Search

EP-4738908-A1 - METHOD FOR PROFILING A DEVICE BY AN ACCESS POINT BASED ON A HASH ALGORITHM, ACCESS POINT USED THEREFOR, AND METHOD FOR ASSIGNING A HASH ALGORITHM TO A DEVICE, APPARATUS USED THEREFOR

EP4738908A1EP 4738908 A1EP4738908 A1EP 4738908A1EP-4738908-A1

Abstract

Provided is a method for profiling a device by an access point based on a hash algorithm, comprising the steps of, by the access point, receiving data from the device, identifying a hash algorithm based on the received data, and, based on the hash algorithm, determining a profile corresponding to the device. Moreover, provided is an access point comprising means for carrying out said method. Furthermore, provided is a method for assigning a hash algorithm to a device, comprising the steps of learning a profile of the device, and, based on the profile, assigning a hash algorithm to the device. Moreover, provided is an apparatus comprising means for carrying out said method.

Inventors

  • AYGÜL, Mehmet Ali
  • Kirisken, Barbaros

Assignees

  • Vestel Elektronik Sanayi ve Ticaret A.S.

Dates

Publication Date
20260506
Application Date
20241104

Claims (15)

  1. A method for profiling a device by an access point based on a hash algorithm, comprising the steps of: by the access point, receiving data from the device, identifying a hash algorithm based on the received data, and based on the hash algorithm, determining a profile corresponding to the device.
  2. The method according to claim 1 comprising the further step of: configuring the access point based on the determined profile.
  3. The method according to any one of claims 1 to 2, wherein the received data is a confirmation-message used in a Simultaneous Authentication of Equals handshake between the access point and the device.
  4. The method according to any one of claims 1 to 3, wherein the hash algorithm is one out of MD5, SHA-1, SHA-256, BCRYPT, MD5-CRYPT, SHA3-256, SHA-512.
  5. The method according to any one of claims 1 to 4, wherein the profile comprises at least one security parameter to be used by the access point when communicating with the device.
  6. The method according to any one of claims 1 to 5, wherein the access point is a Wi-Fi access point.
  7. The method according to any one of claims 1 to 6, the device is a Wi-Fi client.
  8. Method for assigning a hash algorithm to a device, comprising the steps of: learning a profile of the device, and based on the profile, assigning a hash algorithm to the device.
  9. The method according to claim 8 wherein the hash algorithm is one out of MD5, SHA-1, SHA-256, BCRYPT, MD5-CRYPT, SHA3-256, SHA-512.
  10. The method according to any one of claims 8 and 9, wherein the learning the profile comprises determining the profile of the device based on machine learning.
  11. The method according to any one of claims 8 to 10, wherein the learning of the profile of the device is based on at least one out of the device's security requirements, and the device's wireless communication patterns.
  12. The method according to any one of claims 8 to 11, wherein the profile comprises at least one security parameter to be used by the device when communicating with an access point.
  13. The method according to any one of claims 8 to 12, wherein the device is a Wi-Fi client.
  14. An access point comprising means for carrying out the method according to any one of claims 1 to 7.
  15. An apparatus comprising means for carrying out the method according to any one of claims 8 to 13.

Description

Technical Field The present invention relates to profiling of a device based on a hash algorithm. In particular, the present invention relates to a method for profiling a device by an access point based on a hash algorithm, an access point comprising means for carrying out said method, a second method for assigning a hash algorithm to a device, and an apparatus comprising means for carrying out said second method. Background Access points, APs, allow devices to connect to a network. By way of non-limiting example, an access point may be provided in a home network, wherein said access point is connected by wire to a router. Now, a device, such as a laptop, may wirelessly connect to the access point. The access point may then relay any information transmitted from the device to the router, and relay any information transmitted from the router to the device. Depending on a respective device, an access point may be configured differently. This is often referred to as "profiling" a device or "setting up a profile for a device or a type of a device". E.g., a first set of security-related parameters may be set in the access point for relaying data between a router and a TV screen. Meanwhile, a second set of security related parameters may be set in the access point for relaying data between the router and a laptop. The respective sets of parameters are often referred to as profiles. The respective configurations of parameters at the access point may then be referred to as "profile" and the process of configuring said parameters in relation to types of devices may be referred to as "profiling". The above concept of "profiling" can be found in various network-configurations or types of networks involving access points. Some non-limiting examples of such networks comprise as a local area network, or a network compliant with WiFi standards, or a 4G or 5G telecommunications network. Conventionally, said profiles are configured manually, e.g., through the interface of an access point or using other network management tools. Setting up the mentioned profiles in an access point usually requires knowledge of the properties of the respective devices, knowledge of the access point's technical specifications, and knowledge and experience in handling the interface of the access point or other network tools required for configuring the access point. This results in work-intense and error-prone situations when setting up a network involving access points. Summary One of the objects of the present invention is to overcome at least one of the mentioned problems or to improve at least one of the prior art solutions. This object is achieved by the subject-matter according to the independent claims. Further preferred embodiments are given by the subject-matter according to the dependent claims. According to an aspect of the present invention, there is provided a method for profiling a device by an access point based on a hash algorithm, comprising the steps of: by the access point, receiving data from the device, identifying a hash algorithm based on the received data, and based on the hash algorithm, determining a profile corresponding to the device. According to a further aspect of the present invention, there is provided a method for assigning a hash algorithm to a device, comprising the steps of: learning a profile of the device, and based on the profile, assigning a hash algorithm to the device. Brief description of the drawings Embodiments of the present invention, which are presented for better understanding the inventive concepts, but which are not to be seen as limiting the invention, will now be described with reference to the figures in which: Figure 1 shows a flow chart corresponding to a first embodiment of the method for profiling a device by an access point based on a hash algorithm.Figure 2 shows a second embodiment of the method for profiling a device by an access point based on a hash algorithm.Figure 3 shows an example according to a third embodiment of the method for profiling a device by an access point based on a hash algorithm.Figure 4 shows a table according to an example according to a fourth embodiment of the method for profiling a device by an access point based on a hash algorithm.Figure 5 shows a fifth embodiment of the method for profiling a device by an access point based on a hash algorithm.Figure 6 shows an example according to a sixth embodiment of the method for profiling a device by an access point based on a hash algorithm.Figure 7 shows an example according to a seventh embodiment of the method for profiling a device by an access point based on a hash algorithm.Figure 8 shows an embodiment of a method for assigning a hash algorithm to a device.Figure 9 shows a table according to a further embodiment of the method for assigning a hash algorithm to a device.Figure 10 shows a further embodiment of a method for assigning a hash algorithm to a device.Figure 11 shows a further embodiment of a method fo