WO2014176743A1 - 一种配置无线终端的方法、设备及系统 - Google Patents

一种配置无线终端的方法、设备及系统 Download PDF

Info

Publication number
WO2014176743A1
WO2014176743A1 PCT/CN2013/075006 CN2013075006W WO2014176743A1 WO 2014176743 A1 WO2014176743 A1 WO 2014176743A1 CN 2013075006 W CN2013075006 W CN 2013075006W WO 2014176743 A1 WO2014176743 A1 WO 2014176743A1
Authority
WO
WIPO (PCT)
Prior art keywords
wireless terminal
configuration
information
wireless
identification information
Prior art date
Application number
PCT/CN2013/075006
Other languages
English (en)
French (fr)
Inventor
李小仙
丁志明
Original Assignee
华为终端有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为终端有限公司 filed Critical 华为终端有限公司
Priority to EP13883607.7A priority Critical patent/EP2986045B1/en
Priority to PCT/CN2013/075006 priority patent/WO2014176743A1/zh
Priority to CN201380000833.1A priority patent/CN105009618B/zh
Publication of WO2014176743A1 publication Critical patent/WO2014176743A1/zh
Priority to US14/924,132 priority patent/US10091650B2/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/35Protecting application or service provisioning, e.g. securing SIM application provisioning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/50Secure pairing of devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/72412User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices

Definitions

  • the present invention relates to the field of communications, and in particular, to a method, device, and system for configuring a wireless terminal. Background technique
  • Wi-Fi Wireless Fidelity
  • Wi-Fi Protected Setup WPS
  • WSC Wi-Fi Simple Configuration
  • An entity called Registrar is defined in the WPS specification to complete the configuration of the wireless terminal.
  • the registrar can be built into the wireless access device or externally connected to the wireless access device.
  • the external registrar can be called a configuration device.
  • the wireless terminal needs to forward the corresponding request to the configuration device through the wireless access device, and the configuration device also needs to be forwarded through the wireless access device.
  • the corresponding response to the wireless terminal therefore, the three must be in the working state during the configuration process, and the wireless access device cannot be completed to the wireless terminal when the wireless access device is in an area that cannot communicate normally with the wireless terminal or the wireless access device is offline. Configuration, making the process of configuring a wireless terminal inflexible. Summary of the invention
  • Embodiments of the present invention provide a method, device, and system for configuring a wireless terminal.
  • the configuration of the wireless terminal is completed by configuring direct communication between the device and the wireless terminal, and the configuration process can complete the configuration of the wireless terminal without the participation of the wireless access device.
  • the embodiment of the present invention adopts the following technical solutions:
  • an embodiment of the present invention provides a method for configuring a wireless terminal, where the configuration device directly connects with the wireless terminal, and the method includes:
  • the configuration device acquires device identification information and a configuration password of the wireless terminal from the
  • the configuration device sends configuration trigger information to the wireless terminal according to device identification information of the wireless terminal;
  • the configuration device performs verification with the wireless terminal according to the configuration password information to determine that the wireless terminal owns the configuration password information
  • the configuration device sends, to the wireless terminal, the credential information of the wireless terminal to access the wireless access device and the device identification information of the wireless access device, so that after the verification succeeds, the wireless terminal according to the Corresponding information and a device identification letter of the wireless access device requesting access to the wireless access device;
  • the configuration device sends the credential information and the device identification information of the wireless terminal to the wireless access device, so that the wireless access device according to the credential information and the device identifier information of the wireless terminal Processing the request of the wireless terminal to access the wireless access device.
  • the configuration device acquires device identification information and configuration password information of the wireless terminal, including,
  • the configuration device acquires the configuration password information and device identification information of the wireless terminal by scanning a multi-dimensional code of the wireless terminal device.
  • the configuration device acquires device identification information and configuration password information of the wireless terminal, including,
  • the configuration device receives configuration request information sent by the wireless terminal, where the configuration request information includes device identification information of the wireless terminal, and uses a personal identity to identify another 'J code.
  • the configuration device receives the configuration password information input by a user, and the configuration password information includes a PIN of the wireless terminal.
  • the configuration device acquires device identification information and configuration password information of the wireless terminal, including,
  • the configuration device receives configuration request information sent by the wireless terminal, where the configuration
  • the request information includes device identification information of the wireless terminal and indication information using a Push Button Control (PBC) mode;
  • PBC Push Button Control
  • the configuration device interacts with the wireless terminal in a PBC configuration mode and uses the default PIN as the configuration password information in the interaction process.
  • the configuration device acquires device identification information and configuration password information of the wireless terminal, including,
  • the configuration device reads configuration password information of the wireless terminal and device identification information of the wireless terminal through a Near Field Communication (NFC) interface.
  • NFC Near Field Communication
  • a manner of directly connecting the configuration device and the wireless terminal includes a temporary network Ad hoc connection.
  • the direct connection manner includes a Peer-to-Peer (P2P) connection.
  • P2P Peer-to-Peer
  • the configuration device sends configuration trigger information to the wireless terminal according to device identifier information of the wireless terminal,
  • the configuration device sends configuration trigger information to the wireless terminal by using a probe response frame or a beacon frame according to device identification information of the wireless terminal.
  • the configuring, by the configuration device, performing the verification with the wireless terminal according to the configuration password information the configuration The device performs verification with the wireless terminal by using an Extensible Authentication Protocol (EAP) message according to the configuration password information.
  • EAP Extensible Authentication Protocol
  • the configuration device sends, to the wireless terminal, the trust that the wireless terminal accesses the wireless access device Information and device identification information of the wireless access device, And the configuration device sends the trust information of the wireless terminal to access the wireless access device and the device identification information of the wireless access device to the wireless terminal by using the EAP message.
  • the embodiment of the present invention provides a method for configuring a wireless terminal, where the wireless terminal is directly connected to the configuration device, and the method includes:
  • the wireless terminal performs verification with the configuration device, so that the configuration device determines that the wireless terminal has configuration password information
  • the method further includes: the wireless The terminal sends a configuration request message to the configuration device, where the configuration request message includes device identification information of the wireless terminal and indication information of using the PIN method, so that the configuration device receives the user input according to the configuration request message.
  • the configuration password information includes the PIN of the wireless terminal.
  • the method before the wireless terminal receives configuration trigger information that is sent by the configuration device according to the device identifier information of the wireless terminal, the method further includes: the wireless terminal The configuration device sends a configuration request message, where the configuration request message includes device identification information of the wireless terminal and indication information using a PBC mode, so that the configuration device interacts with the wireless terminal by performing PBC configuration mode interaction.
  • the default PIN is used as the configuration password information during the process.
  • the direct connection manner includes an ad hoc connection.
  • the direct connection manner includes a P2P connection.
  • the receiving, by the wireless terminal, the configuration trigger information that is sent by the configuration device according to the device identifier information of the wireless terminal includes:
  • the wireless terminal receives configuration trigger information that is sent by the configuration device by using a probe response frame or a beacon frame according to device identification information of the wireless terminal.
  • the wireless terminal receives, by the configuration device, the wireless terminal accessing the wireless access device a trust letter, and an identification letter of the wireless access device, including,
  • the wireless terminal receives the credential information of the wireless terminal that is sent by the configuration device by using the EAP message, and the identifier information of the wireless access device.
  • an embodiment of the present invention provides a configuration device directly connected to a wireless terminal, where the configuration device includes
  • An acquireer configured to obtain configuration password information and transmit the configuration password information to a processor
  • a processor configured to generate configuration trigger information according to the configuration password information; and configured to perform verification with the wireless terminal according to the configuration password information to determine that the wireless terminal owns the configuration password information;
  • a communication unit configured to communicate with an external network element by using a directly connected communication link, and configured to send configuration trigger information to the wireless terminal;
  • the acquirer includes a multi-dimensional code scanner, configured to scan a multi-dimensional code of the wireless terminal device, obtain the configuration password, and the wireless terminal Device identification information.
  • the communications unit is further configured to: receive a configuration request message sent by the wireless terminal, where the configuration request message includes device identifier information and usage of the wireless terminal
  • the PIN mode indication information includes a keyboard, configured to receive configuration password information of the wireless terminal input by the user, and the configuration password information includes a personal identification code PIN of the wireless terminal.
  • the communications unit is further configured to: receive a configuration request message sent by the wireless terminal, where the configuration request message includes device identifier information and usage of the wireless terminal PBC mode indication information;
  • the acquirer includes a PBC button for performing PBC configuration mode interaction with the wireless terminal and using a default PIN as configuration password information during the interaction.
  • the acquirer includes an NFC interface, configured to read configuration password information of the wireless terminal and device identification information of the wireless terminal.
  • the communication unit communicates with the external network element by using the directly connected communication link, The communication unit communicates with the external network element through an ad hoc connection link.
  • the communication unit communicates with the external network element by using the directly connected communication link,
  • the communication unit communicates with an external network element through a P2P connection link.
  • the configuration trigger information includes a probe response frame or a beacon frame.
  • the performing, according to the configuration password information, performing verification with the wireless terminal to determine that the wireless terminal owns the configuration password information Specifically, including:
  • the device identification information of the access device includes: sending, by the EAP message, the credential information of the access radio access device and the device identifier information of the radio access device to the wireless terminal.
  • the embodiment of the present invention provides a configuration device, where the configuration device includes: an acquiring unit, configured to acquire device identification information and a configuration password information of the wireless terminal, and device identification information of the wireless terminal. Transmitting to the first sending unit, transmitting configuration password information of the wireless terminal to the verification unit; the first sending unit, configured to receive, by the acquiring unit, device identification information of the wireless terminal and device identification information according to the wireless terminal Transmitting configuration trigger information to the wireless terminal through a directly connected communication link; a verification unit, configured to receive the configuration password information from the acquiring unit, and through a directly connected communication link according to the configuration password information The wireless terminal performs verification to determine that the wireless terminal owns the configuration password information; the first sending unit is further configured to send, by the directly connected communication link, the wireless terminal to access the wireless connection Credential information of the incoming device and device identification information of the wireless access device, After the verification by the verification unit is successful, the wireless terminal requests access to the wireless access device according to the credential information and the device identification information of the wireless terminal.
  • the acquiring unit includes: a receiving module, configured to receive a configuration request message sent by the wireless terminal, where the configuration request message includes a device identifier of the wireless terminal Information and instructions for using the PIN method;
  • a PIN module configured to receive configuration password information of the wireless terminal input by a user, where the configuration password information of the wireless terminal includes a P I N of the wireless terminal.
  • the acquiring unit includes: a receiving module, configured to receive a configuration request message sent by the wireless terminal, where the configuration request message includes a device identifier of the wireless terminal Information and instructions for using the PBC method;
  • the PBC module is used to perform PBC configuration mode interaction with the wireless terminal and use the default PIN as the configuration password information during the interaction.
  • the acquiring unit is further configured to: read configuration password information of the wireless terminal and device identifier information of the wireless terminal by using an NFC interface.
  • the direct connection comprises an ad hoc connection.
  • the direct connection comprises a P2P connection.
  • the first sending unit is configured to send, by using a probe response frame or a beacon frame, the wireless terminal according to the device identifier information of the wireless terminal. Send configuration trigger information.
  • the verification unit is configured to perform verification with the wireless terminal by using an EAP message according to the configuration password information.
  • the first sending unit is configured to send, by using the EAP message, the wireless terminal The wireless terminal accesses the credential information of the wireless access device and the device identification information of the wireless access device.
  • an embodiment of the present invention provides a wireless terminal directly connected to a configuration device, where the wireless terminal includes
  • the communication unit is configured to communicate with the external network element by using the directly connected communication link, and configured to receive configuration trigger information sent by the configuration device according to the device identification information of the wireless terminal;
  • a processor configured to perform verification with the configuration device, to enable the configuration device to determine that the wireless terminal owns configuration password information
  • the communication unit is further configured to receive, by the configuration device, a trust message of the wireless terminal accessing the wireless access device, and identifier information of the wireless access device, so that the wireless terminal and the wireless terminal After the configuration device is successfully authenticated, the wireless terminal requests to access the wireless access device according to the credential information and the device identification information of the wireless access device.
  • the communications unit is further configured to: send, to the configuration device, a configuration request message, where the configuration request message includes device identifier information and a PIN of the wireless terminal.
  • the indication information of the mode so that the configuration device receives the configuration password information input by the user according to the configuration request message, where the configuration password information includes a PIN of the wireless terminal.
  • the communications unit is further configured to: send a configuration request message to the configuration device, where the configuration request message includes device identifier information of the wireless terminal, and uses a PBC The indication information of the mode; so that the configuration device performs the PBC configuration mode interaction with the wireless terminal and uses the default PIN as the configuration password information in the interaction process.
  • any one of the first or the second possible implementation manner communicates with the external network element by using the directly connected communication link, The communication unit communicates with the external network element through an ad hoc connection link.
  • the communication unit in combination with the fifth aspect, any one of the first or the second possible implementation manner, communicates with the external network element by using the directly connected communication link, The communication unit communicates with an external network element through a P2P connection link.
  • the communications unit is configured to receive, by the configuration device, a probe response frame or a beacon frame according to the device identifier information of the wireless terminal.
  • Configuration trigger information In a sixth possible implementation, in combination with any one of the fourth or fifth possible implementations, the verifying with the configuration device, so that the configuring device determines that the wireless terminal owns The configuration of the password information includes: performing the verification with the configuration device by using an EAP message.
  • the receiving, by the configuration device, the wireless terminal accessing the wireless access device And the identifier information of the wireless access device, and the identifier information of the wireless access device that is sent by the wireless device by using the EAP message, and the identifier of the wireless access device information in combination with any one of the fourth to the sixth possible implementation manners, the receiving, by the configuration device, the wireless terminal accessing the wireless access device And the identifier information of the wireless access device, and the identifier information of the wireless access device that is sent by the wireless device by using the EAP message, and the identifier of the wireless access device information.
  • an embodiment of the present invention provides a wireless terminal directly connected to a configuration device, where the wireless terminal includes
  • a receiving unit configured to receive, by using a directly connected communication link, configuration trigger information sent by the configuration device according to device identifier information of the wireless terminal;
  • a verification unit configured to perform verification with the configuration device by using a directly connected communication link, so that the configuration device determines that the wireless terminal owns configuration password information; and the receiving unit is further configured to use a directly connected communication chain
  • the wireless terminal requests access to the wireless access device according to the credential information and the device identification information of the wireless access device.
  • the wireless terminal further includes a sending unit, configured to send a configuration request message to the configuration device, where the configuration request message includes device identifier information of the wireless terminal And using the PIN PIN side The indication information, so that the configuration device receives the configuration password information input by the user according to the configuration request message, where the configuration password information includes the wireless terminal
  • the wireless terminal further includes a sending unit, configured to send a configuration request message to the configuration device, where the configuration request message includes device identifier information and usage of the wireless terminal
  • the button configures the indication information of the PBC mode; so that the configuration device performs the PBC configuration mode interaction with the wireless terminal and uses the default PIN as the configuration password information in the interaction process.
  • the direct connection comprises an ad hoc connection.
  • the direct connection is a P2P connection.
  • the receiving unit is configured to receive, by the configuration device, a probe response frame or a beacon frame according to the device identification information of the wireless terminal. Configuration trigger information sent.
  • the verification unit is configured to perform verification with the configuration device by using an EAP message.
  • the receiving unit is configured to receive, by the configuration device, the wireless that is sent by using the EAP message.
  • an embodiment of the present invention provides a system for configuring a device, where
  • the system further includes: a wireless access device, configured to receive, by the configuration device, the credential information of the wireless terminal and the identifier of the wireless terminal Information, and accessing the wireless terminal to the wireless terminal according to the credential information of the wireless terminal and the identification information of the wireless terminal
  • the request to the device is processed.
  • the method, the device and the system for configuring the wireless terminal provided by the embodiment of the present invention complete the configuration of the wireless terminal by configuring the direct communication between the device and the wireless terminal, and the configuration process can complete the configuration of the wireless terminal without the participation of the wireless access device. Make the configuration process more flexible. The problem that the prior art must be in the working state during the configuration process is solved, and the configuration of the wireless terminal cannot be completed when the wireless access device is in an area where communication cannot be normally performed or the wireless access device is in an offline state.
  • FIG. 1 is a flowchart of a method for configuring a wireless terminal according to an embodiment of the present invention
  • FIG. 2 is a flowchart of another method for configuring a wireless terminal according to an embodiment of the present invention
  • FIG. 4 is a flowchart of a verification method according to an embodiment of the present invention
  • FIG. 5 is a flowchart of another verification method according to an embodiment of the present invention
  • FIG. 6 is a flowchart of another verification method according to an embodiment of the present invention
  • FIG. 7 is a schematic diagram of an apparatus for configuring a device according to an embodiment of the present disclosure.
  • FIG. 8 is a schematic diagram of another apparatus for configuring a device according to an embodiment of the present disclosure.
  • FIG. 9 is a schematic diagram of another apparatus for configuring a device according to an embodiment of the present disclosure.
  • FIG. 10 is a schematic diagram of another apparatus for configuring a device according to an embodiment of the present invention.
  • FIG. 1 is a device diagram of a wireless terminal according to an embodiment of the present invention.
  • FIG. 12 is a device diagram of another wireless terminal according to an embodiment of the present invention
  • FIG. 13 is a device diagram of another wireless terminal according to an embodiment of the present invention
  • FIG. System diagram FIG. 15 is a system diagram of another configuration of a wireless terminal according to an embodiment of the present invention. detailed description
  • the method in the embodiment of the present invention relates to the numbers of S101, S102, etc., and only has the functions of each step in the identification method, and does not limit the sequence between the numbering steps.
  • a schematic flowchart of a method for configuring a wireless terminal on a device side where a direct connection between a configuration device and a wireless terminal may include a point-to-point (P2P) connection mode and an ad hoc connection mode, which is an embodiment of the present invention.
  • the configuration of the direct connection between the device and the wireless terminal is not limited.
  • the configuration device and the wireless terminal adopt a P2P connection mode. As shown, the following steps can be included:
  • the device is configured to obtain the device identification information and the configuration password information of the wireless terminal.
  • the configuration device obtains the device identification information and the configuration password information of the wireless terminal, and may select one of the following methods:
  • the configuration device receives the configuration request message sent by the wireless terminal, and the configuration request message includes the device identification information of the wireless terminal and the indication information of using the PIN method;
  • the configuration device receives the configuration password information input by the user, and the configuration password information includes the PIN of the wireless terminal.
  • the configuration device receives the configuration request message sent by the wireless terminal, and the configuration request message includes the device identification information of the wireless terminal and the indication information of the PBC mode.
  • the configuration device sends configuration trigger information to the wireless terminal according to the device identification information of the wireless terminal.
  • the configuration device may send configuration trigger information to the wireless terminal by detecting the response frame or the beacon frame according to the device identification information of the wireless terminal.
  • S103 The configuration device performs verification with the wireless terminal according to the configuration password information to determine that the wireless terminal has configuration password information;
  • the configuration device can authenticate with the wireless terminal through the EAP message according to the configuration password information.
  • the configuration device sends, to the wireless terminal, the credential information of the wireless terminal to access the wireless access device and the device identification information of the wireless access device, so that after the verification succeeds, the wireless terminal according to the credential information and the wireless access device
  • the device identification information requests access to the wireless access device.
  • the configuration device may send, by using an EAP message, the credential information of the wireless terminal accessing the wireless access device and the device identification information of the wireless access device to the wireless terminal.
  • step S104 may also be performed simultaneously with step S103 according to different verification methods and message interaction processes. This embodiment is not limited to performing step S104 after completing step S103.
  • the configuration device sends the credential information and the device identification information of the wireless terminal to the wireless access device, so that the wireless access device requests the wireless terminal to access the wireless access device according to the credential information and the device identifier information of the wireless terminal. Process it.
  • step S105 may be performed at any time after the verification succeeds in step S103, and the embodiment is not limited to performing step S105 immediately after completing step S103 or step S014.
  • the method for configuring a wireless terminal provided by the embodiment of the present invention completes the configuration of the wireless terminal by configuring direct communication between the device and the wireless terminal, and the configuration process can complete the configuration of the wireless terminal without the participation of the wireless access device. Make the configuration process more flexible.
  • the prior art must be in the working state during the configuration process, and the wireless access device is in the working state. The problem of the configuration of the wireless terminal cannot be completed when the area that cannot communicate normally or the wireless access device is offline.
  • FIG. 2 is a schematic flowchart of a method for configuring a wireless terminal on a wireless terminal side, where a wireless terminal is directly connected to a configuration device, and may include a P2P connection mode and an ad hoc connection mode.
  • a direct connection between the configuration device and the wireless terminal is performed.
  • the method is not limited.
  • the configuration device and the wireless terminal adopt a P2P connection mode. As shown, the following steps can be included:
  • the wireless terminal receives configuration trigger information that is sent by the configuration device according to the device identifier information of the wireless terminal.
  • the device identification information of the wireless terminal may be acquired by the configuration device; the wireless terminal receives configuration trigger information that is sent by the configuration device according to the device identification information of the wireless terminal by the probe response frame or the beacon frame, and receives the configuration device according to the wireless terminal according to the configuration Before the configuration trigger information sent by the device identification information of the wireless terminal, any one of the following steps may be included:
  • the wireless terminal sends a configuration request message to the configuration device, where the configuration request message includes the device identification information of the wireless terminal and the indication information of the PIN mode, so that the configuration device receives the configuration password information input by the user according to the configuration request message, and the configuration password information includes the wireless information.
  • Terminal PIN or,
  • the wireless terminal sends a configuration request message to the configuration device, where the configuration request message includes the device identification information of the wireless terminal and the indication information of the PBC mode, so that the configuration device performs the PBC configuration mode interaction with the wireless terminal and uses the interaction process in the interaction process.
  • the province's PIN is used as the configuration password information.
  • S202 The wireless terminal performs verification with the configuration device, so that the configuration device determines that the wireless terminal has configuration password information.
  • the configuration password information of the wireless terminal can be obtained by the configuration device, and the wireless terminal authenticates with the configuration device through the EAP message.
  • the wireless terminal receives the trust message of the wireless terminal accessing the wireless access device sent by the configuration device, and the identifier information of the wireless access device, so that the verification succeeds. Afterwards, the wireless terminal requests access to the wireless access device according to the trust message, and the device identification information of the wireless access device.
  • the wireless terminal receives the trust message of the wireless terminal that the configuration device sends through the EAP message, and the identifier information of the wireless access device, which needs to be described according to different verification methods and message interaction processes.
  • Step S203 may also be performed simultaneously with step S202. This embodiment is not limited to performing step S203 after the step S202 is completed.
  • the wireless terminal may discover the wireless access device according to the identification information of the wireless access device obtained from the configuration device, and use the obtained credential information and the wireless access device after finding the designated wireless access device. Establish a secure connection.
  • the method for configuring a wireless terminal completes the configuration of the wireless terminal by configuring direct communication between the device and the wireless terminal, and the configuration process can complete the configuration of the wireless terminal without the participation of the wireless access device. Make the configuration process more flexible. It solves the problem that the prior art must be in the working state during the configuration process, and the configuration of the wireless terminal cannot be completed when the wireless access device is in an area where communication cannot be normally performed or the wireless access device is in an offline state.
  • the foregoing method embodiments are described below by way of specific embodiments. Referring to FIG. 3, the following includes:
  • the embodiment of the present invention may be applied to a Wi-Fi network, and may include a configuration device, a wireless access device, and a wireless terminal, where the configuration device is a configuration management device of the wireless access device, and is used to manage wireless network establishment, Adding and deleting a wireless terminal; the wireless access device is an access device for the wireless terminal to enter the network, including but not limited to an access point (AP).
  • the wireless access device is an AP, for example.
  • the wireless terminal can enter the home network (local area network) through the AP, or enter the Internet, or enter the enterprise network or the industry private network (for example, the smart sensor network, wherein the wireless terminal is a sensor).
  • the configuration device in this embodiment may be an external registrar of the AP defined in the existing WPS 2.0 specification according to its function. It can be understood that the configuration device is not limited to the existing WPS 2.0 specification. External registration as defined in Cry.
  • the configuration device interacts with the AP to become the configuration device of the AP during the initial WLAN establishment process.
  • the configuration device can interact with the AP according to the EPS of the WPS specification to become the configuration device of the AP, of course, if the WPS specification
  • the protocol in which the device is configured to interact with the AP is changed, and the changed protocol may also be directly applied to the embodiment of the present invention;
  • the configuration device can also be configured as an AP by receiving the configuration parameters entered by the user. That is, the configuration device can become the configuration device of the AP without interacting with the AP.
  • the configuration device is used to interact with the AP in the initial WLAN establishment process to become the configuration device of the AP, and is used to configure other wireless terminals that need to be joined.
  • the interaction process is familiar to those skilled in the art. No longer.
  • the configuration password information of the wireless terminal acquired by the configuration device is referred to as the first configuration password information
  • the wireless device is configured as the first configuration password information.
  • the configuration password information owned by the terminal itself is called the second configuration password information.
  • the first configuration password information and the second configuration password information should be the same, and the type can be a PIN or a password, which can be encoded in the multi-dimensional code, stored in the NFC label, and characters.
  • the string is displayed on a label or the like.
  • the multi-dimensional code of the wireless terminal may be a static multi-dimensional code, such as a multi-dimensional code printed by a label, or a dynamic multi-dimensional code, such as a multi-dimensional code dynamically generated by a wireless terminal;
  • the multi-dimensional code system can be any known Read one-dimensional bar code, two-dimensional bar code system, such as Universal Product Code (UPC), Quick Response Code (QR Code).
  • UPC Universal Product Code
  • QR Code Quick Response Code
  • the configuration password information of the wireless terminal can be statically stored in the NF tag of the wireless terminal, or dynamically generated in some way and stored in the NFC tag of the wireless terminal.
  • the device identification information of the wireless terminal may be any information that can uniquely identify the wireless terminal, which is not limited in this embodiment. For example, it may be a Media Access Control (MAC) address of the wireless terminal.
  • MAC Media Access Control
  • the device identification information and the first configuration password information of the configuration device may be selected by using any one of the following methods:
  • the configuration device receives the configuration request message of the wireless terminal, where the configuration request message includes the device identification information of the wireless terminal and the indication information of using the PIN method;
  • the configuration device can receive the configuration request message of the wireless terminal in any of the following manners:
  • the device is configured to broadcast a beacon frame to the device. After receiving the beacon frame, the wireless terminal sends a configuration request message to the configuration device, and the configuration device sends a probe response to the wireless terminal after receiving the configuration request message, thereby obtaining the device identifier of the wireless terminal.
  • the wireless terminal actively sends a configuration request message on each channel, and the configuration device sends a probe response to the wireless terminal after receiving the configuration request message, thereby obtaining device identification information of the wireless terminal;
  • the configuration device receives the configuration password information input by the user, and the configuration password information includes the PIN of the wireless terminal.
  • the configuration device receives the configuration request message of the wireless terminal, and the configuration request message includes the device identification information of the wireless terminal and the indication information of the PBC mode, where the process of obtaining the configuration request message is the same as the receiving method of the configuration request message in the PIN mode; I will not repeat them here;
  • the configuration device sends configuration trigger information to the wireless terminal.
  • the configuration triggering information may be any message sent by the configuration device that can trigger the wireless terminal to interact with the configuration message, for example, the configuration device sends a beacon frame to the wireless terminal according to the device identification information of the wireless terminal or A probe response is triggered to trigger a wireless terminal to perform subsequent configuration message interaction with the configuration device.
  • the invention is not limited thereto.
  • step 308 Configuring the device to perform verification with the wireless terminal
  • step 309 The configuration device sends the credential and the device identifier information of the AP to the wireless terminal.
  • the configuration device may send the credential of the wireless terminal and the device identifier information of the AP to the wireless terminal by using an EAP message, so that the wireless terminal according to the trust
  • the information and the identification information of the AP request access to the AP.
  • the credential information and the device identification information of the AP may be sent after the verification process ends, or may be sent in the verification interaction message at the same time, or may be used as part of the verification process as one of the judgment conditions for the success or failure of the verification.
  • the invention is not limited thereto.
  • the credential information and the device identification information of the AP may be sent simultaneously or separately.
  • the configuration device may send a notification message to the AP, where the notification message includes the credential information and the device identifier information of the wireless terminal, so that the AP processes the access request of the wireless terminal according to the credential information and the device identifier information of the wireless terminal.
  • step 3 10 is not limited to being executed immediately after step 308 or step 309, and its execution time is determined according to actual configuration requirements.
  • step 3 10 can be executed immediately after completing step 308 or step 309; in the sensor network, because a large number of sensor devices need to be configured, Moreover, after the sensor device is installed, the distribution is relatively scattered, which is not convenient for post-installation configuration. Therefore, it needs to be configured in batches before installation. At this time, step 3 10 can be performed after a long time after step 308 or step 309.
  • the configuration device and the wireless terminal can perform direct communication in a direct connection manner, so as to complete the verification of the configuration device and the wireless terminal, wherein the direct connection manner may include a P2P connection mode and an ad hoc connection mode.
  • the direct connection manner may include a P2P connection mode and an ad hoc connection mode.
  • the manner in which the direct connection between the configuration device and the wireless terminal is not limited in the embodiment of the present invention.
  • the configuration device and the wireless terminal adopt a P2P connection mode.
  • the following steps 304 to 307 are processes in which the wireless terminal completes the point-to-point connection with the configuration device, and the process may occur between step 303 and step 308.
  • the configuration device is a group owner (Group Owner, referred to as GO) in the P2P connection.
  • the wireless terminal is Group client (Client) in a P2P connection.
  • the wireless terminal sends an authentication request message to the configuration device.
  • the configuration device sends an authentication response message to the wireless terminal.
  • the configuration device sends an authentication reply to the wireless terminal, including information that allows the wireless terminal to connect with the configuration device.
  • the wireless terminal sends an association request message to the configuration device.
  • the wireless terminal after receiving the authentication response message, the wireless terminal sends an association request message including the connection request message, I, to the configuration device.
  • the configuration device sends an association response message to the wireless terminal.
  • the configuration device sends the connection information to the wireless terminal according to the received connection request, and completes the P2P connection between the configuration device and the wireless terminal.
  • step 304, step 305, step 306, and step 307 are designed according to the existing IEEE 802.1 1 -2012 protocol.
  • the embodiment of the present invention specifically describes three types of verification methods for step 308: 1.
  • the configuration device and the wireless terminal perform a 4-step handshake for two-way verification, that is, the configuration device is to be verified.
  • the wireless terminal has the first configuration password information obtained by the configuration device, and the wireless terminal also verifies that the configuration device obtains its second configuration password information.
  • the device is configured to verify the wireless terminal in one direction, that is, the configuration device verifies the first configuration obtained by the device.
  • the password information comes from the wireless terminal that performs the configuration process. 3.
  • the configuration device and the wireless terminal use the EAP authentication process in the existing WPS2.0 to perform two-way authentication, that is, the configuration device needs to verify that the wireless terminal has the first configuration obtained by configuring the device.
  • the password information the wireless terminal also verifies that the configuration device has obtained its second configuration password information.
  • the specific verification manner may be multiple, and any verification manner that is performed by the information interaction and the matching confirmation is applicable to the verification process described in step 308 of the embodiment of the present invention. The way is just a detailed description of the verification process. The above three verification methods are described below.
  • the configuration device and the wireless terminal each generate a random value, respectively Ra and
  • the configuration device sends a message to the wireless terminal, and the message 1 includes Ra;
  • the wireless terminal generates a shared key Key1 according to the received Ra and the Ea generated by the self and the second configured password information.
  • the wireless terminal sends a message 2 to the configuration device, and the message 2 includes Ea and a first Message Integrity Code (MIC) obtained by encrypting the message digest with Keyl;
  • MIC Message Integrity Code
  • the configuration device generates a shared key Key2 according to the received Ea and the generated Ra and the first configuration password information, and generates a second MIC in the same manner as the wireless terminal by using the Key2, where the configuration device generates the Key2.
  • the configuration device determines whether the second MIC matches the first MIC.
  • the configuration interaction process ends.
  • the configuration device determines that the second configuration password information of the wireless terminal is different from the first configuration password information obtained by the configuration device.
  • the configuration device may send the mismatch result information to the wireless terminal, and the wireless terminal sends the disconnection information to the configuration device to end the configuration interaction process, or the configuration device directly ends the configuration interaction process, or ends the configuration interaction process in any other feasible manner.
  • the invention is not limited thereto.
  • the configuration device uses the Key2 encrypted message three digest to generate a third MIC;
  • the configuration device sends a message three to the wireless terminal
  • the configuration device determines that the second configuration password information of the wireless terminal is the same as the first configuration password information obtained by the configuration device.
  • the configuration device sends a message to the wireless terminal.
  • the message 3 includes the third MIC obtained by encrypting the message 3 with the key 2 and the trust information of the AP accessed by the wireless terminal encrypted by the key 2 and the device identification information of the AP. It should be noted that those skilled in the art can understand that the generation time of the credential information is not specifically limited before the credential information is sent;
  • the wireless terminal After receiving the message three, the wireless terminal uses Key1 to generate a fourth MIC in the same manner as the configuration device.
  • 41 1 The wireless terminal determines whether the fourth MIC matches the third MIC; 412: If not, ends the configuration interaction process. Exemplarily, if the third MIC does not match the fourth MIC, the wireless terminal determines that the first configuration password information obtained by the configuration device is different from the second configuration password information of the wireless terminal itself.
