WO2019011328A1 - Procédé et dispositif d'accès sans fil - Google Patents
Procédé et dispositif d'accès sans fil Download PDFInfo
- Publication number
- WO2019011328A1 WO2019011328A1 PCT/CN2018/095625 CN2018095625W WO2019011328A1 WO 2019011328 A1 WO2019011328 A1 WO 2019011328A1 CN 2018095625 W CN2018095625 W CN 2018095625W WO 2019011328 A1 WO2019011328 A1 WO 2019011328A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- wireless access
- access point
- secure transmission
- transmission channel
- accessed
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
Definitions
- the present disclosure relates to, but is not limited to, the field of wireless communications.
- the access device and the wireless network are interconnected by accessing the device to be accessed (Acess Point, AP), which has become the most commonly used wireless access means.
- AP Au Point
- the security of wireless access and the convenience of user operation.
- these two basic demands are often contradictory.
- the existing wireless access method can guarantee the security of wireless access, it affects the convenience of the user to perform wireless access operations.
- the device to be accessed when the device to be accessed accesses the wireless access point, the device to be accessed stores the Service Set Identifier (SSID) and the security key locally, and the SSID and the security key are stolen. Take risks and affect safety.
- SSID Service Set Identifier
- a wireless access method comprising: acquiring access information required to access a wireless access point through a secure transmission channel; and accessing the wireless according to the access information Access Point.
- a wireless access method includes: transmitting, by using a secure transmission channel, access information required for accessing a wireless access point to a device to be accessed, so that the to-be-connected The ingress device accesses the wireless access point according to the access information.
- a wireless access apparatus comprising: an acquisition module configured to acquire access information required to access a wireless access point through a secure transmission channel; and an access module configured to Accessing the wireless access point according to the access information.
- a wireless access apparatus including: a transmission module, configured to send, by using a secure transmission channel, access information required for accessing a wireless access point to a device to be accessed, so as to enable The access device is configured to access the wireless access point according to the access information.
- a wireless device comprising a memory and a processor, wherein the memory is coupled to a processor, the processor executing a computer program stored on the memory, executing a computer program according to the present disclosure Wireless access method.
- a wireless access point comprising a memory and a processor, wherein the memory is coupled to a processor, the processor executing the computer program stored on the memory, according to the present invention Public wireless access method.
- a computer readable storage medium having stored thereon a computer program executed by one or more processors, the one or more processors executing according to the present disclosure Wireless access method.
- FIG. 1 is a schematic flow chart of a wireless access method according to an embodiment of the present disclosure
- FIG. 2 is a schematic flowchart of a wireless access method according to another embodiment of the present disclosure.
- FIG. 3 is a schematic flowchart of a wireless access method according to another embodiment of the present disclosure.
- FIG. 4 is a block diagram showing the structure of a wireless access system according to an embodiment of the present disclosure
- FIG. 5 is a schematic structural diagram of a host end according to an embodiment of the present disclosure.
- FIG. 6 is a schematic structural diagram of a device end according to an embodiment of the present disclosure.
- FIG. 7 illustrates a flowchart of a method of wireless access based on an SSID and a security key mode, according to an embodiment of the present disclosure
- FIG. 8 is a schematic structural diagram of a wireless access device according to an embodiment of the present disclosure.
- FIG. 9 is a schematic structural diagram of a wireless access device according to another embodiment of the present disclosure.
- the existing wireless access method can ensure the security of the wireless access.
- the operation process is cumbersome, and the device to be accessed cannot be quickly and conveniently.
- Access to the wireless access point affects the convenience of the user to perform wireless access operations.
- the device to be accessed accesses the wireless access point, the device to be accessed stores the SSID and the security key locally, so that although the device to be accessed by the user is convenient for wireless access, the SSID exists. And the risk of security keys being stolen, affecting security.
- WiFi wireless Fidelity
- the user first needs to know the SSID and security key of the wireless access point, and then needs to be in the device to be accessed. Find the interface to connect to WiFi, open the WiFi switch and select the corresponding SSID, and finally enter the corresponding security key to access.
- WiFi Protected Setup WPS
- the user first needs to know the concept of WPS, and then needs to find the interface connecting WPS and open the WPS connection on the device to be accessed.
- the WPS button is found in a plurality of buttons of the wireless access point and the WPS action is triggered within a specified time. It can be seen that the existing wireless access operation procedure is not conducive to the user's convenient access to the wireless access point.
- FIG. 1 is a schematic flowchart of a radio access method according to an embodiment of the present disclosure, where the radio access method is applicable to a device to be accessed.
- a wireless access method may include steps S101 to S102.
- step S101 access information required for accessing the wireless access point is obtained through the secure transmission channel.
- step S102 the wireless access point is accessed according to the access information.
- the device to be accessed by the wireless access point obtains access information required for accessing the wireless access point through the secure transmission channel, and accesses the wireless access point according to the access information. .
- the user does not need to be familiar with the flow of the wireless access operation, and can quickly and conveniently access the wireless access point, thereby improving the convenience of the user to perform wireless access operations.
- the device to be accessed can obtain access information through the wireless channel, ensuring the security of information transmission.
- the access device does not need to store the access information locally, but directly obtains the access information from the secure channel, thereby avoiding the risk of the access information being stolen and improving the security of the wireless access.
- the method may further include: establishing a secure transmission channel for transmitting data with the wireless access point.
- a physical channel may be established with the wireless access point by means of a data connection line, and a secure transmission channel for transmitting data may be established on the physical channel.
- the physical channel can be a physical channel established by a close-range wired connection.
- Universal Serial Bus (USB) is a very common data transmission method used in the scene. It has the characteristics of close-range and face-to-face operation, which can ensure sufficient security.
- the wireless access point and the device to be accessed may be connected through a USB data line, and accordingly, the physical channel may be a USB physical channel.
- the disclosure is not limited thereto, and may be established between other wireless access points and devices to be accessed by other wired communication methods, such as optical fibers, Asymmetrical Digital Subscriber Loop (ADSL), Ethernet, and the like.
- the corresponding physical channel is not limited in the embodiment of the present disclosure.
- step S101 may include: transmitting, to the wireless access point, request information for acquiring access information required to access a wireless access point; and receiving the wireless access point to send according to the request information.
- the access information may include: transmitting, to the wireless access point, request information for acquiring access information required to access a wireless access point; and receiving the wireless access point to send according to the request information.
- the method may further include: closing the secure transmission channel, that is, disconnecting the physical connection with the wireless access point.
- the access information required to access the wireless access point may include: identification information of the wireless access point and a security key.
- the access information may further include an encryption method or the like.
- the identifier information may be an SSID of the wireless access point, or may be other identifier information, which is not limited in this disclosure.
- FIG. 2 is a schematic flowchart of a wireless access method according to another embodiment of the present disclosure, and the method may be applied to a wireless access point.
- a wireless access method may include step S201.
- step S201 the access information required to access the wireless access point is sent to the device to be accessed through the secure transmission channel, so that the device to be accessed accesses the wireless access point according to the access information.
- the wireless access point sends the access information required for accessing the wireless access point to the device to be accessed through the secure transmission channel, so that the device to be accessed accesses the wireless access point according to the access information.
- the user does not need to be familiar with the flow of the wireless access operation, and can quickly and conveniently access the wireless access point, thereby improving the convenience of the user to perform wireless access operations.
- the device to be accessed can obtain access information through the wireless channel, ensuring the security of information transmission.
- the access device does not need to store the access information locally, but directly obtains the access information from the secure channel, thereby avoiding the risk of the access information being stolen and improving the security of the wireless access.
- the method may further include: establishing a secure transmission channel for transmitting data with the device to be accessed.
- a physical channel can be established with the device to be accessed by means of a data connection line, and a secure transmission channel for transmitting data can be established on the physical channel.
- the step S201 may include: receiving, by the device to be accessed, request information for acquiring access information required for accessing a wireless access point; and transmitting, according to the request information, the device to be accessed Sending the access information.
- the device to be accessed may be a variety of mobile terminals, including but not limited to a smart phone, a tablet, a smart wristband, etc., and the wireless access point may be a routing device, etc., which is not limited in this disclosure.
- FIG. 3 is a schematic flowchart of a wireless access method according to another embodiment of the present disclosure.
- the WiFi network has become the preferred method for the last 10 meters of the entire communication channel due to its convenience and free attributes.
- the description is made by taking the device to be accessed as a WiFi client and the wireless access point as a WiFi access point.
- the wireless access method according to another embodiment of the present disclosure may include steps S301 to S306.
- step S301 a USB physical channel between the WiFi access point and the WiFi client is established through the USB data line.
- step S301 may include: connecting a WiFi access point and a WiFi client by using a USB data line; and setting a working mode of the WiFi access point and the WiFi client on both sides of the USB data line.
- a WiFi access point functions as a host and can operate in a host mode
- a WiFi client functions as a device and can operate in a device mode.
- FIG. 4 shows a structural block diagram of a wireless access system according to an embodiment of the present disclosure. As shown in FIG. 4, the wireless access system may include a host end and a device end, wherein the host end and the device end may be connected by, for example, a USB data line.
- 5 and 6 respectively show structural diagrams of a host side and a device side according to an embodiment of the present disclosure.
- the host side may include a USB protocol layer, a Remote Network Driver Interface Specification (RNDIS)/Ethernet Networking Control Model (ECM) protocol layer, and a hypertext transfer protocol (Hyper).
- the Text Transport Protocol (HTTP) protocol layer, the World Wide Web Server (WEB Server) layer, and the WiFi application management layer therefore, implement the WiFi-related interface channel of the host side from top to bottom.
- the device side may include a USB protocol layer, an RNDIS/ECM protocol layer, an HTTP protocol layer, a WEB client layer, and a one-click access application layer. Therefore, the device-side Wi- is implemented from top to bottom. Fi related interface channel.
- the WiFi access point on both sides of the USB data line can be made by the USB OTG (USB On-The-Go) function. Both the WiFi client and the WiFi client work in device mode, that is, data transmission between devices on both sides of the USB data line without the host.
- the working mode of the WiFi access point and the WiFi client on both sides of the USB data line can be configured through some logic switches, and details are not described herein.
- USB physical channel also called a trusted channel
- step S302 a secure transmission channel between the WiFi access point and the WiFi client is established.
- the device mode can be embodied as a more compatible and higher rate RNDIS/ECM mode.
- RNDIS/ECM mode an IP address assigned by the host is obtained, and the interaction is performed based on the Transmission Control Protocol/Internet Protocol (TCP/IP) and the host.
- TCP/IP Transmission Control Protocol/Internet Protocol
- a WiFi client may include an Android (Android) terminal and an iOS terminal, support reporting of an ECM port, and may operate in an ECM mode.
- WiFi access points (such as routing devices) also support ECM drivers.
- the WiFi access point can support multi-WiFi client access, and has a dynamic host configuration protocol (Dynamic Host Configuration Protocol (DHCP)) and other services related to the network channel.
- DHCP Dynamic Host Configuration Protocol
- a secure transmission channel also referred to as a network channel or a data channel for transmitting data between the WiFi access point and the WiFi client can be established on the USB physical channel.
- step S303 it is determined whether the service of the WiFi access point is ready. If it is ready, step S304 is performed; otherwise, step S302 is returned.
- the service of the WiFi access point may be an HTTP service.
- the service of the WiFi access point may also be other services, which is not limited in this disclosure.
- the WiFi client requests to obtain the access information required to access the WiFi access point from the WiFi access point.
- the WiFi client can send request information for obtaining access information required to access the wireless access point to the WiFi access point.
- the access information may include unique identification information (eg, SSID) of the WiFi access point, and in addition, the access information may further include a security key, an encryption method, and the like.
- unique identification information eg, SSID
- the access information may further include a security key, an encryption method, and the like.
- step S305 the WiFi client determines whether the access information required to access the WiFi access point is received from the WiFi access point, and if so, proceeds to step S306; otherwise, returns to step S304.
- the WiFi access point After step S304, the WiFi access point returns a response message to the WiFi client according to the request (ie, the request information).
- the WiFi client can determine whether the response message carries the access information required to access the WiFi access point. If the required access information is carried, step S306 is performed; if the required access information is not successfully received from the WiFi access point, then step S304 is returned.
- step S306 the WiFi client turns on the WiFi function and connects to the WiFi access point.
- the WiFi client After successfully receiving the access information required for accessing the WiFi access point from the WiFi access point, the WiFi client can enable the WiFi function and connect the WiFi access point based on the received access information.
- the method of connecting the WiFi access point may be all the connection methods stipulated by the 802.11 protocol.
- the WiFi client can be conveniently connected to the WiFi access point only by connecting the WiFi access point and the WiFi client by using the USB data cable, without the user being familiar with the wireless access process and improving the user operation. Convenience.
- the WiFi client can save the risk of being stolen without storing the SSID and the security key.
- data is transmitted through a secure transmission channel or a trusted channel between the WiFi access point and the WiFi client, and data security is also ensured.
- FIG. 7 illustrates a flow chart of a method of wireless access based on SSID and security key mode, in accordance with an embodiment of the present disclosure.
- a method for performing wireless access based on an SSID and a security key manner may include steps S701 to S705.
- step S701 a USB physical channel between the WiFi access point and the WiFi client is established through the USB data line.
- step S702 a secure transmission channel between the WiFi access point and the WiFi client is established.
- the WiFi access point enumerates the network port ECM device, and assigns an IP address to the USB network port of the WiFi client based on the DHCP, thereby establishing a secure transmission channel of the TCP/IP layer between the WiFi access point and the WiFi client (also called For network channels or data channels).
- the WiFi client acquires access information, including an SSID and a security key, required to access the WiFi access point from the WiFi access point through the secure transmission channel.
- the access information may also include an encryption method.
- step S704 the WiFi client turns on the WiFi function, and connects the WiFi access point according to the acquired SSID and security key of the WiFi access point.
- the WiFi function of the WiFi client is not enabled, the WiFi function of the WiFi client is first turned on, and then the WiFi access point is connected according to a standard protocol flow.
- step S705 after the WiFi client successfully connects to the WiFi access point, the USB connection of the WiFi access point and the WiFi client is disconnected, and communication is performed based on the WiFi connection.
- USB data cable is only used for the transmission process of the access information. Therefore, after the connection is successful, the USB data cable connection between the WiFi client and the WiFi access point (ie, the USB connection) can be disconnected, and communication is performed through the WiFi network.
- the WiFi access point can wait for a new WiFi client to perform wireless access based on the USB mode and perform the next USB-based interaction.
- the wireless access method according to the present disclosure does not need to find an interface for connecting WiFi on the WiFi client, and does not need to input the SSID and the security key, but only by using the USB data.
- the WiFi client can be conveniently connected to the WiFi access point, which improves the convenience of user operation.
- the WiFi client can also reduce the risk of being stolen without storing the SSID and security key.
- data is transmitted through a secure transmission channel or a data channel between the WiFi access point and the WiFi client, and data security is also ensured.
- FIG. 8 is a schematic structural diagram of a wireless access device according to an embodiment of the present disclosure.
- a wireless access device includes an acquisition module 801 and an access module 802.
- the obtaining module 801 is configured to acquire access information required to access the wireless access point through the secure transmission channel.
- the access module 802 is configured to access the wireless access point based on the access information.
- the wireless access device may further include a first channel establishment module 803 configured to establish a secure transmission channel for transmitting data with the wireless access point.
- the first channel establishing module 803 can establish a physical channel with the wireless access point by means of a data connection line, and establish a secure transmission channel for transmitting data on the physical channel.
- the obtaining module 801 may transmit, to the wireless access point, request information for acquiring access information required to access the wireless access point, and receive access information that the wireless access point transmits according to the request information.
- the wireless access device may further include a channel shutdown module 804 configured to turn off the secure transmission channel.
- FIG. 9 is a schematic structural diagram of a wireless access device according to another embodiment of the present disclosure.
- a wireless access apparatus may include: a transmission module 901 configured to send access information required for accessing a wireless access point to a device to be accessed through a secure transmission channel. So that the device to be accessed accesses the wireless access point according to the access information; and the second channel establishing module 902 is configured to establish a secure transmission channel for transmitting data with the device to be accessed.
- the second channel establishing module 902 can establish a physical channel with the device to be accessed through a data connection line, and establish a secure transmission channel for transmitting data on the physical channel.
- the transmission module 901 may receive request information for acquiring access information required for accessing a wireless access point, and send the access information to the device to be accessed according to the request information.
- Embodiments of the present disclosure also provide a wireless device including a memory and a processor, wherein the memory is coupled to a processor that, when executing a computer program stored on the memory, performs embodiments in accordance with the present disclosure Wireless access method.
- Embodiments of the present disclosure also provide a wireless access point including a memory and a processor, wherein the memory is coupled to a processor that executes each of the computer programs stored on the memory in accordance with the present disclosure Wireless access method of an embodiment.
- Embodiments of the present disclosure also provide a computer readable storage medium having stored thereon a computer program executed by one or more processors, the one or more processors executing implementations in accordance with the present disclosure Example of a wireless access method.
- the wireless access device When the wireless access device is implemented in the form of a software functional unit and sold or used as a standalone product, it can be stored in a computer readable storage medium. Based on such understanding, all or part of the technical solutions of the present disclosure may be embodied in the form of a software product stored in a storage medium, including a plurality of instructions for causing a computer device (which may be a personal computer, A server or network device or the like) performs all or part of the steps of the wireless access method according to various embodiments of the present disclosure.
- the storage medium includes: a U disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic disk, or an optical disk, and the like, which can store program codes.
- the access information required for accessing the wireless access point can be obtained through the secure transmission channel, and the wireless access point can be quickly and conveniently accessed, thereby improving the security of the wireless access and the operation of the user. Convenience.
- Such software may be distributed on a computer readable medium, which may include computer storage media (or non-transitory media) and communication media (or transitory media).
- computer storage medium includes volatile and nonvolatile, implemented in any method or technology for storing information, such as computer readable instructions, data structures, program modules or other data. Sex, removable and non-removable media.
- Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disc (DVD) or other optical disc storage, magnetic cartridge, magnetic tape, magnetic disk storage or other magnetic storage device, or may Any other medium used to store the desired information and that can be accessed by the computer.
- communication media typically includes computer readable instructions, data structures, program modules or other data in a modulated data signal, such as a carrier wave or other transport mechanism, and can include any information delivery media. .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Les modes de réalisation de la présente invention concernent un procédé et un dispositif d'accès sans fil. Le procédé consiste à : acquérir, via un canal de transmission sécurisé, des informations d'accès requises pour accéder à un point d'accès sans fil ; et accéder au point d'accès sans fil d'après les informations d'accès.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201710576077.7 | 2017-07-14 | ||
| CN201710576077.7A CN109429228A (zh) | 2017-07-14 | 2017-07-14 | 一种无线接入方法和装置 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2019011328A1 true WO2019011328A1 (fr) | 2019-01-17 |
Family
ID=65002305
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2018/095625 Ceased WO2019011328A1 (fr) | 2017-07-14 | 2018-07-13 | Procédé et dispositif d'accès sans fil |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN109429228A (fr) |
| WO (1) | WO2019011328A1 (fr) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN114630285A (zh) * | 2022-01-28 | 2022-06-14 | 浙江大华技术股份有限公司 | 一种数据传输方法、设备、系统和计算机可读存储介质 |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN115551115A (zh) * | 2022-09-28 | 2022-12-30 | 无锡睿勤科技有限公司 | 一种wifi连接的方法及装置 |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101873719A (zh) * | 2010-05-31 | 2010-10-27 | 华为终端有限公司 | 一种配置wifi参数的方法、装置及系统 |
