CN114189859B - Processing method and device of configuration information, storage medium and electronic equipment - Google Patents
Processing method and device of configuration information, storage medium and electronic equipment Download PDFInfo
- Publication number
- CN114189859B CN114189859B CN202111543627.8A CN202111543627A CN114189859B CN 114189859 B CN114189859 B CN 114189859B CN 202111543627 A CN202111543627 A CN 202111543627A CN 114189859 B CN114189859 B CN 114189859B
- Authority
- CN
- China
- Prior art keywords
- configuration information
- access point
- terminal
- terminal equipment
- target
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000003672 processing method Methods 0.000 title abstract description 12
- 238000000034 method Methods 0.000 claims abstract description 72
- 238000012545 processing Methods 0.000 claims description 51
- 230000004048 modification Effects 0.000 claims description 8
- 238000012986 modification Methods 0.000 claims description 8
- 238000004590 computer program Methods 0.000 claims description 3
- 238000004891 communication Methods 0.000 abstract description 15
- 238000010992 reflux Methods 0.000 abstract description 4
- 238000013478 data encryption standard Methods 0.000 description 24
- 238000012423 maintenance Methods 0.000 description 17
- 230000010365 information processing Effects 0.000 description 9
- 238000010586 diagram Methods 0.000 description 8
- 230000008859 change Effects 0.000 description 5
- 230000001960 triggered effect Effects 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 4
- 238000009792 diffusion process Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 238000012795 verification Methods 0.000 description 3
- 230000006978 adaptation Effects 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 239000013307 optical fiber Substances 0.000 description 2
- 230000000644 propagated effect Effects 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 239000008186 active pharmaceutical agent Substances 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000004069 differentiation Effects 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000008092 positive effect Effects 0.000 description 1
- 230000003252 repetitive effect Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000007619 statistical method Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0813—Configuration setting characterised by the conditions triggering a change of settings
- H04L41/082—Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/068—Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/02—Arrangements for optimising operational condition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/062—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying encryption of the keys
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The disclosure belongs to the technical field of wireless communication, and relates to a processing method and device of configuration information, a storage medium and electronic equipment. The method comprises the following steps: determining terminal equipment associated with a wireless access point and acquiring original configuration information of the terminal equipment; when the target configuration information is acquired, starting a new access point at the wireless access point by utilizing the target configuration information; and updating the original configuration information of the terminal equipment by utilizing the target configuration information so as to enable the terminal equipment to be associated with the new access point. The method and the device for updating the configuration information of the wireless local area network utilize the target configuration information to update the original configuration information uniformly and automatically, reduce the complexity of changing the wireless access configuration information of the Internet of things equipment and other terminal equipment, facilitate the terminal access flow in household scenes and other scenes, further improve the frequency of updating the configuration information of the wireless local area network, improve the safety of the wireless local area network and improve the reflux degree of users to a certain extent.
Description
Technical Field
The present disclosure relates to the field of wireless communications technologies, and in particular, to a method and an apparatus for processing configuration information, a computer readable storage medium, and an electronic device.
Background
Based on security considerations, the WLAN (Wireless Local Area Network ) should update the wireless information periodically, e.g. change the password or use a new SSID (SERVICE SET IDENTIFIER, service set identification). In IoT (Internet of Things ) scenarios using WLAN, the associated WLAN terminals are again inconvenient to change configuration. Generally, in IoT scenarios, several tens of WLAN terminals can be associated with access under the same WLAN SSID. In setting WLAN access information for IoT devices, because IoT devices generally have no input/output devices, modifications are often required through corresponding APP (Application) coordination, and individual vendors may also need to reset IoT devices.
Currently, reconfiguration is required on each terminal after changing the WLAN password or SSID. These cumbersome steps can reduce the user's willingness to update WLAN radio information periodically, reducing the security of the WLAN network.
In view of this, there is a need in the art to develop a new configuration information processing method and apparatus.
It should be noted that the information disclosed in the above background section is only for enhancing understanding of the background of the present disclosure and thus may include information that does not constitute prior art known to those of ordinary skill in the art.
Disclosure of Invention
The present disclosure aims to provide a configuration information processing method, a configuration information processing device, a computer readable storage medium and an electronic device, so as to overcome, at least to some extent, the technical problems of complicated configuration update and insufficient security caused by the limitations of the related art.
Other features and advantages of the present disclosure will be apparent from the following detailed description, or may be learned in part by the practice of the disclosure.
According to a first aspect of an embodiment of the present invention, there is provided a method for processing configuration information, applied to a wireless access point, the method including:
Determining terminal equipment associated with the wireless access point and acquiring original configuration information of the terminal equipment;
when target configuration information is acquired, starting a new access point at the wireless access point by utilizing the target configuration information;
And updating original configuration information of the terminal equipment by utilizing the target configuration information so as to enable the terminal equipment to be associated with the new access point.
In an exemplary embodiment of the invention, after said determining the terminal device associated with the radio access point, the method further comprises:
When the terminal equipment associated with the wireless access point is in an online state, generating an online terminal list according to the terminal equipment;
and when the terminal equipment associated with the wireless access point is in an offline state, generating an offline terminal list according to the terminal equipment.
In an exemplary embodiment of the invention, the original configuration information comprises an original service set identification and an original password, the target configuration information comprises a target service set identification and a target password,
When the target configuration information is acquired, starting a new access point at the wireless access point by utilizing the target configuration information, including:
When the original password is modified by the target password, starting a new access point at the wireless access point by utilizing the target configuration information;
And when the original service set identifier and the original password are respectively modified by utilizing the target service set identifier and the target password, starting a new access point at the wireless access point by utilizing the target configuration information.
In an exemplary embodiment of the present invention, said updating original configuration information of the terminal device with the target configuration information to associate the terminal device with the new access point includes:
acquiring a random number corresponding to the wireless access point, and encrypting the target configuration information by using the original password and the random number to obtain encrypted configuration information;
And sending the encryption configuration information and the random number to terminal equipment in the online terminal list so that the terminal equipment in the online terminal list associates the new access point according to the target configuration information after decrypting the encryption configuration information.
In an exemplary embodiment of the invention, the method further comprises:
And when the terminal equipment in the online terminal list is successfully associated with the new access point, the terminal equipment in the online terminal list is moved out of the online terminal list.
In an exemplary embodiment of the invention, the method further comprises:
And when the terminal equipment in the online terminal list fails to associate the new access point according to the target configuration information, the encryption configuration information is sent to the terminal equipment in the online terminal list again.
In an exemplary embodiment of the present invention, said updating original configuration information of the terminal device with the target configuration information to associate the terminal device with the new access point includes:
Acquiring an update time limit corresponding to the terminal equipment in the offline terminal list;
when the terminal equipment in the offline terminal list is online in the updating time limit and the old access point corresponding to the new access point is associated by utilizing the original configuration information, acquiring a random number corresponding to the wireless access point;
And encrypting the target configuration information by using the original password and the random number to obtain encrypted configuration information, and sending the encrypted configuration information and the random number to terminal equipment in the offline terminal list so that the terminal equipment in the offline terminal list associates the new access point according to the target configuration information after decrypting the encrypted configuration information.
According to a second aspect of the embodiment of the present invention, there is provided a processing apparatus for configuration information, applied to a wireless access point, including:
a terminal determining module configured to determine a terminal device associated with the wireless access point and obtain original configuration information of the terminal device;
A configuration modification module configured to, when target configuration information is acquired, open a new access point at the wireless access point using the target configuration information;
And the configuration updating module is configured to update the original configuration information of the terminal equipment by using the target configuration information so as to enable the terminal equipment to be associated with the new access point.
According to a third aspect of an embodiment of the present invention, there is provided an electronic apparatus including: a processor and a memory; wherein the memory has stored thereon computer readable instructions which, when executed by the processor, implement the method of processing configuration information in any of the above-described exemplary embodiments.
According to a fourth aspect of embodiments of the present invention, there is provided a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the method of processing configuration information in any of the above-described exemplary embodiments.