  • the wireless terminal sends the mismatch result information to the configuration device, the configuration device sends the disconnection information to the wireless terminal, ends the configuration interaction process, or directly ends the configuration interaction process, or ends the configuration interaction process in any other feasible manner. Not limited to this;
  • the wireless terminal determines that the first configuration password information obtained by the configuration device is the same as the second configuration password information of the wireless terminal itself.
  • the wireless terminal sends a message to the configuration device to notify the configuration device that the matching is successful, and obtains the credential information and the device of the AP according to the credential information of the accessing the AP and the device identification information of the AP by the wireless terminal encrypted by the Key2 in the Key1 decryption message 3. Identification information.
  • the identification information of the AP is relatively public and does not need to be encrypted.
  • the identification information of the AP is carried in the message 3 or sent through other messages. In this embodiment, only a feasible method is provided, but it is not limited thereto. See Figure 5 for the detailed process of the second verification method:
  • the configuration device generates the random value Ra and the credential information of the wireless terminal accessing the AP.
  • the configuration device may encrypt the random value Ra and the credential information of the wireless terminal accessing the AP by using the first configuration password information. Information one.
  • the configuration device sends the encrypted information to the wireless terminal. It should be noted that those skilled in the art can understand that the generation time of the credential information is not specifically limited before the credential information is sent.
  • the wireless terminal decrypts the received encrypted information by using the second configuration password to obtain a random value ⁇ ';
  • the wireless terminal may add the random value Ra by using the second configuration password information. Encrypted information is obtained after the secret.
  • the wireless terminal sends the encrypted information 2 to the configuration device.
  • the configuration device decrypts the received encrypted information by using the first configuration password information to obtain a random value ⁇ " '
  • the configuration device determines whether the random value ⁇ " matches the random value Ra generated by itself;
  • the configuration device may send disconnection information to the wireless terminal, end the configuration interaction process, or directly end the configuration interaction process, or end the configuration interaction process in any other feasible manner, the present invention Not limited to this.
  • the configuration device sends the device identification information of the AP to the wireless terminal. For example, if Wfl "matches Ra", the configuration device confirms that the matching is successful, and sends the device identification information of the AP to the wireless terminal. It should be noted that the device identification information of the AP may also be along with the credential information in the above verification process. Encrypted transmission, or the device identification information of the AP may also be sent in the above-mentioned verification process, which is not limited thereto. Referring to FIG. 6, the detailed process of the third verification method is as follows:
  • the interaction of the verification method is based on the EAP authentication process of the message 1 to the message 8 in the existing WPS2.0 protocol, and the configuration device and the wireless terminal can complete the configuration process through 8 messages (Ml ⁇ M8).
  • the M1 - M8 message is a standard message in the protocol, and the specific content is not described here.
  • the specific process is as follows:
  • the configuration device and the wireless terminal use a dynamic key exchange algorithm to negotiate a set of temporary keys between the wireless terminal and the configuration device, and are used to perform subsequent interactive authentication messages and important data such as configuration data and credential information. Encryption to ensure the security of the configuration process;
  • the embodiment of the present invention preferably uses a Diffie-Hellman (DH) dynamic key exchange algorithm, and does not mean that the embodiment of the present invention is limited to adopting the dynamic key exchange algorithm.
  • DH Diffie-Hellman
  • the configuration device divides the first configuration password information into the first half and the second half and separately encrypts.
  • the embodiment of the present invention selects the Advanced Encryption Standard (AES) algorithm for encryption, but does not represent
  • AES Advanced Encryption Standard
  • the embodiment of the present invention is limited to the algorithm, wherein the first half of the encrypted information is R1, the second half of the encrypted information is R2, and the R1 and R2 encryption keys are respectively R kl , R k2 , correspondingly, the wireless terminal will be
  • the second configuration password information is also divided into the first half and the second half and is encrypted by the same encryption algorithm as R1 and R2, wherein the first half of the encrypted information is E1, and the second half of the encrypted information is E2, E1 and E2.
  • the encryption keys are E kl , E k2 ;
  • the wireless terminal sends El and E2 to the configuration device
  • the configuration device sends the encrypted information R1 and R2 and the first half of the first configuration encryption information Rk1 to the wireless terminal;
  • the wireless terminal If the confirmation matches the first part of a first configuration and a second configuration password information password information, to configure the device to send E kl, exemplary wireless terminal, a wireless terminal in accordance with R kl for the first half of the second configuration with the password information R1,
  • the same encryption algorithm of R2 performs encryption. If the result of the encryption is equal to R1, the wireless terminal confirms that the first configuration password information matches the first half of the second configuration password information, and the wireless terminal transmits E kl to the configuration device.
  • the wireless terminal may send the mismatch result information to the configuration device, and configure the device to be wireless.
  • the terminal sends the disconnection information, ends the configuration interaction process, or directly ends the configuration interaction process, or ends the configuration interaction process in any other feasible manner, and the present invention is not limited thereto.
  • the configuration device sends the second half encryption key R k2 of the second configuration password information to the wireless terminal;
  • Exemplary configuration device a first configuration of the first half of the password information in accordance with the E k wherein R1, R2 encrypted encryption algorithm, if the result of the encryption with equal E1, the password information to confirm the first configuration and the second configuration password information
  • the first half of the matching, and the second half of the second configuration password information encryption key R k2 is sent to the wireless terminal;
  • the configuration device confirms the first configuration password information and If the second configuration password information does not match, the configuration interaction process ends. For example, the configuration device may send the mismatch result information to the wireless terminal, and the wireless terminal sends the disconnection information to the wireless terminal, ends the configuration interaction process, or directly ends the configuration interaction process.
  • the configuration interaction process may be terminated in any other feasible manner, and the invention is not limited thereto.
  • the wireless terminal sends E k2 to the configuration device.
  • the verification process step 605 of 607 verifies that the process of the first half of R1 is the same, and details are not described herein again.
  • the configuration device If it is confirmed that the first configuration password information matches the second half of the second configuration password information, the configuration device generates the trust information of the wireless terminal accessing the AP and sends the information to the wireless terminal.
  • the verification process step of 608 is the same as the process of verifying the first half of E1 in 606, and details are not described herein again.
  • the credential information may include authentication information of the wireless terminal and a key for encrypting and decrypting the communication message between the AP and the wireless terminal.
  • the three authentication methods exemplified above are applicable to verify that the configuration password information is a PIN code, a password in the NFC tag, and a multi-dimensional code.
  • This embodiment does not limit this.
  • the verification method shown in FIG. 4 and the verification method shown in FIG. 5 have a simple interaction process.
  • the configuration password information needs to have a long number of digits, which is inconvenient for manual input. Therefore, it is preferable to use a non-manual input acquisition method in practical applications, for example, reading the configuration password information in the NFC tag through the NFC interface or using the image sensor.
  • Reading the configuration password information encoded in the QR Code not only ensures that the configuration device can easily obtain the configuration password information, but also ensures that the configuration password information has sufficient information.
  • the EAP interaction process in the existing WPS2.0 protocol should be preferably used, that is, as shown in FIG. Authentication method. Those skilled in the art will appreciate that the EAP interaction process in the WPS 2.0 protocol has better security for shorter PIN codes.
  • a method for configuring a wireless terminal according to an embodiment of the present invention by configuring a device and wireless
  • the direct communication of the terminal completes the configuration of the wireless terminal, and the configuration process can complete the configuration of the wireless terminal without the participation of the AP, so that the configuration process is more flexible.
  • the problem that the prior art must be in the working state during the configuration process is solved, and the configuration of the wireless terminal cannot be completed when the AP is in an area where the communication cannot be normally performed or the AP is in an offline state.
  • the embodiment of the present invention provides a configuration device 70, which can be applied to a Wi-Fi network, and the Wi-Fi network can also include a wireless access device and a wireless terminal, where the configuration device 70 can be
  • the configuration management device of the wireless access device is configured to manage the wireless network to establish, add, and delete the wireless terminal; the wireless access device is the access device for the wireless terminal to enter the network, including but not limited to the AP, and the wireless access device in this embodiment
  • the wireless terminal can enter the home network (local area network) through the AP, or enter the Internet, or enter the enterprise network or the industry private network (for example, the smart sensor network, wherein the wireless terminal is a sensor).
  • the configuration device 70 in this embodiment may be an external registrar that defines an AP in the existing WPS 2.0 specification according to its function. It can be understood that the configuration device 70 is not limited to the existing WPS 2.0 specification. Defined external registrar.
  • the configuration device 70 includes;
  • the acquirer 701 is configured to obtain configuration password information and transmit the configuration password information to the processor 702.
  • the processor 702 is configured to generate configuration trigger information according to the configuration password information, and configured to perform verification according to the configuration password information with the wireless terminal to determine that the wireless terminal owns the configuration password information; the communication unit 703, through the directly connected communication link and the external network
  • the element performs communication for transmitting configuration trigger information to the wireless terminal according to the device identification information of the wireless terminal; for example, the communication unit 703 communicates with the external network element through the directly connected communication link, and may include the communication unit 703 connecting through the P2P.
  • the link or the ad hoc connection link communicates with the external network element, which is not limited by the embodiment of the present invention.
  • the preferred embodiment communicates with the external network element through the P2P connection link.
  • the configuration device 70 is a GO in a P2P connection, and the wireless terminal is a client in a P2P connection.
  • the communication unit 703 receives an authentication request message sent by the wireless terminal;
  • the processor 702 generates an authentication reply message according to the authentication request message, where the authentication reply message includes information that allows the wireless terminal to connect with the configuration device 70;
  • the communication unit 703 sends the authentication reply message to the wireless terminal,
  • the communication unit 703 receives the association request message sent by the wireless terminal; the processor 703 generates an association response message according to the association request message;
  • the communication unit 703 sends an association response message to the wireless terminal to complete the P2P connection between the configuration device 70 and the wireless terminal.
  • the configuration password information of the wireless terminal acquired by the acquirer 701 is referred to as the first configuration password information
  • the configuration password information owned by the wireless terminal itself is referred to as the second configuration password.
  • the information, the first configuration password information and the second configuration password information should be the same.
  • the type of the first configuration password information and the second configuration password information may be a PIN or a password, and may be encoded in a multi-dimensional code, stored in an NFC tag, and displayed in a string.
  • the multi-dimensional code of the wireless terminal may be a static multi-dimensional code, such as a multi-dimensional code printed by a label, or a dynamic multi-dimensional code, such as a multi-dimensional code dynamically generated by a wireless terminal; the multi-dimensional code system may be any readable code.
  • One-dimensional barcode, two-dimensional barcode system, such as UPC, QR Code, etc. The invention is not limited thereto.
  • the configuration password information of the wireless terminal can be statically stored in the NFC tag of the wireless terminal, or dynamically generated in some way and stored in the NFC tag of the wireless terminal.
  • the device identification information of the wireless terminal may be any information that can uniquely identify the wireless terminal, which is not limited in this embodiment, and may be, for example, a MAC address of the wireless terminal.
  • the acquirer 701 can also obtain configuration password information corresponding to different types of devices, such as a keyboard for receiving user input, a PBC button, an NFC interface for reading NFC tag information, and a scanner for scanning multi-dimensional code information.
  • the getters of different device types correspond to different types of configuration password information, specifically,
  • the acquirer 701 is a multi-dimensional code scanner, configured to scan the multi-dimensional code on the wireless terminal device to obtain configuration password information and device identification information of the wireless terminal.
  • the acquirer 701 is a keyboard, configured to receive configuration password information input by the user, and the configuration password information includes a PIN of the wireless terminal.
  • the communication unit 703 is further configured to: receive a configuration request message sent by the wireless terminal, where the configuration request message includes device identification information of the wireless terminal and indication information using a PIN method;
  • the configuration request message sent by the wireless terminal is received by any of the following methods:
  • the communication unit 703 receives the configuration request message sent by the wireless terminal to the configuration device 70 after receiving the beacon frame broadcasted by the configuration device 70, and sends a probe response to the wireless terminal, thereby obtaining device identification information of the wireless terminal;
  • the communication unit 703 receives the configuration request message that the wireless terminal actively sends on each channel, and sends a probe response to the wireless terminal according to the configuration request message, thereby obtaining device identification information of the wireless terminal.
  • the acquirer 701 is a PBC button, which is used to perform PBC configuration mode interaction with the wireless terminal and uses a default PIN in the interaction process (for example, "00000000" specified in the WPS specification, which is not limited herein. ) as a configuration password.
  • the process of receiving the configuration request message is the same as the receiving method of the configuration request message in the PIN mode, and is not described here.
  • the communication unit 703 is further configured to: receive a configuration request message of the wireless terminal, where the configuration request message includes device identifier information of the wireless terminal and a PBC using a button configuration.
  • Directional information for example, "00000000" specified in the WPS specification, which is not limited herein.
  • the acquirer 701 is an NFC interface, which is used to read configuration password information of the wireless terminal and device identification information of the wireless terminal.
  • the processor 702 is configured to perform verification according to the first configuration password information with the wireless terminal to determine that the wireless terminal has the second configuration password information that is the same as the first configuration password information.
  • the communication unit 703 is further configured to send the access to the wireless terminal.
  • the trust information of the AP and the device identification information of the AP so that after the verification succeeds, the wireless terminal requests access to the AP according to the credential information and the device identification information of the AP;
  • the configuration device 70 may further include a memory, configured to store first configuration password information, trust information of the wireless terminal, device identification information of the wireless terminal, and device identification information of the AP, where the memory may include a high speed RAM memory, It may also include non-volatile memory such as memory, cache, registers, disk storage, flash memory, and the like.
  • the configuration device 70 can interact with ⁇ during the initial WLAN establishment process to become a ⁇ configuration device;
  • the processor 702 can interact with the UI according to the protocol of the WPS specification to become a configuration device of the device.
  • the protocol for configuring the interaction between the device and the UI is changed in the WPS specification, the changed protocol can also be directly applied to the protocol.
  • the communication unit 703 can also be configured as a configuration device 70 that receives the user-entered configuration parameters and is used to configure other wireless terminals that need to be joined.
  • the interaction process is familiar to those skilled in the art, and is not described herein again.
  • the communication unit 703 sends the configuration trigger information to the wireless terminal by using a beacon frame or a probe response frame that broadcasts the device identification information of the wireless terminal, and is used to trigger the verification of the wireless terminal, which is not limited in this embodiment of the present invention.
  • the configuration triggering information may be any message sent by the configuration device 70 that can trigger the wireless terminal to interact with the configuration message.
  • the configuration device 70 sends a probe response to the wireless terminal according to the device identification information of the wireless terminal.
  • the message is to trigger the wireless terminal to perform subsequent configuration message interaction with the configuration device 70.
  • the invention is not limited thereto.
  • the processor 702 performs verification by using the ⁇ message and the wireless terminal according to the first configuration password information to determine that the wireless terminal has the second configuration password information that is the same as the first configuration password information, where the processor 702 can pass the wireless terminal.
  • Different verification methods are performed. The following describes the process of the three verification methods in detail. 1.
  • the processor 702 performs a 4-step handshake with the wireless terminal for two-way verification, that is, the configuration device 70 verifies that the wireless terminal owns the configuration device 70.
  • the password information is configured, and the wireless terminal also verifies that the configuration device 70 obtains its own second configuration password information.
  • the processor 702 verifies the wireless terminal in one direction, that is, the configuration device 70 verifies that the obtained first configuration password information is from the configuration process.
  • Wireless terminal 3.
  • Processor 702 and wireless terminal adopt existing The EAP authentication process in the WPS 2.0 performs two-way authentication, that is, the configuration device 70 verifies that the wireless terminal owns the first configuration password information obtained by the configuration device 70, and the wireless terminal also verifies that the configuration device 70 obtains its own second configuration password information.
  • the specific verification manners may be multiple, and any verification manner that is performed by the information interaction and the matching confirmation is applicable to the verification process described in the embodiment of the present invention.
  • the three verification methods provided by the embodiments of the present invention are only A detailed description of the verification process. The above three verification methods are described below. method one:
  • the processor 702 and the wireless terminal can generate a random value, respectively Ra and Ea; the communication unit 703 sends a message one, the message one contains Ra; and the communication unit 703 receives the message 2, the message 2 sent by the wireless terminal
  • the first MIC obtained by the Ea and the wireless terminal using the Keyl encrypted message digest is included.
  • the processor 702 generates a shared key Key2 according to the received Ea and the Ra generated by the self and the first configuration password information.
  • the manner in which the processor 702 generates the Key2 is the same as the manner in which the wireless terminal generates the Key1, and the processor 702 uses the same.
  • Key2 generates a second MIC in the same manner as the wireless terminal, and determines whether it matches the first MIC;
  • the processor 702 ends the configuration interaction process.
  • the processor 702 determines that the second configuration password information of the wireless terminal is different from the first configuration password information obtained by the configuration device 70, and generates mismatch result information
  • the communication unit. 703 sends the mismatch result information to the wireless terminal
  • the communication unit 703 receives the disconnection information sent by the wireless terminal to the configuration device 70, and ends the configuration interaction process, or the processor 702 can directly end the configuration interaction process.
  • the processor 702 If it matches, the processor 702 generates a third MIC by using the Key2 encrypted message three digest; and the communication unit 703 sends the message three to the wireless terminal; for example, if the second MIC matches the first MIC successfully, the processor 702 determines the wireless terminal.
  • the second configuration password information is the same as the first configuration password information obtained by the configuration device 70.
  • the processor 702 generates credential information for the wireless terminal to access the AP.
  • the communication unit 703 sends a message 3 to the wireless terminal, where the message 3 includes a third MIC obtained by encrypting the message 3 with the key 2 and a certificate of accessing the AP by the wireless terminal encrypted by the Key 2
  • the information and the device identification information of the AP are such that the wireless terminal side generates a fourth MIC according to Key2 to match the third MIC. It should be noted that those skilled in the art can understand that the generation time of the credential information is not specifically limited before the credential information is sent;
  • the communication unit 703 receives the matching success information sent by the wireless terminal.
  • the identification information of the AP is relatively public and does not need to be encrypted.
  • the identification information of the AP is carried in the message 3 or sent through other messages. In this embodiment, only a feasible method is provided, but it is not limited thereto.
  • the processor 702 generates the random value Ra and the credential information of the wireless terminal accessing the AP.
  • the processor 702 may encrypt the random value Ra and the credential information of the wireless terminal accessing the AP by using the first configuration password information. Get encrypted information one.
  • the communication unit 703 sends the encrypted information to the wireless terminal. It should be noted that those skilled in the art can understand that the generation time of the credential information is not specifically limited before the credential information is sent.
  • the communication unit 703 receives the encrypted message 2 sent by the wireless terminal, where the encrypted message 2 is that the wireless terminal decrypts the received encrypted information by using the second configuration password information, and passes the decrypted random value Wfl' through the second The password information is encrypted and obtained.
  • the processor 702 decrypts the received encrypted information 2 by using the first configuration password information, and matches the decrypted random value ⁇ " with the random value Ra generated by itself; if the two do not match, the processor 702 ends.
  • the interaction process is configured. Exemplarily, if Wfl "does not match Ra", the communication unit 703 sends the disconnection information to the wireless terminal, ends the configuration interaction process, or directly ends the configuration interaction process.
  • the processor 702 confirms that the matching is successful, and the communication unit 703 transmits the device identification information of the AP to the wireless terminal.
  • the device identification information of the AP may be encrypted and sent along with the credential information in the above-mentioned verification process, or the device identifier information of the AP may be sent in the clear process in the above verification process, which is not in the embodiment of the present invention. With this Limited.
  • the interaction of the verification method is based on the EAP authentication process of the message 1 to the message 8 in the existing WPS2.0 protocol, and the configuration device 70 and the wireless terminal can complete the configuration process through 8 messages (Ml to M8).
  • the Ml-M8 message is a standard message in the protocol, and the specific content is not described here.
  • the specific process is as follows:
  • the processor 702 and the wireless terminal use a dynamic key exchange algorithm to negotiate a set of temporary keys between the wireless terminal and the configuration device 70, and are used for subsequent interactive authentication messages and important data such as configuration data and credential information. Encryption to ensure the security of the configuration process;
  • the embodiment of the present invention preferably uses a DH dynamic key exchange algorithm, and does not represent that the embodiment of the present invention is limited to the dynamic key exchange algorithm.
  • the processor 702 divides the first configuration password information into the first half and the second half, and performs encryption respectively.
  • the embodiment of the present invention selects the AES algorithm for encryption, but does not mean that the embodiment of the present invention is limited to the algorithm.
  • the encrypted information in the first half is R1, the encrypted information in the second half is R2, and the encryption keys of R1 and R2 are R kl and R k2 respectively.
  • the wireless terminal divides the second configuration password information into the first half.
  • the encryption algorithm is the same as the second half and the same encryption algorithm as R1 and R2, wherein the first half of the encryption information is E1, the second half of the encryption information is E2, and the E1 and E2 encryption keys are respectively Ekl. , E k2 ,
  • the communication unit 703 receives E1 and E2 sent by the wireless terminal to the configuration device 70; and transmits the encrypted information R1, R2, and Rk1 to the wireless terminal, so that the wireless terminal can perform the first half of the second configuration password information according to Rk1.
  • the part is encrypted by the same encryption algorithm as R1 and R2. If the result of the encryption is equal to R1, the wireless terminal confirms that the first configuration password information matches the first half of the second configuration password information, and the communication unit 703 receives the E sent by the wireless terminal. Kl ;
  • the wireless terminal confirms that the first configuration password information does not match the second configuration password information, and ends the configuration interaction process.
  • the communication unit 703 receives the mismatch result sent by the wireless terminal to the configuration device 70. Information, the processor 702 generates disconnection information, the communication unit 703 sends the disconnection information to the wireless terminal, ends the configuration interaction process, or the processor 702 directly ends the configuration interaction process. D. If it is confirmed that the first configuration password information matches the first half of the second configuration password information, the communication unit 703 sends the second half of the second configuration encryption information Rk2 to the wireless terminal;
  • the processor 702 of the first half portion of the front configuration information is encrypted with the password R1, R2 in accordance with the same encryption algorithm E kl, if the result of the encryption and E 1 are equal, the password information to confirm the first configuration and the second configuration
  • the first half of the cryptographic information is matched, and the second half of the cryptographic key R k2 of the second configurable cryptographic information is sent to the wireless terminal, so that the wireless terminal can calculate the second half of the second configurable cryptographic information according to R k2 , if encrypted
  • the result is equal to R2, the wireless terminal confirms that the first configuration password information matches the second half of the second configuration password information, and sends E k2 to the configuration device 70;
  • the processor 702 confirms that the first configuration password information does not match the second configuration password information, and ends the configuration interaction process. For example, the processor 702 generates a mismatch result information, and the communication unit 703 sends the information to the wireless unit. The terminal sends the mismatch result information, the wireless terminal sends the disconnection information to the wireless terminal, ends the configuration interaction process, or the processor 702 directly ends the configuration interaction process.
  • the processor 702 If it is confirmed that the first configuration password information matches the second half of the second configuration password information, the processor 702 generates the credential information of the wireless terminal accessing the AP and the communication unit 703 sends the credential information of the wireless terminal to the AP. .
  • the process of verifying the latter part is the same as the process of verifying the first half of E1, and will not be described here.
  • the credential information may include authentication information of the wireless terminal and a key for encrypting and decrypting the communication message between the AP and the wireless terminal.
  • the three authentication methods exemplified above are applicable to the verification configuration password information as a PIN code, a password in the NFC tag, and a multi-dimensional code, which is not limited in this embodiment.
  • the interaction process between Method 1 and Method 2 is simple.
  • For example, for digital configuration password information it is necessary to have a long number of bits. . It is not convenient to input manually. Therefore, it is preferable to use the non-manual input acquisition method in practical applications, for example, reading the configuration password information in the NFC tag through the NFC interface or using the image sensor to read the configuration password information encoded in the QR Code. It can ensure that the configuration device 70 can conveniently obtain the configuration secret
  • the code information can also ensure that the configuration password information has sufficient information. And for input
  • the EAP interaction process in the existing WPS2.0 protocol that is, the third method, should be preferably used.
  • the EAP interaction process in the WPS 2.0 protocol has better security for shorter digit PIN codes.
  • the communication unit 703 may send, by using an EAP message, the credential information of the access AP and the device identification information of the AP to the wireless terminal, so that the wireless terminal according to the credential information and the device identifier of the AP
  • the information request accesses the AP; it should be noted that, the person skilled in the art can understand that the credential information and the device identification information of the AP may be sent after the verification process ends, or may be sent in the verification interaction message at the same time, or may be used as As part of the verification process, as one of the judgment conditions for the success or failure of the verification, the present invention is not limited thereto.
  • the credential information and the device identification information of the AP may be sent simultaneously or separately.
  • the communication unit 703 sends the trust information of the wireless terminal and the device identification information of the wireless terminal to the AP, so that the AP processes the request of the wireless terminal to access the AP according to the trust information of the wireless terminal and the identification information of the wireless terminal.
  • the execution time of sending the credential information to the AP and the identification information of the wireless terminal is determined according to actual configuration requirements. For example, in the home network, when both the AP and the wireless terminal are installed and powered on, the credential information and the identification information of the wireless terminal can be sent to the AP immediately; in the sensor network, a large number of sensor devices need to be configured. The sensor device is distributed after being installed, and is not convenient for post-installation configuration.
  • a configuration device 70 for configuring a wireless terminal is provided by an embodiment of the present invention.
  • the configuration of the wireless terminal is completed by configuring the direct communication between the device 70 and the wireless terminal, and the configuration process can be completed without the AP participating. Make the configuration process more flexible. It solves the problem that the prior art must be in the working state during the configuration process, and the configuration of the wireless terminal cannot be completed when the AP is in an area where the communication cannot be normally performed or when the AP is in an offline state.
  • an embodiment of the present invention provides another configuration device 70, where the configuration device 70 can be applied to a Wi-Fi network, and the Wi-Fi network can further include a wireless access device.
  • the wireless terminal wherein the configuration device 70 can be a configuration management device of the wireless access device, configured to manage the wireless network to establish, add, and delete wireless terminals; the wireless access device is an access device for the wireless terminal to enter the network, including but not
  • the AP is used as an example.
  • the wireless terminal can access the home network (local area network) through the AP, or enter the Internet, or enter the enterprise network or the industry private network (for example, the smart sensor network). , where the wireless terminal is a sensor) and so on.
  • the configuration device 70 in this embodiment may be an external registrar of the AP defined in the existing WPS 2.0 specification according to its function. It can be understood that the configuration device 70 is not limited to the existing WPS 2.0 specification. Defined external registrar.
  • the configuration device 70 may negotiate with the AP to become a configuration device of the AP during the initial WLAN establishment process;
  • the configuration device 70 can interact with the AP according to the EAP protocol of the WPS specification to become the configuration device of the AP.
  • the protocol for configuring the device to interact with the AP in the WPS specification changes, the changed protocol can also be directly applied to the present invention.
  • the configuration device 70 can also be configured as a configuration device of the AP by receiving the configuration parameter of the AP, and is used to configure other wireless terminals that need to be joined. The interaction process is familiar to those skilled in the art, and details are not described herein.
  • the configuration device 70 and the wireless terminal can perform direct communication in a direct connection manner to complete the verification of the wireless terminal by the configuration device 70.
  • the direct connection manner may include a P2P connection mode or an ad hoc connection.
  • the manner of the direct connection between the configuration device and the wireless terminal is not limited in the embodiment of the present invention.
  • the configuration device and the wireless terminal adopt a P2P connection mode.
  • the configuration device 70 is a GO in a P2P connection, and the wireless terminal is a client in a P2P connection.
  • the process of configuring the device 70 to implement a P2P connection with the wireless terminal is described in detail in the method embodiment, and details are not described herein. Referring to Figure 8, the configuration device 70 includes:
  • the obtaining unit 801 is configured to acquire device identification information and configuration password information of the wireless terminal, and transmit the device identification information of the wireless terminal to the first sending unit 802, and transmit the first configuration password information of the wireless terminal to the verification unit 803.
  • the acquisition unit 801 obtains
  • the configuration password information of the wireless terminal is referred to as the first configuration password information
  • the configuration password information owned by the wireless terminal itself is referred to as the second configuration password information
  • the first configuration password information and the second configuration password information should be the same
  • the type may be A PIN or password, which can be encoded in a multi-dimensional code, stored in an NFC tag, displayed as a string on a tag, etc.
  • the multi-dimensional code of the wireless terminal can be a static multi-dimensional code, such as a multi-dimensional code printed on a label, or a dynamic multi-dimensional code, such as The multi-dimensional code dynamically generated by the wireless terminal;
  • the multi-dimensional code system can be any one-dimensional bar code and two-dimensional bar code system that can be read, such as UPC, QR Code, and the like.
  • the configuration password information of the wireless terminal can be statically stored in the NFC tag of the wireless terminal, or dynamically generated in some way
  • the device identification information of the wireless terminal may be any information that can uniquely identify the wireless terminal, which is not limited in this embodiment.
  • it may be a MAC address of the wireless terminal.
  • the obtaining unit 801 may be configured to scan the wireless device.
  • the multi-dimensional code on the terminal device acquires configuration password information and device identification information of the wireless terminal.
  • the obtaining unit 801 may include:
  • the receiving module 901 is configured to receive a configuration request message of the wireless terminal, where the configuration request message includes the device identification information of the wireless terminal and the indication information of the PIN mode, where the configuration request message of the wireless terminal can be received by using any one of the following manners:
  • a receiving module 901 receives a configuration request message sent by the wireless terminal to the configuration device 70 after receiving the beacon frame broadcasted by the configuration device 70, and sends a probe response to the wireless terminal, thereby obtaining device identification information of the wireless terminal;
  • the receiving module 901 receives the configuration request message that the wireless terminal actively sends on each channel, and sends a probe response to the wireless terminal according to the configuration request message, thereby obtaining device identification information of the wireless terminal;
  • the PIN module 902 is configured to receive configuration password information input by the user, and the configuration password information includes a PIN of the wireless terminal.
  • the obtaining unit 801 may include:
  • the receiving mode fast 1001 is configured to receive a configuration request message of the wireless terminal, where the configuration request message includes device identification information of the wireless terminal and indication information using a PBC mode, where The process of receiving the configuration request message is the same as the receiving method of the configuration request message in the PIN mode, and is not described here;
  • the PBC module 1002 is configured to perform a PBC configuration mode interaction with the wireless terminal and use a default PIN (for example, "00000000" specified in the WPS specification, which is not limited herein) as a configuration password.
  • a default PIN for example, "00000000" specified in the WPS specification, which is not limited herein
  • the obtaining unit 801 can be configured to read configuration password information of the wireless terminal and device identification information of the wireless terminal through the NFC interface.
  • the first sending unit 802 is configured to receive, by the acquiring unit 801, device identification information of the wireless terminal, and send configuration trigger information to the wireless terminal by using the directly connected communication link according to the device identification information of the wireless terminal;
  • the first sending unit 802 may send configuration trigger information to the wireless terminal by using a manner of broadcasting a beacon frame or a probe response frame including the device identification information of the wireless terminal, to trigger verification on the wireless terminal, according to actual interaction.
  • the configuration triggering information may be any message sent by the configuration device 70 that can trigger the wireless terminal to interact with the configuration message.
  • the configuration device 70 sends a probe response message to the wireless terminal according to the device identifier information of the wireless terminal to trigger.
  • the wireless terminal performs subsequent configuration message interactions with the configuration device 70.
  • the invention is not limited thereto.
  • the verification unit 803 is configured to receive the first configuration password information from the obtaining unit 801 and verify the wireless terminal by using the directly connected communication link according to the first configuration password information, to determine that the wireless terminal has the same information as the first configuration password information.
  • the second configuration password is self-explanatory, and the verification unit 803 verifies the wireless terminal through the EAP message according to the first configuration password information.
  • the first sending unit 802 is further configured to send the credential information of the radio terminal accessing the AP and the device identifier information of the AP to the wireless terminal by using the directly connected communication link, so that after the verification succeeds, the wireless terminal according to the The credential information and the device identification information of the AP request to access the AP;
  • the first sending unit 802 sends, by using an EAP message, the credential information of the radio terminal to access the AP and the device identifier information of the AP to the wireless terminal.
  • the credential information and the device identification information of the AP can be verified.
  • the process may be performed after the process ends, or may be sent in the verification interaction message at the same time, or may be used as part of the verification process as one of the decision conditions for the success or failure of the verification, and the present invention is not limited thereto.
  • the credential information and the device identification information of the AP may be sent simultaneously or separately.
  • the second sending unit 804 is configured to receive the device identification information of the wireless terminal from the obtaining unit 801, and send the credential information of the wireless terminal and the device identifier information of the wireless terminal to the AP, so that the AP according to the credential information of the wireless terminal and the wireless
  • the device identification information of the terminal processes the request of the wireless terminal to access the AP;
  • the execution time of sending the credential information to the AP and the identification information of the wireless terminal is determined according to actual configuration requirements. For example, in the home network, when both the AP and the wireless terminal are installed and powered on, the credential information and the identification information of the wireless terminal can be sent to the AP immediately; in the sensor network, a large number of sensor devices need to be configured. The sensor device is distributed after being installed, which is inconvenient to be installed. Therefore, it needs to be configured in batches before installation. It can be executed after the verification unit 803 has completed the verification of the wireless terminal for a long time.
  • the verification unit 803 performs verification with the wireless terminal according to the first configuration password information to determine that the wireless terminal has the second configuration password information that is the same as the first configuration password information, wherein the verification unit 803 can pass different verification on the wireless terminal.
  • the method is as follows. The following describes the process of the three authentication methods in detail. 1.
  • the verification unit 803 performs a 4-step handshake with the wireless terminal to perform two-way authentication, that is, the configuration device 70 verifies that the wireless terminal owns the first configuration password information obtained by the configuration device 70.
  • the wireless terminal also verifies that the configuration device 70 obtains its own second configuration password information. 2.
  • the verification unit 803 unidirectionally verifies the wireless terminal, that is, the configuration device 70 verifies that the obtained first configuration password information is from the wireless terminal for which the configuration process is performed. 3.
  • the verification unit 803 and the wireless terminal perform the two-way verification using the EAP authentication process in the existing WPS2.0, that is, the configuration device 70 is to verify that the wireless terminal owns the first configuration password information obtained by the configuration device 70, and the wireless terminal also verifies The configuration device 70 obtains its own second configuration password information.
  • the specific verification manners may be multiple, and any verification manner that is performed by the information interaction and the matching confirmation is applicable to the verification process described in the embodiment of the present invention.
  • the three verification methods provided by the embodiments of the present invention are only A detailed description of the verification process. The above three verification methods are described below. method one:
  • the verification unit 803 and the wireless terminal can generate a random value, respectively Ra and Ea, the verification unit 803 sends a message 1, the message 1 contains Ra; and receives the message Ea sent by the wireless terminal, and the message 2 contains Ea And the first MIC obtained by the wireless terminal using the Keyl encrypted message digest.
  • the verification unit 803 generates the shared key Key2 according to the received Ea and the Ra generated by itself and the first configuration password information.
  • the verification unit 803 generates the Key2 in the same manner as the wireless terminal generates the Key1.
  • 803 uses Key2 to generate a second MIC in the same manner as the wireless terminal, and matches the first MIC;
  • the configuration interaction process ends.
  • the verification unit 803 determines that the second configuration password information of the wireless terminal is different from the first configuration password information obtained by the configuration device 70.
  • the configuration device 70 may send the mismatch result information to the wireless terminal, and receive the disconnection information sent by the wireless terminal to end the configuration interaction process, or the configuration device 70 directly ends the configuration interaction process.
  • the verification unit 803 If yes, the verification unit 803 generates a third MIC by using the Key2 encrypted message three digest; the configuration device 70 sends a message three to the wireless terminal;
  • the verification unit 803 determines that the second configuration password information of the wireless terminal is the same as the first configuration password information obtained by the configuration device 70.
  • the configuration device 70 generates the credential information of the wireless terminal to access the AP, and sends a message 3 to the wireless terminal, where the message 3 includes the third MIC obtained by encrypting the message 3 with the key 2 and the credential of the wireless terminal encrypted by the key 2 to access the AP.
  • the information and the device identification information of the AP are such that the wireless terminal side generates a fourth MIC to match the third MIC according to Key2. It should be noted that those skilled in the art can understand that the generation time of the credential information is not specifically limited before the credential information is sent;
  • the wireless terminal determines that the third MIC matches the fourth MIC, the wireless terminal sends the matching success information to the configuration device 70. If the wireless terminal determines that the third MIC does not match the fourth MIC, the configuration interaction process ends. For example, the wireless terminal sends the mismatch result information to the configuration device 70, and the configuration device 70 sends the disconnection information to the wireless terminal, ends the configuration interaction process, or directly ends the configuration interaction process.
  • the identification information of the AP is relatively public and does not need to be encrypted. For example, the identification information of the AP is in the message three, or is sent through other messages. This embodiment only provides a feasible method, but is not limited thereto. Method Two:
  • the verification unit 803 generates the random value Ra and the trust message of the wireless terminal accessing the AP.
  • the verification unit 803 can encrypt the random value Ra and the trust information of the wireless terminal accessing the AP by using the first configuration password information. Get encrypted information one.
  • the verification unit 803 sends the encrypted information to the wireless terminal. It should be noted that those skilled in the art can understand that the generation time of the credential information is not specifically limited before the credential information is sent.
  • the verification unit 803 receives the encrypted message 2 sent by the wireless terminal, where the encrypted message 2 is that the wireless terminal decrypts the received encrypted information by using the second configuration password information, and passes the decrypted random value Wfl 'through the second The password information is encrypted and obtained.
  • the verification unit 803 decrypts the received encrypted information 2 by using the first configuration password information, and matches the decrypted random value ⁇ "with the random value Ra generated by itself;
  • the configuration device 70 ends the configuration interaction process
  • the configuration device 70 sends the disconnection information to the wireless terminal, ends the configuration interaction process, or directly ends the configuration interaction process.
  • the configuration device 70 sends the device identification information of the AP to the wireless terminal.
  • the device identification information of the AP may be encrypted and sent along with the credential information in the above-mentioned verification process, or the device identifier information of the AP may be sent in the clear process in the above verification process, which is not in the embodiment of the present invention. This is limited to this.
  • Method three The interaction of the verification method is based on the EAP authentication process of the message 1 to the message 8 in the existing WPS2.0 protocol, and the configuration device 70 and the wireless terminal can complete the configuration process through 8 messages (M1 to M8).
  • the M1 - M8 message is a standard message in the protocol, and details thereof are not described herein again.
  • the specific process is as follows:
  • the verification unit 803 and the wireless terminal use a dynamic key exchange algorithm to negotiate a set of temporary keys between the wireless terminal and the configuration device 70, and are used for subsequent interactive authentication messages and important data such as configuration data and credential information. Encryption to ensure the security of the configuration process;
  • the embodiment of the present invention preferably uses a DH dynamic key exchange algorithm, and does not represent that the embodiment of the present invention is limited to the dynamic key exchange algorithm.
  • the verification unit 803 divides the first configuration password information into the first half and the second half, and performs encryption respectively.
  • the embodiment of the present invention selects the AES algorithm for encryption, but does not mean that the embodiment of the present invention is limited to the algorithm.
  • the encrypted information in the first half is R1, the encrypted information in the second half is R2, and the encryption keys of R1 and R2 are R kl and R k2 respectively.
  • the wireless terminal divides the second configuration password information into the first half.
  • the encryption algorithm is the same as the second half and the same encryption algorithm as R1 and R2, wherein the first half of the encryption information is E1, the second half of the encryption information is E2, and the E1 and E2 encryption keys are respectively Ekl. , E k2 ,
  • the verification unit 803 receives E1 and E2 sent by the wireless terminal to the configuration device 70; and transmits the encrypted information R1, R2, and Rk1 to the wireless terminal, so that the wireless terminal can perform the first half of the second configuration password information according to Rk1.
  • the part is encrypted by the same encryption algorithm as R1 and R2. If the result of the encryption is equal to R1, the wireless terminal confirms that the first configuration password information matches the first half of the second configuration password information, and the verification unit 803 receives the E sent by the wireless terminal. Kl ;
  • the wireless terminal confirms that the first configuration password information does not match the second configuration password information, and ends the configuration interaction process.
  • the configuration device 70 receives the mismatch result information sent by the wireless terminal to the wireless terminal. Send disconnection information, end the configuration interaction process, or directly end the configuration interaction process.
  • the verification unit 803 confirms that the first configuration password information matches the first half of the second configuration password information, the second half of the second configuration password information is sent to the second encryption key R k2 . Sent to the wireless terminal;
  • the verification unit 803 to encrypt the Rl, R2 in accordance with the same encryption algorithm E k ⁇ front half portion of a first configuration password information, if the result of the encryption and E 1 are equal, the password information to confirm the first configuration and the second configuration the first half of the matching password information, and transmits the second half of the encryption key configuration R k2 second password information to the wireless terminal, so that the wireless terminal to the second configuration in accordance with R k2 to the password information in the latter half of the R1, R2
  • the same encryption algorithm performs encryption. If the result of the encryption is equal to R2, the wireless terminal confirms that the first configuration password information matches the second half of the second configuration password information, and sends E k2 to the configuration device 70;
  • the verification unit 803 confirms that the first configuration password information does not match the second configuration password information, and ends the configuration interaction process.
  • the configuration device 70 may send the mismatch result information to the wireless terminal, and the wireless The terminal sends the disconnection information to the wireless terminal, ends the configuration interaction process, or directly ends the configuration interaction process.
  • the configuration device 70 If the verification unit 803 confirms that the first configuration password information matches the second half of the second configuration password information, the configuration device 70 generates the trust information of the wireless terminal to access the AP and sends the information to the wireless terminal.
  • the process of verifying the latter part is the same as the process of verifying the first half of E1, and will not be described here.
  • the credential information may include authentication information of the wireless terminal and a key for encrypting and decrypting the communication message between the AP and the wireless terminal.
  • the three authentication methods exemplified above are applicable to the verification configuration password information as a PIN code, a password in the NFC tag, and a multi-dimensional code, which is not limited in this embodiment.
  • the interaction process between Method 1 and Method 2 is simple.
  • a configuration device 70 for configuring a wireless terminal is provided by an embodiment of the present invention.
  • the configuration of the wireless terminal is completed by configuring the direct communication between the device 70 and the wireless terminal, and the configuration process can complete the configuration of the wireless terminal without AP participation. Make the configuration process more flexible. The problem that the prior art must be in the working state during the configuration process is solved, and the configuration of the wireless terminal cannot be completed when the AP is in an area where the communication cannot be normally performed or the AP is in an offline state.
  • an embodiment of the present invention provides a wireless terminal 110, which is shown in FIG. 11, and includes:
  • the communication unit 1 101 communicates with the external network element through the directly connected communication link; for example, the communication unit 1101 communicates with the external network element through the directly connected communication link, and may include a P2P connection link or an ad hoc connection.
  • the link is not limited to the embodiment of the present invention.
  • the preferred embodiment of the present invention communicates with the external network element through the P2P connection link.
  • the wireless terminal 10 is a client in the P2P connection, and the configuration device is a GO in the P2P connection. Further, the communication unit 1101 can also be used,
  • the association response message sent by the 110 completes the P2P connection between the wireless terminal 110 and the configuration device. It should be noted that the authentication and association process is designed according to the existing IEEE802.1 1 -2012 protocol.
  • the communication unit 1101 is configured to receive configuration trigger information that is sent by the configuration device according to the device identification information of the wireless terminal 1 10;
  • the device identification information of the wireless terminal 1 10 is acquired by the configuration device; the configuration trigger information is sent by the configuration device to the wireless terminal 110 by the probe response frame or the beacon frame.
  • the processor 1102 is configured to perform verification with the configuration device, so that the configuration device determines that the wireless terminal 110 has configuration password information,
  • the configuration password information is obtained by the configuration device; the wireless terminal 110 performs the verification communication unit 1101 with the configuration device by using the EAP message, and is further configured to receive the trust information of the wireless terminal 110 that accesses the AP sent by the configuration device, and The identification information of the AP, so that after the wireless terminal 10 and the configuration device are successfully authenticated, the wireless terminal 110 requests access to the AP according to the credential information and the device identification information of the AP.
  • the configuration device sends the credential information of the AP to the AP and the identification information of the AP through the EAP message.
  • the credential information and the device identification information of the AP may be received after the verification process ends, or may be received in the verification interaction message at the same time, or may be used as part of the verification process.
  • One of the judgment conditions for verifying the success or failure the present invention is not limited thereto.
  • the credential information and the device identification information of the AP may be received simultaneously or separately.
  • the configuration password information of the wireless terminal 110 acquired by the configuration device is referred to as the first configuration password information
  • the configuration password information owned by the wireless terminal 110 is referred to as the second.
  • the configuration password information, the first configuration password information and the second configuration password information should be the same, the type can be a PIN or a password, can be encoded in a multi-dimensional code, stored in an NFC tag, displayed in a string as a tag, etc., for example, the wireless terminal 110
  • the multi-dimensional code can be a static multi-dimensional code, such as a multi-dimensional code printed by a label, or a dynamic multi-dimensional code, such as a multi-dimensional code dynamically generated by the wireless terminal 1 10; the multi-dimensional code system can be any one-dimensional bar code, two-dimensional bar code that can be read.
  • the configuration password information of the wireless terminal 1 may be statically stored in the NFC tag of the wireless terminal 110, or dynamically generated in some way and stored in the NFC tag of the wireless terminal 110.
  • the device identification information of the wireless terminal 110 may be any information that can uniquely identify the wireless terminal 110, which is not limited in this embodiment. For example, it may be the MAC address of the wireless terminal 110.
  • the communication unit 1101 is configured to send, by using, a beacon frame to the configuration device.
  • the configuration request message may include the device identification information of the wireless terminal 1 10 and the indication information using the personal identification code PIN mode, so that the configuration device receives the configuration password information input by the user according to the configuration request message, and the configuration password information includes the wireless information.
  • the PIN of the terminal 110, or the configuration request message includes the device identification information of the wireless terminal 110 and the indication information of the PBC mode configured by using the button; so that the configuration device interacts with the wireless terminal 10 in a PBC configuration mode and uses in the interaction process.
  • the default PIN is used as the configuration password information.
  • the communication unit 1101 can send a configuration request message to the configuration device in any of the following ways:
  • the communication unit 1101 sends a configuration request message to the configuration device after receiving the beacon frame broadcasted by the device;
  • the communication unit 1101 actively sends a configuration request message on each channel.
  • the processor 1 102 performs verification with the configuration device, so that the configuration device determines that the wireless terminal 110 has configuration password information, where the processor 1102 can perform verification with the configuration device by using different verification methods, which will be described in detail below.
  • the process of the verification method it should be noted that the specific verification manner may be various, and any verification manner that is performed through the information interaction and the matching confirmation is applicable to the verification process described in the embodiment of the present invention.
  • the three verification methods are just a detailed description of the verification process.
  • the processor 1 102 and the configuration device may both generate a random value, respectively Ea and Ra, the communication unit 1101 receives the message one sent by the configuration device, the message one contains Ra; and the communication unit 1 101 sends a message to the configuration device.
  • the message 2 includes Ea and the first MIC obtained by encrypting the message di digest with Key1, so that the configuration device generates the shared key Key2 in the same manner as the wireless terminal 1 10 generates Key1, and uses Key2 to communicate with the wireless terminal 110.
  • the second MIC is generated in the same way and matched to the first MIC.
  • the communication unit 1101 receives the mismatch result information sent by the configuration device, and the communication unit 1101 sends the disconnection information to the configuration device, ends the configuration interaction process, or the processor 1 102 directly ends the configuration. Interaction Process.
  • the communication unit 1 101 receives the message 3 sent by the configuration device, where the message 3 includes the third MIC obtained by encrypting the message 3 with the key 2 and the trust information of the AP accessed by the wireless terminal 110 encrypted by the key 2 and the AP.
  • Device identification information It should be noted that those skilled in the art can understand that the generation time of the credential information is not specifically limited before the credential information is sent;
  • the processor 1102 generates a fourth MIC according to the message three, and matches the third MIC. If the match is matched, the communication unit 1101 sends a matching success message to the configuration device. If there is no match, the configuration interaction process is ended. For example, the communication unit 1 101 sends the mismatch result information to the configuration device, the configuration device sends the disconnection information to the wireless terminal 110, ends the configuration interaction process, or the processor 1102 directly ends the configuration interaction. process. It should be noted that those skilled in the art can understand that the identification information of the AP is relatively public and does not need to be encrypted. For example, the identification information of the AP is carried in the message 3 or sent through other messages. In this embodiment, only a feasible method is provided, but it is not limited thereto. Method Two:
  • the communication unit 1101 receives the encrypted information 1 sent by the configuration device, where the encrypted information is obtained by the configuration device encrypting the random value Ra and the trust information of the wireless terminal 1 10 accessing the AP by using the first configuration password information. It should be noted that those skilled in the art can understand that the generation time of the credential information is not specifically limited before the credential information is sent.
  • the communication unit 1 101 sends an encrypted message 2 to the configuration device.
  • the processor 1102 decrypts the received encrypted information by using the second configuration password information to obtain the decrypted random value ⁇ ', and then encrypts the second encrypted password information to obtain the encrypted message 2.
  • the configuration device decrypts the encrypted information according to the first configuration password information, obtains the decrypted random value ⁇ ", and matches Wfl" with Ra;
  • the configuration interaction process ends.
  • the configuration device may send the mismatch result information to the wireless terminal 110, and the wireless terminal 110 sends the disconnection to the configuration device.
  • the configuration process ends the configuration interaction process, or the configuration device directly ends the configuration interaction process; if it matches, the configuration device sends the device identification information of the AP to the wireless terminal 110.
  • the device identification information of the AP may be encrypted and sent along with the credential information in the above-mentioned verification process, or the device identification information of the AP may be sent in the clear process in the above verification process, which is not in the embodiment of the present invention. This is limited to this.
  • the interaction of the verification method is based on the EAP authentication process of Message 1 to Message 8 in the existing WPS 2.0 protocol, and the configuration device and the wireless terminal 110 can complete the configuration process through 8 messages (Ml ⁇ M8).
  • the Ml-M8 message is a standard message in the protocol, and the specific content thereof is not described here.
  • the specific process is as follows:
  • the processor 1102 and the configuration device use a dynamic key exchange algorithm to negotiate a set of temporary keys between the wireless terminal 110 and the configuration device, and are used for subsequent interactive authentication messages and important data such as configuration data and credential information. Encryption to ensure the security of the configuration process;
  • the embodiment of the present invention preferably uses a DH dynamic key exchange algorithm, and does not represent that the embodiment of the present invention is limited to the dynamic key exchange algorithm.
  • the processor 1102 divides the second configuration cipher information into the first half and the second half, and performs encryption respectively.
  • the embodiment of the present invention selects the AES algorithm for encryption, but does not mean that the embodiment of the present invention is limited to the algorithm.
  • the first half of the encrypted information is E1
  • the second half of the encrypted information is E2
  • the E1 and E2 encryption keys are E kl , E k2 , respectively
  • the communication unit 1101 is instructed to send El and E2 to the configuration device, correspondingly
  • the configuration device also divides the first configuration password information into the first half and the second half and encrypts the same encryption algorithm as E1 and E2, wherein the first half of the encryption information is R1, and the second half of the encryption information is R2, R1.
  • the encryption keys with R2 are R kl , R k2 , respectively.
  • the communication means 1101 receives configuration sent by Rl, R2 and R kl, according to R kl for the first half of the second configuration password information is encrypted with the El, the same encryption algorithm E2, are equal if the encrypted result with R1, the The wireless terminal 110 confirms that the first configuration password information matches the first half of the second configuration password information, and the communication unit 1101 transmits E k1 to the configuration device. If the result of the encryption is not equal to R1, the processor 1102 confirms that the first configuration password information does not match the second configuration password information, and ends the configuration interaction process. For example, the communication unit 1101 sends the mismatch result information to the configuration device, and receives the The disconnection information sent by the device is configured to end the configuration interaction process, or the processor 1 102 directly ends the configuration interaction process.
  • the configuration device determines whether the first configuration password information matches the first half of the second configuration password information.
  • the configuration device sends R k2 to the wireless terminal 110,
  • the configuration interaction process is ended.
  • the configuration device sends the mismatch result information to the wireless terminal 110, and the wireless terminal 110 sends the disconnection information to the configuration device, ends the configuration interaction process, or directly ends the configuration interaction process.
  • the communication unit 1101 receives R k2 sent by the configuration device, and the processor 1 102 determines, according to R k2 , whether the first configuration password information matches the second half of the second configuration password information.
  • the communication unit 1 101 sends E k2 to the configuration device,
  • the configuration interaction process is ended.
  • the communication unit 1 101 sends the mismatch result information to the configuration device, and receives the disconnection information sent by the configuration device, ends the configuration interaction process, or directly ends the configuration interaction process.
  • the configuration device determines whether the first configuration password information matches the second half of the second configuration password information.
  • the configuration device sends the wireless terminal 110 the credential information of the wireless terminal 110 to access the AP.
  • the credential information may include the authentication information of the wireless terminal 110, and the communication message between the AP and the wireless terminal 110. The key to encrypt and decrypt.
  • the configuration device sends the mismatch result information to the wireless terminal 110, and the wireless terminal 110 sends the disconnection information to the configuration device, ends the configuration interaction process, or directly ends the configuration interaction process.
  • the three authentication methods exemplified above are applicable to the verification configuration password information as a PIN code, a password in the NFC tag, and a multi-dimensional code, which is not limited in this embodiment.
  • the interaction process between Method 1 and Method 2 is simple, and it is necessary to ensure information transmission. For the security of the input, it is necessary to configure the password information to have a large amount of information. For example, for the digital configuration password information, it is necessary to have a long number of bits.
  • the non-manual input acquisition method in practical applications, for example, reading the configuration password information in the NFC tag through the NFC interface or using the image sensor to read the configuration password information encoded in the QR Code. It can ensure that the configuration device can easily obtain the configuration password information, and can ensure that the configuration password information has sufficient information.
  • the EAP interaction process in the existing WPS2.0 protocol that is, the third method, should preferably be adopted. Those skilled in the art can understand that the EAP interaction process in the WPS2.0 protocol has better security for a shorter digit PIN code.
  • a wireless terminal 110 for configuring a wireless terminal is provided by an embodiment of the present invention.
  • the configuration of the wireless terminal 110 is completed by direct communication between the wireless terminal 110 and the configuration device, and the configuration process can complete the configuration of the wireless terminal 110 without AP participation. Make the configuration process more flexible.
  • the problem that the prior art must be in the working state during the configuration process is solved, and the configuration of the wireless terminal 1 10 cannot be completed when the AP is in an area where the communication cannot be normally performed or the AP is in an offline state.
  • the embodiment of the present invention provides a wireless terminal 1 10, and the wireless terminal 110 and the configuration device can perform direct communication in a direct connection manner to complete verification with the configuration device, where the direct connection manner may include The P2P connection mode or the ad hoc connection mode does not limit the manner in which the wireless terminal directly connects to the configuration device.
  • the configuration device and the wireless terminal adopt a P2P connection mode.
  • the wireless terminal 1 10 is a client in a P2P connection
  • the configuration device is a GO in a P2P connection. The process of implementing the P2P connection is described in detail in the method embodiment, and is not described here.
  • the wireless terminal 110 includes:
  • the receiving unit 1201 is configured to receive, by using a directly connected communication link, configuration trigger information that is sent by the configuration device according to the device identifier information of the wireless terminal 110, where
  • the device identification information of the wireless terminal 1 10 is acquired by the configuration device; the configuration device may send the configuration trigger message to the wireless terminal 110 through the beacon frame or the probe response frame.
  • the verification unit 1202 is configured to perform verification by using the directly connected communication link and the configuration device, so that the configuration device determines that the wireless terminal 110 has configuration password information,
  • the configuration password information is obtained by the configuration device.
  • the verification unit 1202 can perform the verification with the configuration device by using an EAP message.
  • the configuration of the wireless terminal 110 acquired by the configuration device is configured in this embodiment.
  • the password information is referred to as the first configuration password information
  • the configuration password information owned by the wireless terminal 10 itself is referred to as the second configuration password information.
  • the first configuration password information and the second configuration password information should be the same, and the type may be a PIN or a password.
  • the multi-dimensional code of the wireless terminal 110 can be a static multi-dimensional code, such as a multi-dimensional code printed by a label, or a dynamic multi-dimensional code, such as by a wireless terminal.
  • 1 10 dynamically generated multi-dimensional code; multi-dimensional code system can be any one-dimensional bar code, two-dimensional bar code system, such as UPC, QR Code and so on. The invention is not limited thereto.
  • the configuration password information of the wireless terminal 1 may be statically stored in the NFC tag of the wireless terminal 110, or dynamically generated in some way and stored in the NFC tag of the wireless terminal 110.
  • the device identification information of the wireless terminal 1 may be any information that can uniquely identify the wireless terminal 110, which is not limited in this embodiment. For example, it may be the MAC address of the wireless terminal 110.
  • the receiving unit 1201 is further configured to: receive, by using a directly connected communication link, the credential information of the AP that is sent by the configuration device to access the AP and the identifier information of the AP, so that after the wireless terminal 110 and the configuration device verify the success, the wireless terminal 110 requests access to the AP according to the credential information and the device identification information of the AP.
  • the receiving unit 1201 may receive the credential information of the accessing the AP and the identifier information of the AP by using the EAP message, and the identifier information of the AP may be understood by those skilled in the art. Receiving after the end of the verification process may also be performed in the verification interaction message, or as part of the verification process, as one of the determination conditions for the success or failure of the verification, the present invention is not limited thereto. In addition, the credential information and the device identification information of the AP may be received simultaneously or separately.
  • the wireless terminal 110 further includes a sending unit 1203, Sending a configuration request message to the configuration device, where the configuration request message includes device identification information of the wireless terminal 110 and indication information using a personal identification code PIN mode, so that the configuration device receives the user input according to the configuration request message.
  • Configuring the password information, the configuration password information includes the PIN of the wireless terminal 110; or, the configuration request message includes the device identification information of the wireless terminal 110 and the indication information using the PBC mode; so that the configuration device performs PBC configuration with the wireless terminal 110.
  • the way the interaction interacts and uses the default PIN as the configuration password information during the interaction.
  • the sending unit 1203 may send a configuration request message to the configuration device in any of the following manners:
  • the sending unit 1203 sends a configuration request message to the configuration device after receiving the beacon frame broadcasted by the device;
  • the verification unit 1202 performs verification with the configuration device, and the verification unit 1202 can perform verification by using different verification methods and the configuration device.
  • the following describes the process of the three verification methods in detail. It should be noted that the specific verification method may have The authentication method described in the embodiment of the present invention is only applicable to the verification process described in the embodiment of the present invention. The three verification modes provided by the embodiments of the present invention are only a detailed description of the verification process.
  • the verification unit 1202 and the configuration device may both generate a random value, respectively Ea and Ra, the verification unit 1202 receives the message one sent by the configuration device, and the message one includes Ra; and instructs the communication unit 1101 to send the message to the configuration device.
  • the message 2 includes Ea and the first MIC obtained by encrypting the message digest with Key1, so that the configuration device generates the shared key Key2 in the same manner as the wireless terminal 110 generates the Key1, and uses the Key2 to be the same as the wireless terminal 1 10 The way to generate a second MIC and match the first MIC.
  • the verification unit 1202 receives the mismatch result information sent by the configuration device, and sends the disconnection information to the configuration device, ends the configuration interaction process, or directly ends the configuration interaction process. If the matching is performed, the verification unit 1202 receives the message 3 sent by the configuration device, where the message 3 includes the third MIC obtained by encrypting the message 3 with the key 2 and the trust information and the AP of the wireless terminal 1 10 0 encrypted by the Key 2 accessing the AP. Device identification information; It should be noted that those skilled in the art can understand that the generation time of the credential information is not specifically limited before the credential information is sent;
  • the verification unit 1202 generates a fourth MIC according to the message three and matches the third MIC.
  • the verification unit 1202 sends a match success message to the configuration device.
  • the wireless terminal 1 10 sends the mismatch result information to the configuration device, and receives the disconnection information sent by the configuration device, ends the configuration interaction process, or directly ends the configuration interaction process.
  • the identification information of the AP is relatively public and does not need to be encrypted.
  • the identification information of the AP is carried in the message 3 or sent through other messages. In this embodiment, only a feasible method is provided, but it is not limited thereto.
  • the verification unit 1202 receives the encrypted information sent by the configuration device.
  • the encrypted information is encrypted by the configuration device by using the first configuration password information by the configuration device to store the random value Ra and the trust information of the wireless terminal 1 1 into the AP. It should be noted that it should be understood by those skilled in the art that the generation time of the credential information is not specifically limited before the credential information is transmitted.
  • the verification unit 1202 sends an encrypted message to the configuration device.
  • the verification unit 1202 decrypts the received encrypted information by using the second configuration password to obtain the decrypted random value R i , and then encrypts the decrypted random value ⁇ ' by the second configuration password information. Encrypt message two.
  • the configuration device decrypts the encrypted information 2 according to the first configuration password information, obtains the decrypted random value ⁇ " , and matches Wfl with Ra;
  • the configuration interaction process ends.
  • the configuration device may send the mismatch result information to the wireless terminal 110, and the wireless terminal 110 sends the disconnection to the configuration device.
  • the configuration process ends the configuration interaction process, or the configuration device directly ends the configuration interaction process; if it matches, the configuration device sends the device identification information of the AP to the wireless terminal 110.
  • the interaction of the verification method is based on the EAP authentication process of the message 1 to the message 8 in the existing WPS2.0 protocol, and the configuration device and the wireless terminal can complete the configuration process through 8 messages (Ml ⁇ M8).
  • the M1-M8 message is a standard message in the protocol, and the specific content is not described here.
  • the specific process is as follows:
  • the verification unit 1202 and the configuration device use a dynamic key exchange algorithm to negotiate a set of temporary keys between the wireless terminal 110 and the configuration device, and are used for subsequent interactive authentication messages and important data such as configuration data and credential information. Encryption to ensure the security of the configuration process;
  • the embodiment of the present invention preferably uses a DH dynamic key exchange algorithm, and does not represent that the embodiment of the present invention is limited to the dynamic key exchange algorithm.
  • the verification unit 1202 divides the second configuration password information into the first half and the second half and performs encryption optimization.
  • the embodiment of the present invention selects the AES algorithm for encryption, but does not mean that the embodiment of the present invention is limited to the algorithm.
  • the first half of the encrypted information is E1
  • the second half of the encrypted information is E2
  • the E1 and E2 encryption keys are E kl , E k2 , respectively
  • the El and E2 are sent to the configuration device, correspondingly, the configuration device will also be
  • a configuration password information is divided into the first half and the second half and is encrypted by the same encryption algorithm as El and E2, wherein the first half of the encrypted information is R1, and the second half of the encrypted information is R2, and the encryption of R1 and R2 is encrypted.
  • the keys are R kl , R k2 , respectively.
  • the verification unit 1202 receives R1, R2, and Rk1 sent by the configuration device, and encrypts the same encryption algorithm as the first part of the second configuration password information with El and E2 according to Rkl . If the result of the encryption is equal to R1, the wireless The terminal 110 confirms that the first configuration password information matches the first half of the second configuration password information, and the verification unit 1202 transmits E k1 to the configuration device.
  • the verification unit 1202 confirms that the first configuration password information does not match the second configuration password information, and ends the configuration interaction process.
  • the wireless terminal 110 sends the mismatch result information to the configuration device, and receives the Configure the disconnection information sent by the device, end the configuration interaction process, or directly end the configuration interaction process.
  • the configuration device determines whether the first configuration password information matches the first half of the second configuration password information.
  • the configuration device sends R k2 to the wireless terminal 110,
  • the configuration interaction process is ended.
  • the configuration device sends the mismatch result information to the wireless terminal 110, and the wireless terminal 110 sends the disconnection information to the configuration device, ends the configuration interaction process, or directly ends the configuration interaction process.
  • the wireless terminal 110 receives R k2 sent by the configuration device, and the verification unit 1202 determines, according to R k2, whether the first configuration password information matches the second half of the second configuration password information.
  • the verification unit 1202 sends E k2 to the configuration device,
  • the configuration interaction process is ended.
  • the wireless terminal 1 10 sends the mismatch result information to the configuration device, and receives the disconnection information sent by the configuration device, ends the configuration interaction process, or directly ends the configuration interaction process.
  • the configuration device determines whether the first configuration password information matches the second half of the second configuration password information.
  • the configuration device sends the wireless terminal 110 the credential information of the wireless terminal 110 to access the AP.
  • the credential information may include the authentication information of the wireless terminal 110, and the communication message between the AP and the wireless terminal 110. The key to encrypt and decrypt.
  • the configuration device sends the mismatch result information to the wireless terminal 110, and the wireless terminal 110 sends the disconnection information to the configuration device, ends the configuration interaction process, or directly ends the configuration interaction process.
  • the three authentication methods exemplified above are applicable to the verification configuration password information as a PIN code, a password in the NFC tag, and a multi-dimensional code, which is not limited in this embodiment.
  • the interaction process between Method 1 and Method 2 is simple. To ensure the security of information transmission, it is necessary to configure the password information to have a large amount of information. For example, for digital configuration password information, it is necessary to have a long number of bits. . It is not convenient to input manually.
  • the non-manual input acquisition method in practical applications, for example, reading the configuration password information in the NFC tag through the NFC interface or using the image sensor to read the configuration password information encoded in the QR Code.
  • the configuration device can easily obtain the configuration password Interest, but also to ensure that the configuration password information has enough information.
  • the EAP interaction process in the existing WPS2.0 protocol that is, the third method, should preferably be adopted.
  • the EAP interaction process in the WPS2.0 protocol has better security for a shorter digit PIN code.
  • a wireless terminal 110 for configuring a wireless terminal is provided by an embodiment of the present invention.
  • the configuration of the wireless terminal 110 is completed by direct communication between the wireless terminal 110 and the configuration device, and the configuration process can complete the configuration of the wireless terminal 110 without AP participation. Make the configuration process more flexible.
  • the problem that the prior art must be in the working state during the configuration process is solved, and the configuration of the wireless terminal 1 10 cannot be completed when the AP is in an area where the communication cannot be normally performed or the AP is in an offline state.
  • an embodiment of the present invention provides a system for configuring a wireless terminal.
  • the system may include: the configuration device 70 of any of the foregoing embodiments, and the wireless terminal 110 of any of the foregoing embodiments.
  • the system may further include
  • the wireless access device 150 is configured to receive the credential information of the wireless terminal 110 and the identifier information of the wireless terminal 110 sent by the configuration device 70, and the wireless terminal 1 according to the credential information of the wireless terminal 110 and the identification information of the wireless terminal 110. 10 requests to access the wireless access device for processing.
  • a system for configuring a wireless terminal is provided by the embodiment of the present invention, and the configuration of the wireless terminal 110 is completed by configuring the direct communication between the device 70 and the wireless terminal 110, so that the configuration process can complete the wireless terminal without the participation of the wireless access device 150. 1 10 configuration. Make the configuration process more flexible. The problem that the prior art must be in the working state during the configuration process is solved, and the configuration of the wireless terminal 70 cannot be completed when the wireless access device 150 is in an area where the communication is not normally performed or the wireless access device 150 is in an offline state.
  • the disclosed system, apparatus, and method may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored, or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may be physically included separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of hardware plus software functional units.
  • the above-described integrated unit implemented in the form of a software functional unit can be stored in a computer readable storage medium.
  • the above software functional units are stored in a storage medium and include instructions for causing a computer device (which may be a personal computer, server, or network device, etc.) to perform some of the steps of the methods described in various embodiments of the present invention.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a disk or an optical disk, and the like, which can store program codes. Medium.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

本发明实施例公开了一种配置无线终端的方法、设备及系统,涉及通信领域。通过配置设备与无线终端的直接通信完成对无线终端的配置,实现配置过程无需无线接入设备AP参与,使得配置过程更加灵活。解决了现有技术在AP处于不能正常通信的区域或者处于离线状态时不能完成对无线终端的配置的问题。本发明实施例提供的方法包括:配置设备获取无线终端的设备标识信息和配置密码信息;配置设备根据所述无线终端的设备标识信息向无线终端发送配置触发信息;配置设备根据配置密码信息与无线终端进行验证;配置设备向无线终端发送无线终端接入AP的信任状信息和AP的设备标识信息;配置设备向AP发送信任状信息和无线终端的设备标识信息。

Description

一种配置无线终端的方法、 设备及系统 技术领域
本发明涉及通信领域, 尤其涉及一种配置无线终端的方法、 设备及系 统。 背景技术
无线保真 ( Wireless Fidelity, 简称 Wi-Fi ) 具有部署快速、 使用 便利和传输速率高等优势, 被广泛应用于各个行业。 但是 Wi-Fi网络 的安全设置复杂, 使得很多无线网络的用户没有配置任何的安全参 数, 网络很容易遭到攻击。 为了使得用户安全便捷的使用无线网络, Wi-Fi联盟推出了 Wi-Fi安全设置( Wi-Fi Protected Setup , 简称 WPS ) 规范, 又称 Wi-Fi简单配置( Wi-Fi Simple Configuration , 简称 WSC ) , 对接入的无线终端进行安全配置, 使得对无线设置和安全没有太多了 解的用户也可以简单方便地设置安全的 WLAN , 方便安全地向网络中 添力口设备。
WPS规范中定义了一个称为注册器( Registrar )的实体来完成对 无线终端的配置。 注册器可以内置于无线接入设备, 也可以外置于无 线接入设备, 外置的注册器可以称其为配置设备。 对于使用外置配置 设备的情况, 在现有技术对无线终端进行配置过程中, 无线终端需要 通过无线接入设备来转发相应的请求至配置设备, 而配置设备也需要 通过无线接入设备来转发相应的响应至无线终端, 因此三者在配置的 过程中都必须处于工作状态, 在无线接入设备处于不能与无线终端正 常通信的区域或者无线接入设备处于离线状态时不能完成对无线终 端的配置, 使得配置无线终端的过程缺乏灵活性。 发明内容
本发明的实施例提供一种配置无线终端的方法、 设备及系统。 通过配 置设备与无线终端的直接通信完成对无线终端的配置, 实现配置过程无需 无线接入设备参与也能完成对无线终端的配置。 为达到上述目的, 本发明的实施例采用如下技术方案: 第一方面, 本发明实施例提供了一种配置无线终端的方法, 其中, 配 置设备与无线终端之间直接连接, 该方法包括:
所述配置设备获取所述无线终端的设备标识信息和配置密码信 自 ·
所述配置设备根据所述无线终端的设备标识信息向所述无线终 端发送配置触发信息;
所述配置设备根据所述配置密码信息与所述无线终端进行验证, 以确定所述无线终端拥有所述配置密码信息;
所述配置设备向所述无线终端发送所述无线终端接入无线接入 设备的信任状信息和所述无线接入设备的设备标识信息, 以使得在验 证成功后, 所述无线终端根据所述信任状信息和所述无线接入设备的 设备标识信 , 请求接入所述无线接入设备;
所述配置设备向所述无线接入设备发送所述信任状信息和所述 无线终端的设备标识信息, 以使得所述无线接入设备根据所述信任状 信息和所述无线终端的设备标识信息对所述无线终端接入所述无线 接入设备的请求进行处理。
在第一种可能的实现方式中, 结合第一方面, 所述配置设备获取所 述无线终端的设备标识信息和配置密码信息, 包括,
所述配置设备通过扫描所述无线终端设备的多维码获取所述配 置密码信息以及所述无线终端的设备标识信息。
在第二种可能的实现方式中, 结合第一方面, 所述配置设备获取无 线终端的设备标识信息和配置密码信息, 包括,
所述配置设备接收所述无线终端发送的配置请求信息,所述配置 请求信息包括所述无线终端的设备标识信息和使用个人身份识另 'J码
( Personal Identification Number , 简称 PIN ) 方式的指示信息;
所述配置设备接收用户输入的所述配置密码信息, 所述配置密码 信息包括所述无线终端的 PIN。
在第三种可能的实现方式中, 结合第一方面, 所述配置设备获取无 线终端的设备标识信息和配置密码信息, 包括,
所述配置设备接收所述无线终端发送的配置请求信息,所述配置 请求信息包括所述无线终端的设备标识信息和使用按钮配置 ( Push Button Control , 简称 PBC ) 方式的指示信息;
所述配置设备通过与无线终端进行 PBC 配置方式的交互并在交 互过程中使用缺省的 PIN作为配置密码信息。
在第四种可能的实现方式中, 结合第一方面, 所述配置设备获取无 线终端的设备标识信息和配置密码信息, 包括,
所述配置设备通过近场通信 (Near Field Communication , 简称 NFC )接口读取所述无线终端的配置密码信息以及所述无线终端的设 备标识信息。
在第五种可能的实现方式中, 结合第一方面、 第一种至第四种可 能的实现方式中的任一项, 所述配置设备与所述无线终端之间直接连 接的方式包括临时网络 ad hoc连接。
在第六种可能的实现方式中, 结合第一方面、 第一种至第四种可 能的实现方式中的任一项, 所述直接连接的方式包括点对点 ( Peer to Peer, 简称 P2P ) 连接。
在第七种可能的实现方式中, 结合第六种可能的实现方式, 所述 配置设备根据所述无线终端的设备标识信息向所述无线终端发送配 置触发信息包括,
所述配置设备根据所述无线终端的设备标识信息通过探测响应 帧或者信标帧向所述无线终端发送配置触发信息。
在第八种可能的实现方式中,结合第六种或者第七种可能的实现 方式中的任一项, 所述配置设备根据所述配置密码信息与所述无线终 端进行验证包括, 所述配置设备根据所述配置密码信息通过扩展认证协议 ( Extensible Authentication Protocol , 简称 EAP ) 消息与所述无线终 端进行验证。
在第九种可能的实现方式中,结合第六种至第八种可能的实现方 式中的任一项, 所述配置设备向所述无线终端发送所述无线终端接入 无线接入设备的信任状信息和所述无线接入设备的设备标识信息包 括, 所述配置设备通过所述 EAP 消息向所述无线终端发送所述无线 终端接入无线接入设备的信任状信息和所述无线接入设备的设备标 识信息。
第二方面, 本发明实施例提供了一种配置无线终端的方法, 其中, 无 线终端与配置设备之间直接连接, 该方法包括:
所述无线终端接收所述配置设备根据所述无线终端的设备标识 信息发送的配置触发信息;
所述无线终端与所述配置设备进行验证, 以使得所述配置设备确 定所述无线终端拥有配置密码信息;
所述无线终端接收所述配置设备发送的所述无线终端接入无线 接入设备的信任状信 , 以及所述无线接入设备的标识信息, 以使得在 验证成功后, 所述无线终端根据所述信任状信息和所述无线接入设备 的设备标识信息请求接入所述无线接入设备。 在第一种可能的实现方式中, 结合第二方面, 在所述无线终端接收 所述配置设备根据所述无线终端的设备标识信息发送的配置触发信 息之前, 所述方法还包括: 所述无线终端向所述配置设备发送配置请求消息,所述配置请求 消息包括所述无线终端的设备标识信息和使用 PIN方式的指示信息, 以使得所述配置设备根据所述配置请求消息接收用户输入的所述配 置密码信息, 所述配置密码信息包括所述无线终端的 PIN。
在第二种可能的实现方式中, 结合第二方面, 在所述无线终端接收 配置设备根据所述无线终端的设备标识信息发送的配置触发信息之 前, 所述方法还包括: 所述无线终端向所述配置设备发送配置请求消息,所述配置请求 消息包括所述无线终端的设备标识信息和使用 PBC方式的指示信息; 以使得所述配置设备通过与无线终端进行 PBC 配置方式的交互并在 交互过程中使用缺省的 PIN作为配置密码信息。
在第三种可能的实现方式中, 结合第二方面, 第一种或第二种可 能的实现方式中的任一项, 所述直接连接方式包括 ad hoc连接。
在第四种可能的实现方式中, 结合第二方面, 第一种或第二种可 能的实现方式中的任一项, 所述直接连接的方式包括 P2P连接。 在第五种可能的实现方式中, 结合第四种可能的实现方式, 所述 无线终端接收所述配置设备根据所述无线终端的设备标识信息发送 的配置触发信息包括,
所述无线终端接收所述配置设备根据所述无线终端的设备标识 信息通过探测响应帧或者信标帧发送的配置触发信息。
在第六种可能的实现方式中,结合第四种或者第五种可能的实现 方式中的任一项, 所述无线终端与所述配置设备进行验证包括: 所述无线终端通过 EAP消息与所述配置设备进行验证。
在第七种可能的实现方式中,结合第四种至第六种可能的实现方 式中的任一项, 所述无线终端接收所述配置设备发送的所述无线终端 接入无线接入设备的信任状信 , 以及所述无线接入设备的标识信 , 包括,
所述无线终端接收所述配置设备通过所述 EAP 消息发送的所述 无线终端接入无线接入设备的信任状信息以及所述无线接入设备的 标识信息。
第三方面, 本发明实施例提供了一种配置设备, 与无线终端直接连 接, 该配置设备包括,
获取器,用于获取配置密码信息以及将所述配置密码信息传输至 处理器;
处理器, 用于根据所述配置密码信息生成配置触发信息; 以及用于根据所述配置密码信息与所述无线终端进行验证以确 定所述无线终端拥有所述配置密码信息;
通信单元, 通过直接连接的通信链路与外部网元进行通信, 用于 向所述无线终端发送配置触发信息;
以及向所述无线终端发送接入无线接入设备的信任状信息和所 述无线接入设备的设备标识信息, 以使得在验证成功后, 所述无线终 端根据所述信任状信息和所述无线接入设备的设备标识信 , 请求接 入所述无线接入设备;
以及向所述无线接入设备发送所述无线终端的信任状信 , 和所 述无线终端的设备标识信息, 以使得所述无线接入设备根据所述无线 终端的信任状信息和所述无线终端的标识信息对所述无线终端接入 所述无线接入设备的请求进行处理。
在第一种可能的实现方式中, 结合第三方面, 所述获取器包括多维 码扫描器, 用于扫描所述无线终端设备的多维码获取所述配置密码信 , ¾以及所述无线终端的设备标识信息。
在第二种可能的实现方式中, 结合第三方面, 所述通信单元还用于, 接收所述无线终端发送的配置请求消息, 所述配置请求消息包括所述 无线终端的设备标识信息和使用 PIN方式的指示信息; 所述获取器包括键盘, 用于接收用户输入的所述无线终端的配置 密码信息, 所述配置密码信息包括所述无线终端的个人身份识别码 PIN。
在第三种可能的实现方式中, 结合第三方面, 所述通信单元还用于, 接收所述无线终端发送的配置请求消息, 所述配置请求消息包括所述 无线终端的设备标识信息和使用 PBC方式的指示信息;
所述获取器包括 PBC按钮, 用于与所述无线终端进行 PBC配置 方式的交互并在交互过程中使用缺省的 PIN作为配置密码信息。
在第四种可能的实现方式中, 结合第三方面, 所述获取器包括 NFC 接口, 用于读取所述无线终端的配置密码信息以及所述无线终端的设 备标识信息。
在第五种可能的实现方式中, 结合第三方面、 第一种至第四种可 能的实现方式中的任一项, 所述通信单元通过直接连接的通信链路与 外部网元进行通信包括,所述通信单元通过 ad hoc连接链路与外部网 元进行通信。
在第六种可能的实现方式中, 结合第三方面、 第一种至第四种可 能的实现方式中的任一项, 所述通信单元通过直接连接的通信链路与 外部网元进行通信包括, 所述通信单元通过 P2P连接链路与外部网元 进行通信。
在第七种可能的实现方式中, 结合第六种可能的实现方式, 所述 配置触发信息包括探测响应帧或者信标帧。 在第八种可能的实现方式中,结合第六种或第七种可能的实现方 式, 所述根据所述配置密码信息与所述无线终端进行验证以确定所述 无线终端拥有所述配置密码信息, 具体包括:
根据所述配置密码信息通过 EAP 消息与所述无线终端进行验证 以确定所述无线终端拥有所述配置密码信息。
在第九种可能的实现方式中, 结合第六种至第八种可能的实现方 式中的任一项, 所述向所述无线终端发送接入无线接入设备的信任状 信息和所述无线接入设备的设备标识信息, 具体包括: 通过所述 EAP 消息向所述无线终端发送接入无线接入设备的信任状信息和所述无 线接入设备的设备标识信息。
第四方面, 本发明实施例提供了一种配置设备, 该配置设备包括, 获取单元,用于获取所述无线终端的设备标识信息和配置密码信 , ¾以及将所述无线终端的设备标识信息传输至第一发送单元, 将所述 无线终端的配置密码信息传输至验证单元; 第一发送单元,用于从获取单元接收所述无线终端的设备标识信 息以及根据所述无线终端的设备标识信息通过直接连接的通信链路 向所述无线终端发送配置触发信息; 验证单元, 用于从所述获取单元接收所述配置密码信息, 以及根 据所述配置密码信息通过直接连接的通信链路与所述无线终端进行 验证, 以确定所述无线终端拥有所述配置密码信息; 所述第一发送单元还用于,通过直接连接的通信链路向所述无线 终端发送所述无线终端接入无线接入设备的信任状信息和所述无线 接入设备的设备标识信息, 以使得所述验证单元验证成功后, 所述无 线终端根据所述信任状信息和所述无线接入设备的设备标识信 , 请 求接入所述无线接入设备; 第二发送单元, 用于从所述获取单元接收所述无线终端的设备标 识信息, 以及向所述无线接入设备发送所述无线终端的信任状信 , ¾和 所述无线终端的设备标识信息, 以使得所述无线接入设备根据所述无 线终端的信任状信息和所述无线终端的设备标识信息对所述无线终 端接入所述无线接入设备的请求进行处理。 在第一种可能的实现方式中, 结合第四方面, 所述获取单元用于, 扫描所述无线终端设备的多维码获取所述无线终端的配置密码信 , ¾ 以及所述无线终端的设备标识信息。
在第二种可能的实现方式中, 结合第四方面, 所述获取单元包括: 接收模块, 用于接收所述无线终端发送的配置请求消息, 所述配 置请求消息包括所述无线终端的设备标识信息和使用 PIN 方式的指 示信息;
PIN模块, 用于接收用户输入的所述无线终端的配置密码信息, 所述无线终端的配置密码信息包括所述无线终端的 P I N。
在第三种可能的实现方式中, 结合第四方面, 所述获取单元包括: 接收模块, 用于接收所述无线终端发送的配置请求消息, 所述配 置请求消息包括所述无线终端的设备标识信息和使用 PBC 方式的指 示信息;
PBC模块, 用于通过与无线终端进行 PBC 配置方式的交互并在 交互过程中使用缺省的 PIN作为配置密码信息。
在第四种可能的实现方式中, 结合第四方面, 所述获取单元还用于, 通过 NFC 接口读取所述无线终端的配置密码信息以及所述无线终端 的设备标识信息。
在第五种可能的实现方式中, 结合第四方面、 第一种至第四种可 能的实现方式中的任一项, 所述直接连接包括 ad hoc连接。
在第六种可能的实现方式中, 结合第四方面、 第一种至第四种可 能的实现方式中的任一项, 所述直接连接包括 P2P连接。
在第七种可能的实现方式中, 结合第六种可能的实现方式, 所述 第一发送单元, 用于根据所述无线终端的设备标识信息通过探测响应 帧或者信标帧向所述无线终端发送配置触发信息。 在第八种可能的实现方式中, 结合第六种或第七种可能的实现方 式, 所述验证单元, 用于根据所述配置密码信息通过 EAP 消息与所 述无线终端进行验证。 在第九种可能的实现方式中,结合第六种至第八种可能的实现方 式中的任一项, 所述第一发送单元用于, 通过所述 EAP 消息向所述 无线终端发送所述无线终端接入无线接入设备的信任状信息和所述 无线接入设备的设备标识信息。
第五方面, 本发明实施例提供了一种无线终端, 与配置设备直接连 接, 该无线终端包括,
通信单元, 通过直接连接的通信链路与外部网元进行通信, 用于 接收所述配置设备根据所述无线终端的设备标识信息发送的配置触 发信息;
处理器, 用于与所述配置设备进行验证, 以使得所述配置设备确 定所述无线终端拥有配置密码信息;
所述通信单元还用于,接收所述配置设备发送的所述无线终端接 入无线接入设备的信任状信 , 以及所述无线接入设备的标识信息, 以 使得在所述无线终端与所述配置设备验证成功后, 所述无线终端根据 所述信任状信息和所述无线接入设备的设备标识信息请求接入所述 无线接入设备。
在第一种可能的实现方式中, 结合第五方面, 所述通信单元还用于, 向所述配置设备发送配置请求消息, 所述配置请求消息包括所述无线 终端的设备标识信息和使用 PIN方式的指示信息, 以使得所述配置设 备根据所述配置请求消息接收用户输入的所述配置密码信息, 所述配 置密码信息包括所述无线终端的 PIN。
在第二种可能的实现方式中, 结合第五方面, 所述通信单元还用于, 向所述配置设备发送配置请求消息, 所述配置请求消息包括所述无线 终端的设备标识信息和使用 PBC 方式的指示信息; 以使得所述配置 设备通过与无线终端进行 PBC 配置方式的交互并在交互过程中使用 缺省的 PIN作为配置密码信息。
在第三种可能的实现方式中, 结合第五方面, 第一种或第二种可 能的实现方式中的任一项, 所述通信单元通过直接连接的通信链路与 外部网元进行通信包括,所述通信单元通过 ad hoc连接链路与外部网 元进行通信。 在第四种可能的实现方式中, 结合第五方面, 第一种或第二种可 能的实现方式中的任一项, 所述通信单元通过直接连接的通信链路与 外部网元进行通信包括, 所述通信单元通过 P2P连接链路与外部网元 进行通信。
在第五种可能的实现方式中, 结合第四种可能的实现方式, 所述 通信单元, 用于接收所述配置设备根据所述无线终端的设备标识信, 通过探测响应帧或者信标帧发送的配置触发信息。 在第六种可能的实现方式中,结合第四种或者第五种可能的实现 方式中的任一项, 所述与所述配置设备进行验证, 以使得所述配置设 备确定所述无线终端拥有配置密码信息, 具体包括, 通过 EAP 消息 与所述配置设备进行验证。
在第七种可能的实现方式中,结合第四种至第六种可能的实现方 式中的任一项, 所述接收所述配置设备发送的所述无线终端接入无线 接入设备的信任状信息以及所述无线接入设备的标识信息, 具体包括 接收所述配置设备通过所述 EAP 消息发送的所述无线终端接入无线 接入设备的信任状信 , 以及所述无线接入设备的标识信息。
第六方面, 本发明实施例提供了一种无线终端, 与配置设备直接连 接, 该无线终端包括,
接收单元,用于通过直接连接的通信链路接收所述配置设备根据 所述无线终端的设备标识信息发送的配置触发信息;
验证单元,用于通过直接连接的通信链路与所述配置设备进行验 证, 以使得所述配置设备确定所述无线终端拥有配置密码信息; 所述接收单元还用于, 通过直接连接的通信链路接收所述配置设 备发送的所述无线终端接入无线接入设备的信任状信息以及所述无 线接入设备的标识信息, 以使得在所述无线终端与所述配置设备验证 成功后, 所述无线终端根据所述信任状信息和所述无线接入设备的设 备标识信 , ¾请求接入所述无线接入设备。 在第一种可能的实现方式中, 结合第六方面, 所述无线终端还包括 发送单元, 用于向所述配置设备发送配置请求消息, 所述配置请求消 息包括所述无线终端的设备标识信息和使用个人身份识别码 PIN 方 式的指示信息, 以使得所述配置设备根据所述配置请求消息接收用户 输入的所述配置密码信息, 所述配置密码信息包括所述无线终端的
PIN。
在第一种可能的实现方式中, 结合第六方面, 所述无线终端还包括 发送单元, 向所述配置设备发送配置请求消息, 所述配置请求消息包 括所述无线终端的设备标识信息和使用按钮配置 PBC 方式的指示信 息; 以使得所述配置设备通过与无线终端进行 PBC 配置方式的交互 并在交互过程中使用缺省的 PIN作为配置密码信息。
在第三种可能的实现方式中, 结合第六方面, 第一种或第二种可 能的实现方式中的任一项, 所述直接连接包括 ad hoc连接。
在第四种可能的实现方式中, 结合第六方面, 第一种或第二种可 能的实现方式中的任一项, 所述直接连接为 P2P连接。
在第五种可能的实现方式中, 结合第四种可能的实现方式, 所述 接收单元, 用于接收所述配置设备根据所述无线终端的设备标识信 , ¾ 通过探测响应帧或者信标帧发送的配置触发信息。
在第六种可能的实现方式中,结合第四种或者第五种可能的实现 方式中的任一项, 所述验证单元用于, 通过 EAP 消息与所述配置设 备进行验证。
在第七种可能的实现方式中,结合第四种至第六种可能的实现方 式中的任一项, 所述接收单元用于, 接收所述配置设备通过所述 EAP 消息发送的所述无线终端接入无线接入设备的信任状信 , 以及所述 无线接入设备的标识信息。
第七方面, 本发明实施例提供了一种配置设备的系统,
包括如第三方面或第四方面任一项所述的配置设备以及如第五方面 或第六方面任一项所述的无线终端。 在第一种可能的实现方式中, 结合第七方面, 所述系统还包括, 无线接入设备, 用于接收所述配置设备发送的所述无线终端的信 任状信息和所述无线终端的标识信息, 以及根据所述无线终端的信任 状信息和所述无线终端的标识信息对所述无线终端接入所述无线接 入设备的请求进行处理。 本发明实施例提供的配置无线终端的方法、 设备及系统, 通过配置设 备与无线终端的直接通信完成对无线终端的配置, 实现配置过程无需无线 接入设备参与也能完成对无线终端的配置。 使得配置过程更加灵活。 解决 了现有技术在配置过程中都必须处于工作状态, 在无线接入设备处于不能 正常通信的区域或者无线接入设备处于离线状态时不能完成对无线终端的 配置的问题。 附图说明
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面 将对实施例或现有技术描述中所需要使用的附图作简单地介绍, 显而 易见地, 下面描述中的附图仅仅是本发明的一些实施例, 对于本领域 普通技术人员来讲, 在不付出创造性劳动的前提下, 还可以根据这些 附图获得其他的附图。
图 1为本发明实施例提供的一种配置无线终端的方法流程图; 图 2为本发明实施例提供的另一种配置无线终端的方法流程图; 图 3为本发明实施例提供的另一种配置无线终端的方法流程图; 图 4为本发明实施例提供的一种验证方法的流程图;
图 5为本发明实施例提供的另一种验证方法的流程图; 图 6为本发明实施例提供的另一种验证方法的流程图;
图 7为本发明实施例提供的一种配置设备的装置图;
图 8为本发明实施例提供的另一种配置设备的装置图;
图 9为本发明实施例提供的另一种配置设备的装置图;
图 10为本发明实施例提供的另一种配置设备的装置图; 图 1 1为本发明实施例提供的一种无线终端的装置图;
图 12为本发明实施例提供的另一种无线终端的装置图; 图 13为本发明实施例提供的另一种无线终端的装置图; 图 14为本发明实施例提供的一种配置无线终端的系统图; 图 15为本发明实施例提供的另一种配置无线终端的系统图。 具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方 案进行清楚、 完整地描述, 显然, 所描述的实施例仅仅是本发明一部 分实施例, 而不是全部的实施例。 基于本发明中的实施例, 本领域普 通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例, 都属于本发明保护的范围。
需要说明的是, 本发明方法实施例中涉及 S 101、 S 102等编号, 只具有标识方法中各步骤的作用, 并不限定各编号步骤之间的先后顺 序。
参见图 1 , 为配置设备侧配置无线终端的方法流程示意图, 其中, 配置设备与无线终端之间直接连接, 可以包括点对点 ( P2P ) 连接方 式和临时网络 ( ad hoc ) 连接方式, 本发明实施例对配置设备与无线 终端的直接连接的方式不进行限制, 示例性的, 本发明实施例中配置 设备与无线终端采用 P2P连接方式。 如图所示, 可以包括以下步骤:
S 101 : 配置设备获取无线终端的设备标识信息和配置密码信息; 示例性的,配置设备获取无线终端的设备标识信息和配置密码信 息, 可以选择以下任一种方式进行:
1、 配置设备通过扫描无线终端设备的多维码获取配置密码信息 以及无线终端的设备标识信息。
2、 配置设备接收无线终端发送的配置请求消息, 配置请求消息 包括无线终端的设备标识信息和使用 PIN方式的指示信息;
配置设备接收用户输入的配置密码信息, 配置密码信息包括无线 终端的 PIN。
3、 配置设备接收无线终端发送的配置请求消息, 配置请求消息 包括无线终端的设备标识信息和使用 PBC方式的指示信息;
配置设备通过与无线终端进行 PBC 配置方式的交互并在交互过 程中使用缺省的 PIN (例如 WPS规范中规定的 " 00000000" ) 作为配 置密码。 4、 配置设备通过 NFC接口读取无线终端的配置密码信息以及无 线终端的设备标识信息。
S 102 :配置设备根据无线终端的设备标识信息向无线终端发送配 置触发信息;
示例性的,配置设备根据无线终端的设备标识信息可以通过探测 响应帧或者信标帧向无线终端发送配置触发信息。
S 103 : 配置设备根据配置密码信息与无线终端进行验证, 以确定 无线终端拥有配置密码信息;
示例性的, 配置设备根据配置密码信息可以通过 EAP 消息与无 线终端进行验证。
S 104 :配置设备向无线终端发送无线终端接入无线接入设备的信 任状信息和无线接入设备的设备标识信息, 以使得在验证成功后, 无 线终端根据信任状信息和无线接入设备的设备标识信息请求接入无 线接入设备。
示例性的, 配置设备可以通过 EAP 消息向无线终端发送无线终 端接入无线接入设备的信任状信息和无线接入设备的设备标识信息。 需要说明的是,根据不同的验证方式及消息交互流程, 步骤 S 104 也可以与步骤 S 103 同时进行,本实施例不限于在完成 S 103步骤后再 执行步骤 S 104。
S 105 :配置设备向无线接入设备发送信任状信息和无线终端的设 备标识信息, 以使得无线接入设备根据信任状信息和无线终端的设备 标识信息对无线终端接入无线接入设备的请求进行处理。
需要说明的是,步骤 S 105 可以在步骤 S 103验证成功之后的任何 时间进行, 本实施例不限于完成步骤 S 103或步骤 S014后立即执行步 骤 S 105。 本发明实施例提供的配置无线终端的方法,通过配置设备与无线 终端的直接通信完成对无线终端的配置, 实现配置过程无需无线接入 设备参与也能完成对无线终端的配置。 使得配置过程更加灵活。 解决 了现有技术在配置过程中都必须处于工作状态, 在无线接入设备处于 不能正常通信的区域或者无线接入设备处于离线状态时不能完成对 无线终端的配置的问题。 图 2为无线终端侧配置无线终端的方法流程示意图, 其中, 无线 终端与配置设备之间直接连接,可以包括 P2P连接方式和 ad hoc连接 方式, 本发明实施例对配置设备与无线终端的直接连接的方式不进行 限制, 优选的, 本发明实施例中配置设备与无线终端采用 P2P连接方 式。 如图所示, 可以包括以下步骤:
S201 :无线终端接收配置设备根据无线终端的设备标识信息发送 的配置触发信息;
示例性的, 无线终端的设备标识信息可以由配置设备获取; 无线 终端接收配置设备根据无线终端的设备标识信息通过探测响应帧或 者信标帧发送的配置触发信息, 并且在无线终端接收配置设备根据无 线终端的设备标识信息发送的配置触发信息之前, 可以包括以下任意 一个步骤:
无线终端向配置设备发送配置请求消息,该配置请求消息包括无 线终端的设备标识信息和使用 PIN方式的指示信息, 以使得配置设备 根据配置请求消息接收用户输入的配置密码信息, 配置密码信息包括 无线终端的 PIN; 或者,
无线终端向配置设备发送配置请求消息,该配置请求消息包括无 线终端的设备标识信息和使用 PBC 方式的指示信息, 以使得配置设 备通过与无线终端进行 PBC 配置方式的交互并在交互过程中使用缺 省的 PIN作为配置密码信息。
S202: 无线终端与配置设备进行验证, 以使得配置设备确定无线 终端拥有配置密码信息,
示例性的, 无线终端的配置密码信息可以由配置设备获取, 无线 终端通过 EAP消息与配置设备进行验证。
S203 :无线终端接收所述配置设备发送的无线终端接入无线接入 设备的信任状信 , 以及无线接入设备的标识信息, 以使得在验证成功 后, 无线终端根据信任状信, ¾和无线接入设备的设备标识信 , ¾请求接 入无线接入设备;
示例性的, 无线终端接收配置设备通过 EAP 消息发送的无线终 端接入无线接入设备的信任状信 , 以及无线接入设备的标识信息, 需要说明的是,根据不同的验证方式及消息交互流程, 步骤 S203 也可以与步骤 S202同时进行, 本实施例不限于在完成 S202步骤后再 执行步骤 S203。 在完成 S203 之后, 无线终端就可以按照从配置设备获得的无线 接入设备的标识信息去发现无线接入设备, 在找到指定的无线接入设 备后使用获得的信任状信息与该无线接入设备建立安全的连接。
本发明实施例提供的配置无线终端的方法,通过配置设备与无线 终端的直接通信完成对无线终端的配置, 实现配置过程无需无线接入 设备参与也能完成对无线终端的配置。 使得配置过程更加灵活。 解决 了现有技术在配置过程中都必须处于工作状态, 在无线接入设备处于 不能正常通信的区域或者无线接入设备处于离线状态时不能完成对 无线终端的配置的问题。 下面通过具体实施例对上述方法实施例进行说明, 参见图 3 , 包 括:
301 : 初始 WLAN建立, 配置设备成为无线接入设备的配置管理 哭口 . ,
示例性的, 本发明实施例可以应用于 Wi-Fi网络, 可以包含配置 设备, 无线接入设备以及无线终端, 其中, 配置设备为无线接入设备 的配置管理设备, 用以管理无线网络建立、 添加和删除无线终端; 无 线接入设备为无线终端进入网络的接入设备, 包括但不限于接入点 ( Access Point , 简称 AP ) , 本实施例以无线接入设备为 AP为例进行 说明, 例如无线终端可以通过 AP进入家庭网络(局域网 )、 或者进入 互联网、 也可以进入企业网或行业专网 (例如智能传感网, 其中无线 终端是传感器) 等。 本实施例中的配置设备根据其功能可以为现有的 WPS2.0规范中的定义 AP的外置注册器( External Registrar ) , 可以理 解, 所述配置设备并不限定为现有 WPS2.0规范中所定义的外置注册 哭口 。
示例性的 , 配置设备在初始无线局域网建立过程中与 AP进行交 互成为 AP的配置设备; 优选的, 配置设备可以根据 WPS规范的 EAP 与 AP进行交互, 成为 AP的配置设备, 当然, 若 WPS规范中配置设 备与 AP进行交互的协议改变, 改变后的协议也可以直接应用于本发 明实施例;
配置设备还可以通过接收用户输入的配置参数成为 AP的配置设 备, 即配置设备可以在未与 AP交互的情况下成为 AP的配置设备。 优选的, 本发明实施例中采用配置设备在初始 WLAN 建立过程 中与 AP进行交互成为 AP 的配置设备, 并用来配置后续其他需要加 入的无线终端,其交互过程本领域技术人员十分熟悉,在此不再赘述。
302 : 配置设备获取无线终端的设备标识信息和第一配置密码信 自 · 为了描述方便,本实施例中将配置设备所获取到的无线终端的配 置密码信息称为第一配置密码信息, 将无线终端自身所拥有的配置密 码信息称为第二配置密码信息, 第一配置密码信息和第二配置密码信 息应该相同, 类型可以为 PIN 或密码, 可以编码于多维码、 存储于 NFC标签、 以字符串显示于标签等, 例如, 无线终端的多维码可以为 静态多维码, 如标签打印的多维码, 或动态多维码, 如由无线终端动 态生成的多维码; 多维码码制可以为任何可以识读的一维条码、 二维 条码码制, 例如通用产品代码 ( Universal Product Code , 简称 UPC )、 快速响应码 ( Quick Response Code , 简称 QR Code ) 等。 本发明并不 以此为限。无线终端的配置密码信息可以静态存储于无线终端的 N F C 标签内, 或是以某种方式动态生成后存储于无线终端的 NFC标签中。
无线终端的设备标识信息可以是能够唯一标识无线终端的任何 信息, 本实施例对此不进行限定, 例如, 可以为无线终端的介质访问 控制 ( Media Access Control , 简称 MAC ) 地址。
示例性的,配置设备获取无线终端的设备标识信息和第一配置密 码信息可以选择以下任一种方式进行:
1、 配置设备通过扫描无线终端的多维码获取配置密码信息以及 无线终端的设备标识信息。
2、 配置设备接收无线终端的配置请求消息, 配置请求消息包括 无线终端的设备标识信息和使用 PIN方式的指示信息;
示例性的,配置设备可以通过以下任一种方式接收无线终端的配 置请求消息:
A、 配置设备向外广播信标帧, 无线终端接收到信标帧后向配置 设备发送一个配置请求消息, 配置设备接收到配置请求消息之后向无 线终端发送探测回复, 从而获得无线终端的设备标识信息;
B、 无线终端主动在各信道上发送配置请求消息, 配置设备接收 接收到配置请求消息之后向无线终端发送探测回复, 从而获得无线终 端的设备标识信息;
配置设备接收用户输入的配置密码信息, 配置密码信息包括无线 终端的 PIN。
3、 配置设备接收无线终端的配置请求消息, 配置请求消息包括 无线终端的设备标识信息和使用 PBC 方式的指示信息, 其中, 获取 配置请求消息的过程与 PIN方式中配置请求消息的接收方法相同; 此 处不再赘述;
配置设备通过与无线终端进行 PBC 配置方式的交互并在交互过 程中使用缺省的 PIN (例如 WPS规范中规定的 " 00000000" ) 作为配 置密码。
4、 配置设备通过 NFC接口读取无线终端的配置密码信息以及无 线终端的设备标识信息。
303 : 配置设备向无线终端发送配置触发信息;
根据实际的交互方式的不同, 配置触发信息可以为任意由配置设 备发送的能够触发无线终端与其进行配置消息交互的消息, 例如, 配 置设备根据无线终端的设备标识信息向无线终端发送信标帧或者探 测响应消息 ( probe response ) , 以触发无线终端向配置设备进行后续 的配置消息交互。 本发明并不以此为限。
308 : 配置设备与无线终端进行验证; 309 : 配置设备向无线终端发送信任状以及 AP的设备标识信息; 示例性的, 配置设备可以通过 EAP 消息将无线终端的信任状和 AP 的设备标识信息发送给无线终端, 以使得无线终端根据信任状信 息和 AP的标识信息请求接入 AP。 需要说明的是, 本领域技术人员可以理解, 步骤 308与步骤 309 可先后进行, 也可以同时进行, 这完全取决于验证交互方式。 例如, 信任状信息和 AP的设备标识信息可以在验证过程结束后进行发送, 也可以同时在验证交互消息中进行发送, 也可以作为验证过程的一部 分, 作为验证成功与否的判决条件之一, 本发明并不以此为限。 此外 信任状信息和 AP的设备标识信息可以同时发送, 也可以分开发送。
3 10 : 配置设备向 AP 发送无线终端的信任状信息以及无线终端 的设备标识信息。
示例性的, 配置设备可以向 AP发送通知消息, 通知消息中包含 信任状信息和无线终端的设备标识信息, 使得 AP根据信任状信息和 无线终端的设备标识信息对无线终端的接入请求进行处理。 需要说明 的是, 步骤 3 10不限于在步骤 308或步骤 309之后立即执行, 其执行 时间根据实际配置需求确定。 例如, 在家庭网络中, 当 AP和无线终 端均已安装完成并上电工作时, 步骤 3 10可以在完成步骤 308或步骤 309后立即执行; 在传感器网络中, 因需要配置大量的传感器设备, 且传感器设备安装后分布较零散, 不便于安装后配置, 因此需要在安 装之前批量配置, 此时步骤 3 10可以在步骤 308或步骤 309后的较长 时间后执行。
示例性的,本实施例中配置设备与无线终端可以采用直接连接的 方式进行直接通信, 以完成配置设备与无线终端的验证, 其中, 直接 连接的方式可以包括 P2P连接方式和 ad hoc连接方式,本发明实施例 对配置设备与无线终端的直接连接的方式不进行限制。 优选的, 本实 施例中配置设备与无线终端采用 P2P连接方式。
下述步骤 304—步骤 307是无线终端与配置设备完成点对点连接 的过程, 该过程可以发生在步骤 303与步骤 308之间, 其中, 配置设 备为 P2P连接中的群所有者 ( Group Owner, 简称 GO ) , 无线终端为 P2P连接中的群客户端 ( Client )。
304 : 无线终端向配置设备发送鉴权请求消息;
305 : 配置设备向无线终端发送鉴权响应消息;
示例性的, 配置设备向无线终端发送鉴权回复, 其中包含允许无 线终端与配置设备进行连接的信息。
306 : 无线终端向配置设备发送关联请求消息;
示例性的, 无线终端接收到鉴权响应消息之后, 向配置设备发送 包含连接请求信, I,的关联请求消 , ¾。
307: 配置设备向无线终端发送关联响应消息;
示例性的, 配置设备根据接收到的连接请求, 向无线终端发送连 接信息, 完成配置设备与无线终端的 P2P连接。
需要说明的是, 步骤 304、 步骤 305、 步骤 306、 步骤 307 为依 据现有的 IEEE802.1 1 -2012协议而设计的。 示例性的, 参见图 4-图 6 , 本发明实施例针对步骤 308 , 具体分 别描述了三种类型的验证方式: 1、 配置设备与无线终端进行 4 步握 手进行双向验证, 即配置设备要验证无线终端拥有配置设备所获得的 第一配置密码信息, 无线终端也验证配置设备获得了 自 己的第二配置 密码信息; 2、 配置设备单向验证无线终端, 即配置设备验证其获得 的第一配置密码信息来自其进行配置过程的无线终端; 3、 配置设备 与无线终端采用现有的 WPS2.0中的 EAP认证过程进行双向验证, 即 配置设备要验证无线终端拥有配置设备所获得的第一配置密码信息, 无线终端也验证配置设备获得了 自 己的第二配置密码信息。 需要说明 的是, 具体的验证方式可以有多种, 任何通过信息交互并进行匹配确 认的验证方式均适用于本发明实施例步骤 308所述的验证过程, 本发 明实施例所提供的三种验证方式只是对验证过程的一个详细说明。 下 面分别对上述三种验证方式进行说明。
参见图 4 , 为第一种验证方法的详细过程:
401 : 配置设备与无线终端各自生成一个随机值, 分别为 Ra 和
Ea; 402 : 配置设备向无线终端发送消息一, 消息一中包含 Ra;
403 : 无线终端根据接收到的 Ra和自身生成的 Ea和第二配置密 码信息, 生成共享密钥 Keyl ;
404 : 无线终端向配置设备发送消息二, 消息二中包含 Ea及利用 Keyl加密消息二摘要得到的第一消息完整性代码 ( Message Integrity Code , 简称 MIC );
405 : 配置设备根据接收到的 Ea和自身生成的 Ra和第一配置密 码信息, 生成共享密钥 Key2 , 并使用 Key2以与无线终端相同的方式 生成第二 MIC ,其中,配置设备生成 Key2的方式与无线终端生成 Keyl 的方式相同。
406 : 配置设备判断第二 MIC与第一 MIC是否匹配。
407 : 若不匹配, 结束配置交互过程。 示例性的, 若第二 MIC与第一 MIC不匹配, 则配置设备判定无 线终端的第二配置密码信息与配置设备获得的第一配置密码信息不 同。 配置设备可以向无线终端发送不匹配结果信息, 无线终端向配置 设备发送断开连接信息, 结束配置交互过程, 或者, 配置设备直接结 束配置交互过程, 或以其他任何可行的方式结束配置交互过程, 本发 明并不以此为限。
408 :若匹配,配置设备利用 Key2加密消息三摘要生成第三 MIC;
409 : 配置设备向无线终端发送消息三;
示例性的, 若第二 MIC与第一 MIC匹配成功, 则配置设备判定 无线终端的第二配置密码信息与配置设备获得的第一配置密码信息 相同。 配置设备生成无线终端接入 AP的信任状信息。 配置设备向无 线终端发送消息三, 消息三中包含利用 Key2加密消息三摘要得到的 第三 MIC及利用 Key2加密的无线终端接入 AP 的信任状信息和 AP 的设备标识信息。 需要说明的是, 本领域的技术人员可以理解, 在发 送信任状信息之前, 信任状信息的生成时间不具体限制;
410 :无线终端接收到消息三后使用 Keyl 以与配置设备相同的方 式生成第四 MIC; 41 1 : 无线终端判断第四 MIC与第三 MIC是否匹配; 412 : 若不匹配, 结束配置交互过程。 示例性的, 若第三 MIC与第四 MIC不匹配, 则无线终端判定配 置设备获得的第一配置密码信息与无线终端自身的第二配置密码信 息不同。 无线终端向配置设备发送不匹配结果信息, 配置设备向无线 终端发送断开连接信息, 结束配置交互过程, 或者, 直接结束配置交 互过程, 或以其他任何可行的方式结束配置交互过程, 本发明并不以 此为限;
413 : 若匹配, 无线终端发送消息四。
示例性的, 若第三 MIC与第四 MIC匹配, 则无线终端判定配置 设备获得的第一配置密码信息与无线终端自身的第二配置密码信息 相同。 无线终端向配置设备发送消息四, 告知配置设备匹配成功, 并 根据 Keyl解密消息三中利用 Key2加密的无线终端接入 AP的信任状 信息和 AP的设备标识信息, 获得信任状信息和 AP的设备标识信息。
需要说明的是, 本领域技术人员可以理解, AP 的标识信息相对 公开, 不一定需要对其进行加密, 例如 AP的标识信息明文带在消息 三中, 或者, 通过其他的消息进行发送。 本实施例中只是提供一种可 行的方法, 但并不以此为限。 参见图 5 , 为第二种验证方法的详细过程:
501 :配置设备生成随机值 Ra及无线终端接入 AP的信任状信息; 示例性的, 配置设备可以将随机值 Ra及无线终端接入 AP 的信 任状信息通过第一配置密码信息进行加密得到加密信息一。
502 : 配置设备将加密信息一发送至无线终端; 需要说明的是, 本领域的技术人员可以理解, 在发送信任状信息 之前, 信任状信息的生成时间不具体限制。
503 : 无线终端通过第二配置密码将接收到的加密信息一进行解 密, 得到随机值 α' ;
示例性的, 无线终端可以通过第二配置密码信息将随机值 Ra ,加 密后得到加密信息二。
504 : 无线终端将加密信息二发送至配置设备;
505 : 配置设备通过第一配置密码信息对接收到的加密信息二进 行解密, 得到随机值 α" '
506 : 配置设备判断随机值 α"与 自身生成的随机值 Ra 是否匹 配;
507 : 若不匹配, 则结束配置交互过程;
示例性的, 若 Wfl "与 Ra不匹配, 配置设备可以向无线终端发送 断开连接信息, 结束配置交互过程, 或者直接结束配置交互过程, 或 以其他任何可行的方式结束配置交互过程, 本发明并不以此为限。
508 : 若匹配, 配置设备向无线终端发送 AP的设备标识信息。 示例性的, 若 Wfl"与 Ra 匹配, 配置设备确认匹配成功, 向无线 终端发送 AP的设备标识信息。 需要说明的是, AP的设备标识信息也 可以在上述的验证过程中随信任状信息一起加密发送, 或者, AP 的 设备标识信息也可以在上述的验证过程中明文发送, 本发明实施例并 不以此为限。 参见图 6 , 为第三种验证方法的详细过程:
该验证方法的交互是基于现有的 WPS2.0协议中的消息一至消息 八的 EAP认证过程, 配置设备和无线终端可以通过 8个消息 ( Ml ~ M8 ) 完成配置过程。 其中 M1 -M8消息为协议中的标准消息, 其具体 内容在此不再赘述。 具体过程如下:
601 : 配置设备和无线终端采用动态密钥交换算法协商出无线终 端与配置设备之间的一组临时密钥, 用于对后续进行交互认证的消息 和重要数据如配置数据、 信任状信息等进行加密, 保证配置过程的安 全性;
示例性的, 本发明实施例优选使用迪菲 -赫尔曼( Diffie-Hellman , 简称 DH ) 动态密钥交换算法, 并不代表本发明实施例仅限于采用该 动态密钥交换算法。 602 : 配置设备将第一配置密码信息分为前半部分与后半部分并 且分别进行加密,优选的,本发明实施例选择高级加密标准( Advanced Encryption Standard, 简称 AES ) 算法进行加密, 但并不代表本发明 实施例仅限于该算法, 其中, 前半部分的加密信息为 R1 , 后半部分 的加密信息为 R2 , R1 与 R2 的加密密钥分别为 Rkl , Rk2 , 相应的, 无线终端将第二配置密码信息也分为前半部分与后半部分并且与 R1 , R2相同的加密算法分别进行加密, 其中, 前半部分的加密信息为 E 1 , 后半部分的加密信息为 E2 , E1与 E2的加密密钥分别为 Ekl , Ek2;
603 : 无线终端将 El与 E2发送至配置设备;
604 : 配置设备将加密的信息 R1和 R2与第一配置密码信息的前 半部分加密密钥 Rkl发送至无线终端;
605 : 若确认第一配置密码信息与第二配置密码信息的前半部分 匹配, 无线终端向配置设备发送 Ekl , 示例性的, 无线终端根据 Rkl对第二配置密码信息前半部分以与 R1 ,R2相同的加密算法进行加密, 如果加密的结果与 R1 相等, 则无 线终端确认第一配置密码信息与第二配置密码信息的前半部分匹配, 无线终端向配置设备发送 Ekl
若加密的结果与 R1 不相等, 无线终端确认第一配置密码信息与 第二配置密码信息不匹配, 则结束配置交互过程, 例如, 无线终端可 以向配置设备发送不匹配结果信息, 配置设备向无线终端发送断开连 接信息, 结束配置交互过程, 或者直接结束配置交互过程, 或以其他 任何可行的方式结束配置交互过程, 本发明并不以此为限。
606 : 若确认第一配置密码信息与第二配置密码信息的前半部分 匹配, 则配置设备将第二配置密码信息的后半部分加密密钥 Rk2发送 至无线终端;
示例性的, 配置设备根据 E k 对第一配置密码信息前半部分以与 R1 ,R2相同的加密算法进行加密, 如果加密的结果与 E1 相等, 则确 认第一配置密码信息与第二配置密码信息的前半部分匹配, 并将第二 配置密码信息的后半部分加密密钥 Rk2发送至无线终端;
若加密的结果与 E 1 不相等, 配置设备确认第一配置密码信息与 第二配置密码信息不匹配, 则结束配置交互过程, 例如, 配置设备可 以向无线终端发送不匹配结果信息, 无线终端向无线终端发送断开连 接信息, 结束配置交互过程, 或者直接结束配置交互过程, 或以其他 任何可行的方式结束配置交互过程, 本发明并不以此为限。
607 : 若确认第一配置密码信息与第二配置密码信息的后半部分 匹配, 无线终端向配置设备发送 Ek2 ,
示例性的, 607的验证过程步骤 605验证前半部分 R1 的过程相 同, 此处不再赘述。
608 : 若确认第一配置密码信息与第二配置密码信息的后半部分 匹配, 配置设备生成无线终端接入 AP的信任状信息并向无线终端发 送。
示例性的, 608 的验证过程步骤与 606验证前半部分 E1 的过程 相同, 此处不再赘述。
示例性的, 信任状信息可以包含无线终端的认证信息, 以及 AP 与无线终端之间通信消息的加密与解密的密钥。
示例性的, 上述举例的三种验证方法对验证配置密码信息为 PIN 码、 NFC标签中的密码和多维码均适用, 本实施例对此不进行任何限 定。 在实际实现中, 如图 4所示的验证方法和如图 5所示的验证方法 交互过程简单, 如需保证信息传输的安全性, 需要配置密码信息具备 较大的信息量, 例如对于数字型的配置密码信息, 需要具备较长的位 数, 不方便手动输入, 因此在实际应用中优选使用非手动输入的获取 方式, 例如通过 NFC接口读取 NFC标签中的配置密码信息或使用图 像传感器识读 QR Code中编码的配置密码信息的方式,既能够保证配 置设备方便地获取配置密码信息, 又能够保证配置密码信息拥有足够 的信息量。 而对于输入 PIN码、 PBC等配置方式, 因配置密码信息的 位数较短,为保证其安全性,应优选采用现有的 WPS2.0协议中的 EAP 交互过程, 即如图 6所示的验证方法。 本领域的技术人员可以理解, WPS2.0协议中的 EAP交互过程对于较短位数的 PIN码有较好的安全 性。
本发明实施例提供的配置无线终端的方法,通过配置设备与无线 终端的直接通信完成对无线终端的配置, 配置过程无需 AP参与也能 完成对无线终端的配置, 使得配置过程更加灵活。 解决了现有技术在 配置过程中都必须处于工作状态, 在 AP处于不能正常通信的区域或 者 AP处于离线状态时不能完成对无线终端的配置的问题。
另一方面, 本发明实施例提供了一种配置设备 70 , 该配置设备 70可以应用于 Wi-Fi网络, Wi-Fi网络还可以包含无线接入设备以及 无线终端, 其中, 配置设备 70可以为无线接入设备的配置管理设备, 用以管理无线网络建立、 添加和删除无线终端; 无线接入设备为无线 终端进入网络的接入设备, 包括但不限于 AP , 本实施例以无线接入 设备为 AP为例进行说明, 例如无线终端可以通过 AP进入家庭网络 (局域网 )、 或者进入互联网、 也可以进入企业网或行业专网 (例如 智能传感网, 其中无线终端是传感器)等。 本实施例中的配置设备 70 根据其功能可以为现有的 WPS2.0规范中的定义 AP 的外置注册器, 可以理解,所述配置设备 70并不限定为现有 WPS2.0规范中所定义的 外置注册器。
参见图 7 , 该配置设备 70包括;
获取器 701 , 用于获取配置密码信息以及将配置密码信息传输至 处理器 702。
处理器 702 , 用于根据配置密码信息生成配置触发信息; 以及用于根据配置密码信息与无线终端进行验证以确定无线终 端拥有配置密码信息; 通信单元 703 , 通过直接连接的通信链路与外部网元进行通信, 用 于根据无线终端的设备标识信息向无线终端发送配置触发信息; 示例性的,通信单元 703通过直接连接的通信链路与外部网元进 行通信,可以包括通信单元 703通过 P2P连接链路或 ad hoc连接链路 与外部网元进行通信, 本发明实施例不作任何限定, 本实施例优选的 通过 P2P连接链路与外部网元进行通信。 其中, 配置设备 70为 P2P 连接中的 GO , 无线终端为 P2P连接中的 Client,
可选的, P2P连接的过程如下:
通信单元 703接收无线终端发送的鉴权请求消息; 处理器 702根据鉴权请求消息生成鉴权回复消息, 其中, 鉴权回 复消息包含允许无线终端与配置设备 70进行连接的信息;
通信单元 703向无线终端发送所述鉴权回复消息,
通信单元 703接收无线终端发送的关联请求消息; 处理器 703根据关联请求消息生成关联响应消息;
通信单元 703 向无线终端发送关联响应消息, 完成配置设备 70 与无线终端的 P2P连接。 需要说 明 的 是 , 上述鉴权和 关联过程是依据现有 的 IEEE802.1 1 -2012协议而设计的。 示例性的, 为了描述方便, 本实施例中将获取器 701所获取到的 无线终端的配置密码信息称为第一配置密码信息, 将无线终端自身所 拥有的配置密码信息称为第二配置密码信息, 第一配置密码信息和第 二配置密码信息应该相同, 第一配置密码信息和第二配置密码信息的 类型可以为 PIN或密码, 可以编码于多维码、 存储于 NFC标签、 以 字符串显示于标签等, 例如, 无线终端的多维码可以为静态多维码, 如标签打印的多维码, 或动态多维码, 如由无线终端动态生成的多维 码; 多维码码制可以为任何可以识读的一维条码、 二维条码码制, 例 如 UPC、 QR Code等。 本发明并不以此为限。 无线终端的配置密码信 息可以静态存储于无线终端的 NFC 标签内, 或是以某种方式动态生 成后存储于无线终端的 NFC标签中。
无线终端的设备标识信息可以是能够唯一标识无线终端的任何 信息, 本实施例对此不进行限定, 例如, 可以为无线终端的 MAC地 址。
根据配置密码信息的类型不同,获取器 701也可以对应不同类型 的设备来获取配置密码信息, 比如接收用户输入的键盘、 PBC按钮、 读取 NFC标签信息的 NFC接口和扫描多维码信息的扫描器等等, 不 同设备类型的获取器对应于不同的配置密码信息类型, 具体来说,
1、 获取器 701 为多维码扫描器, 用于扫描所述无线终端设备上 的多维码获取配置密码信息以及无线终端的设备标识信息。 2、 获取器 701 为键盘, 用于接收用户输入的配置密码信息, 配 置密码信息包括无线终端的 PIN。
示例性的, 当获取器 701为键盘时, 通信单元 703还可以用于, 接收无线终端发送的配置请求消息, 配置请求消息包括无线终端的设 备标识信息和使用 PIN方式的指示信息; 其中, 可以通过以下任一种 方式接收无线终端发送的配置请求消息:
A、 通信单元 703 接收由无线终端在接收到配置设备 70 向外广 播的信标帧后向配置设备 70 发送的配置请求消息, 并向无线终端发 送探测回复, 从而获得无线终端的设备标识信息;
B、 通信单元 703接收到无线终端主动在各信道上发送的配置请 求消息, 并根据配置请求消息向无线终端发送探测回复, 从而获得无 线终端的设备标识信息。
3、 获取器 701 为 PBC按钮, 用于通过与无线终端进行 PBC配 置方式交互并在交互过程中使用缺省的 PIN (例如 WPS 规范中规定 的 " 00000000" , 本发明实施例在此不做限定) 作为配置密码。 其中 接收配置请求消息的过程与 PIN 方式中配置请求消息的接收方法相 同, 此处不再赘述。 示例性的, 当获取器 701 为 PBC按钮时, 通信单元 703还可以 用于, 接收所述无线终端的配置请求消息, 所述配置请求消息包括所 述无线终端的设备标识信息和使用按钮配置 PBC方式的指示信息。
4、 获取器 701 为 NFC接口, 用于读取无线终端的配置密码信息 以及无线终端的设备标识信息。 处理器 702 , 用于根据第一配置密码信息与无线终端进行验证, 以确定无线终端拥有与第一配置密码信息相同的第二配置密码信息; 通信单元 703还用于, 向无线终端发送接入 AP的信任状信息和 AP 的设备标识信息, 以使得在验证成功后, 无线终端根据信任状信 息和 AP的设备标识信息请求接入 AP;
以及向 A P发送无线终端的信任状信息和无线终端的设备标识信 息, 以使得 AP根据无线终端的信任状信息和无线终端的标识信息对 无线终端接入 AP的请求进行处理。 可选的, 配置设备 70还可以包括存储器, 用于存储第一配置密 码信息、 无线终端的信任状信息、 无线终端的设备标识信息和 AP 的设备标识信息, 该存储器可能包括高速 RAM存储器, 也可能还包括 非易失性存储器 ( non-volatile memory ) , 例如, 内存, 緩存, 寄存器, 磁盘存储器, 快闪存储器等。
示例性的, 配置设备 70可以在初始无线局域网建立过程中与 ΑΡ 进行交互成为 ΑΡ的配置设备;
优选的, 处理器 702可以根据 WPS规范的 ΕΑΡ协议与 ΑΡ进行 交互, 成为 ΑΡ的配置设备, 当然, 若 WPS规范中配置设备与 ΑΡ进 行交互的协议改变, 改变后的协议也可以直接应用于本发明实施例。
通信单元 703 还可以通过接收用户输入的 ΑΡ 的配置参数成为 ΑΡ的配置设备 70 , 并用来配置后续其他需要加入的无线终端, 其交 互过程本领域技术人员十分熟悉, 在此不再赘述; 示例性的,通信单元 703采用广播包含无线终端的设备标识信息 的信标帧或者探测响应帧向无线终端发送配置触发信息, 用来触发对 无线终端的验证, 本发明实施例对此不作任何限定。 根据实际的交互 方式的不同, 配置触发信息可以为任意由配置设备 70 发送的能够触 发无线终端与其进行配置消息交互的消息, 例如, 配置设备 70 根据 无线终端的设备标识信息向无线终端发送探测响应消息, 以触发无线 终端向配置设备 70进行后续的配置消息交互。 本发明并不以此为限。
示例性的, 处理器 702根据第一配置密码信息通过 ΕΑΡ 消息与 无线终端进行验证以确定无线终端拥有与第一配置密码信息相同的 第二配置密码信息, 其中, 处理器 702可以对无线终端通过不同的验 证方法进行, 以下将详细介绍三种验证方法的过程, 1、 处理器 702 与无线终端进行 4步握手进行双向验证, 即配置设备 70要验证无线 终端拥有配置设备 70 所获得的第一配置密码信息, 无线终端也验证 配置设备 70获得了 自 己的第二配置密码信息; 2、 处理器 702单向验 证无线终端, 即配置设备 70 验证其获得的第一配置密码信息来自其 进行配置过程的无线终端; 3、 处理器 702 与无线终端采用现有的 WPS2.0 中的 EAP认证过程进行双向验证, 即配置设备 70要验证无 线终端拥有配置设备 70 所获得的第一配置密码信息, 无线终端也验 证配置设备 70 获得了 自 己的第二配置密码信息。 需要说明的是, 具 体的验证方式可以有多种, 任何通过信息交互并进行匹配确认的验证 方式均适用于本发明实施例所述的验证过程, 本发明实施例所提供的 三种验证方式只是对验证过程的一个详细说明。 下面分别对上述三种 验证方式进行说明。 方法一:
A、 处理器 702 与无线终端均可以生成一个随机值, 分别为 Ra 和 Ea; 通信单元 703发送消息一, 消息一中包含 Ra; 并且通信单元 703 接收由无线终端发送的消息二, 消息二中包含 Ea 及无线终端利 用 Keyl加密消息二摘要得到的第一 MIC。
B、 处理器 702根据接收到的 Ea和自身生成的 Ra和第一配置密 码信息, 生成共享密钥 Key2 , 其中, 处理器 702生成 Key2的方式与 无线终端生成 Keyl 的方式相同,处理器 702使用 Key2以与无线终端 相同的方式生成第二 MIC , 并判断与第一 MIC是否匹配;
若不匹配, 则处理器 702结束配置交互过程。 示例性的, 若第二 MIC与第一 MIC不匹配, 则处理器 702判定 无线终端的第二配置密码信息与配置设备 70 获得的第一配置密码信 息不同, 并生成不匹配结果信息, 通信单元 703向无线终端发送不匹 配结果信息, 并且通信单元 703接收由无线终端向配置设备 70发送 的断开连接信息, 结束配置交互过程, 或者, 处理器 702可以直接结 束配置交互过程。
若匹配, 处理器 702利用 Key2加密消息三摘要生成第三 MIC; 并且通信单元 703向无线终端发送消息三; 示例性的, 若第二 MIC与第一 MIC 匹配成功, 则处理器 702判 定无线终端的第二配置密码信息与配置设备 70 获得的第一配置密码 信息相同。 处理器 702生成无线终端接入 AP的信任状信息。 通信单 元 703 向无线终端发送消息三, 消息三中包含利用 Key2加密消息三 摘要得到的第三 MIC及利用 Key2加密的无线终端接入 AP的信任状 信息和 AP 的设备标识信息, 以使得无线终端侧根据 Key2 生成第四 MIC 与第三 MIC 进行匹配。 需要说明的是, 本领域的技术人员可以 理解, 在发送信任状信息之前, 信任状信息的生成时间不具体限制;
C、 若无线终端侧的第三 MIC 与第四 MIC 匹配, 通信单元 703 接收无线终端发送的匹配成功信息。 需要说明的是, 本领域技术人员可以理解, AP 的标识信息相对 公开, 不一定需要对其进行加密, 例如 AP的标识信息明文带在消息 三中, 或者, 通过其他的消息进行发送。 本实施例中只是提供一种可 行的方法, 但并不以此为限。
方法二:
A、处理器 702生成随机值 Ra及无线终端接入 AP的信任状信息, 示例性的, 处理器 702可以将随机值 Ra及无线终端接入 AP的 信任状信息通过第一配置密码信息进行加密得到加密信息一。
B、 通信单元 703将加密信息一发送至无线终端, 需要说明的是, 本领域的技术人员可以理解, 在发送信任状信息之前, 信任状信息的 生成时间不具体限制。
C、 通信单元 703接收无线终端发送的加密消息二, 其中, 加密 消息二是无线终端通过第二配置密码信息将接收到的加密信息一进 行解密, 并将解密后的随机值 Wfl'通过第二配置密码信息加密后得到 的。
D、 处理器 702通过第一配置密码信息对接收到的加密信息二进 行解密, 并将解密后的随机值 α"与 自身生成的随机值 Ra进行匹配; 若两者不匹配, 处理器 702结束配置交互过程; 示例性的, 若 Wfl"与 Ra不匹配, 通信单元 703 向无线终端发送 断开连接信息, 结束配置交互过程, 或者直接结束配置交互过程。
若匹配, 处理器 702确认匹配成功, 通信单元 703向无线终端发 送 AP的设备标识信息。 需要说明的是, AP的设备标识信息也可以在 上述的验证过程中随信任状信息一起加密发送, 或者, AP 的设备标 识信息也可以在上述的验证过程中明文发送, 本发明实施例并不以此 为限。
方法三, 该验证方法的交互是基于现有的 WPS2.0协议中的消息 一至消息八的 EAP认证过程, 配置设备 70和无线终端可以通过 8个 消息 ( Ml ~ M8 ) 完成配置过程。 其中 Ml -M8消息为协议中的标准消 息, 其具体内容在此不再赘述。 具体过程如下:
A, 处理器 702和无线终端采用动态密钥交换算法协商出无线终 端与配置设备 70 之间的一组临时密钥, 用于对后续进行交互认证的 消息和重要数据如配置数据、 信任状信息等进行加密, 保证配置过程 的安全性;
示例性的, 本发明实施例优选使用 DH动态密钥交换算法, 并不 代表本发明实施例仅限于采用该动态密钥交换算法。
B , 处理器 702将第一配置密码信息分为前半部分与后半部分并 且分别进行加密, 优选的, 本发明实施例选择 AES 算法进行加密, 但并不代表本发明实施例仅限于该算法, 其中, 前半部分的加密信息 为 R1 , 后半部分的加密信息为 R2 , R1与 R2的加密密钥分别为 Rkl , Rk2 , 相应的, 无线终端将第二配置密码信息也分为前半部分与后半 部分并且与 Rl , R2相同的加密算法分别进行加密, 其中, 前半部分 的加密信息为 E 1 , 后半部分的加密信息为 E2 , E1 与 E2的加密密钥 分另 ll为 Ekl , Ek2 ,
C , 通信单元 703接收无线终端发送至配置设备 70的 E 1与 E2; 并且将加密的信息 Rl、 R2和 Rkl发送至无线终端, 以使得无线终端 能够根据 Rkl对第二配置密码信息前半部分以与 R1 ,R2相同的加密算 法进行加密, 如果加密的结果与 R1 相等, 则无线终端确认第一配置 密码信息与第二配置密码信息的前半部分匹配, 通信单元 703接收无 线终端发送的 Ekl ;
若加密的结果与 R1 不相等, 无线终端确认第一配置密码信息与 第二配置密码信息不匹配, 则结束配置交互过程,例如,通信单元 703 接收由无线终端向配置设备 70 发送的不匹配结果信息, 处理器 702 生成断开连接信息, 通信单元 703向无线终端发送断开连接信息, 结 束配置交互过程, 或者处理器 702直接结束配置交互过程。 D、 若确认第一配置密码信息与第二配置密码信息的前半部分匹 配, 通信单元 703将第二配置密码信息的后半部分加密密钥 Rk2发送 至无线终端;
示例性的, 处理器 702根据 Ekl对第一配置密码信息前半部分以 与 R1 ,R2相同的加密算法进行加密, 如果加密的结果与 E 1相等, 则 确认第一配置密码信息与第二配置密码信息的前半部分匹配, 并将第 二配置密码信息的后半部分加密密钥 Rk2发送至无线终端, 以使得无 线终端能够根据 Rk2对第二配置密码信息后半部分进行计算, 如果加 密的结果与 R2相等, 则无线终端确认第一配置密码信息与第二配置 密码信息的后半部分匹配, 并向配置设备 70发送 Ek2;
若加密的结果与 E l 不相等, 处理器 702确认第一配置密码信息 与第二配置密码信息不匹配, 则结束配置交互过程,例如,处理器 702 生成不匹配结果信息,通信单元 703向无线终端发送不匹配结果信息, 无线终端向无线终端发送断开连接信息, 结束配置交互过程, 或者处 理器 702直接结束配置交互过程。
E、 若确认第一配置密码信息与第二配置密码信息的后半部分匹 配,处理器 702生成无线终端接入 AP的信任状信息并且通信单元 703 无线终端发送无线终端接入 AP的信任状信息。
示例性的,验证后半部分的过程与验证前半部分 E1 的过程相同, 此处不再赘述。
示例性的, 信任状信息可以包含无线终端的认证信息, 以及 AP 与无线终端之间通信消息的加密与解密的密钥。
示例性的, 上述举例的三种验证方法对验证配置密码信息为 PIN 码、 NFC标签中的密码和多维码均适用, 本实施例对此不进行任何限 定。 在实际实现中, 方法一和方法二交互过程简单, 如需保证信息传 输的安全性, 需要配置密码信息具备较大的信息量, 例如对于数字型 的配置密码信息, 需要具备较长的位数。 不方便手动输入, 因此在实 际应用中优选使用非手动输入的获取方式, 例如通过 NFC 接口读取 NFC标签中的配置密码信息或使用图像传感器识读 QR Code 中编码 的配置密码信息的方式, 既能够保证配置设备 70 方便地获取配置密 码信息, 又能够保证配置密码信息拥有足够的信息量。 而对于输入
PIN码、 PBC等配置方式, 因配置密码信息的位数较短, 为保证其安 全性,应优选采用现有的 WPS2.0协议中的 EAP交互过程,即方法三。 本领域的技术人员可以理解, WPS2.0协议中的 EAP交互过程对于较 短位数的 PIN码有较好的安全性。
示例性的, 处理器 702 在验证成功时, 通信单元 703 可以通过 EAP消息向无线终端发送接入 AP的信任状信息和 AP的设备标识信 息, 以使得无线终端根据信任状信息和 AP的设备标识信息请求接入 AP ; 需要说明的是, 本领域技术人员可以理解, 信任状信息和 AP的 设备标识信息可以在验证过程结束后进行发送, 也可以同时在验证交 互消息中进行发送, 也可以作为验证过程的一部分, 作为验证成功与 否的判决条件之一, 本发明并不以此为限。 此外信任状信息和 AP的 设备标识信息可以同时发送, 也可以分开发送。
示例性的, 通信单元 703向 AP发送无线终端的信任状信息和无 线终端的设备标识信息, 以使得 AP根据无线终端的信任状信息和无 线终端的标识信息对无线终端接入 AP的请求进行处理; 需要说明的 是, 向 AP发送信任状信息和无线终端的标识信息的执行时间根据实 际配置需求确定。 例如, 在家庭网络中, 当 AP和无线终端均已安装 完成并上电工作时, 可以立即执行向 AP发送信任状信息和无线终端 的标识信息; 在传感器网络中, 因需要配置大量的传感器设备, 且传 感器设备安装后分布较零散, 不便于安装后配置, 因此需要在安装之 前批量配置, 可以在处理器 702对无线终端验证完成之后的较长时间 后执行。 本发明的实施例提供的一种配置无线终端的配置设备 70。 通过 配置设备 70 与无线终端的直接通信完成对无线终端的配置, 实现配 置过程无需 AP参与也能完成对无线终端的配置。 使得配置过程更加 灵活。 解决了现有技术在配置过程中都必须处于工作状态, 在 AP处 于不能正常通信的区域或者 AP处于离线状态时不能完成对无线终端 的配置的问题。
再一方面, 本发明实施例提供了另一种配置设备 70 , 该配置设 备 70可以应用于 Wi-Fi网络, Wi-Fi网络还可以包含无线接入设备以 及无线终端, 其中, 配置设备 70 可以为无线接入设备的配置管理设 备, 用以管理无线网络建立、 添加和删除无线终端; 无线接入设备为 无线终端进入网络的接入设备, 包括但不限于 AP , 本实施例以无线 接入设备为 AP为例进行说明, 例如无线终端可以通过 AP进入家庭 网络(局域网 )、 或者进入互联网、 也可以进入企业网或行业专网 (例 如智能传感网, 其中无线终端是传感器) 等。 本实施例中的配置设备 70根据其功能可以为现有的 WPS2.0规范中的定义 AP的外置注册器, 可以理解,所述配置设备 70并不限定为现有 WPS2.0规范中所定义的 外置注册器。
示例性的, 配置设备 70可以在初始无线局域网建立过程中与 AP 进行协商成为 AP的配置设备;
例如,配置设备 70可以根据 WPS规范的 EAP协议与 AP进行交 互, 成为 AP的配置设备, 当然, 若 WPS规范中配置设备与 AP进行 交互的协议改变, 改变后的协议也可以直接应用于本发明实施例。 配置设备 70还可以通过接收用户输入的 AP的配置参数成为 AP 的配置设备, 并用来配置后续其他需要加入的无线终端, 其交互过程 本领域技术人员十分熟悉, 在此不再赘述。
示例性的, 本实施例中配置设备 70与无线终端可以采用直接连 接的方式进行直接通信, 以完成配置设备 70 对无线终端的验证, 其 中, 直接连接的方式可以包括 P2P连接方式或 ad hoc连接方式, 本发 明实施例对配置设备与无线终端的直接连接的方式不进行限制。 优选 的, 本实施例中配置设备与无线终端采用 P2P连接方式。 其中, 配置 设备 70为 P2P连接中的 GO , 无线终端为 P2P连接中的 Client , 其 中配置设备 70与无线终端实现 P2P连接的过程已在方法实施例中进 行详细说明, 此处不再赘述。 参见图 8 , 该配置设备 70包括:
获取单元 801 , 用于获取无线终端的设备标识信息和配置密码信 息以及将无线终端的设备标识信息传输至第一发送单元 802 , 将无线 终端的第一配置密码信息传输至验证单元 803。
示例性的, 为了描述方便, 本实施例中将获取单元 801所获取到 的无线终端的配置密码信息称为第一配置密码信息, 将无线终端自身 所拥有的配置密码信息称为第二配置密码信息, 第一配置密码信息和 第二配置密码信息应该相同, 类型可以为 PIN或密码, 可以编码于多 维码、 存储于 NFC 标签、 以字符串显示于标签等, 例如, 无线终端 的多维码可以为静态多维码, 如标签打印的多维码, 或动态多维码, 如由无线终端动态生成的多维码; 多维码码制可以为任何可以识读的 一维条码、 二维条码码制, 例如 UPC、 QR Code等。 本发明并不以此 为限。 无线终端的配置密码信息可以静态存储于无线终端的 NFC 标 签内, 或是以某种方式动态生成后存储于无线终端的 NFC标签中。
无线终端的设备标识信息可以是能够唯一标识无线终端的任何 信息, 本实施例对此不进行限定, 例如, 可以为无线终端的 MAC地 址; 相应的, 获取单元 801 可以用于, 扫描所述无线终端设备上的多 维码获取配置密码信息以及无线终端的设备标识信息。 或者, 如图 9 , 获取单元 801 可以包括:
接收模块 901 , 用于接收无线终端的配置请求消息, 配置请求消 息包括无线终端的设备标识信息和使用 PIN方式的指示信息, 其中, 可以通过以下任一种方式接收无线终端的配置请求消息:
A、 接收模块 901 接收由无线终端在接收到配置设备 70 向外广 播的信标帧后向配置设备 70 发送的配置请求消息, 并向无线终端发 送探测回复, 从而获得无线终端的设备标识信息;
B、 接收模块 901接收到无线终端主动在各信道上发送的配置请 求消息, 并根据配置请求消息向无线终端发送探测回复, 从而获得无 线终端的设备标识信息;
PIN模块 902 , 用于接收用户输入的配置密码信息, 配置密码信 息包括无线终端的 PIN。
或者, 如图 10 , 获取单元 801 可以包括:
接收模快 1001 , 用于接收无线终端的配置请求消息, 配置请求 消息包括无线终端的设备标识信息和使用 PBC 方式的指示信息, 其 中,接收配置请求消息的过程与 PIN方式中配置请求消息的接收方法 相同, 此处不再赘述;
PBC模块 1002 , 用于通过与无线终端进行 PBC配置方式交互并 在交互过程中使用缺省的 PIN (例如 WPS规范中规定的 " 00000000" , 本发明实施例在此不做限定) 作为配置密码。
或者, 获取单元 801 可以用于, 通过 NFC接口读取无线终端的 配置密码信息以及无线终端的设备标识信息。
第一发送单元 802 , 用于从获取单元 801接收无线终端的设备标 识信息以及根据无线终端的设备标识信息通过直接连接的通信链路 向无线终端发送配置触发信息;
示例性的,第一发送单元 802可以采用广播包含无线终端的设备 标识信息的信标帧或者探测响应帧的方式向无线终端发送配置触发 信息, 用来触发对无线终端的验证, 根据实际的交互方式的不同, 配 置触发信息可以为任意由配置设备 70 发送的能够触发无线终端与其 进行配置消息交互的消息, 例如, 配置设备 70 根据无线终端的设备 标识信息向无线终端发送探测响应消息, 以触发无线终端向配置设备 70进行后续的配置消息交互。 本发明并不以此为限。
验证单元 803 , 用于从获取单元 801接收第一配置密码信息以及 根据第一配置密码信息通过直接连接的通信链路对无线终端进行验 证, 以确定无线终端拥有与第一配置密码信息相同的第二配置密码信 自 · 示例性的, 验证单元 803根据第一配置密码信息通过 EAP 消息 对无线终端进行验证。
第一发送单元 802还用于,通过直接连接的通信链路向无线终端 发送无线终端接入 AP 的信任状信息和 AP 的设备标识信息, 以使得 在验证成功后, 所述无线终端根据所述信任状信息和所述 AP的设备 标识信息请求接入所述 AP;
示例性的, 第一发送单元 802通过 EAP 消息向所述无线终端发 送所述无线终端接入 AP 的信任状信息和 AP 的设备标识信息。 本领 域技术人员可以理解, 信任状信息和 AP的设备标识信息可以在验证 过程结束后进行发送, 也可以同时在验证交互消息中进行发送, 也可 以作为验证过程的一部分, 作为验证成功与否的判决条件之一, 本发 明并不以此为限。 此外信任状信息和 AP的设备标识信息可以同时发 送, 也可以分开发送。
第二发送单元 804 , 用于从获取单元 801接收无线终端的设备标 识信息, 以及向 AP发送无线终端的信任状信息和无线终端的设备标 识信息, 以使得 AP根据无线终端的信任状信息和无线终端的设备标 识信息对无线终端接入 AP的请求进行处理;
示例性的, 向 AP发送信任状信息和无线终端的标识信息的执行 时间根据实际配置需求确定。 例如, 在家庭网络中, 当 AP和无线终 端均已安装完成并上电工作时, 可以立即执行向 AP发送信任状信息 和无线终端的标识信息; 在传感器网络中, 因需要配置大量的传感器 设备, 且传感器设备安装后分布较零散, 不便于安装后配置, 因此需 要在安装之前批量配置, 可以在验证单元 803对无线终端验证完成之 后的较长时间后执行。
示例性的,验证单元 803根据第一配置密码信息与无线终端进行 验证以确定无线终端拥有与第一配置密码信息相同的第二配置密码 信息,其中,验证单元 803可以对无线终端通过不同的验证方法进行, 以下将详细介绍三种验证方法的过程, 1、 验证单元 803 与无线终端 进行 4步握手进行双向验证, 即配置设备 70要验证无线终端拥有配 置设备 70所获得的第一配置密码信息, 无线终端也验证配置设备 70 获得了 自 己的第二配置密码信息; 2、 验证单元 803 单向验证无线终 端, 即配置设备 70 验证其获得的第一配置密码信息来自其进行配置 过程的无线终端; 3、 验证单元 803 与无线终端采用现有的 WPS2.0 中的 EAP认证过程进行双向验证, 即配置设备 70要验证无线终端拥 有配置设备 70 所获得的第一配置密码信息, 无线终端也验证配置设 备 70 获得了 自 己的第二配置密码信息。 需要说明的是, 具体的验证 方式可以有多种, 任何通过信息交互并进行匹配确认的验证方式均适 用于本发明实施例所述的验证过程, 本发明实施例所提供的三种验证 方式只是对验证过程的一个详细说明。 下面分别对上述三种验证方式 进行说明。 方法一:
A、 验证单元 803与无线终端均可以生成一个随机值, 分别为 Ra 和 Ea, 验证单元 803发送消息一, 消息一中包含 Ra; 并接收由无线 终端发送的消息二 Ea, 消息二中包含 Ea及无线终端利用 Keyl 加密 消息二摘要得到的第一 MIC。
B、 验证单元 803根据接收到的 Ea和自身生成的 Ra还有第一配 置密码信息, 生成共享密钥 Key2 , 其中, 验证单元 803生成 Key2的 方式与无线终端生成 Keyl 的方式相同,险证单元 803使用 Key2以与 无线终端相同的方式生成第二 MIC , 并与第一 MIC进行匹配;
若不匹配, 则结束配置交互过程。 示例性的, 若第二 MIC与第一 MIC不匹配, 则验证单元 803判 定无线终端的第二配置密码信息与配置设备 70 获得的第一配置密码 信息不同。 配置设备 70 可以向无线终端发送不匹配结果信息, 并接 收由无线终端发送的断开连接信息, 结束配置交互过程, 或者, 配置 设备 70直接结束配置交互过程。
若匹配,验证单元 803利用 Key2加密消息三摘要生成第三 MIC; 配置设备 70向无线终端发送消息三;
示例性的, 若第二 MIC与第一 MIC 匹配成功, 则验证单元 803 判定无线终端的第二配置密码信息与配置设备 70 获得的第一配置密 码信息相同。 配置设备 70生成无线终端接入 AP的信任状信息, 并向 无线终端发送消息三, 消息三中包含利用 Key2加密消息三摘要得到 的第三 MIC及利用 Key2加密的无线终端接入 AP的信任状信息和 AP 的设备标识信息, 以使得无线终端侧根据 Key2生成第四 MIC与第三 MIC进行匹配。 需要说明的是, 本领域的技术人员可以理解, 在发送 信任状信息之前, 信任状信息的生成时间不具体限制;
C、 若无线终端判断第三 MIC与第四 MIC 匹配, 无线终端向配 置设备 70发送匹配成功信息。 若无线终端判断第三 MIC与第四 MIC 不匹配, 则结束配置交互过程。 例如, 无线终端向配置设备 70 发送 不匹配结果信息, 配置设备 70 向无线终端发送断开连接信息, 结束 配置交互过程, 或者直接结束配置交互过程。 需要说明的是, 本领域技术人员可以理解, AP 的标识信息相对 公开, 不一定需要对其进行加密, 例如 AP的标识信息明文带在消息 三中, 或者, 通过其他的消息进行发送。 本实施例中只是提供一种可 行的方法, 但并不以此为限。 方法二:
A、验证单元 803生成随机值 Ra及无线终端接入 AP的信任状信 自 示例性的, 验证单元 803 可以将随机值 Ra及无线终端接入 AP 的信任状信息通过第一配置密码信息进行加密得到加密信息一。
B、 验证单元 803将加密信息一发送至无线终端, 需要说明的是, 本领域的技术人员可以理解, 在发送信任状信息之前, 信任状信息的 生成时间不具体限制。
C、 验证单元 803接收无线终端发送的加密消息二, 其中, 加密 消息二是无线终端通过第二配置密码信息将接收到的加密信息一进 行解密, 并将解密后的随机值 Wfl '通过第二配置密码信息加密后得到 的。
D、 验证单元 803通过第一配置密码信息对接收到的加密信息二 进行解密, 并将解密后的随机值 α "与自身生成的随机值 Ra 进行匹 配;
若不匹配, 配置设备 70结束配置交互过程;
示例性的, 若验证单元 803确认 Ra "与 Ra不匹配, 配置设备 70 向无线终端发送断开连接信息, 结束配置交互过程, 或者直接结束配 置交互过程。
若匹配, 验证单元 803确认匹配成功, 配置设备 70向无线终端 发送 AP的设备标识信息。 需要说明的是, AP的设备标识信息也可以 在上述的验证过程中随信任状信息一起加密发送, 或者, AP 的设备 标识信息也可以在上述的验证过程中明文发送, 本发明实施例并不以 此为限。
方法三 该验证方法的交互是基于现有的 WPS2.0协议中的消息一至消息 八的 EAP认证过程 ,配置设备 70和无线终端可以通过 8个消息( Ml ~ M8 ) 完成配置过程。 其中 M1 -M8消息为协议中的标准消息, 其具体 内容在此不再赘述。 具体过程如下:
A、 验证单元 803和无线终端采用动态密钥交换算法协商出无线 终端与配置设备 70 之间的一组临时密钥, 用于对后续进行交互认证 的消息和重要数据如配置数据、 信任状信息等进行加密, 保证配置过 程的安全性;
示例性的, 本发明实施例优选使用 DH动态密钥交换算法, 并不 代表本发明实施例仅限于采用该动态密钥交换算法。
B、 验证单元 803将第一配置密码信息分为前半部分与后半部分 并且分别进行加密, 优选的, 本发明实施例选择 AES算法进行加密, 但并不代表本发明实施例仅限于该算法, 其中, 前半部分的加密信息 为 R1 , 后半部分的加密信息为 R2 , R1与 R2的加密密钥分别为 Rkl , Rk2 , 相应的, 无线终端将第二配置密码信息也分为前半部分与后半 部分并且与 Rl , R2相同的加密算法分别进行加密, 其中, 前半部分 的加密信息为 E 1 , 后半部分的加密信息为 E2 , E1 与 E2的加密密钥 分另 ll为 Ekl , Ek2 ,
C、 验证单元 803接收无线终端发送至配置设备 70的 E 1与 E2; 并且将加密的信息 Rl、 R2和 Rkl发送至无线终端, 以使得无线终端 能够根据 Rkl对第二配置密码信息前半部分以与 R1 ,R2相同的加密算 法进行加密, 如果加密的结果与 R1 相等, 则无线终端确认第一配置 密码信息与第二配置密码信息的前半部分匹配, 验证单元 803接收无 线终端发送的 Ekl ;
若加密的结果与 R1 不相等, 无线终端确认第一配置密码信息与 第二配置密码信息不匹配, 则结束配置交互过程, 例如, 配置设备 70 接收无线终端发送的不匹配结果信息, 向无线终端发送断开连接信 息, 结束配置交互过程, 或者直接结束配置交互过程。
D、 若验证单元 803确认第一配置密码信息与第二配置密码信息 的前半部分匹配, 则将第二配置密码信息的后半部分加密密钥 Rk2发 送至无线终端;
示例性的, 验证单元 803根据 Ek †第一配置密码信息前半部分 以与 Rl ,R2相同的加密算法进行加密, 如果加密的结果与 E 1相等, 则确认第一配置密码信息与第二配置密码信息的前半部分匹配, 并将 第二配置密码信息的后半部分加密密钥 Rk2发送至无线终端, 以使得 无线终端能够根据 Rk2对第二配置密码信息后半部分以与 R1 ,R2相同 的加密算法进行加密, 如果加密的结果与 R2相等, 则无线终端确认 第一配置密码信息与第二配置密码信息的后半部分匹配, 并向配置设 备 70发送 Ek2;
若加密的结果与 E 1 不相等, 验证单元 803确认第一配置密码信 息与第二配置密码信息不匹配, 则结束配置交互过程, 例如, 配置设 备 70 可以向无线终端发送不匹配结果信息, 无线终端向无线终端发 送断开连接信息, 结束配置交互过程, 或者直接结束配置交互过程。
E、 若验证单元 803确认第一配置密码信息与第二配置密码信息 的后半部分匹配,配置设备 70生成无线终端接入 AP的信任状信息并 向无线终端发送。
示例性的,验证后半部分的过程与验证前半部分 E1 的过程相同, 此处不再赘述。
示例性的, 信任状信息可以包含无线终端的认证信息, 以及 AP 与无线终端之间通信消息的加密与解密的密钥。
示例性的, 上述举例的三种验证方法对验证配置密码信息为 PIN 码、 NFC标签中的密码和多维码均适用, 本实施例对此不进行任何限 定。 在实际实现中, 方法一和方法二交互过程简单, 如需保证信息传 输的安全性, 需要配置密码信息具备较大的信息量, 例如对于数字型 的配置密码信息, 需要具备较长的位数。 不方便手动输入, 因此在实 际应用中优选使用非手动输入的获取方式, 例如通过 NFC 接口读取 NFC标签中的配置密码信息或使用图像传感器识读 QR Code 中编码 的配置密码信息的方式, 既能够保证配置设备 70 方便地获取配置密 码信息, 又能够保证配置密码信息拥有足够的信息量。 而对于输入 PIN码、 PBC等配置方式, 因配置密码信息的位数较短, 为保证其安 全性,应优选采用现有的 WPS2.0协议中的 ΕΑΡ交互过程,即方法三。 本领域的技术人员可以理解, WPS2.0协议中的 ΕΑΡ交互过程对于较 短位数的 PIN码有较好的安全性。 本发明的实施例提供的一种配置无线终端的配置设备 70。 通过 配置设备 70 与无线终端的直接通信完成对无线终端的配置, 实现配 置过程无需 AP参与也能完成对无线终端的配置。 使得配置过程更加 灵活。 解决了现有技术在配置过程中都必须处于工作状态, 在 AP处 于不能正常通信的区域或者 AP处于离线状态时不能完成对无线终端 的配置的问题。
再一方面, 本发明实施例提供了一种无线终端 110 , 参见图 11 , 包括:
通信单元 1 101 , 通过直接连接的通信链路与外部网元进行通信; 示例性的, 通信单元 1101 通过直接连接的通信链路与外部网元 进行通信, 可以包括 P2P连接链路或 ad hoc连接链路, 本发明实施例 不作任何限定, 本实施例优选的通过 P2P连接链路与外部网元进行通 信, 其中, 无线终端 1 10为 P2P连接中的 Client, 配置设备为 P2P连 接中的 GO , 进一步的, 通信单元 1101还可以用于,
向配置设备发送鉴权请求消息, 并接收由配置设备向无线终端 110发送的鉴权响应消息,其中,鉴权响应消息包含允许无线终端 1 10 与配置设备进行连接的信息;
向配置设备发送关联请求消息, 并接收由配置设备向无线终端
110发送的关联响应消息,完成无线终端 110与配置设备的 P2P连接, 需要说明的是, 鉴权和关联过程是依据现有的 IEEE802.1 1 -2012 协议而设计的。 通信单元 1101 , 用于接收配置设备根据无线终端 1 10 的设备标 识信息发送的配置触发信息;
示例性的, 无线终端 1 10的设备标识信息由配置设备获取; 配置 触发信息是由配置设备通过探测响应帧或者信标帧向无线终端 110发 送的。 处理器 1102 , 用于与配置设备进行验证, 以使得配置设备确定 无线终端 110拥有配置密码信息,
示例性的, 配置密码信息由所述配置设备获取; 无线终端 110通 过 EAP消息与所述配置设备进行验证 通信单元 1101 , 还用于接收配置设备发送的无线终端 110 接入 AP的信任状信息以及 AP的标识信息,以使得在无线终端 1 10与配置 设备验证成功后, 无线终端 110根据信任状信息和 AP的设备标识信 息请求接入 AP。
示例性的,配置设备通过 EAP消息发送无线终端 110接入 AP的 信任状信息以及 AP的标识信息。 需要说明的是, 本领域技术人员可 以理解, 信任状信息和 AP的设备标识信息可以在验证过程结束后进 行接收, 也可以同时在验证交互消息中进行接收, 也可以作为验证过 程的一部分, 作为验证成功与否的判决条件之一, 本发明并不以此为 限。 此外信任状信息和 AP的设备标识信息可以同时接收, 也可以分 开接收。
示例性的, 为了描述方便, 本实施例中将配置设备所获取到的无 线终端 110的配置密码信息称为第一配置密码信息, 将无线终端 1 10 自身所拥有的配置密码信息称为第二配置密码信息, 第一配置密码信 息和第二配置密码信息应该相同, 类型可以为 PIN或密码, 可以编码 于多维码、 存储于 NFC 标签、 以字符串显示于标签等, 例如, 无线 终端 110的多维码可以为静态多维码, 如标签打印的多维码, 或动态 多维码, 如由无线终端 1 10动态生成的多维码; 多维码码制可以为任 何可以识读的一维条码、 二维条码码制, 例如 UPC、 QR Code等。 本 发明并不以此为限。 无线终端 1 10的配置密码信息可以静态存储于无 线终端 110 的 NFC标签内, 或是以某种方式动态生成后存储于无线 终端 110的 NFC标签中。
无线终端 1 10的设备标识信息可以是能够唯一标识无线终端 110 的任何信息, 本实施例对此不进行限定, 例如, 可以为无线终端 110 的 MAC地址。 示例性的, 通信单元 1101 用于, 向配置设备通过信标帧发送配 置请求消息, 配置请求消息可以包括无线终端 1 10的设备标识信息和 使用个人身份识别码 PIN方式的指示信息, 以使得配置设备根据配置 请求消息接收用户输入的配置密码信息, 配置密码信息包括无线终端 110 的 PIN , 或者, 配置请求消息包括无线终端 110 的设备标识信息 和使用按钮配置 PBC 方式的指示信息; 以使得配置设备通过与无线 终端 1 10 进行 PBC 配置方式的交互并在交互过程中使用缺省的 PIN 作为配置密码信息。
示例性的, 通信单元 1101 可以通过以下任一种方式向配置设备 发送配置请求消息:
A、 通信单元 1101 在接收到配置设备向外广播的信标帧后向配 置设备发送的配置请求消息;
B、 通信单元 1101主动在各信道上发送的配置请求消息。
示例性的, 处理器 1 102与配置设备进行验证, 以使得配置设备 确定无线终端 1 10拥有配置密码信息, 其中, 处理器 1102可以通过 不同的验证方法与配置设备进行验证, 以下将详细介绍三种验证方法 的过程, 需要说明的是, 具体的验证方式可以有多种, 任何通过信息 交互并进行匹配确认的验证方式均适用于本发明实施例所述的验证 过程, 本发明实施例所提供的三种验证方式只是对验证过程的一个详 细说明。
方法一:
A, 处理器 1 102与配置设备可以均生成一个随机值, 分别为 Ea 和 Ra, 通信单元 1101接收由配置设备发送的消息一, 消息一中包含 Ra; 并且通信单元 1 101 向配置设备发送消息二, 其中, 消息二包括 Ea及利用 Keyl加密消息二摘要得到的第一 MIC , 以使得配置设备以 与无线终端 1 10 生成 Keyl 的相同方式生成共享密钥 Key2 , 并使用 Key2以与无线终端 110相同的方式生成第二 MIC , 并且与第一 MIC 进行匹配。 若不匹配, 则结束配置交互过程, 通信单元 1101 接收由配置设 备发送的不匹配结果信息, 并且通信单元 1101 向配置设备发送断开 连接信息, 结束配置交互过程, 或者处理器 1 102 直接结束配置交互 过程。
若匹配, 通信单元 1 101 接收由配置设备发送的消息三, 其中, 消息三包括利用 Key2加密消息三摘要得到的第三 MIC及利用 Key2 加密的无线终端 110接入 AP的信任状信息和 AP的设备标识信息; 需要说明的是,本领域的技术人员可以理解,在发送信任状信息之前, 信任状信息的生成时间不具体限制;
B、 处理器 1102根据消息三生成第四 MIC, 并与第三 MIC匹配, 若匹配, 通信单元 1101 向配置设备发送匹配成功信息。 若不匹配, 则结束配置交互过程, 例如, 通信单元 1 101 向配置设备发送不匹配 结果信息, 配置设备向无线终端 110发送断开连接信息, 结束配置交 互过程, 或者处理器 1102直接结束配置交互过程。 需要说明的是, 本领域技术人员可以理解, AP 的标识信息相对 公开, 不一定需要对其进行加密, 例如 AP的标识信息明文带在消息 三中, 或者, 通过其他的消息进行发送。 本实施例中只是提供一种可 行的方法, 但并不以此为限。 方法二:
A、 通信单元 1101 接收由配置设备发送的加密信息一, 其中, 加密信息一是通过配置设备将随机值 Ra及无线终端 1 10接入 AP 的 信任状信息通过第一配置密码信息进行加密得到, 需要说明的是, 本 领域的技术人员可以理解, 在发送信任状信息之前, 信任状信息的生 成时间不具体限制。
B、 通信单元 1 101向配置设备发送加密消息二,
示例性的, 处理器 1 102通过第二配置密码信息将接收到的加密 信息一进行解密, 获得解密后的随机值 α' , 再将 α'通过第二配置 密码信息加密后得到加密消息二。
C、 配置设备根据第一配置密码信息将加密信息二进行解密, 获 得解密后的随机值 α" , 并将 Wfl"与 Ra进行匹配;
若不匹配, 则结束配置交互过程, 例如, 配置设备可以向无线终 端 1 10发送不匹配结果信息, 无线终端 110向配置设备发送断开连接 信息, 结束配置交互过程, 或者配置设备直接结束配置交互过程; 若匹配, 配置设备向无线终端 110发送 AP的设备标识信息。 需要说明的是, AP 的设备标识信息也可以在上述的验证过程中 随信任状信息一起加密发送, 或者, AP 的设备标识信息也可以在上 述的验证过程中明文发送, 本发明实施例并不以此为限。 方法三
该验证方法的交互是基于现有的 WPS2.0协议中的消息一至消息 八的 EAP 认证过程, 配置设备和无线终端 110 可以通过 8 个消息 ( Ml ~ M8 ) 完成配置过程。 其中 Ml -M8消息为协议中的标准消息 , 其具体内容在此不再赘述。 具体过程如下:
A, 处理器 1102 和配置设备采用动态密钥交换算法协商出无线 终端 110与配置设备之间的一组临时密钥, 用于对后续进行交互认证 的消息和重要数据如配置数据、 信任状信息等进行加密, 保证配置过 程的安全性;
示例性的, 本发明实施例优选使用 DH动态密钥交换算法, 并不 代表本发明实施例仅限于采用该动态密钥交换算法。
B,处理器 1102将第二配置密码信息分为前半部分与后半部分并 且分别进行加密, 优选的, 本发明实施例选择 AES 算法进行加密, 但并不代表本发明实施例仅限于该算法, 其中, 前半部分的加密信息 为 E1, 后半部分的加密信息为 E2, E1与 E2的加密密钥分别为 Ekl, Ek2, 并且指示通信单元 1101 向配置设备发送 El 与 E2, 相应的, 配 置设备也将第一配置密码信息分为前半部分与后半部分并且与 E1, E2相同的加密算法分别进行加密, 其中, 前半部分的加密信息为 R1, 后半部分的加密信息为 R2, R1与 R2的加密密钥分别为 Rkl, Rk2
C, 通信单元 1101接收配置设备发送的 Rl、 R2和 Rkl, 并根据 Rkl对第二配置密码信息前半部分以与 El, E2相同的加密算法进行加 密, 如果加密的结果与 R1相等, 则无线终端 110确认第一配置密码 信息与第二配置密码信息的前半部分匹配, 通信单元 1101 向配置设 备发送 Ekl。 若加密的结果与 Rl不相等,处理器 1102确认第一配置密码信息 与第二配置密码信息不匹配, 则结束配置交互过程, 例如, 通信单元 1101向配置设备发送不匹配结果信息,并接收由配置设备发送的断开 连接信息, 结束配置交互过程, 或者处理器 1 102 直接结束配置交互 过程。
D、 配置设备判断第一配置密码信息与第二配置密码信息的前半 部分是否匹配。
若匹配, 配置设备向无线终端 110发送 Rk2 ,
若不匹配, 则结束配置交互过程, 例如, 配置设备向无线终端 110发送不匹配结果信息, 无线终端 110向配置设备发送断开连接信 息, 结束配置交互过程, 或者直接结束配置交互过程。
E、 通信单元 1101 接收配置设备发送的 Rk2 , 处理器 1 102根据 Rk2 判断第一配置密码信息与第二配置密码信息的后半部分是否匹 配。
若匹配, 通信单元 1 101向配置设备发送 Ek2 ,
若不匹配, 则结束配置交互过程, 例如, 通信单元 1 101 向配置 设备发送不匹配结果信息, 并接收由配置设备发送的断开连接信息, 结束配置交互过程, 或者直接结束配置交互过程。
F、 配置设备判断第一配置密码信息与第二配置密码信息的后半 部分是否匹配,
若匹配, 配置设备向无线终端 1 10发送无线终端 110接入 AP的 信任状信息, 示例性的, 信任状信息可以包含无线终端 110的认证信 息, 以及 AP与无线终端 1 10之间通信消息的加密与解密的密钥。
若不匹配, 则结束配置交互过程, 例如, 配置设备向无线终端 110发送不匹配结果信息, 无线终端 110向配置设备发送断开连接信 息, 结束配置交互过程, 或者直接结束配置交互过程。 示例性的, 上述举例的三种验证方法对验证配置密码信息为 PIN 码、 NFC标签中的密码和多维码均适用, 本实施例对此不进行任何限 定。 在实际实现中, 方法一和方法二交互过程简单, 如需保证信息传 输的安全性, 需要配置密码信息具备较大的信息量, 例如对于数字型 的配置密码信息, 需要具备较长的位数。 不方便手动输入, 因此在实 际应用中优选使用非手动输入的获取方式, 例如通过 NFC 接口读取 NFC标签中的配置密码信息或使用图像传感器识读 QR Code 中编码 的配置密码信息的方式, 既能够保证配置设备方便地获取配置密码信 息,又能够保证配置密码信息拥有足够的信息量。而对于输入 PIN码、 PBC等配置方式, 因配置密码信息的位数较短, 为保证其安全性, 应 优选采用现有的 WPS2.0协议中的 EAP交互过程, 即方法三。 本领域 的技术人员可以理解, WPS2.0协议中的 EAP交互过程对于较短位数 的 PIN码有较好的安全性。 本发明的实施例提供的一种配置无线终端的无线终端 1 10。 通过 无线终端 110与配置设备的直接通信完成对无线终端 110的配置, 实 现配置过程无需 AP参与也能完成对无线终端 1 10的配置。 使得配置 过程更加灵活。 解决了现有技术在配置过程中都必须处于工作状态, 在 AP处于不能正常通信的区域或者 AP处于离线状态时不能完成对 无线终端 1 10的配置的问题。
再一方面, 本发明实施例提供了一种无线终端 1 10 , 该无线终端 110与配置设备可以采用直接连接的方式进行直接通信, 以完成与配 置设备进行验证, 其中, 直接连接的方式可以包括 P2P 连接方式或 ad hoc连接方式, 本发明实施例对无线终端与配置设备的直接连接的 方式不进行限制。 优选的, 本实施例中配置设备与无线终端采用 P2P 连接方式。 其中, 无线终端 1 10为 P2P连接中的 Client , 配置设备为 P2P连接中的 GO , 具体实现 P2P连接的过程已在方法实施例中进行 详细说明, 此处不再赞述, 参见图 12 , 该无线终端 110包括:
接收单元 1201 , 用于通过直接连接的通信链路接收配置设备根 据无线终端 110的设备标识信息发送的配置触发信息,
示例性的, 无线终端 1 10的设备标识信息由配置设备获取; 配置 设备可以通过信标帧或者探测响应帧向无线终端 110发送配置触发信 验证单元 1202 , 用于通过直接连接的通信链路与配置设备进行 验证, 以使得配置设备确定无线终端 1 10拥有配置密码信息,
示例性的, 配置密码信息由配置设备获取; 验证单元 1202 可以 通过 EAP消息与所述配置设备进行验证 示例性的, 为了描述方便, 本实施例中将配置设备所获取到的无 线终端 110的配置密码信息称为第一配置密码信息, 将无线终端 1 10 自身所拥有的配置密码信息称为第二配置密码信息, 第一配置密码信 息和第二配置密码信息应该相同, 类型可以为 PIN或密码, 可以编码 于多维码、 存储于 NFC 标签、 以字符串显示于标签等, 例如, 无线 终端 110的多维码可以为静态多维码, 如标签打印的多维码, 或动态 多维码, 如由无线终端 1 10动态生成的多维码; 多维码码制可以为任 何可以识读的一维条码、 二维条码码制, 例如 UPC、 QR Code等。 本 发明并不以此为限。 无线终端 1 10的配置密码信息可以静态存储于无 线终端 110 的 NFC标签内, 或是以某种方式动态生成后存储于无线 终端 110的 NFC标签中。
无线终端 1 10的设备标识信息可以是能够唯一标识无线终端 110 的任何信息, 本实施例对此不进行限定, 例如, 可以为无线终端 110 的 MAC地址。
接收单元 1201 还用于, 通过直接连接的通信链路接收配置设备 发送的无线终端 110接入 AP 的信任状信息以及 AP的标识信息, 以 使得在无线终端 110与配置设备验证成功后, 无线终端 110根据信任 状信息和 AP的设备标识信息请求接入 AP。
示例性的, 接收单元 1201可以接收配置设备通过 EAP消息发送 的无线终端 1 10接入 AP的信任状信息以及 AP的标识信息, 本领域 技术人员可以理解, 信任状信息和 AP的设备标识信息可以在验证过 程结束后进行接收, 也可以同时在验证交互消息中进行接收, 也可以 作为验证过程的一部分, 作为验证成功与否的判决条件之一, 本发明 并不以此为限。此外信任状信息和 AP的设备标识信息可以同时接收, 也可以分开接收。
示例性的, 参见图 13 , 无线终端 110还包括发送单元 1203 , 用 于向所述配置设备发送配置请求消息, 其中, 配置请求消息包括无线终端 110的设备标识信息和使用个 人身份识别码 PIN方式的指示信息, 以使得配置设备根据配置请求消 息接收用户输入的所述配置密码信息, 配置密码信息包括所述无线终 端 1 10的 PIN; 或者, 配置请求消息包括无线终端 110的设备标识信 息和使用 PBC方式的指示信息; 以使得配置设备通过与无线终端 110 进行 PBC 配置方式的交互并在交互过程中使用缺省的 PIN作为配置 密码信息。
示例性的, 发送单元 1203 可以通过以下任一种方式向配置设备 发送配置请求消息:
A、 发送单元 1203 在接收到配置设备向外广播的信标帧后向配 置设备发送的配置请求消息;
B、 发送单元 1203主动在各信道上发送的配置请求消息。
示例性的, 验证单元 1202与配置设备进行验证, 验证单元 1202 可以通过不同的验证方法与配置设备进行验证, 以下将详细介绍三种 验证方法的过程, 需要说明的是, 具体的验证方式可以有多种, 任何 通过信息交互并进行匹配确认的验证方式均适用于本发明实施例所 述的验证过程, 本发明实施例所提供的三种验证方式只是对验证过程 的一个详细说明。
方法一:
A, 验证单元 1202 与配置设备可以均生成一个随机值, 分别为 Ea和 Ra, 验证单元 1202接收由配置设备发送的消息一, 消息一中包 含 Ra; 并指示通信单元 1101 向配置设备发送消息二, 其中, 消息二 包括 Ea及利用 Keyl加密消息二摘要得到的第一 MIC ,以使得配置设 备以与无线终端 110生成 Keyl 的相同方式生成共享密钥 Key2 , 并使 用 Key2以与无线终端 1 10相同的方式生成第二 MIC ,并且与第一 MIC 进行匹配。 若不匹配, 验证单元 1202接收由配置设备发送的不匹配结果信 息, 并向配置设备发送断开连接信息, 结束配置交互过程, 或者直接 结束配置交互过程。 若匹配, 验证单元 1202接收由配置设备发送的消息三, 其中, 消息三包括利用 Key2加密消息三摘要得到的第三 MIC及利用 Key2 加密的无线终端 1 1 0接入 AP的信任状信息和 AP的设备标识信息; 需要说明的是,本领域的技术人员可以理解,在发送信任状信息之前, 信任状信息的生成时间不具体限制;
B、 验证单元 1202根据消息三生成第四 MIC , 并与第三 MIC 匹 配。
若匹配, 验证单元 1202向配置设备发送匹配成功信息。
若不匹配, 无线终端 1 10向配置设备发送不匹配结果信息, 并接 收配置设备发送的断开连接信息, 结束配置交互过程, 或者直接结束 配置交互过程。
需要说明的是, 本领域技术人员可以理解, AP 的标识信息相对 公开, 不一定需要对其进行加密, 例如 AP的标识信息明文带在消息 三中, 或者, 通过其他的消息进行发送。 本实施例中只是提供一种可 行的方法, 但并不以此为限。 方法二:
A、 验证单元 1202接收由配置设备发送的加密信息一, 示例性的, 加密信息一由配置设备将随机值 Ra及无线终端 1 1 0 接入 AP的信任状信息通过第一配置密码信息进行加密得到, 需要说 明的是, 本领域的技术人员可以理解, 在发送信任状信息之前, 信任 状信息的生成时间不具体限制。
B、 验证单元 1202向配置设备发送加密消息二,
示例性的, 验证单元 1202通过第二配置密码将接收到的加密信 息一进行解密,获得解密后的随机值 R i,,再将解密后的随机值 α '通 过第二配置密码信息加密后得到加密消息二。
C、 配置设备根据第一配置密码信息将加密信息二进行解密, 获 得解密后的随机值 α " , 并将 Wfl "与 Ra进行匹配;
若不匹配, 则结束配置交互过程, 例如, 配置设备可以向无线终 端 1 10发送不匹配结果信息, 无线终端 1 10向配置设备发送断开连接 信息, 结束配置交互过程, 或者配置设备直接结束配置交互过程; 若匹配, 配置设备向无线终端 110发送 AP的设备标识信息。 方法三
该验证方法的交互是基于现有的 WPS2.0协议中的消息一至消息 八的 EAP认证过程, 配置设备和无线终端可以通过 8个消息 ( Ml ~ M8) 完成配置过程。 其中 M1-M8消息为协议中的标准消息, 其具体 内容在此不再赘述。 具体过程如下:
A, 验证单元 1202 和配置设备采用动态密钥交换算法协商出无 线终端 110与配置设备之间的一组临时密钥, 用于对后续进行交互认 证的消息和重要数据如配置数据、 信任状信息等进行加密, 保证配置 过程的安全性;
示例性的, 本发明实施例优选使用 DH动态密钥交换算法, 并不 代表本发明实施例仅限于采用该动态密钥交换算法。
B,验证单元 1202将第二配置密码信息分为前半部分与后半部分 并且分别进行加密优选的, 本发明实施例选择 AES 算法进行加密, 但并不代表本发明实施例仅限于该算法, 其中, 前半部分的加密信息 为 E1, 后半部分的加密信息为 E2, E1与 E2的加密密钥分别为 Ekl, Ek2, 并且向配置设备发送 El与 E2, 相应的, 配置设备也将第一配置 密码信息分为前半部分与后半部分并且与 El, E2相同的加密算法分 别进行加密, 其中, 前半部分的加密信息为 R1, 后半部分的加密信 息为 R2, R1与 R2的加密密钥分别为 Rkl, Rk2
C, 验证单元 1202接收配置设备发送的 Rl、 R2和 Rkl, 并根据 Rkl对第二配置密码信息前半部分与 El, E2 相同的加密算法进行加 密, 如果加密的结果与 R1相等, 则无线终端 110确认第一配置密码 信息与第二配置密码信息的前半部分匹配, 验证单元 1202 向配置设 备发送 Ekl
若加密的结果与 R1不相等,验证单元 1202确认第一配置密码信 息与第二配置密码信息不匹配, 则结束配置交互过程, 例如, 无线终 端 110向配置设备发送不匹配结果信息, 并接收由配置设备发送的断 开连接信息, 结束配置交互过程, 或者直接结束配置交互过程。 D、 配置设备判断第一配置密码信息与第二配置密码信息的前半 部分是否匹配。
若匹配, 配置设备向无线终端 110发送 Rk2 ,
若不匹配, 则结束配置交互过程, 例如, 配置设备向无线终端 110发送不匹配结果信息, 无线终端 110向配置设备发送断开连接信 息, 结束配置交互过程, 或者直接结束配置交互过程。
E、 无线终端 110接收配置设备发送的 Rk2 , 验证单元 1202根据 Rk2 判断第一配置密码信息与第二配置密码信息的后半部分是否匹 配。
若匹配, 验证单元 1202向配置设备发送 Ek2 ,
若不匹配, 则结束配置交互过程, 例如, 无线终端 1 10向配置设 备发送不匹配结果信息, 并接收由配置设备发送的断开连接信息, 结 束配置交互过程, 或者直接结束配置交互过程。
F、 配置设备判断第一配置密码信息与第二配置密码信息的后半 部分是否匹配,
若匹配, 配置设备向无线终端 1 10发送无线终端 110接入 AP的 信任状信息, 示例性的, 信任状信息可以包含无线终端 110的认证信 息, 以及 AP与无线终端 1 10之间通信消息的加密与解密的密钥。
若不匹配, 则结束配置交互过程, 例如, 配置设备向无线终端 110发送不匹配结果信息, 无线终端 110向配置设备发送断开连接信 息, 结束配置交互过程, 或者直接结束配置交互过程。 示例性的, 上述举例的三种验证方法对验证配置密码信息为 PIN 码、 NFC标签中的密码和多维码均适用, 本实施例对此不进行任何限 定。 在实际实现中, 方法一和方法二交互过程简单, 如需保证信息传 输的安全性, 需要配置密码信息具备较大的信息量, 例如对于数字型 的配置密码信息, 需要具备较长的位数。 不方便手动输入, 因此在实 际应用中优选使用非手动输入的获取方式, 例如通过 NFC 接口读取 NFC标签中的配置密码信息或使用图像传感器识读 QR Code 中编码 的配置密码信息的方式, 既能够保证配置设备方便地获取配置密码信 息,又能够保证配置密码信息拥有足够的信息量。而对于输入 PIN码、 PBC等配置方式, 因配置密码信息的位数较短, 为保证其安全性, 应 优选采用现有的 WPS2.0协议中的 EAP交互过程, 即方法三。 本领域 的技术人员可以理解, WPS2.0协议中的 EAP交互过程对于较短位数 的 PIN码有较好的安全性。 本发明的实施例提供的一种配置无线终端的无线终端 110。 通过 无线终端 110与配置设备的直接通信完成对无线终端 110的配置, 实 现配置过程无需 AP参与也能完成对无线终端 1 10的配置。 使得配置 过程更加灵活。 解决了现有技术在配置过程中都必须处于工作状态, 在 AP处于不能正常通信的区域或者 AP处于离线状态时不能完成对 无线终端 1 10的配置的问题。
再一方面, 本发明实施例提供了一种配置无线终端的系统, 参见 图 14 , 该系统可以包括: 上述任一实施例的配置设备 70 以及上述任 一实施例的无线终端 110。 示例性的, 参见图 15 , 该系统还可以包括,
无线接入设备 150 , 用于接收配置设备 70 发送的无线终端 110 的信任状信息和无线终端 110的标识信息, 以及根据无线终端 1 10的 信任状信息和无线终端 110的标识信息对无线终端 1 10接入无线接入 设备的请求进行处理。 本发明的实施例提供的一种配置无线终端的系统, 通过配置设备 70与无线终端 110的直接通信完成对无线终端 110的配置,实现配置 过程无需无线接入设备 150参与也能完成对无线终端 1 10的配置。 使 得配置过程更加灵活。 解决了现有技术在配置过程中都必须处于工作 状态, 在无线接入设备 150处于不能正常通信的区域或者无线接入设 备 150处于离线状态时不能完成对无线终端 70的配置的问题。
在本申请所提供的几个实施例中, 应该理解到, 所揭露的系统, 装置和方法, 可以通过其它的方式实现。 例如, 以上所描述的装置实 施例仅仅是示意性的, 例如, 所述单元的划分, 仅仅为一种逻辑功能 划分, 实际实现时可以有另外的划分方式, 例如多个单元或组件可以 结合或者可以集成到另一个系统, 或一些特征可以忽略, 或不执行。 另一点, 所显示或讨论的相互之间的耦合或直接耦合或通信连接可以 是通过一些接口, 装置或单元的间接耦合或通信连接, 可以是电性, 机械或其它的形式。 所述作为分离部件说明的单元可以是或者也可以不是物理上分 开的, 作为单元显示的部件可以是或者也可以不是物理单元, 即可以 位于一个地方, 或者也可以分布到多个网络单元上。 可以根据实际的 需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外, 在本发明各个实施例中的各功能单元可以集成在一个处理 单元中, 也可以是各个单元单独物理包括, 也可以两个或两个以上单 元集成在一个单元中。 上述集成的单元既可以采用硬件的形式实现, 也可以采用硬件加软件功能单元的形式实现。
上述以软件功能单元的形式实现的集成的单元, 可以存储在一个 计算机可读取存储介质中。 上述软件功能单元存储在一个存储介质 中, 包括若干指令用以使得一台计算机设备 (可以是个人计算机, 服 务器,或者网络设备等)执行本发明各个实施例所述方法的部分步骤。 而前述的存储介质包括: U 盘、 移动硬盘、 只读存储器 ( Read-Only Memory , 简称 ROM )、 随机存取存储器 ( Random Access Memory , 简称 RAM )、 磁碟或者光盘等各种可以存储程序代码的介质。
最后应说明的是: 以上实施例仅用以说明本发明的技术方案, 而 非对其限制; 尽管参照前述实施例对本发明进行了详细的说明, 本领 域的普通技术人员应当理解: 其依然可以对前述各实施例所记载的技 术方案进行修改, 或者对其中部分技术特征进行等同替换; 而这些修 改或者替换, 并不使相应技术方案的本质脱离本发明各实施例技术方 案的精神和范围。

Claims

权 利 要 求 书
1、 一种配置无线终端的方法, 其特征在于, 配置设备与无线终 端之间直接连接, 包括:
所述配置设备获取所述无线终端的设备标识信息和配置密码信 自 ·
所述配置设备根据所述无线终端的设备标识信息向所述无线终 端发送配置触发信息;
所述配置设备根据所述配置密码信息与所述无线终端进行验证, 以确定所述无线终端拥有所述配置密码信息;
所述配置设备向所述无线终端发送所述无线终端接入无线接入 设备的信任状信息和所述无线接入设备的设备标识信息, 以使得在验 证成功后, 所述无线终端根据所述信任状信息和所述无线接入设备的 设备标识信 , 请求接入所述无线接入设备;
所述配置设备向所述无线接入设备发送所述信任状信息和所述 无线终端的设备标识信息, 以使得所述无线接入设备根据所述信任状 信息和所述无线终端的设备标识信息对所述无线终端接入所述无线 接入设备的请求进行处理。
2、 根据权利要求 1 所述的配置无线终端的方法, 其特征在于, 所述配置设备获取所述无线终端的设备标识信息和配置密码信息, 包 括,
所述配置设备通过扫描所述无线终端设备的多维码获取所述配 置密码信息以及所述无线终端的设备标识信息。
3、 根据权利要求 1 所述的配置无线终端的方法, 其特征在于, 所述配置设备获取所述无线终端的设备标识信息和配置密码信息, 包 括,
所述配置设备接收所述无线终端发送的配置请求消息,所述配置 请求消息包括所述无线终端的设备标识信息和使用个人身份识另 'J码 PIN方式的指示信息;
所述配置设备接收用户输入的所述配置密码信息,所述配置密码 信息包括所述无线终端的 PIN。
4、 根据权利要求 1 所述的配置无线终端的方法, 其特征在于, 所述配置设备获取所述无线终端的设备标识信息和配置密码信息, 包 括,
所述配置设备接收所述无线终端发送的配置请求消息,所述配置 请求消息包括所述无线终端的设备标识信息和使用按钮配置 PBC 方 式的指示信息;
所述配置设备通过与无线终端进行 PBC 配置方式的交互并在交 互过程中使用缺省的 PIN作为配置密码信息。
5、 根据权利要求 1 所述的配置无线终端的方法, 其特征在于, 所述配置设备获取所述无线终端的设备标识信息和配置密码信息, 包 括,
所述配置设备通过近场通信 NFC接口读取所述无线终端的配置 密码信, I,以及所述无线终端的设备标识信息。
6、 根据权利要求 1 -5 任一项所述的配置无线终端的方法, 其特 征在于, 所述配置设备与所述无线终端之间直接连接的方式包括临时 网络 ad hoc连接。
7、 根据权利要求 1 -5 任一项所述的配置无线终端的方法, 其特 征在于, 所述直接连接的方式包括点对点 P2P连接。
8、 根据权利要求 7所述的配置无线终端的方法, 其特征在于, 所述配置设备根据所述无线终端的设备标识信息向所述无线终端发 送配置触发信息包括,
所述配置设备根据所述无线终端的设备标识信息通过探测响应 帧或者信标帧向所述无线终端发送配置触发信息。
9、 根据权利要求 7或 8所述的配置无线终端的方法, 其特征在 于, 所述配置设备根据所述配置密码信息与所述无线终端进行验证包 括,
所述配置设备根据所述配置密码信息通过扩展认证协议 EAP 消 息与所述无线终端进行验证。
10、 根据权利要求 7-9任一项所述的配置无线终端的方法, 其特 征在于,
所述配置设备向所述无线终端发送所述无线终端接入无线接入 设备的信任状信息和所述无线接入设备的设备标识信息包括,
所述配置设备通过所述 EAP 消息向所述无线终端发送所述无线 终端接入无线接入设备的信任状信息和所述无线接入设备的设备标 识信息。
11、 一种配置无线终端的方法, 其特征在于, 无线终端与配置设 备之间直接连接, 包括:
所述无线终端接收所述配置设备根据所述无线终端的设备标识 信息发送的配置触发信息;
所述无线终端与所述配置设备进行验证, 以使得所述配置设备确 定所述无线终端拥有配置密码信息;
所述无线终端接收所述配置设备发送的所述无线终端接入无线 接入设备的信任状信 , 以及所述无线接入设备的标识信息, 以使得在 验证成功后, 所述无线终端根据所述信任状信息和所述无线接入设备 的设备标识信 , 请求接入所述无线接入设备。
12、 根据权利要求 11所述的配置无线终端的方法, 其特征在于, 在所述无线终端接收所述配置设备根据所述无线终端的设备标识信 息发送的配置触发信息之前, 所述方法还包括:
所述无线终端向所述配置设备发送配置请求消息,所述配置请求 消息包括所述无线终端的设备标识信息和使用个人身份识别码 PIN 方式的指示信息, 以使得所述配置设备根据所述配置请求消息接收用 户输入的所述配置密码信息, 所述配置密码信息包括所述无线终端的 PIN。
13、 根据权利要求 11所述的配置无线终端的方法, 其特征在于, 在所述无线终端接收所述配置设备根据所述无线终端的设备标识信 息发送的配置触发信息之前, 所述方法还包括:
所述无线终端向所述配置设备发送配置请求消息,所述配置请求 消息包括所述无线终端的设备标识信息和使用按钮配置 PBC 方式的 指示信息; 以使得所述配置设备通过与无线终端进行 PBC 配置方式 的交互并在交互过程中使用缺省的 PIN作为配置密码信息。
14、 根据权利要求 1 1 - 13任一项所述的配置无线终端的方法, 其 特征在于, 所述直接连接方式包括临时网络 ad hoc连接。
15、 根据权利要求 1 1 - 13任一项所述的配置无线终端的方法, 其 特征在于, 所述直接连接的方式包括点对点 P2P连接。
16、 根据权利要求 15所述的配置无线终端的方法, 其特征在于, 所述无线终端接收所述配置设备根据所述无线终端的设备标识信息 发送的配置触发信息包括,
所述无线终端接收所述配置设备根据所述无线终端的设备标识 信息通过探测响应帧或者信标帧发送的配置触发信息。
17、 根据权利要求 15或 16所述的配置无线终端的方法, 其特征 在于, 所述无线终端与所述配置设备进行验证包括:
所述无线终端通过扩展认证协议 EAP 消息与所述配置设备进行 验证。
1 8、 根据权利要求 15- 17任一项所述的配置无线终端的方法, 其 特征在于, 所述无线终端接收所述配置设备发送的所述无线终端接入 无线接入设备的信任状信 , 以及所述无线接入设备的标识信息包括, 所述无线终端接收所述配置设备通过所述 EAP 消息发送的所述 无线终端接入无线接入设备的信任状信息以及所述无线接入设备的 标识信息。
19、 一种配置设备, 其特征在于, 包括,
获取器,用于获取配置密码信息以及将所述配置密码信息传输至 处理器;
处理器, 用于根据所述配置密码信息生成配置触发信息; 以及用于根据所述配置密码信息与所述无线终端进行验证以确 定所述无线终端拥有所述配置密码信息;
通信单元, 通过直接连接的通信链路与外部网元进行通信, 用于 向所述无线终端发送配置触发信息;
以及向所述无线终端发送接入无线接入设备的信任状信息和所 述无线接入设备的设备标识信息, 以使得在验证成功后, 所述无线终 端根据所述信任状信息和所述无线接入设备的设备标识信 , 请求接 入所述无线接入设备;
以及向所述无线接入设备发送所述无线终端的信任状信 , 和所 述无线终端的设备标识信息, 以使得所述无线接入设备根据所述无线 终端的信任状信息和所述无线终端的标识信息对所述无线终端接入 所述无线接入设备的请求进行处理。
20、 根据权利要求 19所述的配置设备, 其特征在于, 所述获取 器包括多维码扫描器, 用于扫描所述无线终端设备的多维码获取所述 配置密码信息以及所述无线终端的设备标识信息。
21、 根据权利要求 19所述的配置设备, 其特征在于, 所述通信单元还用于, 接收所述无线终端发送的配置请求消息, 所述配置请求消息包括所述无线终端的设备标识信息和使用个人身 份识别码 PIN方式的指示信息;
所述获取器包括键盘,用于接收用户输入的所述无线终端的配置 密码信息, 所述配置密码信息包括所述无线终端的个人身份识别码 PIN。
22、 根据权利要求 19所述的配置设备, 其特征在于,
所述通信单元还用于, 接收所述无线终端发送的配置请求消息, 所述配置请求消息包括所述无线终端的设备标识信息和使用按钮配 置 PBC方式的指示信息;
所述获取器包括按钮配置 PBC 按钮, 用于与所述无线终端进行 PBC 配置方式的交互并在交互过程中使用缺省的 PIN 作为配置密码 信息。
23、 根据权利要求 19所述的配置设备, 其特征在于, 所述获取 器包括近场通信 NFC 接口, 用于读取所述无线终端的配置密码信息 以及所述无线终端的设备标识信息。
24、 根据权利要求 19-23任一项所述的配置设备, 其特征在于, 所述通信单元通过直接连接的通信链路与外部网元进行通信包括, 所 述通信单元通过临时网络 ad hoc连接链路与外部网元进行通信。
25、 根据权利要求 19-23任一项所述的配置设备, 其特征在于, 所述通信单元通过点对点 P2P连接链路与外部网元进行通信。
26、 根据权利要求 25 所述的配置设备, 其特征在于, 所述配置 触发信息包括探测响应帧或者信标帧。
27、根据权利要求 25或 26任一项所述的配置设备,其特征在于, 所述根据所述配置密码信息与所述无线终端进行验证以确定所述无 线终端拥有所述配置密码信息, 具体包括:
根据所述配置密码信息通过扩展认证协议 EAP 消息与所述无线 终端进行验证。
28、 根据权利要求 27所述的配置设备, 其特征在于, 所述向所 述无线终端发送接入无线接入设备的信任状信息和所述无线接入设 备的设备标识信息, 具体包括: 通过所述 EAP 消息向所述无线终端 发送接入无线接入设备的信任状信息和所述无线接入设备的设备标 识信息。
29、 一种配置设备, 其特征在于, 所述配置设备包括,
获取单元,用于获取所述无线终端的设备标识信息和配置密码信 , ¾以及将所述无线终端的设备标识信息传输至第一发送单元, 将所述 无线终端的配置密码信息传输至验证单元;
第一发送单元,用于从获取单元接收所述无线终端的设备标识信 息以及根据所述无线终端的设备标识信息通过直接连接的通信链路 向所述无线终端发送配置触发信息;
验证单元, 用于从所述获取单元接收所述配置密码信息, 以及根 据所述配置密码信息通过直接连接的通信链路与所述无线终端进行 验证, 以确定所述无线终端拥有所述配置密码信息;
所述第一发送单元还用于,通过直接连接的通信链路向所述无线 终端发送所述无线终端接入无线接入设备的信任状信息和所述无线 接入设备的设备标识信息, 以使得所述验证单元验证成功后, 所述无 线终端根据所述信任状信息和所述无线接入设备的设备标识信 , 请 求接入所述无线接入设备;
第二发送单元,用于从所述获取单元接收所述无线终端的设备标 识信息, 以及向所述无线接入设备发送所述无线终端的信任状信 , ¾和 所述无线终端的设备标识信息, 以使得所述无线接入设备根据所述无 线终端的信任状信息和所述无线终端的设备标识信息对所述无线终 端接入所述无线接入设备的请求进行处理。
30、 根据权利要求 29所述的配置设备, 其特征在于,
所述获取单元用于,扫描所述无线终端设备的多维码获取所述配 置密码信息以及所述无线终端的设备标识信息。
3 1、 根据权利要求 29所述的配置设备, 其特征在于,
所述获取单元包括:
接收模块, 用于接收所述无线终端发送的配置请求消息, 所述配 置请求消息包括所述无线终端的设备标识信息和使用个人身份识别 码 PIN方式的指示信息;
PIN模块, 用于接收用户输入的所述无线终端的配置密码信息, 所述无线终端的配置密码信息包括所述无线终端的 PIN。
32、 根据权利要求 29所述的配置设备, 其特征在于, 所述获取单元包括:
接收模块, 用于接收所述无线终端发送的配置请求消息, 所述配 置请求消息包括所述无线终端的设备标识信息和使用按钮配置 P B C 方式的指示信息;
PBC模块, 用于通过与无线终端进行 PBC配置方式的交互并在 交互过程中使用缺省的 PIN作为配置密码信息。
33、 根据权利要求 29所述的配置设备, 其特征在于,
所述获取单元用于, 通过近场通信 NFC接口读取所述无线终端 的配置密码信息以及所述无线终端的设备标识信息。
34、 根据权利要求 29-33任一项所述的配置设备, 其特征在于, 所述直接连接包括临时网络 ad hoc连接。
35、 根据权利要求 29-33任一项所述的配置设备, 其特征在于, 所述直接连接包括点对点 P2P连接。
36、 根据权利要求 35 所述的配置设备, 其特征在于, 所述第一 发送单元, 用于根据所述无线终端的设备标识信息通过探测响应帧或 者信标帧向所述无线终端发送配置触发信息。
37、 根据权利要求 35或 36所述的配置设备, 其特征在于, 所述验证单元, 用于根据所述配置密码信息通过扩展认证协议 EAP消息与所述无线终端进行验证。
38、 根据权利要求 35-37任一项所述的配置设备, 其特征在于, 所述第一发送单元用于, 通过所述 EAP 消息向所述无线终端发 送所述无线终端接入无线接入设备的信任状信息和所述无线接入设 备的设备标识信息。
39、 一种无线终端, 其特征在于, 包括,
通信单元, 通过直接连接的通信链路与外部网元进行通信, 用于 接收所述配置设备根据所述无线终端的设备标识信息发送的配置触 发信息;
处理器, 用于与所述配置设备进行验证, 以使得所述配置设备确 定所述无线终端拥有配置密码信息;
所述通信单元还用于,接收所述配置设备发送的所述无线终端接 入无线接入设备的信任状信 , 以及所述无线接入设备的标识信息, 以 使得在所述无线终端与所述配置设备验证成功后, 所述无线终端根据 所述信任状信息和所述无线接入设备的设备标识信息请求接入所述 无线接入设备。
40、 根据权利要求 39所述的无线终端, 其特征在于, 所述通信 单元还用于, 向所述配置设备发送配置请求消息, 所述配置请求消息 包括所述无线终端的设备标识信息和使用个人身份识别码 PIN 方式 的指示信息, 以使得所述配置设备根据所述配置请求消息接收用户输 入的所述配置密码信息,所述配置密码信息包括所述无线终端的 PIN。
41、 根据权利要求 39所述的无线终端, 其特征在于, 所述通信 单元还用于, 向所述配置设备发送配置请求消息, 所述配置请求消息 包括所述无线终端的设备标识信息和使用按钮配置 PBC 方式的指示 信息; 以使得所述配置设备通过与无线终端进行 PBC 配置方式的交 互并在交互过程中使用缺省的 PIN作为配置密码信息。
42、 根据权利要求 39-41任一项所述的无线终端, 其特征在于, 所述通信单元通过直接连接的通信链路与外部网元进行通信包括, 所 述通信单元通过临时网络 a d h 0 c连接链路与外部网元进行通信。
43、 根据权利要求 39-41任一项所述的无线终端, 其特征在于, 所述通信单元通过直接连接的通信链路与外部网元进行通信包括, 所 述通信单元通过点对点 P2P连接链路与外部网元进行通信。
44、 根据权利要求 43 所述的无线终端, 其特征在于, 所述通信 单元, 用于接收所述配置设备根据所述无线终端的设备标识信息通过 探测响应帧或者信标帧发送的配置触发信息。
45、 根据权利要求 43或 44所述的无线终端, 其特征在于, 所述 与所述配置设备进行验证, 以使得所述配置设备确定所述无线终端拥 有配置密码信息, 具体包括, 通过扩展认证协议 EAP 消息与所述配 置设备进行验证。
46、 根据权利要求 43-45任一项所述的无线终端, 其特征在于, 所述接收所述配置设备发送的所述无线终端接入无线接入设备的信 任状信息以及所述无线接入设备的标识信息, 具体包括接收所述配置 设备通过所述 EAP 消息发送的所述无线终端接入无线接入设备的信 任状信息以及所述无线接入设备的标识信息。
47、 一种无线终端, 其特征在于, 包括, 接收单元,用于通过直接连接的通信链路接收所述配置设备根据 所述无线终端的设备标识信息发送的配置触发信息;
验证单元,用于通过直接连接的通信链路与所述配置设备进行验 证, 以使得所述配置设备确定所述无线终端拥有配置密码信息;
所述接收单元还用于,通过直接连接的通信链路接收所述配置设 备发送的所述无线终端接入无线接入设备的信任状信息以及所述无 线接入设备的标识信息, 以使得在所述无线终端与所述配置设备验证 成功后, 所述无线终端根据所述信任状信息和所述无线接入设备的设 备标识信 , ¾请求接入所述无线接入设备。
48、 根据权利要求 47所述的无线终端, 其特征在于, 所述无线 终端还包括发送单元, 用于向所述配置设备发送配置请求消息, 所述 配置请求消息包括所述无线终端的设备标识信息和使用个人身份识 别码 PIN方式的指示信息, 以使得所述配置设备根据所述配置请求消 息接收用户输入的所述配置密码信息, 所述配置密码信息包括所述无 线终端的 PIN。
49、 根据权利要求 47所述的无线终端, 其特征在于, 所述无线 终端还包括发送单元, 向所述配置设备发送配置请求消息, 所述配置 请求消息包括所述无线终端的设备标识信息和使用按钮配置 PBC 方 式的指示信息; 以使得所述配置设备通过与无线终端进行 PBC 配置 方式的交互并在交互过程中使用缺省的 P I N作为配置密码信息。
50、 根据权利要求 47-49任一项所述的无线终端, 其特征在于, 所述直接连接包括临时网络 ad hoc连接。
51、 根据权利要求 47-49任一项所述的无线终端, 其特征在于, 所述直接连接包括点对点 P2P连接。
52、 根据权利要求 51 所述的无线终端, 其特征在于, 所述接收 单元, 用于接收所述配置设备根据所述无线终端的设备标识信息通过 探测响应帧或者信标帧发送的配置触发信息。
53、 根据权利要求 51或 52所述的无线终端, 其特征在于, 所述验证单元用于, 通过扩展认证协议 EAP 消息与所述配置设 备进行验证。
54、 根据权利要求 51 -53任一项所述的无线终端, 其特征在于, 所述接收单元用于, 接收所述配置设备通过所述 EAP 消息发送 的所述无线终端接入无线接入设备的信任状信息以及所述无线接入 设备的标识信息。
55、 一种配置设备的系统, 其特征在于, 包括如权利要求 19-3 8 任一项所述的配置设备以及如权利要求 39-54 任一项所述的无线终 端。
56、 根据权利要求 55 所述的配置设备的系统, 其特征在于, 还 包括,
无线接入设备,用于接收所述配置设备发送的所述无线终端的信 任状信息和所述无线终端的标识信息, 以及根据所述无线终端的信任 状信息和所述无线终端的标识信息对所述无线终端接入所述无线接 入设备的请求进行处理。
PCT/CN2013/075006 2013-04-28 2013-04-28 一种配置无线终端的方法、设备及系统 WO2014176743A1 (zh)

Priority Applications (4)

Application Number Priority Date Filing Date Title
EP13883607.7A EP2986045B1 (en) 2013-04-28 2013-04-28 Method, device and system for configuring wireless terminal
PCT/CN2013/075006 WO2014176743A1 (zh) 2013-04-28 2013-04-28 一种配置无线终端的方法、设备及系统
CN201380000833.1A CN105009618B (zh) 2013-04-28 2013-04-28 一种配置无线终端的方法、设备及系统
US14/924,132 US10091650B2 (en) 2013-04-28 2015-10-27 Wireless terminal configuration method, device, and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2013/075006 WO2014176743A1 (zh) 2013-04-28 2013-04-28 一种配置无线终端的方法、设备及系统

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US14/924,132 Continuation US10091650B2 (en) 2013-04-28 2015-10-27 Wireless terminal configuration method, device, and system

Publications (1)

Publication Number Publication Date
WO2014176743A1 true WO2014176743A1 (zh) 2014-11-06

Family

ID=51843045

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/075006 WO2014176743A1 (zh) 2013-04-28 2013-04-28 一种配置无线终端的方法、设备及系统

Country Status (4)

Country Link
US (1) US10091650B2 (zh)
EP (1) EP2986045B1 (zh)
CN (1) CN105009618B (zh)
WO (1) WO2014176743A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10419424B2 (en) 2013-05-31 2019-09-17 Huawei Device Co., Ltd. Method and device for establishing connection
CN110830672A (zh) * 2018-08-08 2020-02-21 夏普株式会社 图像形成装置、信息处理系统及信息处理方法

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10314088B2 (en) * 2014-04-16 2019-06-04 Belkin International, Inc. Associating devices and users with a local area network using network identifiers
US10560975B2 (en) 2014-04-16 2020-02-11 Belkin International, Inc. Discovery of connected devices to determine control capabilities and meta-information
TWI539858B (zh) * 2014-08-22 2016-06-21 物聯智慧科技(深圳)有限公司 電子裝置與外部網路之連線設定方法及電子裝置
JP6614983B2 (ja) * 2016-01-26 2019-12-04 キヤノン株式会社 通信装置、通信方法、プログラム
FR3049796B1 (fr) 2016-03-30 2018-04-27 Sagemcom Energy & Telecom Sas Procede d'activation d'un objet connecte
ITUA20162411A1 (it) * 2016-04-08 2017-10-08 Berbrand S R L Unipersonale Metodo e sistema di autenticazione per verificare l’autencitià di un prodotto
CN107426035A (zh) * 2017-08-22 2017-12-01 上海斐讯数据通信技术有限公司 无线ap批量配置装置及其方法
US11089625B2 (en) * 2018-05-25 2021-08-10 Futurewei Technologies, Inc. Protection for mode-3 V2X UEs in the ITS band
CN110276191A (zh) * 2019-05-06 2019-09-24 阿里巴巴集团控股有限公司 一种设备配置方法、装置及电子设备
CN110972232A (zh) * 2019-12-16 2020-04-07 北京小米移动软件有限公司 网络连接方法、装置、终端及存储介质
CN111277980B (zh) * 2020-01-21 2023-09-26 杭州涂鸦信息技术有限公司 基于WiFi探测请求帧的配对方法、遥控方法及其系统和装置
CN114422216B (zh) * 2021-12-31 2024-01-09 杭州华橙软件技术有限公司 一种物联网设备绑定方法、装置和存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101616017A (zh) * 2008-06-26 2009-12-30 华为技术有限公司 对网络应用设备进行配置的方法、设备及系统
CN102291493A (zh) * 2011-08-25 2011-12-21 华为终端有限公司 移动终端的应用参数配置方法、相关装置以及系统
CN102740296A (zh) * 2012-06-28 2012-10-17 中国科学院软件研究所 一种移动终端可信网络接入方法和系统
US20120263286A1 (en) * 2009-12-25 2012-10-18 Huawei Device Co., Ltd. Method, device and system for call establishment

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070079113A1 (en) * 2005-09-30 2007-04-05 Amol Kulkarni Automatic secure device introduction and configuration
US7940732B2 (en) * 2007-01-19 2011-05-10 At&T Intellectual Property I, L.P. Automatic wireless network device configuration
KR101572736B1 (ko) * 2010-11-16 2015-11-27 인터디지탈 패튼 홀딩스, 인크 무선 다이렉트 링크 동작을 위한 방법 및 장치
US8813198B2 (en) * 2011-07-05 2014-08-19 Apple Inc. Configuration of accessories for wireless network access

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101616017A (zh) * 2008-06-26 2009-12-30 华为技术有限公司 对网络应用设备进行配置的方法、设备及系统
US20120263286A1 (en) * 2009-12-25 2012-10-18 Huawei Device Co., Ltd. Method, device and system for call establishment
CN102291493A (zh) * 2011-08-25 2011-12-21 华为终端有限公司 移动终端的应用参数配置方法、相关装置以及系统
CN102740296A (zh) * 2012-06-28 2012-10-17 中国科学院软件研究所 一种移动终端可信网络接入方法和系统

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2986045A4 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10419424B2 (en) 2013-05-31 2019-09-17 Huawei Device Co., Ltd. Method and device for establishing connection
CN110830672A (zh) * 2018-08-08 2020-02-21 夏普株式会社 图像形成装置、信息处理系统及信息处理方法

Also Published As

Publication number Publication date
CN105009618B (zh) 2019-05-10
US20160050566A1 (en) 2016-02-18
EP2986045A1 (en) 2016-02-17
US10091650B2 (en) 2018-10-02
EP2986045A4 (en) 2016-05-25
EP2986045B1 (en) 2018-06-20
CN105009618A (zh) 2015-10-28

Similar Documents

Publication Publication Date Title
WO2014176743A1 (zh) 一种配置无线终端的方法、设备及系统
US10979412B2 (en) Methods and apparatus for secure device authentication
US9113330B2 (en) Wireless authentication using beacon messages
US10027664B2 (en) Secure simple enrollment
KR102134302B1 (ko) 무선 네트워크 접속 방법 및 장치, 및 저장 매체
CN102726080B (zh) 个人基本服务集中的站对站安全关联
JP6218841B2 (ja) ワイヤレス通信システム
EP2963959B1 (en) Method, configuration device, and wireless device for establishing connection between devices
EP3334084B1 (en) Security authentication method, configuration method and related device
US10305684B2 (en) Secure connection method for network device, related apparatus, and system
EP2993933B1 (en) Wireless terminal configuration method, apparatus and wireless terminal
JP2016540462A (ja) 鍵コンフィギュレーション方法、システム、および装置
JP2010503330A (ja) アドホック無線ネットワークのノード間においてセキュリティ・アソシエーションを確立するための方法及び装置
KR20180098589A (ko) 보안 통신을 위한 네트워크 시스템
US10097524B2 (en) Network configuration method, and related apparatus and system
TWI489899B (zh) 應用於無線網路之連線方法以及應用其之無線網路裝置以及無線網路存取點
WO2016112860A1 (zh) 无线设备的通讯方法、无线设备和服务器

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13883607

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2013883607

Country of ref document: EP