WO2007045134A1 - A communication system and a communication method - Google Patents
A communication system and a communication method Download PDFInfo
- Publication number
- WO2007045134A1 WO2007045134A1 PCT/CN2006/000476 CN2006000476W WO2007045134A1 WO 2007045134 A1 WO2007045134 A1 WO 2007045134A1 CN 2006000476 W CN2006000476 W CN 2006000476W WO 2007045134 A1 WO2007045134 A1 WO 2007045134A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- connection
- connection request
- information
- response
- communication system
- Prior art date
Links
- 238000004891 communication Methods 0.000 title claims abstract description 45
- 238000000034 method Methods 0.000 title claims abstract description 26
- 239000000523 sample Substances 0.000 claims description 18
- 238000000060 site-specific infrared dichroism spectroscopy Methods 0.000 claims 6
- 230000006855 networking Effects 0.000 description 7
- 238000012790 confirmation Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/16—Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
- H04W28/18—Negotiating wireless communication parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/24—Negotiation of communication capabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
Definitions
- the present invention relates to a communication system and communication method, and more particularly to a communication system and communication method complying with the 802.11 protocol.
- the IBSS (Independent Basic Service Set) mode is defined in the 802.11 protocol, in which multiple STAs (wireless stations) do not need an AP (central network) to directly form an Ad-hoc network (self-organizing network). It is very effective for applications that require temporary networking.
- the current scheme, in the IBSS mode because there is no AP, therefore, no fixed access point or server acts as an access control point for network access, and whether one STA can access an IBSS and with other STAs in the IBSS Communication depends mainly on two factors. One is whether each STA sets the same SSID (Service Set Identifier), and the other is whether each STA has the same encryption method and key set.
- SSID Service Set Identifier
- multiple STAs can form an IBSS network that can communicate with each other.
- the SSID of all the IBSS networks in the area where the STA is located can be obtained through the existing technical solution.
- the encryption method used by each STA in the specific IBSS network can be obtained through the existing technical solutions.
- An encrypted IBSS network is used whose keys cannot be obtained by searching, so for an encrypted IBSS network, it cannot be joined unless a key is obtained.
- Such a design scheme is very effective for a relatively fixed place, such as an office, a home, and a hot spot (HotSpot) area, and can effectively ensure access security.
- HotSpot hot spot
- the problem is that in a multi-device dynamic interconnection scenario, on the one hand, users want to be able to discover each other's existing devices and resources on the device, and then use the network. On the other hand, for relatively unfamiliar users, set A common key allows individual users to access each other and poses a potential risk. Setting the respective network access mode to Open and not using the key is even more unreliable for the user.
- IGRS Mobile Network An 802.11 wireless configuration scenario named "IGRS Mobile Network" is set by default for the user.
- the network type is IBSS
- the network name is the default setting
- the encryption mode is WEP
- the key is the default setting.
- the solution implements fast networking by setting the same 802.11 configuration. Security is guaranteed to a certain extent by user confirmation during data application, but the solution has the following disadvantages: a .
- a For resource providers, in order to make resources The requesting party can switch its own wireless network configuration with its own network. If the resource provider originally connected to other networks, such switching will cause the original connection to be disconnected.
- b Although user prompts and confirmations are added, the mechanism is only applicable to applications implemented by any communication. For other network-based application security, there is a certain risk of security reduction.
- a communication system comprising at least a first 802.11 device and a second 802.11 device, wherein the first 802.11 device includes a network connection portion for searching for related information of the second 802.11 device, and according to the found related information Changing the network settings of the first 802.11 device; and an 802.11 drive interface; the second 802.11 device includes an 802.11 drive interface; the 802.11 drive interface of the first 802.11 device and the 802.11 drive interface of the second 802.11 device communicate according to the changed network settings .
- a communication method comprising:
- the first 802.11 device searches for information about the second 802.11 device
- the first 802.11 device changes the network setting of the first 802.11 device according to the related information found in step a);
- the first 802.11 device communicates with the second 802.11 device in accordance with the changed network settings.
- users can discover, connect, and use other 802.11-time devices in their surroundings without any manual setup.
- FIG. 1 is a block diagram showing the structure of a communication system in accordance with the present invention.
- FIG. 1 depicts a block diagram of a communication system in accordance with the present invention that complies with the 802.11 protocol.
- the communication system includes an 802.11 device 1 used by the user 1 and an 802.11 device 2 used by the user 2.
- 802.11 device 1 serves as a connection originating device
- 802.11 device 2 serves as a connection target device.
- the 802.11 device 1 includes a UI 11, a client connection 12, and an 802.11 drive interface 13.
- the 802.il device 2 includes a UI 21, a client connection 22, and an 802.11 drive interface 23.
- the user 1 first discovers the shared resources on the 802.11 device 2 through the client connection unit 12 in the 802.11 device 1, and knows the SSID, MAC address, and encryption status of the 802.11 device 2. If User 1 is interested in the shared resource X on the 802.11 device 2, the client connection portion 12 of the 802.11 device 1 sets the SSID of the 802.11 device 1 to the SSID of the 802.11 device 2, sets the authentication mode to open, and disables the WEP encryption. If the client connection unit 12 cannot complete the operation, the user is prompted to access the target content through the UI 11 because the network of the other party is not added; if the encryption status of the 802.11 device 2 is not encrypted, the resending connection command is not required.
- the user 1 issues a command to the client connection unit 12 via the UI 11 of the 802.11 device 1, requesting to initiate an 802.11-based network connection request to the 802.11 device 2, the target resource being the content x on the 802.11 device 2.
- the client connection unit 12 sends a connection request to the 802.11 driver interface of the 802.11 device 1, the connection request is a unicast Probe Request frame with a connection request extension, and the target address (DA) of the Probe Request frame is the MAC of the 802.11 device 2. address.
- the frame adds an information element (Information Element) for indicating a connection request based on the original Request Request frame structure of the 802.11 protocol, and the content of the information unit includes at least the following two parts: Initiating a connection request user name (ie, user 1) Name), the shared resource information (content x in this embodiment) for this connection request, and the connection request timeout period.
- the 802.11 driver interface 23 of the 802.11 device 2 receives the Probe Request frame, and takes out the information unit indicating the connection request, and sends it to the server connection unit 22 of the 802.11 device 2.
- the server connection unit 22 sends the name of the user 1 and the target resource X accessed to the UI 21, and then the UI 21 is presented to the user 2.
- the user 2 determines whether to agree with the request of the user 1 based on the obtained information, and makes a response allowing the connection or rejecting the connection. If the server connection unit 22 receives a response to allow or reject the connection before the end of the connection request timeout period, the server connection unit 22 drives the 802.11 drive interface 23 to transmit a unicast Probe Response frame with a connection request response extension, which The destination address (DA) of the frame is the MAC address of 802.11 device 1. The frame is based on the original Provider of the 802.11 protocol, and a flag is added to indicate the connection.
- the information element (Information Element) requesting the response result, the content of the information unit includes at least the following parts: Connection request response result (Success or Denied), the current connection validity time.
- the server connection unit 22 If the server connection unit 22 sends a response result to the request for a successful response, the server connection unit 22 connects the MAC address of the originating device (802.11 device 1) and the target resource information of the current connection, and the timeout of the current connection request. Information such as time is added to the list of allowed access devices of the 802.11 driver interface 23 of the 802.11 device 2.
- the client connection unit 12 fails to receive the Probe Response frame that has responded successfully before the end of the connection request timeout period, the UI 11 prompts the user to indicate that the connection request fails. Otherwise, the user is prompted to connect successfully. After the connection request is successful, User 1 can start the application corresponding to the requested target resource to use the resources of the target device.
- the 802.11 driver interface of 802.11 device 2 determines whether to allow data frames from other 802.11 devices based on the MAC addresses in the list of allowed access devices.
- the 802.11 network security mode of the device where the server connection is located is set to be encrypted, if there is an unencrypted data frame from the device allowed to access the device list and the resource corresponding to the data frame is the resource when the device originally connects the request , the frame is allowed, if there is an unencrypted data frame from a device that is not allowed to access the device list, the frame is prohibited, if there is an encrypted data frame from any device, it is forbidden only when the key is incorrect The frame.
- the 802.11 network security mode of the device where the server is connected is set to be unencrypted, the data from other devices is not judged.
- User A holds an MP3 player supporting the present invention (the MP3 player has a network card conforming to the 802.11b/g/a specification).
- the wireless setting of the user A's MP3 player is Ad-hoc mode.
- the SSID is MusicPlayer, WEP encryption is enabled, and User A can start the Find Network Resource function in the MP3 player to discover another MP3 player in the airport that supports the MP3 player of the present invention.
- User B's MP3 player's wireless settings are Ad-hoc mode, SSID is MusicSource, WEP encryption is enabled, User B sets the "MP3 Sharing" status on the MP3 player, and User A can start up through his MP3 player.
- User B's MP3 player may prompt the user B user A to request a connection in the form of a graphic flashing or the like. If User B agrees to the connection request, the software on User A first changes the wireless configuration to SSID: MusicSource, does not encrypt, and prompts User A to connect. Success. User A can then browse and download the music files shared by User B's MP3 player, but when User A tries to access other resources on B, he will receive a prompt to disable access.
- SSID MusicSource
- MP3 sharing this resource can be marked by the ID number of the MP3 shared service, so that only when User A's MP3 player makes a request for the MP3 sharing service with the ID, its data packet can pass. Detection of software in accordance with the present invention.
- users can discover, connect, and use other 802.11-time devices in their surroundings without any manual setup.
- users can share resources on 802.11 devices while maintaining security.
- the communication system and method according to the present invention can simplify the connection between devices in an 802.11 IBSS network while maintaining the compatibility of the original protocol.
- the present invention introduces a method similar to that used when pairing between Bluetooth devices, so that 802.11 devices implement on-demand networking in an IBSS network in a dynamic interconnection environment, and the distributed Ad-hoc networking mode becomes a connection request/ The networking mode of the response.
- the present invention introduces a MAC layer filtering method to ensure a certain security under the premise of simplifying the connection complexity of the device.
- the method of searching for resources as the user 1 can be implemented by the following steps:
- the user 1 sends the description information of the resource to be searched to the client connection part 12 by using a command;
- the client connection unit 12 extends the Probe Request management frame of the MAC layer, and encapsulates the resource description information to be searched in the Probe Request management frame for broadcasting;
- the server connection unit 22 of the 802.11 device 2 that has received the Probe Request management frame parses the resource description information in the extended Probe Request management frame, and then transmits the resource description information to the user according to the prior setting or directly Perform response processing;
- the response content is sent to the server connection unit 22 of the 802.11 device 2, and the server connection unit 22 encapsulates the response content in the extended Probe Response management frame for transmission;
- the content in the Probe Response management frame is parsed and uploaded to the user 1 .
- the above method is only an example, and the present invention can use other methods to implement the information related to the 802.11 device 2 that the user 1 finds.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Quality & Reliability (AREA)
- Mobile Radio Communication Systems (AREA)
- Small-Scale Networks (AREA)
- Computer And Data Communications (AREA)
Description
通信系统和通信方法
技术领域
本发明涉及一种通信系统和通信方法, 特别涉及一种遵从 802.11协议的通信系 统和通信方法。
背景技术
802.11协议中定义了 IBSS (独立基础服务集)模式,在该模式下,多个 STA (无 线工作站) 间无需 AP (中心网络) 的存在直接组成 Ad-hoc网络(自组织网络), 该 模式网络对于需要临时组网的应用非常有效。 目前的方案, 在 IBSS模式下, 由于不 存在 AP, 因此, 没有一个固定的接入点或服务器充当网络接入的访问控制点, 一个 STA能否接入一个 IBSS并且与该 IBSS中的其他 STA进行通信主要取决于两个因 素,一是各个 STA是否设置了相同的 SSID (服务集标识符), 一个是各个 STA是否 设置了相同的加密方式和密钥。 只有在设置了相同的 SSID, 加密方式和相应的密钥 后, 多个 STA之间才能够形成一个可以相互通信的 IBSS网络。 其中, 一个 STA所 在区域内的所有 IBSS网络的 SSID可以通过现有的技术方案获得, 具体某个 IBSS 网络中各个 STA所使用的加密方式, 是否加密也可以通过现有的技术方案得到, 而 对于使用了加密的 IBSS网络,其密钥无法通过搜索获得,因此对于一个加密的 IBSS 网络, 除非得到密钥, 否则无法加入。 这样的设计方案对于相对固定的场所, 如办 公室, 家庭, 热点 (HotSpot)区域来说非常有效, 可以有效的保证访问安全, 但该方 案对多设备动态互联下的移动场景则存在应用上的不便。 其问题表现在, 在多设备 动态互联场景中, 一方面, 用户间希望能够相互发现周围存在的设备及设备上的资 源, 进而组网使用, 另一方面, 对于相对陌生的用户来说, 设置一个共同的密钥使 得各个用户可以相互访问又带来潜在的风险。 而将各自的网络访问方式设置成为 Open并且不用密钥则更无法令用户放心。
另一方面, 用户在动态互联场景下往往只需要使用其他用户设备上所拥有资源 的一小部分, 比如动态联机游戏, 这样的资源使用对于被使用方来说往往不会带来 安全性的问题, 但是目前的 802.11 IBSS网络组网机制未能提供相应的解决方案。
为了解决该问题, 提出了这样的解决方案: 在联想的闪联任意通软件中, 任意
通为用户缺省设置了名为 "闪联移动网络"的 802.11无线配置场景, 在该场景配置 中, 网络类型为 IBSS, 网络名称为缺省设置, 加密方式为 WEP, 密钥为缺省设置, 当多个配备该软件的笔记本用户将场景切换到该场景时, 多个设备将组成一个 IBSS 网络。 这些用户可通过闪联任意通软件实现文件 /数据共享, 在通过任意通实现文件 /数据共享时, 资源提供方可以根据软件的提示接受或拒绝资源请求方的请求。
该解决方案通过设置相同的 802.11配置实现了快速组网, 在数据应用时通过用 户确认在一定程度上保证了安全性, 但该方案具有如下缺点: a, 对于资源提供方来 说, 为了使得资源请求方能够与自己组网必须切换自身的无线网络配置, 如果资源 提供方原先还连接到其他网络上, 这样的切换将使得原先的连接断开。 b, 虽然加入 了用户提示与确认, 但该机制只适用于由任意通所实现的应用, 对于其他基于网络 的应用安全性将带来一定的安全性降低的风险。
发明内容
有鉴于此, 本发明的目的在于提供一种能够简化 802.11设备之间联网的通信系 统和方法。
依照本发明的通信系统,其包括至少第一 802.11设备和第二 802.11设备,其中, 第一 802.11设备包括一网络连接部, 用于查找第二 802.11设备的相关信息, 以及根 据查找到的相关信息更改第一 802.11设备的网络设置; 和一 802.11驱动接口; 第二 802.11设备包括一 802.11驱动接口;第一 802.11设备的 802.11驱动接口和第二 802.11 设备的 802.11驱动接口依照更改后的网络设置进行通信。
依照本发明的通信方法, 其包括:
a) 第一 802.11设备査找第二 802.11设备的相关信息;
b) 第一 802.11设备根据步骤 a)査找到的相关信息更改第一 802.11设备的网络 设置;
c)第一 802.11设备依照更改后的网络设置与第二 802.11设备进行通信。
依照本发明, 用户在发现, 连接, 使用周围环境中的其他 802.11时设备无需任 何手工设置就可以实现联网。
附图说明
图 1为依照本发明的通信系统的结构框图。
具体实施方式
如图 1 所示, 其描述了依照本发明的通信系统的结构框图, 该通信系统遵从 802.11协议。该通信系统包括用户 1使用的 802.11设备 1和用户 2使用的 802.11设 备 2。 在该通信系统中, 802.11设备 1作为连接发起设备, 802.11设备 2作为连接 目标设备。 802.11设备 1包括一 UI 11, 一客户端连接部 12, 和一 802.11驱动接口 13。 802.il设备 2包括一 UI 21, 一客户端连接部 22, 和一 802.11驱动接口 23。
用户 1首先通过 802.11设备 1中的客户端连接部 12, 发现 802.11设备 2上的 共享资源, 同时获知了 802.11设备 2的 SSID、 MAC地址和加密状态。 如果用户 1 对 802.11设备 2上的共享资源 X感兴趣,则 802.11设备 1的客户端连接部 12将 802.11 设备 1的 SSID设置成 802.11设备 2的 SSID, 将认证模式置为 open, 将 WEP加密 disable 如果客户端连接部 12不能完成该操作, 则通过 UI 11提示用户无法访问目 标内容, 原因是无 加入对方的网络; 如果 802.11设备 2的加密状态是不加密, 则 不需进行再发送连接命令。
同时, 用户 1通过 802.11设备 1的 UI 11向客户端连接部 12发出命令, 要求向 802.11设备 2发起基于 802.11的网络连接请求, 目标资源是 802.11设备 2上的内容 x。
客户端连接部 12将连接请求发给 802.11设备 1的 802.11驱动接口, 该连接请 求为带有连接请求扩展的单播 Probe Request帧,该 Probe Request帧的目标地址 (DA) 为 802.11设备 2的 MAC地址。该帧基于 802.11协议原定的 Probe Request帧结构中 添加一个用于标示连接请求的信息单元 (Information Element), 该信息单元的内容至 少包括如下两部分内容: 发起连接请求用户名称(即用户 1的名称), 本次连接请求 所针对的共享资源信息 (在本实施例中为内容 x), 连接请求超时时间。
802.11设备 2的 802.11驱动接口 23收到该 Probe Request帧, 将其中的标示连 接请求的信息单元取出, 发给 802.11设备 2的服务端连接部 22。 服务端连接部 22 将用户 1的名称和访问的目标资源 X发给 UI 21 , 接着 UI 21展示给用户 2。
用户 2根据所获得的信息确定是否同意用户 1的请求, 作出允许连接或者拒绝 连接的响应。如果服务端连接部 22在连接请求超时时间结束前收到允许连接或者拒 绝连接的响应, 则服务端连接部 22驱动 802.11驱动接口 23发送一个带有连接请求 响应扩展的单播 Probe Response帧, 该帧的目标地址 (DA)为 802.11设备 1的 MAC 地址。 该帧基于 802.11协议原定的 Probe Response帧结构中添加一个用于标示连接
请求响应结果的信息单元 (Information Element), 该信息单元的内容至少包括如下几 部分内容: 连接请求响应结果 (Success或者 Denied), 本次连接有效时间。
如果服务端连接部 22发送一个响应结果为请求成功响应, 则服务端连接部 22 将本次连接发起设备(802.11设备 1 )的 MAC地址及本次连接的目标资源信息, 本 次连接请求的超时时间等信息加入 802.11设备 2的 802.11驱动接口 23的允许访问 设备列表中。
客户端连接部 12如果在连接请求超时时间结束前未能收到响应为成功的 Probe Response帧, 则通过 UI 11提示告诉用户 1, 本次连接请求失败。否则提示用户本次 连接请求成功。 连接请求成功后, 用户 1 即可启动与请求目标资源对应的应用软件 使用目标设备的资源。
802.11设备 2的 802.11驱动接口 23根据允许访问设备列表中的 MAC地址判断 是否允许来自于其他 802.11设备的数据帧。当服务端连接部所在设备的 802.11网络 安全模式设置为加密时, 如果有来自于允许访问设备列表上的设备的非加密数据帧 且该数据帧所对应的资源为该设备原先连接请求时的资源, 则允许该帧, 如果有来 自于不在允许访问设备列表上的设备的非加密数据帧, 则禁止该帧, 如果有来自于 任何设备的带加密的数据帧, 则仅在密钥不对时禁止该帧。 当服务端连接部所在设 备的 802.11网络安全模式设置为不加密时, 不对来自于其他设备的数据作判断。
服务端连接部 22 定期的更新允许访问列表, 清除那些已经过期的允许访问设 备。
下面, 利用一个例子来进一步说明依照本发明的通信系统和方法的操作。
用户 A拿着一个支持本发明的 MP3播放器 (该 MP3播放器具有符合 802.11b/g/a 规范的网卡) 在机场候机, 此时用户 A的 MP3播放器的无线设置为 Ad-hoc模式, SSID为 MusicPlayer, WEP加密启用, 用户 A可以启动 MP3播放器中的査找网络 资源功能发现机场内的另一个用户 B所携带的支持本发明的 MP3播放器。 用户 B 的 MP3播放器的无线设置为 Ad-hoc模式, SSID为 MusicSource, WEP加密启用, 用户 B在 MP3播放器上设置了 "MP3共享"状态, 用户 A即可通过自己的 MP3 播放器启动向用户 B的 MP3播放器的连接请求, 用户 B的 MP3播放器可以图形闪 烁等形式提示用户 B用户 A正在请求连接。如果用户 B同意该连接请求, 则用户 A 上的软件首先将无线配置更改为 SSID: MusicSource, 不加密, 同时提示用户 A连接
成功。 随后用户 A可以浏览, 下载用户 B的 MP3播放器上所共享的音乐文件, 但 是当用户 A试图访问 B上其他资源时则会收到访问权限禁止的提示。
在该例子中中, MP3共享这一资源可以通过 MP3共享服务的 ID号作为标示, 这样, 只有当用户 A的 MP3播放器对具有该 ID的 MP3共享服务发出请求时, 其 数据包方能够通过依据本发明的软件的检测。
依照本发明, 用户在发现, 连接, 使用周围环境中的其他 802.11时设备无需任 何手工设置就可以实现联网。 另外, 用户也可以在保证安全性的前提下共享 802.11 设备上的资源。
依照本发明的通信系统和方法, 其基于 802.11协议标准, 在维持原来协议的兼 容性的基础上, 能够简化实现 802.11 IBSS网络中设备间的连接。
本发明引入类似 Bluetooth设备间配对时釆用的方法, 使得 802.11设备在 IBSS 网络中, 在动态互连环境下, 实现按需组网, 将分布式 Ad-hoc组网方式变成基于连 接请求 /响应的组网方式。
此外, 本发明引入 MAC层过滤的方法, 在简化设备连接复杂性的前提下保证 一定的安全性。
在本发明中, 作为用户 1査找资源的方法可以由如下步骤实现:
1 ) 用户 1通过命令将需要査找的资源的描述信息发送到客户端连接部 12;
2) 客户端连接部 12扩展 MAC层的 Probe Request管理帧, 将要查找的资源描 述信息封装在所述 Probe Request管理帧中进行广播;
3 )接收到所述 Probe Request管理帧的 802.11设备 2的服务端连接部 22将扩展 的 Probe Request管理帧中的资源描述信息进行解析, 然后根据事先的设置将该资源 描述信息传给用户或者直接进行响应处理;
4)响应内容发给该 802.11设备 2的服务端连接部 22, 服务端连接部 22则将响 应内容封装在扩展的 Probe Response管理帧中进行发送;
5 ) 收到所述 Probe Response管理帧的 802.11设备 1的客户端连接部 12将所述
Probe Response管理帧中的内容解析后上传给用户 1。
当然, 上述方法仅为一个例子, 本发明可以釆用其它方法来实现用户 1查找到 802.11设备 2的相关信息。
以上实施例仅用以说明本发明的技术方案而非限制, 尽管参照较佳实施例对本
发明进行了详细说明, 本领域的普通技术人员应当理解, 可以对本发明的技术方案 进行修改或者等同替换, 而不脱离本发明技术方案的精神和范围, 其均应涵盖在本 发明的权利要求范围当中。
Claims
1. 一种通信系统, 其包括至少第一 802.11设备和第二 802.11设备, 其中, 第一 802.11设备包括一网络连接部, 用于查找第二 802.11设备的相关信息, 以 及根据査找到的相关信息更改第一 802.11设备的网络设置; 和一 802.11驱动接口; 第二 802.11设备包括一 802.11驱动接口;
第一 802.11设备的 802.11驱动接口和第二 802.11设备的 802.11驱动接口依照 更改后的网络设置进行通信。
2. 如权利要求 1所述的通信系统权, 其中
第二 802.11设备的相关信息包括: 第二 802.11设备的 SSID、 MAC地址、 加密 状态及其共享资源。
3. 如权利要求 2所述的通信系统, 其中 求
第一 802.11设备的所述网络连接部根据查找到的相关信息将第一 802.11设备的 SSID设置成第二 802.11设备的 SSID, 将认证模式置为 open, 将 WEP加密 disable。
4. 如权利要求 1一 3任一项所述的通信系统, 其中
当第一 802.11设备的所述网络连接部更改网络设置之后,该第一 802.11设备的 802.11驱动接口将连接请求发送至第二 802.11设备的 802.11驱动接口,请求与第二 802.11设备发起基于 802.11的网络连接。
5. 如权利要求 4所述的通信系统, 其中
所述连接请求为添加有一标示连接请求的信息单元的 Probe Request 帧, 且该
Probe Request帧的目标地址设置为第二 802.11设备的 MAC地址。
6. 如权利要求 5所述的通信系统, 其中
所述标示连接请求的信息单元包括: 使用第一 802.11设备的用户名称、 该连接 请求所针对的共享资源信息、 以及连接请求超时时间。
7. 如权利要求 4所述的通信系统, 其中
第二 802.11设备的 802.11驱动接口响应来自第一 802.11设备的连接请求, 将 连接响应发送至第一 802.11设备的 802.11驱动接口。
8. 如权利要求 7所述的通信系统, 其中
所述连接响应包括添加有一标示连接请求响应结果的信息单元的 Probe
Response巾贞。
9. 如权利要求 8所述的通信系统, 其中
所述标示连接请求响应结果的信息单元包括: 连接请求响应结果、 以及本次连 接有效时间。
10. 如权利要求 9所述的通信系统, 其中
如果连接响应为连接成功响应,则服务端连接部将包括第一 802.11设备的 MAC 地址及本次连接的目标资源信息、 以及本次连接请求的超时时间的信息加入第二 802.11设备的允许访问设备列表中, 第二 802.11设备根据允许访问设备列表来控制 第一 802.11设备之间的通信。
11. 一种通信方法, 其包括:
a)第一 802.11设备査找第二 802.11设备的相关信息;
b) 第一 802.11设备根据步骤 a)査找到的相关信息更改第一 802.11设备的网络 设置;
c) 第一 802.11设备依照更改后的网络设置与第二 802.11设备进行通信。
12. 如权利要求 11所述的通信方法, 其中,
在步骤 a)中査找到的第二 802.11设备的相关信息包括:第二 802.11设备的 SSID、 MAC地址、 加密状态及其共享资源。
13. 如权利要求 12所述的通信方法, 其中,
在步骤 b)中, 第一 802.11设备根据步骤 a) 査找到的相关信息, 将第一 802.11 设备的 SSID设置成第二 802.11设备的 SSID, 将认证模式置为 open, 将 WEP加密 disable。
14. 如权利要求 11一 13任一项所述的通信方法, 其中, 步骤 c)包括如下步骤: 1 ) 第一 802.11设备将连接请求发送至第二 802.11设备, 请求与第二 802.11设 备通信,
2) 第二 802.11设备响应该连接请求, 将连接响应发送至第一 802.11设备;
3 ) 第一 802.11设备依照歩骤 2) 的连接响应, 和第二 802.11设备进行通信。
15. 如权利要求 14所述的通信方法, 其中,
所述连接请求为添加有一标示连接请求的信息单元的 Probe Request 帧, 且该 Probe Request帧的目标地址设置为第二 802.11设备的 MAC地址。
16. 如权利要求 15所述的通信方法, 其中,
所述标示连接请求的信息单元包括: 使用第一 802.11设备的用户名称、 该连接 请求所针对的共享资源信息、 以及连接请求超时时间。
17. 如权利要求 14所述的通信方法, 其中,
所述连接响应包括添加有一标示连接请求响应结果的信息单元的 Probe Response巾贞。
18. 如权利要求 17所述的通信方法, 其中,
所述标示连接请求响应结果的信息单元包括: 连接请求响应结果、 以及本次连 接有效时间。
19. 如权利要求 14所述的通信方法, 其中,
如果连接响应为连接成功响应,则服务端连接部将包括第一 802.11设备的 MAC 地址及本次连接的目标资源信息、 以及本次连接请求的超时时间的信息加入第二 802.11设备的允许访问设备列表中, 第二 802.11设备根据允许访问设备列表来控制 第一 802.11设备之间的通信。
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2008535870A JP2009512368A (ja) | 2005-10-21 | 2006-03-23 | 通信システムおよび通信方法 |
US12/083,853 US8312151B2 (en) | 2005-10-21 | 2006-03-23 | Communication systems and methods for dynamic and secure simplification of equipment networking |
EP06722128.3A EP1947818B1 (en) | 2005-10-21 | 2006-03-23 | A communication system and a communication method |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200510114270.6 | 2005-10-21 | ||
CN2005101142706A CN1953446B (zh) | 2005-10-21 | 2005-10-21 | 通信系统和通信方法 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2007045134A1 true WO2007045134A1 (en) | 2007-04-26 |
Family
ID=37962183
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2006/000476 WO2007045134A1 (en) | 2005-10-21 | 2006-03-23 | A communication system and a communication method |
Country Status (5)
Country | Link |
---|---|
US (1) | US8312151B2 (zh) |
EP (1) | EP1947818B1 (zh) |
JP (1) | JP2009512368A (zh) |
CN (1) | CN1953446B (zh) |
WO (1) | WO2007045134A1 (zh) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8862866B2 (en) | 2003-07-07 | 2014-10-14 | Certicom Corp. | Method and apparatus for providing an adaptable security level in an electronic communication |
GB2406484B (en) | 2003-08-19 | 2007-01-31 | Certicom Corp | Method and apparatus for synchronizing an adaptable security level in an electronic communication |
US8675485B2 (en) | 2004-12-14 | 2014-03-18 | Aspen Networks, Inc. | Reliable ISP access cloud state detection method and apparatus |
CA2644015C (en) * | 2006-04-13 | 2016-10-18 | Certicom Corp. | Method and apparatus for providing an adaptable security level in an electronic communication |
WO2010099243A1 (en) * | 2009-02-24 | 2010-09-02 | Doxo, Inc. | Provider relationship management system that facilitates interaction between an individual and organizations |
EP2632071A1 (en) * | 2012-02-21 | 2013-08-28 | Thomson Licensing | Method for assessing quality of a radio transmission channel, and residential gateway using the method |
US10209944B2 (en) * | 2014-11-25 | 2019-02-19 | Huawei Technologies Co., Ltd. | Interface sharing method and terminal device |
US9794372B2 (en) * | 2015-04-07 | 2017-10-17 | At&T Intellectual Property I, L.P. | Connection management service |
CN105050129B (zh) * | 2015-08-17 | 2020-01-10 | 上海庆科信息技术有限公司 | 一种数据交互的方法及装置 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2003003610A1 (en) | 2001-06-27 | 2003-01-09 | Nokia Corporation | Ad hoc network discovery menu |
EP1370050A1 (en) | 2002-06-05 | 2003-12-10 | Nokia Corporation | Advertisement or automatic determination of access point contents of available services for short-range wireless terminals |
EP1406424A2 (en) * | 2002-10-01 | 2004-04-07 | NEC Infrontia Corporation | Terminal device, method for processing communication data inside the terminal device, and program for implementing the method |
CN1620070A (zh) * | 2003-11-20 | 2005-05-25 | 海信集团有限公司 | 基于通用即插即用协议的网络电话及其使用方法 |
EP1583295A2 (en) * | 2004-03-26 | 2005-10-05 | Broadcom Corporation | WLAN/WPAN coexistence with dynamic prioritization in wireless devices |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH11212850A (ja) * | 1998-01-29 | 1999-08-06 | Hitachi Ltd | 暗号化共有ファイル送受信システム |
US6766143B1 (en) * | 1999-01-25 | 2004-07-20 | Robert W. Beckwith | Expanded capabilities for wireless two-way packet communications for intelligent electronic devices (IEDs) |
JP2002244906A (ja) * | 2001-02-13 | 2002-08-30 | Information & Mathematical Science Laboratory Inc | ネットワークシステム及びその情報共有方法 |
JP3515551B2 (ja) * | 2001-09-13 | 2004-04-05 | 株式会社東芝 | 無線データ通信の中継機能を有する電子機器 |
US20030204748A1 (en) * | 2002-04-30 | 2003-10-30 | Tom Chiu | Auto-detection of wireless network accessibility |
JP4019261B2 (ja) * | 2002-09-10 | 2007-12-12 | ソニー株式会社 | コンテンツ提供システム、コンテンツ提供方法、情報処理装置、および情報処理方法 |
CN1166124C (zh) * | 2002-09-16 | 2004-09-08 | 联想(北京)有限公司 | 家庭网络中实现动态组网时的设备对等连接方法 |
US7257105B2 (en) * | 2002-10-03 | 2007-08-14 | Cisco Technology, Inc. | L2 method for a wireless station to locate and associate with a wireless network in communication with a Mobile IP agent |
JP3925425B2 (ja) * | 2003-02-18 | 2007-06-06 | Kddi株式会社 | 無線マルチホップネットワークの構成方法 |
KR20040107602A (ko) * | 2003-06-05 | 2004-12-23 | 삼성전자주식회사 | 홈 네트워크 상에서의 컨텐츠 실행을 위한 라이센스 관리시스템 및 방법 |
US20060073850A1 (en) * | 2004-09-10 | 2006-04-06 | Interdigital Technology Corporation | Steering a smart antenna using link layer performance |
JP4040619B2 (ja) * | 2004-11-08 | 2008-01-30 | キヤノン株式会社 | 画像出力装置およびその制御方法ならびに画像出力システム |
US7428229B2 (en) * | 2004-12-28 | 2008-09-23 | Motorola, Inc. | Ad hoc cluster idle node coordination |
-
2005
- 2005-10-21 CN CN2005101142706A patent/CN1953446B/zh not_active Expired - Fee Related
-
2006
- 2006-03-23 JP JP2008535870A patent/JP2009512368A/ja active Pending
- 2006-03-23 US US12/083,853 patent/US8312151B2/en active Active
- 2006-03-23 EP EP06722128.3A patent/EP1947818B1/en active Active
- 2006-03-23 WO PCT/CN2006/000476 patent/WO2007045134A1/zh active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2003003610A1 (en) | 2001-06-27 | 2003-01-09 | Nokia Corporation | Ad hoc network discovery menu |
EP1370050A1 (en) | 2002-06-05 | 2003-12-10 | Nokia Corporation | Advertisement or automatic determination of access point contents of available services for short-range wireless terminals |
EP1406424A2 (en) * | 2002-10-01 | 2004-04-07 | NEC Infrontia Corporation | Terminal device, method for processing communication data inside the terminal device, and program for implementing the method |
CN1620070A (zh) * | 2003-11-20 | 2005-05-25 | 海信集团有限公司 | 基于通用即插即用协议的网络电话及其使用方法 |
EP1583295A2 (en) * | 2004-03-26 | 2005-10-05 | Broadcom Corporation | WLAN/WPAN coexistence with dynamic prioritization in wireless devices |
Non-Patent Citations (2)
Title |
---|
"IEEE Std 802.11, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications", ISO/IEC 8802-11 ANSI/I EEE STD 802.11, 1999, pages 1,72 - 78,123 |
See also references of EP1947818A4 |
Also Published As
Publication number | Publication date |
---|---|
EP1947818A1 (en) | 2008-07-23 |
CN1953446B (zh) | 2010-09-29 |
JP2009512368A (ja) | 2009-03-19 |
US8312151B2 (en) | 2012-11-13 |
US20110106956A1 (en) | 2011-05-05 |
EP1947818A4 (en) | 2011-11-02 |
CN1953446A (zh) | 2007-04-25 |
EP1947818B1 (en) | 2016-05-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9654907B2 (en) | System, method and apparatus for wireless network connection using near field communication | |
EP3616426B1 (en) | Network policy configuration | |
KR101814969B1 (ko) | 네트워크에 액세스하는 시스템 및 방법 | |
JP3984993B2 (ja) | アクセスネットワークを通じて接続を確立するための方法及びシステム | |
US7917942B2 (en) | System and method for configuring security in a plug-and-play architecture | |
EP2723137B1 (en) | Apparatus for setting up network for ip communication in mobile terminal | |
CN101299759B (zh) | Wlan相互连接中的服务和地址管理系统及方法 | |
KR101826327B1 (ko) | 와이파이 피투피 그룹의 생성 방법 | |
US8848915B2 (en) | Method for automatic WLAN connection between digital devices and digital device therefor | |
KR101780021B1 (ko) | 네트워크 인터페이스의 자동 설정에 기초해 인터넷 연결을 공유하는 방법 및 장치 | |
US9253636B2 (en) | Wireless roaming and authentication | |
WO2007045134A1 (en) | A communication system and a communication method | |
EP1949724A2 (en) | System and method for establishing bearer-independent and secure connections | |
WO2011144174A1 (zh) | 配置接入设备的方法、装置及系统 | |
JP2019525518A (ja) | ネットワーク化されたデバイス間のネットワーククラスターを確立するための方法 | |
US9980121B2 (en) | Method and apparatus for performing discovery in wireless communication system | |
EP1589703B1 (en) | System and method for accessing a wireless network | |
WO2006106434A1 (en) | Device management in a communication system | |
WO2011035667A1 (zh) | 实现网间漫游的方法、系统及查询和网络附着方法及系统 | |
US20080184332A1 (en) | Method and device for dual authentication of a networking device and a supplicant device | |
US12089044B2 (en) | Content service accessibility for unauthenticated users | |
JP4802238B2 (ja) | ローカルネットワーク相互接続における移動端末に対してネットワークに基づくトンネルを設定する方法 | |
KR102015413B1 (ko) | 로컬 네트워크에서의 인터페이스 설정장치 및 방법 | |
JP2006345302A (ja) | ゲートウェイ装置およびプログラム | |
CN118714575A (zh) | 一种安全建立方法及相关装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
ENP | Entry into the national phase |
Ref document number: 2008535870 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2006722128 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 2006722128 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 12083853 Country of ref document: US |