WO2016026426A1 - Sending beacon frames - Google Patents

Sending beacon frames Download PDF

Info

Publication number
WO2016026426A1
WO2016026426A1 PCT/CN2015/087353 CN2015087353W WO2016026426A1 WO 2016026426 A1 WO2016026426 A1 WO 2016026426A1 CN 2015087353 W CN2015087353 W CN 2015087353W WO 2016026426 A1 WO2016026426 A1 WO 2016026426A1
Authority
WO
WIPO (PCT)
Prior art keywords
type
encryption algorithm
wireless service
pmf
beacon frame
Prior art date
Application number
PCT/CN2015/087353
Other languages
French (fr)
Inventor
Jia Liu
Original Assignee
Hangzhou H3C Technologies Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou H3C Technologies Co., Ltd. filed Critical Hangzhou H3C Technologies Co., Ltd.
Publication of WO2016026426A1 publication Critical patent/WO2016026426A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Definitions

  • an access point may periodically send a beacon frame for a certain wireless service, and a range covered by the beacon frame is a basic service set (BSS) .
  • BSS basic service set
  • the STA may parse the beacon frame and learn the corresponding wireless service, so as to enable a user to decide whether the user is to join the wireless service.
  • a protected management frame is a kind of wireless service.
  • the PMF wireless service is to provide an encryption mechanism for wireless management packets.
  • the PMF can provide safer guarantees for the wireless communication.
  • FIG. 1 is a schematic diagram illustrating a flowchart of a method for sending a beacon frame according to an example of the present disclosure
  • FIG. 2 is a schematic diagram illustrating a structure of an AP according to an example of the present disclosure.
  • FIG. 3 is a schematic diagram illustrating a structure of an AP according to an example of the present disclosure.
  • a PMF wireless service may support an advanced encryption standard counter cipher mode with block chaining message authentication code protocol secure hash algorithm 256 (AES-CCMP-SHA 256) encryption algorithm, but may not support a temporal key integrity protocol (TKIP) encryption algorithm.
  • AES-CCMP-SHA 256 block chaining message authentication code protocol secure hash algorithm 256
  • TKIP temporal key integrity protocol
  • An access point may send a beacon frame carrying AES-CCMP-SHA 256 key information for a wireless service provided by the AP when the wireless service provided by the AP supports the PMF wireless service.
  • a station STA
  • the STA may parse out the AES-CCMP-SHA 256 key information from the beacon frame.
  • the STA and the AP may exchange authentication packets and association packets with each other so that the STA can establish a connection with the AP.
  • the STA may not be able to parse out the AES-CCMP-SHA 256 key information from the beacon frame, such that the STA and the AP cannot exchange authentication packets and association packets with each other, and a connection cannot be established between the STA and the AP. Therefore, a STA that does not support the PMF wireless service may be unable to access to a network through the AP.
  • a method for sending a beacon frame is provided according to an example of the present disclosure.
  • the method may be implemented in a WLAN including multiple APs and multiple STAs.
  • the STAs may be mobile phones, desktop computers, portable computers, tablets, personal digital assistants (PDAs) , etc.
  • a method for sending a beacon frame may include the following procedures.
  • an AP may determine multiple types of encryption algorithms supported by a wireless service provided by the AP.
  • the wireless service provided by the AP may be used by a STA to access the Internet.
  • the STAs may support a same type of encryption algorithm, or may support different types of encryption algorithms. Therefore, the wireless service should support types of encryption algorithms corresponding to the respective STAs, each type of encryption algorithm corresponding to a type of STA.
  • the types of encryption algorithms supported by the wireless service may include but not limited to: a TKIP type, an AES-CCMP-SHA1 type, and an AES-CCMP-SHA 256 type.
  • the WLAN includes three STAs (e.g., STA1, STA2, and STA3) in which an encryption algorithm supported by the STA1 is the TKIP type, i.e., a STA type of the STA1 being a STA supporting the TKIP type; an encryption algorithm supported by the STA2 is the AES-CCMP-SHA1 type, i.e., a STA type of the STA2 being a STA supporting the AES-CCMP-SHA 1 type; and an encryption algorithm supported by the STA 3 is the AES-CCMP-SHA 256 type, i.e., a STA type of the STA 3 being a STA supporting the AES-CCMP-SHA 256 type.
  • the AP may open the wireless service and determine whether a robust security network (RSN) information element is configured for the wireless service.
  • RSN may be a security communication protocol established in the IEEE802.11i wireless network.
  • the RSN information element may be security parameters that are used by the AP or a STA to notify a RSN capability of it to its counterparty. If the wireless service has not been configured with the RSN information element, then this means that it is unnecessary to parse out corresponding key information from a beacon frame for transmitting authentication packets and association packets, then, the flow ends, block 101 will not be executed, and the method in the example of the present disclosure will not be used.
  • the wireless service is configured with the RSN information element, then it means that it is necessary to parse out corresponding key information from a beacon frame to transmit authentication packets and association packets.
  • the AP determines whether the PMF wireless service is opened for the wireless service or not. If the wireless service is not opened the PMF wireless service, then the flow ends, the block 101 will not be performed, and the method in the example of the present disclosure will not be used. If the PMF wireless service is opened for the wireless service, then block 101 is executed, and the method in the example of the present disclosure may be applied.
  • the AP generates a plurality of beacon frames, each beacon frame corresponding to a respective encryption algorithm.
  • each encryption algorithm has its own beacon frame for each type of encryption algorithm.
  • a process of the AP generating a beacon frame corresponding to each type of encryption algorithm for each type of encryption algorithm may include but not limited to: when the AP generates a beacon frame corresponding to a type of encryption algorithm, the AP may add encryption algorithm key information and PMF wireless service capability information corresponding to the type of encryption algorithm to the beacon frame. Further, the AP may carry the encryption algorithm key information and the PMF wireless service capability information in a RSN information element of the beacon frame.
  • the encryption algorithm key information corresponding to the type of encryption algorithm added in the beacon frame is TKIP key information
  • the PMF wireless service capability information corresponding to the type of encryption algorithm added in the beacon frame is that the PMF wireless service capability is not supported locally (i.e., at the AP) and support of the PMF wireless service capability is not required for a counterparty (i.e., a STA) .
  • 00-0F-AC-02 For example, in the RSN information element of the beacon frame, setting Pairwise Cipher Organizationally Unique Identifier (OUI) : 00-0F-AC-02, and Authentication and Key Management Protocol (AKMP) suite OUI: 00-0F-AC-02 may indicate that the beacon frame is a TKIP type related beacon frame. Labeling a Management Frame Protection Capable (MFPC) field in the RSN information element of the beacon frame to be “0” may indicate that the PMF wireless service capability is not supported locally, and labeling a Management Frame Protection Required (MFPR) field in the RSN information element of the beacon frame to be “0” may indicate support of the PMF wireless service capability is not required for a counterparty.
  • the TKIP type may be a Wi-Fi protected access (WAP) -based TKIP type (WPA) or a RSN-based TKIP type.
  • WAP Wi-Fi protected access
  • WPA Wi-based TKIP type
  • RSN-based TKIP type
  • the encryption algorithm key information corresponding to the type of encryption algorithm added by the AP in the beacon frame is AES-CCMP-SHA 1 key information
  • the PMF wireless capability information corresponding to the type of encryption algorithm added by the AP in the beacon frame is that the PMF wireless service capability is supported locally, but support of the PMF wireless service capability is not required for a counterparty.
  • Pairwise Cipher OUI: 00-0F-AC-04 and AKMP Suite OUI: 00-0F-AC-02 may be set in the RSN information element of the beacon frame to indicate that the beacon frame is an AES-CCMP-SHA 1 type related beacon frame.
  • the AP may label the MFPC field in the RSN information element of the beacon frame to be “1” to indicate that the AP supports the PMF wireless service capability locally, and the AP may label the MFPR field in the RSN information element of the beacon frame to be “0” to indicate support of the PMF wireless service capability is not required for a counterparty.
  • the AES-CCMP-SHA1 type of encryption algorithm may be a WPA AES-CCMP-based encryption algorithm or a RSN AES-CCMP-SHA1-based encryption algorithm.
  • the encryption algorithm key information corresponding to the type of encryption algorithm added by the AP in the beacon frame may be AES-CCMP-SHA 256 key information
  • the PMF wireless service capability information corresponding to the type of encryption algorithm added by the AP in the beacon frame may be that the PMF wireless service capability is supported locally and support of the PMF wireless service capability is required for a counterparty
  • Pairwise Cipher OUI: 00-0F-AC-04 and AKMP Suite OUI: 00-0F-AC-06 are set to indicate that the beacon frame is an AES-CCMP-SHA 256 type related beacon frame.
  • the AP may label the MFPC field in the RSN information element of the beacon frame to be “1” to indicate that the AP supports the PMF wireless service capability locally, and the AP may label the MFPR field in the RSN information element of the beacon frame to be “1” to indicate that support of the PMF wireless service capability is required for a counterparty (i.e., STA) .
  • the AES-CCMP-SHA 256 type encryption algorithm may be a RSN–based AES-CCMP-SHA 256 encryption algorithm or a PMF-based AES-CCMP-SHA 256 encryption algorithm.
  • the AP broadcasts a beacon frame corresponding to each type of encryption algorithm.
  • the AP may send a beacon frame corresponding to a type of encryption algorithm when a sending period arrives.
  • the types of encryption algorithms supported by the wireless service are the TKIP type, the AES-CCMP-SHA1 type, and the AES-CCMP-SHA 256 type
  • the AP may broadcast a beacon frame corresponding to the TKIP type, a beacon frame corresponding to the AES-CCMP-SHA1 type, and a beacon frame corresponding to the AES-CCMP-SHA 256 type periodically.
  • a process of the AP broadcasting a beacon frame corresponding to each type of encryption algorithm may include but not limited to: according to a predefined sequence of sending beacon frames corresponding to the types of encryption algorithms, the AP may send a beacon frame corresponding to a type of encryption algorithm when a sending period arrives.
  • the predefined sequence of sending beacon frames corresponding to the types of encryption algorithms may be sending a beacon frame corresponding to the TKIP type, sending a beacon frame corresponding to the AES-CCMP-SHA1 type, and sending a beacon frame corresponding to the AES-CCMP-SHA 256 type.
  • the AP may broadcast the beacon frame corresponding to the TKIP type, and when the sending period arrives for the second time, the AP may broadcast the beacon frame corresponding to the AES-CCMP-SHA1 type, when the sending period arrives for the third time, the AP may broadcast the beacon frame corresponding to the AES-CCMP-SHA 256 type, when the sending period arrives for the fourth time, the AP may broadcast the beacon frame corresponding to the TKIP type, and so on.
  • the subsequent process of sending beacons will not be elaborated herein.
  • a STA may receive beacons periodically.
  • the STA may first determine a specific type of encryption algorithm of the beacon frame according to a RSN information element contained in the beacon frame.
  • the STA may process other information in the RSN information element, or in response to determining that the specific type of encryption algorithm is not supported by it, the STA may discard the beacon frame directly, and will not process other information in the RSN information element. In this way, the workloads of the STA may be alleviated.
  • the STA1 Since the type of encryption algorithm supported by the STA1 is the TKIP type, therefore, when the STA1 determines that it receives a beacon frame corresponding to the AES-CCMP-SHA 1 type, and a beacon frame corresponding to the AES-CCMP-SHA 256 type, the STA 1 will discard the beacon frame corresponding to the AES-CCMP-SHA 1 type and the beacon frame corresponding to the AES-CCMP-SHA 256 type; when the STA 1 determines that it receives a beacon frame corresponding to the TKIP type, the STA 1 may parse out TKIP key information from the beacon frame, and based on this TKIP key information, the STA1 and the AP may exchange authentication packets and association packets with each other, and the STA 1 may establish a connection with the AP.
  • the STA 2 Since the type of an encryption algorithm supported by the STA2 is AES-CCMP-SHA1 type, when the STA 2 determines it receives a beacon frame corresponding to the TKIP type and a beacon frame corresponding to the AES-CCMP-SHA 256 type, the STA 2 will discard the beacon frame corresponding to the TKIP type and the beacon frame corresponding to the AES-CCMP-SHA 256 type; and when the STA 2 determines that it receives a beacon frame corresponding to the AES-CCMP-SHA 1 type, the STA 2 may parse out AES-CCMP-SHA 1 encryption key information from the beacon frame, and based on the AES-CCMP-SHA 1 encryption key information, the STA 2 and the AP may exchange authentication packets and association packets with each other, and the STA 2 may establish a connection with the AP.
  • the STA 3 may discard the beacon frame corresponding to the TKIP type and the beacon frame corresponding to the AES-CCMP-SHA 1 type.
  • the STA 3 may parse out AES-CCMP-SHA 256 key information from the beacon frame, and based on the AES-CCMP-SHA 256 key information, the STA 3 and the AP may exchange authentication packets and association packets with each other, and the STA 3 may establish a connection with the AP.
  • STAs that support various types of encryption algorithms may parse out the wireless service from beacon frames correctly, and may access the wireless service using type of encryption algorithm supported by the STAs. Further, in this way, a STA which supports the PMF wireless service may exchange authentication packets and association packets with the AP, so that the STA may establish a connection with the AP; a STA which does not support the PMF wireless service may also exchange authentication packets and association packets with the AP, so that the STA may establish a connection with the AP.
  • an access point may be provided according to an example of the present disclosure.
  • the AP may include: a determination module 21 to determine multiple types of encryption algorithms supported by a wireless service; a generation module 22 to generate a beacon frame corresponding to each type of encryption algorithm for each type of encryption algorithm; and a sending module 23 to broadcast a beacon frame corresponding to each type of encryption algorithm.
