WO2017000680A1 - 一种建立连接的方法及装置 - Google Patents

一种建立连接的方法及装置 Download PDF

Info

Publication number
WO2017000680A1
WO2017000680A1 PCT/CN2016/081901 CN2016081901W WO2017000680A1 WO 2017000680 A1 WO2017000680 A1 WO 2017000680A1 CN 2016081901 W CN2016081901 W CN 2016081901W WO 2017000680 A1 WO2017000680 A1 WO 2017000680A1
Authority
WO
WIPO (PCT)
Prior art keywords
wireless router
accessed
wps
trusted
instruction
Prior art date
Application number
PCT/CN2016/081901
Other languages
English (en)
French (fr)
Inventor
羊兆磊
杨健
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2017000680A1 publication Critical patent/WO2017000680A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery

Definitions

  • This application relates to, but is not limited to, the field of communication technology.
  • FIG. 8 is a schematic diagram of a networking mode of a wireless local area network according to the related art.
  • the networking mode of the wireless local area network is roughly a wireless router connected to the Internet, a personal computer (Personal Computer, PC for short), a mobile terminal, etc.
  • the device needs to access the Internet via a wireless router by wirelessly accessing the wireless router. Because it is through wireless access, there is no limit to the physical cable connection, so any wireless terminal within the wireless coverage can receive the signal of the wireless router.
  • the essence of WLAN is that the communication cable is no longer used to connect the computer to the network, but is connected wirelessly, which makes the construction of the network and the movement of the terminal more flexible.
  • the WLAN security system including the second version of the wireless fidelity protection access in the related art (2rd Wi-Fi Protected Access, WPA2) standard, requires the user to authenticate to log in to the network to enable security.
  • WPA2rd Wi-Fi Protected Access, WPA2 2rd Wi-Fi Protected Access, WPA2
  • WPA2rd Wi-Fi Protected Access, WPA2 requires the user to authenticate to log in to the network to enable security.
  • the related art is that when a user constructs a new WLAN, the network name and password must first be set on the access point (AP), and the wireless AP generates a security key according to the password.
  • AP access point
  • the wireless AP When a new client is added to this WLAN, the user also needs to select the appropriate network name and enter the password. After the client and the AP exchange security certificates, the new device is connected to the wireless network.
  • Wireless-FIdelity Protected Setup is a new Wi-Fi security protection standard introduced by the Wi-Fi Alliance.
  • the main reason for the introduction of this standard is In order to solve the problem that the wireless network encryption authentication setting has been too complicated and difficult for a long time, users often have too much trouble because of the steps, so that they do not make any encryption security settings, thus causing many security problems.
  • WPS is used to simplify the security of Wi-Fi wireless
  • WPS supports two modes: Personal Identification Number (PIN) mode and Push Button Configuration (PBC) mode.
  • PIN Personal Identification Number
  • PBC Push Button Configuration
  • the user can simply press a button on the device or create a 4-digit or 8-digit PIN for each device in the WLAN to trigger authentication and configure the device with predefined security features based on the WPA2 standard. And add client devices to a secure network. This process uses WPA2, which became a mandatory content for certified products in March 2006 and makes it easier for users to get started.
  • the mobile device When the mobile device establishes a connection with the wireless router, according to the PBC mode of the WPS, the user needs to simultaneously press the PBC button on the wireless router and the mobile device to trigger the WPS authentication process.
  • the wireless router may be in a corner or ceiling, and the user is inconvenient to use the PBC button, which brings inconvenience to the user experience.
  • the wireless router uses the PBC mode to establish a connection with the mobile device, which is cumbersome and inconvenient, and brings inconvenience to the user experience.
  • An effective solution has not been proposed in the related art.
  • This document provides a method and a device for establishing a connection to solve the problem that the wireless router using the button (PBC) mode in the related art to establish a connection with the mobile device is cumbersome and inconvenient, and brings inconvenience to the user experience.
  • PBC button
  • a method of establishing a connection comprising:
  • the wireless router receives an instruction to initiate a wireless fidelity Wi-Fi security protection setting WPS function, wherein the instruction is received from an accessed device that has accessed the wireless router;
  • the wireless router starts the WPS function according to the instruction, and triggers a WPS authentication process
  • the wireless router establishes a connection with an unconnected device that is not connected to the wireless router according to the WPS authentication process.
  • the wireless router before the wireless router starts the WPS function according to the instruction, include:
  • the wireless router determines whether the accessed device has permission to activate the WPS function.
  • the wireless router determines whether the accessed device has the right to initiate the WPS function, including:
  • the wireless router determines that the accessed device has permission to activate the WPS function
  • the wireless router determines that the accessed device has no right to activate the WPS function.
  • the determining, by the wireless router, whether the accessed device is a trusted device includes:
  • the wireless router determines whether the accessed device is a trusted device according to a preset trusted device list, where the trusted device list includes a media access control MAC address.
  • the determining, by the wireless router, whether the accessed device is a trusted device according to the trusted device list that is preset includes:
  • the wireless router acquires a source MAC address of the accessed device
  • the wireless router matches the source MAC address with a MAC address in the trusted device list
  • the wireless router determines whether the accessed device is a trusted device according to a result of the matching.
  • the method further includes:
  • the non-access device starts the WPS function within a preset time range.
  • a device for establishing a connection is applied to a wireless router, and the device for establishing a connection includes:
  • the receiving module is configured to: receive an instruction for starting a wireless fidelity Wi-Fi security protection setting WPS function, where the instruction is received from an accessed device that has accessed the wireless router;
  • the startup module is configured to: start the WPS function according to the instruction received by the receiving module, and trigger a WPS authentication process;
  • connection module is configured to establish a connection with the non-access device that is not connected to the wireless router according to the WPS authentication process triggered by the startup module.
  • the device further includes:
  • a determining module configured to: before the startup module starts the WPS function according to the instruction received by the receiving module, determine whether the accessed device has permission to start the WPS function.
  • the determining module includes:
  • a determining unit configured to: determine whether the accessed device is a trusted device
  • the first determining unit is configured to: when the determining unit determines that the accessed device is a trusted device, determine that the accessed device has the right to activate the WPS function;
  • the second determining unit is configured to: when the determining unit determines that the accessed device is an untrusted device, determine that the accessed device has no right to activate the WPS function.
  • the determining unit is configured to: determine, according to the pre-set trusted device list, whether the accessed device is a trusted device, where the trusted device list includes a media access control MAC address.
  • the determining, by the determining unit, whether the accessed device is a trusted device, according to the pre-set trusted device list may include: the wireless router acquiring a source MAC address of the accessed device; the wireless router Matching the source MAC address with a MAC address in the trusted device list; the wireless router determines, according to a result of the matching, whether the accessed device is a trusted device.
  • the method and device for establishing a connection receive a command for starting a Wi-Fi security protection setting WPS function by using a wireless router, where the instruction is received from an accessed device that has accessed the wireless router, Therefore, the wireless router starts the WPS function according to the instruction, and triggers the WPS authentication process, and the wireless router establishes a connection with the non-access device that is not connected to the wireless router according to the WPS authentication process, and solves the related technology in that the wireless router uses the PBC mode and the mobile device.
  • the process of establishing a connection is cumbersome and inconvenient, causing inconvenience to the user experience, and realizing the security of communication while also making connection with the wireless router more convenient, and bringing a good user experience to the user.
  • FIG. 1 is a flowchart of a method for establishing a connection according to an embodiment of the present invention
  • FIG. 2 is a flowchart of another method for establishing a connection according to an embodiment of the present invention.
  • FIG. 3 is a flowchart of still another method for establishing a connection according to an embodiment of the present invention.
  • FIG. 4 is a schematic structural diagram of an apparatus for establishing a connection according to an embodiment of the present invention.
  • FIG. 5 is a schematic structural diagram of another apparatus for establishing a connection according to an embodiment of the present disclosure.
  • FIG. 6 is a schematic diagram of a networking diagram for establishing a wireless connection and a structure of a wireless router according to an embodiment of the present invention
  • FIG. 7 is a flowchart of still another method for establishing a connection according to an embodiment of the present invention.
  • FIG. 8 is a schematic diagram of a networking mode of a wireless local area network in the related art.
  • FIG. 1 is a flowchart of a method for establishing a connection according to an embodiment of the present invention. As shown in FIG. 1, the process may include the following steps: 100 to step 102:
  • Step 100 The wireless router receives an instruction for starting a Wi-Fi security protection setting WPS function, where the instruction is received from an accessed device that has accessed the wireless router;
  • the wireless router starts WPS in two modes: Personal Identification Number (PIN) mode and button (PBC) mode.
  • PIN Personal Identification Number
  • PBC button
  • the mobile device that has accessed the wireless router can send an instruction to the wireless router, which is received by the wireless router and used to enable the WPS function of the wireless router.
  • Step 101 The wireless router starts the WPS function according to the instruction, and triggers the WPS authentication process.
  • Step 102 The wireless router establishes a connection with the non-access device that is not connected to the wireless router according to the WPS authentication process.
  • the wireless router and the non-access device establish a wireless communication connection through the authentication process of the WPS standard.
