Wireless network system and wireless network access method

A wireless network system and wireless network technology, applied in the field of wireless network systems and wireless network access, can solve problems such as security consequences, increase production, increase costs, etc., to ensure legal connections, improve security performance, and avoid security loopholes Effect

Active Publication Date: 2015-11-18
CHENGDU CENTURY PHOTOSYNTHESIS TECH
View PDF7 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Both of the above two methods have disadvantages. The first method needs to reserve a configuration interface for each product, or preset PANID at the factory. If it is used for smart hardware products, it will increase the complexity of production, after-sales maintenance and user operations. , especially increasing the cost of production and after-sales
In the second method, in terms of operation, it is necessary to start the router to be connected to the network when the associated license is enabled on the wireless network. If the associated license is enabled for too long, the wireless network will be attacked maliciously, and if the start time is too short, the device will fail to connect to the network.
However, when there is a coordinator near the router that the device does not want to join, the router will not be able to access the desired network, and will also interact with the undesired coordinator, resulting in serious security consequences.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless network system and wireless network access method
  • Wireless network system and wireless network access method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0077] The device to be connected scans the surrounding routers that support wireless access, and obtains the beacon frames of the surrounding routers. The beacon frame watch list records invalid beacon frames and beacon frames with a bad history. Filter the router according to the beacon frame monitoring list in the device to be connected. Delete and filter out the beacon frames in the beacon frame monitoring list, keep the remaining beacon frames and cache them. Select a beacon frame with the largest signal strength value among the reserved beacon frames. The physical address and service set identification information are extracted from the beacon frame. The beacon frame contains the signal strength value (RSSI value). By parsing and comparing the strength value and selecting the beacon frame with the largest strength value, the largest strength value indicates that the wireless access point of the beacon frame is relatively far from the device to be connected. closer. T...

Embodiment 2

[0079]The Zigbee network enables the network access function by default, and there is no need to set it to be enabled at a specific time or manually enable this function. The router receives the network access information of the device to be connected, which includes the verification ID of the device to be connected, and the device to be connected is configured with a unique verification ID before the product leaves the factory. Afterwards, the router will judge whether the verification ID of the device to be connected is in the white list of the router. The white list is stored in the router by default. If the verification ID of the device to be connected is in the white list, the device to be connected is allowed to join the network. At the same time, devices whose authentication IDs are not in the whitelist cannot join the network. That is to say, the network itself can actively refuse the joining of other unapproved devices to be connected, which ensures the security of ...

Embodiment 3

[0089] In this embodiment, a ZigBee network is taken as an example to describe the present invention. Screening of devices to be connected based on the beacon frame monitoring list:

[0090] When the device to be connected sends a beacon request to at least one router and receives several beacon frames fed back by the router, it will filter the received beacon frames through the beacon frame monitoring list. All beacon frames in the beacon frame monitoring list are filtered and deleted, and then the remaining beacon frames are saved in the beacon buffer. This is the first screening performed by the device to be connected to at least one router.

[0091] Filtering based on the number of association history:

[0092] After the device to be accessed sends a beacon request to at least one router, and receives multiple beacon frames. Each beacon frame in the beacon cache has a record of historical association times. The device to be connected will initiate an association reques...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a wireless network system and a wireless network access method. The wireless network system comprises a coordinator and at least one router; the router is selected by equipment to be accessed based on a beacon frame monitoring list, and the router is provided with a white list for authenticating the equipment to be accessed; the coordinator is used for transmitting an authentication result of the white list and identification information of the equipment to be accessed to each router so as to accept/reject a re-connecting request of the equipment to be accessed. Through beacon frame buffer screening for the router, the wireless network system and the wireless network access method of the invention not only could filter ineffective or malicious equipment to be accessed, but also could select to obtain the most effective equipment to be accessed according to historical linkage times, thereby improving the safety performance of the wireless network.

Description

technical field [0001] The present invention relates to the technical field of communication, in particular to a wireless network system and a wireless network access method. Background technique [0002] With the development of network technology, the coverage area of ​​wireless network is getting larger and larger. Wireless network (wireless network) is a network realized by wireless communication technology. Wireless networks range from global voice and data networks, which allow users to establish wireless connections over long distances, to infrared and radio frequency technologies optimized for short-range wireless connections. The wireless network protocol defines a complete communication mechanism with low power consumption, high reliability, and low speed. It is very suitable for remote control of equipment, small data transmission, Internet of Things, industrial control and smart home fields. According to different application environments, there are four main t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W48/16H04L29/06H04W12/088
CPCH04L63/101H04W12/06H04W48/16
Inventor 罗一鸣张祠瑞王振
Owner CHENGDU CENTURY PHOTOSYNTHESIS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products