上述功能的移动终端等, 本发明在下面的各实施例中, 将 该第一设备都称为 AP mate; 该 AP mate中预先存储了网络配置信息, 是由 AP mate将网络配置信息自动发送至第二设备的。
所述的第二设备例如是手机、 笔记本电脑等想要加入到无线网络的各种 终端; 并且在本发明的各实施例中均是以终端为例来描述该第二设备执行的 处理的。
所述的无线网络不局限于 WiFi网络, 例如, 同样可以适用于 WiMax, Zigbee, 3G, GSM等无线网络。
此外, 本发明实施例所述的探测消息, 是第一设备发送给第二设备的消 息, 用于探测第一设备与第二设备之间的路径损耗的; 具体实施中, 该探测 消息可以单独发送的消息, 即第一设备专门发送该探测消息给第二设备, 或 者, 也可以是第一设备与第二设备之间已有的某种消息, 该消息也同样具有 本实施例所要求的功能, 也称为探测消息; 例如, 在某种已有消息中增加了 用于指示第二设备以某个发射功率返回响应消息的指示参数, 则该已有消息 就具有了本实施例探测消息的功能, 也可以称为探测消息。
实施例一
图 1为本发明无线网络建立连接的方法一实施例的流程示意图, 本实施 例的方法是由 AP mate执行。 如图 1所示, 该方法可以包括:
101、 与终端之间传输探测消息, 并获取所述探测消息在本地与所述终端 之间单向传输的发射功率和接收功率;
其中, 所述的单向传输指的是, 例如, 由本地即 AP mate发送该探测消 息, 终端接收探测消息, 该消息是从 AP mate传输至终端; 或者, 由终端发 送该探测消息, AP mate接收探测消息, 该消息是从终端传输至 AP mate。
相应的 ,在该单向传输中 ,如果消息是从 AP mate传输至终端 ,则 AP mate 发送探测消息的功率即为发射功率,终端接收探测消息的功率即为接收功率; 如果消息是从终端传输至 AP mate, 则终端发送探测消息的功率即为发射功 率, AP mate接收探测消息的功率即为接收功率。
例如, AP mate以第一发射功率向终端发送探测消息, 并接收终端返回 的第一响应消息, 所述第一响应消息携带终端接收到所述探测消息时的第一 接收功率;
又例如, AP mate向终端发送探测消息, 所述探测消息用于指示终端以 第二发射功率发送第二响应消息, AP mate接收所述第二响应消息并检测获 得接收到所述第二响应消息时的第二接收功率;
再例如, AP mate以第一发射功率向终端发送探测消息, 所述探测消息 用于指示终端以第二发射功率发送第三响应消息, AP mate接收所述第三响 应消息,所述第三响应消息携带终端接收到所述探测消息时的第一接收功率,
AP mate检测获得接收到所述第三响应消息时的第二接收功率。
上述的第三种方式(即再例如的方式) 与前边两种方式的区别在于, 前 边两种方式都是通过两次消息的传输获得两个功率, 例如, 在第一种方式中, 通过探测消息和第一响应消息这两个消息的传输, 获得了第一发射功率和第 —接收功率两个功率。而第三种方式中是通过两次消息的传输获得四个功率, 效率更高; 例如, 通过探测消息和第三响应消息这两个消息的传输, 获得了 第一发射功率、 第一接收功率、 第二发射功率和第二接收功率这四个功率。
需要说明的是, 以上所列举的几种可行的方式, 只是想表达, 第一设备 在获取功率(例如第一发射功率、 第一接收功率等) 时, 可以采用这几种方 式, 每一种方式均能够获得功率参数值; 但是, 本实施例并没有限定在本实 施例的方法中只能执行其中一种方式, 通过后续的实施例也可以看到, 在具 体实施中, 第一设备有可能执行上述三种方式的其中之一或者任意组合, 或 者将某种方式执行多次等, 根据第一设备的实际执行需要而定, 比如当第一 设备需要判断第二设备是否是真实设备时, 可能就需要将上述方式进行组合 或者多次执行某种方式以获得相关参数。
此外, 还需要说明的是, 本实施例所述的功率参数, 例如第一发射功率、 第一接收功率等, 在具体实施中, 也可以转化为其他计量单元, 本实施例所 述的功率将这种情况包括在内: 例如, 功率值可以等价转化为信号强度值, 信号 H复 - 10 Iog 0 (功傘值 ) , 信号强度单位为 dBm (分贝毫瓦) , 功 率值单位为 mW (毫瓦) 。
102、 根据所述第一发射功率和第一接收功率, 或者, 根据所述第二发射 功率和第二接收功率, 获得 AP mate和终端之间传输时的路径损耗;
其中, 这里的路径损耗的计算可以是根据现有的路径损耗公式计算的, 即 "路径损耗(以 dB为单位) =32.5+20* ( logf (频率, 以 GHz ) 为单位) +logD (距离, 以米为单位),, 。
从上述的路径损耗公式可以看到, 路径损耗是与距离有关系的, 不同的 距离造成的损耗不同, 通常距离越远路径损耗越大。
其中, AP mate根据所述第一发射功率和第一接收功率就可以得到路径 损耗, 根据第二发射功率和第二接收功率也可以计算得到路径损耗, 这些都 是可选的方式; 具体实施中, AP mate可以选择任意一种方式计算路径损耗,
或者两种方式都执行获得多个路径损耗等。
103、在根据所述路径损耗确定所述终端与本地之间的距离在预设距离范 围内时, 向所述终端发送网络配置信息;
本实施例中, 是设定由 AP mate根据路径损耗判断终端与 AP mate之间 的距离, 如果该距离在预设距离范围内, 则向终端发送网络配置信息, 相当 于以距离作为 AP mate向终端发送网络配置信息的触发条件。在具体实施中, 当用户想要某个终端与 AP执行 WPS连接时, 就可以将终端与 AP mate靠近 即可, 或者将 AP mate与终端靠近, AP mate就会自动执行上述的步骤, 计算 路径损耗, 根据路径损耗判断终端与 AP mate之间的距离, 满足预设的距离 范围, 则 AP mate就会自动向终端发送网络配置信息。
在这种方式中, 用户仅仅需要将 AP mate和终端两者靠近, 相比于现有 技术中的用户手动查找输入 PIN等方式, 对于用户来说操作更加简单, 大大 减少了用户的参与; 并且 AP上也不需要设置承载 PIN的标签等, 也降低了 设备成本。
其中,根据路径损耗判断终端与 AP mate之间的距离的方式可以有多种, 比如, 假设预设距离范围是 lm〜1.5m, 则 AP mate可以根据路径损耗、 以及 上述的路径损耗公式, 计算得到距离 D, 并判断该 D是否在 lm〜1.5m的范围 内; 或者, AP mate根据预设距离范围 lm〜l .5m、 以及上述的路径损耗公式, 预先转化为路径损耗的范围, 例如, lm时对应的路径损耗是 ql , 1.5m时对 应的路径损耗是 q2, 则相当于预设路径损耗范围是 ql〜 q2, AP mate只要判 断其得到的路径损耗是否在该预设路径损耗范围内即可, 若在该范围, 也就 表示终端与 AP mate之间的距离在预设距离范围内。
需要说明的是, 上述的预设距离范围包括了是一个点值的情况, 比如, 是某个距离值, 而不是一个距离范围, 例如, 预设的是 lm, 则 AP mate只需 要判断路径损耗对应的距离是否是 lm即可。 此外, 所述的预设距离范围可 以由用户自主设定, 具体实施时, 例如可以在 AP mate设置一个用户交互界 面, 用户可以通过该界面随时调整合适的预设距离范围; 或者是调整预设路 径损耗范围等。
其中, 所述的网络配置信息, 例如可以是, AP的 PIN码、 密钥等, 如果 是密钥, 本实施例的密钥设置为可以是任意长度, 以确保配置以后的网络安
全性。 终端在获得网络配置信息后, 将据此与 AP之间建立无线网络连接; 所述的建立无线网络连接例如是, 终端在与 AP建立连接后, 在终端与 AP之 间执行无线网络安全建立 WPS流程, 比如与 AP执行认证、 WIFI配置信息 传输等, 该 WPS流程是现有的处理流程, 不再赘述。
实施例二
图 2为本发明无线网络建立方法另一实施例的流程示意图, 本实施例的 方法是由终端执行。 如图 2所示, 该方法可以包括:
201、 与 AP mate之间传输探测消息, 并向 AP mate汇报接收到所述探测 消息时的接收功率或者以 AP mate指示的发射功率发送响应消息;
其中, 当探测消息是从 AP mate传输至终端, 则终端将向 AP mate汇报 接收到该探测消息时的接收功率, AP mate自身知道其发射功率; 或者, 当 探测消息是从终端传输至 AP mate, 则终端可以将该消息的发射功率上报至 AP mate , 该发射功率是 AP mate指示终端以该功率发送的, 所以终端也可以 不上报 AP mate也可以知道, AP mate自身还获取接收到该探测消息时的接收 功率。 经过上述步骤, AP mate就得到了探测消息单向传输的发射功率和接 收功率。
具体的执行方式, 可以参见实施例一中的 101中所述, 不再赘述。
202、 接收 AP mate发送的网络配置信息;
其中, 该网络配置信息例如可以是, AP的 PIN码、 密钥等; 该网络配置 信息是 AP mate在根据上述的发射功率和接收功率计算探测消息传输时的路 径损耗, 并根据所述路径损耗确定终端与 AP mate之间的距离在预设范围内 时发送的。 即 AP mate会通过 201和 202的步骤, 自动判断终端与其之间的 距离, 并在该距离在预设距离范围内时, 自动向终端发送网络配置信息。 在 这种方式中, 用户仅仅需要将 AP mate和终端两者靠近, 大大简化了用户的 操作。
203、 根据网络配置信息与无线网络建立连接。
在如下的实施例三〜实施例七中,将对 AP mate与终端之间的交互过程进 行详细的说明, 并列举了几种可行的实施方式; 其中, 在各实施例中, 涉及 到相同的处理过程只在其中一个实施例中详细描述,其他实施例将简单说明。
先列举几种本发明的各实施例的无线网络建立连接的方法能够应用的场
景: 例如, 会议室要召开内部会议时, 可以在会议室中设置一个 AP mate, 该 AP mate与会议室中的每个参会成员的终端之间执行如下的方法流程, 自 动配置终端, 参会成员不再需要获取密码; 或者, 在麦当劳、 肯德基等商店, 也可以设置一个 AP mate,该 AP mate将与顾客的终端自动执行如下的方法流 程, 自动配置终端, 顾客不再需要去服务台领取密码纸; 或者, 在 WPS配置 中, 用户也不再需要手动在终端输入网络配置信息例如 PIN码, 可以将终端 与 AP mate靠近, AP mate就会与终端执行如下的方法流程。 AP-mate能够自 动识别出在一定范围内的用户, 例如会议室范围、 商店范围或者 WPS时预设 的靠近范围, 并自动将网络配置信息发送给终端, 终端根据该信息自动连接 到网络中, 省去了用户输入密码等繁瑣过程。
实施例三
图 3为本发明无线网络建立连接的方法又一实施例的信令示意图, 在本 实施例中, AP mate发送探测消息的功率为第一发射功率, 终端接收所述探 测消息的功率为第一接收功率; 如图 3所示, 该方法可以包括:
301、 AP mate与终端之间通过密钥交换算法获得密钥;
其中, AP mate与终端在传输探测消息之前, 可以先通过密钥交换算法 获得密钥; 本步骤的交互过程主要是 AP mate与终端之间交换生成密钥所需 的一些参数, 然后 AP mate与终端根据所述交换的参数各自按照密钥交换算 法生成密钥, 后续的探测消息的传输过程将利用该密钥对探测消息进行加密 传输, 或者对终端返回的响应消息进行解密等, 以更好的保证消息传输的安 全性。
上述的密钥交换算法可以采用常用的算法, 例如 D-H ( Diffie-Hellman ) 密钥交换算法、 RSA公钥加密算法等。 此外, 为了触发 AP mate与终端之间 开始执行该密钥交换过程, 可选的在 AP mate与终端上设置一触发按钮, 当 用户将 AP mate与终端两者靠近之后, 按动该触发按钮, 则 AP mate与终端 将执行该步骤。
302、 AP mate以发射功率 P向终端发送探测消息;
其中, 该发射功率 P可以称为第一发射功率, 可以是预置在 AP mate中 的, 也可以是 AP mate随机产生的等, 但是该发射功率 P只有 AP mate自身 知道。 此外, AP mate在发送该探测消息时, 还会指示终端汇报接收到该探
测消息时的接收功率, 例如, 可以在探测消息中携带一个指示标识, 以使得 终端根据该指示标识汇报接收功率。
303、 终端向 AP mate汇报接收到探测消息时的接收功率 PA;
其中, 终端可以是根据 AP mate发送的探测消息中携带的指示标识, 将 自身接收到的探测消息衰减后的接收功率汇报至 AP mate; 例如, 终端向 AP mate返回第一响应消息, 该第一响应消息携带终端接收到所述探测消息时的 第一接收功率。
304、 AP mate根据传输探测消息的发射功率和接收功率, 计算该探测消 息从 AP mate传输至终端的路径损耗;
其中, 所述的发射功率即为 302中 AP mate发送探测消息的第一发射功 率, 接收功率即为 303中终端向 AP mate汇报的第一接收功率; 消息传输中 都会发生功率的衰减, 通常距离越大, 功率衰减越多, 所以发射功率 P (第 一发射功率)会大于接收功率 PA (第一接收功率) 。
例如, AP mate计算路径损耗为 "P-PA" , 此为探测消息从 AP mate传 输至终端所发生的路径损耗。 需要说明的是, 路径损耗不一定是发射功率和 接收功率之间的差值,只要是能够表示发射和接收的功率值之间的变化即可, 比如, 还可以是发射功率和接收功率之间比值、 或者其他能够表示变化的数 学方法表示。 例如,
第一路径损耗 = ogi G (第一发射功率; · ogi G (第一接收功率〕 305、 AP mate根据路径损耗判断终端与 AP mate之间的距离是否在预设 距离范围内;
AP mate在计算得到路径损耗 P-PA后, 会根据该路径损耗判断终端与 AP mate之间的距离, 如前面所描述过的, 可以根据预设距离范围或者预设 损耗范围来判断均可。
例如,路径损耗 P-PA的值为 a ( dB ) ,根据路径损耗公式 "路径损耗 (以 dB为单位 ) =32.5+20* ( logf (频率, 以 GHz ) 为单位 ) +logD (距离, 以米 为单位),, , 结合探测消息的功率 f ( GHz ) , AP mate可以计算得到终端与 其之间的距离为 D1 , 假设该 D1是 lm; AP mate中设置的预设距离范围是 0.9m〜l .2m, 则 AP mate可以判断出该 lm位于 0.9m〜l .2m的范围内。
再例如, 路径损耗 P-PA的值为 a ( dB ) , AP mate根据预设距离范围
0.9m〜1.2m、 以及上述的路径损耗公式, 已经预先转化得到预设损耗范围; 具
体的, 距离为 0.9m时, 根据公式计算的路径损耗是 A1 , 距离为 1.2m时, 根 据公式计算的路径损耗是 A2,则预设损耗范围是 A1〜A2,则 AP mate将判断 P-PA的值 a是否在 A1〜A2的范围内, 如果在, 则表明终端也在预设距离范 围内。
上述的预设距离范围或者预设损耗范围等,是可以变动的,例如 AP mate 上可以设置用户交互界面, 用户可以通过该界面随时调整合适的预设距离范 围或者预设路径损耗范围。
在本步骤中, 如果 AP mate判断的结果是终端在预设距离范围内, 则继 续执行 306; 否则, 如果 AP mate判断的结果是终端不在预设距离范围内, 则结束流程, 不再执行 306。
306、 AP mate向终端发送网络配置信息;
本实施例中, AP mate是根据其与终端之间的距离来判断是否将网络配 置信息发送至终端, 用户只需要将想要加入 WiFi网络的终端靠近 AP mate, AP mate就会自动执行上述的终端距离的计算和判断过程, 并在终端位于预 设距离范围内时自动执行向终端发送网络配置信息; 这种方式对于用户来说 大大简化了用户的操作流程, 都是由 AP mate自动执行的。
307、 终端根据网络配置信息, 与 AP建立网络连接。
例如, 这里所述的与 AP建立网络连接, 可以是与 AP执行 WPS流程; 该 WPS流程指的是, 例如与 AP执行认证、 WIFI配置信息传输等, 将自动 配置 SSID、 和网络密钥等信息; 本实施例, 也可以将本步骤 307的处理与前 边的 301〜306所述的 AP mate和终端之间的交互流程统称为 WPS实现过程。 并且, AP也可以执行注册器的功能, 即承担网络建立、 添加 /删除设备等作 用, 以简化设备之间的交互流程和 WPS的配置过程。
此外, 本实施例中所述的发射功率或者接收功率等信息, 其具体携带在 哪个消息中不做限制, 只要能够进行上报使得 AP mate获取到该信息即可。
实施例四
图 4为本发明无线网络建立方法又一实施例的信令示意图, 在本实施例 中, AP mate指示终端以第二发射功率返回响应消息, AP mate接收该响应消 息的功率为第二接收功率; 如图 4所示, 该方法可以包括:
401、 AP mate与终端之间通过密钥交换算法获得密钥;
402、 AP mate向终端发送探测消息, 该探测消息用于指示终端以发射功 率 P1发送响应消息;
本实施例中, AP mate将指示终端以发射功率 P1发送探测消息, 该发射 功率 P 1可以称为第二发射功率,可以由 AP mate携带在探测消息中告知终端。
403、 终端以指示的发射功率 P1向 AP mate返回响应消息;