As can be seen from the above technical solutions, the method for processing configuration information, the device for processing configuration information, the computer storage medium, and the electronic device according to the exemplary embodiments of the present disclosure have at least the following advantages and positive effects:
in the method and the device provided by the exemplary embodiment of the disclosure, the original configuration information is uniformly and automatically updated by utilizing the target configuration information, so that the complexity of changing the wireless access configuration information by the Internet of things equipment and other terminal equipment is reduced, the terminal access flow in household scenes and other scenes is facilitated, the frequency of updating the configuration information by the wireless local area network is further improved, the safety of the wireless local area network is improved, and the reflux degree of a user is improved to a certain extent.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description, serve to explain the principles of the disclosure. It will be apparent to those of ordinary skill in the art that the drawings in the following description are merely examples of the disclosure and that other drawings may be derived from them without undue effort.
Fig. 1 schematically illustrates a flowchart of a method for processing configuration information in an exemplary embodiment of the present disclosure;
fig. 2 schematically illustrates a flow diagram of a method of generating a terminal list in an exemplary embodiment of the present disclosure;
Fig. 3 schematically illustrates a flow diagram of two methods of opening a new access point in an exemplary embodiment of the present disclosure;
Fig. 4 schematically illustrates a flowchart of a method for performing configuration update on a terminal device in an online terminal list in an exemplary embodiment of the present disclosure;
fig. 5 schematically illustrates a flowchart of a method for performing configuration update on a terminal device in an offline terminal list in an exemplary embodiment of the present disclosure;
Fig. 6 schematically illustrates a flow chart of a terminal maintenance flow in an application scenario in an exemplary embodiment of the present disclosure;
FIG. 7 schematically illustrates a flow diagram of an overall flow of updating a configuration in an application scenario in an exemplary embodiment of the present disclosure;
Fig. 8 schematically illustrates a flowchart of a method for performing configuration update on a terminal device in an online terminal list in an application scenario in an exemplary embodiment of the present disclosure;
Fig. 9 schematically illustrates a flowchart of a method for performing configuration update on a terminal device in an offline terminal list in an application scenario in an exemplary embodiment of the present disclosure;
Fig. 10 schematically illustrates a structural diagram of a processing apparatus of configuration information in an exemplary embodiment of the present disclosure;
FIG. 11 schematically illustrates an electronic device for implementing a processing method of configuration information in an exemplary embodiment of the present disclosure;
Fig. 12 schematically illustrates a computer-readable storage medium for implementing a processing method of configuration information in an exemplary embodiment of the present disclosure.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. However, the exemplary embodiments may be embodied in many forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to give a thorough understanding of embodiments of the present disclosure. One skilled in the relevant art will recognize, however, that the aspects of the disclosure may be practiced without one or more of the specific details, or with other methods, components, devices, steps, etc. In other instances, well-known technical solutions have not been shown or described in detail to avoid obscuring aspects of the present disclosure.
The terms "a," "an," "the," and "said" are used in this specification to denote the presence of one or more elements/components/etc.; the terms "comprising" and "having" are intended to be inclusive and mean that there may be additional elements/components/etc. in addition to the listed elements/components/etc.; the terms "first" and "second" and the like are used merely as labels, and are not intended to limit the number of their objects.
Furthermore, the drawings are merely schematic illustrations of the present disclosure and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and thus a repetitive description thereof will be omitted. Some of the block diagrams shown in the figures are functional entities and do not necessarily correspond to physically or logically separate entities.
There are two methods of updating configuration information of a wireless local area network in the related art. One is to change the terminal password by NFC (NEAR FIELD Communication) contact mode, and the other is to have no configuration input access hotspot by WPS (Wi-Fi Protected Setup, wi-Fi protection setup) and PBC (Push Button Configuration, button configuration) modes.
The first method can update the password by replacing the password of the terminal in an NFC contact mode in an offline mode, and the NFC card with new configuration information and the terminal with NFC function need to be updated.
The second way to use WPS and PBC without configuration input access hotspots may be to obtain configuration by WPS plus key.
Both the two modes need to perform configuration updating operation one by one at the terminal equipment after the wireless access point updates the access configuration information.
However, the first method of replacing the terminal password by NFC contact is to wirelessly send the encrypted password message of the old password, and the response message is encrypted by the new password, which also requires modification of the flow of the 802.11 protocol (802.11 wireless network standard), so that the security is not sufficient.
The WPS and PBC modes are used for transmitting the WiFi password encrypted by the connection state terminal MAC (MEDIA ACCESS Control Address) in a broadcast and multicast mode without configuration input access hot spot mode, the media access Control Address is also called a local area network Address, an Ethernet Address (ETHERNET ADDRESS) or a physical Address, and the terminal uses the MAC to decrypt and then replaces the original WiFi password.
In the second way, since the MAC of the target STA is used for encryption, a different data packet needs to be sent for each terminal, which increases the overhead of the air interface. Moreover, since the target MAC encryption is adopted, the transmitted protocol frame will have the target MAC, so that the security is poor.
In view of the problems in the related art, the present disclosure proposes a method for processing configuration information, which is applied to a wireless access point. Fig. 1 shows a flowchart of a method for processing configuration information, and as shown in fig. 1, the method for processing configuration information at least includes the following steps:
s110, determining terminal equipment associated with the wireless access point, and acquiring original configuration information of the terminal equipment.
And S120, when the target configuration information is acquired, starting a new access point at the wireless access point by utilizing the target configuration information.
And S130, updating original configuration information of the terminal equipment by utilizing the target configuration information so as to enable the terminal equipment to be associated with a new access point.
In the exemplary embodiment of the disclosure, the original configuration information is automatically updated uniformly by utilizing the target configuration information, so that the complexity of changing the wireless access configuration information by the Internet of things equipment and other terminal equipment is reduced, the terminal access flow in home scenes and other scenes is facilitated, the frequency of updating the configuration information by the wireless local area network is further improved, the safety of the wireless local area network is improved, and the reflux degree of a user is improved to a certain extent.
The respective steps of the configuration information processing method are described in detail below.
In step S110, a terminal device associated with the wireless access point is determined, and original configuration information of the terminal device is acquired.
In an exemplary embodiment of the present disclosure, a wireless access Point (AP, wireless Access Point) is one typical application of a wireless local area network. The wireless AP is a bridge for communication between a wireless network and a wired network, and is a core device for constructing a wireless lan.
Wireless access points are primarily intended to provide mutual access between a wireless workstation and a wired local area network. Thus, wireless stations within the signal coverage of an AP can communicate with each other through it, and a WLAN that is truly Internet-accessible cannot be established without the AP. The AP in the WLAN corresponds to the role of the transmitting base station in the mobile communication network.
In a wireless network, an AP acts as a hub of a wired network, which is able to connect individual wireless clients. The network card used by the wireless client is a wireless network card, and the transmission medium is air (electromagnetic wave).
Logically, a wireless access point is the center point of a wireless unit. All wireless signals within the unit are exchanged through it. An AP is an indispensable device in the basic mode of a wireless lan, and although a wireless lan in a point-to-point mode can be formed using only a wireless network card without using an AP, such a wireless lan is somewhat special and is only suitable for temporary wireless connection.
After the AP is used, not only can permanent wireless connection service be obtained, but also the user can be managed in a centralized way, and the security of the wireless network is greatly improved.
In colloquial terms, wireless APs are the bridge for communication between wireless networks and wired networks. Because the coverage area of the wireless AP is a circular area that extends outward, the wireless AP should be placed in the center of the wireless network as much as possible, and the linear distance between each wireless client and the wireless AP should preferably not exceed 30m, so as to avoid communication failure caused by excessive attenuation of communication signals.
And WLANs consist primarily of Stations (STAs), access points, wireless mediums and distributed systems (Distribution System, DS). The STA is generally a client in the WLAN, and may be a computer equipped with a wireless network card, or may be a smart phone with a WiFi module, which is not limited in this exemplary embodiment. The STA may be mobile or fixed, and is the most basic component of a wireless local area network.
Therefore, the terminal equipment associated with the wireless access point is the terminal equipment in the wireless local area network.
After determining the terminal device associated with the wireless access point, a corresponding terminal list may be generated based on whether the terminal device is online.
In an alternative embodiment, fig. 2 shows a flow diagram of a method of generating a terminal list, as shown in fig. 2, the method at least comprising the steps of: in step S210, when the terminal device associated with the wireless access point is in an online state, an online terminal list is generated according to the terminal device.
When the terminal device is associated with the wireless access point, the terminal list maintenance module on the side of the wireless access point can perform online and offline terminal list maintenance.
When it is checked that a terminal device associated with a wireless access point is online, the terminal device is added to the online terminal list.
In step S220, when the terminal device associated with the wireless access point is in an offline state, an offline terminal list is generated according to the terminal device.
When the terminal device is associated with the wireless access point, the terminal list maintenance module on the side of the wireless access point can perform online and offline terminal list maintenance.
When it is checked that the terminal device associated with the wireless access point is not online, i.e. offline, the terminal device is added to the offline terminal list. The offline terminal list may be a history list.
In the present exemplary embodiment, a corresponding terminal list may be generated according to the online status of the terminal device associated with the wireless access point, and the generating manner is simple and accurate, and can reflect the current status of the terminal device, thereby providing a differentiation processing basis for subsequently updating the configuration information of the terminal devices of different groups.
After the online terminal list and the offline terminal list are generated according to the terminal device, the original configuration information of the terminal device in the online terminal list and the offline terminal list can be obtained. The original configuration information is the configuration information of the wireless access point associated with the terminal equipment.
In step S120, when the target configuration information is acquired, a new access point is started at the wireless access point using the target configuration information.
In an exemplary embodiment of the present disclosure, when the wireless access point side modifies the original configuration information, a configuration update procedure of the terminal devices in the online terminal list and the offline terminal list may be triggered.
In an alternative embodiment, the original configuration information includes an original service set identification and an original password, and the target configuration information includes a target service set identification and a target password. Fig. 3 shows a flow chart of two methods for opening a new access point, as shown in fig. 3, the method at least comprises the following steps: in step S310, when the original password is modified with the target password, a new access point is opened at the wireless access point using the target configuration information.
Triggering of the configuration update flow of the terminal devices in the online terminal list and the offline terminal list can be achieved in two ways. When the original password is modified by the target password at one side of the wireless access point, the wireless access point can start a new access point by using the newly configured target password.
The new access point is turned on by turning on a new VAP (Virtual Access Point ) according to the new radio configuration.
The virtual access point VAP virtualizes a plurality of APs on a physical entity AP, each virtual AP is a VAP, and each VAP provides the same function as the physical entity AP. A user may create different VAPs on one AP to provide wireless access services for different user groups.
If the original password is modified with only the target password, the new VAP uses the same SSID and a different wireless password. Then the STAs are differentiated by the MAC of the VAP.
The MAC is an address used to identify the location of the network device. In the OSI (Open System Interconnection Reference Model, open systems interconnection communication reference model) model, the third layer network layer is responsible for IP (Internet Protocol ) addresses, and the second layer data link layer is responsible for MAC addresses.
The MAC address is used to uniquely identify a network card in the network, and if one or more network cards exist in a device, each network card needs and has a unique MAC address.
In step S320, when the original service set identifier and the original password are modified by using the target service set identifier and the target password, respectively, a new access point is opened at the wireless access point using the target configuration information.
Triggering of the configuration update flow of the terminal devices in the online terminal list and the offline terminal list can be achieved in two ways. When the original password is modified by the target password at one side of the wireless access point and the original service set identifier is modified by the target service set identifier, the wireless access point can start a new access point by using the newly configured target password.
The SSID technology can divide a wireless local area network into a plurality of sub-networks requiring different identity verification, each sub-network requires independent identity verification, and only users passing the identity verification can enter the corresponding sub-network to prevent unauthorized users from entering the network.
When the original service set identifier is modified by the target service set identifier and the original password is modified by the target password, the wireless access point may use the newly configured target password to open a new access point. And, the new access point is also turned on to turn on a new V AP according to the new radio configuration.
In the present exemplary embodiment, when a new access point is opened according to target configuration information, the new access point may be triggered by two modification modes, and the triggering mode is simple and accurate, and the configuration flow of the wireless access point is attached, so that the practicability is extremely strong.
In step S130, the original configuration information of the terminal device is updated with the target configuration information to associate the terminal device with the new access point.
In an exemplary embodiment of the present disclosure, after the target configuration information is acquired at the wireless access point side, the original configuration information configuring the terminal device may be updated with the target configuration information.
And, since the terminal device maintains an online terminal list and an offline terminal list according to the online state, the configuration information of the terminal device can be updated for different terminal lists.
In an alternative embodiment, fig. 4 shows a flow chart of a method for performing configuration update on terminal devices in an online terminal list, and as shown in fig. 4, the method at least includes the following steps: in step S410, a random number corresponding to the wireless access point is acquired, and the target configuration information is encrypted by using the original password and the random number to obtain encrypted configuration information.
The random number may be generated in real time or may be generated in other manners, which is not particularly limited in the present exemplary embodiment.
After the random number is acquired, the target configuration information may be encrypted using the original password and the random number.
Specifically, the encryption processing of the target configuration information by the original password and the random number may be implemented by a DES (Data Encryption Standard ) encryption algorithm. Among them, the DES algorithm is a block algorithm using key encryption.
For the wireless configuration automatic updating of the terminal equipment in the online terminal list, the AP side adopts a DES encryption algorithm to carry out encryption processing for new target configuration information, the first several bits in the needed 56-bit secret key can be an original password, and the rest bits are a random number, such as an 8-bit original password and a 48-bit random number.
There are three entry parameters of the DES algorithm, key, data, mode respectively. Wherein Key is 7 bytes and 56 bits altogether, and is a working Key of DES algorithm; data is 8 bytes 64 bits, which is Data to be encrypted or decrypted; the Mode is the working Mode of DES, and two modes are respectively encryption or decryption.
Two principles of block cipher design are used in DES design, confusion (confusion) and diffusion (diffusion), respectively, to combat adversary's statistical analysis of the cryptosystem.
Confusion is the complicating as much as possible of the relationship between the statistical properties of the ciphertext and the value of the key, so that the dependencies between the key and the plaintext and ciphertext are not available to cryptanalyzers.
The effect of diffusion is to apply the effect of each plaintext as quickly as possible to more output ciphertext bits to eliminate the statistical structure of the plaintext in a large number of ciphertexts, and to spread the effect of each key as quickly as possible to more ciphertext bits to prevent the key from being broken segment by segment.
The corresponding encryption configuration information can be obtained after DES encryption processing is performed on the target configuration information using the original password and the random number.
In step S420, the encrypted configuration information and the random number are sent to the terminal devices in the online terminal list, so that the terminal devices in the online terminal list associate with the new access point according to the target configuration information after decrypting the encrypted configuration information.
After obtaining the encryption configuration information, the encryption configuration information and the random number may be sent over an air interface to the terminal devices in the online terminal list.
In wireless communication technology, an "air interface" defines the specification of the radio link between a terminal device and a network device, making wireless communication as reliable as wired communication.
After the terminal device in the online terminal list receives the encryption configuration information and the random number, the encryption configuration information can be decrypted by using the original password and the random number to obtain target configuration information. Further, the new access point is associated using the target configuration information.
When the terminal equipment in the online terminal list uses the decrypted target configuration information to successfully associate with the new access point, the terminal equipment can be removed from the online terminal list.
In an alternative embodiment, the terminal devices in the online terminal list are removed from the online terminal list when the terminal devices in the online terminal list are successful in associating with the new access point.
And when the terminal equipment in the online terminal list is successfully associated with the new access point, the terminal equipment in the online terminal list invokes the configuration storage module to store the target configuration information. In addition, the wireless access point marks that STA has completed the configuration update and removes the STA from the list of online terminals.
When the terminal equipment in the online terminal list fails to associate with the new access point by using the decrypted target configuration information, a retransmission mechanism of the wireless access point can be triggered.
In an alternative embodiment, the encrypted configuration information is re-sent to the terminal devices in the online terminal list when the terminal devices in the online terminal list fail to associate with the new access point according to the target configuration information.
When the terminal equipment in the online terminal list fails to associate with the new access point, the STA discards the decrypted target configuration information, and the wireless access point retransmits the encrypted configuration information to the STA.
In the present exemplary embodiment, the target configuration information is sent to the terminal device in the online terminal list after being encrypted, but part of the information for decryption is not transmitted, so that the security of the target configuration information is improved.
For the terminal devices in the offline terminal list, some terminal devices are considered to be temporarily accessed, so that the realization of automatically updating the access configuration of the terminal devices in the offline terminal list can be set and completed, and then the terminal devices are associated with a new access point.
In an alternative embodiment, fig. 5 shows a flow chart of a method for performing configuration update on a terminal device in an offline terminal list, and as shown in fig. 5, the method at least includes the following steps: in step S510, an update time limit corresponding to a terminal device in the offline terminal list is acquired.
The update time limit is the realization of automatically updating the access configuration of the terminal equipment in the set completion offline terminal list. And, the update time limit may be determined in consideration of a sleep period of IoT devices within the network.
For example, when the sleep period of an IoT device within a network is one month, the update time limit may be set to one month.
In step S520, when the terminal device in the offline terminal list is online within the update time limit and the old access point corresponding to the new access point is associated with the original configuration information, the random number corresponding to the wireless access point is acquired.
When the terminal devices in the off-line terminal list are on-line within the update time limit and the old access points are associated by the original configuration information, a random number can be obtained.
The random number may be generated in real time or may be generated in other manners, which is not particularly limited in the present exemplary embodiment.
In step S530, the target configuration information is encrypted by using the original password and the random number to obtain encrypted configuration information, and the encrypted configuration information and the random number are sent to the terminal devices in the offline terminal list, so that the terminal devices in the offline terminal list associate with the new access point according to the target configuration information after decrypting the encrypted configuration information.
After the random number is acquired, the target configuration information may be encrypted using the original password and the random number.
Specifically, the encryption processing of the target configuration information by the original password and the random number may be implemented by a DES encryption algorithm.
The corresponding encryption configuration information can be obtained after DES encryption processing is performed on the target configuration information using the original password and the random number.
After obtaining the encryption configuration information, the encryption configuration information and the random number may be sent to the terminal devices in the offline terminal list through an air interface.
After the terminal device in the offline terminal list receives the encrypted configuration information and the random number, the encrypted configuration information can be decrypted by using the original password and the random number to obtain the target configuration information. Further, the new access point is associated using the target configuration information.
In the present exemplary embodiment, the target configuration information is sent to the terminal device in the offline terminal list after being encrypted, so that the complexity of accessing and maintaining the configuration updated terminal configuration is simplified, the configuration of the terminal device in the offline terminal list is more conveniently updated, and the security of the internet of things system is enhanced.
The following describes a method for processing configuration information in the embodiment of the present disclosure in detail in connection with an application scenario.
In the related art, there are two methods of updating configuration information of a wireless lan. One is to change the terminal password through NFC contact mode, and the other is that WPS and PBC mode do not have configuration input access hotspot.
The first method can update the password in an offline mode by replacing the password of the terminal in an NFC contact mode, and the NFC card with new configuration information and the terminal with NFC function need to be contacted for updating hi.
The second way to use WPS and PBC without configuration input access hotspots may be to obtain configuration by WPS plus key.
Both of the two methods require configuration update operations at the terminal device after the wireless access point updates the access configuration information.
However, the first method of replacing the terminal password by NFC contact is to wirelessly send an encrypted password message of the old password, and the response message is encrypted by the new password, which also requires modification of the flow of the 802.11 protocol. Compared with the method, the method for processing the configuration information does not transmit the password in the air interface, the STA can decrypt the received information to obtain new configuration information, and the security is better.
And the WiFi password encrypted by the MAC of the connection state terminal is transmitted in a broadcast and multicast mode by using the mode of the WPS and the PBC without configuration input access hot spot, and the terminal replaces the original WiFi password after decrypting by using the MAC.
In the second way, since the MAC of the target STA is used for encryption, a different data packet needs to be sent for each terminal, which increases the overhead of the air interface. Moreover, since the target MAC encryption is adopted, the transmitted protocol frame will have the target MAC, so that the security is poor.
Compared with the second hot spot access mode, the configuration information processing method disclosed by the invention adopts a broadcast or multicast mode to transmit the configuration information, so that the air interface overhead is saved. In addition, the air interface transmits the encryption configuration information and the random number, and part of information for decryption is not transmitted on the air interface, so that the security is high.
In addition, the method for processing the configuration information can update the SSID, and the first mode of changing the terminal password through the NFC contact mode and the second mode of using WPS and PBC without configuration input access hotspots cannot be realized.
The processing method of the configuration information in the application scene comprises two main modules which are respectively positioned at the STA side and the AP side.
The main module at one side of the wireless access point comprises a terminal list maintenance module, a WLAN driving module, an encryption and decryption module and a configuration reading module. The main module at the side of the wireless access point can maintain an online terminal list and an offline terminal list. And when updating the original password or SSID configuration, calling the interface of the WLAN driving module to hide the old access point and starting the access point with new configuration information, and encrypting the new target configuration information by using the random number and the original password and transmitting the encrypted configuration information in an air interface.
The main module at one side of the terminal equipment mainly comprises a WLAN driving module, an encryption and decryption module and a configuration storage module. The main module at the terminal device side can receive the encryption configuration information when updating the original password or SSID, and decrypt the encryption configuration information so as to correlate the newly configured access point by using the decrypted target configuration information, and can also store the new target configuration information so as to replace the old configuration information.
Fig. 6 shows a flow diagram of a terminal maintenance flow in an application scenario, where the terminal maintenance flow mainly involves two modules of a wireless access point, namely a terminal list maintenance module and a WLAN driving module, as shown in fig. 6.
After determining the terminal device associated with the wireless access point, a corresponding terminal list may be generated based on whether the terminal device is online.
In step S610, the online terminal list is updated.
And when the terminal equipment of the associated wireless access point is in an online state, generating an online terminal list according to the terminal equipment.
When the terminal device is associated with the wireless access point, the terminal list maintenance module on the side of the wireless access point can perform online and offline terminal list maintenance.
When it is checked that a terminal device associated with a wireless access point is online, the terminal device is added to the online terminal list.
In step S620, it is checked whether the terminal is online.
In step S630, the terminal is put in the history list.
And when the terminal equipment of the associated wireless access point is in an offline state, generating an offline terminal list according to the terminal equipment.
When the terminal device is associated with the wireless access point, the terminal list maintenance module on the side of the wireless access point can perform online and offline terminal list maintenance.
When it is checked that the terminal device associated with the wireless access point is not online, i.e. offline, the terminal device is added to the offline terminal list. The offline terminal list may be a history list.
Fig. 7 is a flow chart showing an overall flow of updating configuration in an application scenario, and as shown in fig. 7, after an online terminal list and an offline terminal list are generated according to terminal devices, original configuration information of the terminal devices in the online terminal list and the offline terminal list may be obtained. The original configuration information is the configuration information of the wireless access point associated with the terminal equipment.
When the wireless access point side modifies the original configuration information, the configuration update flow of the terminal equipment in the online terminal list and the offline terminal list can be triggered.
In step S710, the AP updates the access point configuration.
Triggering of the configuration update flow of the terminal devices in the online terminal list and the offline terminal list can be achieved in two ways.
When the original password is modified by the target password at one side of the wireless access point, the AP updates the password configuration of the access point.
And when the original password is modified at one side of the wireless access point through the target password and the original service set identifier is modified by utilizing the target service set identifier, the AP simultaneously updates the password configuration and the service set identifier configuration of the access point.
In step S720, a newly configured access point is turned on.
When the original password is modified by the target password at the wireless access point side, the wireless access point can start a new access point by using the newly configured target password. The new access point is turned on by turning on a new VAP according to the new radio configuration.
If the original password is modified with only the target password, the new VAP uses the same SSID and a different wireless password. Then the STAs are differentiated by the MAC of the VAP.
When the original password is modified by the target password at one side of the wireless access point and the original service set identifier is modified by the target service set identifier, the wireless access point can use the newly configured target password to open a new access point.
When the original service set identifier is modified by the target service set identifier and the original password is modified by the target password, the wireless access point may use the newly configured target password to open a new access point. And, the new access point is also turned on to turn on a new V AP according to the new radio configuration.
In step S730, the online terminal updates the access configuration.
And acquiring a random number corresponding to the wireless access point, and encrypting the target configuration information by using the original password and the random number to obtain the encrypted configuration information.
The random number may be generated in real time or may be generated in other manners, which is not particularly limited in the present exemplary embodiment.
After the random number is acquired, the target configuration information may be encrypted using the original password and the random number.
Specifically, the encryption processing of the target configuration information by the original password and the random number may be implemented by a DES encryption algorithm.
For the wireless configuration automatic updating of the terminal equipment in the online terminal list, the AP side adopts a DES encryption algorithm to carry out encryption processing for new target configuration information, the first several bits in the needed 56-bit secret key can be an original password, and the rest bits are a random number, such as an 8-bit original password and a 48-bit random number.
The corresponding encryption configuration information can be obtained after DES encryption processing is performed on the target configuration information using the original password and the random number.
And sending the encryption configuration information and the random number to the terminal equipment in the online terminal list so that the terminal equipment in the online terminal list associates with the new access point according to the target configuration information after decrypting the encryption configuration information.
After obtaining the encryption configuration information, the encryption configuration information and the random number may be sent to the terminal devices in the online terminal list over the air interface.
In wireless communication technology, an "air interface" defines the specification of the radio link between a terminal device and a network device, making wireless communication as reliable as wired communication.
After the terminal device in the online terminal list receives the encryption configuration information and the random number, the encryption configuration information can be decrypted by using the original password and the random number to obtain target configuration information. Further, the new access point is associated using the target configuration information.
And when the terminal equipment in the online terminal list is successfully associated with the new access point, the terminal equipment in the online terminal list is removed from the online terminal list.
And when the terminal equipment in the online terminal list is successfully associated with the new access point, the terminal equipment in the online terminal list invokes the configuration storage module to store the target configuration information. In addition, the wireless access point marks that STA has completed the configuration update and removes the STA from the list of online terminals.
And when the terminal equipment in the online terminal list fails to associate with the new access point according to the target configuration information, the encryption configuration information is sent to the terminal equipment in the online terminal list again.
When the terminal equipment in the online terminal list fails to associate with the new access point, the STA discards the decrypted target configuration information, and the wireless access point retransmits the encrypted configuration information to the STA.
In step S740, the off-line terminal updates the access configuration.
After the terminal device in the online terminal list completes the configuration update, a configuration update flow of the terminal device in the offline terminal list and the like can be entered.
And acquiring an update time limit corresponding to the terminal equipment in the offline terminal list.
The update time limit is the realization of automatically updating the access configuration of the terminal equipment in the set completion offline terminal list. And, the update time limit may be determined in consideration of a sleep period of IoT devices within the network.
And when the terminal equipment in the offline terminal list is online in the updating time limit and the old access point corresponding to the new access point is associated by using the original configuration information, acquiring the random number corresponding to the wireless access point.
When the terminal devices in the off-line terminal list are on-line within the update time limit and the old access points are associated by the original configuration information, a random number can be obtained.
The random number may be generated in real time or may be generated in other manners, which is not particularly limited in the present exemplary embodiment.
And encrypting the target configuration information by using the original password and the random number to obtain encrypted configuration information, and sending the encrypted configuration information and the random number to the terminal equipment in the offline terminal list so that the terminal equipment in the offline terminal list associates with a new access point according to the target configuration information after decrypting the encrypted configuration information.
After the random number is acquired, the target configuration information may be encrypted using the original password and the random number.
Specifically, the encryption processing of the target configuration information by the original password and the random number may be implemented by a DES encryption algorithm.
The corresponding encryption configuration information can be obtained after DES encryption processing is performed on the target configuration information using the original password and the random number.
After obtaining the encryption configuration information, the encryption configuration information and the random number may be sent to the terminal devices in the offline terminal list through an air interface.
After the terminal device in the offline terminal list receives the encrypted configuration information and the random number, the encrypted configuration information can be decrypted by using the original password and the random number to obtain the target configuration information. Further, the new access point is associated using the target configuration information.
In step S750, the old access point is turned off.
After the configuration update of the terminal device in the offline terminal list is completed, the old access point may be closed to complete the overall flow of updating the configuration.
Fig. 8 is a flowchart illustrating a method for performing configuration update on a terminal device in an online terminal list in an application scenario, where, as shown in fig. 8, after target configuration information is acquired at a wireless access point side, original configuration information of the terminal device may be updated by using the target configuration information. And, since the terminal device maintains an online terminal list and an offline terminal list according to the online state, the configuration information of the terminal device can be updated for different terminal lists.
In step S810, the AP transmits configuration information to the STA.
And acquiring a random number corresponding to the wireless access point, and encrypting the target configuration information by using the original password and the random number to obtain the encrypted configuration information.
The random number may be generated in real time or may be generated in other manners, which is not particularly limited in the present exemplary embodiment.
After the random number is acquired, the target configuration information may be encrypted using the original password and the random number.
Specifically, the encryption processing of the target configuration information by the original password and the random number may be implemented by a DES encryption algorithm.
The corresponding encryption configuration information can be obtained after DES encryption processing is performed on the target configuration information using the original password and the random number.
After obtaining the encryption configuration information, the encryption configuration information and the random number may be sent to the terminal devices in the online terminal list over the air interface.
In step S820, the STA receives configuration information.
The terminal devices in the online terminal list may receive the encryption configuration information and the random number.
In step S830, the STA uses the new configuration information association.
After the terminal device in the online terminal list receives the encryption configuration information and the random number, the encryption configuration information can be decrypted by using the original password and the random number to obtain target configuration information. Further, the new access point is associated using the target configuration information.
And when the terminal equipment in the online terminal list is successfully associated with the new access point, the terminal equipment in the online terminal list is removed from the online terminal list.
And when the terminal equipment in the online terminal list is successfully associated with the new access point, the terminal equipment in the online terminal list invokes the configuration storage module to store the target configuration information. In addition, the wireless access point marks that STA has completed the configuration update and removes the STA from the list of online terminals.
When the terminal equipment in the online terminal list fails to associate with the new access point by using the decrypted target configuration information, a retransmission mechanism of the wireless access point can be triggered.
And when the terminal equipment in the online terminal list fails to associate with the new access point according to the target configuration information, the encryption configuration information is sent to the terminal equipment in the online terminal list again.
When the terminal equipment in the online terminal list fails to associate with the new access point, the STA discards the decrypted target configuration information, and the wireless access point retransmits the encrypted configuration information to the STA.
In step S840, it is checked whether the terminal in the online list completes the update.
The AP checks whether the terminal device in the online terminal list completes the configuration update and repeats steps S810-S830 until the online terminal device in the online terminal list is empty.
Fig. 9 is a flow chart illustrating a method for performing configuration update on a terminal device in an offline terminal list in an application scenario, and as shown in fig. 9, when the terminal device in the offline terminal list is online within an update time limit and an old access point corresponding to a new access point is associated with original configuration information, an AP updates configuration information for the terminal device using the online terminal configuration update flow illustrated in fig. 8.
In consideration of that some terminal devices in the offline terminal list are temporarily accessed, the implementation of automatically updating the access configuration of the terminal devices in the offline terminal list can be set and then associated with a new access point.
In step S910, the off-line terminal starts updating the access configuration countdown.
Wherein updating the access configuration countdown is an update time limit. The update time limit is the realization of automatically updating the access configuration of the terminal equipment in the set completion offline terminal list. And, the update time limit may be determined in consideration of a sleep period of IoT devices within the network.
For example, when the sleep period of an IoT device within a network is one month, the update time limit may be set to one month.
In step S920, it is determined whether a time limit has elapsed.
When the update access configuration countdown does not reach the update time limit, indicating that the update time limit is still in the update time limit; when the update access configuration countdown has reached the update time limit, this update time limit is indicated to have been exceeded.
In step S930, it is checked whether the terminal in the history list completes the update.
The AP checks whether the terminal device in the offline terminal list completes the configuration update. When there is also a terminal device in the offline terminal list, it is indicated that the terminals in the history list have not all completed updating.
In step S940, the offline terminal is waited for online.
In step S950, the update configuration is completed using the online terminal update access configuration flow.
When the terminal devices in the off-line terminal list are on-line within the update time limit and the old access points are associated by the original configuration information, a random number can be obtained.
The random number may be generated in real time or may be generated in other manners, which is not particularly limited in the present exemplary embodiment.
And encrypting the target configuration information by using the original password and the random number to obtain encrypted configuration information, and sending the encrypted configuration information and the random number to the terminal equipment in the offline terminal list so that the terminal equipment in the offline terminal list associates with a new access point according to the target configuration information after decrypting the encrypted configuration information.
After the random number is acquired, the target configuration information may be encrypted using the original password and the random number.
Specifically, the encryption processing of the target configuration information by the original password and the random number may be implemented by a DES encryption algorithm.
The corresponding encryption configuration information can be obtained after DES encryption processing is performed on the target configuration information using the original password and the random number.
After obtaining the encryption configuration information, the encryption configuration information and the random number may be sent to the terminal devices in the offline terminal list through an air interface.
After the terminal device in the offline terminal list receives the encrypted configuration information and the random number, the encrypted configuration information can be decrypted by using the original password and the random number to obtain the target configuration information. Further, the new access point is associated using the target configuration information.
Based on this, the AP side may maintain a terminal list, an online terminal list and an offline terminal list, respectively, and update in real time.
And when the terminal equipment of the associated wireless access point is in an online state, generating an online terminal list according to the terminal equipment.
When the terminal device is associated with the wireless access point, the terminal list maintenance module on the side of the wireless access point can perform online and offline terminal list maintenance.
When it is checked that a terminal device associated with a wireless access point is online, the terminal device is added to the online terminal list.
And when the terminal equipment of the associated wireless access point is in an offline state, generating an offline terminal list according to the terminal equipment.
When the terminal device is associated with the wireless access point, the terminal list maintenance module on the side of the wireless access point can perform online and offline terminal list maintenance.
When it is checked that the terminal device associated with the wireless access point is not online, i.e. offline, the terminal device is added to the offline terminal list. The offline terminal list may be a history list.
The wireless access information is modified at the AP side, and the original password may be modified by using the target password, or the original service set identifier and the original password may be modified by using the target service set identifier and the target password, respectively.
The AP side does not directly change the original wireless access point configuration, but starts a new access point according to new target configuration information, and starts a wireless configuration updating flow of terminal equipment in an online terminal list and an offline terminal list. After the wireless configuration automatic update procedure is completed, the old access point is turned off again.
And acquiring a random number corresponding to the wireless access point, and encrypting the target configuration information by using the original password and the random number to obtain the encrypted configuration information.
The random number may be generated in real time or may be generated in other manners, which is not particularly limited in the present exemplary embodiment.
After the random number is acquired, the target configuration information may be encrypted using the original password and the random number.
Specifically, the encryption processing of the target configuration information by the original password and the random number may be implemented by a DES encryption algorithm.
For the wireless configuration automatic updating of the terminal equipment in the online terminal list, the AP side adopts a DES encryption algorithm to carry out encryption processing for new target configuration information, the first several bits in the needed 56-bit secret key can be an original password, and the rest bits are a random number, such as an 8-bit original password and a 48-bit random number.
And then, the random number and the encryption configuration information are multicast and transmitted to the online STA according to the online terminal list. Specifically, the encryption configuration information and the random number are sent to the terminal equipment in the online terminal list through the air interface.
After receiving the random number and the encryption configuration information, the STA in the online terminal list can encrypt the random number and the encryption configuration information by combining with the original password to obtain the target configuration information. Further, the new access point is associated using the target configuration information.
When the terminal equipment in the online terminal list is successfully associated with the new access point, the AP side removes the STA from the online terminal list.
Specifically, the terminal equipment in the online terminal list invokes the configuration storage module to store the target configuration information. In addition, the wireless access point marks that STA has completed the configuration update and removes the STA from the list of online terminals.
And repeating the process until all terminal devices in the online terminal list access the new access point.
And (3) automatically updating the wireless configuration of the terminal equipment in the offline terminal list, and setting an update time limit of offline update. The update time limit is the realization of automatically updating the access configuration of the terminal equipment in the set completion offline terminal list. And, the update time limit may be determined in consideration of a sleep period of IoT devices within the network.
And at the time limit of the update, waiting for the terminal equipment in the offline terminal list to be online.
And when the terminal equipment in the offline terminal list is online in the updating time limit and the old access point corresponding to the new access point is associated by using the original configuration information, acquiring the random number corresponding to the wireless access point.
When the terminal devices in the off-line terminal list are on-line within the update time limit and the old access points are associated by the original configuration information, a random number can be obtained.
The random number may be generated in real time or may be generated in other manners, which is not particularly limited in the present exemplary embodiment.
And encrypting the target configuration information by using the original password and the random number to obtain encrypted configuration information, and sending the encrypted configuration information and the random number to the terminal equipment in the offline terminal list so that the terminal equipment in the offline terminal list associates with a new access point according to the target configuration information after decrypting the encrypted configuration information.
After the random number is acquired, the target configuration information may be encrypted using the original password and the random number.
Specifically, the encryption processing of the target configuration information by the original password and the random number may be implemented by a DES encryption algorithm.
The corresponding encryption configuration information can be obtained after DES encryption processing is performed on the target configuration information using the original password and the random number.
After obtaining the encryption configuration information, the encryption configuration information and the random number may be sent point-to-point to the terminal devices in the offline terminal list through an air interface.
After the terminal device in the offline terminal list receives the encrypted configuration information and the random number, the encrypted configuration information can be decrypted by using the original password and the random number to obtain the target configuration information. Further, the new access point is associated using the target configuration information.
After the terminal device in the offline terminal list is successfully associated with the new access point, the AP side may remove the terminal device from the offline terminal list. And repeating the process until the terminal equipment in the off-line terminal list is accessed to the new access point or the update time limit of off-line update is reached.
When a terminal device in the off-line terminal list reaches or exceeds the update time limit, it is necessary to manually associate the terminal device to the new access point.
The method for processing the configuration information in the application scenario includes different processes applicable to the online terminal and the offline terminal, so that the method is applicable to the internet of things scenario, and is also applicable to ordinary families or other conventional scenarios, and the exemplary embodiment is not particularly limited thereto.
When the processing method of the configuration information in the application scene is applied to the home WLAN scene, the configuration information of the wireless access configuration can be automatically updated, the complexity of updating the configuration information of the wireless access by the Internet of things equipment is reduced, the terminal access of old people and children in the home WLAN scene is facilitated, the frequency of changing the password of the WLAN network is improved, and the security of the WLAN network in the home scene is also improved.
According to the method for processing the configuration information in the application scene, the original configuration information is uniformly and automatically updated by utilizing the target configuration information, the complexity of changing the wireless access configuration information by the Internet of things equipment and other terminal equipment is reduced, the terminal access flow in the home scene and other scenes is facilitated, the frequency of updating the configuration information by the wireless local area network is further improved, the safety of the wireless local area network is improved, and the reflux degree of a user is improved to a certain extent.
Fig. 10 shows a schematic structural diagram of a configuration information processing apparatus, and as shown in fig. 10, the configuration information processing apparatus 1000 may include: a terminal determination module 1010, a configuration modification module 1020, and a configuration update module 1030. Wherein:
A terminal determining module 1010 configured to determine a terminal device associated with the wireless access point and obtain original configuration information of the terminal device;
A configuration modification module 1020 configured to, when target configuration information is obtained, open a new access point at the wireless access point using the target configuration information;
a configuration updating module 1030 is configured to update original configuration information of the terminal device with the target configuration information, so as to associate the terminal device with the new access point.
In an exemplary embodiment of the invention, after said determining the terminal device associated with the radio access point, the method further comprises:
When the terminal equipment associated with the wireless access point is in an online state, generating an online terminal list according to the terminal equipment;
and when the terminal equipment associated with the wireless access point is in an offline state, generating an offline terminal list according to the terminal equipment.
In an exemplary embodiment of the invention, the original configuration information comprises an original service set identification and an original password, the target configuration information comprises a target service set identification and a target password,
When the target configuration information is acquired, starting a new access point at the wireless access point by utilizing the target configuration information, including:
When the original password is modified by the target password, starting a new access point at the wireless access point by utilizing the target configuration information;
And when the original service set identifier and the original password are respectively modified by utilizing the target service set identifier and the target password, starting a new access point at the wireless access point by utilizing the target configuration information.
In an exemplary embodiment of the present invention, said updating original configuration information of the terminal device with the target configuration information to associate the terminal device with the new access point includes:
acquiring a random number corresponding to the wireless access point, and encrypting the target configuration information by using the original password and the random number to obtain encrypted configuration information;
And sending the encryption configuration information and the random number to terminal equipment in the online terminal list so that the terminal equipment in the online terminal list associates the new access point according to the target configuration information after decrypting the encryption configuration information.
In an exemplary embodiment of the invention, the method further comprises:
And when the terminal equipment in the online terminal list is successfully associated with the new access point, the terminal equipment in the online terminal list is moved out of the online terminal list.
In an exemplary embodiment of the invention, the method further comprises:
And when the terminal equipment in the online terminal list fails to associate the new access point according to the target configuration information, the encryption configuration information is sent to the terminal equipment in the online terminal list again.
In an exemplary embodiment of the present invention, said updating original configuration information of the terminal device with the target configuration information to associate the terminal device with the new access point includes:
Acquiring an update time limit corresponding to the terminal equipment in the offline terminal list;
when the terminal equipment in the offline terminal list is online in the updating time limit and the old access point corresponding to the new access point is associated by utilizing the original configuration information, acquiring a random number corresponding to the wireless access point;
And encrypting the target configuration information by using the original password and the random number to obtain encrypted configuration information, and sending the encrypted configuration information and the random number to terminal equipment in the offline terminal list so that the terminal equipment in the offline terminal list associates the new access point according to the target configuration information after decrypting the encrypted configuration information.
The specific details of the configuration information processing apparatus 1000 are described in detail in the corresponding configuration information processing method, and thus are not described herein.
It should be noted that although several modules or units of the processing apparatus 1000 of configuration information are mentioned in the above detailed description, such division is not mandatory. Indeed, the features and functionality of two or more modules or units described above may be embodied in one module or unit in accordance with embodiments of the present disclosure. Conversely, the features and functions of one module or unit described above may be further divided into a plurality of modules or units to be embodied.
In addition, in an exemplary embodiment of the present disclosure, an electronic device capable of implementing the above method is also provided.
An electronic device 1100 according to such an embodiment of the invention is described below with reference to fig. 11. The electronic device 1100 shown in fig. 11 is merely an example, and should not be construed as limiting the functionality and scope of use of embodiments of the present invention.
As shown in fig. 11, the electronic device 1100 is embodied in the form of a general purpose computing device. Components of electronic device 1100 may include, but are not limited to: the at least one processing unit 1110, the at least one memory unit 1120, a bus 1130 connecting the different system components (including the memory unit 1120 and the processing unit 1110), and a display unit 1140.
Wherein the storage unit stores program code that is executable by the processing unit 1110 such that the processing unit 1110 performs steps according to various exemplary embodiments of the present invention described in the above-described "exemplary methods" section of the present specification.
The storage unit 1120 may include a readable medium in the form of a volatile storage unit, such as a Random Access Memory (RAM) 1121 and/or a cache memory 1122, and may further include a Read Only Memory (ROM) 1123.
Storage unit 1120 may also include a program/utility 1124 having a set (at least one) of program modules 1125, such program modules 1125 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each or some combination of which may include an implementation of a network environment.
The bus 1130 may be a local bus representing one or more of several types of bus structures, including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or a bus using any of a variety of bus architectures.
The electronic device 1100 may also communicate with one or more external devices 1300 (e.g., keyboard, pointing device, bluetooth device, etc.), one or more devices that enable a user to interact with the electronic device 1100, and/or any device (e.g., router, modem, etc.) that enables the electronic device 1100 to communicate with one or more other computing devices. Such communication may occur through an input/output (I/O) interface 1150. Also, electronic device 1100 can communicate with one or more networks such as a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the Internet, through network adapter 1160. As shown, network adapter 1160 communicates with other modules of electronic device 1100 via bus 1130. It should be appreciated that although not shown, other hardware and/or software modules may be used in connection with electronic device 1100, including, but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, data backup storage systems, and the like.
From the above description of embodiments, those skilled in the art will readily appreciate that the example embodiments described herein may be implemented in software, or in combination with the necessary hardware. Thus, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (may be a CD-ROM, a U-disk, a mobile hard disk, etc.) or on a network, and includes several instructions to cause a computing device (may be a personal computer, a server, a terminal device, or a network device, etc.) to perform the method according to the embodiments of the present disclosure.
In an exemplary embodiment of the present disclosure, a computer-readable storage medium having stored thereon a program product capable of implementing the method described above in the present specification is also provided. In some possible embodiments, the various aspects of the invention may also be implemented in the form of a program product comprising program code for causing a terminal device to carry out the steps according to the various exemplary embodiments of the invention as described in the "exemplary methods" section of this specification, when said program product is run on the terminal device.
Referring to fig. 12, a program product 1200 for implementing the above-described method according to an embodiment of the present invention is described, which may employ a portable compact disc read only memory (CD-ROM) and include program code, and may be run on a terminal device, such as a personal computer. However, the program product of the present invention is not limited thereto, and in this document, a readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The program product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. The readable storage medium can be, for example, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium would include the following: an electrical connection having one or more wires, a portable disk, a hard disk, random Access Memory (RAM), read-only memory (ROM), erasable programmable read-only memory (EPROM or flash memory), optical fiber, portable compact disk read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The computer readable signal medium may include a data signal propagated in baseband or as part of a carrier wave with readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A readable signal medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of remote computing devices, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., connected via the Internet using an Internet service provider).
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any adaptations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
Claims (8)
1. A method for processing configuration information, applied to a wireless access point, the method comprising:
Determining terminal equipment associated with the wireless access point and acquiring original configuration information of the terminal equipment;
when target configuration information is acquired, starting a new access point at the wireless access point by utilizing the target configuration information;
Updating original configuration information of the terminal equipment by utilizing the target configuration information so as to enable the terminal equipment to be associated with the new access point and close an old access point; the terminal equipment is the terminal equipment of an online terminal list and an offline terminal list;
Wherein updating original configuration information of the terminal device with the target configuration information to enable the terminal device to associate with the new access point comprises:
Acquiring a random number corresponding to a wireless access point from terminal equipment in an online terminal list;
acquiring an update time limit corresponding to terminal equipment in an offline terminal list for the terminal equipment in the offline terminal list; when the terminal equipment in the offline terminal list is online in the updating time limit and the old access point corresponding to the new access point is associated by utilizing the original configuration information, acquiring a random number corresponding to the wireless access point;
And encrypting the target configuration information by using an original password and the random number to obtain encrypted configuration information, and sending the encrypted configuration information and the random number to terminal equipment in the online terminal list or the offline terminal list so that the terminal equipment associates the new access point according to the target configuration information after decrypting the encrypted configuration information.
2. The method of processing configuration information according to claim 1, wherein after said determining a terminal device associated with said wireless access point, said method further comprises:
When the terminal equipment associated with the wireless access point is in an online state, generating an online terminal list according to the terminal equipment;
and when the terminal equipment associated with the wireless access point is in an offline state, generating an offline terminal list according to the terminal equipment.
3. The method for processing configuration information according to claim 2, wherein the original configuration information includes an original service set identifier and an original password, the target configuration information includes a target service set identifier and a target password,
When the target configuration information is acquired, starting a new access point at the wireless access point by utilizing the target configuration information, including:
When the original password is modified by the target password, starting a new access point at the wireless access point by utilizing the target configuration information;
And when the original service set identifier and the original password are respectively modified by utilizing the target service set identifier and the target password, starting a new access point at the wireless access point by utilizing the target configuration information.
4. A method of processing configuration information according to claim 3, characterized in that the method further comprises:
And when the terminal equipment in the online terminal list is successfully associated with the new access point, the terminal equipment in the online terminal list is moved out of the online terminal list.
5. A method of processing configuration information according to claim 3, characterized in that the method further comprises:
And when the terminal equipment in the online terminal list fails to associate the new access point according to the target configuration information, the encryption configuration information is sent to the terminal equipment in the online terminal list again.
6. A processing apparatus for configuration information, applied to a wireless access point, comprising:
a terminal determining module configured to determine a terminal device associated with the wireless access point and obtain original configuration information of the terminal device;
A configuration modification module configured to, when target configuration information is acquired, open a new access point at the wireless access point using the target configuration information;
A configuration updating module configured to update original configuration information of the terminal device with the target configuration information, so that the terminal device associates with the new access point and closes an old access point; the terminal equipment is the terminal equipment of an online terminal list and an offline terminal list;
Wherein updating original configuration information of the terminal device with the target configuration information to enable the terminal device to associate with the new access point comprises:
Acquiring a random number corresponding to a wireless access point from terminal equipment in an online terminal list;
acquiring an update time limit corresponding to terminal equipment in an offline terminal list for the terminal equipment in the offline terminal list; when the terminal equipment in the offline terminal list is online in the updating time limit and the old access point corresponding to the new access point is associated by utilizing the original configuration information, acquiring a random number corresponding to the wireless access point;
And encrypting the target configuration information by using an original password and the random number to obtain encrypted configuration information, and sending the encrypted configuration information and the random number to terminal equipment in the online terminal list or the offline terminal list so that the terminal equipment associates the new access point according to the target configuration information after decrypting the encrypted configuration information.
7. A computer-readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the method of processing configuration information according to any one of claims 1-5.
8. An electronic device, comprising:
A processor;
A memory for storing executable instructions of the processor;
Wherein the processor is configured to perform the method of processing configuration information of any of claims 1-5 via execution of the executable instructions.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202111543627.8A CN114189859B (en) | 2021-12-16 | 2021-12-16 | Processing method and device of configuration information, storage medium and electronic equipment |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202111543627.8A CN114189859B (en) | 2021-12-16 | 2021-12-16 | Processing method and device of configuration information, storage medium and electronic equipment |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN114189859A CN114189859A (en) | 2022-03-15 |
| CN114189859B true CN114189859B (en) | 2024-08-06 |
Family
ID=80544184
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202111543627.8A Active CN114189859B (en) | 2021-12-16 | 2021-12-16 | Processing method and device of configuration information, storage medium and electronic equipment |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN114189859B (en) |
Families Citing this family (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN115038101A (en) * | 2022-06-06 | 2022-09-09 | 中国电信股份有限公司 | Network access method and system, access point, terminal and electronic equipment |
| CN115714971B (en) * | 2022-11-17 | 2025-10-21 | 广州鲁邦通物联网科技股份有限公司 | A method for automatically updating a password of a WiFi device using an old password |
| CN116582577A (en) * | 2023-03-22 | 2023-08-11 | 中国电子科技集团公司第五十四研究所 | Group collaborative task-oriented information transmission method |
| CN116760799A (en) * | 2023-05-12 | 2023-09-15 | 成都欧珀通信科技有限公司 | Internet Protocol (IP) address management method and device and routing equipment |
| CN119854894B (en) * | 2024-12-02 | 2025-10-31 | 浙江吉利控股集团有限公司 | A method, apparatus, storage medium, and program product for switching access points (APs) on a vehicle. |
Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN113660661A (en) * | 2020-04-28 | 2021-11-16 | 华为技术有限公司 | Modification method of terminal network configuration and related equipment |
Family Cites Families (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7636338B1 (en) * | 2004-07-09 | 2009-12-22 | Marvell International Ltd. | Access point configuration |
| CN107135529B (en) * | 2017-04-27 | 2020-11-03 | 深圳市友华通信技术有限公司 | Method for realizing automatic connection of AP and STA and synchronizing AP configuration modification |
| CN110460995A (en) * | 2018-05-07 | 2019-11-15 | 中国移动通信有限公司研究院 | A kind of wireless connection method, Internet of Things equipment and client equipment |
| CN111356149A (en) * | 2018-12-24 | 2020-06-30 | 中兴通讯股份有限公司 | A wireless network configuration method and device |
-
2021
- 2021-12-16 CN CN202111543627.8A patent/CN114189859B/en active Active
Patent Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN113660661A (en) * | 2020-04-28 | 2021-11-16 | 华为技术有限公司 | Modification method of terminal network configuration and related equipment |
Also Published As
| Publication number | Publication date |
|---|---|
| CN114189859A (en) | 2022-03-15 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN114189859B (en) | Processing method and device of configuration information, storage medium and electronic equipment | |
| US8208455B2 (en) | Method and system for transporting configuration protocol messages across a distribution system (DS) in a wireless local area network (WLAN) | |
| US11871223B2 (en) | Authentication method and apparatus and device | |
| US8959601B2 (en) | Client configuration during timing window | |
| JP4299102B2 (en) | Wireless network handoff encryption key | |
| EP1484856A1 (en) | The method for distributes the encrypted key in wireless lan | |
| US20090274065A1 (en) | Method and apparatus for setting wireless local area network by using button | |
| JP2019512942A (en) | Authentication mechanism for 5G technology | |
| CN106921963A (en) | A kind of smart machine accesses the method and device of WLAN | |
| WO2009008627A2 (en) | A method of establishing fast security association for handover between heterogeneous radio access networks | |
| US12231900B2 (en) | Communication method and apparatus | |
| WO2003056851A1 (en) | A method for determining encryption algorithm of secret communication based on mobile country codes | |
| CN105636040A (en) | Device networking method and system | |
| EP1760945A2 (en) | Wireless LAN security system and method | |
| EP3637815A1 (en) | Data transmission method, and device and system related thereto | |
| US20110314136A1 (en) | Method and System for Improved Communication Network Setup | |
| JP2010034945A (en) | Communication system, authentication server, and communication method | |
| CN108834143B (en) | Method, terminal and system for network expansion | |
| WO2017101211A1 (en) | Method and apparatus for accessing wireless communication system, and terminal | |
| US20130191635A1 (en) | Wireless authentication terminal | |
| CN106533686B (en) | Encrypted communication method and system, communication unit and client | |
| CN114007214A (en) | Client terminal equipment, network switching method thereof and server | |
| US20250056233A1 (en) | Methods and devices facilitating secure wi-fi pairing | |
| CN116668964A (en) | Equipment distribution network method, device, equipment and storage medium | |
| US20060039305A1 (en) | Method and system for EAP encapsulation exchange for a setup configuration protocol in a WLAN |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |