WO2017202355A1 - 无线中继的实现 - Google Patents

无线中继的实现 Download PDF

Info

Publication number
WO2017202355A1
WO2017202355A1 PCT/CN2017/085835 CN2017085835W WO2017202355A1 WO 2017202355 A1 WO2017202355 A1 WO 2017202355A1 CN 2017085835 W CN2017085835 W CN 2017085835W WO 2017202355 A1 WO2017202355 A1 WO 2017202355A1
Authority
WO
WIPO (PCT)
Prior art keywords
wireless
relay device
wireless relay
response message
probe response
Prior art date
Application number
PCT/CN2017/085835
Other languages
English (en)
French (fr)
Inventor
王祝勋
邓健
蔡友华
Original Assignee
新华三技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 新华三技术有限公司 filed Critical 新华三技术有限公司
Publication of WO2017202355A1 publication Critical patent/WO2017202355A1/zh
Priority to US16/171,368 priority Critical patent/US10945307B2/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/04Terminal devices adapted for relaying to or from another terminal or user
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/20Selecting an access point
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B17/00Monitoring; Testing
    • H04B17/30Monitoring; Testing of propagation channels
    • H04B17/309Measuring or estimating channel quality parameters
    • H04B17/318Received signal strength
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing
    • H04W40/22Communication route or path selection, e.g. power-based or shortest path routing using selective relaying for reaching a BTS [Base Transceiver Station] or an access point
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/24Connectivity information management, e.g. connectivity discovery or connectivity update
    • H04W40/246Connectivity information discovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/14Access restriction or access information delivery, e.g. discovery data delivery using user query or user detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/005Discovery of network devices, e.g. terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Definitions

  • WLAN Wireless Local Area Network
  • a wireless relay device may be added between the wireless routing device and the wireless coverage blind spot area.
  • the wireless relay device can relay the wireless signal of the wireless routing device to expand the wireless coverage of the wireless routing device, thereby eliminating the blind spot of the wireless coverage.
  • FIG. 1 is an interaction flowchart of a method for implementing a wireless relay according to an example of the present disclosure.
  • FIG. 2 is a flow chart showing a method for a wireless routing device to determine whether to allow a wireless relay device to automatically connect to the wireless routing device, as an example of the present disclosure.
  • FIG. 3 is a flow diagram of a method of determining, by another example of the present disclosure, whether a wireless routing device allows a wireless relay device to automatically connect to the wireless routing device.
  • FIG. 4 is a schematic diagram showing the hardware structure of a wireless relay device according to an example of the present disclosure.
  • FIG. 5 is a schematic structural diagram of a first wireless relay implementing apparatus applied to a wireless relay device according to an example of the present disclosure.
  • FIG. 6 is a schematic structural diagram of a first wireless relay implementing apparatus applied to a wireless relay device according to another example of the present disclosure.
  • FIG. 7 is a schematic structural diagram of a first wireless relay implementing apparatus applied to a wireless relay device according to still another example of the present disclosure.
  • FIG. 8 is a schematic diagram showing the hardware structure of a wireless routing device according to an example of the present disclosure.
  • FIG. 9 is a schematic structural diagram of a second wireless relay implementing apparatus applied to a wireless routing device according to an example of the present disclosure.
  • FIG. 10 is another schematic structural diagram of a second wireless relay implementing apparatus applied to a wireless routing device according to another example of the present disclosure.
  • the wireless routing device may send a beacon packet to the wireless relay device according to the predetermined beacon interval, where the Beacon packet may carry an SSID (Service Set Identifier).
  • the SSID carried in the Beacon packet can be added to the wireless channel list. Therefore, the wireless relay device can add the SSID carried in the monitored multiple Beacon packets to the wireless channel list.
  • the wireless relay device may select an SSID from the wireless channel list, and send a Probe Request message to the corresponding wireless routing device according to the SSID. After receiving the Probe Request message, the wireless routing device can send a Probe Response message to the wireless relay device to complete the detection process. After the authentication process and the association process are completed, the wireless relay device establishes a connection with the wireless routing device, and implements relaying of the wireless signal of the wireless routing device.
  • FIG. 1 is an interaction flowchart of a method for implementing a wireless relay according to an example of the present disclosure. As shown in FIG. 1, in the example of the present disclosure, the wireless relay implementing method may include the following steps S101-S108.
  • the wireless relay device may send a Probe Request message, where the Probe Request message carries a first detection code and device information of the wireless relay device.
  • the probe request packet can be sent in the ISM (Industrial Scientific Medical) frequency band supported by the device according to the scheduled transmission interval T1.
  • the ISM band can be 2.4 GHz (Gigahertz) and 5 GHz.
  • the above-described transmission time interval T1 can be set to 60 seconds.
  • a plurality of detection codes can be stored in the wireless relay device.
  • the detection code can be a string of multiple bytes.
  • the wireless relay device can send a check code carrying the selected check code.
  • a Probe Request message such as a first detection code and device information of the wireless relay device.
  • each detection code may have a corresponding encryption algorithm.
  • the encryption algorithm corresponding to the detection code "H3C_MAGIC” may be an AES (Advanced Encryption Standard) encryption algorithm
  • the encryption algorithm corresponding to the detection code "H3C” may be a DES (Data Encryption Standard) encryption algorithm.
  • the wireless relay device may encrypt the device information of the wireless relay device by using a selected detection code, for example, an encryption algorithm corresponding to “H3C_MAGIC”, for example, an AES encryption algorithm, to obtain device information of the ciphertext.
  • the wireless relay device may send a Probe Request message carrying the device information of the selected detection code, for example, the first detection code and the ciphertext.
  • the device information of the wireless relay device may also not be encrypted, for example, when the first detection code does not have a corresponding encryption algorithm.
  • the device information may be a combination of one or more of a MAC (Media Access Control) address, an electronic tag, and a device model.
  • MAC Media Access Control
  • the wireless routing device may determine, according to the first detection code carried in the Probe Request message and the device information of the wireless relay device, whether the wireless relay device is allowed to be automatically enabled.
  • the wireless routing device is connected, and when the permission is determined, a Probe Response message is sent to the wireless relay device.
  • each of the wireless routing devices can perform the above step S102.
  • step S102 the method for determining, by the wireless routing device, whether the wireless relay device is allowed to automatically connect to the wireless routing device according to the first detection code and the device information of the wireless relay device may be as shown in FIG. 2, and may include the following step S201. -S204.
  • step S201 it is determined whether there is a detection code identical to the first detection code on the wireless routing device. If yes, step S202 is performed. If not, step S204 is performed.
  • the wireless routing device may also store multiple detection codes, which may be the same as the detection codes stored on the wireless relay device.
  • step S202 the wireless router device determines whether the device information of the wireless relay device is correct. If it is correct, step S203 is performed, otherwise step S204 is performed.
  • the wireless routing device may search for the encryption algorithm corresponding to the first detection code in order to obtain the device information of the wireless relay device from the Probe Request message. And decrypting the device information of the wireless relay device of the ciphertext carried in the Probe Request message by using the decryption algorithm corresponding to the obtained encryption algorithm, thereby obtaining the device information of the wireless relay device in the plaintext. And when the wireless relay device When the device information is not encrypted by the encryption algorithm corresponding to the first detection code, the wireless routing device can directly obtain the device information of the wireless relay device in the plaintext from the Probe Request message. After that, the wireless routing device can determine whether the information of the plaintext wireless relay device is correct. In this way, it can play a role in security certification.
  • the wireless routing device determines whether the information of the wireless relay device is correct, and may adopt a combination of one or more of the following methods.
  • Method 1 When the device information of the wireless relay device is a MAC address, the wireless routing device can compare the MAC address with the MAC address carried in the Source MAC field of the MAC Header. If the two are the same, it is determined that the device information of the wireless relay device is correct.
  • Method 2 When the device information of the wireless relay device is one or more combinations of MAC address, electronic tag, device model, and the like, the wireless routing device may send the device information of the wireless relay device to the cloud server. In order to query the correctness of these device information. After the wireless routing device receives the authentication result returned by the cloud server, it can be known whether the device information is correct.
  • the wireless relay device may add a field for carrying the electronic tag in the Probe Request message, so that the wireless routing device can compare the electronic tag carried in the field. With the electronic tag in the device information.
  • the wireless relay device may add a field for carrying the device model in the Probe Request message, so that the wireless routing device can compare the device model carried in the field. This embodiment of the present disclosure does not limit the device model in the device information.
  • step S203 the wireless routing device allows the wireless relay device to automatically connect to the wireless routing device.
  • step S204 the wireless routing device does not allow the wireless relay device to automatically connect to the wireless routing device.
  • the wireless routing device may determine, according to the first detection code and the device information of the wireless relay device, whether the wireless relay device is allowed to automatically connect to the wireless routing device.
  • the Probe Request message may also carry an RSSI (Received Signal Strength Indication) value.
  • the wireless routing device may further determine, according to the RSSI value carried in the Probe Request message, whether the wireless relay device is allowed to automatically connect to the wireless routing device.
  • the determining method may include the following steps S301 to S305 as shown in FIG. 3 .
  • step S301 the wireless routing device determines whether the same detection code as the first detection code carried in the Probe Request message exists on the device. If yes, step S302 is performed. If not, step S305 is performed.
  • step S302 the wireless routing device determines whether the device information of the wireless relay device carried in the Probe Request message is correct. If yes, go to step S303, otherwise, go to step S305.
  • step S303 the wireless routing device determines whether the RSSI value carried in the Probe Request message is greater than a predetermined strength threshold. If it is greater, step S304 is performed; otherwise, step S305 is performed.
  • the Packet Information field of the Probe Request message may carry an RSSI value.
  • step S304 the wireless routing device allows the wireless relay device to automatically connect to the wireless routing device.
  • step S305 the wireless routing device does not allow the wireless relay device to automatically connect to the wireless routing device.
  • the wireless routing device determines whether the wireless relay device is allowed to automatically connect to the wireless routing device, the purpose of increasing the RSSI value is to avoid in an environment where there are multiple wireless routing devices, in the wireless. Relaying wireless signals of other wireless routing devices following device error.
  • the above predetermined intensity threshold can be set to -65 dBm, and the corresponding unobstructed straight line distance is about 2 meters. For example, if the wireless routing device determines that the RSSI value carried in the Probe Request message is greater than -65 dBm, the wireless relay device may be allowed to automatically connect to the wireless routing device, indicating that the wireless routing device only allows the physical distance to be within about 2 meters. The wireless relay device automatically connects to the wireless routing device.
  • the purpose of increasing the RSSI value may further include: if the encryption algorithm is cracked, if the wireless relay device cannot be close to the wireless at a physical distance The routing device, the wireless relay device still cannot automatically connect to the wireless routing device.
  • the wireless routing devices can send a Probe Response message to the wireless relay device.
  • the probe response packet may carry the second detection code, the SSID, the password, and the wireless parameter corresponding to the wireless routing device.
  • the wireless parameters may include: RSSI value, channel bandwidth mode, wireless channel, and signal quality (CINR (Carrier to Interference plus Noise Ratio)/SINR (Signal to Interference plus Noise Ratio). A combination of one or more of parameters such as noise ratio), timing offset, frequency offset, terminal signal incident angle, wireless relay mode, physical rate, and the like.
  • the wireless parameters may also include other parameters, which are not limited by the embodiments of the present disclosure.
  • the channel bandwidth mode may be HT (High Throughput) 20, HT40, HT80, or HT160.
  • the wireless relay mode can be single frequency or dual frequency.
  • the wireless routing device can specify the wireless relay mode of the wireless relay device.
  • the wireless routing device may specify that the wireless relay device relays the wireless signal of the wireless routing device in a dual frequency manner, and may further specify a first frequency band used by the wireless relay device to perform data transmission with the wireless routing device, and The wireless relay device performs with the wireless client The second frequency band used for data transmission.
  • the first frequency band may be 2.4 GHz
  • the second frequency band may be 5 GHz
  • the first frequency band may be 5 GHz
  • the second frequency band may be 2.4 GHz.
  • the wireless relay device can use the first frequency band for wireless relay and the second frequency band for wireless coverage.
  • the wireless routing device selects a detection code as the second detection code before sending the Probe Response message. For example, the wireless routing device may select “H3C_MAGIC” as the second detection code, and encrypt the SSID, the password, and the wireless parameter by using the AES encryption algorithm corresponding to the selected detection code “H3C_MAGIC” to obtain the SSID, password, and wireless parameters of the ciphertext. .
  • the wireless routing device may send a Probe Response message carrying the selected detection code (ie, the second detection code) and the SSID, password, and wireless parameters of the ciphertext.
  • the second detection code in the Probe Response packet may be the same as the first detection code in the Probe Request message, or may be different. If the second detection code does not have a corresponding encryption algorithm, the SSID, password, and wireless parameters may not be encrypted.
  • step S103 the wireless relay device receives a Probe Response message sent by the wireless routing device.
  • the wireless relay device can determine whether the detection code of the second detection code carried in the Probe Response packet is the same on the device. If yes, the SSID, password, and wireless parameters can be obtained from the Probe Response message. For example, when the SSID, the password, and the wireless parameter are encrypted by the encryption algorithm corresponding to the second detection code, the wireless relay device may search for an encryption algorithm corresponding to the second detection code, and use a decryption algorithm corresponding to the found encryption algorithm. The SSID, password, and radio parameters of the ciphertext carried in the Probe Response packet are decrypted, thereby obtaining the plaintext SSID, password, and radio parameters.
  • step S104 if the wireless relay device receives the Probe Response message sent by two or more wireless routing devices within the predetermined waiting time T2, the wireless relay device may select a wireless routing device.
  • the wireless relay device may acquire a plurality of SSIDs, passwords, and wireless parameters at this time.
  • the wireless relay device may select an SSID and a password corresponding to the wireless parameter that meets the preset condition, and may be referred to as a first SSID and a first password for convenience of description.
  • the wireless relay device may select a wireless routing device that sends a Probe Response message carrying the first SSID and the first password.
  • the wireless parameter may include one of an RSSI value, a channel bandwidth mode, a wireless channel, a signal quality (CINR/SINR), a time offset, a frequency offset, a terminal signal incident angle, a wireless relay mode, and a physical rate. Or a combination of a plurality of kinds, whereby the above predetermined condition can be set in combination with one or a combination of the above parameters.
  • the wireless parameter is the RSSI value
  • the preset condition may be that the RSSI value is greater than the predetermined intensity threshold, which is not limited by the embodiment of the disclosure.
  • the wireless relay device may not be able to connect. To the ideal wireless routing device. If the predetermined waiting time T2 is too long, the time to complete the wireless relay process may be too long. Therefore, preferably, the waiting time T2 can be set to 60 seconds.
  • step S104 the wireless relay device selects the wireless routing device 2 in FIG.
  • step S105 the wireless relay device transmits an Authentication Request message to the selected wireless routing device (wireless routing device 2).
  • the first SSID and the first password carried in the Probe Response message sent by the selected wireless routing device may be carried in the Authentication Request message.
  • the selected wireless routing device After receiving the Authentication Request message, the selected wireless routing device authenticates the wireless relay device according to the first SSID and the first password, and sends an Authentication Response to the wireless relay device after the authentication is passed. Authentication response) message.
  • step S107 after receiving the Authentication Response message, the wireless relay device sends an Association Request message to the selected wireless routing device.
  • step S108 after receiving the Association Request message, the selected wireless routing device sends an Association Response message to the wireless relay device.
  • the wireless relay device After receiving the Association Response message, the wireless relay device establishes a connection with the selected wireless routing device, and can relay the wireless signal of the selected wireless routing device.
  • the wireless relay device may also set the device to a client mode, perform wireless setting according to the wireless parameter that meets the preset condition, and save the wireless parameter in the wireless parameter.
  • a non-default configuration file the current configuration of the wireless relay device can be updated to a non-default configuration.
  • the wireless configuration can be directly performed according to the configuration file, thereby implementing the selection.
  • the wireless signal relay of the wireless routing device may also be set to a client mode, perform wireless setting according to the wireless parameter that meets the preset condition, and save the wireless parameter in the wireless parameter.
  • the current configuration of the wireless relay device can be updated to a non-default configuration.
  • the wireless relay device when the wireless relay device receives only the Probe Response message that is responded by a wireless routing device, the wireless relay device may perform the selection operation of step S104 directly, and directly The routing device performs the authentication and association process of steps S105 to S108.
  • the wireless relay device may send an indication signal indicating that the relay is successful.
  • the wireless relay device may send an indication signal through an LED (Light Emitting Diode) indicator, or an indication signal or the like may be emitted by a sound, which is not limited by the embodiment of the present disclosure.
  • LED Light Emitting Diode
  • the wireless relay device may send the first check to the first wireless routing device.
  • Probe request message for measuring the code and device information of the wireless relay device.
  • the first wireless routing device determines whether the wireless relay device is allowed to automatically connect to the wireless routing device according to the first detection code and the device information.
  • the first wireless routing device sends a Probe Response message carrying the SSID and the password corresponding to the first wireless routing device to the wireless relay device.
  • the wireless relay device may receive a Probe Response message sent by the first wireless routing device, and send an Authentication Request message carrying the SSID and the password corresponding to the second wireless routing device to the second wireless routing device.
  • the relay of the wireless signal to the second wireless routing device can be implemented. It can be understood that the second wireless routing device is one of the first wireless routing devices.
  • the wireless relay device and the wireless routing device can automatically discover and negotiate, thereby implementing a simple and fast wireless relay implementation method, thereby achieving the purpose of simplifying configuration and optimizing the network.
  • the wireless relay device may wait for a predetermined time after transmitting the Probe Request message, and when the predetermined time arrives, select to send the report according to the Probe Response message received within the predetermined time.
  • One of the first wireless routing devices of the Probe Response message serves as the second wireless routing device.
  • the probe response packet carries the second detection code and the wireless parameter.
  • the wireless relay device has the same second detection code that is carried in the Probe Response packet sent by the second wireless routing device. Detection code.
  • the wireless relay device selects, from the received Probe Response message, the first Probe Response message that the wireless parameter that meets the preset condition is met; the wireless The relay device selects a wireless routing device that sends the first probe response message as the second wireless routing device.
  • the selecting, by the received probe response message, the first probe response message that the wireless parameter that meets the preset condition may include: the wireless relay device searching for the received probe response message.
  • the present disclosure further provides a first wireless relay implementation device applicable to a wireless relay device and a second wireless applicable to the wireless routing device An embodiment of a relay implementation device.
  • Embodiments of the first wireless relay implementation apparatus of the present disclosure may be applied to a wireless relay device.
  • the first wireless relay implementation device may be implemented by software, or may be implemented by hardware or a combination of hardware and software.
  • a first wireless relay device can be understood as a machine readable instruction stored in a machine readable storage medium.
  • FIG. 4 a hardware structure diagram of the wireless relay device of the present disclosure, except In addition to the processor 41, the internal bus 42, the network interface 43, and the machine readable storage medium 44 shown in FIG. 4, the wireless relay device may also include other hardware to implement other functions such as a general wireless relay function, etc. This will not be repeated here.
  • the machine-readable storage medium 44 may be: RAM (Radom Access Memory), volatile memory, non-volatile memory, flash memory, storage drive (such as a hard disk drive), Solid state hard disk, any type of storage disk (such as a compact disc, DVD, etc.), or a similar storage medium, or a combination thereof.
  • RAM Random Access Memory
  • volatile memory volatile memory
  • non-volatile memory flash memory
  • storage drive such as a hard disk drive
  • Solid state hard disk any type of storage disk (such as a compact disc, DVD, etc.), or a similar storage medium, or a combination thereof.
  • FIG. 5 is a schematic structural diagram of a first wireless relay implementing apparatus applied to a wireless relay device according to an example of the present disclosure.
  • the first wireless relay implementation device 50 may include the following modules: a first sending module 501, a receiving module 502, and a second sending module 503.
  • the first sending module 501 can be configured to send a Probe Request message.
  • the Probe Request message carries a first detection code and device information of the wireless relay device.
  • the receiving module 502 can be configured to receive a Probe Response message sent by the first wireless routing device.
  • the Probe Response packet carries the SSID and password corresponding to the first wireless routing device.
  • the second sending module 503 can be configured to send an Authentication Request message to the second wireless routing device.
  • the authentication request packet carries the SSID and the password carried in the Probe Response packet sent by the second wireless routing device to the wireless relay device, where the second wireless routing device is the first wireless router.
  • the first wireless relay implementation device 50 may further include a selection module 504.
  • the selecting module 504 can be configured to select a first wireless routing device as the second wireless routing device if the receiving module 502 receives the Probe Response message sent by the two or more first wireless routing devices within a predetermined waiting time. .
  • the second sending module 503 can be configured to send an Authentication Request message to the second wireless routing device.
  • the first SSID and the first password carried in the Probe Response message sent by the second wireless routing device to the wireless relay device are carried in the Authentication Request message.
  • the Probe response packet may also carry a second detection code and a wireless parameter.
  • the first wireless relay implementation device 50 may further include a determination module 505 and an acquisition module 506.
  • the determining module 505 can be configured to determine, after the receiving module 502 receives the Probe Response packet sent by the first wireless routing device, whether the second detection code carried in the Probe Response packet exists on the wireless relay device The same detection code.
  • the obtaining module 506 can be configured to obtain the SSID, the password, and the wireless parameter from the Probe Response message if the determination result of the determining module 505 is present.
  • the selection module 504 can be configured to: when the predetermined waiting time arrives, select, from the received Probe Response message, the first Probe Response message that the wireless parameter that meets the preset condition is met; A first wireless routing device of a Probe Response message is used as the second wireless routing device.
  • the first wireless relay implementation device 50 may further include a lookup module 507.
  • the locating module 507 can be configured to search for an encryption algorithm corresponding to the second detection code carried in the received Probe Response message.
  • the obtaining module 506 can be configured to use the decryption algorithm corresponding to the encryption algorithm found by the search module 507 to decrypt the SSID, password and wireless parameters of the ciphertext carried in the received Probe Response message to obtain a plaintext. SSID, password and wireless parameters.
  • Embodiments of the second wireless relay implementation apparatus of the present disclosure may be applied to a wireless routing device.
  • the second wireless relay implementation device embodiment may be implemented by software, or may be implemented by hardware or a combination of hardware and software. Taking a software implementation as an example, as a logical means, a second wireless relay device can be understood as machine readable instructions stored in a machine readable storage medium. From a hardware level, as shown in FIG. 8, a hardware structure diagram of the disclosed wireless routing device, in addition to the processor 81, the internal bus 82, the network interface 83, and the machine readable storage medium 84 shown in FIG. In addition, the wireless routing device may also include other hardware to implement other functions such as general wireless routing, and details are not described herein.
  • the machine readable storage medium 84 can be: RAM (Radom Access Memory), volatile memory, non-volatile memory, flash memory, storage drive (such as a hard disk drive), Solid state hard disk, any type of storage disk (such as a compact disc, DVD, etc.), or a similar storage medium, or a combination thereof.
  • RAM Random Access Memory
  • volatile memory volatile memory
  • non-volatile memory flash memory
  • storage drive such as a hard disk drive
  • Solid state hard disk any type of storage disk (such as a compact disc, DVD, etc.), or a similar storage medium, or a combination thereof.
  • FIG. 9 is a schematic structural diagram of a second wireless relay implementing apparatus applied to a wireless routing device according to an example of the present disclosure.
  • the second wireless relay implementation device 90 may include the following modules: a first receiving module 901, a first determining module 902, a sending module 903, a second receiving module 904, and an authentication module 905.
  • the first receiving module 901 can be configured to receive a Probe Request message that is sent by the wireless relay device and carries the device information of the first detection code and the wireless relay device.
  • the first determining module 902 can be configured to determine, according to the first detection code and the device information, whether the wireless relay device is allowed to automatically connect to the wireless routing device after the first receiving module 901 receives the Probe Request message.
  • the sending module 903 can be configured to send a Probe Response message to the wireless relay device if the first determining module 902 allows the wireless relay device to automatically connect to the wireless routing device.
  • the Probe Response packet carries the SSID and password corresponding to the wireless routing device.
  • the second receiving module 904 can be configured to receive an Authentication Request message sent by the wireless relay device.
  • the authentication request packet carries the SSID and password carried in the Probe Response packet sent by the wireless routing device to the wireless relay device.
  • the authentication module 905 can be configured to authenticate the wireless relay device according to the SSID and password carried in the Authentication Request message after the second receiving module 904 receives the Authentication Request message sent by the wireless relay device.
  • the second wireless relay implementation device 90 may further include: a second determining module 906 and a third determining module 907.
  • the second determining module 906 can be configured to determine whether the detection code of the first detection code carried in the Probe Request message is the same on the wireless routing device.
  • the third determining module 907 can be configured to determine whether the device information of the wireless relay device carried in the Probe Request message is correct if the determination result of the second determining module 906 is present.
  • the first determining module 902 can be configured to allow the wireless relay device to automatically connect to the wireless routing device if the determination result of the third determining module 907 is correct.
  • the first determining module 902 may be configured to determine whether the RSSI value carried in the Probe Request message is greater than a predetermined strength threshold if the judgment result of the third determining module 907 is correct, and if the value is greater than, the wireless relay device is allowed. Automatically connect to this wireless routing device.
  • the foregoing second wireless relay implementing apparatus 90 may further include: a searching module 908 and a decrypting module 909.
  • the searching module 908 can be configured to search for the first detection code after the first receiving module 901 receives the Probe Request message that is sent by the wireless relay device and carries the device information of the first detection code and the wireless relay device.
  • the decryption module 909 can be configured to decrypt the device information of the wireless relay device of the ciphertext carried in the Probe Request message by using the decryption algorithm corresponding to the encryption algorithm found by the search module 908, and obtain the wireless relay device of the plaintext.
  • Device Information is provided.
  • the device embodiment since it basically corresponds to the method embodiment, reference may be made to the partial description of the method embodiment.
  • the device embodiments described above are merely illustrative, wherein the units described as separate components may or may not be physically separate, and the components displayed as units may or may not be physical units, ie may be located A place, or it can be distributed to multiple network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the embodiment. Those of ordinary skill in the art can understand and implement without any creative effort.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Databases & Information Systems (AREA)

Abstract

本公开提供一种无线中继实现方法,其中,该方法应用于无线中继设备,该方法包括:无线中继设备发送携带有第一检测码和无线中继设备的设备信息的探测请求报文;接收第一无线路由设备发送的探测响应报文,其中,探测响应报文中携带有所述第一无线路由设备对应的SSID和密码;向第二无线路由设备发送认证请求报文,其中,认证请求报文中携带有所述第二无线路由设备向所述无线中继设备发送的探测响应报文中携带的SSID和密码,所述第二无线路由设备为所述第一无线路由设备中的一个。

Description

无线中继的实现
相关申请的交叉引用
本专利申请要求于2016年5月26日提交的、申请号为201610362677.9、公开名称为“无线中继实现方法及装置”的中国专利申请的优先权,该申请的全文以引用的方式并入本文中。
背景技术
WLAN(Wireless Local Area Network,无线局域网)技术是当今通信领域的热点之一。和有线相比,无线局域网的启动和实施相对简单,维护的成本低廉。WLAN中,可以通过无线路由设备来提供无线覆盖。但是,在实际的应用场景中,由于墙体等遮挡物的存在,可能会导致房屋的部分区域存在无线覆盖盲点。
为了解决上述问题,可以在无线路由设备与无线覆盖盲点区域之间,增加无线中继设备。通过无线中继设备对无线路由设备的无线信号的中继,可以扩大无线路由设备的无线覆盖范围,达到扫除无线覆盖盲点的目的。
附图说明
图1是本公开一示例示出的无线中继实现方法的交互流程图。
图2是本公开一示例示出的无线路由设备判断是否允许无线中继设备自动连接本无线路由设备的一种方法的流程图。
图3是本公开另一示例示出的无线路由设备判断是否允许无线中继设备自动连接本无线路由设备的一种方法的流程图。
图4是本公开一示例示出的无线中继设备的硬件结构示意图。
图5是本公开一示例示出的应用于无线中继设备中的第一无线中继实现装置的一种结构示意图。
图6是本公开另一示例示出的应用于无线中继设备中的第一无线中继实现装置的一种结构示意图。
图7是本公开又一示例示出的应用于无线中继设备中的第一无线中继实现装置的一种结构示意图。
图8是本公开一示例示出的无线路由设备的硬件结构示意图。
图9是本公开一示例示出的应用于无线路由设备中的第二无线中继实现装置的一种结构示意图。
图10是本公开另一示例示出的应用于无线路由设备中的第二无线中继实现装置的另一种结构示意图。
具体实施方式
无线路由设备可按照预定信标时间间隔向无线中继设备发送信标(Beacon)报文,其中,该Beacon报文中可携带有SSID(Service Set Identifier,服务集标识)等。无线中继设备监听到该Beacon报文之后,可将该Beacon报文中携带的SSID添加到无线信道列表中。从而,无线中继设备可以将监听到的多个Beacon报文中携带的SSID添加到无线信道列表中。
无线中继设备可从无线信道列表中选择一个SSID,根据该SSID向对应的无线路由设备发送Probe Request(探测请求)报文。无线路由设备接收到该Probe Request报文之后,可向无线中继设备发送Probe Response(探测响应)报文,从而完成探测过程。在完成认证过程和关联过程之后,无线中继设备与无线路由设备建立连接,实现了对无线路由设备的无线信号的中继。
图1是本公开一示例示出的无线中继实现方法的交互流程图。如图1所示,在本公开示例中,无线中继实现方法可包括以下步骤S101-S108。
在步骤S101,无线中继设备可以发送Probe Request报文,其中,所述Probe Request报文携带有第一检测码和所述无线中继设备的设备信息。
无线中继设备上电启动后,如果判断出当前配置为默认配置,则可以按照预定发送时间间隔T1,在本设备支持的ISM(Industrial Scientific Medical,工业科学医学)频段内发送Probe Request报文。其中,ISM频段可为2.4GHz(吉赫兹)和5GHz。
在实际实施过程中,如果Probe Request报文发送过快,可能会占用较多资源。如果Probe Request报文发送过慢,可能会使得完成无线中继过程的时间过长。因此,可将上述发送时间间隔T1设置为60秒。
其中,无线中继设备中可保存有多个检测码。检测码可是一个由多个字节组成的字符串。在无线中继设备发送Probe Request报文之前,可以选择一个检测码作为第一检测码。例如,可选择“H3C_MAGIC”作为第一检测码。该无线中继设备可发送携带有选中的检测码、例 如第一检测码和所述无线中继设备的设备信息的Probe Request报文。
在其中一个实施方式中,每一个检测码可有对应的加密算法。例如,检测码“H3C_MAGIC”对应的加密算法可为AES(Advanced Encryption Standard,高级加密标准)加密算法,检测码“H3C”对应的加密算法可为DES(Data Encryption Standard,数据加密标准)加密算法。无线中继设备可使用选中的检测码、例如“H3C_MAGIC”对应的加密算法、例如AES加密算法对该无线中继设备的设备信息进行加密,得到密文的设备信息。该无线中继设备可发送携带有选中的检测码、例如第一检测码和密文的设备信息的Probe Request报文。当然,该无线中继设备的设备信息也可不进行加密,例如当第一检测码没有对应的加密算法时。
上述设备信息可以是MAC(Media Access Control,媒体访问控制)地址、电子标签和设备型号等信息中的一种或多种的组合。
在步骤S102,无线路由设备在接收到该Probe Request报文之后,可根据该Probe Request报文中携带的第一检测码和该无线中继设备的设备信息,判断是否允许该无线中继设备自动连接本无线路由设备,并在确定出允许时,向该无线中继设备发送Probe Response报文。
如图1所示,可能会有多个无线路由设备,例如无线路由设备1、无线路由设备2、…、无线路由设备M,M为大于1的整数,接收到该无线中继设备发出的Probe Request报文,因此,每一个无线路由设备均可执行上述步骤S102。
在步骤S102中,无线路由设备根据第一检测码和该无线中继设备的设备信息,判断是否允许无线中继设备自动连接本无线路由设备的方法可如图2所示,可以包括以下步骤S201-S204。
在步骤S201,判断本无线路由设备上是否存在与第一检测码相同的检测码。若存在,则执行步骤S202。若不存在,则执行步骤S204。
其中,无线路由设备上也可保存多个检测码,这些检测码可与无线中继设备上保存的检测码相同。
在步骤S202,本无线路由设备判断无线中继设备的设备信息是否正确。若正确,则执行步骤S203,否则执行步骤S204。
当无线中继设备的设备信息被第一检测码对应的加密算法加密时,无线路由设备为了从Probe Request报文中获取到无线中继设备的设备信息,可以查找第一检测码对应的加密算法并使用查找到的加密算法对应的解密算法,对该Probe Request报文中携带的密文的无线中继设备的设备信息进行解密,从而得到明文的无线中继设备的设备信息。而当无线中继设备的 设备信息没有被第一检测码对应的加密算法加密时,无线路由设备可从Probe Request报文中直接获取到明文的无线中继设备的设备信息。之后,无线路由设备可判断该明文的无线中继设备的信息是否正确。这样,可起到安全认证的作用。
无线路由设备判断该无线中继设备的信息是否正确,可以采用如下方法中的一种或多种的组合。
方法一:当无线中继设备的设备信息是MAC地址时,无线路由设备可将该MAC地址与MAC Header(MAC头)的Source MAC(源MAC)字段中携带的MAC地址进行比较。若两者相同,则确定该无线中继设备的设备信息正确。
方法二:当无线中继设备的设备信息是MAC地址、电子标签、设备型号等信息中的一种或多种组合时,无线路由设备可将无线中继设备的这些设备信息发送给云端服务器,以便查询这些设备信息的正确性。当无线路由设备接收到云端服务器返回的认证结果之后,可以获知这些设备信息是否正确。
在实际实施过程中,还可以使用其它的判断方法。例如,当无线中继设备的设备信息是电子标签时,无线中继设备可在Probe Request报文中增加一个用于携带电子标签的字段,以使无线路由设备可以比较该字段中携带的电子标签与该设备信息中的电子标签。或者,当无线中继设备的设备信息是设备型号时,无线中继设备可在Probe Request报文中增加一个用于携带设备型号的字段,以使无线路由设备可以比较该字段中携带的设备型号与该设备信息中的设备型号,本公开实施例对此不做限定。
在步骤S203,无线路由设备允许该无线中继设备自动连接本无线路由设备。
在步骤S204,无线路由设备不允许该无线中继设备自动连接本无线路由设备。
无线路由设备可以根据第一检测码和无线中继设备的设备信息,判断是否允许无线中继设备自动连接本无线路由设备。该Probe Request报文还可以携带有RSSI(Received Signal Strength Indication,接收信号强度指示)值。无线路由设备还可以根据该Probe Request报文中携带的RSSI值判断是否允许无线中继设备自动连接本无线路由设备,该判断方法可如图3所示包括以下步骤S301~S305。
在步骤S301,无线路由设备判断本设备上是否存在与该Probe Request报文中携带的第一检测码相同的检测码。若存在,则执行步骤S302。若不存在,则执行步骤S305。
在步骤S302,无线路由设备判断该Probe Request报文中携带的无线中继设备的设备信息是否正确。若正确,则执行步骤S303,否则,执行步骤S305。
在步骤S303,无线路由设备判断该Probe Request报文中携带的RSSI值是否大于预定强度阈值。若大于,则执行步骤S304,否则,执行步骤S305。
在一示例中,该Probe Request报文的Packet Information(报文信息)字段可以携带RSSI值。
在步骤S304,无线路由设备允许该无线中继设备自动连接本无线路由设备。
在步骤S305,无线路由设备不允许该无线中继设备自动连接本无线路由设备。
在如图3所示的方法中,在无线路由设备判断是否允许无线中继设备自动连接本无线路由设备时,增加判断RSSI值的目的是避免在有多个无线路由设备的环境中,无线中继设备错误的中继其它无线路由设备的无线信号。上述的预定强度阈值可以设置为-65dBm,对应的无遮挡直线距离约为2米。例如,如果无线路由设备判断出该Probe Request报文中携带的RSSI值大于-65dBm,可以允许该无线中继设备自动连接本无线路由设备,表明无线路由设备仅允许物理距离在约2米范围内的无线中继设备自动连接本无线路由设备。
进一步,在无线路由设备判断是否允许无线中继设备自动连接本无线路由设备时,增加判断RSSI值的目的还可包括:即使加密算法被破解,但是如果无线中继设备在物理距离上无法靠近无线路由设备,则该无线中继设备仍然无法自动连接该无线路由设备。
假如,图1中的无线路由设备1、无线路由设备2和无线路由设备M均允许该无线中继设备自动连接,则这些无线路由设备都可以向该无线中继设备发送Probe Response报文。其中,该Probe Response报文中可以携带第二检测码、该无线路由设备对应的SSID、密码和无线参数等。其中,无线参数可以包括:RSSI值、信道频宽模式、无线信道、信号质量(CINR(Carrier to Interference plus Noise Ratio,载波与干扰和噪声比)/SINR(Signal to Interference plus Noise Ratio,信号与干扰和噪声比))、时间偏移(timing offset)、频率偏移(frequency offset)、终端信号入射角度、无线中继方式、物理速率等参数中的一种或多种的组合。无线参数还可以包括其它参数,本公开实施例对此不做限定。
其中,信道频宽模式可以是HT(High Throughput,高吞吐量)20、HT40、HT80、或HT160等。
无线中继方式可以是单频或双频。当无线路由设备支持双频,无线中继设备也支持双频时,无线路由设备可以指定无线中继设备的无线中继方式。例如,无线路由设备可以指定该无线中继设备以双频方式中继该无线路由设备的无线信号,还可以进一步指定该无线中继设备与该无线路由设备进行数据传输所使用的第一频段以及该无线中继设备与无线客户端进行 数据传输所使用的第二频段。例如,第一频段可以是2.4GHz、第二频段可以是5GHz,或者,第一频段可以是5GHz、第二频段可以是2.4GHz。在一示例中,无线中继设备可以使用第一频段进行无线中继,使用第二频段进行无线覆盖。
无线路由设备在发送Probe Response报文之前,选择一个检测码作为第二检测码。例如,无线路由设备可选择“H3C_MAGIC”作为第二检测码,使用选中的检测码“H3C_MAGIC”对应的AES加密算法对SSID、密码和无线参数进行加密,得到密文的SSID、密码和无线参数等。无线路由设备可发送携带有选中的检测码(即第二检测码)和密文的SSID、密码和无线参数等的Probe Response报文。Probe Response报文中的第二检测码与Probe Request报文中的第一检测码可以相同,也可以不同。如果第二检测码没有对应的加密算法,SSID、密码和无线参数也可不进行加密。
在步骤S103,无线中继设备接收无线路由设备发送的Probe Response报文。
无线中继设备在接收到任一Probe Response报文之后,可判断本设备上是否存在与该Probe Response报文中携带的第二检测码相同的检测码。若存在,则可以从该Probe Response报文中获取SSID、密码和无线参数。例如,当SSID、密码和无线参数被第二检测码对应的加密算法加密时,该无线中继设备可查找所述第二检测码对应的加密算法,并使用查找到的加密算法对应的解密算法,对该Probe Response报文中携带的密文的SSID、密码和无线参数进行解密,从而得到明文的SSID、密码和无线参数。
在步骤S104,若在预定等待时间T2内无线中继设备接收到两个以上无线路由设备发送的Probe Response报文,则无线中继设备可选择一个无线路由设备。
在预定等待时间T2到达时,此时无线中继设备可能会获取到多个SSID、密码和无线参数。在这种情况下,无线中继设备可选择满足预设条件的无线参数对应的SSID和密码,为了描述方便,可称为第一SSID和第一密码。无线中继设备可选择发出携带有第一SSID和第一密码的Probe Response报文的无线路由设备。
由于无线参数可以包括RSSI值、信道频宽模式、无线信道、信号质量(CINR/SINR)、时间偏移、频率偏移、终端信号入射角度、无线中继方式、物理速率等参数中的一种或多种的组合,从而,上述预设条件可以结合上述参数中的一种或多种的组合进行设定。例如,当无线参数为RSSI值时,上述预设条件可以为RSSI值大于预定强度阈值,本公开实施例对此不做限定。
另外,在实际实施过程中,如果预定等待时间T2过短,则无线中继设备可能会无法连接 到理想的无线路由设备。如果预定等待时间T2过长,可能会使得完成无线中继过程的时间太长。因此,优选的,可将等待时间T2设置为60秒。
假设,在步骤S104中,无线中继设备选择的是图1中的无线路由设备2。
在步骤S105,无线中继设备向选中的无线路由设备(无线路由设备2)发送Authentication Request(认证请求)报文。其中,该Authentication Request报文中可携带该选中的无线路由设备发送的Probe Response报文中携带的第一SSID和第一密码。
在步骤S106,选中的无线路由设备接收到该Authentication Request报文之后,根据第一SSID和第一密码对该无线中继设备进行认证,并在认证通过后向该无线中继设备发送Authentication Response(认证响应)报文。
在步骤S107,无线中继设备接收到该Authentication Response报文之后,向选中的无线路由设备发送Association Request(关联请求)报文。
在步骤S108,选中的无线路由设备接收到该Association Request报文之后,向该无线中继设备发送Association Response(关联响应)报文。
该无线中继设备接收到该Association Response报文之后,即与该选中的无线路由设备建立了连接,可以对该选中的无线路由设备的无线信号进行中继。
另外,该无线中继设备接收到该Association Response报文之后,还可以将本设备设置为Client(客户端)模式,按照满足上述预设条件的无线参数进行无线设置,并将该无线参数保存在非默认配置的配置文件中。此时,该无线中继设备的当前配置可更新为非默认配置。这样,当该无线中继设备再次上电启动时,由于用于指示启动位置的指针指向保存有该配置文件的内存空间,因此,可以按照该配置文件直接进行无线设置,从而可实现对该选中的无线路由设备的无线信号的中继。
在图1所示的无线中继实现方法中,当无线中继设备只接收到一个无线路由设备响应的Probe Response报文时,无线中继设备可不执行步骤S104的选择操作,而直接与该无线路由设备进行步骤S105~步骤S108的认证和关联过程。
在上述方法中,无线中继设备在中继成功之后,可以发出指示信号,用于表示中继成功。例如,无线中继设备可以通过LED(Light emitting diode,发光二极管)指示灯发出指示信号,或者,通过声音发出指示信号等,本公开实施例对此不做限定。
本公开实施例的上述方法中,无线中继设备可以向第一无线路由设备发送携带有第一检 测码和该无线中继设备的设备信息的Probe Request报文。所述第一无线路由设备接收到该Probe Request报文之后,会根据第一检测码和该设备信息,判断是否允许该无线中继设备自动连接本无线路由设备。第一无线路由设备在确定出允许自动连接时向该无线中继设备发送携带有所述第一无线路由设备对应的SSID和密码的Probe Response报文。该无线中继设备可以接收到多个第一无线路由设备发送的Probe Response报文,并向第二无线路由设备发送携带有所述第二无线路由设备对应的SSID和密码的Authentication Request报文,以能够实现对所述第二无线路由设备的无线信号的中继。可以理解的是,所述第二无线路由设备是所述第一无线路由设备中的一个。在上述过程中,无线中继设备与无线路由设备之间可以自动发现和协商,从而实现了一种简单快捷的无线中继实现方法,达到了简化配置和优化网络的目的。
在一示例中,所述无线中继设备可以在发送所述Probe Request报文起等待预定时间,当预定时间到达时,根据在所述预定时间内接收到的Probe Response报文,选择发送所述Probe Response报文的所述第一无线路由设备中的一个作为所述第二无线路由设备。其中,所述Probe Response报文中还携带有第二检测码和无线参数;所述无线中继设备中存在与所述第二无线路由设备发送的Probe Response报文中携带的第二检测码相同的检测码。
在另一示例中,在所述预定时间到达时,所述无线中继设备从接收到的Probe Response报文中选择所携带的无线参数满足预设条件的第一Probe Response报文;所述无线中继设备选择发出所述第一探测响应报文的无线路由设备作为所述第二无线路由设备。
在一示例中,从接收到的探测响应报文中选择所携带的无线参数满足预设条件的第一探测响应报文可以包括:所述无线中继设备查找所接收到的探测响应报文中携带的第二检测码对应的加密算法;所述无线中继设备使用查找到的加密算法对应的解密算法,对所接收到的探测响应报文中携带的密文的SSID、密码和无线参数进行解密,得到明文的SSID、密码和无线参数;并且所述无线中继设备选择所携带的无线参数满足预设条件的探测响应报文作为所述第一探测响应报文。
与前述无线中继实现方法的实施例相对应,本公开还提供了一种可应用于无线中继设备中的第一无线中继实现装置和一种可应用于无线路由设备中的第二无线中继实现装置的实施例。
本公开第一无线中继实现装置的实施例可以应用在无线中继设备上。第一无线中继实现装置可以通过软件实现,也可以通过硬件或者软硬件结合的方式实现。以软件实现为例,作为一个逻辑意义上的装置,第一无线中继装置可以理解为存储在机器可读存储介质中的机器可读指令。从硬件层面而言,如图4所示,为本公开无线中继设备的一种硬件结构图,除了 图4所示的处理器41、内部总线42、网络接口43以及机器可读存储介质44之外,该无线中继设备还可以包括其他硬件以实现例如通用无线中继功能等的其他功能,对此不再赘述。
在不同的实施例中,所述机器可读存储介质44可以是:RAM(Radom Access Memory,随机存取存储器)、易失存储器、非易失性存储器、闪存、存储驱动器(如硬盘驱动器)、固态硬盘、任何类型的存储盘(如光盘、DVD等),或者类似的存储介质,或者它们的组合。
进一步,机器可读存储介质44上可存储由处理器41执行的第一无线中继实现装置50对应的机器可读指令。请参考图5,图5是本公开一示例示出的应用于无线中继设备中的第一无线中继实现装置的一种结构示意图。从功能上划分,所述第一无线中继实现装置50可包括以下模块:第一发送模块501、接收模块502和第二发送模块503。
第一发送模块501可被配置为发送Probe Request报文。其中,所述Probe Request报文携带有第一检测码和所述无线中继设备的设备信息。
接收模块502可被配置为接收第一无线路由设备发送的Probe Response报文。其中,Probe Response报文中携带有所述第一无线路由设备对应的SSID和密码。
第二发送模块503可被配置为向第二无线路由设备发送Authentication Request报文。其中,Authentication Request报文中携带有所述第二无线路由设备向所述无线中继设备发送的Probe Response报文中携带的SSID和密码,所述第二无线路由设备是所述第一无线路由设备中的一个。
如图6所示,上述第一无线中继实现装置50中还可包括选择模块504。选择模块504可被配置为若接收模块502在预定等待时间内接收到两个及以上第一无线路由设备发送的Probe Response报文,则选择一个第一无线路由设备作为所述第二无线路由设备。这样,第二发送模块503可被配置为向所述第二无线路由设备发送Authentication Request报文。其中,该Authentication Request报文中携带该第二无线路由设备向所述无线中继设备发送的Probe Response报文中携带的第一SSID和第一密码。
其中,Probe Response报文中还可携带有第二检测码和无线参数。这样,如图7所示,上述第一无线中继实现装置50中还可包括判断模块505和获取模块506。判断模块505可被配置为在接收模块502接收到所述第一无线路由设备发送的Probe Response报文之后,判断该无线中继设备上是否存在与该Probe Response报文中携带的第二检测码相同的检测码。获取模块506可被配置为若判断模块505的判断结果是存在,则从该Probe Response报文中获取SSID、密码和无线参数。
根据一个示例,选择模块504可被配置为在预定等待时间到达时,从接收到的Probe Response报文中选择所携带的无线参数满足预设条件的第一Probe Response报文;选择发出所述第一Probe Response报文的第一无线路由设备作为所述第二无线路由设备。
如图7所示,上述第一无线中继实现装置50中还可包括查找模块507。查找模块507可被配置为查找所接收到的Probe Response报文中携带的第二检测码对应的加密算法。这样,获取模块506可被配置为使用查找模块507查找到的加密算法对应的解密算法,对所接收到的Probe Response报文中携带的密文的SSID、密码和无线参数进行解密,得到明文的SSID、密码和无线参数。
本公开第二无线中继实现装置的实施例可以应用在无线路由设备上。第二无线中继实现装置实施例可以通过软件实现,也可以通过硬件或者软硬件结合的方式实现。以软件实现为例,作为一个逻辑意义上的装置,第二无线中继装置可以理解为存储在机器可读存储介质中的机器可读指令。从硬件层面而言,如图8所示,为本公开无线路由设备的一种硬件结构图,除了图8所示的处理器81、内部总线82、网络接口83以及机器可读存储介质84之外,该无线路由设备还可以包括其他硬件以实现例如通用无线路由等的其他功能,对此不再赘述。
在不同的实施例中,所述机器可读存储介质84可以是:RAM(Radom Access Memory,随机存取存储器)、易失存储器、非易失性存储器、闪存、存储驱动器(如硬盘驱动器)、固态硬盘、任何类型的存储盘(如光盘、DVD等),或者类似的存储介质,或者它们的组合。
进一步,机器可读存储介质84上可存储由处理器81执行的第二无线中继实现装置90对应的机器可读指令。请参考图9,图9是本公开一示例示出的应用于无线路由设备中的第二无线中继实现装置的一种结构示意图。从功能上划分,所述第二无线中继实现装置90可包括以下模块:第一接收模块901、第一判断模块902、发送模块903、第二接收模块904和认证模块905。
第一接收模块901可被配置为接收无线中继设备发送的携带有第一检测码和无线中继设备的设备信息的Probe Request报文。
第一判断模块902可被配置为在第一接收模块901接收到Probe Request报文之后,根据第一检测码和设备信息,判断是否允许所述无线中继设备自动连接本无线路由设备。
发送模块903可被配置为若第一判断模块902允许无线中继设备自动连接本无线路由设备,则向无线中继设备发送Probe Response报文。其中,Probe Response报文中携带有本无线路由设备对应的SSID和密码。
第二接收模块904可被配置为接收无线中继设备发送的Authentication Request报文。其中,所述Authentication Request报文中携带有所述无线路由设备向所述无线中继设备发送的Probe Response报文中携带的SSID和密码。
认证模块905可被配置为在第二接收模块904接收到无线中继设备发送的Authentication Request报文之后,根据Authentication Request报文中携带的SSID和密码对无线中继设备进行认证。
如图10所示,上述第二无线中继实现装置90中还可包括:第二判断模块906和第三判断模块907。其中,第二判断模块906可被配置为判断本无线路由设备上是否存在与Probe Request报文中携带的第一检测码相同的检测码。第三判断模块907可被配置为若第二判断模块906的判断结果是存在,则判断Probe Request报文中携带的无线中继设备的设备信息是否正确。
这样,第一判断模块902可被配置为若第三判断模块907的判断结果是正确,则允许无线中继设备自动连接本无线路由设备。或者,第一判断模块902还可被配置为若第三判断模块907的判断结果是正确,则判断Probe Request报文中携带的RSSI值是否大于预定强度阈值,若大于,则允许无线中继设备自动连接本无线路由设备。
另外,如图10所示,上述第二无线中继实现装置90中还可包括:查找模块908和解密模块909。其中,查找模块908可被配置为在第一接收模块901接收到无线中继设备发送的携带有第一检测码和无线中继设备的设备信息的Probe Request报文之后,查找与第一检测码对应的加密算法。解密模块909可被配置为使用查找模块908查找到的加密算法对应的解密算法,对Probe Request报文中携带的密文的无线中继设备的设备信息进行解密,得到明文的无线中继设备的设备信息。
上述装置中各个模块的功能和作用的实现过程具体详见上述方法中对应步骤的实现过程,在此不再赘述。
对于装置实施例而言,由于其基本对应于方法实施例,所以相关之处参见方法实施例的部分说明即可。以上所描述的装置实施例仅仅是示意性的,其中所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本实施例方案的目的。本领域普通技术人员在不付出创造性劳动的情况下,即可以理解并实施。
需要说明的是,在本文中,诸如第一和第二等之类的关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、物品或者设备中还存在另外的相同要素。
以上对本公开实施例所提供的方法和装置进行了详细介绍,本文中应用了具体个例对本公开的原理及实施方式进行了阐述,以上实施例的说明只是用于帮助理解本公开的方法及其核心思想;同时,对于本领域的一般技术人员,依据本公开的思想,在具体实施方式及应用范围上均会有改变之处,综上所述,本说明书内容不应理解为对本公开的限制。

Claims (15)

  1. 一种无线中继实现方法,包括:
    无线中继设备发送探测请求报文,其中,所述探测请求报文携带有第一检测码和所述无线中继设备的设备信息;
    所述无线中继设备接收第一无线路由设备发送的探测响应报文,其中,所述探测响应报文中携带有所述第一无线路由设备对应的服务集标识SSID和密码;
    所述无线中继设备向第二无线路由设备发送认证请求报文,其中,所述认证请求报文中携带有所述第二无线路由设备向所述无线中继设备发送的探测响应报文中携带的SSID和密码,所述第二无线路由设备为所述第一无线路由设备中的一个。
  2. 根据权利要求1所述的方法,其中,还包括:
    所述无线中继设备从发送所述探测请求报文起等待预定时间;
    所述无线中继设备在所述预定时间到达时,根据在所述预定时间内接收到的探测响应报文,选择发送所述探测响应报文的所述第一无线路由设备中的一个作为所述第二无线路由设备,其中,
    所述探测响应报文中还携带有第二检测码和无线参数,
    所述无线中继设备中存在与所述第二无线路由设备发送的探测响应报文中携带的第二检测码相同的检测码。
  3. 根据权利要求2所述的方法,其中,根据在所述预定时间内接收到的探测响应报文,选择发送所述探测响应报文的所述第一无线路由设备中的一个作为所述第二无线路由设备,包括:
    在所述预定时间到达时,所述无线中继设备从接收到的探测响应报文中选择所携带的无线参数满足预设条件的第一探测响应报文;
    所述无线中继设备选择发出所述第一探测响应报文的第一无线路由设备作为所述第二无线路由设备。
  4. 根据权利要求3所述的方法,其中,从接收到的探测响应报文中选择所携带的无线参数满足预设条件的第一探测响应报文,包括:
    所述无线中继设备查找所接收到的探测响应报文中携带的第二检测码对应的加密算法;
    所述无线中继设备使用查找到的加密算法对应的解密算法,对所接收到的探测响应报文中携带的密文的SSID、密码和无线参数进行解密,得到明文的SSID、密码和无线参数;
    所述无线中继设备选择所携带的无线参数满足预设条件的探测响应报文作为所述第一探 测响应报文。
  5. 一种无线中继实现方法,包括:
    无线路由设备接收无线中继设备发送的携带有第一检测码和所述无线中继设备的设备信息的探测请求报文;
    所述无线路由设备根据所述第一检测码和所述设备信息,判断是否允许所述无线中继设备自动连接本无线路由设备;
    若所述无线路由设备确定允许所述无线中继设备自动连接本无线路由设备,则向所述无线中继设备发送探测响应报文,其中,所述探测响应报文中携带有所述无线路由设备对应的服务集标识SSID和密码;
    所述无线路由设备接收所述无线中继设备发送的认证请求报文;
    所述无线路由设备根据所述认证请求报文中携带的SSID和密码对所述无线中继设备进行认证。
  6. 根据权利要求5所述的方法,其中,根据所述第一检测码和所述设备信息,判断是否允许所述无线中继设备自动连接本无线路由设备,包括:
    所述无线路由设备判断本设备上是否存在与所述探测请求报文中携带的第一检测码相同的检测码;
    若存在,则判断所述无线中继设备的设备信息是否正确;
    若正确,则确定允许所述无线中继设备自动连接本无线路由设备。
  7. 根据权利要求6所述的方法,其中,确定允许所述无线中继设备自动连接本无线路由设备,包括:
    所述无线路由设备判断所述探测请求报文中携带的接收信号强度指示RSSI值是否大于预定强度阈值;
    若大于,则确定允许所述无线中继设备自动连接本无线路由设备。
  8. 根据权利要求5所述的方法,其中,在接收到无线中继设备发送的携带有第一检测码和所述无线中继设备的设备信息的探测请求报文之后,还包括:
    所述无线路由设备查找所述第一检测码对应的加密算法;
    所述无线路由设备使用查找到的加密算法对应的解密算法,对所述探测请求报文中携带的密文的所述无线中继设备的设备信息进行解密,得到明文的所述无线中继设备的设备信息。
  9. 一种无线中继设备,包括:
    处理器,和
    存储有机器可读指令的机器可读存储介质,
    其中,通过读取并执行所述机器可读指令,所述处理器被使得:
    发送探测请求报文,其中,所述探测请求报文携带有第一检测码和所述无线中继设备的设备信息;
    接收第一无线路由设备发送的探测响应报文,其中,所述探测响应报文中携带有所述第一无线路由设备对应的服务集标识SSID和密码;
    向第二无线路由设备发送认证请求报文,其中,所述认证请求报文中携带有所述第二无线路由设备发送的探测响应报文中携带的SSID和密码,所述第二无线路由设备为所述第一无线路由设备中的一个。
  10. 根据权利要求9所述的无线中继设备,其中,所述机器可读指令促使所述处理器:
    从发送所述探测请求报文起等待预定时间;
    在所述预定时间到达时,根据在所述预定时间内接收到的探测响应报文,选择发送所述探测响应报文的所述第一无线路由设备中的一个作为所述第二无线路由设备,其中,
    所述探测响应报文中还携带有第二检测码和无线参数,
    所述无线中继设备中存在与所述第二无线路由设备发送的探测响应报文中携带的第二检测码相同的检测码。
  11. 根据权利要求10所述的无线中继设备,其中,当根据在所述预定时间内接收到的探测响应报文,选择发送所述探测响应报文的所述第一无线路由设备中的一个作为所述第二无线路由设备时,所述机器可读指令促使所述处理器:
    在所述预定时间到达时,从接收到的探测响应报文中选择所携带的无线参数满足预设条件的第一探测响应报文;
    选择发出所述第一探测响应报文的第一无线路由设备作为所述第二无线路由设备。
  12. 根据权利要求11所述的无线中继设备,其中,当从接收到的探测响应报文中选择所携带的无线参数满足预设条件的第一探测响应报文时,所述机器可读指令促使所述处理器:
    查找所接收到的探测响应报文中携带的第二检测码对应的加密算法;
    使用查找到的加密算法对应的解密算法,对所接收到的探测响应报文中携带的密文的SSID和密码、无线参数进行解密,得到明文的SSID、密码和无线参数;
    选择所携带的无线参数满足预设条件的探测响应报文作为所述第一探测响应报文。
  13. 一种无线路由设备,包括:
    处理器,和
    存储有机器可读指令的机器可读存储介质,
    其中,所述处理器通过读取所述机器可执行指令执行如权利要求5所述的无线中继实现方法。
  14. 根据权利要求13所述的无线路由设备,其中,当根据所述第一检测码和所述设备信息,判断是否允许所述无线中继设备自动连接本无线路由设备时,所述机器可读指令促使所述处理器:
    判断本设备上是否存在与所述探测请求报文中携带的第一检测码相同的检测码;
    若存在,则判断所述无线中继设备的设备信息是否正确;
    若正确,则确定允许所述无线中继设备自动连接本无线路由设备。
  15. 根据权利要求14所述的无线路由设备,其中,当确定允许所述无线中继设备自动连接本无线路由设备,所述机器可读指令还促使所述处理器:
    判断所述探测请求报文中携带的接收信号强度指示RSSI值是否大于预定强度阈值,若大于,则确定允许所述无线中继设备自动连接本无线路由设备。
PCT/CN2017/085835 2016-05-26 2017-05-25 无线中继的实现 WO2017202355A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US16/171,368 US10945307B2 (en) 2016-05-26 2018-10-26 Implementation of wireless relaying

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610362677.9 2016-05-26
CN201610362677.9A CN107438247B (zh) 2016-05-26 2016-05-26 无线中继实现方法及装置

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/171,368 Continuation US10945307B2 (en) 2016-05-26 2018-10-26 Implementation of wireless relaying

Publications (1)

Publication Number Publication Date
WO2017202355A1 true WO2017202355A1 (zh) 2017-11-30

Family

ID=60412045

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/085835 WO2017202355A1 (zh) 2016-05-26 2017-05-25 无线中继的实现

Country Status (3)

Country Link
US (1) US10945307B2 (zh)
CN (1) CN107438247B (zh)
WO (1) WO2017202355A1 (zh)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107438247B (zh) * 2016-05-26 2020-04-03 新华三技术有限公司 无线中继实现方法及装置
CN108650106B (zh) * 2018-03-12 2022-08-16 上海捷锐通电子科技有限公司 一种无线传输方法、站点设备、接入点设备及系统
CN110138607A (zh) * 2019-05-09 2019-08-16 深圳市吉祥腾达科技有限公司 路由器更新方法、系统及存储介质
US11540199B2 (en) * 2020-06-30 2022-12-27 Arris Enterprises Llc Discovery of a network topology from a client perspective
CN112787884B (zh) * 2020-12-28 2022-09-30 北京小米移动软件有限公司 组网方法及装置、存储介质
CN112929908B (zh) * 2021-03-17 2023-03-24 北京小米移动软件有限公司 Mesh组网方法、装置、网关设备及存储介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103053202A (zh) * 2010-08-03 2013-04-17 日本电气株式会社 中继站装置、移动通信系统、基站装置和用于控制中继站的方法
US20130310108A1 (en) * 2012-05-17 2013-11-21 Liveu Ltd. Multi-modem communication using virtual identity modules
CN103634860A (zh) * 2012-08-24 2014-03-12 西门子公司 无线通信系统中的快速切换方法、系统和客户端
CN103906263A (zh) * 2012-12-26 2014-07-02 华为终端有限公司 连接建立方法、设备及系统
CN105409319A (zh) * 2013-08-22 2016-03-16 华为技术有限公司 设备到设备(简称d2d)网络与无线基础设施的基于竞争的集成

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3361915B2 (ja) * 1995-06-15 2003-01-07 シャープ株式会社 無線通信システム
US6421714B1 (en) * 1997-10-14 2002-07-16 Lucent Technologies Efficient mobility management scheme for a wireless internet access system
US7676194B2 (en) * 2003-08-22 2010-03-09 Rappaport Theodore S Broadband repeater with security for ultrawideband technologies
WO2006088105A1 (ja) * 2005-02-18 2006-08-24 Matsushita Electric Industrial Co., Ltd. 無線通信方法、中継局装置および無線送信装置
CN1859098A (zh) * 2006-03-08 2006-11-08 华为技术有限公司 在无线接入系统中实现eap认证中继的方法
EP2187675B1 (en) * 2007-09-04 2014-12-24 Nippon Telegraph and Telephone Corporation Wireless relay apparatus and wireless communication system
EP2206404A1 (en) * 2007-10-01 2010-07-14 Nokia Siemens Networks OY Relaying data in a communication system
CN101621796A (zh) * 2009-07-22 2010-01-06 中兴通讯股份有限公司 无线分布式系统中接入点自动对接方法与装置
US8904167B2 (en) * 2010-01-22 2014-12-02 Qualcomm Incorporated Method and apparatus for securing wireless relay nodes
CN102204391B (zh) * 2011-05-27 2013-06-05 华为终端有限公司 Repeater WPS连接方法及装置
CN103096303B (zh) * 2011-10-31 2016-04-20 华为技术有限公司 传输数据包的方法及设备
CN103096301B (zh) * 2011-10-31 2017-04-12 华为技术有限公司 无线局域网接入点验证的方法及站点
CN104685800B (zh) * 2012-09-29 2018-03-30 Lg 电子株式会社 在无线lan系统中执行中继操作的方法和装置
US9961719B2 (en) * 2013-03-11 2018-05-01 Zte Corporation Integrated relay in wireless communication networks
CN104243416B (zh) * 2013-06-17 2018-04-27 华为技术有限公司 加密通信方法、系统和相关设备
WO2015030519A1 (ko) * 2013-08-30 2015-03-05 삼성전자주식회사 무선랜 통신 연결 방법 및 그 전자 장치
CN105682093A (zh) * 2014-11-20 2016-06-15 中兴通讯股份有限公司 无线网络接入方法及接入装置和客户端
CN107438247B (zh) * 2016-05-26 2020-04-03 新华三技术有限公司 无线中继实现方法及装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103053202A (zh) * 2010-08-03 2013-04-17 日本电气株式会社 中继站装置、移动通信系统、基站装置和用于控制中继站的方法
US20130310108A1 (en) * 2012-05-17 2013-11-21 Liveu Ltd. Multi-modem communication using virtual identity modules
CN103634860A (zh) * 2012-08-24 2014-03-12 西门子公司 无线通信系统中的快速切换方法、系统和客户端
CN103906263A (zh) * 2012-12-26 2014-07-02 华为终端有限公司 连接建立方法、设备及系统
CN105409319A (zh) * 2013-08-22 2016-03-16 华为技术有限公司 设备到设备(简称d2d)网络与无线基础设施的基于竞争的集成

Also Published As

Publication number Publication date
CN107438247A (zh) 2017-12-05
CN107438247B (zh) 2020-04-03
US20190069340A1 (en) 2019-02-28
US10945307B2 (en) 2021-03-09

Similar Documents

Publication Publication Date Title
WO2017202355A1 (zh) 无线中继的实现
US10542458B2 (en) Data communication via data packet headers
US10873896B2 (en) Minimizing link layer discovery based on advertising access technology parameters in a multimode mesh network
EP3078142B1 (en) Methods and systems for enabling communication with a receiver device in a network
US8565165B2 (en) Wireless terminal device, communication method, and computer-readable recording medium
KR101453521B1 (ko) 무선 액세스 포인트 장치 및 비인가 무선 랜 노드 탐지 방법
US8615603B2 (en) Wireless LAN system, wireless LAN device, and storage medium having stored therein wireless LAN program
US8582471B2 (en) Wireless ad-hoc network configuration method and apparatus
US8634393B2 (en) Channel scanning in a network having one or more access points
KR101830940B1 (ko) Wifi 설정 포팅
US9642071B2 (en) Access point initiated neighbor report request
WO2017213971A1 (en) Network-visitability detection control
US10419411B2 (en) Network-visitability detection
KR102167933B1 (ko) 무선랜 시스템에서 액세스 포인트 탐색 방법 및 장치
US20090274065A1 (en) Method and apparatus for setting wireless local area network by using button
JP2012517737A (ja) 無線ホームメッシュネットワークブリッジアダプタ
JP2012516647A (ja) 多層無線ホームメッシュネットワークの認証
US9510130B2 (en) Provisioning of multiple wireless devices by an access point
KR20230054421A (ko) 셀룰러 슬라이싱된 네트워크들에서의 중계기 선택의 프라이버시
JP2008048145A (ja) 通信システム、無線通信装置およびその制御方法
US8862096B1 (en) Provisioning of multiple wireless devices by an access point
JP2012095339A (ja) 無線lanシステム、無線lan装置及びそのプログラム
WO2018077129A1 (zh) 数据处理的方法及装置
KR20230150380A (ko) Wlan 멀티링크 tdls 키 유도를 위한 방법 및 시스템
CN114845420A (zh) 一种EasyMesh网络中AP组网加入的方法和系统

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17802201

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 17802201

Country of ref document: EP

Kind code of ref document: A1