Method, device and system for configuring access device

A technology for accessing equipment and equipment, applied in the field of communication, can solve the problem of consuming user energy and time, and achieve the effect of reducing burden and requirements

Active Publication Date: 2011-07-27
HUAWEI TECH CO LTD
View PDF6 Cites 46 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The above-mentioned process of configuring certain access devices requires certain technical knowledge, and may require operators (or vendors) to come to solve the proble

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for configuring access device
  • Method, device and system for configuring access device
  • Method, device and system for configuring access device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] A gateway device configuration access device method, please refer to figure 1 , mainly including the following steps:

[0043] 101. The gateway device acquires the type and master key of the access device.

[0044]The gateway device sends a topology detection message to the access device, and the access device responds with the first information message after receiving the topology detection message, and reports the type of the access device and empty configuration information to the gateway device, and the gateway device receives After the empty configuration information, an authentication request is sent to the access device. After the authentication is passed, the access device responds with a second information message and reports the master key of the access device to the gateway device. The manner of authentication may be certificate (CA, Certificate Authority) authentication. In order to improve security, the access device can use the key of the certificate to ...

Embodiment 2

[0054] A method for terminal equipment to configure access equipment, please refer to figure 2 , mainly including the following steps:

[0055] 201. The terminal device receives the type of the access device sent by the gateway device.

[0056] The terminal device may be connected to the gateway device through Ethernet or other established secure channels, such as a Secure Shell (SSH, Secure Shell) channel, and receive the type of the access device sent by the gateway device.

[0057] 202. Specify identification information for the access device according to the type of the access device.

[0058] The terminal device may use a pre-configured program to automatically assign identification information to the access device according to the type of the access device, or the user may assign identification information to the access device according to the type of the access device. When the identification information is specified by the user, it includes the following steps: the ...

Embodiment 3

[0070] According to the methods described in Embodiment 1 and Embodiment 2, the method for configuring an access device is described in more detail in this embodiment. Please refer to image 3 with Figure 7 .

[0071] In this embodiment, the method for configuring an access device is applied in the following application scenarios:

[0072] Broadband operators provide users with broadband access services, install home gateway equipment, and the home networks established by users themselves are connected to the broadband network through the gateway equipment. In order to access and use the network more conveniently, the user has purchased an access device AP to set up a wireless network. In this embodiment, the terminal device used by the user is described by taking a personal computer as an example, and of course it may also be a terminal device such as a set-top box; the access device is described by taking an AP as an example. Of course, this embodiment is also applicabl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method, device and system for configuring an access device. The method comprises the steps of: obtaining a type and a master key of the access device, sending the type of the access device to a terminal device, and receiving a response message of the terminal device, wherein the response message carries identifier information appointed by the terminal device for the access device according to the type of the access device; and configuring the access device according to the master key and the identifier information of the access device. The technical scheme disclosed by the invention realizes that the access device is uniformly and automatically configured by a gateway device and then the terminal device can access the access device according to the master key of the access device. The technical scheme ensures that a user does not need to remember the master key of each access device and manually configure the access device before the terminal device accesses each access device, and therefore, the requirement on the user is lowered and the load of the user is reduced.

Description

technical field [0001] The present invention relates to the field of communication technologies, and in particular to a configuration method, device and system for access equipment. Background technique [0002] With the vigorous development of network services, how to make better use of existing network resources and secure, high-speed, convenient, and fast access to the network is attracting widespread attention. In the prior art, a commonly used network is a wired broadband network, including a local area network (LAN, Local Area Network) and an asymmetric digital subscriber loop (ADSL, Asymmetric Digital Subscriber Loop). In order to improve network performance and user experience, other types of networks such as wireless networks, power line communications, and coaxial communications have also been rapidly developed. [0003] Generally, the basic configuration of setting up a wireless network is to use a wireless network card and a wireless access point (AP, Access Poi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/04H04W48/08H04W88/16
CPCH04W12/08H04W24/04
Inventor 欧阳伟龙
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products