WO2017049984A1 - Procédé d'accès à un réseau sans fil et nœud d'accès sans fil - Google Patents

Procédé d'accès à un réseau sans fil et nœud d'accès sans fil Download PDF

Info

Publication number
WO2017049984A1
WO2017049984A1 PCT/CN2016/088365 CN2016088365W WO2017049984A1 WO 2017049984 A1 WO2017049984 A1 WO 2017049984A1 CN 2016088365 W CN2016088365 W CN 2016088365W WO 2017049984 A1 WO2017049984 A1 WO 2017049984A1
Authority
WO
WIPO (PCT)
Prior art keywords
access node
wireless access
identification information
temporary
fixed
Prior art date
Application number
PCT/CN2016/088365
Other languages
English (en)
Chinese (zh)
Inventor
张毅
陆苏
胡胜钢
Original Assignee
惠州Tcl移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 惠州Tcl移动通信有限公司 filed Critical 惠州Tcl移动通信有限公司
Publication of WO2017049984A1 publication Critical patent/WO2017049984A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to a wireless network access method and a wireless access node (AP, Access) Point).
  • AP wireless access node
  • a smart device and an AP usually establish a connection by means of a two-dimensional code scanning method.
  • a connected (smart) device sets the BSSID of the AP (Basic). Service Set Identifier, basic service set identifier) code and connection password, such as PIN (Personal Identification) Number, personal identification password)
  • the security key used to generate the encrypted message is mapped to the two-dimensional code graphic.
  • the connected (smart) device can connect to the AP and access the wireless network by scanning the two-dimensional code.
  • connection method eliminates the cumbersome link of the user to manually input the connection password, and brings great convenience to the user, at the same time, other problems are generated.
  • the AP can be connected to the wireless network, and the smart device stores the connection password after the connection, but if the user of the wireless network (for example, the owner of the house) only wants the connection password stored by some temporary devices to expire after a certain period of time, It is hoped that other fixed devices will be connected for a long time, then the above connection method cannot be realized.
  • the user must disconnect the access of some devices by modifying the connection password, or clear the those that do not want to be long-time by logging in to the control interface of the router. Access to smart devices.
  • the embodiments of the present invention provide a method for accessing a wireless network and a wireless access node, which can distinguish whether the device to be connected is a temporary device or a fixed device, and the temporary device is disconnected from the AP after the preset time is exceeded or disconnected.
  • the user needs to open the connection and the fixed device connects to the AP for a long time, reducing the manual operation and bringing great convenience to the user.
  • a wireless access node includes a processor, a communication interface, a memory, and a communication bus.
  • the communication interface is configured to broadcast a beacon message, and receive a request message sent by the device to be connected according to the beacon message, where The request message includes the identification information of the device to be connected;
  • the memory is configured to store the fixed user list and the temporary user list, and the program instruction, wherein the fixed user list records the identification information of the connected device whose trust status is long-term effective, in the temporary user list.
  • the program instruction is used to find the identification information of the device to be connected in the fixed user list and the temporary user list, if the fixed user list is in the fixed user list If the identification information of the device to be connected is found, it is determined that the device to be connected is a fixed device. If the identification information of the device to be connected is found in the temporary user list, it is determined that the device to be connected is a temporary device, if it is in the fixed user list and temporarily The device to be connected is not found in the user list.
  • the communication interface is further configured to: send the access information to the first connected device, where the access information includes the identifier information of the wireless access node and the fixed connection password, so that the first The connected device generates a two-dimensional code graphic according to the identification information of the wireless access node and the fixed connection password and displays it in the display, so that the device to be connected obtains the identification information and the fixed connection password of the wireless access node by scanning the two-dimensional code image.
  • the device acts as a fixed device or a temporary device, and receives a selection result input by the user, and sends selection information including a selection result to the wireless access node; and the communication interface is further configured to receive the selection information, and the program instruction selects a device to be connected in the selection result
  • the device is fixed, the device to be connected A fixed list of the identification information added to the device, the selection result is to be connected to the device selected as the temporary apparatus identification information of the connected device to be added to a temporary list of devices; a processor for executing program instructions.
  • An access method of a wireless network which is applied to a wireless access node, includes: a wireless access node broadcasts a beacon message; and the wireless access node receives a request message sent by the device to be connected according to the beacon message.
  • the request message includes the identification information of the device to be connected; the wireless access node searches for the identification information of the device to be connected in the fixed user list and the temporary user list, and if the identification information of the device to be connected is found in the fixed user list, it is determined to be
  • the connected device is a fixed device. If the identification information of the device to be connected is found in the temporary user list, it is determined that the device to be connected is a temporary device.
  • the identification information of the device to be connected is not found. And determining that the device to be connected is an untrusted device, wherein the fixed user list records the identification information of the connected device whose trusted state is long-term effective, and the temporary user list records that the trusted state is longer than the preset time or is disconnected. Identification information of the connected device.
  • the method further includes: the wireless access node sends the access information to the first connected device, where the access information includes the identifier information of the wireless access node and the fixed The password is connected, so that the first connected device generates a two-dimensional code graphic according to the identification information of the wireless access node and the fixed connection password and displays the image in the display, so that the device to be connected acquires the identifier of the wireless access node by scanning the two-dimensional code image.
  • Information and fixed connection password, and access to the wireless access node according to the identification information of the wireless access node and the fixed connection password are examples of the wireless access node according to the identification information of the wireless access node and the fixed connection password.
  • the method further includes: the wireless access node sends the access information to the first connected device, where the access information includes the identifier information of the wireless access node. And temporarily connecting the password, so that the first connected device generates the two-dimensional code graphic according to the identification information of the wireless access node and the temporary connection password and displays it in the display, so that the device to be connected acquires the wireless access node by scanning the two-dimensional code image.
  • the identification information and the temporary connection password and access the wireless access node according to the identification information of the wireless access node and the temporary connection password.
  • the method further includes: when the wireless access node detects that the device to be connected stops accessing the wireless access node or accesses the wireless access node for more than a predetermined time, the wireless access node invalidates the temporary connection password.
  • the method further includes: the wireless access node sends information to the second connected device, where the information includes identifier information of the device to be accessed, so that the second The connected device requests the user to select the device to be connected as the fixed device or the temporary device, and receives the selection result input by the user, and sends the selection information including the selection result to the wireless access node; the wireless access node receives the selection information, and selects the result in the selection.
  • the identification information of the device to be connected is added to the list of fixed devices.
  • the identification information of the device to be connected is added to the temporary device list.
  • a wireless access node includes: a sending module, configured to broadcast a beacon message; and a receiving module, configured to receive a request message sent by the device to be connected according to the beacon message, where the request message includes a to-be-connected message.
  • the identification information of the device is configured to store the fixed user list and the temporary user list, and the fixed user list records the identification information of the connected device whose trusted status is long-term effective, and the temporary user list records the trusted status as exceeding the preset time. Or the identification information of the connected device that is invalid after being disconnected; the determining module is configured to search for the identification information of the device to be connected in the fixed user list and the temporary user list, and find the identification information of the device to be connected in the fixed user list.
  • the device to be connected is found as a fixed device in the temporary user list, it is determined that the device to be connected is a temporary device, and if the device is not found in the fixed user list and the temporary user list, The identification information of the device determines that the device to be connected is an untrusted device.
  • the sending module is further configured to send the access information to the first connected device, where the access information includes the identifier information of the wireless access node and the fixed connection password, so that the first connected device is configured according to the identifier information of the wireless access node.
  • the fixed connection password generates a two-dimensional code graphic and displays it in the display of the self, so that the device to be connected obtains the identification information of the wireless access node and the fixed connection password by scanning the two-dimensional code image, and according to the identification information of the wireless access node and the fixed Connect the password to the wireless access node.
  • the sending module is further configured to send the access information to the first connected device, where the access information includes the identifier information of the wireless access node and the temporary connection password, so that the first connected device is configured according to the identifier information of the wireless access node. And generating a two-dimensional code graphic with the temporary connection password and displaying it in the display of the self, so that the device to be connected obtains the identification information and the temporary connection password of the wireless access node by scanning the two-dimensional code image, and according to the identification information of the wireless access node and the temporary Connect the password to the wireless access node.
  • the wireless access node further includes a detecting module, configured to detect whether the device to be connected has stopped accessing the wireless access node or accessing the wireless access node for more than a predetermined time, and if so, invalidating the temporary connection password.
  • a detecting module configured to detect whether the device to be connected has stopped accessing the wireless access node or accessing the wireless access node for more than a predetermined time, and if so, invalidating the temporary connection password.
  • the sending module is further configured to send the device information to the second connected device, where the device information includes the identifier information of the device to be accessed, so that the second connected device requests the user to select the device to be connected as the fixed device or the device.
  • the access method of the wireless network and the wireless access node in the embodiment of the present invention preset a fixed user list, a temporary user list, and corresponding identification information in the AP, and compare the identification information of the device to be connected with the preset identification information. Thereby distinguishing whether the device to be connected is a temporary device or a fixed device or an untrusted device.
  • the invention can meet the user requirement that the temporary device is disconnected from the AP after the preset time or disconnection, and the fixed device is connected to the AP for a long time, which reduces the cumbersome manual operation and brings great convenience to the user.
  • FIG. 1 is a schematic flowchart of a method for accessing a wireless network according to a first embodiment of the present invention
  • FIG. 2 is a schematic flowchart of a method for accessing a wireless network according to a second embodiment of the present invention
  • FIG. 3 is a schematic diagram of information interaction between devices in the method shown in FIG. 2;
  • FIG. 4 is a schematic flowchart of a method for accessing a wireless network according to a third embodiment of the present invention.
  • FIG. 5 is a schematic diagram of information interaction between devices in the method shown in FIG. 4; FIG.
  • FIG. 6 is a schematic flowchart of a method for accessing a wireless network according to a fourth embodiment of the present invention.
  • FIG. 7 is a schematic diagram of information interaction between devices in the method shown in FIG. 6;
  • FIG. 8 is a schematic block diagram of a wireless access node according to an embodiment of the present invention.
  • FIG. 9 is a schematic diagram showing the hardware structure of a wireless access node according to an embodiment of the present invention.
  • An embodiment of the present invention provides a method for accessing a wireless network, as shown in FIG. 1, to enable a temporary device to disconnect from an AP after a preset time or disconnection, and at the same time, the fixed device can connect to the AP for a long time. Enter a wireless network such as Wi-Fi.
  • the method includes two phases. The first phase is used to determine the type of the device to be connected, that is, whether the device to be connected is a temporary device or a fixed device or a non-trust device, and the second phase is used according to the second stage. The result of the judgment is made to the corresponding connection.
  • the core of the method lies in the first stage, as shown in Figure 1, including:
  • S11 The wireless access node broadcasts beacon information.
  • the AP may send a beacon message, that is, a beacon message, to the wireless network such as Wi-Fi at a preset frequency interval (for example, 100 milliseconds) to notify the neighboring environment that the connected device has an accessible wireless network.
  • a beacon message that is, a beacon message
  • the wireless network such as Wi-Fi at a preset frequency interval (for example, 100 milliseconds) to notify the neighboring environment that the connected device has an accessible wireless network.
  • the wireless access node receives the request message sent by the device to be connected according to the beacon message, where the request message includes the identifier information of the device to be connected.
  • the device to be connected sends a request message according to the beacon message, where the request message includes the identifier information of the device to be connected, and the identifier information may be a BSSID (Basic Service) Set Identifier, the service set identifier), the security key PIN used to generate the encrypted message (Personal Identification) Number, personal identification password) code, or MAC of the device to be connected (Media Access Control, media access control) address, user-readable device name, and other identity information that identifies the device to be connected.
  • BSSID Basic Service
  • the security key PIN used to generate the encrypted message Personal Identification
  • PIN Personal Identification
  • MAC of the device to be connected Media Access Control, media access control address, user-readable device name, and other identity information that identifies the device to be connected.
  • the wireless access node searches for the identification information of the device to be connected in the fixed user list and the temporary user list. If the identification information of the device to be connected is found in the fixed user list, it is determined that the device to be connected is a fixed device, if the temporary user If the identification information of the device to be connected is found in the list, the device is determined to be a temporary device. If the identification information of the device to be connected is not found in the fixed user list and the temporary user list, it is determined that the device to be connected is an untrusted device.
  • the identification information of the connected device whose trusted state is long-term valid is recorded in the fixed user list.
  • the temporary user list records the identification information of the connected device that has a trusted state that exceeds the preset time or fails after being disconnected.
  • the first phase of the access method of the embodiment of the present invention includes the following steps S21 to S23, and the second phase includes the following steps S24 to S26. :
  • S21 The wireless access node broadcasts a beacon message.
  • the wireless access node receives the request message sent by the device to be connected according to the beacon message, where the request message includes the identifier information of the device to be connected.
  • the wireless access node finds the identifier information of the device to be connected in the fixed user list, and determines that the device to be connected is a fixed device.
  • the wireless access node sends the access information to the connected device, where the access information includes the identification information of the wireless access node and the fixed connection password.
  • the fixed connection password is a long-term valid password, which is used to indicate that the device to be connected can establish a connection with the AP for a long time and access the wireless network for a long time.
  • the connected device generates a two-dimensional code graphic according to the identification information of the wireless access node and the fixed connection password in the access information, and displays the same on the display of the self.
  • the device to be connected acquires the identification information of the wireless access node and the fixed connection password by scanning the two-dimensional code image, and accesses the wireless access node according to the identification information of the wireless access node and the fixed connection password.
  • the to-be-connected device sends a request for authorization to the AP to include the identification information of the wireless access node and the fixed connection password.
  • the AP After the AP is authenticated, the AP establishes a connection with the device to be connected, and the device to be connected is connected. Into the wireless network.
  • the first phase of the access method of the embodiment of the present invention includes the following steps S41 to S43, and the second phase includes the following steps S44 to S46. Or include steps S44 ⁇ S47:
  • S41 The wireless access node broadcasts a beacon message.
  • the wireless access node receives the request message sent by the device to be connected according to the beacon message, where the request message includes the identifier information of the device to be connected.
  • the wireless access node finds the identifier information of the device to be connected in the temporary user list, and determines that the device to be connected is a temporary device.
  • the wireless access node sends the access information to the connected device, where the access information includes the identification information of the wireless access node and the temporary connection password.
  • the temporary connection password is a short-term valid password, which is used to indicate that the device to be connected can establish a connection with the AP within a predetermined time and access the wireless network within a predetermined time, or the device to be connected can use the password and the AP for the first time. Once the connection is established and disconnected, the AP cannot be connected again and the wireless network cannot be accessed.
  • the connected device generates a two-dimensional code graphic according to the identification information of the wireless access node and the temporary connection password and displays it in the display of the self.
  • the device to be connected acquires the identification information and the temporary connection password of the wireless access node by scanning the two-dimensional code image, and accesses the wireless access node according to the identification information of the wireless access node and the temporary connection password.
  • the device to be connected sends a request for the identification information of the wireless access node and the temporary connection password to the AP.
  • the AP After the AP is authenticated, the AP establishes a connection with the device to be connected, and the device to be connected is connected. Into the wireless network.
  • the method of the embodiment of the present invention may further include the step S47: when the wireless access node detects that the device to be connected stops accessing the wireless access node or accesses, based on the function of the temporary connection password set forth in the foregoing step S44. When the wireless access node exceeds the predetermined time, the wireless access node invalidates the temporary connection password.
  • the AP may determine the device to be connected as a fixed device or a temporary device according to the selection result of the user.
  • the selection result of the user may be
  • the connected device of the embodiment shown in FIG. 1 , FIG. 2 and FIG. 4 is generated and generated by other devices, and the other device does not have to establish a connection with the AP, that is, does not need to access the wireless network, and FIG. 6 and FIG. 7
  • the second phase of the access method of the embodiment of the present invention includes the following steps:
  • S61 The wireless access node broadcasts a beacon message.
  • the wireless access node receives a request message sent by the device to be connected according to the beacon message, where the request message includes the identifier information of the device to be connected.
  • the wireless access node does not find the identifier information of the device to be connected in the fixed user list and the temporary user list, and determines that the device to be connected is an untrusted device.
  • the wireless access node sends information to the connected device, where the information includes the identification information of the device to be accessed.
  • the connected device identification information requests the user to select the device to be connected as the fixed device or the temporary device, and receives the selection result input by the user, and sends the selection information including the selection result to the wireless access node.
  • the connected device can display a message through the screen, and the information is used to query the user to select the current device to be accessed as a fixed device or a temporary device. Further, the user can be reminded to make a selection by means of sound, flashing lights or the like.
  • the wireless access node receives the selection information, and when the selection result is that the device to be connected is selected as the fixed device, the identification information of the device to be connected is added to the fixed device list, and when the selection result is that the device to be connected is selected as the temporary device, Add the identification information of the device to be connected to the temporary device list.
  • the connected device in the step performed after step S66 is equivalent to the first connected device, and the connected device in the previous step is equivalent to the second connected device.
  • the first connected device may be a smart television
  • the second connected device may be a smartphone used by a owner of the wireless access node.
  • the embodiment of the present invention may directly reject the access of the device to be connected after the wireless access node determines that the device to be connected is an untrusted device.
  • FIG. 8 is a schematic block diagram of a wireless access node according to an embodiment of the present invention.
  • the wireless access node (AP) 81 includes:
  • the sending module 811 is configured to broadcast a beacon message.
  • the receiving module 812 is configured to receive a request message sent by the to-be-connected device 82 according to the beacon message, where the request message includes the identifier information of the device 82 to be connected.
  • the determining module 813 is configured to search for the identification information of the device 82 to be connected in the fixed user list and the temporary user list, where the fixed user list and the temporary user list can be stored in the storage module 814 of the fixed user list and the temporary user list, wherein the fixed user
  • the identification information of the connected device 82 whose trust status is long-term valid is recorded in the list.
  • the temporary user list records the identification information of the connected device that has a trusted status that exceeds the preset time or fails after disconnection.
  • the determining module 813 determines that the device to be connected 82 is a fixed device; if the identification information of the device to be connected 82 is found in the temporary user list, the determining module 813 determines The device to be connected 82 is a temporary device. If the identification information of the device to be connected 82 is not found in the fixed user list and the temporary user list, the determining module 813 determines that the device 82 to be connected is an untrusted device.
  • the determining module 813 determines that the device 82 to be connected is a fixed device
  • the sending module 811 is further configured to send the access information to the connected device 83, where the access information includes the identification information of the wireless access node and the fixed connection password, so that the connected device 83 is based on the identification information of the wireless access node 81 and the fixed connection password.
  • the password is accessed by the wireless access node 81.
  • the determining module 813 determines that the device 82 to be connected is a temporary device
  • the sending module 811 is further configured to send the access information to the connected device 83, where the access information includes the identification information of the wireless access node 81 and the temporary connection password, so that the connected device 83 is temporarily connected according to the identification information of the wireless access node 81.
  • the password generates a two-dimensional code graphic and displays it in its own display, so that the device to be connected 82 obtains the identification information and the temporary connection password of the wireless access node 81 by scanning the two-dimensional code image, and according to the identification information of the wireless access node 81 and the temporary The connection password is accessed to the wireless access node 81.
  • the temporary connection password is a short-term valid password, which is used to indicate that the device to be connected 82 can establish a connection with the AP within a predetermined time and access the wireless network within a predetermined time, or the device to be connected can use the password and After the AP establishes the connection for the first time and disconnects, the AP cannot establish a connection with the AP again, and cannot access the wireless network. Based on this, after the access to the wireless network, the detecting module 815 of the wireless access node 81 is configured to detect whether the device 82 to be connected has stopped accessing the wireless access node 81 or accessing the wireless access node 81 for more than a predetermined time. If yes, the temporary connection password is invalidated.
  • the device 82 to be connected may be used as a fixed device or a temporary device according to the selection result of the user, and the selection result of the user may be generated by the connected device 83. It can also be generated by other devices 84, and the other devices 84 do not have to establish a connection with the AP, that is, do not have to access the wireless network. If other devices 84 access the wireless network, the other devices 84 are equivalent to the second connected device (hereinafter The connected device 84 is described), and correspondingly, the aforementioned connected device 83 is equivalent to the first connected device.
  • the sending module 811 is further configured to send information to the connected device 84, where the information includes the identification information of the device 82 to be accessed, so that the connected device 84 requests the user to select the device to be connected 82 as a fixed device or
  • the temporary device receives the selection result input by the user, and transmits selection information including the selection result to the wireless access node 81.
  • the receiving module 812 of the wireless access node 81 is further configured to receive the selection information, and when the selection result is that the device to be connected 82 is selected as the fixed device, the identification information of the device to be connected 82 is added to the fixed device list, and the selection result is selected. When the device to be connected 82 is used as a temporary device, the identification information of the device to be connected 82 is added to the temporary device list.
  • the plurality of module structures of the wireless access node 81 described above, corresponding to the access method described in the above embodiments, have the same technical effects.
  • the foregoing embodiment of the wireless access node 81 is only schematic, and the division of the module is only a logical function division, and the actual implementation may have another division manner, for example, two modules may be integrated into another system. , or some features can be ignored or not executed.
  • the connections between the modules may be through some interfaces, or may be electrical or other forms.
  • the module may be a component of the wireless access node 81, and may or may not be a physical frame. It may be located in one place or on multiple network units, and may be implemented in the form of a software function box or a hardware device. Formal realization.
  • the embodiment of the present invention provides a hardware configuration diagram of a wireless access node 81.
  • At least one processor e.g., a CPU
  • at least one network interface or other communication interface memory
  • at least one communication bus may be included for enabling connection communication between the devices.
  • the processor is for executing an executable module, such as a computer program, stored in the memory.
  • Memory may contain high speed random access memory (RAM: Random) Access Memory), may also include non-volatile memory (non-volatile Memory), such as at least one disk storage.
  • the communication connection between the system gateway and at least one other network element is implemented by at least one network interface (which may be wired or wireless), and an Internet, a wide area network, a local network, a metropolitan area network, etc. may be used.
  • the program is stored in the memory, and the program instructions may be executed by the processor.
  • the program instructions may include the units indicated in the foregoing embodiments of the present invention. For the specific implementation of each unit, refer to the corresponding embodiments in the foregoing embodiments of the present invention. Content, no more details here.
  • the device in this embodiment includes a device to be accessed and an access device (83, 84), which may be a mobile phone or a PDA (Personal) Digital Any terminal having a display function, such as an assistant, a personal digital assistant or a tablet computer, a portable communication device, or the like, may also be a wearable device such as a smart bracelet and a wearable device embedded in a clothing accessory such as clothes or jewelry.
  • an access device 83, 84
  • Any terminal having a display function such as an assistant, a personal digital assistant or a tablet computer, a portable communication device, or the like, may also be a wearable device such as a smart bracelet and a wearable device embedded in a clothing accessory such as clothes or jewelry.
  • the above-described functions of the present embodiment may be stored in a computer readable storage medium if implemented in the form of a software functional unit and sold or used as a separate product, that is, the embodiment of the present invention may be in the form of a software product. It is embodied that a number of instructions are included to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present invention.
  • a computer device which may be a personal computer, server, or network device, etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention concerne un procédé d'accès à un réseau sans fil et un nœud d'accès sans fil. Le procédé consiste : dans un point d'accès (AP), à prédéfinir une liste d'utilisateurs fixes et une liste d'utilisateurs temporaires et des informations d'identification correspondantes ; par comparaison d'informations d'identification concernant un dispositif à connecter avec des informations d'identification prédéfinies, à distinguer le dispositif à connecter comme étant un dispositif temporaire ou un dispositif fixe ou un dispositif non sécurisé. La présente invention peut satisfaire les exigences d'utilisateur selon lesquelles un dispositif temporaire est déconnecté d'un AP après qu'il dépasse le temps préétabli ou après la déconnexion d'une connexion, et un dispositif fixe est connecté à l'AP pendant un long laps de temps, ce qui réduit les opérations manuelles laborieuses et apporte une grande commodité à un utilisateur.
PCT/CN2016/088365 2015-09-23 2016-07-04 Procédé d'accès à un réseau sans fil et nœud d'accès sans fil WO2017049984A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510613462.5 2015-09-23
CN201510613462.5A CN105357740B (zh) 2015-09-23 2015-09-23 一种无线网络的接入方法及无线访问节点

Publications (1)

Publication Number Publication Date
WO2017049984A1 true WO2017049984A1 (fr) 2017-03-30

Family

ID=55333566

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/088365 WO2017049984A1 (fr) 2015-09-23 2016-07-04 Procédé d'accès à un réseau sans fil et nœud d'accès sans fil

Country Status (2)

Country Link
CN (1) CN105357740B (fr)
WO (1) WO2017049984A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112351424A (zh) * 2020-07-28 2021-02-09 深圳Tcl新技术有限公司 无线连网管理方法、***、设备及计算机可读存储介质
CN115174388A (zh) * 2022-07-01 2022-10-11 杭州涂鸦信息技术有限公司 一种联网智能设备网络更新方法、装置、设备及存储介质

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105357740B (zh) * 2015-09-23 2020-09-25 Tcl移动通信科技(宁波)有限公司 一种无线网络的接入方法及无线访问节点
CN105916151A (zh) * 2016-06-06 2016-08-31 惠州Tcl移动通信有限公司 一种智能设备无线网络接入方法及***
CN107659936A (zh) * 2016-07-25 2018-02-02 中兴通讯股份有限公司 一种控制WiFi接入设备的接入方法及装置
CN106535190A (zh) * 2016-11-24 2017-03-22 北京小米移动软件有限公司 网络连接方法及装置
CN106550383B (zh) * 2016-11-25 2020-06-19 北京小米移动软件有限公司 网络连接方法及智能设备
CN108616885A (zh) * 2016-12-06 2018-10-02 中兴通讯股份有限公司 一种认证方法及装置
CN108207018A (zh) * 2016-12-16 2018-06-26 中兴通讯股份有限公司 无线连接方法及装置
CN106454454A (zh) * 2016-12-27 2017-02-22 深圳Tcl数字技术有限公司 无线网络接入方法和***
CN106879006A (zh) * 2017-01-19 2017-06-20 杰发科技(合肥)有限公司 无线接入设备及其无线连接管理方法
JP7430628B2 (ja) * 2018-02-19 2024-02-13 フリービット株式会社 携帯情報端末のデータ通信や端末機能を制御するためのコンピュータソフトウエアプログラム及びデータ通信制御サーバ
TWI695645B (zh) * 2018-07-06 2020-06-01 小白投資有限公司 無線網路識別方法
CN111148095A (zh) * 2020-01-03 2020-05-12 华为技术有限公司 一种用于在终端和无线接入点之间建立Wi-Fi连接的方法
CN113438712A (zh) * 2021-06-07 2021-09-24 上海龙旗科技股份有限公司 一种无线连接方法及设备
CN114257458A (zh) * 2022-01-08 2022-03-29 广州市成格信息技术有限公司 一种全光网络多功能网关

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103327644A (zh) * 2013-05-24 2013-09-25 华为技术有限公司 一种无线连接的方法及设备
CN103415012A (zh) * 2013-08-15 2013-11-27 惠州Tcl移动通信有限公司 一种无线路由器的鉴权方法和鉴权装置
CN103475996A (zh) * 2013-08-19 2013-12-25 小米科技有限责任公司 网络连接方法、网络共享方法及装置
EP2835992A2 (fr) * 2012-09-27 2015-02-11 ZTE Corporation Procédé d'établissement de groupe sur base wi-fi et dispositif de connexion directe au wi-fi
CN104488303A (zh) * 2014-04-16 2015-04-01 华为终端有限公司 接入无线网络的装置及方法
CN105357740A (zh) * 2015-09-23 2016-02-24 惠州Tcl移动通信有限公司 一种无线网络的接入方法及无线访问节点

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1604523A (zh) * 2003-09-30 2005-04-06 华为技术有限公司 无线终端接入网络的方法
JP4281768B2 (ja) * 2006-08-15 2009-06-17 ソニー株式会社 通信システム、無線通信装置およびその制御方法
CN101404643B (zh) * 2008-11-13 2011-09-14 ***通信集团福建有限公司 基于ipsec技术实现无线单点登录***及其运行方法
CN102187714A (zh) * 2011-04-29 2011-09-14 华为终端有限公司 移动终端接入无线网络的方法、设备及通信***
JP5994390B2 (ja) * 2012-05-24 2016-09-21 株式会社バッファロー 認証方法および無線接続装置
CN102724668A (zh) * 2012-06-15 2012-10-10 惠州Tcl移动通信有限公司 一种基于二维码图形的wifi网络信息共享方法及***
US9084122B2 (en) * 2012-07-31 2015-07-14 Qualcomm Incorporated Processing of access point crowdsourcing data
CN104581726B (zh) * 2015-01-15 2018-07-17 天地融科技股份有限公司 一种认证方法和***

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2835992A2 (fr) * 2012-09-27 2015-02-11 ZTE Corporation Procédé d'établissement de groupe sur base wi-fi et dispositif de connexion directe au wi-fi
CN103327644A (zh) * 2013-05-24 2013-09-25 华为技术有限公司 一种无线连接的方法及设备
CN103415012A (zh) * 2013-08-15 2013-11-27 惠州Tcl移动通信有限公司 一种无线路由器的鉴权方法和鉴权装置
CN103475996A (zh) * 2013-08-19 2013-12-25 小米科技有限责任公司 网络连接方法、网络共享方法及装置
CN104488303A (zh) * 2014-04-16 2015-04-01 华为终端有限公司 接入无线网络的装置及方法
CN105357740A (zh) * 2015-09-23 2016-02-24 惠州Tcl移动通信有限公司 一种无线网络的接入方法及无线访问节点

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112351424A (zh) * 2020-07-28 2021-02-09 深圳Tcl新技术有限公司 无线连网管理方法、***、设备及计算机可读存储介质
CN112351424B (zh) * 2020-07-28 2024-03-12 深圳Tcl新技术有限公司 无线连网管理方法、***、设备及计算机可读存储介质
CN115174388A (zh) * 2022-07-01 2022-10-11 杭州涂鸦信息技术有限公司 一种联网智能设备网络更新方法、装置、设备及存储介质
CN115174388B (zh) * 2022-07-01 2024-03-26 杭州涂鸦信息技术有限公司 一种联网智能设备网络更新方法、装置、设备及存储介质

Also Published As

Publication number Publication date
CN105357740B (zh) 2020-09-25
CN105357740A (zh) 2016-02-24

Similar Documents

Publication Publication Date Title
WO2017049984A1 (fr) Procédé d'accès à un réseau sans fil et nœud d'accès sans fil
WO2020155360A1 (fr) Procédé de distribution de réseau pour appareil électroménager, appareil électroménager, terminal mobile et support de données
WO2012016473A1 (fr) Procédé d'accès wi-fi (wireless fidelity), point d'accès et système d'accès wi-fi
WO2015147547A1 (fr) Procédé et appareil permettant la prise en charge de l'ouverture de session au moyen d'un terminal d'utilisateur
EP3293936B1 (fr) Procédé et appareil de contrôle d'accès au réseau
WO2013085088A1 (fr) Procédé de partage de données de dispositif en communication m2m et système correspondant
WO2021071032A1 (fr) Procédé et appareil de contrôle d'accès au dispositif pour l'internet des objets
WO2016028067A2 (fr) Système et procédé permettant de détecter un programme malveillant par visualisation
EP2929652A1 (fr) Procédé et appareil de commande d'accès entre un dispositif local et un serveur externe dans un système de réseau local
WO2010041915A2 (fr) Système et procédé pour le paramétrage de sécurité pour un dispositif contrôlé par un point de contrôle dans un réseau domestique
WO2018149368A1 (fr) Procédé de traitement d'appel vowif d'un terminal mobile, système et terminal mobile
WO2014185594A1 (fr) Système et procédé à authentification unique dans un environnement vdi
WO2015062203A1 (fr) Procédé et système de partage de fichier multimédia
WO2015133859A1 (fr) Procédé et système d'établissement d'une connexion entre un dispositif chercheur et un dispositif cible
WO2018000978A1 (fr) Procédé de sauvegarde de données et terminal
EP3031223A1 (fr) Procédé et appareil pour connexion wi-fi direct
WO2018000641A1 (fr) Procédé de transfert d'esim, appareil de commutation et terminal
WO2013085217A1 (fr) Système de gestion de la sécurité ayant de multiples serveurs de relais, et procédé de gestion de la sécurité
WO2017140080A1 (fr) Procédé et appareil de communication d'adressage basés sur une adresse de contrôle d'accès au support
WO2012099402A2 (fr) Procédé et appareil de communication téléphonique utilisant un réseau domestique
WO2017026840A1 (fr) Dispositif de connexion internet, serveur de gestion central, et procédé de connexion internet
WO2016190663A1 (fr) Procédé de gestion de sécurité et dispositif de gestion de sécurité dans un système de réseau domestique
WO2015105289A1 (fr) Système d'authentification de sécurité d'utilisateur et procédé associé dans un environnement internet
WO2016095375A1 (fr) Terminal mobile et procédé d'authentification de session basé sur dtmf correspondant
WO2022255619A1 (fr) Système de prévention d'intrusion sans fil et son procédé de fonctionnement

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16847866

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16847866

Country of ref document: EP

Kind code of ref document: A1