Communication system, and computer and device used in such system
A communication system, computer technology, applied in computing, transmission system, wireless communication and other directions, can solve problems such as user difficulty in operating users
Active Publication Date: 2006-12-06
BROTHER KOGYO KK
1 Cites 0 Cited by
AI-Extracted Technical Summary
Problems solved by technology
If the user is not familiar with wireless networks, su...
Abstract
A communication system including a computer and a device is provided. In the system, the computer includes a signal transmission unit configured to output a signal by wireless communication in accordance with a first wireless setting, and a setting data sending unit configured to transmit a second wireless setting data to the device in accordance with the first wireless setting if the device returns identification data of the device to the computer as a response to the signal output by the signal transmission unit. The device includes a detection unit configured to detect the signal output by the computer while changing a wireless setting for the device, a replying unit configured to return the identification data of the device to the computer corresponding to the source of the signal in accordance with a wireless setting used when the detection unit has detected the signal, a receiving unit configured to receive the second wireless setting data from the computer in accordance with the wireless setting used when the detection unit has detected the signal, after the replying unit transmits the identification data, and a setting unit configured to make wireless setting of the device in accordance with the second wireless setting data received by the receiving unit.
Application Domain
Network traffic/resource managementData switching by path configuration +4
Technology Topic
WirelessSignal source +2
Image
Examples
- Experimental program(1)
Example Embodiment
[0051] Hereinafter, an illustrative embodiment according to the present invention will be described with reference to the drawings.
[0052] figure 1 The system configuration of the communication system 100 according to the illustrative embodiment of the present invention is illustrated. Such as figure 1 As shown, the communication system 100 is equipped with a PC (personal computer) 1 and an MFD (multi-function device) 2. The MFD 2 is configured to have various functions including a printing function and a scanning function. in spite of figure 1 Only one multi-function device is shown in, but the communication system 100 can be equipped with more than one multi-function device. The PC 1 is connected to a wireless LAN (Local Area Network) in which "pc1" is used as an SSID (Service Setting Identifier).
[0053] The SSID is an identifier used to enable devices using the same SSID to communicate with each other in a wireless LAN. Since the SSID flows in the wireless network, if the SSID is not concealed according to the security setting, the device in the wireless LAN can obtain the SSID that flows through the wireless LAN and use the obtained SSID to communicate with another device. In a wireless LAN, a device without an SSID is allowed to communicate with another device with an SSID, although the security of wireless communication cannot be guaranteed in this case. Therefore, even if the PC 1 does not have the same SSID as the MFD 2, the PC 1 can establish a wireless connection with the MFD 2 by receiving radio waves of the wireless LAN.
[0054] The module name, serial number, and MAC (Media Access Control) address are stored in MFD 2 as identification data. In this embodiment, the module name is "LPR001", the serial number is "AB12345F", and the MAC address is "00:12:34:23:45:AB".
[0055] figure 2 The appearance and block diagram of the PC 1 are shown. Such as figure 2 As shown, the PC 1 is a notebook-type personal computer, which has a main body integrated with a display 12 and a keyboard 14. The PC 1 includes a CPU 20, a ROM 22, a RAM 24, an HDD (hard disk drive) 26, a CD-ROM drive 28, an input interface (I/F) 30, a video interface (I/F) 32, and a wireless LAN adapter 34. The CPU 20 controls various functions of the PC 1; the ROM 22 stores various programs, such as the BIOS executed by the CPU 20 in the startup process; the RAM 24 is used by the CPU 20 as a working memory; the HDD 26 stores various files including operating system files. File; CD-ROM drive 28 is used to read data from CD; input interface (I/F) 30 is configured to input input signals from keyboard 14 or mouse (not shown) connected to PC1 to CPU 20; The video interface (I/F) 32 is configured to display information on the display 12 under the control of the CPU 20; the wireless LAN adapter 34 is configured to connect wirelessly in accordance with the wireless communication standard (IEEE802.11 in this embodiment) Connect PC 1 with external equipment. These components are connected to each other via a bus 40.
[0056] image 3 Shows the appearance and block diagram of MFD 2. Such as image 3 As shown, the MFD 2 includes a CPU 60, a ROM 62, a RAM 64, an HDD (Hard Disk Drive) 66, a display panel 52, a setting unit 54, a timer 56, and a wireless LAN adapter 74. Among them, the CPU 60 controls various functions of the MFD 2; the ROM 62 stores various programs, such as the BIOS executed by the CPU 60 in the startup process; the RAM 64 is used by the CPU 60 as a working memory; the HDD 66 stores various programs executed by the CPU 60; Information is displayed on the display panel 52; the user can input instructions into the MFD 2 through the setting unit 54; the wireless LAN adapter 74 is configured to connect the MFD 2 through a wireless connection according to the wireless communication standard (IEEE802.11 in this embodiment). Connect with external equipment. These components are connected to each other via a bus 80.
[0057] Hereinafter, the operations of the PC 1 and MFD 2 will be described. 4 is a flowchart illustrating main processing executed under the control of the CPU 20 of the PC 1. For example, when a CD-ROM storing a main program for the main process is inserted into the CD-ROM drive 28 and the main program is read into the PC 1, the main process can be started. The main program can be copied to the HDD 26 in advance, so that the user operation performed by the user through the keyboard 14 can be used to start the main process.
[0058] When the main process is started, the application screen (for example, Figure 5A The screen shown in). In step S110, the CPU 20 saves the current setting data to the wireless communication settings on the PC 1 (hereinafter, referred to as wireless settings). For example, the CPU 20 saves the current wireless setting data in the RAM 24 or HDD 26.
[0059] Next, in step S115, the CPU 20 configures wireless settings. Specifically, the CPU 20 sets the SSID to "AUTOSETUP", and sets the security setting to "None". If the security setting is set to "None", wireless communication will be performed without maintaining security. By setting the security setting to “none”, the PC 1 is allowed to wirelessly communicate with the MFD 2 having wireless settings that do not match the wireless settings of the PC 1.
[0060] Next, in step S120, the CPU determines whether response data from the MFD 2 has been received. The response data contains identification data of MFD 2, such as the module name, serial number and MAC address of MFD 2. As described below, after the MFD 2 receives the message packet sent by the PC 1 (step S210), the response data is sent from the MFD 2, without specifying the purpose of the packet in the periodic broadcast processing started in step S130 Ground.
[0061] If it is determined in step S120 that no response data has been received (S120: No), control proceeds to step S125, in which the CPU 20 determines whether the transmission start button 12a for starting the transmission of the message packet on the application screen is pressed . Message grouping is in Figure 7 The packet is sent from the PC 1 to the MFD 2 in step S210 in order to inform the MFD 2 that the PC 1 can transmit data about the wireless settings for maintaining security (ie, the settings for performing wireless communication while maintaining security). Hereinafter, the wireless setting used when maintaining security is referred to as "secure wireless setting". This message packet contains a specific character string indicating that PC 1 is searching for MFD 2.
[0062] If the transmission start button 12a is pressed (S125: Yes), then control proceeds to step S130, in which periodic broadcast processing is started (see Figure 7 ). After the periodic broadcast processing is started, control returns to step S120. If the CPU 20 receives the response data from the MFD 2, control proceeds to step S135, in which the CPU 20 adds the identification data contained in the response data to the device list storing information about the device (multiple MFD 2) . That is, the identification data is stored in a predetermined area of the RAM 24 or HDD 26.
[0063] At this stage, the response data is pressed by the module name, serial number and MAC address of the device (multiple MFD 2) received by PC 1 Figure 5B It is displayed on the display 12 of the PC 1 as shown. After step S135 is completed, control returns to step S120. In this way, the MFD 2 that has returned the response data to the PC 2 is added to the device list.
[0064] If it is determined in step S125 that the transmission start button 12a is not pressed (S125: No), then control proceeds to step S140, in which the CPU 20 determines the transmission stop button 12b (see Figure 5A with 5B ) Is pressed. If the transmission stop button 12b is pressed (S140: Yes), control proceeds to step S145, in which the periodic broadcast processing started in step S130 is terminated. It should be noted that Figure 5A with 5B The application screen shown in is configured such that if the periodic broadcast processing has not been started, the send button 12b is not selectable (that is, the user cannot press the button 12b).
[0065] If it is determined in step S140 that the transmission stop button 12b is not pressed (S140: NO), then control proceeds to step S150, in which the CPU 20 determines whether the automatic wireless setting transmission button 12c is pressed. By pressing the automatic wireless setting sending button 12c, the user can cause the PC 1 to execute the process of automatically generating secure wireless settings in step S160 or S165.
[0066] If it is determined in step S150 that the automatic setting transmission button 12c is pressed (S150: YES), the control proceeds to step S155, in which the CPU 20 determines whether the wireless setting data saved in step S110 contains information about security Whether the setting items and the setting items about security are configured to remain safe. In other words, the CPU 20 judges whether the previous wireless setting data saved in step S110 indicates that the wireless communication is to be performed while maintaining security.
[0067] If the wireless setting data saved in step S110 contains setting items related to security and the setting items related to security are configured to maintain security (step S155: Yes), control proceeds to step S160, in which the CPU 20 Define the wireless setting data saved in step S110 as the setting data to be sent to the MFD 2 (ie, secure wireless setting). Then, control proceeds to step S180.
[0068] If the judgment result of S155 is "No", then control proceeds to step S165, in which the setting value of the wireless setting is automatically generated, as indicated below:
[0069] SSID: random string
[0070] Authentication method: WPA (Wi-Fi Protected Access)-PSK (Pre-Shared Key)
[0071] Network key: random string
[0072] Encryption mode: TKIP (Temporary Key Integrity Protocol)
[0073] For example, a program for generating a random character string as an SSID key or a network key can be stored in a CD-ROM together with the main program. In step S165, a procedure for generating a random character string as an SSID key or a network key is executed. After step S160 or S165 is processed, control proceeds to step S180.
[0074] If it is determined in step S150 that the automatic setting transmission button 12c is not pressed (S150: NO), then control proceeds to step S170, in which the CPU 20 determines whether the manual wireless setting transmission button 12d is pressed. By pressing the manual wireless setting sending button 12d, the user can cause the PC 1 to generate the setting value of the secure wireless setting in accordance with the instruction input by the user (step S175).
[0075] If it is determined in S170 that the manual wireless setting transmission button 12d is pressed (S170: YES), the control proceeds to step S175, in which the CPU 20 displays an input requesting the user to input the setting value of the secure wireless setting on the display 12 Screen (see Figure 6 ). In addition, in step S175, the CPU 20 determines whether the send button 12e is pressed, and the send button 12e is used to send the secure wireless setting data reflecting the setting value input by the user through the input screen. If the send button 12e is pressed (S175: YES), control proceeds to step S180.
[0076] In step S180, the secure wireless settings defined in step S160 (that is, the wireless settings saved in the HDD 26 in step S110), the secure wireless settings automatically generated in step S165, or the secure wireless settings that are automatically generated in step S165, or according to the input screen The secure wireless setting data generated by the setting value is sent to MFD 2. More specifically, in step S180, the secure wireless settings are sent to the Figure 5B Select the target device as shown on the application screen.
[0077] Next, in step S185, the CPU 20 determines whether the wireless setting consistent with the secure wireless setting data sent to the MFD 2 in step S180 should be applied to the PC 1. Specifically, in step S185, if the previous wireless device saved in step S160 can maintain security (that is, the previous wireless setting conforms to the secure wireless setting data), the CPU 20 determines that the application should not be applied to the PC 1 as in step S160. Wireless settings that are consistent with the secure wireless setting data sent to MFD 2 in S180. If the secure wireless setting is automatically generated in step S165 or the item specified by the user is used to communicate with the user on the input screen (see Figure 6 ) If the wireless setting consistent with the set setting value is applied to the PC 1, the CPU 20 determines that the wireless setting consistent with the secure wireless setting data sent to the MFD 2 in step S180 should be applied to the PC 1.
[0078] If the CPU 20 judges that the wireless setting consistent with the secure wireless setting data sent to the MFD 2 in step S180 should be applied to the PC 1 (S185: YES), the control proceeds to step S190, in which it is the same as in step S180 The wireless settings that match the secure wireless setting data sent to the MFD 2 are set on the PC 1. Then, the main process is terminated.
[0079] If the judgment result of step S170 or step S175 is "NO", control proceeds to step S195, in which the CPU 20 judges whether the main process should be terminated. Specifically, in step S195, the CPU 20 determines whether the main processing should be terminated by checking whether a stop button (not shown) for terminating the main processing is pressed. If the CPU 20 judges that the main process should not be terminated (S195: NO), control returns to step S120.
[0080] If the CPU 20 judges that the main processing should be terminated (S195: Yes) or the judgment result of S185 is “No” (ie, if the setting consistent with the secure wireless setting data sent to the MFD 2 should not be applied to the PC 1), control Proceed to step S200. In step S200, the CPU 20 restores the wireless setting data to the wireless setting saved in step S110. Then, the main process is terminated.
[0081] Below, will refer to Figure 7 The periodic broadcast processing executed in step S130 of the main processing under the control of the CPU 20 of the PC 1 is described. First, the CPU 20 waits for 2 seconds (step S205). The CPU 20 then broadcasts the message packet (step S210). Next, the CPU 20 judges whether there is a program end command for terminating the periodic broadcast processing (step S215). If the program end command exists (S215: Yes), the periodic broadcast processing is terminated. If the program end command is not present (S215: No), control returns to step S205.
[0082] Figure 8 It is a flowchart illustrating the automatic connection process executed under the control of the CPU 60 of the MFD 2. As described below, the automatic connection processing is processing for wireless communication with the PC 1 and for applying the secure wireless settings provided by the PC 1 to the MFD 2. The automatic connection process is performed by pressing the search button 54a provided in the setting unit 54 (see image 3 ) Is activated.
[0083] First, the CPU 60 of the MFD 2 saves current wireless setting data (ie, settings for wireless communication) to, for example, the RAM 64 or the HDD 66 (step S305).
[0084] Next, the CPU 60 changes the background color of the display panel 52 to yellow in order to notify the user that the MFD 2 is in a state of executing automatic connection processing (step S310). It should be noted that various types of colors or patterns can be used as the background of the display panel 52 in step S310, as long as the color (or pattern) used as the background enables the user to recognize that the MFD 2 is in a state of performing automatic connection processing. Just medium. A sound may be output to notify the user that the MFD 2 is in a state of performing automatic connection processing. This variation of the notification to notify the user that the MFD 2 is in the state of performing automatic connection processing can also be applied in steps S370 and S400.
[0085] In step S315, the CPU 60 resets the timer 56. Next, the CPU 60 sets the communication mode of wireless communication (step S320). In this embodiment, MFD 2 supports the communication modes of IEEE802.11b/g and IEEE802.11a. For example, IEEE 802.11b/g may be defined as the communication mode in step S320.
[0086] Next, in step S325, the CPU 60 sets a wireless channel to be used for wireless communication. In this embodiment, the number of available channels in the IEEE 802.11b/g communication mode is 14, and the number of available channels in the IEEE 802.11a communication mode is 4. Next, in step S330, the CPU 60 reads the SSID from the radio waves received by using the wireless settings set in steps S320 and S325. As described later, if the CPU 60 newly finds the SSID, the found SSID is added to a certain area (for example, a list) prepared in the RAM 64 or the HDD 66.
[0087] In step S335, the CPU 60 determines whether an SSID not included in the list is found. If an SSID not included in the list is found (S335: Yes), control proceeds to step S340, in which the CPU 60 resets the timer 56. Hereinafter, such an SSID that is newly found in step S335 and is not included in the list is referred to as a "new SSID".
[0088] Next, in step S345, the CPU 60 operates to connect to the wireless LAN network defined by the new SSID. It should be noted that in the wireless communication performed between the wireless LAN network defined by the new SSID and the MFD 2, security is not maintained.
[0089] Next, in step S350, the CPU 60 determines whether a certain type of data (message packet) from the PC 1 has been received within three seconds from the time when the timer 56 was reset in step S340. If a certain type of data is not received (S350: No), the CPU 60 adds the new SSID to the list. Then, control proceeds to step S360, in which the timer 56 is reset. Then, control returns to step S330.
[0090] If a certain type of data is received (S350: Yes), control proceeds to step S365, in which the CPU 60 sends response data containing the module name, serial number, and MAC address of the MFD 2 to the message packet PC1 of the source device is used as the identification data of MFD 2. Next, in step S370, the CPU 60 changes the background color of the display panel 52 to red, so as to notify the user that MFD 2 is in a state where the response data has been sent to PC 1 (that is, in MFD 2 waiting for PC 1 to transmit secure wireless settings Status).
[0091] In step S375, the CPU 60 waits until the data is received. If the secure wireless setting is transmitted from the PC 1 or 30 minutes have passed since the time when the timer 56 was reset in step S340, the control proceeds to the next step. If it is determined in step S375 that 30 minutes have passed (S375: 30 minutes have passed), control proceeds to step S380, in which the CPU 60 changes the wireless setting of the MFD 2 back to the setting data saved in step S305. That is, the wireless setting data saved in step S305 is applied to the MFD 2. Then, control proceeds to step S405. In this case, the display panel 52 still maintains a red background color because step S400 is not processed. Therefore, in this case, the user can recognize that the MFD 2 is not performing an operation to configure wireless settings.
[0092] If it is determined in step S375 that the secure wireless setting has arrived from the PC 1 (S375: setting received), control proceeds to step S385, in which the CPU 60 displays the IP address of the PC 1 and the slave on the display panel 52 The SSID sent by PC 1 as the setting value of the secure wireless setting, where PC 1 is the source of the secure wireless setting.
[0093] Next, in step S390, the CPU 60 displays an input screen on the display panel 52 for requesting the user to input an instruction on whether to apply the secure wireless setting to the MFD 2. Furthermore, the CPU 60 determines whether to apply the secure wireless setting to the MFD 2 according to the user input.
[0094]If the CPU 60 judges that the secure wireless setting should not be applied to the MFD 2 (S390: No), control proceeds to step S405. If the CPU 60 judges that the secure wireless setting should be applied to the MFD 2 (S390: Yes), control proceeds to step S395, in which the secure wireless setting data received in step S375 is applied to the MFD 2 as the wireless communication setting . Next, in step 400, the CPU 60 changes the background color of the display panel 52 to green in order to notify the user that the secure wireless setting data sent from the PC 1 has been successfully applied to the MFD 2. Then, control proceeds to step S405. In step S405, the CPU 60 resets the operation mode (i.e., the automatic connection mode), in which the processing is executed from step S310 to step S400.
[0095] On the other hand, if a new SSID is not found (step S335: No), control proceeds to step S410. In step S410, the CPU 60 determines whether 5 seconds have passed since the time when the timer 56 was reset in step S315. If 5 seconds have not passed (S410: NO), control returns to step S330. If 5 seconds have passed (S410: YES), control proceeds to step S415, in which the CPU 60 resets the timer 56.
[0096] Next, in step S420, the CPU 60 clears the list containing the SSID. Next, in step S425, the CPU 60 checks whether there is an unchecked wireless channel (that is, there is no wireless channel set in step S325). If there are unchecked wireless channels (S425: Yes), control returns to step S325 to set one of the unchecked channels. If there is no unchecked wireless channel (S425: No), the CPU 60 judges whether an unchecked communication mode (ie, a communication mode not set in step S320) exists (step S430). If there are unchecked communication modes (S430: Yes), control returns to step S320 to set one of the unchecked communication modes.
[0097] If there is no unchecked communication mode (S430: No), control proceeds to step S435, in which the CPU 60 changes the wireless setting of the MFD 2 back to the wireless setting data saved in step S305. Then, the automatic connection process is terminated.
[0098] As described above, in the communication system 100, the PC 1 sends a message packet to the MFD 2 in a predetermined wireless setting, which informs the MFD 2: that the PC 1 is ready to send a secure wireless setting for maintaining a secure wireless setting (step S210 ). The MFD 2 searches for the SSID of the PC 1 (step S330) while changing the wireless settings (steps S320 and S325). If a new SSID is found (S335: Yes) and the MFD 2 becomes capable of wireless communication with the PC 1 (S350: Yes), the secure wireless setting data is sent to the MFD 2 (step S180) and then the secure wireless setting is set to the MFD 2 (S395).
[0099] Therefore, according to this embodiment, the same wireless settings can be set to the PC 1 and the MFD 2, thereby establishing a wireless connection maintaining security between the PC 1 and the MFD 2. It should be noted that such a wireless connection can be established without requiring user operations to set the wireless settings for the PC 1 and MFD 2. Therefore, the user can easily make wireless settings for maintaining security.
[0100] In the above embodiment, if the user presses the sending start button 12a through the application screen displayed on the PC 1 (S 125: Yes), the message packet is sent to the PC 1, that is, the PC 1 enters the PC 1 and can send to the MFD 2 In the state of secure wireless setting (S210). This configuration provides users with the flexibility to start wireless settings for PC 1 and MFD 2 at the ideal moment.
[0101] In the above-mentioned embodiment, the setting value of the secure wireless setting is automatically generated in the PC 1 (steps S160 and S165). Such a configuration further facilitates user operations for establishing a secure wireless connection between the PC 1 and the MFD 2.
[0102] In the above embodiment, the secure wireless setting is determined based on user input (step S175). Such a configuration provides the user the flexibility to be able to enter ideal setting values for the secure wireless settings.
[0103] In the above-described embodiment, the automatic connection processing is started in the MFD 2 when the search button 54a of the setting unit 54 is pressed. Such a configuration provides the user with the flexibility to be able to start wireless settings regarding wireless communication between the MFD 2 and the PC 1 at an ideal moment.
[0104] In the above embodiment, if the MFD 2 receives the message packet from the PC 1 (S350: Yes), the MFD 2 transmits its own identification data to the PC 1 that sent the message packet (step S365). The PC 1 then displays the information based on the received identification data on the display 12 (step S385), and enables the user to select one of the devices (ie, MFD 2). This configuration provides the user with the flexibility to select the target device (MFD 2) for which the user wishes to set wireless settings.
[0105] Although the present invention has been described in detail with reference to a certain preferred embodiment thereof, there may be other embodiments.
[0106] In the above-mentioned embodiment, the communication system 100 is composed of the personal computer 1 and the MFD 2. However, in the communication system 100, a different type of computer (such as a server or a terminal device) can be used instead of the personal computer 1 by providing such a computer having the function of the personal computer 1. In the communication system 100, different types of equipment (such as printers or scanners) can be used instead of MFD2 by providing such equipment with the function of MFD 2, or different types of equipment can be used in addition to MFD 2.
[0107] More than one multifunctional device may be provided in the communication system 100. In this case, the PC 1 can be configured to simultaneously send secure wireless setting data to more than one multi-function device. Optionally, the PC 1 may sequentially send the security wireless setting data to more than one multi-function device.
[0108] In the above-described embodiment, the setting unit 54 of the multifunction device 2 is formed as an independent switching unit. However, the setting unit may be configured as a touch panel integrated with the display panel 52 and cover the top of the display panel 52.
PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.