Unlock instant, AI-driven research and patent intelligence for your innovation.

Wireless LAN relay device, wireless communication system and method for controlling wireless LAN relay device

A technology of wireless local area network and relay device, applied in wireless communication, security device, transmission system, etc.

Active Publication Date: 2011-09-28
BUFFALO CORP LTD
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the use of the above-mentioned prior art will encounter the following problems: in order to encrypt the wireless packet, it is necessary to perform various settings related to security on the WLAN access point, thus, the user needs to have knowledge about security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless LAN relay device, wireless communication system and method for controlling wireless LAN relay device
  • Wireless LAN relay device, wireless communication system and method for controlling wireless LAN relay device
  • Wireless LAN relay device, wireless communication system and method for controlling wireless LAN relay device

Examples

Experimental program
Comparison scheme
Effect test

no. 1 approach

[0047] figure 1 It is a diagram showing a schematic configuration of a wireless communication system according to the first embodiment of the present invention. The wireless communication system 10 of the first embodiment includes a wireless LAN access point (hereinafter, also referred to as "WLRD") 20 as a wireless LAN relay device, and a personal computer ( Hereinafter, it is also referred to as “PC”) 30 . In the security setting process described later, WLRD20 and PC30 figure 1 The connection is as shown by a LAN cable 40 (ie, a wired connection). In addition, in order to form a processing unit used in security setting processing described later, a computer program stored in advance on a CD (Compact Disc, optical disc) 50 is loaded in the PC 30 .

[0048] figure 2 It is a figure which shows the schematic structure of PC30 in 1st Embodiment. PC30 comprises: RAM (Random Access Memory, random access memory) 31, ROM (Read Only Memory, read-only memory) 32, display part 33...

no. 2 approach

[0086] Figure 12 It is a figure which shows the schematic structure of WLRD20a in 2nd Embodiment of this invention. and image 3 Compared with the illustrated first embodiment, the only difference is that the flash ROM 400 a further includes a security state value 430 , and the other configurations are the same as those of the first embodiment. Therefore, only the parts different in configuration and operation from the first embodiment will be described below. In the drawings, the same reference numerals as those in the first embodiment described above are used for the same components as those in the first embodiment, and detailed description thereof will be omitted.

[0087] Figure 13 It is a figure which shows an example of the security state value 430 in 2nd Embodiment. The security status value 430 is a table storing status information on whether or not wireless packets are encrypted for each logical wireless network constructed by the communication unit 320 of the W...

no. 3 approach

[0097] Figure 15 It is a diagram showing a schematic configuration of a wireless communication system according to a third embodiment of the present invention. and figure 1 Compared with the first embodiment shown, the difference is that a plurality of WLRDs (WLRD20v to WLRD20z) are provided, and other configurations are the same as those of the first embodiment. Therefore, in the following description, only the parts whose configurations and operations are different from those of the first embodiment will be described, and descriptions of the same configurations will be omitted. In addition, in the drawings, the same symbols as those of the first embodiment described above are used for the same configuration as that of the first embodiment.

[0098] Figure 16 It is a sequence diagram showing the procedure of security setting processing in the third embodiment. and Figure 6 Compared with the first embodiment shown, the difference is that step S300 is added, and the out...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A wireless LAN relay device connecting an outer device to a network includes a communication section for controlling wired communication and wireless communication performed between the wireless LAN relay device and the outer device using a packet. The communication section performs, in an initial state, wireless communication without encrypting the packet, and encrypts, upon reception of a setting instruction from the outer device, the packet by using a predetermined encryption key and a predetermined encryption method which are preliminarily defined in the wireless LAN relay device.

Description

technical field [0001] The invention relates to a wireless local area network relay device. Background technique [0002] In recent years, a wireless local area network (Local Area Network, LAN) is becoming more and more popular. A wireless LAN is a network environment in which two-way communication is performed using radio waves between a wireless LAN access point (wireless LAN relay device) and a terminal (for example, a personal computer, etc.) equipped with a device for connecting to a wireless LAN. In a wireless local area network, as long as it is within the reach of radio waves, anyone can monitor the content of communication without using special tools. In this regard, a technique of encrypting wireless packets between a WLAN access point and a terminal has been proposed in the prior art (for example, Patent Document 1) as a countermeasure against this eavesdropping risk. [0003] However, the use of the above-mentioned prior art will encounter the following proble...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/04H04L29/06
CPCH04L63/162H04L63/0435H04W12/02H04W88/08H04W12/033
Inventor 沙武寿·沙哈里尔
Owner BUFFALO CORP LTD