其中, 终端返回的响应消息可以称为第二响应消息, 终端可以将发射功 率 P1携带在该响应消息中, 也可以不携带。
404、 AP mate获取本地接收到响应消息时的接收功率 P 1 A;
其中, AP mate在接收到终端发送的响应消息时, 可以自身获取接收到 该消息时的接收功率 P1A, 该接收功率 P1A可以称为第二接收功率。
此外, AP mate可以设置, 若终端不返回响应消息, 可以不允许该终端 接入无线网络中; 具体实施中, AP mate可以设定一个定时器, 若超时未接 收到终端返回的响应消息, 则可以确定不允许该终端接入无线网络。
405、 AP mate根据获取的发射功率和接收功率, 计算该探测消息从终端 传输至 AP mate的路径损耗;
其中, 所述的发射功率即为 403中终端发送探测消息的功率 P1 , 接收功 率即为 404中 AP mate接收到探测消息时的功率 P1A; 根据消息传输中都会 发生功率的衰减, 所以发射功率 P1会大于接收功率 P1A。
AP mate计算路径损耗为 "P1-P1A" ,此为探测消息从终端传输至 AP mate 所发生的路径损耗。
406、 AP mate根据路径损耗判断终端与 AP mate之间的距离是否在预设 距离范围内;
其中, AP mate在计算得到路径损耗 P 1 -P 1 A后, 会根据该路径损耗判断 终端与 AP mate之间的距离, 如前面所描述过的, 可以根据预设距离范围或 者预设损耗范围来判断均可。 方法与实施例三相同, 不再赘述。
如果 AP mate判断的结果是终端在预设距离范围内, 则继续执行 407; 否则, 结束流程。
407、 AP mate向终端发送网络配置信息;
408、 终端根据网络配置信息, 与 AP建立网络连接。
在本发明的上述实施例三和实施例四中, AP mate已经实现了自动判断
终端的距离, 并且自动向预设距离范围内的终端发送网络配置信息, 简化了 用户的操作流程。 在此基础上, 具体实施中还可能会遇到如下问题:
比如,真实终端 S1想要加入家庭 WiFi网络,该真实终端 S1可能是室内 的某个笔记本电脑, 则通常情况下, 按照本发明实施例的方案, 用户只要将 该终端 S 1靠近 AP mate即可, AP mate会执行上述的判断终端 S 1的距离的 流程。 但是, 可能还会有一个假冒终端 S2, 该假冒终端 S2位于室外, 是没 有资格接入家庭 WiFi网络的, 而且该终端 S2由于在室外其距离 AP mate也 是比较远的, 一般不会在预设距离范围内 (WiFi的预设距离会设置比较小, 例如 lm ) ; 该假冒终端 S2就有可能采取某种措施使得 AP mate误判为其距 离 AP mate也在预设距离范围内即较近, 从而使得 AP mate也向其发送网络 配置信息, 假冒终端 S2就会接入家庭 WiFi。 比如, 假冒终端 S2会捕获到 AP mate向终端 S1发送的探测信息, 其会猜测应该有多少路径损耗才会使得 AP mate计算的距离在预设距离范围内,并向 AP mate返回一个错误的接收功 率, 比如假冒终端 S2实际的接收功率是 5dB, 但是为了使得 AP mate判断错 误, 其返给 AP mate的接收功率是 8dB, 这样 AP mate计算的路径损耗就会 比实际损耗小,从而有可能判断假冒终端 S2也位于预设距离范围内, 导致假 冒终端 S2成功接入网络。
下面的实施例五〜实施例七, 就是针对上述的假冒终端的情况, 列举了几 种可行的识别真实终端、和假冒终端的方案, 以更好的保证 WiFi网络建立连 接的的安全性。
实施例五
图 5为本发明无线网络建立方法又一实施例的信令示意图, 在本实施例 中, 采取了两次消息的传输, 从 AP mate传输到终端一次, 从终端传输到 AP mate—次, 并比较这两次的路径损耗的偏差; 判断依据是假冒终端依靠猜测 损耗的方式在这两次传输中导致的路径损耗通常会偏差较大, AP mate具有 较高的灵敏度, 对两次损耗的差别会获取到, 而真实设备通常两次偏差较小, 基本是相同的。
本实施例是将终端真实性的识别、 与终端距离的判断综合起来的流程, 所以相当于是将实施例三和实施例四结合起来; 但是, 上述两次传输的执行 顺序不做限制, 本实施例是以先执行从 AP mate传输到终端, 再执行从终端
传输到 AP mate为例进行说明。 如图 5所示, 该方法可以包括: 501、 AP mate与终端之间通过密钥交换算法获得密钥;
502、 AP mate以第一发射功率 P向终端发送探测消息;
503、 终端向 AP mate返回第一响应消息, 携带接收到探测消息时的第一 接收功率 PA;
504、 AP mate根据传输探测消息的第一发射功率 P和第一接收功率 PA, 计算该探测消息从 AP mate传输至终端的第一路径损耗;
其中, 该第一路径损耗是 P-PA。
505、 AP mate根据第一路径损耗判断终端与 AP mate之间的距离是否在 预设距离范围内;
其中, 如果 AP mate判断的结果是终端在预设距离范围内, 则为了保证 是真实终端, 继续执行 506; 否则, 如果 AP mate判断的结果是终端不在预 设距离范围内, 则结束流程。
506、 AP mate向终端发送探测消息, 该探测消息用于指示终端以第二发 射功率 P1发送第二响应消息;
507、 终端以指示的第二发射功率 P1向 AP mate发送第二响应消息;
508、 AP mate获取本地接收到第二响应消息时的第二接收功率 P 1 A;
509、 AP mate根据获取的第二发射功率 P1和第二接收功率 P1A, 计算 该探测消息从终端传输至 AP mate的路径损耗;
其中, 该第二路径损耗是 P1-P1A。
510、 AP mate根据第二路径损耗判断终端与 AP mate之间的距离是否在 预设距离范围内;
如果 AP mate判断的结果是终端在预设距离范围内, 则继续执行 511 ; 否则, 结束流程。
511、 将所述第二路径损耗与第一路径损耗相比较, 判断二者之间的损耗 变化值是否在预设损耗变化值范围内;
其中, 如果是真实终端即真实设备, 则这两次传输的路径损耗相差不会 太大, 即使有稍许的偏差, 也是合理范围内的微小偏差, 而如果是假冒终端, 由于其是猜测路径损耗, 向 AP mate汇报的不是真实的接收功率, 这两次传 输的路径损耗会相差较大, 假冒终端是很难猜对路径损耗的, 并且 AP mate
的灵敏度也较高, 对于假冒终端两次传输的路径损耗之间的较大偏差通常是 会发现的。
所述的损耗变化值可以是第一路径损耗和第二路径损耗之间的差值、 或 者比值、 或者其他可以表示变化的数学值。 本实施例的 AP mate可以设置一 个预设损耗变化值范围, 该预设损耗变化值范围是考虑到即使是真实终端两 次传输也会存在合理的微小偏差而设置的; AP mate可以判断第二路径损耗 与第一路径损耗的二者之差是否在预设损耗范围内, 如果是, 则表明所述终 端为真实设备, 继续执行 512; 否则, 就表明是假冒终端, 可以终止流程, 不再向该终端发送网络配置信息, 从而避免了假冒终端的接入, 提高了网络 建立的安全性。
512、 AP mate向终端发送网络配置信息;
513、 终端根据网络配置信息, 与 AP建立网络连接。
实施例六
图 6为本发明无线网络建立连接的方法又一实施例的信令示意图, 在本 实施例中, 是根据路径损耗的波动来识别终端的真实性, 具体是根据多次路 径损耗的方差; 因为假设假冒终端设置在室外, 室外的环境是比较复杂的, 并且假冒终端与室内的 AP mate通信时, 信号还要经过穿墙等障碍物, 所以 进行多次消息交互的路径损耗波动是比较大的; 即使假冒终端不是设置在室 夕卜,不论它所处的位置在哪里, 由于假冒终端不如实向 AP mate汇报功率(如 果如实汇报则 AP mate很容易就识别出其真实距离了) , 经过多次消息交互 的路径损耗波动仍然是较大的, 假冒终端通常不会将路径损耗猜测的特别准 确。
本实施例也是将终端真实性的识别、与终端距离的判断综合起来的流程, 所以是将上述的路径损耗方差的判断、 与终端距离的判断结合起来; 但是, 这两方面执行的顺序不做限制, 例如, 可以先通过路径损耗方差判断终端的 真实性, 如果是真实终端再接着判断终端距离; 或者, 也可以如实施例五那 样, 先判断终端距离, 如果距离满足条件再接着判断终端真实性; 或者, 也 可以将终端真实性和终端举例混合判断等多种方式均可。 本实施例是以前者 为例, 即先执行终端真实性的判断。 如图 6所示, 该方法可以包括:
601、 AP mate与终端之间通过密钥交换算法获得密钥;
602、 AP mate与终端进行多次消息的交互;
其中,所述的多次消息的交互是指的与终端之间执行多次单向传输消息; 例如, 第一次是 AP mate以某个发射功率发送探测消息至终端, 第二次是 AP mate指示终端以某个发射功率发送响应消息, 第三次是 AP mate以某个发射 功率发送探测消息至终端等。
603、 AP mate计算多次消息交互的路径损耗的浮动变化值例如方差; 其中, AP mate会获取每次单向传输消息的发射功率和接收功率, 获取 方式参见前面的实施例; 接着, 根据该发射功率和接收功率, 计算每次单向 传输的路径损耗, 共可以得到多个路径损耗值; 然后, 将计算该多个路径损 耗的浮动变化值。
所述的浮动变化值可以是多个路径损耗的方差、 或者标准差、 或者其他 可以表示变化的数学值等。
604、 AP mate判断得到的浮动变化值是否在预设浮动变化值范围内例如 预设方差范围;
其中, 考虑到不可避免的消息的多次传输通常会具有合理的波动, 可以 在 AP mate设置一个预设浮动变化值范围; 只要 603中得到的方差在该预设 浮动变化值范围内, 则表明所述终端为真实设备, 继续执行 605; 否则, 表 明多次消息传输的波动比较大, 超出了合理范围, 该终端为假冒终端, 则结 束流程。
605、 AP mate以发射功率 P向终端发送探测消息;
606、 终端向 AP mate汇报接收到探测消息时的接收功率 PA;
607、 AP mate根据传输探测消息的发射功率 P和接收功率 PA, 计算该 探测消息从 AP mate传输至终端的路径损耗;
其中, 该路径损耗是 P-PA。
608、 AP mate根据路径损耗判断终端与 AP mate之间的距离是否在预设 距离范围内;
其中, 如果 AP mate判断的结果是终端在预设距离范围内, 则继续执行 609; 否则, 结束流程。
609、 AP mate向终端发送网络配置信息;
610、 终端根据网络配置信息, 与 AP建立网络连接。
实施例七
图 7为本发明无线网络建立方法又一实施例的信令示意图, 在本实施例 中, 是以先执行终端距离的判断, 再根据路径损耗方差判断终端的真实性为 例进行说明。 如图 7所示, 该方法包括:
701、 AP mate与终端之间通过密钥交换算法获得密钥;
702、 AP mate以发射功率 P向终端发送探测消息;
703、 终端向 AP mate汇报接收到探测消息时的接收功率 PA;
704、 AP mate根据传输探测消息的发射功率 P和接收功率 PA, 计算该 探测消息从 AP mate传输至终端的路径损耗 P-PA;
705、 AP mate根据路径损耗判断终端与 AP mate之间的距离是否在预设 距离范围内;
其中, 如果 AP mate判断的结果是终端在预设距离范围内, 则继续执行 706, 进行终端真实性的判断; 否则, 结束流程。
706、 AP mate与终端进行多次消息的交互;
707、 AP mate计算多次探测消息交互的路径损耗的方差;
708、 AP mate判断得到的方差是否在预设方差范围内;
如果 707中得到的方差在该预设方差范围内, 则表明所述终端为真实设 备, 继续执行 709; 否则, 表明多次消息传输的波动比较大, 超出了合理范 围, 该终端为假冒终端, 则结束流程。
709、 AP mate向终端发送网络配置信息;
710、 终端根据网络配置信息, 与 AP建立网络连接。
上面几个例子列举了几种可行的方案,但是在具体实施中并不局限于此, 还可以进行多种方案的变通;比如,还可以将路径损耗方差的判断、与 AP mate 指示终端以某发射功率发送响应消息的方式结合起来, 并且执行顺序也不做 限制; 或者, 还可以将路径损耗方差的判断、 通过两次消息传输识别终端真 实性的判断都采用, 将进一步保证对假冒终端识别的准确度。 例如, 图 8为 本发明无线网络建立方法又一实施例的信令示意图, 该图 8所示的即为, 将 根据路径损耗方差判断终端的真实性、 与根据两次路径损耗的变化值判断终 端的真实性、 以及根据路径损耗判断距离等组合起来的一种可选方式; 该图 8中所示的各步骤在前边实施例中均有描述, 在此是将这些步骤组合在一起,
所述各步骤的具体方案与前边实施例所述相同, 不再赘述。
实施例八
本发明实施例提供了一种无线接入设备, 该无线接入设备即上面方法实 施例中的 AP mate。
图 9为本发明第一设备一实施例的结构示意图, 如图 9所示, 该无线接 入设备可以包括: 消息传输单元 81、 距离确定单元 82和信息发送单元 83; 其中,
消息传输单元 81 , 用于以第一发射功率向第二设备发送探测消息, 并接 收所述第二设备返回的第一响应消息, 所述第一响应消息携带所述第二设备 接收到所述探测消息时的第一接收功率;
或者, 向所述第二设备发送探测消息, 所述探测消息用于指示所述第二 设备以第二发射功率发送第二响应消息, 接收所述第二响应消息并检测获得 接收到所述第二响应消息时的第二接收功率;
或者, 以第一发射功率向第二设备发送探测消息, 所述探测消息用于指 示所述第二设备以第二发射功率发送第三响应消息,接收所述第三响应消息, 所述第三响应消息携带所述第二设备接收到所述探测消息时的第一接收功 率, 检测获得接收到所述第三响应消息时的第二接收功率;
距离确定单元 82, 用于根据所述第一发射功率和第一接收功率, 或者, 根据所述第二发射功率和第二接收功率, 获得所述第一设备和第二设备之间 的路径损耗; 并根据所述路径损耗确定所述第一设备与第二设备之间的距离 在预设距离范围内;
信息发送单元 83 , 用于在所述距离确定单元确定所述第一设备与第二设 备之间的距离在预设距离范围内时, 向所述第二设备发送网络配置信息, 以 使得所述第二设备根据所述网络配置信息与所述无线网络建立连接。
图 10为本发明第一设备另一实施例的结构示意图,在图 9所示结构的基 础上, 该无线接入设备还可以包括: 设备识别单元 84; 其中,
距离确定单元 82根据所述第一发射功率和第一接收功率获得的所述路 径损耗是第一路径损耗, 根据所述第二发射功率和第二接收功率获得的所述 路径损耗是第二路径损耗;
设备识别单元 84, 用于将所述第二路径损耗与第一路径损耗相比较, 若
二者之间的损耗变化值在预设损耗变化值范围内, 则标识所述终端为真实设 备, 并指示所述信息发送单元向所述第二设备发送网络配置信息。
进一步的, 所述距离确定单元 82获得的所述路径损耗的数量为多个; 所述设备识别单元 84, 还用于计算多个所述路径损耗的浮动变化值, 若 所述浮动变化值在预设浮动变化值范围内, 则标识所述终端为真实设备, 并 指示所述信息发送单元向所述第二设备发送网络配置信息。
进一步的, 该第一设备还可以包括: 密钥交换单元 85 , 用于在向第二设 备发送探测消息之前, 与所述第二设备之间通过密钥交换算法获取密钥, 以 利用所述密钥对向所述第二设备发送的所述探测消息进行加密, 以及对从所 述第二设备接收的响应消息进行解密, 所述响应消息为所述第一响应消息、 第二响应消息或第三响应消息。
实施例九
图 11为本发明第二设备一实施例的结构示意图,该第二设备可以执行本 发明任意实施例的方法, 如图 11所示, 本实施例的第二设备可以包括: 消息 传输单元 1001、 信息接收单元 1002和连接建立单元 1003; 其中,
消息传输单元 1001 , 用于接收所述第一设备以第一发射功率发送的探测 消息, 并向所述第一设备返回第一响应消息, 所述第一响应消息携带所述第 二设备接收到所述探测消息时的第一接收功率;
或者, 接收所述第一设备发送的探测消息, 所述探测消息用于指示所述 第二设备以第二发射功率发送第二响应消息, 向所述第一设备发送所述第二 响应消息, 以使得所述第一设备检测获得接收到所述第二响应消息时的第二 接收功率;
或者, 接收所述第一设备以第一发射功率发送的探测消息, 所述探测消 息用于指示所述第二设备以第二发射功率发送第三响应消息, 向所述第一设 备发送所述第三响应消息, 所述第三响应消息携带所述第二设备接收到所述 探测消息时的第一接收功率, 以使得所述第一设备检测获得接收到所述第三 响应消息时的第二接收功率;
信息接收单元 1002, 用于接收第一设备发送的接入无线网络所需的网络 配置信息 , 所述网络配置信息是所述第一设备在根据所述第一发射功率和第 一接收功率, 或者根据所述第二发射功率和第二接收功率, 确定所述第一设
备与第二设备之间的距离在预设距离范围内时发送的;
连接建立单元 1003 , 用于根据所述网络配置信息与无线网络建立连接。 进一步的, 该第二设备还包括: 密钥交换单元 1004, 用于在接收所述第 一设备发送的探测消息之前, 与所述第一设备之间通过密钥交换算法获取密 钥, 以利用所述密钥对向所述第一设备发送的响应消息进行加密, 以及对从 所述第一设备接收的探测消息进行解密,所述响应消息为所述第一响应消息、 第二响应消息或第三响应消息。
实施例十
图 12为本发明第一设备又一实施例的结构示意图, 如图 12所示, 本实 施例的第一设备可以包括: 存储器 1101和处理器 1102; 其中,
