CN106537962A - Method, device, and equipment for wireless network configuration, access, and visit - Google Patents
Method, device, and equipment for wireless network configuration, access, and visit Download PDFInfo
- Publication number
- CN106537962A CN106537962A CN201580038698.9A CN201580038698A CN106537962A CN 106537962 A CN106537962 A CN 106537962A CN 201580038698 A CN201580038698 A CN 201580038698A CN 106537962 A CN106537962 A CN 106537962A
- Authority
- CN
- China
- Prior art keywords
- wireless network
- security key
- network
- name
- network security
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Small-Scale Networks (AREA)
Abstract
Provided in embodiments of the present invention are a method, a device, and equipment for wireless network configuration, connection, and access. The method for wireless network configuration comprises: generating a network security key for a wireless network; generating a wireless network name on the basis of the network security key, where the wireless network name comprises at least a network security key portion expressing the network security key; and, configuring the wireless network on the basis of the network security key and of the wireless network name. By such means, solved is the problem found in the prior art that a network security key needs to be entered manually, thus reducing the operational complexity for a terminal device to connect to a wireless network.
Description
This application claims the Application No. 201410404086.4 submitted for 18th for 08 month for 2014, the priority of the Chinese patent application of entitled " SSID generations, smart machine cut-in method and device, Internet of things system ", entire contents are hereby incorporated by reference in the application.
The present invention relates to wireless network authentication technical field, more particularly to a kind of radio network configuration, access and access method, device and equipment.
With the extensive use of smart machine, wireless network becomes inseparable gradually with the life of people.For example, mobile phone, flat board, intelligent home device etc., used thing is more and more in life needs fully realize that it is worth by wireless network.
At present, when a smart machine needs to add wireless network, generally require user and be manually entered password corresponding to wireless network, smart machine then could be caused to be added in the wireless network for wishing to add.This is mainly in view of network and the safety of information, therefore, even family wireless network typically can also set password.
A problem is so inevitably resulted in, exactly when needing the equipment for adding wireless network a lot, user is accomplished by inputting password one by one, wastes many time and efforts.
For how can be on the premise of the safety of network and data be ensured, equipment can be automatically accessed in wireless network, and effective solution is not yet proposed at present.
The content of the invention
In order to solve the above problems, the embodiment of the present invention proposes a kind of radio network configuration, access and access method, device and equipment, so that on the premise of the safety of network and data is ensured, equipment can automatically access wireless network.
The one side of the embodiment of the present invention provides a kind of wireless network configuration method, can include:Generate the network security key of wireless network;Wireless network name is generated based on the network security key, wherein, the network security key part for representing the network security key is at least included in the wireless network name;And the wireless network is configured based on the network security key and the wireless network name.
For example, generating wireless network name based on the network security key, it can include:The network security key is encrypted, the refined net safe key of predetermined length is obtained;The refined net safe key is added to the network security key part of wireless network name, obtains at least including the wireless network name of the network security key part.
For example, at least one of or any combination can also be included based on network security key generation wireless network name:Generation represents the message part that the wireless network name includes network security key;Generate the check information part for verifying the network security key;Generation represents the type information part of security type;Generation represents the cryptographic information part for the encryption rule that the network security key is encrypted.
For example, configuring the wireless network based on the network security key and the wireless network name, it can include:The wireless network name is configured to the title of a wireless network in the primary wireless network of radio reception device and time wireless network;The network security key is configured to the network security key of one wireless network.
Second aspect of the embodiment of the present invention provides a kind of wireless network access method, can include:Wireless network name is obtained, wherein, the wireless network name at least includes the network security key part for representing network security key;From the corresponding network security key of wireless network name described in the network security key extracting section;The corresponding wireless network of the wireless network name is connected automatically to based on the wireless network name and the network security key.
For example, this method can also include:Based on representing that the wireless network name includes the message part of network security key in the wireless network name, judge whether the wireless network name includes network security key;From the corresponding network security key of wireless network name described in the network security key extracting section, including:When described information part indicates that the wireless network name includes network security key, network security key is extracted from the wireless network name.
3rd aspect of the embodiment of the present invention provides a kind of wireless network access method, can include:The packet that the terminal installation for carrying out radio communication by radio reception device is sent is received, wherein, the radio reception device is configured with least one wireless network;Judge the packet whether from by presetting the terminal installation that wireless network carries out radio communication at least one described wireless network;When the packet, which comes from through the default wireless network, carries out the terminal installation of radio communication, the webserver associated to the terminal installation forwards the packet.
For example, the default wireless network is to be exclusively used in the wireless network that one or more terminal installations carry out radio communication.
4th aspect of the embodiment of the present invention provides a kind of radio network configuration device, can include:Network security key generation unit, is configured as producing the network security key for wireless network;Wireless network name generation unit, is configured as generating wireless network name based on the network security key, wherein, the wireless network name at least includes the network security key part for representing the network security key;And dispensing unit, it is configured as based on the network security key and wireless network name configuration radio reception device.
For example, the radio network configuration device can also include:Ciphering unit, is configured as that the network security key is encrypted, obtains refined net safe key;Also, wherein, the wireless network name generation unit, is configured to produce wireless network name based on the refined net safe key, wherein, the network security key is represented by the refined net safe key.
For example, dispensing unit can include:Determining module, is configured as the title of a wireless network being configured to the wireless network name in the primary wireless network of radio reception device and time wireless network;Configuration module, is configured as the network security key being configured to the network security key of one wireless network.
5th aspect of the embodiment of the present invention provides a kind of radio reception device, can include:Configure port, it is configured as being based on radio network configuration information configuration wireless network, wherein, the radio network configuration information includes the first wireless network name and first network safe key, wherein, first wireless network name at least includes the wireless network secure key part for representing the first network safe key;And/or, the radio network configuration information includes second wireless network title, wherein, the second wireless network title at least includes representing message part of the wireless network without network security key;Input port, is configured as receiving the packet that the one or more terminal installations for carrying out radio communication by the wireless network are sent;Output port, is configured as forwarding the packet to the webserver associated with one or more of terminal installations.
For example:Radio reception device can also include:Memory, is configured as storing the device identification list for the terminal installation for needing to forward the packet to the webserver;Processor, be configured as judging the packet received from terminal installation whether in described device identification list, it is determined that in the case of being, the packet of reception is forwarded into the webserver by the output interface.
6th aspect of the embodiment of the present invention provides a kind of terminal installation, can include:Wireless network search unit, is configured as obtaining wireless network name, and judge whether include the network security key part for representing network security key in the wireless network name;Network security key extraction unit, is configured as in the case of it is determined that wireless network name includes the network security key part, from the corresponding network security key of wireless network name described in the network security key extracting section;Wireless network connection unit, is configured as being connected automatically to the corresponding wireless network of the wireless network name based on the wireless network name and the network security key extracted.
For example, terminal installation can also include:Network security key judging unit, is configured as based on representing that the wireless network name includes the message part of network security key in the wireless network name, judges whether the wireless network name includes network security key;Also, wherein network security key extraction unit, is specifically configured to that when it is determined that described information part indicates that the wireless network name includes network security key, network security key is extracted from the wireless network name.
According to the radio network configuration of the above-mentioned offer of the application, access and access method, device and equipment, the network security key of wireless network has been added in wireless network name, so that satisfactory terminal installation to be accessed directly can parse network security key from wireless network name, so as to realize automatically accessing for wireless network, the problem of needing artificially to input network security key in the prior art is solved, the operation complexity that terminal installation accesses wireless network is reduced.
Technical scheme in order to illustrate the embodiments of the present invention more clearly, the accompanying drawing used required in being described below to embodiment is briefly described, apparently, drawings in the following description are only some embodiments of the present invention, for those of ordinary skill in the art, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.In the accompanying drawings:
Fig. 1 is the schematic diagram of system architecture according to embodiments of the present invention;
Fig. 2 is the schematic block diagram of system architecture according to an embodiment of the invention;
Fig. 3 is the schematic block diagram of system architecture in accordance with another embodiment of the present invention;
Fig. 4 is family wireless network system schematic according to an embodiment of the invention;
Fig. 5 is the schematic block diagram of the system architecture according to another embodiment of the invention;
Fig. 6 is the method flow schematic diagram of configuration wireless network name according to an embodiment of the invention;
Fig. 7 is the method flow schematic diagram that terminal installation according to an embodiment of the invention is automatically accessed;
Fig. 8 is radio network configuration according to an embodiment of the invention, access and access method flow chart;
Fig. 9 is radio network configuration in accordance with another embodiment of the present invention, access and access method flow chart.
For the object, technical solutions and advantages of the present invention are more clearly understood, with reference to embodiment and accompanying drawing, the present invention is described in further details.Here, the exemplary embodiment of the present invention and its illustrate to be used to explain the present invention, it is but not as a limitation of the invention.
For an embodiment description and/or the feature of example, can in the same manner or in a similar manner it be used in one or more of the other embodiment, and/or be combined or instead of the feature of other embodiment with the feature of other embodiment.
It should be emphasized that, word " comprising " is used to refer to the presence of recited feature, key element, step or part when using in this manual, but is not excluded for the presence or increase of one or more of the other feature, key element, step, part or combinations thereof.
Fig. 1 is the schematic diagram of the system architecture 100 of one embodiment of the invention.As shown in figure 1, the system architecture 100 can include:One or more radio reception devices 101, one or more terminal installations 102 and radio network configuration device 103.Alternatively, the system architecture 100 can also include:Server 104.
Radio reception device 101 can be the equipment that can provide wireless network, such as router, wireless portable WIFI, wireless network card, bluetooth equipment.
Terminal installation 102 can be the equipment for possessing wireless access capability to be linked into the wireless network that radio reception device 101 is provided, such as mobile phone, computer, tablet personal computer, or intelligent home device, such as TV, air-conditioning, sweeping robot, refrigerator.
Radio network configuration device 103 can be configured as configuring radio reception device 101 based on defined certification policy, to allow the terminal installation 102 with automated validation mechanism corresponding with the certification policy to automatically access in the wireless network that radio reception device 101 is provided.Certification policy can include but is not limited to following three kinds:
(1) it is that network security key is carried in wireless network name by the radio network configuration of radio reception device 101, allow terminal installation 102 by the network security key carried in wireless network name, automatically access the wireless network of radio reception device 101;
(2) it is without cipher mode by the radio network configuration of radio reception device 101, terminal installation 102 is allowd to use the wireless network for being directly accessed radio reception device 101 without pin mode, but server 104 can be all forwarded to by accessing all packets transmitted by the terminal installation 102 of the wireless network, to carry out safety detection and forwarding;
(3) it is that network security key is carried in wireless network name by the radio network configuration of radio reception device 101, terminal installation 102 is allowd to pass through the network security key that is carried in wireless network name, automatically access the wireless network of radio reception device 101, but server 104 can be all forwarded to by accessing all packets transmitted by the terminal installation 102 of the wireless network, to carry out safety detection and forwarding.
With reference to specific embodiment, above-mentioned three kinds of certification policys are illustrated from system architecture and specific works mode respectively.It is important to note, however, that these specific embodiments merely to the present invention is better described, do not constitute inappropriate limitation of the present invention.
Fig. 2 is the schematic block diagram for the example system architecture for realizing certification policy (1).
As illustrated, the system architecture includes radio reception device 101, one or more terminal installations 102 and radio network configuration device 103.
Radio network configuration device 103 can include:Network security key generation unit 1031, wireless network name generation unit 1032 and dispensing unit 1033.
Network security key generation unit 1031 can be configured as producing the network security key KEY for wireless network.Wireless network name generation unit 1032 can be configured as based on network security key KEY generation wireless network names WIRELESS_NAME, wherein, wireless network name WIRELESS_NAME includes the network security key part KEY_PORTION for representing network security key KEY.Dispensing unit 1033 can be configured as sending the radio network configuration information for carrying network security key KEY and wireless network name WIRELESS_NAME to radio reception device 101, to carry out radio network configuration to radio reception device 101.
Radio reception device 101 can include:Configure port 1011 and input port 1012.Configuration port 1011 can be configured as being based on radio network configuration information configuration wireless network WIRELESS.Input port 1012 can be configured as receiving the packet sent by the wireless network WIRELESS one or more terminal installations 102 for carrying out radio communication.
Terminal installation 102 can include:Wireless network search unit 1021, network security key extraction unit 1022 and wireless network connection unit 1023.Wireless network search unit 1021 can be configured as obtaining wireless network name WIRELESS_NAME.Network security key extraction unit 1022 can be configured as extracting network security key KEY corresponding with wireless network name WIRELESS_NAME from the network security key part KEY_PORTION in acquired wireless network name WIRELESS_NAME.Wireless network connection unit 1023 can be configured as being connected automatically to wireless network WIRELESS corresponding with wireless network name WIRELESS_NAME based on wireless network name WIRELESS_NAME and network security key KEY.
So, can be by radio network configuration device 103 according to above certification policy (1) progress radio network configuration for example, radio reception device 101 (such as router A) is when dispatching from the factory or during use.Terminal installation 102 (such as Intelligent robot for sweeping floor) with automated validation mechanism corresponding with certification policy (1), after the wireless network produced by radio reception device 101 is searched, it can be connected automatically in the wireless network, without artificial input wireless network encrypted message.
Fig. 3 is the schematic diagram for the example system architecture for realizing certification policy (2).
As illustrated, the system architecture includes radio reception device 101, one or more terminal installations 102, radio network configuration device 103 and server 104.
Radio network configuration device 103 can include wireless network name generation unit 1032 and dispensing unit 1033.Wireless network name generation unit 1032 can be configurable to generate wireless network name WIRELESS_NAME.Preferably, it can include indicating that wireless network is the instruction without cipher mode in wireless network name WIRELESS_NAME
Information.Dispensing unit 1033 can be configured as sending the radio network configuration information for carrying wireless network name WIRELESS_NAME and corresponding forwarding address information to radio reception device 101, to carry out radio network configuration (wireless network name WIRELESS_NAME to radio reception device 101;Without cipher mode), and radio reception device 101 is configured so that the packet sent by wireless network WIRELESS_NAME to the radio reception device 101 is required for being forwarded to server 104.
Radio reception device 101 can include:Configure port 1011, input port 1012 and forwarding port 1013.Configuration port 1011 can be configured as being based on radio network configuration information configuration wireless network WIRELESS_NAME and forwarding address (server 104).Input port 1012 can be configured as receiving the packet sent by the wireless network WIRELESS_NAME one or more terminal installations 102 for carrying out radio communication.Forwarding port 1013 can be configured as that server 104 will be forwarded to by the wireless network WIRELESS_NAME packets received.
Terminal installation 102 can include wireless network search unit 1021 and wireless network connection unit 1023.Wireless network search unit 1021 can be configured as may search for the wireless network WIRELESS_NAME of no password.Wireless network connection unit 1023 can be configured as being directly connected to the wireless network WIRELESS_NAME without password.
Server 104 forwards the packet come to carry out safety detection radio reception device 101, whether the equipment for judging to send the packet is the safety means specified, if safety detection forwards the packet to corresponding purpose equipment by (that is, it is judged that result is "Yes").
Server 104 for example can be the Cloud Server being located on internet or be arranged at the private server that intelligent home device is exclusively used in family.
For example, Fig. 4 is the schematic diagram of the family wireless network system based on above example (certification policy (2)).
In the family wireless network system, router 401 can be configured when dispatching from the factory or during use by radio network configuration device 103.So, intelligent home device in family is (for example, one layer located underground of washing machine 406, one layer of television set 402, refrigerator 403, two layers of mobile phone 404, computer 405) can couple in router 401 is provided by the way of without password wireless network.Router 401 is after the packet from intelligent home device is received, these packets are uniformly forwarded to server 407, safety detection is carried out to packet by the server 407, whether the equipment for judging to send the packet is the safety means set, if by safety detection (i.e., judged result is "Yes"), then forward the packet to corresponding purpose equipment.
Fig. 5 is the schematic block diagram for the example system architecture for realizing certification policy (3).
As illustrated, the example system architecture includes radio reception device 101, one or more terminal installations 102, radio network configuration device 103 and server 104.
Radio network configuration device 103 can include:Network security key generation unit 1031, wireless network name generation unit 1032 and dispensing unit 1033.Network security key generation unit 1031 can be configured as producing the network security key KEY for wireless network.Wireless network name generation unit 1032 can be configured as based on network security key KEY generation wireless network names WIRELESS_NAME, wherein, wireless network name WIRELESS_NAME includes the network security key part KEY_PORTION for representing network security key KEY.Dispensing unit 1033 can be configured as sending the radio network configuration information for carrying network security key KEY and wireless network name WIRELESS_NAME and corresponding forwarding address information to radio reception device 101, to carry out radio network configuration (wireless network name WIRELESS_NAME to radio reception device 101, network key KEY), and radio reception device 101 is configured so that the packet sent by wireless network WIRELESS_NAME to the radio reception device 101 all needs to be forwarded to server 104.
Radio reception device 101 can include:Configure port 1011, input port 1012 and forwarding port 1013.Configuration port 1011 can be configured as being based on radio network configuration information configuration wireless network and forwarding address (server 104).Input port 1012 can be configured as receiving the packet sent by the wireless network WIRELESS_NAME one or more terminal installations 102 for carrying out radio communication.Forwarding port 1013 can be configured as that server 104 will be forwarded to by the wireless network WIRELESS_NAME packets received.
Terminal installation 102 can include:Wireless network search unit 1021, network security key extraction unit 1022 and wireless network connection unit 1023.Wireless network search unit 1021 can be configured as obtaining wireless network name WIRELESS_NAME.Network security key extraction unit 1022 can be configured as extracting network security key KEY corresponding with wireless network name WIRELESS_NAME from the network security key part KEY_PORTION in wireless network name WIRELESS_NAME.Wireless network connection unit 1023 can be configured as being connected automatically to wireless network corresponding with wireless network name WIRELESS_NAME based on wireless network name WIRELESS_NAME and network security key KEY.
Server 104 forwards the packet come to carry out safety detection radio reception device 101, whether the equipment for judging to send the packet is the safety means specified, if safety detection forwards the packet to corresponding purpose equipment by (that is, it is judged that result is "Yes").
Server 104 for example can be the Cloud Server being located on internet or be arranged at the private server that intelligent home device is exclusively used in family.
Compared with the embodiment shown in Fig. 2, the embodiment shown in Fig. 5 adds the safety detection to the packet from terminal installation 102, so as to while realizing that terminal installation 102 automatically accesses wireless network, further increase security.
Radio network configuration device 103 shown in Fig. 1 to Fig. 3 and Fig. 5 is only a kind of exemplary description, and not the existing way to radio network configuration device 103 is specifically limited.For example, radio network configuration device 103 can be single a server or processor, it can also be built in radio reception device, or can also be subscriber terminal equipment (such as mobile phone, flat board, notebook etc.) in an application program, specific existence form is various, as long as the configuration to radio reception device can be realized.
For example, radio reception device 101 can communicate with being configured when dispatching from the factory or during use by connection or with radio network configuration device 103.
Above is the description of the system architecture and composition to different authentication strategy.
The implementation of each certification policy is described with reference to specific embodiment.
The process (certification policy (1)) for generating wireless network name WIRELESS_NAME based on wireless network password (network security key KEY) is mainly what is realized in above-mentioned radio network configuration device 103.In view of network security key KEY (for example, wireless network password) security, network security key KEY can be encrypted for radio network configuration device 103, obtain the refined net safe key of predetermined length, then refined net safe key is added to wireless network name WIRELESS_NAME network security key part KEY_PORTION, so as to obtain at least including the wireless network name of network security key part.
For example, with the wireless network name of router, i.e. exemplified by SSID (Service Set Identifier, service set).One WLAN can be divided into several sub-networks for needing different identity to verify by SSID technologies, each sub-network is required for independent authentication, corresponding sub-network can just only be entered by the user of authentication, so as to prevent unauthorized user from entering present networks.General SSID is made up of the case sensitive character for being no more than 32, in order to there is as far as possible few change to original system and equipment, therefore when SSID is generated, SSID can be named always according to the limitation of above-mentioned original character and number of characters.For example, whole SSID can be made up of following 4 String Regions:
[prefix] [base64 (authentication password)] [verification numerical value]
Wherein, prefix area can be made up of specific character string, such as bp_;
Authentication password area:I.e., above-mentioned network security key part, the region can be configured to the network security key after storage encryption (the i.e. wireless network password for the wireless network that router is provided in this), the network security key can be by public key encryption, then the base64 coded strings formed again after compressed encoding, compressed encoding can for example use LZ77 compression algorithms, it would however also be possible to employ other compression algorithms, this example is only schematic description, and specific restriction is not constituted;
Verify numerical value area:For data check, it can be only a character, for example can be one in 26 letters (case sensitive) and 0-9 Arabic numerals, the numerical value can be MAC (the Media Access Control of router, wireless access control) numerical value after address modulus 62, why modulus 62 is because it is contemplated that 26 capitalizations, 26 lowercases and 0 to 9 this 10 numerals, add up 62 characters altogether.
Above-mentioned prefix area and verification numerical value area could be arranged to be used for identify the wireless network name includes network security key, so that terminal installation to be accessed can quickly judge whether holding equipment is automatically accessed the wireless network after the wireless network name of wireless network is searched.
Based on the composition of above-mentioned wireless network name, its generating process can be with as shown in fig. 6, comprise the following steps:
S61:Produce random cipher;
S62:Corresponding public key is called to be encrypted according to the MAC Address of itself;
S63:Result after encryption is compressed;
S64:Compression result is recompiled using base64;
S65:Check whether the number of characters after recompiling exceeds book character number (for example, 28 characters);
S66:If it was exceeded, regenerating;
S67:If the part without departing from if as network name, wireless network name is synthesized according to predetermined composition rule.
After generation wireless network name, in order that obtaining equipment may search for the wireless network, the network name of the wireless network can be broadcasted, can also be without broadcast, but wait terminal installation itself and calculate the network name for calculating wireless network.
Terminal installation 102 (such as intelligent home device) if it is intended to be linked into wireless network in this way, need built-in corresponding automated validation mechanism, the mechanism can exist in the form of one section of code, can also be a hardware composition part (such as encryption chip), specific implementation can be selected as required, and the application is not construed as limiting.
By taking encryption chip as an example, wherein decrypted private key set can be built-in with, it is ensured that private key can be used for the decryption to wireless network name, so as to obtain network security key therein, and ensure that these decrypted private key will not be copied freely.
As shown in fig. 7, the flow chart automatically accessed for terminal installation 102, including:
S71:Wireless network around the scanning of terminal installation 102;
S72:The wireless network that can be accessed with automated validation is determined from the wireless network scanned;
S73:The character string of cryptographic zone is read from the wireless network name of the wireless network;
S74:Decompress the character string;
S75:Corresponding decrypted private key is matched according to MAC modulus;
S76:Decrypt the password of wireless network;
S77:Automated validation is connected.
Based on the wireless network access way (certification policy (2)) without password, need also exist for radio network configuration device 103 and configured.That is, the wireless network password of no cryptoguard is generated by radio network configuration device 103.Difference with existing wireless network connected mode is:The packet transmitted by terminal installation 102 being connected in the wireless network can all be forwarded to a specific server 104, so as to ensure the security of wireless network data transmission.
For example, with the wireless network name of router, i.e. SSID, exemplified by, general SSID is made up of the case sensitive character for being no more than 32, in order to there is as far as possible few change to original system and equipment, therefore when SSID is generated, the naming rule of script is still followed.For example, whole SSID can be made up of following 4 String Regions:
[prefix] [mac addresses] [verification numerical value]
Wherein, prefix area can be made up of specific character string, such as bp_;
Mac address areas:The region can be that the MAC Address of radio reception device but falls:Numeral afterwards and monogram;
Verify numerical value area:It can be only a character for data check, for example, can be one in 26 letters (case sensitive) and 0-9 Arabic numerals, the numerical value can be the numerical value after the MAC Address modulus 62 of router;
Above-mentioned prefix, mac address areas and verification numerical value area could be arranged to for identifying the wireless network be no password, so that terminal installation 102 to be accessed can be directly accessed in the wireless network after searching the wireless network name of wireless network.
Based on the mark rule of above-mentioned wireless network name, total execution flow can with as shown in figure 8, including:
S81:Read the MAC Address of radio reception device;
S82:The wireless network name of no password access can be identified by producing;
S83:Receive the terminal installation transmission packet for being connected into the wireless network;
S84:The packet received is forwarded to specific server.
Alternatively, certification policy (2) may be considered a kind of particular form of certification policy (1), i.e. be set to nothing equivalent to by the network security key of wireless network.Accordingly it is also possible to realize certification policy (2) by the way of certification policy 1, i.e. also use:The mode of [prefix] [base64 (authentication password)] [verification numerical value] sets wireless network name.
Alternatively, radio reception device 101 can be matched with a restraint device, be recorded in the restraint device after the IP address of all terminal installations for being connected into the wireless network that the radio reception device is provided, subsequently received packet,
The source IP address of the packet can be judged by the restraint device whether in the IP address set of record, if directly the packet is being forwarded in default particular server, so as to be further ensured that security.
Assuming that above-mentioned radio reception device is router, then wireless network name is the SSID of router, because router has main SSID and time SSID, SSID one wireless network of correspondence.Therefore, it is alternatively possible to which secondary SSID is set according to one of above-mentioned certification policy, and main SSID is set according to existing normal wireless network mode;Main SSID can also be set according to one of above-mentioned certification policy, and secondary SSID is set according to existing normal wireless network mode;Main SSID and secondary SSID can certainly be set according to one of above-mentioned certification policy, mode is specifically provided and selected, can be selected according to actual demand, the application is not construed as limiting to this.
Fig. 9 is radio network configuration, access and the access method flow chart of the embodiment of the present invention.It is described with reference to Fig. 9.
Step 901:Radio network configuration device (the radio network configuration device 103 shown in Fig. 1) generates the network security key of wireless network.
Step 902:Wireless network name is generated based on the network security key, wherein, the network security key part for representing network security key is at least included in wireless network name.
Alternatively, network security key can be encrypted, the refined net safe key of predetermined length is obtained, then refined net safe key is added to the network security key part of wireless network name, obtains at least including the wireless network name of network security key part.When actually realizing, alternatively, wireless network name also includes the one or more in consisting of part:
1) message part that wireless network name includes network security key is represented;
2) it is used for the check information part for verifying network security key;
3) the type information part of security type is represented;
4) cryptographic information part of encryption rule that the network security key is encrypted is represented.
Step 903:Radio network configuration device is configured based on network security key and wireless network name to the wireless network of radio reception device.
Step 904:Terminal installation (i.e. terminal installation 102 is obtained in Fig. 1) obtains wireless network name.
Step 905:Terminal installation is from the corresponding network security key of network security key extracting section wireless network name.
Step 906:Terminal installation is based on wireless network name and network security key is connected automatically to the corresponding wireless network of the wireless network name.
Step 907:The packet that radio reception device receiver terminal device is sended over, wherein, the radio reception device is configured with least one wireless network.
Step 908:Judge the packet whether from by presetting the terminal installation that wireless network carries out radio communication at least one described wireless network.
For example, by taking router as an example, two wireless networks can be provided simultaneously, i.e., the corresponding wireless network of main SSID wireless network corresponding with time SSID.The corresponding wireless networks of secondary SSID can be set to default wireless network, then the terminal installation for accessing the wireless network is regarded as packet and needs to be forwarded to the webserver associated with these terminal installations.For example, when these terminal installations are all the equipment of intelligent home device, this webserver can be exclusively used in the server for intelligent home device, can be a Cloud Server.
Step 909:When the packet, which comes from through the default wireless network, carries out the terminal installation of radio communication, the webserver associated to the terminal installation forwards the packet.
Answer and note, although the operating procedure of the inventive method is described with particular order in the accompanying drawings, this, which is not required that, either implies that the operation that these operations must be performed according to the particular order or are had to carry out shown in whole could realize desired result.Additionally or alternatively, it is convenient to omit some steps, multiple steps are merged into a step execution, and/or a step is decomposed into execution of multiple steps.
For example, step 907 is only the optional step of radio network configuration provided herein, access and access method to step 909, the realization of basic object of the application will not should be influenceed by lacking some or all of which.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or computer program product.Therefore, the form of the embodiment in terms of the present invention can use complete hardware embodiment, complete software embodiment or combine software and hardware.Moreover, the present invention can use the form for the computer program product implemented in one or more computer-usable storage mediums (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.) for wherein including computer usable program code.
The present invention is flow chart and/or block diagram with reference to method according to embodiments of the present invention, equipment (system) and computer program product to describe.It should be understood that can by the flow in each flow and/or square frame and flow chart and/or block diagram in computer program instructions implementation process figure and/or block diagram and/or square frame combination.These computer program instructions can be provided to the processor of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices to produce a machine so that produce the device for being used for realizing the function of specifying in one flow of flow chart or multiple flows and/or one square frame of block diagram or multiple square frames by the instruction of the computing device of computer or other programmable data processing devices.
These computer program instructions may be alternatively stored in the computer-readable memory that computer or other programmable data processing devices can be guided to work in a specific way so that the instruction being stored in the computer-readable memory, which is produced, includes instruction
The manufacture of device, the command device realizes the function of being specified in one flow of flow chart or multiple flows and/or one square frame of block diagram or multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices, so that series of operation steps is performed on computer or other programmable devices to produce computer implemented processing, so that the instruction performed on computer or other programmable devices provides the step of being used to realize the function of specifying in one flow of flow chart or multiple flows and/or one square frame of block diagram or multiple square frames.
Obviously, those skilled in the art should be understood that, each module or each step of the above-mentioned embodiment of the present invention can be realized with general computing device, they can be concentrated on single computing device, or be distributed on the network that multiple computing devices are constituted, alternatively, they can be realized with the executable program code of computing device, so as to, it can be stored in storage device and be performed by computing device, and in some cases, can be with the step shown or described by being performed different from order herein, or they are fabricated to each integrated circuit modules respectively, or be fabricated to single integrated circuit module to realize by the multiple modules or step in them.So, the embodiment of the present invention is not restricted to any specific hardware and software combination.
The preferred embodiments of the present invention are the foregoing is only, are not intended to limit the invention, for those skilled in the art, the embodiment of the present invention there can be various modifications and variations.Within the spirit and principles of the invention, any modification, equivalent substitution and improvements made etc., should be included in the scope of the protection.
Claims (15)
- A kind of wireless network configuration method, including:Generate the network security key of wireless network;Wireless network name is generated based on the network security key, wherein, the network security key part for representing the network security key is at least included in the wireless network name;AndThe wireless network is configured based on the network security key and the wireless network name.
- According to the method described in claim 1, wherein, based on the network security key generate wireless network name, including:The network security key is encrypted, the refined net safe key of predetermined length is obtained;The refined net safe key is added to the network security key part of wireless network name, obtains at least including the wireless network name of the network security key part.
- Method according to claim 2, wherein, at least one of or any combination are also included based on network security key generation wireless network name:Generation represents the message part that the wireless network name includes network security key;Generate the check information part for verifying the network security key;Generation represents the type information part of security type;Generation represents the cryptographic information part for the encryption rule that the network security key is encrypted.
- According to the method in any one of claims 1 to 3, wherein, the wireless network is configured based on the network security key and the wireless network name, including:The wireless network name is configured to the title of a wireless network in the primary wireless network of radio reception device and time wireless network;The network security key is configured to the network security key of one wireless network.
- A kind of wireless network access method, including:Wireless network name is obtained, wherein, the wireless network name at least includes the network security key part for representing network security key;From the corresponding network security key of wireless network name described in the network security key extracting section;The corresponding wireless network of the wireless network name is connected automatically to based on the wireless network name and the network security key.
- Method according to claim 5, in addition to:Based on representing that the wireless network name includes the message part of network security key in the wireless network name, judge whether the wireless network name includes network security key;And wherein, from the corresponding network security key of wireless network name described in the network security key extracting section, including:When described information part indicates that the wireless network name includes network security key, network security key is extracted from the wireless network name.
- A kind of wireless network access method, including:The packet that the terminal installation for carrying out radio communication by radio reception device is sent is received, wherein, the radio reception device is configured with least one wireless network;Judge the packet whether from by presetting the terminal installation that wireless network carries out radio communication at least one described wireless network;When the packet, which comes from through the default wireless network, carries out the terminal installation of radio communication, the webserver associated to the terminal installation forwards the packet.
- Method according to claim 7, wherein, the default wireless network is to be exclusively used in the wireless network that one or more terminal installations carry out radio communication.
- A kind of radio network configuration device, including:Network security key generation unit, is configured as producing the network security key for wireless network;Wireless network name generation unit, is configured as generating wireless network name based on the network security key, wherein, the wireless network name at least includes the network security key part for representing the network security key;AndDispensing unit, is configured as based on the network security key and wireless network name configuration radio reception device.
- Radio network configuration device according to claim 9, in addition to:Ciphering unit, is configured as that the network security key is encrypted, obtains refined net safe key;And wherein, the wireless network name generation unit, is configured to produce wireless network name based on the refined net safe key, wherein, the network security key is represented by the refined net safe key.
- Radio network configuration device according to claim 9 or 10, wherein, the dispensing unit includes:Determining module, is configured as the title of a wireless network being configured to the wireless network name in the primary wireless network of radio reception device and time wireless network;Configuration module, is configured as the network security key being configured to the network security key of one wireless network.
- A kind of radio reception device, including:Configure port, it is configured as being based on radio network configuration information configuration wireless network, wherein, the radio network configuration information includes the first wireless network name and first network safe key, wherein, first wireless network name at least includes the wireless network secure key part for representing the first network safe key;And/or, the radio network configuration information includes second wireless network title, wherein, the second wireless network title at least includes representing message part of the wireless network without network security key;Input port, is configured as receiving the packet that the one or more terminal installations for carrying out radio communication by the wireless network are sent;Output port, is configured as forwarding the packet to the webserver associated with one or more of terminal installations.
- Radio reception device according to claim 12, in addition to:Memory, is configured as storing the device identification list for the terminal installation for needing to forward the packet to the webserver;Processor, be configured as judging the packet received from terminal installation whether in described device identification list, it is determined that in the case of being, the packet of reception is forwarded into the webserver by the output interface.
- A kind of terminal installation, including:Wireless network search unit, is configured as obtaining wireless network name, and judge whether include the network security key part for representing network security key in the wireless network name;Network security key extraction unit, is configured as in the case of it is determined that wireless network name includes the network security key part, from the corresponding network security key of wireless network name described in the network security key extracting section;Wireless network connection unit, is configured as being connected automatically to the corresponding wireless network of the wireless network name based on the wireless network name and the network security key extracted.
- Terminal installation according to claim 14, in addition to:Network security key judging unit, is configured as based on representing that the wireless network name includes the message part of network security key in the wireless network name, judges whether the wireless network name includes network security key;Also, wherein described network security key extraction unit, is configured to that when it is determined that described information part indicates that the wireless network name includes network security key, network security key is extracted from the wireless network name.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2014104040864 | 2014-08-18 | ||
CN201410404086 | 2014-08-18 | ||
PCT/CN2015/087363 WO2016026429A1 (en) | 2014-08-18 | 2015-08-18 | Method, device, and equipment for wireless network configuration, access, and visit |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106537962A true CN106537962A (en) | 2017-03-22 |
CN106537962B CN106537962B (en) | 2020-03-20 |
Family
ID=55350199
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201580038698.9A Active CN106537962B (en) | 2014-08-18 | 2015-08-18 | Wireless network configuration, access and access method, device and equipment |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106537962B (en) |
WO (1) | WO2016026429A1 (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10869345B1 (en) * | 2015-04-27 | 2020-12-15 | Marvell Asia Pte, Ltd. | Systems and methods for provisioning devices for WLAN |
CN109547266A (en) * | 2018-12-29 | 2019-03-29 | 深圳市宏电技术股份有限公司 | A kind of batch configuration method, apparatus and system |
CN109932977A (en) * | 2019-04-18 | 2019-06-25 | 合肥泛米智能科技有限公司 | A kind of smart home device based on cloud computing |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1632877A1 (en) * | 2004-09-03 | 2006-03-08 | Sap Ag | Authentication of handheld devices for access to applications |
CN101682842A (en) * | 2007-06-04 | 2010-03-24 | 索尼爱立信移动通讯有限公司 | Operating ad-hoc wireless local area networks using network identifiers and application keys |
CN102404725A (en) * | 2011-11-08 | 2012-04-04 | 复旦大学 | Method for safely establishing WiFi connection by SSID in application program |
CN103841537A (en) * | 2012-11-20 | 2014-06-04 | 中国电信股份有限公司 | Control system and method using family gateway to deploy WLAN metropolitan area network |
-
2015
- 2015-08-18 CN CN201580038698.9A patent/CN106537962B/en active Active
- 2015-08-18 WO PCT/CN2015/087363 patent/WO2016026429A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1632877A1 (en) * | 2004-09-03 | 2006-03-08 | Sap Ag | Authentication of handheld devices for access to applications |
CN101682842A (en) * | 2007-06-04 | 2010-03-24 | 索尼爱立信移动通讯有限公司 | Operating ad-hoc wireless local area networks using network identifiers and application keys |
CN102404725A (en) * | 2011-11-08 | 2012-04-04 | 复旦大学 | Method for safely establishing WiFi connection by SSID in application program |
CN103841537A (en) * | 2012-11-20 | 2014-06-04 | 中国电信股份有限公司 | Control system and method using family gateway to deploy WLAN metropolitan area network |
Also Published As
Publication number | Publication date |
---|---|
WO2016026429A1 (en) | 2016-02-25 |
CN106537962B (en) | 2020-03-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Schiller et al. | Landscape of IoT security | |
CN107770182B (en) | Data storage method of home gateway and home gateway | |
Razouk et al. | A new security middleware architecture based on fog computing and cloud to support IoT constrained devices | |
CN112800472B (en) | Industrial internet identification data protection system based on micro-service architecture | |
CN103873454A (en) | Authentication method and equipment | |
US20220116773A1 (en) | Method and apparatus for managing bundles of smart secure platform | |
US10791106B2 (en) | Digital credential with embedded authentication instructions | |
CN104205891A (en) | Virtual sim card cloud platform | |
CN100507934C (en) | System and method for registering entities for code signing services | |
CN103929748A (en) | Internet of things wireless terminal, configuration method thereof and wireless network access point | |
RU2683853C1 (en) | Method for improving gprs key, sgsn device, user device, hlr / hss and gprs system | |
WO2013075412A1 (en) | Security control method and device for mobile terminal | |
CN104063650B (en) | A kind of key storage device and using method thereof | |
WO2018010480A1 (en) | Network locking method for esim card, terminal, and network locking authentication server | |
CN102761870A (en) | Terminal authentication and service authentication method, system and terminal | |
CN100511258C (en) | System and method for providing code signing services | |
CN107872315B (en) | Data processing method and intelligent terminal | |
CN104750723A (en) | File sharing method, system, browser and server | |
CN106537962A (en) | Method, device, and equipment for wireless network configuration, access, and visit | |
CN108833500B (en) | Service calling method, service providing method, data transmission method and server | |
CN115362700A (en) | Method and apparatus for managing events of intelligent security platform | |
CN104732166A (en) | Data storing and reading method and device and equipment | |
CN104135458A (en) | Establishment of communication connection between mobile equipment and secure carrier | |
KR20140043836A (en) | Communication system utilizing fingerprint information and use of the system | |
CN106559779A (en) | A kind of data transmission method, device and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20200819 Address after: No.401, No.33, Dongnan Avenue, Changshu high tech Industrial Development Zone, Suzhou City, Jiangsu Province Patentee after: Suzhou Beihu robot Co., Ltd Address before: 100191, Beijing, Zhichun Road, Haidian District No. 27 quantum core block 16, room 1602-1605 Patentee before: BEIJING BPEER TECHNOLOGY Co.,Ltd. |