The present invention relates to a message validity determining method, and more particularly, to a message validity determining method applied in a wireless network to determine whether an information equipment is indeed connected to the wireless network.
Wireless Local Area Networks (WLANs) connect various kinds of local area network apparatus, such as Personal Computers (PCs), hubs, or switches etc. via wireless radio frequency (RF), and provide sharing of digital data between different local area networks, eliminating the need for layout of electrical lines and providing roaming users network environments anytime and anywhere.
Normally, the coverage area of a WLAN depends on openness of the environment. Without the provision of an external antenna, the coverage area is about 250 meters. If the space is half opened with some level of blocking, the coverage area is about 35-50 meters, the distance of which increases if an antenna is added. Along the maturity of network related technologies and network protocols, wireless communication networks are widely employed for convenient purpose. For an application of a standard wireless communication network, users only needs to have/insert a wireless network card in a information equipment (e.g. a desktop computer, a notebook computer, a pocket computer, a PDA or a mobile phone etc.) with a WLAN interface and installs an Access Point (AP) at the region requiring access to the network, thereafter the user can freely move in that region while still connected to the network.
A WLAN using the IEEE 802.11 standard allows the users to have information equipment equipped with a wireless network card, in order to wirelessly connect to the network within the effective area of a wireless base station (a access point). Since the development of the WLANs, application of the WLANs has always been a popular topic. In Taiwan, there are already numerous public places that provide wireless network connections. Many network providers also provide packages or monthly schemes of wireless connection for homes to suit the demands of the market. Although it is convenient to use a WLAN for connecting to a network, its data transmission security is in doubt. For example, if you are using a WLAN to connect to the Internet, your neighbors may easily access your WLAN to connect to the Internet and your shared files without your permission. Such situation is even worse for enterprises. Thus, in order to solve the security problem of WLANs, apart from setting a password, Wired Equivalent Privacy (WEP) is a common security protocol for current WLANs. WEP encrypts data to be transmitted, and a receiving end has to have the same key used at the transmitting end in order to decrypt the received data. Thus, even if the data is eavesdropped by a third person, there is no way to decrypt the data unless he/she has got the key. This data security method usually requires an authenticating mechanism to validate the secret keys.
Another kind of WLAN data encryption technology called WPA (Wi-Fi Protected Access) is proposed by Wi-Fi Alliance, it is similar to the WEP and only differs in the manner in which the secret key is generated. WPA allows clients to set/change their own authenticating passwords with a back-end LAN of a wireless base station (access point) at any time.
Besides the two data security technologies described above, which performs encryption key authentication, the encryption parameters adopted in other kinds of data security technologies (e.g. OPEN+WEP, WPAPSK-AES, WPAPSK-TKIP etc.) are unauthenticated. That is, when a user chooses to connect to the WLAN using an unauthenticated mechanism, even if the encryption parameter inputted is different from that stored in the wireless base station (access point), such as in the case of the user entered the wrong encryption key, a network-connected message will still be sent back from the wireless base station to the user. However, due to a mismatch of the encryption parameters, the user is not actually connected to the WLAN. At this point, the user will be confused as a result of the received message indicating that a WLAN connection has already been made.
Thus, there is a need in this field to provide a method of determining the validity of received messages indicating established network connections.
In the light of forgoing drawbacks, an objective of the present invention is to provide a message validity determining method for allowing users to properly perform subsequent operations.
Another objective of the present invention is to provide a message validity determining method so as to prevent the users from being misled by a connection-established message emitted by the wireless base station.
In accordance with the above and other objectives, the present invention discloses a message validity determining method. The method allows an information equipment to emit a testing message to a wireless base station upon receiving a connection-established message emitted by the wireless base station. If the wireless base station replies with a test-replying message, the information equipment is determined to be indeed connected to the wireless base station.
Compared with the prior art, the present invention determines whether the test-replying message is emitted by the wireless base station after the wireless base station receives the testing message, so as to determine the accuracy of the connection-established message. Therefore, the user can perform subsequent operations and will not misled by the connection-established message emitted by the wireless base station.
The present invention can be more fully understood by reading the following detailed description of the preferred embodiments, with reference made to the accompanying drawings, wherein:
FIGS. 2(A) to 2(F) are schematic block diagrams showing operations of the message validity determining method according to the present invention.
The present invention is described by the following specific embodiments. Those with ordinary skills in the arts can readily understand the other advantages and functions of the present invention after reading the disclosure of this specification. The present invention can also be implemented with different embodiments. Various details described in this specification can be modified based on different viewpoints and applications without departing from the scope of the present invention.
FIGS. 1, 2(A) to 2(F) illustrate schematic block diagrams related to a message validity determining method of the preferred embodiment according to the present invention. The message validity determining method of the present invention is described in conjunction with the drawings. It should be noted that the drawings are simplified schematic diagrams for illustrating the basic structures related to the present invention. Therefore the drawings only show elements and descriptions related to the present invention. The actual layout of the elements may be more complicated.
Please refer to
Before the method of the present invention is executed, please refer to
The following describes the message validity determining method of the present invention. Firstly, as shown in step S10 of
In step S11, determining whether the wireless base station returns a test-replying message. After the user manually controls the information equipment to emit the testing message to the wireless base station or the information equipment emits the testing message to the wireless base station automatically, determining whether the wireless base station returns a test-replying message within a predetermined time. If the wireless base station returns a test-replying message within the predetermined time, then proceed to step S12; or else if the wireless base station has not returned a test-replying message after the predetermined time has passed, then proceed to step S13. The test-replying message is a Dynamic Host Configuration Protocol test-replying message. The predetermined time can be set by the user or by the information equipment automatically.
Step S12 includes displaying a connection message on the information equipment. Please refer to
Step S13 includes displaying a non-connection message on the information equipment. Please refer to
From the above descriptions and diagrams, the technical features and embodiments of the present invention can be clearly understood. The message validity determining method of the present invention comprises emitting the testing message to the wireless base station after receiving the connection-established message from the wireless base station, and if a test-replying message is returned by the wireless base station, then the information equipment is verified to be connected to the wireless base station as well as the wireless network. Therefore, the present invention validates the connection-established message by the mechanism of sending a testing message to the wireless base station and determining whether a test-replying message is returned by the wireless base station. Thereby, the user is avoided of the situation of receiving a connection-established message sent by the wireless base station while actually no successful connection is established between the wireless base station and the information equipment, and so that subsequent operations can be taken based on the actual current situation.
The above embodiments are only used to illustrate the principles of the present invention, and they should not be construed as to limit the present invention in any way. The above embodiments can be modified by those with ordinary skills in the arts without departing from the scope of the present invention as defined in the following appended claims.
| Number | Date | Country | Kind |
|---|---|---|---|
| 094119956 | Jun 2005 | TW | national |