存储器 1101 , 用于存储第二设备与无线设备之间的预设距离范围、 以及 网络配置信息;
处理器 1102, 用于以第一发射功率向第二设备发送探测消息, 并接收所 述第二设备返回的第一响应消息, 所述第一响应消息携带所述第二设备接收 到所述探测消息时的第一接收功率;
或者, 向所述第二设备发送探测消息, 所述探测消息用于指示所述第二 设备以第二发射功率发送第二响应消息, 接收所述第二响应消息并检测获得 接收到所述第二响应消息时的第二接收功率;
或者, 以第一发射功率向第二设备发送探测消息, 所述探测消息用于指 示所述第二设备以第二发射功率发送第三响应消息,接收所述第三响应消息, 所述第三响应消息携带所述第二设备接收到所述探测消息时的第一接收功 率, 检测获得接收到所述第三响应消息时的第二接收功率;
以及, 根据所述第一发射功率和第一接收功率, 或者, 根据所述第二发 射功率和第二接收功率, 获得所述第一设备和第二设备之间的路径损耗; 并 根据所述路径损耗确定所述第一设备与第二设备之间的距离在预设距离范围 内; 并在所述距离确定单元确定所述第一设备与第二设备之间的距离在预设 距离范围内时, 向所述第二设备发送网络配置信息。
进一步的, 所述存储器 1101 , 还用于存储预设损耗变化值范围; 处理器 1102, 具体用于将所述第二路径损耗与第一路径损耗相比较, 若二者之间的 损耗变化值在预设损耗变化值范围内, 则标识所述终端为真实设备, 并向第
二设备发送网络配置信息。
进一步的, 所述存储器 1101 , 还用于存储预设浮动变化值范围; 处理器 1102, 还用于计算多个所述路径损耗的浮动变化值, 若所述浮动变化值在预 设浮动变化值范围内, 则标识所述终端为真实设备。
进一步的, 处理器 1102, 还用于在向第二设备发送探测消息之前, 与所 述第二设备之间通过密钥交换算法获取密钥, 以利用所述密钥对向所述第二 设备发送的所述探测消息进行加密, 以及对从第二设备接收的响应消息进行 解密, 所述响应消息为所述第一响应消息、 第二响应消息或第三响应消息。
图 13为本发明第二设备另一实施例的结构示意图, 如图 13所示, 本实 施例的第二设备可以包括: 存储器 1201和处理器 1202; 其中,
存储器 1201 , 用于存储从第一设备接收的网络配置信息;
处理器 1202, 用于接收所述第一设备以第一发射功率发送的探测消息, 并向所述第一设备返回第一响应消息, 所述第一响应消息携带所述第二设备 接收到所述探测消息时的第一接收功率;
或者, 接收所述第一设备发送的探测消息, 所述探测消息用于指示所述 第二设备以第二发射功率发送第二响应消息, 向所述第一设备发送所述第二 响应消息, 以使得所述第一设备检测获得接收到所述第二响应消息时的第二 接收功率;
或者, 接收所述第一设备以第一发射功率发送的探测消息, 所述探测消 息用于指示所述第二设备以第二发射功率发送第三响应消息, 向所述第一设 备发送所述第三响应消息, 所述第三响应消息携带所述第二设备接收到所述 探测消息时的第一接收功率, 以使得所述第一设备检测获得接收到所述第三 响应消息时的第二接收功率;
以及, 接收第一设备发送的接入无线网络所需的网络配置信息, 所述网 络配置信息是所述第一设备在根据所述第一发射功率和第一接收功率, 或者 根据所述第二发射功率和第二接收功率, 确定所述第一设备与第二设备之间 的距离在预设距离范围内时发送的; 并根据所述网络配置信息与所述无线网 络建立连接。
进一步的, 处理器 1202, 还用于在接收所述第一设备发送的探测消息之 前, 与第一设备之间通过密钥交换算法获取密钥, 以利用密钥对向所述第一
设备发送的响应消息进行加密, 以及对从所述第一设备接收的探测消息进行 解密, 所述响应消息为所述第一响应消息、 第二响应消息或第三响应消息。
本领域普通技术人员可以理解: 实现上述方法实施例的全部或部分步骤 可以通过程序指令相关的硬件来完成, 前述的程序可以存储于一计算机可读 取存储介质中, 该程序在执行时, 执行包括上述方法实施例的步骤; 而前述 的存储介质包括: ROM、 RAM, 磁碟或者光盘等各种可以存储程序代码的介 质。
最后应说明的是: 以上各实施例仅用以说明本发明的技术方案, 而非对 其限制; 尽管参照前述各实施例对本发明进行了详细的说明, 本领域的普通 技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改, 或者对其中部分或者全部技术特征进行等同替换; 而这些修改或者替换, 并 不使相应技术方案的本质脱离本发明各实施例技术方案的范围。
Claims
1、 一种无线网络建立连接的方法, 其特征在于, 包括:
第一设备以第一发射功率向第二设备发送探测消息, 并接收所述第二设 备返回的第一响应消息, 所述第一响应消息携带所述第二设备接收到所述探 测消息时的第一接收功率;
或者, 所述第一设备向所述第二设备发送探测消息, 所述探测消息用于 指示所述第二设备以第二发射功率发送第二响应消息, 所述第一设备接收所 述第二响应消息并检测获得接收到所述第二响应消息时的第二接收功率; 或者, 所述第一设备以第一发射功率向第二设备发送探测消息, 所述探 测消息用于指示所述第二设备以第二发射功率发送第三响应消息, 所述第一 设备接收所述第三响应消息, 所述第三响应消息携带所述第二设备接收到所 述探测消息时的第一接收功率, 所述第一设备检测获得接收到所述第三响应 消息时的第二接收功率;
所述第一设备根据所述第一发射功率和第一接收功率, 或者, 根据所述 第二发射功率和第二接收功率, 获得所述第一设备和第二设备之间的路径损 耗;
所述第一设备在根据所述路径损耗确定所述第一设备与第二设备之间的 距离在预设距离范围内时, 向所述第二设备发送接入无线网络所需的网络配 置信息, 以使得所述第二设备根据所述网络配置信息与所述无线网络建立连 接。
2、 根据权利要求 1所述的无线网络建立连接的方法, 其特征在于, 所述第一设备根据所述第一发射功率和第一接收功率获得的所述路径损 耗是第一路径损耗;
所述第一设备根据所述第二发射功率和第二接收功率获得的所述路径损 耗是第二路径损耗;
在所述第一设备在根据所述路径损耗确定所述第一设备与第二设备之间 的距离在预设距离范围内之后, 向所述第二设备发送接入无线网络所需的网 络配置信息之前, 还包括:
所述第一设备将所述第二路径损耗与第一路径损耗相比较, 若二者之间 的损耗变化值在预设损耗变化值范围内, 则标识所述终端为真实设备。
3、 根据权利要求 1或 2所述的无线网络建立连接的方法, 其特征在于, 所述第一设备获得的所述路径损耗的数量为多个;
在所述第一设备在根据所述路径损耗确定所述第一设备与第二设备之间 的距离在预设距离范围内之后, 向所述第二设备发送接入无线网络所需的网 络配置信息之前, 还包括:
所述第一设备计算多个所述路径损耗的浮动变化值, 若所述浮动变化值 在预设浮动变化值范围内, 则标识所述终端为真实设备。
4、 根据权利要求 1所述的无线网络建立连接的方法, 其特征在于, 在第 一设备向第二设备发送探测消息之前, 还包括:
所述第一设备与所述第二设备之间通过密钥交换算法获取密钥, 以利用 所述密钥对向所述第二设备发送的所述探测消息进行加密, 以及对从所述第 二设备接收的响应消息进行解密, 所述响应消息为所述第一响应消息、 第二 响应消息或第三响应消息。
5、 一种无线网络建立连接的方法, 其特征在于, 包括:
第二设备接收所述第一设备以第一发射功率发送的探测消息, 并向所述 第一设备返回第一响应消息, 所述第一响应消息携带所述第二设备接收到所 述探测消息时的第一接收功率;
或者, 所述第二设备接收所述第一设备发送的探测消息, 所述探测消息 用于指示所述第二设备以第二发射功率发送第二响应消息, 所述第二设备向 所述第一设备发送所述第二响应消息, 以使得所述第一设备检测获得接收到 所述第二响应消息时的第二接收功率;
或者 ,所述第二设备接收所述第一设备以第一发射功率发送的探测消息 , 所述探测消息用于指示所述第二设备以第二发射功率发送第三响应消息 , 所 述第二设备向所述第一设备发送所述第三响应消息, 所述第三响应消息携带 所述第二设备接收到所述探测消息时的第一接收功率, 以使得所述第一设备 检测获得接收到所述第三响应消息时的第二接收功率;
所述第二设备接收第一设备发送的接入无线网络所需的网络配置信息, 所述网络配置信息是所述第一设备在根据所述第一发射功率和第一接收功 率, 或者根据所述第二发射功率和第二接收功率, 确定所述第一设备与第二 设备之间的距离在预设距离范围内时发送的;
所述第二设备根据所述网络配置信息与所述无线网络建立连接。
6、 根据权利要求 5所述的无线网络建立连接的方法, 其特征在于, 在第 二设备接收所述第一设备发送的探测消息之前, 还包括:
所述第二设备与所述第一设备之间通过密钥交换算法获取密钥, 以利用 所述密钥对向所述第一设备发送的响应消息进行加密, 以及对从所述第一设 备接收的探测消息进行解密, 所述响应消息为所述第一响应消息、 第二响应 消息或第三响应消息。
7、 一种第一设备, 其特征在于, 包括:
消息传输单元, 用于以第一发射功率向第二设备发送探测消息, 并接收 所述第二设备返回的第一响应消息, 所述第一响应消息携带所述第二设备接 收到所述探测消息时的第一接收功率;
或者, 向所述第二设备发送探测消息, 所述探测消息用于指示所述第二 设备以第二发射功率发送第二响应消息, 接收所述第二响应消息并检测获得 接收到所述第二响应消息时的第二接收功率;
或者, 以第一发射功率向第二设备发送探测消息, 所述探测消息用于指 示所述第二设备以第二发射功率发送第三响应消息,接收所述第三响应消息 , 所述第三响应消息携带所述第二设备接收到所述探测消息时的第一接收功 率, 检测获得接收到所述第三响应消息时的第二接收功率;
距离确定单元, 用于根据所述第一发射功率和第一接收功率, 或者, 根 据所述第二发射功率和第二接收功率, 获得所述第一设备和第二设备之间的 路径损耗; 并根据所述路径损耗确定所述第一设备与第二设备之间的距离在 预设距离范围内;
信息发送单元, 用于在所述距离确定单元确定所述第一设备与第二设备 之间的距离在预设距离范围内时, 向所述第二设备发送网络配置信息, 以使 得所述第二设备根据所述网络配置信息与所述无线网络建立连接。
8、 根据权利要求 7所述的第一设备, 其特征在于,
所述距离确定单元根据所述第一发射功率和第一接收功率获得的所述路 径损耗是第一路径损耗, 根据所述第二发射功率和第二接收功率获得的所述 路径损耗是第二路径损耗;
还包括: 设备识别单元, 用于将所述第二路径损耗与第一路径损耗相比
较, 若二者之间的损耗变化值在预设损耗变化值范围内, 则标识所述终端为 真实设备, 并指示所述信息发送单元向所述第二设备发送网络配置信息。
9、 根据权利要求 8所述的第一设备, 其特征在于,
所述距离确定单元获得的所述路径损耗的数量为多个;
所述设备识别单元, 还用于计算多个所述路径损耗的浮动变化值, 若所 述浮动变化值在预设浮动变化值范围内, 则标识所述终端为真实设备, 并指 示所述信息发送单元向所述第二设备发送网络配置信息。
10、 根据权利要求 7所述的第一设备, 其特征在于, 还包括:
密钥交换单元, 用于在向第二设备发送探测消息之前, 与所述第二设备 之间通过密钥交换算法获取密钥, 以利用所述密钥对向所述第二设备发送的 所述探测消息进行加密, 以及对从所述第二设备接收的响应消息进行解密, 所述响应消息为所述第一响应消息、 第二响应消息或第三响应消息。
1 1、 一种第二设备, 其特征在于, 包括:
消息传输单元 ,用于接收所述第一设备以第一发射功率发送的探测消息 , 并向所述第一设备返回第一响应消息, 所述第一响应消息携带所述第二设备 接收到所述探测消息时的第一接收功率;
或者, 接收所述第一设备发送的探测消息, 所述探测消息用于指示所述 第二设备以第二发射功率发送第二响应消息, 向所述第一设备发送所述第二 响应消息, 以使得所述第一设备检测获得接收到所述第二响应消息时的第二 接收功率;
或者, 接收所述第一设备以第一发射功率发送的探测消息, 所述探测消 息用于指示所述第二设备以第二发射功率发送第三响应消息, 向所述第一设 备发送所述第三响应消息, 所述第三响应消息携带所述第二设备接收到所述 探测消息时的第一接收功率, 以使得所述第一设备检测获得接收到所述第三 响应消息时的第二接收功率;
信息接收单元, 用于接收第一设备发送的接入无线网络所需的网络配置 信息 , 所述网络配置信息是所述第一设备在根据所述第一发射功率和第一接 收功率, 或者根据所述第二发射功率和第二接收功率, 确定所述第一设备与 第二设备之间的距离在预设距离范围内时发送的;
连接建立单元, 用于根据所述网络配置信息与所述无线网络建立连接。
12、 根据权利要求 11所述的第二设备, 其特征在于, 还包括: 密钥交换单元, 用于在接收所述第一设备发送的探测消息之前, 与所述 第一设备之间通过密钥交换算法获取密钥, 以利用所述密钥对向所述第一设 备发送的响应消息进行加密, 以及对从所述第一设备接收的探测消息进行解 密, 所述响应消息为所述第一响应消息、 第二响应消息或第三响应消息。
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2012/080230 WO2014026356A1 (zh) | 2012-08-16 | 2012-08-16 | 无线网络建立连接的方法和设备 |
EP12801791.0A EP2804424B1 (en) | 2012-08-16 | 2012-08-16 | Connection setup method and device for wireless network |
CN201280002875.4A CN103181235B (zh) | 2012-08-16 | 2012-08-16 | 无线网络建立连接的方法和设备 |
US13/731,306 US8929549B2 (en) | 2012-08-16 | 2012-12-31 | Method and device for setting up wireless network connection |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2012/080230 WO2014026356A1 (zh) | 2012-08-16 | 2012-08-16 | 无线网络建立连接的方法和设备 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/731,306 Continuation US8929549B2 (en) | 2012-08-16 | 2012-12-31 | Method and device for setting up wireless network connection |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2014026356A1 true WO2014026356A1 (zh) | 2014-02-20 |
Family
ID=48639410
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2012/080230 WO2014026356A1 (zh) | 2012-08-16 | 2012-08-16 | 无线网络建立连接的方法和设备 |
Country Status (4)
Country | Link |
---|---|
US (1) | US8929549B2 (zh) |
EP (1) | EP2804424B1 (zh) |
CN (1) | CN103181235B (zh) |
WO (1) | WO2014026356A1 (zh) |
Families Citing this family (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150016305A1 (en) * | 2006-11-06 | 2015-01-15 | Ikan Holdings Llc | Methods and systems for network configuration |
US7861933B2 (en) | 2006-11-06 | 2011-01-04 | Ikan Technologies Inc. | Methods and systems for network configuration |
US9338088B2 (en) * | 2013-04-08 | 2016-05-10 | Google Inc. | Communication protocol for multiplexing data streams over UDP |
CN104378807B (zh) * | 2013-08-15 | 2018-04-27 | 联想(北京)有限公司 | 一种快速建立连接的方法及电子设备 |
CN104519482B (zh) * | 2013-09-26 | 2018-12-07 | 浙江大华技术股份有限公司 | 一种设备参数配置方法及装置 |
CN104812028B (zh) * | 2014-01-24 | 2019-01-11 | 瑞昱半导体股份有限公司 | 网络连接方法 |
CN103812870B (zh) * | 2014-02-21 | 2017-06-27 | 联想(北京)有限公司 | 信息处理的方法及电子设备 |
