A kind of wireless network access methodTechnical field
The present invention relates to wireless communication technique field, specifically, relate to a kind of by wireless device and access deviceBetween distance be encrypted authentication mode change cut-in method.
Background technology
Along with the development of wireless technology, data terminal, household electrical appliance etc. are involved in network, it is desirable to wireless networkCover is more and more extensive, just can more easily use wireless network.But bring therewith is to rub net etc. to affect self netNetwork is experienced and the situation of safety occurs.
At present, do not adjust the distance and carry out judging the mode of authentication, often occur both wanting to use during user usesEasily and fast, consider safety and the control sex chromosome mosaicism used again, but the telling of the most unappeasable user of current technologyAsk.Such as: family installs netting twine, in order to other equipment accesses conveniently, just it is mounted with wireless device, but is frequently found network speed and usesSlowly;After be the discovery that other people are attached oneself wireless device, wireless device is set immediately, only allows the MAC by arrangingAddress conducts interviews;Normal use after a few days, has friend, relative to come to home, needs to use wireless network, it has to carry out houseIn wireless device change is set;Work as relative, after friend leaves, be once more modified, use and excessively bother.Similar also having is permittedMany, businessman provides convenient to enter customer family, but the problem being also frequently encountered.
Drawbacks described above, is worth solving.
Summary of the invention
In order to overcome the deficiency of existing technology, the present invention provide a kind of wireless network access method, i.e. auxiliary equipment andCarried out the change of network authentication mode between wireless device by distance, after distance calculates, wireless device carry out early stage setting,Authentication mode allows auxiliary equipment to access according to corresponding authentication mode after judging.With it, user is using wireless networkNot only facilitate during network, quickly, and the control of network security and use can be held.
Technical solution of the present invention is as described below:
A kind of wireless network access method, it is characterised in that include auxiliary equipment and the wireless device needing to connect wireless network,Wherein, between described auxiliary equipment and described wireless device, carried out the change of network authentication mode by distance, auxiliary by judgingHelping the distance of equipment, auxiliary equipment uses and is linked in wireless device with apart from corresponding authentication mode.
The present invention according to such scheme, it is characterised in that the change step of described network authentication mode includes:
(1) described auxiliary equipment searches for the SSID name of described wireless device, and input authentication is attached;
(2) described wireless device carries out range estimation between access point and described auxiliary equipment, draws distance between the two;
(3) distance obtained is compared judgement with the distance that arranges of storage in described wireless device, show that described auxiliary setsDistance between standby and described wireless device then carries out next step in setpoint distance, if outside the distance set, jumps to the(5) step;
(4) carry out authentication mode coupling to judge, it is determined that connect with whether authentication one matches, if coupling, authenticate successfully, if notCoupling then re-starts the connection of (1st) step;
(5) carry out authentication mode coupling to judge, it is determined that connect with whether authentication two matches, if coupling, authenticate successfully, if notCoupling then re-starts the connection of (1st) step.
The present invention according to such scheme, it is characterised in that during range estimation, described wireless device is to describedAuxiliary equipment carries out packet transmission and starts timer, after described auxiliary equipment receives described packet, by described packetReturn, after described wireless device receives described packet, described timer stop, by the transmission time of described packet withThe transmission speed of described packet carries out distance and calculates.
The present invention according to such scheme, it is characterised in that during range estimation, described auxiliary equipment is with describedSignal attenuation and transmission medium that distance between wireless device is propagated in atmosphere by RSSI calculate.
The present invention according to such scheme, it is characterised in that after distance calculates, described wireless device carry out early stage and setPutting, authentication mode allows described auxiliary equipment to access according to corresponding authentication mode after judging.
The present invention according to such scheme, it is characterised in that described network authentication mode includes key authentication mode and closeKey adds MAC authentication mode.
According to the present invention of such scheme, it has the beneficial effects that, the present invention by wireless device and auxiliary equipment itBetween distance carry out judging the mode of authentication, both met the wireless network coverage rate desired by user more and more wider, it is also possible to anti-Only such as rub the Network Security Issues of guipure.Thering is provided convenient simultaneously for businessman to enter customer family, this type of run into is askedTopic can also solve in the lump, improves Consumer's Experience, enhances the convenient, fast of wireless network and safety.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of the present invention.
Fig. 2 is the flow chart that present invention distance calculates.
Fig. 3 is the flow chart of authentication mode of the present invention conversion.
Detailed description of the invention
Below in conjunction with the accompanying drawings and the present invention is conducted further description by embodiment:
As Figure 1-3, a kind of wireless network access method, including needing to connect the auxiliary equipment of wireless network and wireless settingStandby, wherein, between auxiliary equipment and wireless device, carried out the change of network authentication mode by distance, by judging that auxiliary setsStandby distance, auxiliary equipment uses and is linked in wireless device with apart from corresponding authentication mode.
Different distances uses corresponding authentication mode to access, and is all obtained in that normal data communication.
Network authentication mode includes that key authentication mode and key add MAC authentication mode.
Embodiment one
The change step of network authentication mode includes:
The SSID name of auxiliary equipment search wireless device, input authentication is attached.
Wireless device carries out range estimation between access point and auxiliary equipment, draws distance between the two.Sentence in distanceDuring Ding, wireless device carries out packet transmission to auxiliary equipment and starts timer, after auxiliary equipment receives packet,Being returned by packet, after wireless device receives packet, timer stops, by the transmission time of packet and packetTransmission speed carries out distance and calculates.
The distance obtained is compared judgement with the distance that arranges of storage in wireless device, obtains by which kind of mode being enteredRow accesses.Show that the distance between auxiliary equipment with wireless device then carries out authentication mode in setpoint distance and mates judgement, sentenceWhether fixed connection and authentication one match, if coupling, authenticating successfully, if not mating, re-connecting.
If the distance drawn between auxiliary equipment with wireless device is outside the distance set, carries out authentication mode and mate and sentenceFixed, it is determined that to connect with whether authentication two matches, if coupling, authenticating successfully, if not mating, re-connecting.
After distance calculates, wireless device carrying out early stage setting, authentication mode allows auxiliary equipment according to accordingly after judgingAuthentication mode access.
Authentication ciphering mode, in wireless device WIFI connects, by distance, sets two set encrypted authentications, authenticates a HeAuthentication two, by the distance set, if in the distance set, is then i.e. accessible to wireless device, if setting by authentication oneOutside set a distance, then can only be linked into wireless device by authentication two, authentication one can use does not encrypts or simple password connectsEntering, authentication two, in order to prevent password cracking, can use password to add MAC Address and access, only allow to have added setting of MACAccess for by input password.
Authentication one and authentication two, all can individually carry out respective encryption arrange, can be key can also be that key addsMAC authentication mode, it is contemplated that use scene, can add MAC mode by authentication two employing key, and outer equipment of adjusting the distance accesses and addsTo limit.
Embodiment two
The change step of network authentication mode includes:
The SSID name of auxiliary equipment search wireless device, input authentication is attached.
Wireless device carries out range estimation between access point and auxiliary equipment, draws distance between the two.Sentence in distanceDuring Ding, the distance between auxiliary equipment and wireless device passes through signal attenuation and the transmission that RSSI propagates in atmosphereMedium calculates.
The distance obtained is compared judgement with the distance that arranges of storage in wireless device, obtains by which kind of mode being enteredRow accesses.Show that the distance between auxiliary equipment with wireless device then carries out authentication mode in setpoint distance and mates judgement, sentenceWhether fixed connection and authentication one match, if coupling, authenticating successfully, if not mating, re-connecting.
If the distance drawn between auxiliary equipment with wireless device is outside the distance set, carries out authentication mode and mate and sentenceFixed, it is determined that to connect with whether authentication two matches, if coupling, authenticating successfully, if not mating, re-connecting.
After distance calculates, wireless device carrying out early stage setting, authentication mode allows auxiliary equipment according to accordingly after judgingAuthentication mode access.
Authentication ciphering mode, in wireless device WIFI connects, by distance, sets two set encrypted authentications, authenticates a HeAuthentication two, by the distance set, if in the distance set, is then i.e. accessible to wireless device, if setting by authentication oneOutside set a distance, then can only be linked into wireless device by authentication two, authentication one can use does not encrypts or simple password connectsEntering, authentication two, in order to prevent password cracking, can use password to add MAC Address and access, only allow to have added setting of MACAccess for by input password.
Authentication one and authentication two, all can individually carry out respective encryption arrange, can be key can also be that key addsMAC authentication mode, it is contemplated that use scene, can add MAC mode by authentication two employing key, and outer equipment of adjusting the distance accesses and addsTo limit.
It should be appreciated that for those of ordinary skills, can be improved according to the above description or be converted,And all these modifications and variations all should belong to the protection domain of claims of the present invention.
Above in conjunction with accompanying drawing, patent of the present invention is carried out exemplary description, it is clear that the realization of patent of the present invention is not subject toThe restriction of aforesaid way, if the various improvement that the method design that have employed patent of the present invention is carried out with technical scheme, or withoutImprove and design and the technical scheme of patent of the present invention are directly applied to other occasion, the most within the scope of the present invention.