Summary of the invention
The object of the present invention is to provide a kind of fast access method of wireless network, system and for net equipment, realization is not necessarily toInput password, also can in the environment of encryption quick registration wireless network.
Technical solution provided by the invention is as follows:
The present invention provides a kind of fast access method of wireless network, including step:
Obtain the probe request with identification code of access terminals broadcast transmission;The identification code is that request access is wirelessThe identification information of the access terminals of network;
Judge whether the identification code belongs to default white list;The default white list stores and the identification for network terminationThe identification information of the identical access terminals of information;
When identification code belongs to default white list, the custom field that the target cipher key is added in probing response frameIn, the probing response frame with target cipher key is generated and sent to corresponding access terminals;
The authentication frame with target cipher key that the access terminals return is received, the target in authentication frame is verifiedKey, certification allow the access terminals to be connected to the wireless network currently emitted for net equipment when passing through.
Further, include before the probe request with identification code for obtaining access terminals broadcast transmission:
Several identification codes are added in custom field in broadcast management frame, are generated wide with several identification codesBroadcast management frame;
The broadcast management frame of several identification codes is had described in broadcast transmission;
After the probe request with identification code for obtaining access terminals broadcast transmission, the judgement identificationWhether code belongs to default white list:
Judge the knowledge in the identification code and the broadcast management frame in the current probe request of the communication module acquisitionWhether other code matches;If retaining the current probe request when matching, so that subsequent judgement certification control transmission is described currentThe wireless network of the corresponding access terminals of probe request accesses situation;If mismatch, ignore the current probe request,To judge next probe request.
Further, by default white list programming into ROM.
Further, further include:When the target cipher key of the wireless network for updating transmitting for net equipment, generate concurrentSend the probing response frame with updated target cipher key to corresponding access terminals.
The present invention also provides a kind of for net equipment, including:
Communication module obtains the probe request with identification code of access terminals broadcast transmission;The identification code is to askSeek the identification information of the access terminals of access wireless network;
First judgment module, judges whether the identification code belongs to default white list;The default white list store withFor the identification information of the identical access terminals of identification information of network termination;
Generation module generates the probing response frame for having target cipher key when identification code belongs to default white list;
The communication module, the also probing response frame described in transmission with target cipher key to corresponding access terminals, and connectReceive the authentication frame with target cipher key that access terminals return;
Processing module, verifies the target cipher key in authentication frame, and certification allows the access terminals connection institute when passing throughState the wireless network currently emitted for net equipment.
Further, further include:
Generation module is added, adds several identification codes in the custom field in broadcast management frame, is had if generatingThe broadcast management frame of dry identification code;
The communication module also has the broadcast management frame of several identification codes described in broadcast transmission;
Second judgment module judges identification code and the broadcast in the current probe request of the communication module acquisitionWhether the identification code in management frame matches;
Control module, if when matching, retaining the current probe request, so that the first judgment module continues to sentenceIt is disconnected;If mismatch, ignore the current probe request, the lower probe request of switching judging.
Further, further include:Programming module, by default white list programming into ROM.
Further, further include:
Module is obtained, the updated target cipher key of wireless network of transmitting is obtained;
The generation module generates the detection for having updated target cipher key when identification code belongs to default white listResponse frame.
The present invention also provides a kind of fast speed access systems of wireless network, including:Access terminals and for net equipment:
The access terminals, the probe request with identification code for broadcast transmission;The identification code is that request connectsEnter the identification information of the access terminals of wireless network;Also receive the probe response with target cipher key sent for net equipmentFrame generates and sends the authentication frame with target cipher key to described for net equipment according to the probing response frame;
It is described for net equipment, for obtaining the probe request with identification code of the access terminals broadcast transmission;SentenceWhether the identification code of breaking belongs to default white list;The default white list stores identical with the identification information for network terminationThe identification information of access terminals;When identification code belongs to default white list, the probe response with target cipher key is generated and sentFrame is to corresponding access terminals;The authentication frame with target cipher key that the access terminals return is received, verifying identity is recognizedThe target cipher key in frame is demonstrate,proved, certification allows the access terminals to be connected to the wireless network currently emitted for net equipment when passing throughNetwork.
Further, described for net equipment, it is also used to add several knowledges in the custom field in broadcast management frameOther code after generating the broadcast management frame with several identification codes, has the broadcast pipe of several identification codes described in broadcast transmissionReason frame judges that the communication module obtains after getting the probe request with identification code of access terminals broadcast transmissionWhether the identification code in current probe request taken matches with the identification code in the broadcast management frame;If when matching, retainingThe current probe request, so that subsequent judgement certification control sends the corresponding access terminals of the current probe requestWireless network accesses situation;If mismatch, ignore the current probe request, to sentence to next probe requestIt is disconnected.
The fast access method of the wireless network provided through the invention a kind of, system and for net equipment, can bring withLower at least one beneficial effect:
1) present invention by the identification informations of the access terminals accessed for net equipment decision request whether with default white listIt is interior, when the identification information of the access terminals of request access is in default white list, by automatic for net equipment and access terminalsBackfill addition target cipher key, avoids user from being manually entered the key of wireless network, to request access wireless network in access terminalsWhen network, the efficiency of any access terminals connection wireless network is promoted, the high efficiency of network insertion can be increased, promotes user's connectionThe usage experience of wireless network.
2) present invention can make access terminals identical with the identification information for net equipment, fast quick access without filling in passwordEnter the purpose to the encrypted wireless network of correspondence, guarantees safety and the access efficiency of the wireless network access of user, promotedThe networking experience of user's access wireless network.
3) present invention filters out the identification code in identification code and broadcast management frame in probe request for net equipment and mismatchesAccess terminals, reduce the identification code in the subsequent probe request sent all access terminals when seeking all over and default white listThe process of comparison match, the wireless network simplified for net equipment access control flow, and it is unnecessary for the judgement verifying of net equipment to reduceIdentification code number, reduce for net equipment power consumption.
4) target cipher key of the present invention is automatically added in authentication frame, does not need to inquire nothing to the user for net equipmentThe target cipher key of gauze network reduces the leakage of the target cipher key of wireless network, reduces loiter network probability, promotes user radio network and connectsThe experience entered.
Specific embodiment
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, Detailed description of the invention will be compareed belowA specific embodiment of the invention.It should be evident that drawings in the following description are only some embodiments of the invention, forFor those of ordinary skill in the art, without creative efforts, it can also be obtained according to these attached drawings otherAttached drawing, and obtain other embodiments.
To make simplified form, part related to the present invention is only schematically shown in each figure, they are not representedIts practical structures as product.In addition, there is identical structure or function in some figures so that simplified form is easy to understandComponent only symbolically depicts one of those, or has only marked one of those.Herein, "one" is not only indicated" only this ", can also indicate the situation of " more than one ".
First embodiment of the invention, as shown in Figure 1, a kind of fast access method of wireless network, including:
Obtain the probe request with identification code of access terminals broadcast transmission;The identification code is that request access is wirelessThe identification information of the access terminals of network;
Judge whether the identification code belongs to default white list;The default white list stores and the identification for network terminationThe identification information of the identical access terminals of information;
When identification code belongs to default white list, the custom field that the target cipher key is added in probing response frameIn, the probing response frame with target cipher key is generated and sent to corresponding access terminals;
The authentication frame with target cipher key that the access terminals return is received, the target in authentication frame is verifiedKey, certification allow the access terminals to be connected to the wireless network currently emitted for net equipment when passing through.
Specifically, including but is not limited to router for net equipment in the present embodiment, mobile phone of hot spot etc. is opened with nothingThe equipment of gauze network emission function.Accessing the access terminals in wireless network can be whole for the various online in home lanEnd, or the various access terminals in Internet of Things, for example, smart television, intelligent air condition under home furnishings intelligent environment, intelligenceThe access terminals such as socket.Each access terminals all have identification code, and identification code can be equipment Serial Number, out manufacturer's information, knowOther code (number, English character, Chinese character, any combination of additional character), is also possible to MAC Address or host name etc.Etc. identification informations.Access terminals broadcast transmission has the probe request of identification code, gets access terminals for net equipment and sendsProbe request after, judge whether the identification code in probe request belongs to default white list, stored in default white listThe identification information of access terminals is identical as the identification information for network termination, will currently emit for net equipment if belonging to wirelessThe target cipher key of network is added in the custom field of probing response frame, to generate the probing response frame for having target cipher keyAfterwards, the probing response frame with target cipher key is sent to access terminals, and target cipher key is added to authentication frame by access terminalsIn, the authentication frame for having target cipher key is generated, access terminals send the authentication frame with target cipher key and extremely set for netIt is standby, after getting the authentication frame with target cipher key for net equipment, authentication frame is parsed to obtain corresponding meshKey is marked, judges whether target cipher key key corresponding with the wireless network currently emitted for net equipment is identical, then recognizes if they are the sameCard passes through, which is successfully associated with for net equipment, allows the access terminals access of request access wireless network.
The present invention by the identification informations of the access terminals accessed for net equipment decision request whether in default white list,Based on determining that result carries out corresponding wireless network access process, when request access access terminals identification information preset it is whiteWhen in list, the target of the wireless network currently emitted for network termination is added automatically in original probing response frame for net equipmentKey, the target that access terminals add the wireless network currently emitted for network termination automatically in original authentication frame are closeKey adds target cipher key by backfilling automatically for net equipment and access terminals, user is avoided to be manually entered the key of wireless network,To promote the efficiency of any access terminals connection wireless network, can increase when access terminals request access wireless networkThe high efficiency of network insertion promotes the usage experience that user connects wireless network.
Illustratively, it is assumed that identification information is manufacturer's information (to can be the same supplier or association of multiple suppliersQuotient uses same recognition mechanism), for access terminals and wireless router etc. such as the access terminals products of same company for netConnectivity problem between equipment, it is integrated for the access terminals such as net equipment and access terminals device product in wireless router etc. firstIdentification information required for wireless network rapid access, on the basis for the access terminals product that can correctly identify same companyOn, realize that key is backfilling into the function of the authentication frame of the access terminals product of request access wireless network automatically for net equipmentCan, achieve the purpose that also quickly access encrypted wireless network without filling in password, guarantees that the wireless network of user connectsThe safety entered and access efficiency promote the networking experience that user accesses wireless network.
Second embodiment of the invention, the present embodiment are the optimal enforcement examples of above-mentioned first embodiment, are implemented with above-mentioned firstExample is compared, and is theed improvement is that, includes before the probe request with identification code for obtaining access terminals broadcast transmission:
Several identification codes are added in custom field in broadcast management frame, are generated wide with several identification codesBroadcast management frame;
The broadcast management frame of several identification codes is had described in broadcast transmission;
After the probe request with identification code for obtaining access terminals broadcast transmission, the judgement identificationWhether code belongs to default white list:
Judge the knowledge in the identification code and the broadcast management frame in the current probe request of the communication module acquisitionWhether other code matches;If retaining the current probe request when matching, so that subsequent judgement certification control transmission is described currentThe wireless network of the corresponding access terminals of probe request accesses situation;If mismatch, ignore the current probe request,To judge next probe request.
Specifically, the access terminals of wireless network to be accessed are arranged for the administration page of net equipment in wireless router etc.Identification code obtains the identification code of access terminals for net equipment, then sets in the custom field of the broadcast management frames such as Beacon frameIt sets and adds the corresponding identification code of several access terminals, so that broadcast management frame of the generation with several identification codes, then suppliesNetwork termination periodic broadcasting should broadcast management frame with several identification codes to all access terminals, meanwhile, obtained for net equipmentThe probing response frame for the identification code with itself for taking access terminals to send parses probing response frame, judges the spy that parsing obtainsWhether the identification code surveyed in response frame matches with the identification code being added in broadcast management frame, shows that this sets for net if matchingThe permission of the standby wireless network for allowing the access terminals that there is access own transmission, to retain the current of access terminals transmissionProbe request, convenient for presetting white name for whether the subsequent identification code judged in the current probe request retained of net equipment belongs toIn list, allow to backfill target cipher key if belonging to for net equipment to probing response frame, to carry out subsequent authentication determination controlWhether system allows to send the access terminals access wireless network of current probe request.Show this for net equipment if mismatchingThe current probe request for ignoring access terminals transmission carries out above-mentioned judgement stream to the next probe request gotJourney.Illustratively, certain company A1 production is by router B1 and mobile phone C1, another company A2 production by router B2 and computer C2,Mobile phone 1 is consistent with the identification code of router B1, and computer C2 is consistent with the identification code of router B2, when router B1 emits wireless networkNetwork, and mobile phone C1 and computer C2 to router B1 send with itself identification code probe request, due to computer C2 withThe identification code of router B2 is consistent, and mobile phone C1 and the identification code of router B2 are inconsistent, therefore router B2 is only to computer C2The identification code with itself probe request carry out judgement identify whether allow couple in router B2 wireless network.
In the present invention, the probe request of access terminals broadcast is received for net equipment, which carriesThe identification code of network termination itself, to filter out the identification code and the current broadcast sent for net device broadcasts in probe requestThe unmatched access terminals of identification code in management frame, the probe request for sending all access terminals when reducing subsequent seek all overIn identification code and default white list comparison match process, simplify for net equipment wireless network access control flow, reduceThe number that unnecessary identification code is verified for the judgement of net equipment, reduces the power consumption for net equipment.
Third embodiment of the invention, the present embodiment are the optimal enforcement examples of above-mentioned first embodiment, are implemented with above-mentioned firstExample is compared, and is theed improvement is that, is further included:By default white list programming into ROM.
Specifically, in the present invention, needing that one is arranged in the administration page for net equipment such as wireless router canInput the configuration page of access terminals above- mentioned information, i.e., it is above-mentioned that wireless router of the invention etc. for net equipment is that one kind has carriedFunction for net equipment, which can be by when waiting for the factory of net equipment, by relevant default white list programming to wirelessRouter etc. is in the ROM of net equipment.The present invention by default white list programming to the ROM for net equipment so that default white listIn be stored in admittedly with the identification information for going out the identical access terminals of manufacturer's information for network termination in net equipment, once storageWill not because power supply close and disappear, the identification information for guaranteeing access terminals matched with the identification information of router corresponding to it is upperNetwork termination, can not need to be manually entered password can access the wireless network of the router.
Reduce the process that user inputs the corresponding key of wireless network, thus access terminals identification information preset it is whiteWhen in list, the efficiency of access terminals connection wireless network is promoted, the high efficiency of network insertion is increased, it is wireless to promote user's connectionThe usage experience of network.The present invention can be when access terminals access the wireless network for net equipment, directly according to authenticationTarget cipher key in frame is connected to the network, so that the access terminals of the logged wireless network for the transmitting of net equipment log onWhen the wireless network or the identification information of access terminals is when history access device list, and it is defeated not need userEnter key, though forget key perhaps wrong cipher key perhaps because access terminals factory reset cause key lose or, also can be normal in the case that key is replaced, quickly, wireless network is efficiently connected to according to target cipher key.
In addition, target cipher key of the present invention is automatically added in authentication frame, do not need to user's inquiry for net equipmentThe target cipher key for asking wireless network reduces the leakage of the target cipher key of wireless network, reduces loiter network probability, promotes user radio netThe experience of network access.
Fourth embodiment of the invention, the present embodiment be above-mentioned first to third any embodiment optimal enforcement example, and it is upperIt states first to compare to third any embodiment, the improvement is that, when the mesh of the wireless network for updating transmitting for net equipmentWhen marking key, the probing response frame with updated target cipher key is generated and sent to corresponding access terminals.
Specifically, if the key of the wireless network setting for net equipment, any access terminals require key authenticationIt can log in, the access terminals having logged on once have forgotten network or factory reset, that just will appear needs againThe problem of inputting key.If wireless network can be accessed not encrypting, safety not can guarantee, and the present invention is updated when for net equipmentWhen the target cipher key of the wireless network of transmitting, the probing response frame with updated target cipher key is generated and sent for net equipmentTo access terminals so that the access terminals of the logged wireless network for the transmitting of net equipment log on the wireless network whenWait, though without key perhaps wrong cipher key perhaps because access terminals factory reset cause key lose or key more, also can be normal in the case where changing, quickly, the secondary connection nothing inputted without key is efficiently carried out according to updated target cipher keyThe purpose of gauze network, the access terminals for simplifying the logged wireless network for the transmitting of net equipment log on the stream of the wireless networkJourney reduces the number of the repeated multiple times input key of user, promotes the network connection usage experience of user.
Fifth embodiment of the invention, as shown in Fig. 2, it is a kind of for net equipment, including:
Communication module 100 obtains the probe request with identification code of access terminals broadcast transmission;The identification code isThe identification information of the access terminals of request access wireless network;
First judgment module 200, judges whether the identification code belongs to default white list;The default white list storesThe identification information of access terminals identical with the identification information for network termination;
Generation module 300 generates the probing response frame for having target cipher key when identification code belongs to default white list;
The communication module 100, the also probing response frame described in transmission with target cipher key to corresponding access terminals, andReceive the authentication frame with target cipher key that access terminals return;
Processing module 400, verifies the target cipher key in authentication frame, and certification allows the access terminals to be connected to when passing throughThe wireless network currently emitted for net equipment.
Specifically, the present embodiment is the corresponding Installation practice of above method embodiment, specific effect is referring to above-mentioned firstEmbodiment, this is no longer going to repeat them.
Sixth embodiment of the invention, it is and upper as shown in figure 3, the present embodiment is the optimal enforcement example of above-mentioned 5th embodimentIt states the 5th embodiment to compare, thes improvement is that, further include:
Generation module 500300 is added, adds several identification codes in the custom field in broadcast management frame, is generatedBroadcast management frame with several identification codes;
The communication module 100 also has the broadcast management frame of several identification codes described in broadcast transmission;
Second judgment module 600 judges identification code and institute in the current probe request of the acquisition of communication module 100State whether the identification code in broadcast management frame matches;
Control module 700, if retaining the current probe request when matching, so as to the first judgment module 200 afterContinuous judgement;If mismatch, ignore the current probe request, the lower probe request of switching judging.
Specifically, the present embodiment is the corresponding Installation practice of above method embodiment, specific effect is referring to above-mentioned secondEmbodiment, this is no longer going to repeat them.
Seventh embodiment of the invention, the present embodiment are the optimal enforcement examples of above-mentioned 5th embodiment, are implemented with the above-mentioned 5thExample is compared, and is theed improvement is that, is further included:Programming module, by default white list programming into ROM.
Specifically, the present embodiment is the corresponding Installation practice of above method embodiment, specific effect is referring to above-mentioned thirdEmbodiment, this is no longer going to repeat them.
Eighth embodiment of the invention, the present embodiment are the optimal enforcement examples of above-mentioned 5th to the 7th any embodiment, and upperIt states the 5th to the 7th any embodiment to compare, thes improvement is that, further include:
Module is obtained, the updated target cipher key of wireless network of transmitting is obtained;
The generation module 300 generates the spy for having updated target cipher key when identification code belongs to default white listSurvey response frame.
Specifically, the present embodiment is the corresponding Installation practice of above method embodiment, specific effect is referring to the above-mentioned 4thEmbodiment, this is no longer going to repeat them.
Ninth embodiment of the invention, as shown in figure 4, a kind of fast speed access systems of wireless network, including:Access terminals 1With for net equipment 2:
The access terminals 1, the probe request with identification code for broadcast transmission;The identification code is that request connectsEnter the identification information of the access terminals 1 of wireless network;Also receive the detection sound with target cipher key sent for net equipment 2Frame is answered, the authentication frame with target cipher key is generated and sent to described for net equipment 2 according to the probing response frame;
It is described for net equipment 2, for obtaining the probe request with identification code of 1 broadcast transmission of access terminals;Judge whether the identification code belongs to default white list;The default white list stores identical as the identification information for network terminationAccess terminals 1 identification information;When identification code belongs to default white list, generates and sends the detection with target cipher key and ringAnswer frame to corresponding access terminals 1;The authentication frame with target cipher key that the access terminals 1 return is received, body is verifiedTarget cipher key in part authentication frame, certification allow the access terminals 1 to be connected to the nothing currently emitted for net equipment 2 when passing throughGauze network.
Specifically, the present embodiment is the corresponding system embodiment of above method embodiment, specific effect is referring to above-mentioned firstEmbodiment, this is no longer going to repeat them.
Tenth embodiment of the invention, the present embodiment are the optimal enforcement examples of above-mentioned 6th to the 9th any embodiment, and upperIt states first embodiment to compare, the improvement is that:
It is described to be also used to add several identification codes in the custom field in broadcast management frame for net equipment 2, it generatesAfter broadcast management frame with several identification codes, the broadcast management frame of several identification codes is had described in broadcast transmission, is being obtainedAfter the probe request with identification code for getting 1 broadcast transmission of access terminals, working as the acquisition of communication module 100 is judgedWhether the identification code in preceding probe request matches with the identification code in the broadcast management frame;If when matching, working as described in reservationPreceding probe request, so that subsequent judgement certification control sends the wireless of the corresponding access terminals 1 of the current probe requestNetwork insertion situation;If mismatch, ignore the current probe request, to judge next probe request.
Specifically, the present embodiment is the corresponding system embodiment of above method embodiment, specific effect is referring to above-mentioned secondEmbodiment, this is no longer going to repeat them.
Illustratively, increase some information inside original frame structure for net equipment 2 and the needs of access terminals 1, specificallyFor:
1. the SA inside broadcast management frame, that is, beacon frame (Beacon frame) and Probe Request (probe request)The information such as MAC Address, host name of clear terminal in (source address) field.
2. increasing target cipher key inside probe Response (probing response frame).
In practical interactive process, the two kinds of access terminals 1 that can quickly connect and cannot quickly connect are distinguished,Detailed process is as follows:
Scan phase
AP (router) send Beacon broadcast management frame, access terminals 1 scanning to the MAC in the informationThe related identification informations such as hostname
Link authentication and association phase
(2) STA (access terminals 1) sends Probe Request (probe request) to the SSID for having related identification information
(3) AP reads SA (the source address word inside Probe Request (probe request) when link authenticationInformation in section inside the information such as MAC and host name and database compares, and judgement is all to support quickly connection, if do not hadThere is relevant information not support then, walk (4) -1 process, if there is relevant information then indicates to support quickly to connect, walks (4) -2 process.
(4) -1STA requests AP to carry out authentication frame (Authentication), wherein needing to be manually entered key
(5) -1AP responds to authentication frame (Authentication) request of STA
(6) -1STA sends connection (Association) request to AP
(7) -1AP responds connection (Association) request
Process is quickly accessed, any manually input is not necessarily to
(4) increase target cipher key inside -2probe Response (probing response frame), return to STA
(5) the authentication frame (Authentication) of -2STA adds target cipher key automatically, and requests that (this operation will be strongSystem updates the target cipher key inside former authentication frame)
(6) -2AP responds to authentication frame (Authentication) request of STA
(7) -2STA sends connection (Association) request to AP
(8) AP responds connection (Association) request
It disconnects if necessary, then carries out the 9th step
(9) STA disconnects (Disassociation) to AP request
It should be noted that above-described embodiment can be freely combined as needed.The above is only of the invention preferredEmbodiment, it is noted that for those skilled in the art, in the premise for not departing from the principle of the inventionUnder, several improvements and modifications can also be made, these modifications and embellishments should also be considered as the scope of protection of the present invention.