CN103987014B (zh) * | 2014-04-21 | 2017-08-29 | 深圳市蜂联科技有限公司 | 基于速率域的室内无线接入端与无线客户端的距离度量方法 |
CN104410435B (zh) * | 2014-05-07 | 2017-06-16 | 丰唐物联技术(深圳)有限公司 | 触发组网的方法、节点及网关 |
MX359774B (es) * | 2014-05-23 | 2018-10-10 | Deutsche Telekom Ag | Metodo y sistema para estimar distancia geografica o para estimar intervalo de distancia geografica entre al menos dos equipos de usuario, red de comunicacion movil, equipo de usuario, programa y producto de programa de computadora. |
US9369950B2 (en) | 2014-06-05 | 2016-06-14 | Sony Corporation | User equipment and method of searching for a cell |
CN104363590B (zh) * | 2014-10-24 | 2016-05-04 | 腾讯科技(深圳)有限公司 | 接入点连接方法及装置 |
US20170359319A1 (en) * | 2014-11-15 | 2017-12-14 | Silicondust Usa Inc. | Adding a device to a protected network without data entry on the device |
US9398531B1 (en) * | 2015-06-25 | 2016-07-19 | Intel IP Corporation | Dynamic field control method and system to conserve energy during NFC communication |
CN105282158A (zh) * | 2015-10-28 | 2016-01-27 | 小米科技有限责任公司 | 智能设备联网方法、路由设备、智能设备及系统 |
FR3049807A1 (fr) * | 2016-03-31 | 2017-10-06 | Orange | Technique de controle d'acces a un reseau d'acces radio |
CN105898832A (zh) * | 2016-04-07 | 2016-08-24 | 上海斐讯数据通信技术有限公司 | 一种无线网络的连接方法及系统 |
CN107396430B (zh) * | 2016-05-17 | 2021-07-02 | 中兴通讯股份有限公司 | 功率的调整方法及装置 |
CN107517498B (zh) * | 2016-06-15 | 2021-02-02 | 中兴通讯股份有限公司 | 一种信息处理方法及系统 |
US9986424B1 (en) * | 2017-01-15 | 2018-05-29 | Essential Products, Inc. | Assistant for management of network devices |
US10050835B2 (en) | 2017-01-15 | 2018-08-14 | Essential Products, Inc. | Management of network devices based on characteristics |
US9985846B1 (en) | 2017-01-15 | 2018-05-29 | Essential Products, Inc. | Assistant for management of network devices |
CN106937289B (zh) * | 2017-03-27 | 2021-05-18 | 联想(北京)有限公司 | 一种网络接入方法及电子设备 |
US10492151B2 (en) * | 2017-06-09 | 2019-11-26 | Qualcomm Incorporated | Power control in new radio systems |
WO2021022564A1 (en) * | 2019-08-08 | 2021-02-11 | Nokia Shanghai Bell Co., Ltd. | Achievable sinr set prediction for random access |
CN114205716B (zh) * | 2020-09-18 | 2023-03-24 | 华为技术有限公司 | 确定音箱声道角色的方法、系统、电子设备及存储介质 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101212780A (zh) * | 2006-12-31 | 2008-07-02 | 华为技术有限公司 | 确定网络节点相对位置的方法及系统 |
CN101394648A (zh) * | 2007-09-17 | 2009-03-25 | 中兴通讯股份有限公司 | 一种时分双工系统中终端前导的发送方法 |
CN101959282A (zh) * | 2010-09-26 | 2011-01-26 | 杭州华三通信技术有限公司 | 无线局域网接入控制方法及其装置 |
CN102172077A (zh) * | 2008-08-11 | 2011-08-31 | 株式会社Ntt都科摩 | 用户装置、无线基站以及方法 |
Family Cites Families (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7061398B2 (en) * | 1999-08-16 | 2006-06-13 | Bs&B Safety Systems Limited | Two-way wide area telemetry |
US7295518B1 (en) * | 2001-08-30 | 2007-11-13 | Entropic Communications Inc. | Broadband network for coaxial cable using multi-carrier modulation |
US7088966B2 (en) * | 2001-12-07 | 2006-08-08 | Dell Products L.P. | Wireless connection controller |
JP2006148614A (ja) * | 2004-11-22 | 2006-06-08 | Hitachi Ltd | コンテンツ受信装置、コンテンツ送信装置、コンテンツ受信方法、コンテンツ送信方法及びネットワークシステム |
US7720018B2 (en) * | 2005-04-21 | 2010-05-18 | Microsoft Corporation | Low power transmission provisioning for wireless network devices |
DE102009014416A1 (de) * | 2008-04-14 | 2009-10-22 | Atmel Automotive Gmbh | Digitales Funknetz, Schaltung eines Knotens eines digitalen Funknetzes und Verfahren zum Einrichten eines digitalen Funknetzes |
JP2009302959A (ja) * | 2008-06-13 | 2009-12-24 | Fujitsu Ltd | 無線端末装置、無線通信システムおよび無線端末装置制御方法 |
WO2010030956A2 (en) * | 2008-09-12 | 2010-03-18 | University Of Utah Research Foundation | Method and system for tracking objects using radio tomographic imaging |
US9014104B2 (en) * | 2008-11-04 | 2015-04-21 | Qualcomm Incorporated | Transmit power control based on receiver gain setting in a wireless communication network |
RU2537257C2 (ru) * | 2008-12-08 | 2014-12-27 | Конинклейке Филипс Электроникс Н.В. | Система и способ копирования настроек устройства на другое устройство, в частности, для копирования настроек между лампами |
US8958795B2 (en) * | 2009-05-04 | 2015-02-17 | Qualcomm Incorporated | Proximity based access control |
KR20100131211A (ko) * | 2009-06-05 | 2010-12-15 | 삼성전자주식회사 | 무선 랜 환경에서의 인증 시스템 및 방법 |
US8319616B2 (en) * | 2009-10-30 | 2012-11-27 | Lear Corporation | System and method for authorizing a remote device |
KR101719161B1 (ko) * | 2010-05-13 | 2017-03-23 | 삼성전자주식회사 | WiFi 기반의 단말기 및 그의 채널 운용 방법 |
CN103190196B (zh) * | 2010-10-13 | 2015-12-09 | 诺基亚公司 | 通信模式的选择 |
US20130189925A1 (en) * | 2011-07-29 | 2013-07-25 | SIFTEO, Inc. | Pairing Wireless Device Using Multiple Modalities |
CN102291493B (zh) * | 2011-08-25 | 2012-10-03 | 华为终端有限公司 | 移动终端的应用参数配置方法、相关装置以及系统 |
EP2795986A4 (en) * | 2011-12-20 | 2016-01-06 | Intel Corp | WLAN PEER TO PEER (P2P) CONNECTION AND DISCHARGE WITH SUPPORT THROUGH A NEAR WWAN |
-
2012
- 2012-08-16 CN CN201280002875.4A patent/CN103181235B/zh active Active
- 2012-08-16 EP EP12801791.0A patent/EP2804424B1/en active Active
- 2012-08-16 WO PCT/CN2012/080230 patent/WO2014026356A1/zh active Application Filing
- 2012-12-31 US US13/731,306 patent/US8929549B2/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101212780A (zh) * | 2006-12-31 | 2008-07-02 | 华为技术有限公司 | 确定网络节点相对位置的方法及系统 |
CN101394648A (zh) * | 2007-09-17 | 2009-03-25 | 中兴通讯股份有限公司 | 一种时分双工系统中终端前导的发送方法 |
CN102172077A (zh) * | 2008-08-11 | 2011-08-31 | 株式会社Ntt都科摩 | 用户装置、无线基站以及方法 |
CN101959282A (zh) * | 2010-09-26 | 2011-01-26 | 杭州华三通信技术有限公司 | 无线局域网接入控制方法及其装置 |
Also Published As
Publication number | Publication date |
---|---|
CN103181235B (zh) | 2016-08-10 |
EP2804424B1 (en) | 2016-05-18 |
CN103181235A (zh) | 2013-06-26 |
EP2804424A1 (en) | 2014-11-19 |
US20140050319A1 (en) | 2014-02-20 |
US8929549B2 (en) | 2015-01-06 |
EP2804424A4 (en) | 2015-08-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2014026356A1 (zh) | 无线网络建立连接的方法和设备 | |
US11546758B2 (en) | System and method for an extender device | |
WO2017041675A1 (zh) | 一种发送和获取wifi联网信息的方法和对应装置 | |
US10264448B2 (en) | Method and apparatus for facilitating use of services available via wireless connection | |
US9628585B2 (en) | Systems and methods for cross-layer secure connection set up | |
US10244388B2 (en) | Location privacy protection method, apparatus, and system | |
CN105103618B (zh) | 计算机实现方法和便携式处理设备 | |
WO2013143352A1 (zh) | 无线网络连接的建立方法及终端设备 | |
KR20130128347A (ko) | 호스팅 장치의 존재에 기초하여 게스트 장치에 대한 네트워크 액세스를 제어하는 방법, 장치 및 컴퓨터 프로그램 제품 | |
KR102048013B1 (ko) | 사용자 디바이스와 페어링을 수행하기 위한 네트워크 장치 및 그 페어링 방법 | |
WO2014029100A1 (zh) | 无线局域网络设备的配置方法、相关设备及系统 | |
JP2017516328A (ja) | エンドユーザ連合ログインを使用した鍵交換暗号化チャネルにおける違反の検出 | |
JP2015517280A (ja) | モバイルデバイスを使用して、別のデバイスのワイヤレスネットワークへの接続を可能にすること | |
US11832355B2 (en) | Real-time assessment of multimedia service in a particular environment | |
EP3061226A1 (en) | Peer based authentication | |
KR20140068240A (ko) | 무선 디바이스의 자동 구성 | |
KR20140138992A (ko) | 단거리 무선 통신을 사용하는 네트워크 보안성 구성 | |
WO2011155938A1 (en) | Radio channel metrics for secure wireless network pairing | |
TWI462604B (zh) | 無線網路用戶端認證系統及其無線網路連線方法 | |
WO2012094879A1 (zh) | 一种mtc服务器共享密钥的方法及系统 | |
KR20160099396A (ko) | 통신 서비스 이용 방법 및 이를 지원하는 전자 장치 | |
CN113169962A (zh) | 对网状网络中安全威胁的检测 | |
WO2015018327A1 (zh) | 一种终端设备与网关设备间的互联方法和装置 | |
JP2009302649A (ja) | 通信装置、通信装置の通信方法、プログラム、記憶媒体 | |
WO2015149232A1 (zh) | 用户设备接入无线保真Wi-Fi的方法及Wi-Fi接入节点 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 2012801791 Country of ref document: EP |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 12801791 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |