WO2016026429A1 - Procédé, dispositif et équipement de configuration et de visite de réseau sans fil, ainsi que d'accès à ce dernier - Google Patents

Procédé, dispositif et équipement de configuration et de visite de réseau sans fil, ainsi que d'accès à ce dernier Download PDF

Info

Publication number
WO2016026429A1
WO2016026429A1 PCT/CN2015/087363 CN2015087363W WO2016026429A1 WO 2016026429 A1 WO2016026429 A1 WO 2016026429A1 CN 2015087363 W CN2015087363 W CN 2015087363W WO 2016026429 A1 WO2016026429 A1 WO 2016026429A1
Authority
WO
WIPO (PCT)
Prior art keywords
wireless network
security key
network
wireless
name
Prior art date
Application number
PCT/CN2015/087363
Other languages
English (en)
Chinese (zh)
Inventor
聂华闻
Original Assignee
北京贝虎机器人技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京贝虎机器人技术有限公司 filed Critical 北京贝虎机器人技术有限公司
Priority to CN201580038698.9A priority Critical patent/CN106537962B/zh
Publication of WO2016026429A1 publication Critical patent/WO2016026429A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Definitions

  • the present invention relates to the field of wireless network authentication technologies, and in particular, to a wireless network configuration, access and access method, device and device.
  • wireless networks are becoming more and more inseparable from people's lives. For example, mobile phones, tablets, smart home devices, etc., more and more things in life need to rely on wireless networks to fully realize their value.
  • the device can automatically access the wireless network, and no effective solution has been proposed yet.
  • the embodiment of the present invention provides a wireless network configuration, access and access method, device and device, so that the device can automatically access the wireless network under the premise of ensuring network and data security.
  • a first aspect of the embodiments of the present invention provides a wireless network configuration method, which may include: generating a network security key of a wireless network; generating a wireless network name based on the network security key, where the wireless network name is Include at least a network security key portion representing the network security key; and configuring the wireless network based on the network security key and the wireless network name.
  • generating the wireless network name based on the network security key may include: encrypting the network security key to obtain a predetermined length of the encrypted network security key; and adding the encrypted network security key to the wireless network name
  • the network security key portion obtains a wireless network name including at least the network security key portion.
  • generating the wireless network name based on the network security key may further include at least one or any combination of: generating an information portion indicating that the wireless network name includes a network security key; generating for verifying the network security secret a verification information portion of the key; generating a type information portion representing the security type; and generating an encrypted information portion indicating an encryption rule for encrypting the network security key.
  • configuring the wireless network based on the network security key and the wireless network name may include configuring the wireless network name as a primary wireless network of a wireless access device and a wireless network of a secondary wireless network. a name; configuring the network security key as a network security key of the one wireless network.
  • a second aspect of the embodiments of the present invention provides a wireless network access method, which may include: acquiring a wireless network name, where the wireless network name includes at least a network security key portion indicating a network security key; The network security key portion extracts a network security key corresponding to the wireless network name; and automatically connects to the wireless network corresponding to the wireless network name based on the wireless network name and the network security key.
  • the method may further include: determining, based on the information portion of the wireless network name that the wireless network name includes a network security key, whether the wireless network name includes a network security key; from the network security key And partially extracting the network security key corresponding to the wireless network name, including: when the information part indicates that the wireless network name includes a network security key, extracting a network security key from the wireless network name.
  • a third aspect of the embodiments of the present invention provides a wireless network access method, which may include: receiving a data packet sent by a terminal device that performs wireless communication by using a wireless access device, where the wireless access device is configured with at least one a wireless network; determining whether the data packet is from a terminal device that performs wireless communication through a preset wireless network in the at least one wireless network; when the data packet is from a terminal device that performs wireless communication through the preset wireless network And forwarding the data packet to a network server associated with the terminal device.
  • the predetermined wireless network is a wireless network dedicated to one or more of the terminal devices for wireless communication.
  • a fourth aspect of the embodiments of the present invention provides a wireless network configuration apparatus, which may include: a network security key generation unit configured to generate a network security key for a wireless network; a wireless network name generation unit configured Generating a wireless network name based on the network security key, wherein the wireless network name includes at least a network security key portion representing the network security key; and a configuration unit configured to base the network security key And configuring the wireless access device with the wireless network name.
  • the wireless network configuration apparatus may further include: an encryption unit configured to perform encryption processing on the network security key to obtain an encrypted network security key; and wherein the wireless network name generation unit is further configured Generating a wireless network name based on the encrypted network security key, wherein the network security key is represented by the encrypted network security key.
  • the configuration unit may include: a determining module configured to configure the wireless network name as a name of one of a primary wireless network and a secondary wireless network of the wireless access device; a configuration module configured to: The network security key is configured as a network security key for the one wireless network.
  • a fifth aspect of the embodiments of the present invention provides a wireless access device, which may include: a configuration port configured to configure a wireless network based on wireless network configuration information, where the wireless network configuration information includes a first wireless network name And a first network security key, wherein the first wireless network name includes at least a wireless network security key portion representing the first network security key; and/or the wireless network configuration information includes a second wireless a network name, wherein the second wireless network name includes at least an information portion indicating that the wireless network does not require a network security key; and an input port configured to receive one or more terminal devices for wireless communication over the wireless network A transmitted data packet; an output port configured to forward the data packet to a network server associated with the one or more terminal devices.
  • the wireless access device may further include: a memory configured to store a device identification list of the terminal device that needs to forward the data packet to the network server; and a processor configured to determine whether the terminal device from which the received data packet is derived In the device identification list, if the determination is yes, the received data packet is forwarded to the network server through the output interface.
  • a sixth aspect of the embodiments of the present invention provides a terminal device, which may include: a wireless network search unit configured to acquire a wireless network name, and determine whether the wireless network name includes network security indicating a network security key. a key portion; the network security key extracting unit configured to extract network security corresponding to the wireless network name from the network security key portion in a case where the network security key portion is included in the determined wireless network name a key; the wireless network connection unit configured to automatically connect to the wireless network corresponding to the wireless network name based on the wireless network name and the extracted network security key.
  • the terminal device may further include: a network security key determining unit configured to determine whether the wireless network name includes network security based on an information portion of the wireless network name indicating that the wireless network name includes a network security key
  • the network security key extraction unit is specifically configured to extract the network security key from the wireless network name when it is determined that the information portion indicates that the wireless network name includes a network security key.
  • the network security key of the wireless network is added to the wireless network name, so that the terminal device to be accessed that meets the requirements can be directly from the wireless
  • the network security key is parsed in the network name, thereby realizing automatic access of the wireless network, solving the problem of requiring human input of the network security key in the prior art, and reducing the operation complexity of the terminal device accessing the wireless network.
  • FIG. 1 is a schematic diagram of a system architecture in accordance with an embodiment of the present invention.
  • FIG. 2 is a schematic block diagram of a system architecture in accordance with one embodiment of the present invention.
  • FIG. 3 is a schematic block diagram of a system architecture in accordance with another embodiment of the present invention.
  • FIG. 4 is a schematic diagram of a home wireless network system in accordance with one embodiment of the present invention.
  • Figure 5 is a schematic block diagram of a system architecture in accordance with yet another embodiment of the present invention.
  • FIG. 6 is a schematic flow chart of a method for configuring a wireless network name according to an embodiment of the present invention.
  • FIG. 7 is a schematic flowchart of a method for automatically accessing a terminal device according to an embodiment of the present invention.
  • FIG. 8 is a flow chart of a method for configuring, accessing, and accessing a wireless network according to an embodiment of the present invention
  • FIG. 9 is a flow chart of a wireless network configuration, access, and access method in accordance with another embodiment of the present invention.
  • FIG. 1 is a schematic diagram of a system architecture 100 in accordance with an embodiment of the present invention.
  • the system architecture 100 can include one or more wireless access devices 101, one or more terminal devices 102, and a wireless network configuration device 103.
  • the system architecture 100 may further include: a server 104.
  • the wireless access device 101 may be a device capable of providing a wireless network, such as a router, a wireless portable WIFI, a wireless network card, a Bluetooth device, and the like.
  • the terminal device 102 may be a device having wireless access capability to access the wireless network provided by the wireless access device 101, such as a mobile phone, a computer, a tablet computer, or the like, or a smart home device, such as a television, an air conditioner, a sweeping robot, Refrigerator, etc.
  • the wireless network configuration device 103 can be configured to configure the wireless access device 101 based on a prescribed authentication policy such that the terminal device 102 having the automatic authentication mechanism corresponding to the authentication policy can automatically access the wireless access device 101.
  • the authentication policy can include but is not limited to the following three types:
  • the wireless network of the wireless access device 101 is configured to be carried in the wireless network name, so that the terminal device 102 can automatically access the wireless access device 101 by using the network security key carried in the wireless network name.
  • Wireless network
  • FIG. 2 is a schematic block diagram of an example system architecture implementing an authentication policy (1).
  • the system architecture includes a wireless access device 101, one or more terminal devices 102, and a wireless network configuration device 103.
  • the wireless network configuration device 103 may include a network security key generation unit 1031, a wireless network name generation unit 1032, and a configuration unit 1033.
  • the network security key generation unit 1031 may be configured to generate a network security key KEY for the wireless network.
  • the wireless network name generation unit 1032 may be configured to generate a wireless network name WIRELESS_NAME based on the network security key KEY, wherein the wireless network name WIRELESS_NAME includes a network security key portion KEY_PORTION indicating a network security key KEY.
  • the configuration unit 1033 may be configured to transmit the wireless network configuration information carrying the network security key KEY and the wireless network name WIRELESS_NAME to the wireless access device 101 to perform wireless network configuration on the wireless access device 101.
  • the wireless access device 101 can include a configuration port 1011 and an input port 1012.
  • the configuration port 1011 can be configured to configure the wireless network WIRELESS based on the wireless network configuration information.
  • the input port 1012 can be configured to receive data packets transmitted by one or more terminal devices 102 that are in wireless communication over the wireless network WIRELESS.
  • the terminal device 102 may include a wireless network search unit 1021, a network security key extraction unit 1022, and a wireless network connection unit 1023.
  • the wireless network search unit 1021 may be configured to acquire the wireless network name WIRELESS_NAME.
  • the network security key extracting unit 1022 may be configured to extract the network security key KEY corresponding to the wireless network name WIRELESS_NAME from the network security key portion KEY_PORTION of the acquired wireless network name WIRELESS_NAME.
  • the wireless network connection unit 1023 may be configured to automatically connect to the wireless network WIRELESS corresponding to the wireless network name WIRELESS_NAME based on the wireless network name WIRELESS_NAME and the network security key KEY.
  • the wireless access device 101 may be configured by the wireless network configuration device 103 in accordance with the above authentication policy (1) at the time of shipment or during use.
  • the terminal device 102 for example, a smart sweeping robot having an automatic authentication mechanism corresponding to the authentication policy (1) can automatically connect to the wireless network after searching for the wireless network generated by the wireless access device 101 without artificially Enter the wireless network password information.
  • FIG. 3 is a schematic diagram of an example system architecture implementing an authentication policy (2).
  • the system architecture includes a wireless access device 101, one or more terminal devices 102, a wireless network configuration device 103, and a server 104.
  • the wireless network configuration device 103 may include a wireless network name generation unit 1032 and a configuration unit 1033.
  • the wireless network name generation unit 1032 can be configured to generate a wireless network name WIRELESS_NAME.
  • the wireless network name WIRELESS_NAME may include an indication that the wireless network is in a no-password mode information.
  • the configuration unit 1033 may be configured to send the wireless network configuration information carrying the wireless network name WIRELESS_NAME and the corresponding forwarding address information to the wireless access device 101 to perform wireless network configuration on the wireless access device 101 (wireless network name WIRELESS_NAME; none The cryptographic mode), and the wireless access device 101 is configured such that packets sent to the wireless access device 101 over the wireless network WIRELESS_NAME need to be forwarded to the server 104.
  • the wireless access device 101 can include a configuration port 1011, an input port 1012, and a forwarding port 1013.
  • the configuration port 1011 can be configured to configure the wireless network WIRELESS_NAME and the forwarding address (server 104) based on the wireless network configuration information.
  • the input port 1012 can be configured to receive data packets transmitted by one or more terminal devices 102 that are in wireless communication over the wireless network WIRELESS_NAME.
  • the forwarding port 1013 can be configured to forward the data packets received over the wireless network WIRELESS_NAME to the server 104.
  • the terminal device 102 may include a wireless network search unit 1021 and a wireless network connection unit 1023.
  • the wireless network search unit 1021 can be configured to search for a wireless network WIRELESS_NAME without a password.
  • the wireless network connection unit 1023 can be configured to directly connect to the passwordless wireless network WIRELESS_NAME.
  • the server 104 performs security detection on the data packet forwarded by the wireless access device 101, and determines whether the device that sends the data packet is a designated security device. If the security check is passed (ie, the determination result is “Yes”), The packet is forwarded to the corresponding destination device.
  • the server 104 may be, for example, a cloud server located on the Internet, or may be a dedicated server dedicated to the smart home device in the home.
  • FIG. 4 is a schematic diagram of a home wireless network system based on the above embodiment (authentication policy (2)).
  • the router 401 can be configured by the wireless network configuration device 103 at the time of shipment or during use.
  • the smart home device in the home for example, the washing machine 406 located on the ground floor, the first floor TV 402, the refrigerator 403, the second floor mobile phone 404, the computer 405
  • the router 401 After receiving the data packet from the smart home device, the router 401 uniformly forwards the data packet to the server 407, and the server 407 performs security detection on the data packet to determine whether the device that sends the data packet is the set security device. If the security check is passed (ie, the judgment result is "Yes"), the data packet is forwarded to the corresponding destination device.
  • Figure 5 is a schematic block diagram of an example system architecture implementing an authentication policy (3).
  • the example system architecture includes a wireless access device 101, one or more terminal devices 102, a wireless network configuration device 103, and a server 104.
  • the wireless network configuration device 103 may include a network security key generation unit 1031, a wireless network name generation unit 1032, and a configuration unit 1033.
  • the network security key generation unit 1031 may be configured to generate a network security key KEY for the wireless network.
  • the wireless network name generation unit 1032 may be configured to generate a wireless network name WIRELESS_NAME based on the network security key KEY, wherein the wireless network name WIRELESS_NAME includes a network security key portion KEY_PORTION indicating a network security key KEY.
  • the configuration unit 1033 may be configured to send the wireless network configuration information carrying the network security key KEY and the wireless network name WIRELESS_NAME and the corresponding forwarding address information to the wireless access device 101 to perform wireless network configuration on the wireless access device 101 (
  • the wireless network name WIRELESS_NAME, network key KEY) and the wireless access device 101 is configured such that data packets sent to the wireless access device 101 over the wireless network WIRELESS_NAME are forwarded to the server 104.
  • the wireless access device 101 can include a configuration port 1011, an input port 1012, and a forwarding port 1013.
  • the configuration port 1011 can be configured to configure the wireless network and forwarding address (server 104) based on the wireless network configuration information.
  • the input port 1012 can be configured to receive data packets transmitted by one or more terminal devices 102 that are in wireless communication over the wireless network WIRELESS_NAME.
  • the forwarding port 1013 can be configured to forward the data packets received over the wireless network WIRELESS_NAME to the server 104.
  • the terminal device 102 may include a wireless network search unit 1021, a network security key extraction unit 1022, and a wireless network connection unit 1023.
  • the wireless network search unit 1021 may be configured to acquire the wireless network name WIRELESS_NAME.
  • the network security key extracting unit 1022 may be configured to extract the network security key KEY corresponding to the wireless network name WIRELESS_NAME from the network security key portion KEY_PORTION in the wireless network name WIRELESS_NAME.
  • the wireless network connection unit 1023 may be configured to automatically connect to the wireless network corresponding to the wireless network name WIRELESS_NAME based on the wireless network name WIRELESS_NAME and the network security key KEY.
  • the server 104 performs security detection on the data packet forwarded by the wireless access device 101, and determines whether the device that sends the data packet is a designated security device. If the security check is passed (ie, the determination result is “Yes”), The packet is forwarded to the corresponding destination device.
  • the server 104 may be, for example, a cloud server located on the Internet, or may be a dedicated server dedicated to the smart home device in the home.
  • the embodiment shown in FIG. 5 increases the security detection of the data packets from the terminal device 102, thereby further improving the terminal device 102 automatically accessing the wireless network. safety.
  • the wireless network configuration device 103 shown in FIGS. 1 to 3 and FIG. 5 is merely an exemplary description, and does not specifically define the manner in which the wireless network configuration device 103 exists.
  • the wireless network configuration device 103 can be a separate server or processor, or can be built into the wireless access device, or can be an application in a user terminal device (such as a mobile phone, a tablet, a notebook, etc.).
  • the specific form of existence is diverse as long as the configuration of the wireless access device can be implemented.
  • the wireless access device 101 can be configured by connecting or communicating with the wireless network configuration device 103 at the time of shipment or during use.
  • the process of generating the wireless network name WIRELESS_NAME based on the wireless network password (Network Security Key KEY) (authentication policy (1)) is mainly implemented in the above-described wireless network configuration device 103.
  • the wireless network configuration device 103 can encrypt the network security key KEY to obtain a predetermined length of the encrypted network security key, and then encrypt the network security key. Add to the network security key part KEY_PORTION of the wireless network name WIRELESS_NAME, thereby obtaining the wireless network name including at least the network security key part.
  • the wireless network name of the router that is, the SSID (Service Set Identifier) is taken as an example.
  • SSID technology can divide a wireless LAN into several sub-networks that require different authentication. Each sub-network needs independent authentication. Only authenticated users can enter the corresponding sub-network, thus preventing unauthorized access. The user enters the network.
  • the SSID consists of case-insensitive characters of up to 32 characters. In order to minimize the changes to the original system and device, the SSID can still be used according to the above-mentioned original characters and characters. Name it.
  • the entire SSID can consist of the following four string regions:
  • the prefix area may be composed of a specific string, such as bp_;
  • Authentication password area that is, the above network security key part, the area can be set to store the encrypted network security key (in this example, the wireless network password of the wireless network provided by the router), the network security key can be It is a base64 encoded string formed by public key encryption and then compression-encoded.
  • the LZ77 compression algorithm may be used for compression coding, and other compression algorithms may be used. This example is only a schematic description and does not constitute a specific limitation;
  • Check value area used for data verification, which can be only one character. For example, it can be 26 letters (case sensitive) and one of 0-9 Arabic numerals. This value can be the router's MAC (Media Access Control). , wireless access control) address modulo 62 value, the reason for modulo 62 is to consider 26 uppercase letters, 26 lowercase letters and 0 to 9 of these 10 numbers, add up to a total of 62 characters.
  • MAC Media Access Control
  • the prefix area and the check value area may be configured to identify that the wireless network name includes a network security key, so that the terminal device to be accessed can quickly determine the wireless network after searching for the wireless network name of the wireless network. Whether to support automatic access of the device.
  • the generation process may be as shown in FIG. 6, and includes the following steps:
  • S65 Check whether the number of characters after re-encoding exceeds a predetermined number of characters (for example, 28 characters);
  • the network name of the wireless network may be broadcast, or may not be broadcasted, but the terminal device itself may calculate the network name of the estimated wireless network.
  • the terminal device 102 for example, a smart home device or the like
  • a corresponding automatic authentication mechanism needs to be built in.
  • the mechanism may exist in the form of a piece of code or may be a hardware component (for example, the encryption chip), the specific implementation manner can be selected as needed, and the application is not limited.
  • a decryption private key set may be built in, so that the private key can be used to decrypt the wireless network name, thereby obtaining the network security key therein, and ensuring that the decrypted private keys are not randomly copied.
  • a flowchart for automatically accessing the terminal device 102 includes:
  • the terminal device 102 scans the surrounding wireless network
  • S72 Determine, from the scanned wireless network, a wireless network that can automatically authenticate the access
  • the wireless network configuration device 103 is also required to perform configuration. That is, the wireless network configuration device 103 generates a wireless network password without password protection.
  • the difference from the existing wireless network connection method is that the data packets transmitted by the terminal device 102 connected to the wireless network are forwarded to a specific server 104, thereby ensuring the security of wireless network data transmission.
  • the router's wireless network name is used as an example.
  • the SSID consists of case-insensitive characters of up to 32 characters.
  • the entire SSID can consist of the following four string regions:
  • the prefix area may be composed of a specific string, such as bp_;
  • Mac address area This area can be the MAC address of the wireless access device but it is lost: the combination of numbers and letters;
  • Check value area used for data verification, which can be only one character. For example, it can be one of 26 letters (case sensitive) and 0-9 Arabic numerals.
  • the value can be the MAC address of the router. After the value;
  • the foregoing prefix, mac address area, and check value area may be configured to identify that the wireless network is passwordless, so that the terminal device 102 to be accessed may directly access the wireless network name after searching for the wireless network.
  • the terminal device 102 to be accessed may directly access the wireless network name after searching for the wireless network.
  • a wireless network In a wireless network.
  • the overall execution process may be as shown in FIG. 8, including:
  • S84 Forward the received data packet to a specific server.
  • the authentication policy (2) can be considered as a special way of the authentication policy (1), that is, equivalent to setting the network security key of the wireless network to none. Therefore, the authentication policy (2) can also be implemented by means of the authentication policy 1, that is, the wireless network name is also set by using [prefix] [base64 (authentication password)] [check value].
  • the wireless access device 101 can match with a constraint device, where the IP address of all the terminal devices connected to the wireless network provided by the wireless access device is recorded, and after receiving the data packet, The binding device can determine whether the source IP address of the data packet is in the recorded IP address set, and if so, directly forward the data packet to a preset specific server, thereby further ensuring security.
  • the wireless network name is the SSID of the router. Because the router has a primary SSID and a secondary SSID, one SSID corresponds to one wireless network. Therefore, optionally, the secondary SSID may be set according to one of the foregoing authentication policies, and the primary SSID is set according to the existing normal wireless network mode; the primary SSID may also be set according to one of the foregoing authentication policies, and the secondary SSID is Some of the normal wireless network mode settings; of course, the primary SSID and the secondary SSID can be set according to one of the above-mentioned authentication policies. The specific settings and selection methods can be selected according to actual needs, which is not limited in this application.
  • FIG. 9 is a flowchart of a method for configuring, accessing, and accessing a wireless network according to an embodiment of the present invention. Description will be made below with reference to FIG.
  • Step 901 The wireless network configuration device (the wireless network configuration device 103 shown in FIG. 1) generates a network security key of the wireless network.
  • Step 902 Generate a wireless network name based on the network security key, where the wireless network name includes at least a network security key portion indicating a network security key.
  • the network security key may be encrypted to obtain a predetermined length of the encrypted network security key, and then the encrypted network security key is added to the network security key part of the wireless network name to obtain at least the network security key part.
  • the name of the wireless network In actual implementation, optionally, the wireless network name also includes one or more of the following components:
  • Step 903 The wireless network configuration device configures the wireless network of the wireless access device based on the network security key and the wireless network name.
  • Step 904 The terminal device (ie, the terminal device 102 in FIG. 1) acquires a wireless network name.
  • Step 905 The terminal device extracts a network security key corresponding to the wireless network name from the network security key portion.
  • Step 906 The terminal device automatically connects to the wireless network corresponding to the wireless network name based on the wireless network name and the network security key.
  • Step 907 The wireless access device receives the data packet sent by the terminal device, where the wireless access device is configured with at least one wireless network.
  • Step 908 Determine whether the data packet is from a terminal device that performs wireless communication through a preset wireless network in the at least one wireless network.
  • two wireless networks can be provided at the same time, that is, a wireless network corresponding to the primary SSID and a wireless network corresponding to the secondary SSID.
  • the wireless network corresponding to the secondary SSID may be set as a preset wireless network, and then the terminal device accessing the wireless network considers that the data packet needs to be forwarded to the network server associated with the terminal devices.
  • the network server may be a server dedicated to a smart home device, and may be a cloud server.
  • Step 909 When the data packet is from a terminal device that performs wireless communication through the preset wireless network, forward the data packet to a network server associated with the terminal device.
  • steps 907 through 909 are merely optional steps of the wireless network configuration, access, and access methods provided by the present application, and lack of implementations in which some or all of them do not affect the basic purpose of the application.
  • embodiments of the present invention can be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment, or a combination of software and hardware. Moreover, the invention can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
  • computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
  • the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory include instructions.
  • An article of manufacture of a device that implements the functions specified in a block or blocks of a flow or a flow and/or block diagram of the flowchart.
  • These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
  • the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
  • modules or steps of the embodiments of the present invention can be implemented by a general computing device, which can be concentrated on a single computing device or distributed in multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device such that they may be stored in the storage device by the computing device and, in some cases, may be different from The steps shown or described are performed sequentially, or they are separately fabricated into individual integrated circuit modules, or a plurality of modules or steps thereof are fabricated into a single integrated circuit module. Thus, embodiments of the invention are not limited to any specific combination of hardware and software.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Small-Scale Networks (AREA)

Abstract

La présente invention, selon certains modes de réalisation, concerne un procédé, un dispositif et un équipement de configuration de réseau sans fil, et de connexion et d'accès à ce dernier. Le procédé de configuration de réseau sans fil consiste à : générer une clé de sécurité de réseau pour un réseau sans fil ; générer un nom de réseau sans fil sur la base de la clé de sécurité de réseau, le nom de réseau sans fil comprenant au moins une partie de clé de sécurité de réseau exprimant la clé de sécurité de réseau ; et configurer le réseau sans fil sur la base de la clé de sécurité de réseau et du nom de réseau sans fil. L'invention résout ainsi le problème rencontré dans l'état de la technique selon lequel une clé de sécurité de réseau doit être entrée manuellement, ce qui permet de réduire la complexité fonctionnelle pour un dispositif terminal en vue d'être connecté à un réseau sans fil.
PCT/CN2015/087363 2014-08-18 2015-08-18 Procédé, dispositif et équipement de configuration et de visite de réseau sans fil, ainsi que d'accès à ce dernier WO2016026429A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201580038698.9A CN106537962B (zh) 2014-08-18 2015-08-18 无线网络配置、接入和访问方法、装置及设备

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410404086 2014-08-18
CN201410404086.4 2014-08-18

Publications (1)

Publication Number Publication Date
WO2016026429A1 true WO2016026429A1 (fr) 2016-02-25

Family

ID=55350199

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/087363 WO2016026429A1 (fr) 2014-08-18 2015-08-18 Procédé, dispositif et équipement de configuration et de visite de réseau sans fil, ainsi que d'accès à ce dernier

Country Status (2)

Country Link
CN (1) CN106537962B (fr)
WO (1) WO2016026429A1 (fr)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109547266A (zh) * 2018-12-29 2019-03-29 深圳市宏电技术股份有限公司 一种批量配置方法、装置及系统
CN109932977A (zh) * 2019-04-18 2019-06-25 合肥泛米智能科技有限公司 一种基于云计算的智能家居设备
US10869345B1 (en) * 2015-04-27 2020-12-15 Marvell Asia Pte, Ltd. Systems and methods for provisioning devices for WLAN

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1632877A1 (fr) * 2004-09-03 2006-03-08 Sap Ag Authentification de dispositif portable pour accès a des applications
CN102404725A (zh) * 2011-11-08 2012-04-04 复旦大学 一种在应用程序中利用SSID安全建立WiFi连接的方法
CN103841537A (zh) * 2012-11-20 2014-06-04 中国电信股份有限公司 采用家庭网关部署wlan城域网的管控系统及方法

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7801100B2 (en) * 2007-06-04 2010-09-21 Sony Ericsson Mobile Communications Ab Operating ad-hoc wireless local area networks using network identifiers and application keys

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1632877A1 (fr) * 2004-09-03 2006-03-08 Sap Ag Authentification de dispositif portable pour accès a des applications
CN102404725A (zh) * 2011-11-08 2012-04-04 复旦大学 一种在应用程序中利用SSID安全建立WiFi连接的方法
CN103841537A (zh) * 2012-11-20 2014-06-04 中国电信股份有限公司 采用家庭网关部署wlan城域网的管控系统及方法

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10869345B1 (en) * 2015-04-27 2020-12-15 Marvell Asia Pte, Ltd. Systems and methods for provisioning devices for WLAN
CN109547266A (zh) * 2018-12-29 2019-03-29 深圳市宏电技术股份有限公司 一种批量配置方法、装置及系统
CN109932977A (zh) * 2019-04-18 2019-06-25 合肥泛米智能科技有限公司 一种基于云计算的智能家居设备

Also Published As

Publication number Publication date
CN106537962B (zh) 2020-03-20
CN106537962A (zh) 2017-03-22

Similar Documents

Publication Publication Date Title
US9843575B2 (en) Wireless network authentication method and wireless network authentication apparatus
CN105379190B (zh) 用于指示服务集标识符的系统和方法
JP5739072B2 (ja) 共有エフェメラル・キー・データのセットを用いるエクスチェンジを符号化するためのシステム及び方法
US8787572B1 (en) Enhanced association for access points
CN105760764B (zh) 一种嵌入式存储设备文件的加解密方法、装置及终端
WO2018137351A1 (fr) Procédé, dispositif et système pertinents de traitement de clé de réseau
US11736304B2 (en) Secure authentication of remote equipment
CN109495251B (zh) 基于密钥卡的抗量子计算智能家庭云存储方法和系统
KR20160078475A (ko) 키 구성 방법, 시스템, 및 장치
KR20180119201A (ko) 인증 시스템을 위한 전자 장치
WO2022111187A1 (fr) Procédé et appareil d'authentification de terminal, dispositif informatique et support de stockage
US10097524B2 (en) Network configuration method, and related apparatus and system
WO2016188053A1 (fr) Procédé d'accès à un réseau sans fil, dispositif et support de stockage informatique
US11489808B1 (en) Providing a split-configuration virtual private network
KR20150053912A (ko) 서버에 클라이언트를 등록하기 위한 방법 및 디바이스들
US11811517B2 (en) Enabling efficient communication in a hybrid network
WO2016026429A1 (fr) Procédé, dispositif et équipement de configuration et de visite de réseau sans fil, ainsi que d'accès à ce dernier
CN106559779B (zh) 一种数据传输方法、装置以及系统
WO2014201783A1 (fr) Procédé, système et terminal de chiffrement et d'authentification pour un réseau ad hoc
TWI520653B (zh) 無線安全自動配對方法、連線建立方法與無線存取點裝置
KR102226836B1 (ko) 근거리 통신을 이용하여 컨텐츠를 공유하는 단말기 및 방법
Lindroos et al. Developing a Systematic Process for Mobile Surveying and Analysis of WLAN Security
CN105721403B (zh) 用于提供无线网络资源的方法、设备及系统
CN117061115B (zh) 密钥协商方法、装置、计算机设备和计算机可读存储介质
CN114222296A (zh) 一种无线网的安全接入方法和系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15833076

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC ( EPO FORM 1205A DATED 07/06/2017 )

122 Ep: pct application non-entry in european phase

Ref document number: 15833076

Country of ref document: EP

Kind code of ref document: A1