| US20120120933A1 (en) * | 2010-11-12 | 2012-05-17 | Deutsche Telekom Ag | Method for enhanced radio resource management in a public land mobile network |
| CN103957593A (zh) * | 2014-01-17 | 2014-07-30 | 北京奇虎科技有限公司 | 无线网络接入方法、装置和系统 |
| CN103974376A (zh) * | 2014-04-14 | 2014-08-06 | 深圳市慧为智能科技有限公司 | 网络连接协助系统及方法 |
| US20150156817A1 (en) * | 2012-06-07 | 2015-06-04 | Cell Buddy Network Ltd. | Mobile hot spot |
Family Cites Families (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101568169A (zh) * | 2009-05-07 | 2009-10-28 | 北京百纳威尔科技有限公司 | 通信方法、装置和系统 |
| CN101980578A (zh) * | 2010-10-15 | 2011-02-23 | 华为终端有限公司 | 一种共享移动网络的方法及移动终端 |
| CN102724575A (zh) * | 2012-04-20 | 2012-10-10 | 苏州汉辰数字科技有限公司 | 一种用USB WiFi模块在双向数字机顶盒上实现WiFi AP功能的方法 |
| US20140071959A1 (en) * | 2012-09-07 | 2014-03-13 | Nokia Corporation | Method, apparatus, and computer program product for coexistence of wireless networks |
-
2017
- 2017-07-14 CN CN201710576077.7A patent/CN109429228A/zh not_active Withdrawn
-
2018
- 2018-07-13 WO PCT/CN2018/095625 patent/WO2019011328A1/fr not_active Ceased
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101873719A (zh) * | 2010-05-31 | 2010-10-27 | 华为终端有限公司 | 一种配置wifi参数的方法、装置及系统 |
| US20120120933A1 (en) * | 2010-11-12 | 2012-05-17 | Deutsche Telekom Ag | Method for enhanced radio resource management in a public land mobile network |
| US20150156817A1 (en) * | 2012-06-07 | 2015-06-04 | Cell Buddy Network Ltd. | Mobile hot spot |
| CN103957593A (zh) * | 2014-01-17 | 2014-07-30 | 北京奇虎科技有限公司 | 无线网络接入方法、装置和系统 |
| CN103974376A (zh) * | 2014-04-14 | 2014-08-06 | 深圳市慧为智能科技有限公司 | 网络连接协助系统及方法 |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN114630285A (zh) * | 2022-01-28 | 2022-06-14 | 浙江大华技术股份有限公司 | 一种数据传输方法、设备、系统和计算机可读存储介质 |
Also Published As
| Publication number | Publication date |
|---|---|
| CN109429228A (zh) | 2019-03-05 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20220303276A1 (en) | Network connection method, hotspot terminal and management terminal | |
| TWI533740B (zh) | 經由點對點鏈結存取的分享網路 | |
| KR101743195B1 (ko) | 정보 제공방법, 장치, 프로그램 및 기록매체 | |
| CN104735814A (zh) | 自动接入WiFi网络的接入方法、系统、和相关装置 | |
| EP3490304B1 (fr) | Procédé d'identification d'un point d'accès et d'un point d'accès sans fil, et produites associées | |
| CN103931264A (zh) | 通信连接建立方法和终端 | |
| KR102036686B1 (ko) | 무선 통신 시스템에서 채널을 선택하기 위한 방법 및 장치 | |
| CN103327644A (zh) | 一种无线连接的方法及设备 | |
| WO2018107593A1 (fr) | Procédé et dispositif de partage d'un fichier entre différents terminaux | |
| CN105992306A (zh) | 一种终端与家庭网关的绑定方法 | |
| US20130223361A1 (en) | Terminal and method for establishing wireless access channel | |
| CN103327645A (zh) | 一种连接网络的方法及装置 | |
| WO2016029847A1 (fr) | Procédés et appareil pour commuter entre une communication filaire et une communication sans fil | |
| WO2014134787A1 (fr) | Procédé de communication par radiofréquence, dispositif et dispositif terminal d'une communication en champ proche | |
| WO2020054365A1 (fr) | Dispositif de communication, procédé de communication, et programme | |
| US10321494B2 (en) | Method and apparatus for communicating in a wireless communication network | |
| WO2015098162A1 (fr) | Dispositif de bord et procédé de commande pour dispositif de bord | |
| JP2015146561A (ja) | ネットワーク電子機器、その制御方法及びプログラム | |
| CN107432043B (zh) | 一种nan设备之间的寻呼方法及nan设备 | |
| CN116962114A (zh) | 基于分布式软总线的设备互联方法、装置、设备及介质 | |
| CN115834115A (zh) | 设备鉴权组网方法、装置、设备及存储介质 | |
| WO2015139401A1 (fr) | Système et procédé d'établissement pour réseau sans fil, et dispositif de routage sans fil | |
| WO2019011328A1 (fr) | Procédé et dispositif d'accès sans fil | |
| GB2524646A (en) | Communication apparatus, information processing apparatus, and control method for the same | |
| CN113301542B (zh) | 配对连接方法、装置、存储介质及电子设备 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18832655 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 18832655 Country of ref document: EP Kind code of ref document: A1 |