Abstract:
A method for establishing a connection between devices, a configuration device, and a wireless device. The method includes acquiring configuration password information of a first wireless device and device identifier information of the first wireless device; performing verification on the configuration password information of the first wireless device with the first wireless device; and sending, to the first wireless device, a first encryption value obtained after a generated device connection code is encrypted; acquiring configuration password information of the second wireless device and device identifier information of the second wireless device; performing verification on the configuration password information of the second wireless device with the second wireless device; and sending, to the second wireless device, a second encryption value obtained after the device connection code is encrypted and the device identifier information of the first wireless device.
Abstract:
Embodiments of the present invention provide a device association method, apparatus, and system, where the method includes: receiving a broadcast frame or a configuration response frame that includes access identification information generated by a first device and that is sent by a second device; and identifying the second device according to the access identification information and associating with the second device. In the embodiments of the present invention, the first device identifies a matched second device according to the access identification information, and then may directly associate with the second device, thereby avoiding a process of selecting a correct second device from multiple second devices, simplifying a process for the first device to join a WLAN in which the second device is located, and also making an operation by a user simpler.
Abstract:
A secure connection method for a network device includes: acquiring a public key operation value of a second device in an out-of-band manner; sending public key information of a first device to the second device; receiving public key information of the second device that is sent by the second device, and decrypting the public key information of the second device by using a private key of the first device, to obtain the public key of the second device; and performing a preset-algorithm operation on the public key of the second device to obtain a copy of the public key operation value of the second device, and after the copy of the public key operation value of the second device matches the public key operation value of the second device, accepting received connection information sent by the second device.
Abstract:
A secure connection method for a network device includes: acquiring a public key operation value of a second device in an out-of-band manner; sending public key information of a first device to the second device; receiving public key information of the second device that is sent by the second device, and decrypting the public key information of the second device by using a private key of the first device, to obtain the public key of the second device; and performing a preset-algorithm operation on the public key of the second device to obtain a copy of the public key operation value of the second device, and after the copy of the public key operation value of the second device matches the public key operation value of the second device, accepting received connection information sent by the second device.
Abstract:
A method for allocating an addressing identifier includes: notifying, by an access point, at least two stations of an encrypted new MAC address that corresponds to each station, and indicating a predetermined update condition, so that the at least two stations update respective MAC addresses to the respective new MAC addresses when the predetermined update condition is met; and when the predetermined update condition is met, updating, by the access point, the MAC addresses of the at least two stations to the new MAC addresses that correspond to the stations, so that when a message is subsequently received from the stations or sent to the stations, the new MAC addresses are used as the MAC addresses of the stations. In the foregoing manner, the present invention can prevent an eavesdropper from tracing, by using a MAC address, a terminal to acquire user privacy, ensuring security of the user privacy.
Abstract:
A wireless terminal configuration method, an apparatus, and a wireless terminal where the method includes scanning, by a registration apparatus, a multi-dimensional code of a wireless terminal to acquire multi-dimensional code information, where the multi-dimensional code information includes a configuration password of the wireless terminal, and encrypting, by the registration apparatus, configuration information based on the configuration password, and sending the encrypted configuration information to the wireless terminal through a wireless access device associated with the registration apparatus, such that the wireless terminal accesses the wireless access device according to the configuration information which may simplify a configuration process of a wireless terminal.
Abstract:
Embodiments of the present invention provide a method, device and system for configuring multiple devices, where multiple devices are configured simply and securely in a centralized manner. The method includes: acquiring, by a configuration device, device identity information, configuration password information, and network role attributes of at least two devices needing to be configured on a same wireless local area network WLAN; determining a central node device of the WLAN according to the network role attributes of the at least two devices; and sending device identity information and configuration password information of a non-central node device to the central node device, or sending, by the configuration device, device identity information and configuration password information of the central node device to the non-central node device.
Abstract:
A wireless terminal configuration method, device, and system. The method provided in the embodiments of the present disclosure includes acquiring, by a configuration device, device identification information and configuration password information of a wireless terminal; sending, by the configuration device, configuration triggering information to the wireless terminal according to the device identification information of the wireless terminal; performing, by the configuration device, verification with the wireless terminal according to the configuration password information; sending, by the configuration device, credential information required for the wireless terminal to access an access point (AP) and device identification information of the AP to the wireless terminal; and sending, by the configuration device, the credential information and the device identification information of the wireless terminal to the AP.