  • the determination module 21 may be further to determine whether a RSN information element is configured for the wireless service; in response to determining that the RSN information element is configured for the wireless service, then further determine whether a PMF wireless service is opened for the wireless service; and in response to determining that the PMF wireless service is opened for the wireless server, then further determine the multiple types of encryption algorithms supported by the wireless service.
  • the generation module 22 may add encryption algorithm encryption key information and PMF wireless service capability information corresponding to a type of encryption algorithm to a beacon frame when the beacon frame corresponding to the type of encryption algorithm is generated.
  • the types of the encryption algorithms may include: a TKIP type, an AES-CCMP-SHA 1 type, and an AES-CCMP-SHA 256 type.
  • a type of encryption algorithm is the TKIP type
  • the encryption algorithm key information corresponding to the type of encryption algorithm is TKIP key information
  • the PMF wireless service capability information corresponding to the type of encryption algorithm may be that a PMF wireless service capability is not supported locally and support of the PMF wireless service capability is not required for a counterparty.
  • the encryption algorithm key information corresponding to the type of encryption algorithm may be AES-CCMP-SHA1 key information
  • the PMF wireless service capability information corresponding to the type of encryption algorithm may be that the PMF wireless service capability is supported locally and support of the PMF wireless service capability is not required for a counterparty.
  • the encryption algorithm key information corresponding to the type of encryption algorithm may be AES-CCMP-SHA 256 key information
  • the PMF wireless service capability information corresponding to the type of encryption algorithm may be that the PMF wireless service capability is supported locally and support of the PMF wireless service capability is required for a counterparty.
  • the generation module 22 may carry the encryption algorithm key information and the PMF wireless service capability information in the RSN information element of the beacon frame.
  • the sending module 23 may send a beacon frame corresponding to a type of encryption algorithm according to a predefined sequence of sending the beacon frames when a sending period arrives.
  • Fig. 3 is a schematic diagram illustrating a structure of an AP according to an example of the present disclosure.
  • the AP may include a processor 31 (e.g., a CPU) , and a non-transitory storage device 32 which may connect with the processor 31 through an internal bus of the AP.
  • the non-transitory storage device 32 may store machine readable instructions 33 which are executable by the processor 31.
  • the machine readable instructions 33 may include a determination instruction 34, a generation instruction 35, and a sending instruction 36.
  • the determination instruction 34 may be executed by the processor 31 to determine the types of encryption algorithms supported by the wireless service; the generation instruction 35 may be executed by the processor 31 to generate a beacon frame corresponding to each type encryption algorithm for each type of encryption algorithm; and the sending instruction 36 may be executed by the processor 31 to broadcast the beacon frame corresponding to each type of the encryption algorithm.
  • the determination instruction 34 may be executed by the processor 31 to determine whether a robust security network (RSN) information element is configured for the wireless service; and in response to determining that the RSN information element is configured for the wireless service, further determine whether a protected management frame (PMF) wireless service is opened for the wireless service; and in response to the AP determining that the PMF wireless service is opened for the wireless service, further determine the multiple types of encryption algorithms supported by the wireless service.
  • RSN robust security network
  • PMF protected management frame
  • the generation instruction 35 may be executed by the processor 31 to add encryption algorithm key information and PMF wireless service capability information corresponding to a type of encryption algorithm to the beacon frame, when the beacon frame corresponding to the type of encryption algorithm is generated.
  • the encryption algorithm key information corresponding to the type of encryption algorithm is first key information
  • the PMF wireless service capability information corresponding to the type of encryption algorithm may be that a PMF wireless service capability is not supported locally and support of the PMF wireless service capability is not required for a counterparty.
  • the first type may be a TKIP type
  • the first key information may be TKIP key information.
  • the encryption algorithm key information corresponding to the type of encryption algorithm may be second key information
  • the PMF wireless service capability information corresponding to the type of encryption algorithm may be that the PMF wireless service capability is supported locally and support of the PMF wireless service capability is not required for a counterparty.
  • the second type may be an AES-CCMP-SHA 1 type
  • the second key information may be AES-CCMP-SHA 1 key information.
  • the encryption algorithm key information corresponding to the type of encryption algorithm may be third key information
  • the PMF wireless service capability information corresponding to the type of encryption algorithm may be that the PMF wireless service capability is supported locally and support of the PMF wireless service capability is required for a counterparty.
  • the third type may be an AES-CCMP-SHA 256 type
  • the third key information may be AES-CCMP-SHA 256 key information.
  • the generation instruction 65 may be executed by the processor 61 to carry the encryption algorithm key information and the PMF wireless service capability information in a RSN information element of the beacon frame, when the beacon frame corresponding to the type of encryption algorithm is generated.
  • the sending instruction 36 may be executed by the processor 31 to send a beacon frame corresponding to a type of encryption algorithm when a sending period arrives, according to a predefined sequence of sending beacon frames corresponding to the types of encryption algorithms.
  • the “processor” may include a processing unit, an application specific integrated circuit (ASIC) , a logic unit, or a programmable gate array, etc. In the examples of the present disclosure, the description regarding the “processor” may refer to one or more processor.
  • ASIC application specific integrated circuit
  • the non-transitory storage device may be a magnetic disk, an optical disk, a read-only memory (ROM) , a random access memory (RAM) , etc.
  • the examples of the present disclosure may be implemented by software together with necessary hardware platforms, and may be implemented by hardware. Based on this, the examples of the present disclosure may be embodied as a software product.
  • the software product may be stored in a storage medium, and may include some instructions to enable a computing device (may be a personal computer, a server, a network device, etc. ) to execute the methods in the examples of the present disclosure.
  • the drawings are illustrative, the modules or blocks contained therein may be not necessary to implement the present disclosure.
  • the modules in the examples of the present disclosure may be integrated into one module or may be further separated into multiple modules.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Small-Scale Networks (AREA)

Abstract

An access point (AP) may determine multiple types of encryption algorithms supported by a wireless service provided by the AP, generate a plurality of beacon frames, each beacon frame corresponding to a respective type of encryption algorithm, and broadcast the plurality of beacon frames corresponding to each type of encryption algorithm.

Description

SENDING BEACON FRAMES BACKGROUND
In a wireless local area network (WLAN) , an access point (AP) may periodically send a beacon frame for a certain wireless service, and a range covered by the beacon frame is a basic service set (BSS) . After a wireless station (STA) detects the beacon frame, the STA may parse the beacon frame and learn the corresponding wireless service, so as to enable a user to decide whether the user is to join the wireless service.
A protected management frame (PMF) is a kind of wireless service. The PMF wireless service is to provide an encryption mechanism for wireless management packets. As powerful supplementation to encryption mechanisms for wireless management packets, the PMF can provide safer guarantees for the wireless communication.
BRIEF DESCRIPTION OF DRAWINGS
FIG. 1 is a schematic diagram illustrating a flowchart of a method for sending a beacon frame according to an example of the present disclosure;
FIG. 2 is a schematic diagram illustrating a structure of an AP according to an example of the present disclosure; and
FIG. 3 is a schematic diagram illustrating a structure of an AP according to an example of the present disclosure.
DETAILED DESCRIPTION
According to IEEE802.11i related protocols for example, a PMF wireless service may support an advanced encryption standard counter cipher mode with block chaining message authentication code protocol secure hash algorithm 256 (AES-CCMP-SHA 256) encryption algorithm, but may not support a temporal key integrity protocol (TKIP) encryption algorithm.
An access point (AP) may send a beacon frame carrying AES-CCMP-SHA 256 key information for a wireless service provided by the AP when the wireless service provided by the AP supports the PMF wireless service. After a station (STA) detects the beacon frame, if the STA supports the PMF wireless service, then the STA may parse out the AES-CCMP-SHA 256 key information from the beacon frame. Then, based on the AES-CCMP-SHA 256 key information, the STA and the AP may exchange authentication packets and association packets with each other so that the STA can establish a connection with the AP. However, if the STA does not support the PMF wireless service, then the STA may not be able to parse out the AES-CCMP-SHA 256 key information from the beacon frame, such that the STA and the AP cannot exchange authentication packets and association packets with each other, and a connection cannot be established between the STA and the AP. Therefore, a STA that does not support the PMF wireless service may be unable to access to a network through the AP.
In view of the foregoing, a method for sending a beacon frame is provided according to an example of the present disclosure. The method may be implemented in a WLAN including multiple APs and multiple STAs. The STAs may be mobile phones, desktop computers, portable computers, tablets, personal digital assistants (PDAs) , etc.
As shown in Fig. 1, a method for sending a beacon frame may include the following procedures.
At block 101, an AP may determine multiple types of encryption algorithms supported by a wireless service provided by the AP. The wireless service provided by the AP may be used by a STA to access the Internet.
For multiple STAs contained in a WLAN, the STAs may support a same type of encryption algorithm, or may support different types of encryption algorithms. Therefore, the wireless service should support types of encryption algorithms corresponding to the respective STAs, each type of encryption algorithm corresponding to a type of STA.
In an example of the present disclosure, the types of encryption algorithms supported by the wireless service may include but not limited to: a TKIP type, an AES-CCMP-SHA1 type, and an AES-CCMP-SHA 256 type. Assume that the WLAN includes three STAs (e.g., STA1, STA2, and STA3) in which an encryption algorithm supported by the STA1 is the TKIP type, i.e., a STA type of the STA1 being a STA supporting the TKIP type; an encryption algorithm supported by the STA2 is the AES-CCMP-SHA1 type, i.e., a STA type of the STA2 being a STA supporting the AES-CCMP-SHA 1 type; and an encryption algorithm supported by the STA 3 is the AES-CCMP-SHA 256 type, i.e., a STA type of the STA 3 being a STA supporting the AES-CCMP-SHA 256 type.
In an example of the present disclosure, before the AP determines the multiple types of encryption algorithms supported by the wireless service it provides. The AP may open the wireless service and determine whether a robust security network (RSN) information element is configured for the wireless service. RSN may be a security communication protocol established in the IEEE802.11i wireless network. The RSN information element may be security parameters that are used by the AP or a STA to notify a RSN capability of it to its counterparty. If the wireless service has not been configured with the RSN information element, then this means that it is unnecessary to parse out corresponding key information from a beacon frame for transmitting authentication packets and association packets, then, the flow ends, block 101 will not be executed, and the method in the example of the present disclosure will not be used. If the wireless service is configured with the RSN information element, then it means that it is necessary to parse out corresponding key information from a beacon frame to transmit authentication packets and association packets. The AP determines whether the PMF wireless service is opened for the wireless service or not. If the wireless service is not opened the PMF wireless service, then the flow ends, the block 101 will not be performed, and the method in the example of the present disclosure will not be used. If the PMF wireless service is opened for the wireless service, then block 101 is executed, and the method in the example of the present disclosure may be applied.
At block 102, the AP generates a plurality of beacon frames, each beacon  frame corresponding to a respective encryption algorithm. Thus each encryption algorithm has its own beacon frame for each type of encryption algorithm.
In an example of the present disclosure, a process of the AP generating a beacon frame corresponding to each type of encryption algorithm for each type of encryption algorithm may include but not limited to: when the AP generates a beacon frame corresponding to a type of encryption algorithm, the AP may add encryption algorithm key information and PMF wireless service capability information corresponding to the type of encryption algorithm to the beacon frame. Further, the AP may carry the encryption algorithm key information and the PMF wireless service capability information in a RSN information element of the beacon frame.
When the type of encryption algorithm is the TKIP type, the encryption algorithm key information corresponding to the type of encryption algorithm added in the beacon frame is TKIP key information, and the PMF wireless service capability information corresponding to the type of encryption algorithm added in the beacon frame is that the PMF wireless service capability is not supported locally (i.e., at the AP) and support of the PMF wireless service capability is not required for a counterparty (i.e., a STA) .
For example, in the RSN information element of the beacon frame, setting Pairwise Cipher Organizationally Unique Identifier (OUI) : 00-0F-AC-02, and Authentication and Key Management Protocol (AKMP) suite OUI: 00-0F-AC-02 may indicate that the beacon frame is a TKIP type related beacon frame. Labeling a Management Frame Protection Capable (MFPC) field in the RSN information element of the beacon frame to be “0” may indicate that the PMF wireless service capability is not supported locally, and labeling a Management Frame Protection Required (MFPR) field in the RSN information element of the beacon frame to be “0” may indicate support of the PMF wireless service capability is not required for a counterparty. The TKIP type may be a Wi-Fi protected access (WAP) -based TKIP type (WPA) or a RSN-based TKIP type.
When the type of encryption algorithm is the AES-CCMP-SHA1 type, the encryption algorithm key information corresponding to the type of encryption  algorithm added by the AP in the beacon frame is AES-CCMP-SHA 1 key information, while the PMF wireless capability information corresponding to the type of encryption algorithm added by the AP in the beacon frame is that the PMF wireless service capability is supported locally, but support of the PMF wireless service capability is not required for a counterparty.
As an example, Pairwise Cipher OUI: 00-0F-AC-04 and AKMP Suite OUI: 00-0F-AC-02 may be set in the RSN information element of the beacon frame to indicate that the beacon frame is an AES-CCMP-SHA 1 type related beacon frame. Further, the AP may label the MFPC field in the RSN information element of the beacon frame to be “1” to indicate that the AP supports the PMF wireless service capability locally, and the AP may label the MFPR field in the RSN information element of the beacon frame to be “0” to indicate support of the PMF wireless service capability is not required for a counterparty. The AES-CCMP-SHA1 type of encryption algorithm may be a WPA AES-CCMP-based encryption algorithm or a RSN AES-CCMP-SHA1-based encryption algorithm.
When the encryption algorithm is the AES-CCMP-SHA 256, the encryption algorithm key information corresponding to the type of encryption algorithm added by the AP in the beacon frame may be AES-CCMP-SHA 256 key information, and the PMF wireless service capability information corresponding to the type of encryption algorithm added by the AP in the beacon frame may be that the PMF wireless service capability is supported locally and support of the PMF wireless service capability is required for a counterparty
As an example, in the RSN information element of the beacon frame, Pairwise Cipher OUI: 00-0F-AC-04 and AKMP Suite OUI: 00-0F-AC-06 are set to indicate that the beacon frame is an AES-CCMP-SHA 256 type related beacon frame. Further, the AP may label the MFPC field in the RSN information element of the beacon frame to be “1” to indicate that the AP supports the PMF wireless service capability locally, and the AP may label the MFPR field in the RSN information element of the beacon frame to be “1” to indicate that support of the PMF wireless service capability is required for a counterparty (i.e., STA) . The AES-CCMP-SHA  256 type encryption algorithm may be a RSN–based AES-CCMP-SHA 256 encryption algorithm or a PMF-based AES-CCMP-SHA 256 encryption algorithm.
At block 103, the AP broadcasts a beacon frame corresponding to each type of encryption algorithm.
According to a predefined sequence of sending beacon frames corresponding to the types of encryption algorithms, the AP may send a beacon frame corresponding to a type of encryption algorithm when a sending period arrives. For example, assuming that the types of encryption algorithms supported by the wireless service are the TKIP type, the AES-CCMP-SHA1 type, and the AES-CCMP-SHA 256 type, the AP may broadcast a beacon frame corresponding to the TKIP type, a beacon frame corresponding to the AES-CCMP-SHA1 type, and a beacon frame corresponding to the AES-CCMP-SHA 256 type periodically.
In an example of the present disclosure, a process of the AP broadcasting a beacon frame corresponding to each type of encryption algorithm may include but not limited to: according to a predefined sequence of sending beacon frames corresponding to the types of encryption algorithms, the AP may send a beacon frame corresponding to a type of encryption algorithm when a sending period arrives. For example, assuming that the types of encryption algorithms corresponding to the wireless service are the TKIP type, the AES-CCMP-SHA1 type, and the AES-CCMP-SHA 256 type, the predefined sequence of sending beacon frames corresponding to the types of encryption algorithms may be sending a beacon frame corresponding to the TKIP type, sending a beacon frame corresponding to the AES-CCMP-SHA1 type, and sending a beacon frame corresponding to the AES-CCMP-SHA 256 type. When the sending period arrives for the first time, the AP may broadcast the beacon frame corresponding to the TKIP type, and when the sending period arrives for the second time, the AP may broadcast the beacon frame corresponding to the AES-CCMP-SHA1 type, when the sending period arrives for the third time, the AP may broadcast the beacon frame corresponding to the AES-CCMP-SHA 256 type, when the sending period arrives for the fourth time, the AP may broadcast the beacon frame corresponding to the TKIP type, and so on. The subsequent process of sending  beacons will not be elaborated herein.
A STA may receive beacons periodically. When the STA receives a beacon frame, the STA may first determine a specific type of encryption algorithm of the beacon frame according to a RSN information element contained in the beacon frame. In response to determining that the specific type of encryption algorithm is supported by it, the STA may process other information in the RSN information element, or in response to determining that the specific type of encryption algorithm is not supported by it, the STA may discard the beacon frame directly, and will not process other information in the RSN information element. In this way, the workloads of the STA may be alleviated.
Since the type of encryption algorithm supported by the STA1 is the TKIP type, therefore, when the STA1 determines that it receives a beacon frame corresponding to the AES-CCMP-SHA 1 type, and a beacon frame corresponding to the AES-CCMP-SHA 256 type, the STA 1 will discard the beacon frame corresponding to the AES-CCMP-SHA 1 type and the beacon frame corresponding to the AES-CCMP-SHA 256 type; when the STA 1 determines that it receives a beacon frame corresponding to the TKIP type, the STA 1 may parse out TKIP key information from the beacon frame, and based on this TKIP key information, the STA1 and the AP may exchange authentication packets and association packets with each other, and the STA 1 may establish a connection with the AP.
Since the type of an encryption algorithm supported by the STA2 is AES-CCMP-SHA1 type, when the STA 2 determines it receives a beacon frame corresponding to the TKIP type and a beacon frame corresponding to the AES-CCMP-SHA 256 type, the STA 2 will discard the beacon frame corresponding to the TKIP type and the beacon frame corresponding to the AES-CCMP-SHA 256 type; and when the STA 2 determines that it receives a beacon frame corresponding to the AES-CCMP-SHA 1 type, the STA 2 may parse out AES-CCMP-SHA 1 encryption key information from the beacon frame, and based on the AES-CCMP-SHA 1 encryption key information, the STA 2 and the AP may exchange authentication packets and association packets with each other, and the STA 2 may establish a  connection with the AP.
Since the type of encryption algorithm supported by the STA 3 is the AES-CCMP-SHA 256 type, when the STA 3 determines that it receives a beacon frame corresponding to the TKIP type and a beacon frame corresponding to the AES-CCMP-SHA 1 type, the STA 3 may discard the beacon frame corresponding to the TKIP type and the beacon frame corresponding to the AES-CCMP-SHA 1 type. When the STA 3 determines that it receives a beacon frame corresponding to the AES-CCMP-SHA 256 type, the STA 3 may parse out AES-CCMP-SHA 256 key information from the beacon frame, and based on the AES-CCMP-SHA 256 key information, the STA 3 and the AP may exchange authentication packets and association packets with each other, and the STA 3 may establish a connection with the AP.
In the examples of the present disclosure, by generating a beacon frame corresponding to each type of encryption algorithm for each type of encryption algorithm, and broadcasting a beacon frame corresponding to each type of encryption algorithm, STAs that support various types of encryption algorithms may parse out the wireless service from beacon frames correctly, and may access the wireless service using type of encryption algorithm supported by the STAs. Further, in this way, a STA which supports the PMF wireless service may exchange authentication packets and association packets with the AP, so that the STA may establish a connection with the AP; a STA which does not support the PMF wireless service may also exchange authentication packets and association packets with the AP, so that the STA may establish a connection with the AP.
Based on the foregoing methods, an access point (AP) may be provided according to an example of the present disclosure. As shown in Fig. 2, the AP may include: a determination module 21 to determine multiple types of encryption algorithms supported by a wireless service; a generation module 22 to generate a beacon frame corresponding to each type of encryption algorithm for each type of encryption algorithm; and a sending module 23 to broadcast a beacon frame corresponding to each type of encryption algorithm.
The determination module 21 may be further to determine whether a RSN information element is configured for the wireless service; in response to determining that the RSN information element is configured for the wireless service, then further determine whether a PMF wireless service is opened for the wireless service; and in response to determining that the PMF wireless service is opened for the wireless server, then further determine the multiple types of encryption algorithms supported by the wireless service.
In an example of the present disclosure, the generation module 22 may add encryption algorithm encryption key information and PMF wireless service capability information corresponding to a type of encryption algorithm to a beacon frame when the beacon frame corresponding to the type of encryption algorithm is generated.
The types of the encryption algorithms may include: a TKIP type, an AES-CCMP-SHA 1 type, and an AES-CCMP-SHA 256 type. When a type of encryption algorithm is the TKIP type, the encryption algorithm key information corresponding to the type of encryption algorithm is TKIP key information, and the PMF wireless service capability information corresponding to the type of encryption algorithm may be that a PMF wireless service capability is not supported locally and support of the PMF wireless service capability is not required for a counterparty. When the type of encryption algorithm is the AES-CCMP-SHA 1 type, the encryption algorithm key information corresponding to the type of encryption algorithm may be AES-CCMP-SHA1 key information, and the PMF wireless service capability information corresponding to the type of encryption algorithm may be that the PMF wireless service capability is supported locally and support of the PMF wireless service capability is not required for a counterparty. When the type of the encryption algorithm is the AES-CCMP-SHA 256 type, the encryption algorithm key information corresponding to the type of encryption algorithm may be AES-CCMP-SHA 256 key information, and the PMF wireless service capability information corresponding to the type of encryption algorithm may be that the PMF wireless service capability is supported locally and support of the PMF wireless service capability is required for a counterparty.
In an example of the present disclosure, the generation module 22 may carry the encryption algorithm key information and the PMF wireless service capability information in the RSN information element of the beacon frame.
The sending module 23 may send a beacon frame corresponding to a type of encryption algorithm according to a predefined sequence of sending the beacon frames when a sending period arrives.
Fig. 3 is a schematic diagram illustrating a structure of an AP according to an example of the present disclosure.
As shown in Fig. 3, the AP may include a processor 31 (e.g., a CPU) , and a non-transitory storage device 32 which may connect with the processor 31 through an internal bus of the AP. The non-transitory storage device 32 may store machine readable instructions 33 which are executable by the processor 31. The machine readable instructions 33 may include a determination instruction 34, a generation instruction 35, and a sending instruction 36.
The determination instruction 34 may be executed by the processor 31 to determine the types of encryption algorithms supported by the wireless service; the generation instruction 35 may be executed by the processor 31 to generate a beacon frame corresponding to each type encryption algorithm for each type of encryption algorithm; and the sending instruction 36 may be executed by the processor 31 to broadcast the beacon frame corresponding to each type of the encryption algorithm.
The determination instruction 34 may be executed by the processor 31 to determine whether a robust security network (RSN) information element is configured for the wireless service; and in response to determining that the RSN information element is configured for the wireless service, further determine whether a protected management frame (PMF) wireless service is opened for the wireless service; and in response to the AP determining that the PMF wireless service is opened for the wireless service, further determine the multiple types of encryption algorithms supported by the wireless service.
In the example of the present disclosure, the generation instruction 35 may be executed by the processor 31 to add encryption algorithm key information and PMF wireless service capability information corresponding to a type of encryption algorithm to the beacon frame, when the beacon frame corresponding to the type of encryption algorithm is generated.
When the type of encryption algorithm is a first type, the encryption algorithm key information corresponding to the type of encryption algorithm is first key information, and the PMF wireless service capability information corresponding to the type of encryption algorithm may be that a PMF wireless service capability is not supported locally and support of the PMF wireless service capability is not required for a counterparty. The first type may be a TKIP type, and the first key information may be TKIP key information.
When the type of encryption algorithm is a second type, the encryption algorithm key information corresponding to the type of encryption algorithm may be second key information, and the PMF wireless service capability information corresponding to the type of encryption algorithm may be that the PMF wireless service capability is supported locally and support of the PMF wireless service capability is not required for a counterparty. The second type may be an AES-CCMP-SHA 1 type, and the second key information may be AES-CCMP-SHA 1 key information.
When the type of the encryption algorithm is a third type, the encryption algorithm key information corresponding to the type of encryption algorithm may be third key information, and the PMF wireless service capability information corresponding to the type of encryption algorithm may be that the PMF wireless service capability is supported locally and support of the PMF wireless service capability is required for a counterparty. The third type may be an AES-CCMP-SHA 256 type, and the third key information may be AES-CCMP-SHA 256 key information.
In the example of the present disclosure, the generation instruction 65 may be executed by the processor 61 to carry the encryption algorithm key information  and the PMF wireless service capability information in a RSN information element of the beacon frame, when the beacon frame corresponding to the type of encryption algorithm is generated.
The sending instruction 36 may be executed by the processor 31 to send a beacon frame corresponding to a type of encryption algorithm when a sending period arrives, according to a predefined sequence of sending beacon frames corresponding to the types of encryption algorithms.
The “processor” may include a processing unit, an application specific integrated circuit (ASIC) , a logic unit, or a programmable gate array, etc. In the examples of the present disclosure, the description regarding the “processor” may refer to one or more processor.
The non-transitory storage device may be a magnetic disk, an optical disk, a read-only memory (ROM) , a random access memory (RAM) , etc.
As described in the foregoing, the examples of the present disclosure may be implemented by software together with necessary hardware platforms, and may be implemented by hardware. Based on this, the examples of the present disclosure may be embodied as a software product. The software product may be stored in a storage medium, and may include some instructions to enable a computing device (may be a personal computer, a server, a network device, etc. ) to execute the methods in the examples of the present disclosure. The drawings are illustrative, the modules or blocks contained therein may be not necessary to implement the present disclosure. The modules in the examples of the present disclosure may be integrated into one module or may be further separated into multiple modules.
What is described in the foregoing are only examples of the present disclosure, and should not be construed as limitations to the present disclosure. Any changes, equivalent replacements, modifications made without departing from the scope and spirit of the present disclosure are intended to be included within the protecting scope of the present disclosure.

Claims (15)

  1. A method for sending a beacon frame, comprising:
    an access point (AP) determining multiple types of encryption algorithms supported by a wireless service provided by the AP;
    the AP generating a plurality of beacon frames, each beacon frame corresponding to a respective type of encryption algorithm; and
    the AP broadcasting the plurality of beacon frames corresponding to each type of encryption algorithm.
  2. The method of claim 1, wherein prior to the AP determining the multiple types of encryption algorithms supported by the wireless service provided by the AP, the method further comprises:
    the AP determining whether a robust security network (RSN) information element is configured for the wireless service; and
    in response to determining that the RSN information element is configured for the wireless service, the AP determining whether a protected management frame (PMF) wireless service is opened for the wireless service; and in response to the AP determining that the PMF wireless service is opened for the wireless service, the AP determining the multiple types of encryption algorithms supported by the wireless service.
  3. The method of claim 1, wherein the AP generating the plurality of beacon frames corresponding to each type of encryption algorithm comprises:
    when the AP generating a beacon frame corresponding to a type of encryption algorithm, the AP adding encryption algorithm key information and PMF wireless service capability information corresponding to the type of encryption algorithm to the beacon frame.
  4. The method of claim 3, wherein
    in response to determining that the type of encryption algorithm is a first type, the AP adds first key information as the encryption algorithm key information corresponding to the type of encryption algorithm, and  adds a PMF wireless service capability being not supported locally and support of the PMF wireless service capability is not required for a counterparty as the PMF wireless service capability information corresponding to the type of encryption algorithm;
    in response to determining that the type of encryption algorithm is a second type, the AP adds second key information as the encryption algorithm key information corresponding to the type of encryption algorithm, and adds the PMF wireless service capability being supported locally and support of the PMF wireless service capability being not required for a counterparty as the PMF wireless service capability information corresponding to the type of encryption algorithm; and
    in response to determining that the type of the encryption algorithm is a third type, the AP adds third key information as the encryption algorithm key information corresponding to the type of encryption algorithm, and adds the PMF wireless service capability being supported locally and support of the PMF wireless service capability is required for a counterparty as the PMF wireless service capability information corresponding to the type of encryption algorithm.
  5. The method of claim 3, wherein the encryption algorithm key information and the PMF wireless service capability information are carried in a RSN information element of the beacon frame.
  6. The method of claim 1, the AP broadcasting the beacon frame corresponding to each type of encryption algorithm comprises:
    according to a predefined sequence of sending beacon frames corresponding to the types of encryption algorithms, the AP sending a beacon frame corresponding to a type of encryption algorithm when a sending period arrives.
  7. An access point (AP) , comprising:
    a processor; and
    a non-transitory storage medium on which is stored machine readable instructions executable by the processor to:
    determine multiple types of encryption algorithms supported by a wireless service provided by the AP;
    generate a plurality of beacon frames, each beacon frame corresponding to a respective type of encryption algorithm; and
    broadcast the plurality of beacon frames corresponding to each type of encryption algorithm.
  8. The AP of claim 7, wherein the machine readable instructions are executable by the processor to:
    determine whether a robust security network (RSN) information element is configured for the wireless service; and
    in response to determining that the robust security network information is configured for the wireless service, determine whether a protected management frame (PMF) wireless service is opened for the wireless service; and in response to determining that the PMF wireless service is opened for the wireless service, determine the multiple types of encryption algorithms supported by the wireless service.
  9. The AP of claim 7, wherein the machine readable instructions are executable by the processor to:
    when generate a beacon frame corresponding to a type of encryption algorithm, add encryption algorithm key information and PMF wireless service capability information corresponding to the type of encryption algorithm to the beacon frame.
  10. The AP of claim 9, wherein
    in response to determining that the type of encryption algorithm is a first type, first key information is added as the encryption algorithm key information corresponding to the type of encryption algorithm, and a PMF wireless service capability being not supported locally and support of the PMF wireless service capability being not required for a counterparty are added as the PMF wireless service capability information corresponding to the type of encryption algorithm;
    in response to determining that the type of encryption algorithm is a second type, second key information is added as the encryption algorithm key  information corresponding to the type of encryption algorithm, and the PMF wireless service capability being supported locally and support of the PMF wireless service capability is not required for a counterparty are added as the PMF wireless service capability information corresponding to the type of encryption algorithm; and
    in response to determining that the type of the encryption algorithm is a third type, third key information is added as the encryption algorithm key information corresponding to the type of encryption algorithm, and the PMF wireless service capability being supported locally and support of the PMF wireless service capability is required for a counterparty are added as the PMF wireless service capability information corresponding to the type of encryption algorithm.
  11. The AP of claim 9, wherein the machine readable instructions are executable by the processor to:
    when generate the beacon frame corresponding to the type of encryption algorithm, carry the encryption algorithm key information and the PMF wireless service capability information in a RSN information element of the beacon frame.
  12. The AP of claim 7, wherein the machine readable instructions are executable by the processor to:
    according to a predefined sequence of sending beacon frames corresponding to the types of encryption algorithms, send a beacon frame corresponding to a type of encryption algorithm when a sending period arrives.
  13. A non-transitory machine readable storage medium storing machine readable instructions which comprises instructions executable by a processor to:
    determine multiple types of encryption algorithms supported by a wireless service provided by the AP;
    generate a plurality of beacon frames, each beacon frame corresponding to a respective type of encryption algorithm; and
    broadcast the plurality of beacon frames corresponding to each type of encryption algorithm.
  14. The non-transitory machine readable storage medium of claim 13, wherein  the machine readable instructions comprises instructions executable by the processor to:
    when generate a beacon frame corresponding to a type of encryption algorithm, add encryption algorithm key information and PMF wireless service capability information corresponding to the type of encryption algorithm to the beacon frame.
  15. The non-transitory machine readable storage medium of claim 13, wherein the machine readable instructions comprises instructions executable by the processor to:
    according to a predefined sequence of sending beacon frames corresponding to the types of encryption algorithms, send a beacon frame corresponding to a type of encryption algorithm when a sending period arrives.
PCT/CN2015/087353 2014-08-19 2015-08-18 Sending beacon frames WO2016026426A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410409608.XA CN104219662B (en) 2014-08-19 2014-08-19 A kind of sending method and equipment of Beacon frame
CN201410409608.X 2014-08-19