  • the WPS function of the wireless router is triggered by the accessed device that has accessed the wireless router, and the other wireless device also triggers the WPS function in the same period of time, so that the wireless device and the wireless router quickly access the network through the WPS.
  • Receiving, by the wireless router, an instruction to initiate a Wi-Fi security protection setting WPS function wherein the instruction is received from an accessed device that has accessed the wireless router, the wireless router initiating the location according to the instruction
  • the WPS function is used to trigger the WPS authentication process, and the wireless router establishes a connection with the non-access device that is not connected to the wireless router according to the WPS authentication process.
  • the foregoing solution of the embodiment of the present invention solves the related art It is cumbersome and inconvenient for the router to establish a connection with the mobile device using the PBC mode, which brings inconvenience to the user experience, and realizes the security of communication while also making the connection with the wireless router more convenient and bringing good to the user. User experience.
  • FIG. 2 is a flowchart of another method for establishing a connection according to an embodiment of the present invention. As shown in FIG. 2, the process may be The method includes the following steps, that is, steps 200 to 203:
  • Step 200 The wireless router receives an instruction for starting a Wi-Fi security protection setting WPS function, where the instruction is received from an accessed device that has accessed the wireless router;
  • the wireless router starts WPS in two modes: PIN mode and PBC mode.
  • PIN mode When a wireless connection is established with other mobile devices in the PBC mode, the mobile device that has accessed the wireless router can send an instruction to the wireless router, which is received by the wireless router and used to enable the WPS function of the wireless router.
  • Step 201 The wireless router determines whether the accessed device has the right to activate the WPS function.
  • Step 202 The wireless router starts the WPS function according to the instruction, and triggers the WPS authentication process.
  • Step 203 The wireless router establishes a connection with the non-access device that is not connected to the wireless router according to the WPS authentication process.
  • the wireless router and the device to be accessed pass the authentication process of the WPS standard to establish a wireless communication connection.
  • the connected device is authenticated by the wireless router, and only has The command sent by the connected device that controls the wireless router to initiate the WPS function permission, the wireless router receives the command to start the WPS function, and the other connected devices cannot control the wireless router to start the WPS function. Therefore, access to the wireless router is more secure and more private.
  • FIG. 3 is a flowchart of still another method for establishing a connection according to an embodiment of the present invention. As shown in FIG. 3, the process may be The method includes the following steps, that is, steps 300 to 305:
  • Step 300 The wireless router receives an instruction for starting a Wi-Fi security protection setting WPS function, where the instruction is received from an accessed device that has accessed the wireless router;
  • the wireless router starts WPS in two modes: PIN mode and PBC mode.
  • PIN mode When a wireless connection is established with other mobile devices in the PBC mode, the mobile device that has accessed the wireless router can send an instruction to the wireless router, which is received by the wireless router and used to enable the WPS function of the wireless router.
  • Step 301 The wireless router determines whether the accessed device is a trusted device.
  • the trusted device refers to the control of the accessed device by the wireless router. If the accessed device has higher and more rights to control the wireless router, for example, sending The instructions cause the wireless router to initiate the WPS function, such an accessed device is a trusted device.
  • the wireless router determines that the WPS function is authorized to be activated, or when it is determined that the device is not trusted, the wireless router determines that the WPS function is not authorized to start.
  • Step 302 In the case of NO, the wireless router determines that the accessed device does not have permission to start the WPS function
  • Step 303 in the case of YES, the wireless router determines that the accessed device has the right to start the WPS function
  • Step 304 The wireless router starts the WPS function according to the instruction, and triggers the WPS authentication process.
  • Step 305 The wireless router establishes a connection with the non-access device that is not connected to the wireless router according to the WPS authentication process.
  • the wireless router and the device to be accessed pass the authentication process of the WPS standard to establish a wireless communication connection.
  • the wireless router adopts a setting trust device and judges the sending control finger. Whether the accessed device is a trusted device method, while ensuring communication security, and making connection with the wireless router is more convenient, and brings a good user experience to the user.
  • the wireless router determines the accessed device by setting a trusted device list, and the trusted device list has multiple setting forms, and the device media access control (Media Access Control, Referred to as: MAC)
  • the address is a list of trusted devices.
  • the wireless router determines whether the accessed device is a trusted device, and includes: determining, according to a preset trusted device list, whether the accessed device is a trusted device, where the trusted device list includes a MAC address.
  • determining, according to the preset trusted device list, whether the accessed device is a trusted device includes: the wireless router acquires a source MAC address of the accessed device; and the wireless router sets the source MAC address and the trusted device list. The MAC address in the match is matched; the wireless router determines whether the accessed device is a trusted device according to the result of the matching.
  • the wireless router can quickly identify and determine whether the access device is a trusted device by matching the MAC address of the accessed device with the MAC address in the trusted device list. The MAC address information is set in the trusted device list in advance. If the MAC address of the accessed device matches successfully, the device is trusted. If the matching is successful, the device is untrustworthy. The method is simple and convenient. Very fast.
  • the method for establishing the connection may further include: the unconnected device starts the WPS function within a preset time range.
  • the unconnected device when the wireless router starts the WPS function, the unconnected device accessing the wireless router must also enable the WPS function within a certain time threshold, and then trigger the WPS function according to the standard to establish communication with the wireless router. connection.
  • a device for establishing a connection is provided, which is applied to a wireless router, and the device is used to implement the foregoing embodiments and optional implementation manners, and details are not described herein.
  • the term "module” may implement a combination of software and/or hardware of a predetermined function.
  • the apparatus described in the following embodiments is preferably implemented in software, hardware, or a combination of software and hardware, is also possible and contemplated.
  • FIG. 4 is a schematic structural diagram of an apparatus for establishing a connection according to an embodiment of the present invention, where the apparatus is applied to a wireless router.
  • the device for establishing a connection may include a receiving module 40, a starting module 42, and a connecting module 44, which will be described below.
  • the receiving module 40 is configured to: receive an instruction for starting a Wi-Fi security protection setting WPS function, where the instruction is received from an accessed device that has accessed the wireless router;
  • the startup module 42 is configured to: start the WPS function according to an instruction received by the receiving module 40, and trigger a WPS authentication process;
  • connection module 44 is configured to establish a connection with the non-access device that is not connected to the wireless router according to the WPS authentication process triggered by the startup module 42.
  • FIG. 5 is a schematic structural diagram of another apparatus for establishing a connection according to an embodiment of the present invention, where the apparatus is applied to a wireless router.
  • the device for establishing a connection may include: a receiving module 50, a determining module 52, a starting module 54, and a connecting module 56. The device will be described below.
  • the receiving module 50 is configured to: receive an instruction for starting a Wi-Fi security protection setting WPS function, where the instruction is received from an accessed device that has accessed the wireless router;
  • the determining module 52 is configured to: before the startup module 54 starts the WPS function according to the instruction received by the receiving module 50, determine whether the accessed device has the right to activate the WPS function.
  • the startup module 54 is configured to: start the WPS function according to an instruction received by the receiving module 50, and trigger a WPS authentication process;
  • connection module 56 is configured to establish a connection with the non-access device that is not connected to the wireless router according to the WPS authentication process triggered by the startup module 54.
  • the determining module 52 includes: a determining unit, configured to: determine whether the accessed device is a trusted device; and the first determining unit is configured to: determine, by the determining unit, that the accessed device is trusted In the case of the device, it is determined that the accessed device has the right to activate the WPS function; and the second determining unit is configured to: when the determining unit determines that the accessed device is an untrusted device, determine that the accessed device has no permission.
  • the WPS function is activated.
  • the determining unit is configured to: determine, according to the preset trusted device list, whether the accessed device is a trusted device, where the trusted device list includes a MAC address; wherein the determining unit is configured according to Determining whether the accessed device is a trusted device may include: obtaining a source MAC address of the accessed device; and matching the source MAC address with a MAC address in the trusted device list; Whether the accessed device is a trusted device is determined according to the result of the matching.
  • the device receives, by using a wireless router, an instruction for starting a Wi-Fi security protection setting WPS function, where the instruction is received from an accessed device that has accessed the wireless router, where The wireless router starts the WPS function according to the instruction, and triggers a WPS authentication process, and the wireless router establishes a connection with the non-access device that is not connected to the wireless router according to the WPS authentication process.
  • the device solves the problem that the wireless router uses the PBC mode to establish a connection with the mobile device in the related art, which is cumbersome and inconvenient, and brings inconvenience to the user experience, and realizes the connection between the wireless router and the wireless router while ensuring communication security. Convenient, bringing a good user experience to users.
  • FIG. 6 is a schematic diagram of a networking diagram for establishing a wireless connection and a structure of a wireless router according to an embodiment of the present invention. As shown in Figure 6:
  • the networking diagram of the wireless connection is composed of a wireless router AP 60, an accessed device 62, and a non-access device 64 that is not connected to the wireless router.
  • the non-access device 64 can include a wireless WPS module 641 configured to initiate a WPS function to establish a wireless connection with the wireless router.
  • the non-access device 64 is a commonly used wireless device site (station, referred to as: STA) module structure diagram, and needs to include a WPS module, such as a mobile device, a mobile phone, a tablet, or the like.
  • the access device 62 can include a message sending module 621, which is a commonly used mobile device or terminal that can access the wireless router, and is configured to send a message to the wireless router AP 60, and the wireless router AP 60 receives the message to trigger the WPS operation. .
  • a message sending module 621 which is a commonly used mobile device or terminal that can access the wireless router, and is configured to send a message to the wireless router AP 60, and the wireless router AP 60 receives the message to trigger the WPS operation.
  • the wireless router AP 60 is configured to: receive the message sent by the accessed device 62, and start the WPS function according to the message, trigger the authentication of the device to be accessed 64 that starts the WPS function, and finally establish a wireless connection.
  • the wireless router AP 60 may include: a message receiving module 601, configured to: receive a message sent by the accessed device, and have the same function as the receiving module 40 and the receiving module 50 of the wireless router in the foregoing embodiment;
  • the device trust list module 602 is configured to: add a trusted device information list by the user, and only the trusted device terminal can perform WPS control; the device information processing module 603 is configured to: according to the information received by the message receiving module and the device trust. List match, verify the device that sent the message Whether the terminal is a trusted device.
  • the device trust list module 602 and the device information processing module 603 may be configured to implement the functions of the determining module 52 and the initiating module 54 of the wireless router in the foregoing embodiment.
  • the wireless WPS module 604 is configured to: control the wireless router to perform WPS interaction with other devices or terminals, activate the WPS function after the device information processing module 603 verifies the verification, and trigger WPS authentication to establish a wireless communication connection with the to-be-accessed device 64.
  • the optional embodiment proposes to trigger the WPS function of the wireless route by the already accessed device, and another wireless device also triggers the WPS at the same time period, so that the wireless device and the wireless router quickly access the network through the WPS.
  • the message receiving module 601 is sent by the access device 62 to the wireless router AP 60 through the message sending module 621. After receiving the message, the message receiving module 601 performs legal verification according to the device trust list module 603. After verifying that the device is considered to be a legitimate trusted device, the WPS function of the wireless router is started; the WPS function of the device 64 to be accessed is started, and the wireless router AP 60 enters the WPS interaction process to access the network.
  • the device that has access to the wireless router is trusted, and a device is provided on the accessed device to trigger the PBC button of the wireless router to enter.
  • the device to be verified presses the PBC button, the device to be verified and the wireless router enter the WPS process.
  • the device to be verified can normally access the wireless LAN and access the Internet, which solves the related technology in that the wireless router uses the PBC mode.
  • the process of establishing a connection with a mobile device is cumbersome and inconvenient, causing inconvenience to the user experience, and the communication security is ensured, and the connection with the wireless router is more convenient, which brings a good user experience to the user.
  • An object of an optional embodiment of the present invention is to provide a method for remotely controlling a WPS function on a wireless router, which eliminates the need for the user to press the PBC button on the wireless router AP to facilitate the user to use the WPS function.
  • FIG. 7 is a flowchart of still another method for establishing a connection according to an embodiment of the present invention; as shown in FIG. 7, the process may include the following steps, that is, steps 700 to 706:
  • Step 700 The wireless router AP configures a trusted device list.
  • the wireless router AP configure the MAC address of the terminal to the trust list;
  • the trust list by default, trusts the connected device.
  • Step 701 The device terminal A sends a message to the wireless router.
  • the device terminal A can send a message to the wireless router through the message sending module.
  • Step 702 After receiving the message parsing success, the message receiving module of the wireless router AP notifies the device information verification module;
  • Step 703 The wireless router AP verifies whether the device terminal A is a trusted device.
  • the device information processing module in the wireless router AP uses the received information to compare the source MAC address of the IP packet with the MAC address that has been added to the trust list, and if yes, returns the verification, and if not, returns the verification. by. If the trust list is not configured, the verification is passed directly.
  • Step 704 the wireless router AP starts the WPS function.
  • the device information processing module in the wireless router AP starts the WPS function according to the verification result.
  • Step 705 The device information processing module in the wireless router AP terminates according to the verification result that the verification fails.
  • Step 706 The wireless device STA (ie, the non-access device) starts the WPS function.
  • the wireless device STA triggers the PBC button at the same time period, and also turns on the WPS function.
  • the wireless device STA and the wireless router AP enter the WPS standard interaction process and establish a wireless communication connection.
  • Xiao Ming adds the MAC address of his Apple phone to the trusted MAC address pool in the list of trusted devices through the setting interface of the wireless router.
  • Xiao Wang came to Huawei’s home and asked to access Huaweing’s wireless router for Internet access.
  • Step one Xiao Ming sends an instruction to the wireless router through the Apple mobile phone, the instruction is used for receiving by the wireless router, and can control the wireless router to enable the WPS function;
  • Step 2 After receiving the instruction, the wireless router acquires the MAC address of the iPhone and performs matching search.
  • Step 3 After the matching is successful, the wireless router starts the WPS function; the wireless router is trusted.
  • the device list finds the MAC address of the Apple mobile phone, and considers that the Apple mobile phone is a trusted access device, and the wireless router starts the WPS function according to the instruction.
  • Step 4 Xiao Wang's mobile phone turns on the WPS function, and establishes a wireless communication connection with the wireless router according to the WPS interaction process.
  • Xiao Wang sends a command on the mobile phone to request the wireless router to enable the WPS function. Since the trusted device list does not have the MAC address of the Xiaowang mobile phone, the verification fails, and the wireless routing does not enable the WPS function.
  • Xiao Ming can add the MAC address of the Xiaowang mobile phone to the trusted device MAC address pool through the setting interface of the wireless router.
  • the embodiments of the present invention provide a trust to a device that has access to a wireless router, and provide a device on the accessed device by using the foregoing embodiments, the optional embodiments, and the implementation manner.
  • the PBC button of the triggering wireless router enters the WPS mode, and the device to be verified presses the PBC button, and the device to be verified and the wireless router enter the WPS process. After the verification is successful, the device to be verified can normally access the wireless local area network and access the Internet.
  • the device triggers the WPS function of the wireless router, and another wireless device also triggers the WPS at the same time period, so that the wireless device and the wireless router that are not connected to the wireless router access the network through the WPS, and receive the Wi-Fi security protection by using the wireless router.
  • An instruction to set a WPS function wherein the instruction is received from an accessed device that has accessed the wireless router, the wireless router initiates the WPS function according to the instruction, and triggers a WPS authentication process, The wireless router establishes a connection with the non-access device that is not connected to the wireless router according to the WPS authentication process.
  • the solution of the embodiment of the present invention solves the problem that the wireless router uses the PBC mode to establish a connection with the mobile device in a related art, which is cumbersome and inconvenient, and brings inconvenience to the user experience, thereby realizing the security of communication while also enabling It is more convenient for the wireless router to establish a connection, which brings a good user experience to the user.
  • all or part of the steps of the foregoing embodiments may also be implemented by using an integrated circuit, and the steps may be separately fabricated into integrated circuit modules, or multiple modules thereof or The steps are made into a single integrated circuit module.
  • the devices/function modules/functional units in the above embodiments may be implemented by a general-purpose computing device, which may be centralized on a single computing device or distributed over a network of multiple computing devices.
  • the device/function module/functional unit in the above embodiment When the device/function module/functional unit in the above embodiment is implemented in the form of a software function module and sold or used as a stand-alone product, it can be stored in a computer readable storage medium.
  • the above mentioned computer readable storage medium may be a read only memory, a magnetic disk or an optical disk or the like.
  • the embodiment of the present invention receives, by the wireless router, an instruction for starting the Wi-Fi security protection setting WPS function, the instruction is received from the accessed device that has accessed the wireless router, so that the wireless router starts the WPS function according to the instruction, and
  • the WPS authentication process is triggered, and the wireless router establishes a connection with the non-access device that is not connected to the wireless router according to the WPS authentication process, and solves the cumbersome and inconvenient process of establishing a connection between the wireless router and the mobile device by using the PBC mode in the related art, and gives the user experience
  • the problem of inconvenience is realized, while ensuring the security of communication, it also makes the connection with the wireless router more convenient, and brings a good user experience to the user.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

一种建立连接的方法及装置,其中,该方法包括:无线路由器接收用于启动Wi-Fi安全防护设定WPS功能的指令,其中,该指令从已接入无线路由器的已接入设备中接收;无线路由器根据所述指令启动所述WPS功能,并触发WPS认证流程;无线路由器根据WPS认证流程与未接入无线路由器的未接入设备建立连接。

Description

一种建立连接的方法及装置 技术领域
本申请涉及但不限于通信技术领域。
背景技术
无线局域网(Wireless Local Area Network,简称为:WLAN),是指应用无线通信技术将计算机设备互联起来,构成可以互相通信和实现资源共享的网络体系。参考附图8,为相关技术中的一种无线局域网的组网模式示意图,无线局域网的组网模式大致为一台无线路由器连接互联网,个人计算机(Personal Computer,简称为:PC)、移动终端等设备则需要通过无线接入到该无线路由器,经由无线路由器访问互联网。因为是通过无线接入,没有了物理线缆连接的限制,所以在无线覆盖范围内的任何无线终端都能接收到无线路由器的信号。无线局域网本质的特点是不再使用通信电缆将计算机与网络连接起来,而是通过无线的方式连接,从而使网络的构建和终端的移动更加灵活。
为了防止未经授权的用户使用无线路由器的资源,客户端接入无线路由器时需要通过密钥验证。无线局域网安全系统,包括相关技术中的无线保真保护访问的第二版(2rd Wi-Fi Protected Access,简称为:WPA2)标准,都要求用户通过验证后才能登录网络启用安全性能。相关技术的做法是,当用户构建新的WLAN时,必须首先在无线接入点(Access Point,简称为:AP)上设置网络名称和密码,无线AP再根据密码生成安全密钥。当新的客户端添加到这个WLAN时,用户还需要选择相应的网络名称并输入密码。客户端和AP交换安全证书后,新设备才算连接到无线网络
无线网安全防护设定(WIreless-FIdelity Protected Setup即Wi-Fi Protected Setup,简称为:WPS)是由Wi-Fi联盟所推出的全新Wi-Fi安全防护设定标准,该标准推出的主要原因是为了解决长久以来无线网络加密认证设定的步骤过于繁杂艰难之弊病,使用者往往会因为步骤太过麻烦,以致干脆不做任何加密安全设定,因而引发许多安全上的问题。WPS用于简化Wi-Fi无线的安全设 置和网络管理,WPS支持两种模式:个人识别码(Personal Identification Number,简称为:PIN)模式和按钮(Push Button Configuration,简称为:PBC)模式。通过认证的接入点和客户端可以自动生成一个网络名称,并自动寻找其他的认证设备。用户只须按下设备上的一个按钮,或者在无线局域网中为每个设备创建一个4位或8位的PIN码,就可以触发认证,利用基于WPA2标准的预定义安全特性对设备进行配置,并将客户端设备添加到安全的网络。这个过程使用WPA2这项在2006年3月就已经成为认证产品强制性内容的标准,并使得用户更容易启动。
在移动设备与无线路由器建立连接时,根据WPS的PBC模式,用户需要同时按下无线路由器和移动设备上的PBC按钮来触发WPS认证流程。而无线路由器可能在某个角落或者天花板上,用户不方便使用PBC按钮,给用户体验带来不便。
发明内容
以下是对本文详细描述的主题的概述。本概述并非是为了限制权利要求的保护范围。
相关技术中,无线路由器使用PBC模式与移动设备建立连接过程繁琐、不方便,给用户体验带来不便的问题,相关技术中尚未提出有效的解决方案。
本文提供了一种建立连接的方法及装置,以解决相关技术中存在的无线路由器使用按钮(PBC)模式与移动设备建立连接过程繁琐、不方便,给用户体验带来不便的问题。
一种建立连接的方法,包括:
无线路由器接收用于启动无线保真Wi-Fi安全防护设定WPS功能的指令,其中,所述指令从已接入所述无线路由器的已接入设备中接收;
所述无线路由器根据所述指令启动所述WPS功能,并触发WPS认证流程;
所述无线路由器根据所述WPS认证流程与未接入所述无线路由器的未接入设备建立连接。
可选地,在所述无线路由器根据所述指令启动所述WPS功能之前,还包 括:
所述无线路由器确定所述已接入设备是否有权限启动所述WPS功能。
可选地,所述无线路由器确定所述已接入设备是否有权限启动所述WPS功能,包括:
所述无线路由器判断所述已接入设备是否为信任设备;
当判断出所述已接入设备是信任设备时,所述无线路由器确定所述已接入设备有权限启动所述WPS功能;
当判断出所述已接入设备为非信任设备时,所述无线路由器确定所述已接入设备无权限启动所述WPS功能。
可选地,所述无线路由器判断所述已接入设备是否为信任设备,包括:
所述无线路由器根据预先设置的信任设备列表判断所述已接入设备是否为信任设备,其中,所述信任设备列表中包括媒体访问控制MAC地址。
可选地,所述无线路由器根据预先设置的所述信任设备列表判断所述已接入设备是否为信任设备,包括:
所述无线路由器获取所述已接入设备的源MAC地址;
所述无线路由器将所述源MAC地址与所述信任设备列表中的MAC地址进行匹配;
所述无线路由器根据匹配的结果确定所述已接入设备是否为信任设备。
可选地,所述方法还包括:
在预设时间范围内,所述未接入设备启动所述WPS功能。
一种建立连接的装置,应用于无线路由器,所述建立连接的装置包括:
接收模块,设置为:接收用于启动无线保真Wi-Fi安全防护设定WPS功能的指令,其中,所述指令从已接入所述无线路由器的已接入设备中接收;
启动模块,设置为:根据所述接收模块接收的所述指令启动所述WPS功能,并触发WPS认证流程;
连接模块,设置为:根据所述启动模块触发的所述WPS认证流程与未接入所述无线路由器的未接入设备建立连接。
可选地,所述装置还包括:
确定模块,设置为:在所述启动模块根据所述接收模块接收的所述指令启动所述WPS功能之前,确定所述已接入设备是否有权限启动所述WPS功能。
可选地,所述确定模块包括:
判断单元,设置为:判断所述已接入设备是否为信任设备;
第一确定单元,设置为:在所述判断单元判断出所述已接入设备为信任设备时,确定所述已接入设备有权限启动所述WPS功能;
第二确定单元,设置为:在所述判断单元判断出所述已接入设备为非信任设备时,确定所述已接入设备无权限启动所述WPS功能。
可选地,所述判断单元,是设置为:根据预先设置的信任设备列表判断所述已接入设备是否为信任设备,其中,所述信任设备列表中包括媒体访问控制MAC地址。
可选地,所述判断单元根据预先设置的信任设备列表判断所述已接入设备是否为信任设备,可以包括:所述无线路由器获取所述已接入设备的源MAC地址;所述无线路由器将所述源MAC地址与所述信任设备列表中的MAC地址进行匹配;所述无线路由器根据匹配的结果确定所述已接入设备是否为信任设备。
本发明实施例提供的建立连接的方法及装置,采用无线路由器接收用于启动Wi-Fi安全防护设定WPS功能的指令,其中,该指令从已接入无线路由器的已接入设备中接收,从而无线路由器根据该指令启动WPS功能,并触发WPS认证流程,无线路由器根据WPS认证流程与未接入无线路由器的未接入设备建立连接,解决了相关技术中由于无线路由器使用PBC模式与移动设备建立连接过程繁琐、不方便,给用户体验带来不便的问题,实现了在保障通讯安全的同时,还使得与无线路由器建立连接更加便捷,给用户带来了良好的用户体验。
在阅读并理解了附图和详细描述后,可以明白其他方面。
附图概述
图1为本发明实施例提供的一种建立连接的方法的流程图;
图2为本发明实施例提供的另一种建立连接的方法的流程图;
图3为本发明实施例提供的又一种建立连接的方法的流程图;
图4为本发明实施例提供的一种建立连接的装置的结构示意图;
图5为本发明实施例提供的另一种建立连接的装置的结构示意图;
图6为本发明实施例提供的一种建立无线连接的组网示意图和无线路由器的结构示意图;
图7为本发明实施例提供的再一种建立连接的方法的流程图;
图8为相关技术中的一种无线局域网的组网模式示意图。
本发明的实施方式
下文中将结合附图对本发明的实施方式进行详细说明。需要说明的是,在不冲突的情况下,本文中的实施例及实施例中的特征可以相互任意组合。
在附图的流程图示出的步骤可以在诸如一组计算机可执行指令的计算机系统中执行。并且,虽然在流程图中示出了逻辑顺序,但是在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤。
在本发明的实施例中提供了一种建立连接的方法,图1为本发明实施例提供的一种建立连接的方法的流程图,如图1所示,该流程可以包括如下步骤,即步骤100~步骤102:
步骤100,无线路由器接收用于启动Wi-Fi安全防护设定WPS功能的指令,其中,该指令从已接入无线路由器的已接入设备中接收;
无线路由器启动WPS有两种模式:个人识别码(Personal Identification Number,简称为:PIN)模式和按钮(PBC)模式。当采用PBC模式与其他移动设备建立无线连接时,已经接入该无线路由器的移动设备可以向无线路由器发送一个指令,该指令被无线路由器接收,并用于开启无线路由器的WPS功能。
步骤101,无线路由器根据该指令启动WPS功能,并触发WPS认证流程;
步骤102,无线路由器根据WPS认证流程与未接入无线路由器的未接入设备建立连接。本发明实施例中无线路由器与未接入设备通过WPS标准的认证流程,建立无线通讯连接。
本发明实施例通过已经接入无线路由器的已接入设备触发无线路由的WPS功能,另外一台无线设备在同一时间段也触发WPS功能,使得无线设备和无线路由器通过WPS快速接入网络。采用无线路由器接收用于启动Wi-Fi安全防护设定WPS功能的指令,其中,所述指令从已接入所述无线路由器的已接入设备中接收,所述无线路由器根据所述指令启动所述WPS功能,并触发WPS认证流程,所述无线路由器根据所述WPS认证流程与未接入所述无线路由器的未接入设备建立连接;本发明实施例的上述方案解决了相关技术中由于无线路由器使用PBC模式与移动设备建立连接过程繁琐、不方便,而给用户体验带来不便的问题,实现了在保障通讯安全的同时,还使得与无线路由器建立连接更加便捷,给用户带来了良好的用户体验。
可选地,在本发明的实施例中还提供了一种建立连接的方法,图2为本发明实施例提供的另一种建立连接的方法的流程图,如图2所示,该流程可以包括如下步骤,即步骤200~步骤203:
步骤200,无线路由器接收用于启动Wi-Fi安全防护设定WPS功能的指令,其中,该指令从已接入无线路由器的已接入设备中接收;
无线路由器启动WPS有两种模式:PIN模式和PBC模式。当采用PBC模式与其他移动设备建立无线连接时,已经接入该无线路由器的移动设备可以向无线路由器发送一个指令,该指令被无线路由器接收,并用于开启无线路由器的WPS功能。
步骤201,无线路由器确定该已接入设备是否有权限启动所述WPS功能;
步骤202,无线路由器根据该指令启动WPS功能,并触发WPS认证流程;
步骤203,无线路由器根据WPS认证流程与未接入无线路由器的未接入设备建立连接。本发明实施例中无线路由器与待接入设备通过WPS标准的认证流程,建立无线通讯连接。
采用图2所示的方法,通过无线路由器对已接入设备进行认证,只有具有 控制无线路由器启动WPS功能权限的已接入设备发送的指令,无线路由器接收该指令后才能启动WPS功能,其他已接入设备不能控制无线路由器启动WPS功能。因此,可以接入无线路由器更加安全,更加私密。
可选地,在本发明的实施例中又提供了一种建立连接的方法,图3为本发明实施例提供的又一种建立连接的方法的流程图,如图3所示,该流程可以包括如下步骤,即步骤300~步骤305:
步骤300,无线路由器接收用于启动Wi-Fi安全防护设定WPS功能的指令,其中,该指令从已接入无线路由器的已接入设备中接收;
无线路由器启动WPS有两种模式:PIN模式和PBC模式。当采用PBC模式与其他移动设备建立无线连接时,已经接入该无线路由器的移动设备可以向无线路由器发送一个指令,该指令被无线路由器接收,并用于开启无线路由器的WPS功能。
步骤301,无线路由器判断该已接入设备是否为信任设备;信任设备是指无线路由器对已接入设备的管控,如果已接入设备有更高、更多的权限控制该无线路由器,例如发送指令使得无线路由器启动WPS功能,这样的已接入设备为信任设备。
当判断出已接入设备是信任设备的情况下,无线路由器确定有权限启动WPS功能,或者,当判断出已接入设备非信任设备的情况下,无线路由器确定无权限启动WPS功能。
步骤302,在否的情况下,无线路由器确定该已接入设备无权限启动WPS功能;
步骤303,在是的情况下,无线路由器确定该已接入设备有权限启动WPS功能;
步骤304,无线路由器根据该指令启动WPS功能,并触发WPS认证流程;
步骤305,无线路由器根据WPS认证流程与未接入无线路由器的未接入设备建立连接。本发明实施例中无线路由器与待接入设备通过WPS标准的认证流程,建立无线通讯连接。
通过图3所示的方法,无线路由器采用设置信任设备,并判断发送控制指 令的已接入设备是否为信任设备的方法,实现了在保障通讯安全的同时,还使得与无线路由器建立连接更加便捷,给用户带来了良好的用户体验。
在可选地实施方式中,通过设置信任设备列表的方式,无线路由器对已接入设备进行判断,而且信任设备列表有多种设置形式,此处列举了以设备媒体访问控制(Media Access Control,简称为:MAC)地址为可信任设备列表。无线路由器确定所述已接入设备是否为信任设备,包括:根据预先设置的信任设备列表判断所述已接入设备是否为信任设备,其中,所述信任设备列表中包括MAC地址。
在可选地实施方式中,根据预先设置的信任设备列表判断该已接入设备是否为信任设备,包括:无线路由器获取已接入设备的源MAC地址;无线路由器将源MAC地址与信任设备列表中的MAC地址进行匹配;无线路由器根据匹配的结果确定该已接入设备是否为信任设备。本实施例中无线路由器通过将已接入设备的MAC地址与信任设备列表中的MAC地址进行匹配实现了快速识别和判断接入设备是否为可信任设备。预先在可信任设备列表中设置MAC地址信息,如果已接入设备的MAC地址匹配成功,说明该设备是可信任的;如果未匹配成功,说明该设备是不可信任的,该方法简单、方便且非常快速。
可选地,以上建立连接的方法,还可以包括:在预设时间范围内,未接入设备启动WPS功能。根据无线路由器WPS功能的标准,在无线路由器启动WPS功能时,接入该无线路由器的未接入设备也必须在一定时间阈值内开启WPS功能,然后按照标准触发WPS功能,与该无线路由器建立通讯连接。
在本发明的实施例中提供了一种建立连接的装置,应用于无线路由器,该装置用于实现上述各实施例及可选地实施方式,已经进行过说明的不再赘述。如以下所使用的,术语“模块”可以实现预定功能的软件和/或硬件的组合。尽管以下实施例所描述的装置较佳地以软件来实现,但是硬件,或者软件和硬件的组合的实现也是可能并被构想的。
图4为本发明实施例提供的一种建立连接的装置的结构示意图,该装置应用于无线路由器。如图4所示,该建立连接的装置可以包括接收模块40、启动模块42和连接模块44,下面对该装置进行说明。
接收模块40,设置为:接收用于启动Wi-Fi安全防护设定WPS功能的指令,其中,所述指令从已接入所述无线路由器的已接入设备中接收;
启动模块42,设置为:根据接收模块40接收的指令启动所述WPS功能,并触发WPS认证流程;
连接模块44,设置为:根据启动模块42触发的WPS认证流程与未接入所述无线路由器的未接入设备建立连接。
可选地,图5为本发明实施例提供的另一种建立连接的装置的结构示意图,该装置应用于无线路由器。如图5所示,该建立连接的装置可以包括:接收模块50、确定模块52、启动模块54和连接模块56。下面对该装置进行说明。
接收模块50,设置为:接收用于启动Wi-Fi安全防护设定WPS功能的指令,其中,所述指令从已接入所述无线路由器的已接入设备中接收;
确定模块52,设置为:在启动模块54根据接收模块50接收的指令启动所述WPS功能之前,确定所述已接入设备是否有权限启动所述WPS功能。
启动模块54,设置为:根据接收模块50接收的指令启动所述WPS功能,并触发WPS认证流程;
连接模块56,设置为:根据启动模块54触发的WPS认证流程与未接入所述无线路由器的未接入设备建立连接。
在可选地实施方式中,确定模块52包括:判断单元,设置为:判断所述已接入设备是否为信任设备;第一确定单元,设置为:在判断单元判断出已接入设备为信任设备的情况下,确定已接入设备有权限启动所述WPS功能;第二确定单元,设置为:在判断单元判断出已接入设备为非信任设备的情况下,确定已接入设备无权限启动所述WPS功能。
在可选地实施方式中,该判断单元是设置为:根据预先设置的信任设备列表确定该已接入设备是否为信任设备,其中,所述信任设备列表中包括MAC地址;其中,判断单元根据预先设置的信任设备列表确定该已接入设备是否为信任设备,可以包括:获取该已接入设备的源MAC地址;将所述源MAC地址与所述信任设备列表中的MAC地址进行匹配;根据匹配的结果判断所述已接入设备是否为信任设备。
通过本发明实施例提供的装置,采用无线路由器接收用于启动Wi-Fi安全防护设定WPS功能的指令,其中,所述指令从已接入所述无线路由器的已接入设备中接收,所述无线路由器根据所述指令启动所述WPS功能,并触发WPS认证流程,所述无线路由器根据所述WPS认证流程与未接入所述无线路由器的未接入设备建立连接;本发明实施例提供的装置解决了相关技术中由于无线路由器使用PBC模式与移动设备建立连接过程繁琐、不方便,给用户体验带来不便的问题,实现了在保障通讯安全的同时,还使得与无线路由器建立连接更加便捷,给用户带来了良好的用户体验。
下面再结合具体实施例对本发明进行说明。
图6为本发明实施例提供的一种建立无线连接的组网示意图和无线路由器的结构示意图。如图6所示:
无线连接的组网示意图由无线路由器AP 60、已接入设备62和未接入无线路由器的未接入设备64组成。
未接入设备64可以包括无线WPS模块641,设置为:启动WPS功能与无线路由器建立无线连接。该未接入设备64是一种常用的无线设备站点(station,简称为:STA)模块结构图,需要包含WPS模块,例如手机、笔记本电脑、平板等移动设备或终端。
已接入设备62可以包括消息发送模块621,是一种常用的可以接入无线路由器的移动设备或终端,设置为:发消息给无线路由器AP 60,无线路由器AP 60接收该消息进行触发WPS操作。
无线路由器AP 60,设置为:接收已接入设备62发送的消息,并根据该消息启动WPS功能,触发与启动WPS功能的待接入设备64认证,最终建立无线连接。无线路由器AP 60可以包括:消息接收模块601,设置为:接收已接入设备发送的消息,与上述实施例中无线路由器的接收模块40、接收模块50功能相同;
设备信任列表模块602,设置为:通过用户添加信任的设备信息列表,只有被信任的设备终端才可以进行WPS控制;设备信息处理模块603,设置为:根据消息接收模块接收到的信息和设备信任列表配合,验证发送消息的设备 终端是否是信任的设备。设备信任列表模块602和设备信息处理模块603可以设置为实现上述实施例中无线路由器的确定模块52、启动模块54的功能;
无线WPS模块604,设置为:控制无线路由器与其他设备或终端进行WPS交互,在设备信息处理模块603验证通过后启动WPS功能,并触发WPS验证,与待接入设备64建立无线通讯连接。
该可选地实施例提出的通过已经接入的设备触发无线路由的WPS功能,另外一台无线设备在同一时间段也触发WPS,使得无线设备和无线路由器通过WPS快速接入网络。主要是由已接入设备62通过消息发送模块621发送消息给无线路由器AP 60的消息接收模块601;消息接收模块601在收到消息后,由消息处理模块602根据设备信任列表模块603进行合法验证,验证通过后认为是合法的被信任的设备后,启动无线路由器的WPS功能;同时启动待接入设备64的WPS功能,并与无线路由器AP60进入WPS交互流程接入网络。
通过图6所示的立无线连接的组网示意图和无线路由器的结构框图,对已经接入无线路由器的设备给予信任,在已接入的设备上提供某种装置可以触发无线路由器的PBC按钮进去WPS模式,同时待验证设备按下PBC按钮,待验证设备和无线路由器进入WPS流程,验证成功后,待验证设备可以正常接入无线局域网进而访问因特网,解决了相关技术中由于无线路由器使用PBC模式与移动设备建立连接过程繁琐、不方便,给用户体验带来不便的问题,实现了在保障通讯安全的同时,还使得与无线路由器建立连接更加便捷,给用户带来了良好的用户体验。
实例一、
本发明可选实施例的目的在于,提供一种远程控制无线路由器上的WPS功能的方法,省去用户去按无线路由器AP上的PBC按钮,方便用户使用WPS功能。为了能够更清晰地描述本发明可选实施例的内容,结合图7进行说明。图7为本发明实施例提供的再一种建立连接的方法的流程图;如图7所示,该流程可以包括如下步骤,即步骤700~步骤706:
步骤700,无线路由器AP配置信任设备列表;
在无线路由器AP中,将终端的MAC地址配置到信任列表;也可以不配置 信任列表,默认信任已接入的设备。
步骤701,设备终端A发送消息给无线路由器;
设备终端A可以通过消息发送模块发送消息给无线路由器。
步骤702,无线路由器AP的消息接收模块接收消息解析成功后,通知设备信息验证模块;
步骤703,无线路由器AP验证该设备终端A是否为可信任设备;
在无线路由器AP中设备信息处理模块利用接收到的信息,根据IP报文的源MAC地址和已经添加到信任列表中的MAC地址进行比较,如果存在则返回验证通过,如果不存在则返回验证不通过。如果没有配置信任列表,直接验证通过。
步骤704,无线路由器AP启动WPS功能;
在无线路由器AP中设备信息处理模块,根据验证结果是验证通过,启动WPS功能。
步骤705,在无线路由器AP中设备信息处理模块,根据验证结果是验证不通过,结束。
步骤706,无线设备STA(即未接入设备)启动WPS功能;
无线设备STA在同一时间段,触发PBC按钮,也开启WPS功能。无线设备STA和无线路由器AP进入WPS标准交互流程,并建立无线通讯连接。
实例二、
小明通过无线路由器的设置界面,将自己的苹果手机的MAC地址加入可信任设备列表中的可信任MAC地址池。小王来到小明家做客,要求接入小明家无线路由器进行上网。
步骤一,小明通过苹果手机向无线路由器发送指令,该指令用于无线路由器接收,并可以控制无线路由器开启WPS功能;
步骤二,无线路由器接收到该指令后,获取苹果手机的MAC地址,并进行匹配查找;
步骤三,经过匹配成功,无线路由器启动WPS功能;无线路由器在可信 任设备列表查找到了苹果手机的MAC地址,认为苹果手机是可以信任的接入设备,无线路由器根据指令启动WPS功能。
步骤四,小王的手机开启WPS功能,根据WPS交互流程与无线路由器建立无线通讯连接。
步骤五,小王通过手机发送指令要求无线路由器开启WPS功能,由于可信任设备列表无小王手机的MAC地址,验证不通过,无线路由不会开启WPS功能。
当然,在可选地实施方式中,小明可以通过无线路由器的设置界面将小王手机的MAC地址加入可信任设备MAC地址池。
综上所述,通过上述各实施例、可选地实施例和实施方式,本发明实施例的思路是对已经接入无线路由器的设备给予信任,在已接入的设备上提供某种装置可以触发无线路由器的PBC按钮进去WPS模式,同时待验证设备按下PBC按钮,待验证设备和无线路由器进入WPS流程,验证成功后,待验证设备可以正常接入无线局域网进而访问因特网,通过已经接入的设备触发无线路由的WPS功能,另外一台无线设备在同一时间段也触发WPS,使得未接入无线设备和无线路由器通过WPS快速接入网络,采用无线路由器接收用于启动Wi-Fi安全防护设定WPS功能的指令,其中,所述指令从已接入所述无线路由器的已接入设备中接收,所述无线路由器根据所述指令启动所述WPS功能,并触发WPS认证流程,所述无线路由器根据所述WPS认证流程与未接入所述无线路由器的未接入设备建立连接,本发明实施例的方案解决了相关技术中由于无线路由器使用PBC模式与移动设备建立连接过程繁琐、不方便,给用户体验带来不便的问题,实现了在保障通讯安全的同时,还使得与无线路由器建立连接更加便捷,给用户带来了良好的用户体验。
本领域普通技术人员可以理解上述实施例的全部或部分步骤可以使用计算机程序流程来实现,所述计算机程序可以存储于一计算机可读存储介质中,所述计算机程序在相应的硬件平台上(如系统、设备、装置、器件等)执行,在执行时,包括方法实施例的步骤之一或其组合。
可选地,上述实施例的全部或部分步骤也可以使用集成电路来实现,这些步骤可以被分别制作成一个个集成电路模块,或者将它们中的多个模块或 步骤制作成单个集成电路模块来实现。
上述实施例中的装置/功能模块/功能单元可以采用通用的计算装置来实现,它们可以集中在单个的计算装置上,也可以分布在多个计算装置所组成的网络上。
上述实施例中的装置/功能模块/功能单元以软件功能模块的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。上述提到的计算机可读取存储介质可以是只读存储器,磁盘或光盘等。
工业实用性
本发明实施例通过无线路由器接收用于启动Wi-Fi安全防护设定WPS功能的指令,该指令从已接入无线路由器的已接入设备中接收,从而无线路由器根据该指令启动WPS功能,并触发WPS认证流程,无线路由器根据WPS认证流程与未接入无线路由器的未接入设备建立连接,解决了相关技术中由于无线路由器使用PBC模式与移动设备建立连接过程繁琐、不方便,给用户体验带来不便的问题,实现了在保障通讯安全的同时,还使得与无线路由器建立连接更加便捷,给用户带来了良好的用户体验。

Claims (10)

  1. 一种建立连接的方法,包括:
    无线路由器接收用于启动无线保真Wi-Fi安全防护设定WPS功能的指令,其中,所述指令从已接入所述无线路由器的已接入设备中接收;
    所述无线路由器根据所述指令启动所述WPS功能,并触发WPS认证流程;
    所述无线路由器根据所述WPS认证流程与未接入所述无线路由器的未接入设备建立连接。
  2. 根据权利要求1所述的方法,其中,在所述无线路由器根据所述指令启动所述WPS功能之前,还包括:
    所述无线路由器确定所述已接入设备是否有权限启动所述WPS功能。
  3. 根据权利要求2所述的方法,其中,所述无线路由器确定所述已接入设备是否有权限启动所述WPS功能,包括:
    所述无线路由器判断所述已接入设备是否为信任设备;
    当判断出所述已接入设备为信任设备时,所述无线路由器确定所述已接入设备有权限启动所述WPS功能;
    当判断出所述已接入设备为非信任设备时,所述无线路由器确定所述已接入设备无权限启动所述WPS功能。
  4. 根据权利要求3所述的方法,其中,所述无线路由器判断所述已接入设备是否为信任设备,包括:
    所述无线路由器根据预先设置的信任设备列表判断所述已接入设备是否为信任设备,其中,所述信任设备列表中包括媒体访问控制MAC地址。
  5. 根据权利要求4所述的方法,其中,所述无线路由器根据预先设置的所述信任设备列表判断所述已接入设备是否为信任设备,包括:
    所述无线路由器获取所述已接入设备的源MAC地址;
    所述无线路由器将所述源MAC地址与所述信任设备列表中的MAC地址进行匹配;
    所述无线路由器根据匹配的结果确定所述已接入设备是否为信任设备。
  6. 根据权利要求1至5任意一项所述的方法,还包括:
    在预设时间范围内,所述未接入设备启动所述WPS功能。
  7. 一种建立连接的装置,应用于无线路由器,包括:
    接收模块,设置为:接收用于启动无线保真Wi-Fi安全防护设定WPS功能的指令,其中,所述指令从已接入所述无线路由器的已接入设备中接收;
    启动模块,设置为:根据所述接收模块接收的所述指令启动所述WPS功能,并触发WPS认证流程;
    连接模块,设置为:根据所述启动模块触发的所述WPS认证流程与未接入所述无线路由器的未接入设备建立连接。
  8. 根据权利要求7所述的装置,还包括:
    确定模块,设置为:在所述启动模块根据所述接收模块接收的所述指令启动所述WPS功能之前,确定所述已接入设备是否有权限启动所述WPS功能。
  9. 根据权利要求8所述的装置,其中,所述确定模块包括:
    判断单元,设置为:判断所述已接入设备是否为信任设备;
    第一确定单元,设置为:在所述判断单元判断出所述已接入设备为信任设备时,确定所述已接入设备有权限启动所述WPS功能;
    第二确定单元,设置为:在所述判断单元判断出所述已接入设备为非信任设备时,确定所述已接入设备无权限启动所述WPS功能。
  10. 根据权利要求9所述的装置,其中,所述判断单元,是设置为:根据预先设置的信任设备列表判断所述已接入设备是否为信任设备,其中,所述信任设备列表中包括媒体访问控制MAC地址。
PCT/CN2016/081901 2015-06-30 2016-05-12 一种建立连接的方法及装置 WO2017000680A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510375512.0 2015-06-30
CN201510375512.0A CN106332303A (zh) 2015-06-30 2015-06-30 一种建立连接的方法及装置

Publications (1)

Publication Number Publication Date
WO2017000680A1 true WO2017000680A1 (zh) 2017-01-05

Family

ID=57607835

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/081901 WO2017000680A1 (zh) 2015-06-30 2016-05-12 一种建立连接的方法及装置

Country Status (2)

Country Link
CN (1) CN106332303A (zh)
WO (1) WO2017000680A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108282549A (zh) * 2018-01-29 2018-07-13 上海康斐信息技术有限公司 一种路由器、通过扫描二维码获取终端标识的方法及系统

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110381504A (zh) * 2019-06-25 2019-10-25 福州数据技术研究院有限公司 一种无线自组网加密通信方法及其终端
CN115499897B (zh) * 2022-11-16 2023-04-11 荣耀终端有限公司 WiFi网络接入方法及相关装置

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103428547A (zh) * 2013-07-26 2013-12-04 无锡德思普科技有限公司 一种支持wifi wps热点功能的电视盒及其工作方法
CN203445978U (zh) * 2013-07-26 2014-02-19 无锡德思普科技有限公司 一种支持wifi wps热点功能的电视盒
CN103634935A (zh) * 2013-11-22 2014-03-12 北京奇虎科技有限公司 基于wps或qss的网络接入方法和装置
JP2014216736A (ja) * 2013-04-24 2014-11-17 パナソニック株式会社 無線lan接続システム
CN104581722A (zh) * 2014-12-10 2015-04-29 杭州赫智电子科技有限公司 一种基于wps的网络连接方法和装置
CN105472693A (zh) * 2014-09-01 2016-04-06 中兴通讯股份有限公司 一种终端、无线接入装置和触发方法、系统

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20140044167A (ko) * 2012-10-04 2014-04-14 주식회사 제이컴정보 스마트기기 사용자 안전관리 시스템 및 방법

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2014216736A (ja) * 2013-04-24 2014-11-17 パナソニック株式会社 無線lan接続システム
CN103428547A (zh) * 2013-07-26 2013-12-04 无锡德思普科技有限公司 一种支持wifi wps热点功能的电视盒及其工作方法
CN203445978U (zh) * 2013-07-26 2014-02-19 无锡德思普科技有限公司 一种支持wifi wps热点功能的电视盒
CN103634935A (zh) * 2013-11-22 2014-03-12 北京奇虎科技有限公司 基于wps或qss的网络接入方法和装置
CN105472693A (zh) * 2014-09-01 2016-04-06 中兴通讯股份有限公司 一种终端、无线接入装置和触发方法、系统
CN104581722A (zh) * 2014-12-10 2015-04-29 杭州赫智电子科技有限公司 一种基于wps的网络连接方法和装置

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108282549A (zh) * 2018-01-29 2018-07-13 上海康斐信息技术有限公司 一种路由器、通过扫描二维码获取终端标识的方法及系统

Also Published As

Publication number Publication date
CN106332303A (zh) 2017-01-11

Similar Documents

Publication Publication Date Title
US10904758B2 (en) Secure method for configuring internet of things (IOT) devices through wireless technologies
KR101551315B1 (ko) 다른 디바이스가 무선 네트워크에 연결하는 것을 가능하게 하기 위한 모바일 디바이스의 사용
US9049184B2 (en) System and method for provisioning a unique device credentials
JP5281128B2 (ja) Wi−fiアクセス方法、アクセスポイント、及びwi−fiアクセスシステム
US8266681B2 (en) System and method for automatic network logon over a wireless network
US9763094B2 (en) Methods, devices and systems for dynamic network access administration
US9275218B1 (en) Methods and apparatus for verification of a user at a first device based on input received from a second device
US9826399B2 (en) Facilitating wireless network access by using a ubiquitous SSID
WO2017054355A1 (zh) 无线网络接入方法、装置和系统
US20200358758A1 (en) Multi-factor authorization for ieee 802.1x-enabled networks
US20160242033A1 (en) Communication service using method and electronic device supporting the same
WO2013033999A1 (zh) 用于移动设备点对点数据传输的方法和装置
EP2876855A1 (en) Mobile wireless access and establishment of virtual private network
TWI462604B (zh) 無線網路用戶端認證系統及其無線網路連線方法
US20210251019A1 (en) Systems and methods for provisioning wi-fi devices
WO2014161277A1 (zh) 便携式wlan热点的连接方法及系统
BR112021003460A2 (pt) dispositivo sem identidade de assinante, dispositivo de identidade do assinante, método para uso em um dispositivo sem identidade de assinante, método para uso em um dispositivo com identidade de assinante e produto de programa de computador
JP2023162296A (ja) コアネットワークへの非3gppデバイスアクセス
WO2017000680A1 (zh) 一种建立连接的方法及装置
CN102761940B (zh) 一种802.1x认证方法和设备
CN111031540B (zh) 一种无线网络连接方法及计算机存储介质
KR102074760B1 (ko) 기기 간 자동 무선 통신 연결되는 영상 표시장치 및 이에 따른 영상표시 방법
KR20150141095A (ko) Nvr 자동 등록 기능을 구비한 무선 카메라, 무선 카메라 자동 등록 기능을 구비한 무선 nvr 장치 및 무선 카메라를 무선 nvr 장치에 자동으로 등록하는 방법
JP2020521385A (ja) ネットワーク通信におけるおよびネットワーク通信に関する改善
KR102266044B1 (ko) 단말과 액세스 포인트의 연결 방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16817044

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16817044

Country of ref document: EP

Kind code of ref document: A1