Publications (1)

Publication Number Publication Date
WO2016026426A1 true WO2016026426A1 (en) 2016-02-25

Family

ID=52100724

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/087353 WO2016026426A1 (en) 2014-08-19 2015-08-18 Sending beacon frames

Country Status (2)

Country Link
CN (1) CN104219662B (en)
WO (1) WO2016026426A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104219662B (en) * 2014-08-19 2019-05-07 新华三技术有限公司 A kind of sending method and equipment of Beacon frame
US11601804B2 (en) * 2017-06-15 2023-03-07 Panasonic Intellectual Property Corporation Of America Communication apparatus and method for secure low power transmission

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040073796A1 (en) * 2002-10-11 2004-04-15 You-Sung Kang Method of cryptographing wireless data and apparatus using the method
US8270607B2 (en) * 2006-12-27 2012-09-18 Samsung Electronics Co., Ltd. Method of protecting broadcast frame, terminal authenticating broadcast frame, and access point broadcasting broadcast frame
CN103581901A (en) * 2012-08-09 2014-02-12 展讯通信(上海)有限公司 Method and device for processing Wi-Fi wireless network access configuration information
CN103945369A (en) * 2013-01-18 2014-07-23 杭州古北电子科技有限公司 Internet access configuration method for WIFI device by checking length of WIFI data packets
CN104219662A (en) * 2014-08-19 2014-12-17 杭州华三通信技术有限公司 Beacon frame transmitting method and device

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1681239B (en) * 2004-04-08 2012-01-04 华为技术有限公司 Method for supporting multiple safe mechanism in wireless local network system
US7881475B2 (en) * 2005-05-17 2011-02-01 Intel Corporation Systems and methods for negotiating security parameters for protecting management frames in wireless networks
CN101453409B (en) * 2007-12-07 2011-01-26 中国移动通信集团公司 Information broadcast method for supporting terminal combined access, apparatus and system thereof
CN101489222A (en) * 2009-02-25 2009-07-22 杭州华三通信技术有限公司 Method for simultaneously providing clear text and ciphering service by the same hot spot and wireless access apparatus

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040073796A1 (en) * 2002-10-11 2004-04-15 You-Sung Kang Method of cryptographing wireless data and apparatus using the method
US8270607B2 (en) * 2006-12-27 2012-09-18 Samsung Electronics Co., Ltd. Method of protecting broadcast frame, terminal authenticating broadcast frame, and access point broadcasting broadcast frame
CN103581901A (en) * 2012-08-09 2014-02-12 展讯通信(上海)有限公司 Method and device for processing Wi-Fi wireless network access configuration information
CN103945369A (en) * 2013-01-18 2014-07-23 杭州古北电子科技有限公司 Internet access configuration method for WIFI device by checking length of WIFI data packets
CN104219662A (en) * 2014-08-19 2014-12-17 杭州华三通信技术有限公司 Beacon frame transmitting method and device

Also Published As

Publication number Publication date
CN104219662A (en) 2014-12-17
CN104219662B (en) 2019-05-07

Similar Documents

Publication Publication Date Title
US20140329498A1 (en) Systems and methods for power save during initial link setup
CN108886685B (en) Terminal matching method and device
US20160135041A1 (en) Wi-fi privacy in a wireless station using media access control address randomization
US10057766B2 (en) Methods and systems for authentication interoperability
CA3013642C (en) Wwan-wlan aggregation security
JP7127689B2 (en) CORE NETWORK DEVICE, COMMUNICATION TERMINAL, AND COMMUNICATION METHOD
US9820218B2 (en) Systems and methods for efficient access point discovery
US9491621B2 (en) Systems and methods for fast initial link setup security optimizations for PSK and SAE security modes
US20230344626A1 (en) Network connection management method and apparatus, readable medium, program product, and electronic device
US10158993B2 (en) Wireless communications
WO2016003311A1 (en) Device bootstrap to wireless network
WO2017076029A1 (en) Method and system for wireless fidelity connection between smart terminal and router
US9775181B2 (en) Reducing re-association time for STA connected to AP
WO2022142933A1 (en) Network access method and system for wireless access point, and ap and storage medium
WO2016026426A1 (en) Sending beacon frames
US11589223B2 (en) Terminal device and non-transitory computer-readable recording medium storing computer readable instructions for terminal device
CN116746179A (en) WLAN multilink TDLS key derivation
TWI727503B (en) Method of obtain attacking in wireless communication and electronic device
US20180034637A1 (en) Communication apparatus, method and program for controlling the apparatus, and storage medium storing the program
US20230114761A1 (en) Method and system for securely handling re-connection of client devices to a wireless network
JP2015104085A (en) Communication apparatus and control method thereof

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15834555

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15834555

Country of ref document: EP

Kind code of ref document: A1