CN101616412A - The method of calibration of management frames in wireless local area and equipment - Google Patents

The method of calibration of management frames in wireless local area and equipment Download PDF

Info

Publication number
CN101616412A
CN101616412A CN200910162177A CN200910162177A CN101616412A CN 101616412 A CN101616412 A CN 101616412A CN 200910162177 A CN200910162177 A CN 200910162177A CN 200910162177 A CN200910162177 A CN 200910162177A CN 101616412 A CN101616412 A CN 101616412A
Authority
CN
China
Prior art keywords
management frames
mic
information
described management
frames
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN200910162177A
Other languages
Chinese (zh)
Inventor
余波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou H3C Technologies Co Ltd
Original Assignee
Hangzhou H3C Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou H3C Technologies Co Ltd filed Critical Hangzhou H3C Technologies Co Ltd
Priority to CN200910162177A priority Critical patent/CN101616412A/en
Publication of CN101616412A publication Critical patent/CN101616412A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of method of calibration and equipment of management frames in wireless local area.This method comprises: when receiving management frames, judge whether carry information integrity verification MIC information in the described management frames; When carrying MIC information, utilize pre-configured key that the part of removing described MIC information in the described management frames is carried out the information integrity verification, obtain the MIC check value; When the MIC information of carrying in described MIC check value and the described management frames is identical, judges that described management frames is legal, otherwise judge that described management frames is illegal.Among the present invention,, make the recipient of management frames to judge, avoided spoofing attack based on management frames to the legitimacy of the management frames that receives by in management frames, adding MIC information.

Description

The method of calibration of management frames in wireless local area and equipment
Technical field
The present invention relates to communication field, relate in particular to a kind of method of calibration and equipment of management frames in wireless local area.
Background technology
Existing WLAN (Wireless Local Area Network, WLAN (wireless local area network)) in, user (Client) is inserting (Access Point, access point) during AP, as shown in Figure 1, at first need to carry out active scanning, connecting by ability after authenticating two processes of (Authentication) and related (Association) and AP.
Wherein, verification process is in order to prevent that the disabled user from inserting, need between user and AP, set up authentication, when the user passes through to specify SSID (Service Set Identifier, service set) select wireless network and send authentication request (Authentication Request) to AP, authentication mechanism comprises two kinds of open system authentication and shared key authentications.Have only by just entering association phase after the authentication.In the association phase, the user sends association request frame (Association Request) to AP.AP adds user profile to database, replys associated response (Association Response) to the user.The user is at every turn only being associated with on the AP, and association is always initiated by the user.
Above-mentioned authentication request frames, authentication response frames, association request frame and association response frame all belong to the management frames among the WLAN, except above-mentioned several types, management frames also comprises removes authentication frame (Deauthentication) and disassociation (Disassociation) frame etc.
Wherein, remove authentication frame and be used to the authentication relationship of interrupting having set up.As shown in Figure 2, AP removes the user by sending the releasing authentication frame from wireless system, and the user also can initiatively send and remove authentication (Deauthentication) frame, and removing authentication frame can be broadcast frame or unicast frame.The incidence relation and the disassociation frame is used for terminating, the disassociation frame can be broadcast frame or unicast frame.Remove authentication frame and remove disassociation frame, all only comprise a fixed field Reason Code (reason code), show as Fig. 3 except outside MAC (Medium Access Control, the medium access control) head.Wherein, Frame Control position differs from one another, and is used to the different subtype of representing that dissimilar management frames has.When remove connecting and removing authentication frame and be unicast frame, equal certain user's MAC Address as destination address DA (Destination Address); During for broadcast frame: destination address (DA) equals full F.
Problems of the prior art are: exist a kind of deception (Spoofing) to attack among the existing WLAN, the potential attacker of this attack will send management frames as attack message with the name of other equipment.For example: can cause user offline by the releasing authentication frame that sends deception.With scene shown in Figure 3 is example, and the assailant removes authentication frame to the user or with user's identity to the AP transmission with the identity of AP, all can cause the connection between user and the AP to be interrupted.
Summary of the invention
The invention provides a kind of method of calibration and equipment of management frames in wireless local area, be used for improving the management frames verification scheme of WLAN (wireless local area network), prevent spoofing attack based on management frames.
The invention provides a kind of method of calibration of management frames in wireless local area, comprising:
When receiving management frames, judge whether carry information integrity verification MIC information in the described management frames;
When carrying MIC information, utilize pre-configured key that the part of removing described MIC information in the described management frames is carried out the information integrity verification, obtain the MIC check value;
When the MIC information of carrying in described MIC check value and the described management frames is identical, judges that described management frames is legal, otherwise judge that described management frames is illegal.
Wherein, also comprise: when not carrying MIC information in the described management frames, judge that described management frames is illegal.
Wherein, described MIC information is arranged in the MIC field of described management frames.
Wherein, also comprise:
When needing to send management frames, utilize pre-configured key that described management frames to be sent is carried out the information integrity verification, check results is added in the described management frames as MIC information;
Send described generation interpolation MIC management of information frame.。
Wherein, when described management frames was unicast management frames, described pre-configured key was group temporary key GTK; When described management frames was the multicast management frame, described pre-configured key was pair temporal key PTK.
The present invention also provides the equipment in a kind of WLAN (wireless local area network), comprising:
The management frames receiving element is used to receive management frames;
MIC information judging unit is used for judging whether described management frames carries information integrity verification MIC information;
The MIC verification unit is used for when the described management frames of described MIC information judgment unit judges is carried MIC information, utilizes pre-configured key that the part of removing described MIC information in the described management frames is carried out the information integrity verification, obtains the MIC check value;
The legitimacy judging unit is used for MIC information that the MIC check value that obtains when described MIC verification unit and described management frames carry when identical, judges that described management frames is legal, otherwise judges that described management frames is illegal.
Wherein, described MIC information judging unit also is used for judging that described management frames is illegal when judging that described management frames is not carried MIC information.
Wherein, described MIC information is arranged in the MIC field of described management frames.
Wherein, also comprise:
The management frames generation unit when being used for needs transmission management frames, utilizes pre-configured key that described management frames to be sent is carried out the information integrity verification, and check results is added in the described management frames as MIC information;
The management frames transmitting element, the MIC management of information frame that has been used to send interpolation that described management frames generation unit generates.
Wherein, also comprise:
Key storing unit is used for storage sets temporary key GTK and pair temporal key PTK, when described management frames is unicast management frames, described GTK is offered described MIC verification unit and management frames generation unit; When described management frames is the multicast management frame, described PTK is offered described MIC verification unit and management frames generation unit.
Compared with prior art, the present invention has the following advantages:
Among the present invention,, make the recipient of management frames to judge, avoided spoofing attack based on management frames to the legitimacy of the management frames that receives by in management frames, adding MIC information.
Description of drawings
In order to be illustrated more clearly in the embodiment of the invention or technical scheme of the prior art, to do to introduce simply to the accompanying drawing of required use in embodiment or the description of the Prior Art below, apparently, accompanying drawing in describing below only is some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the flow chart that user terminal connects by authentication and related two processes and AP in the prior art;
Fig. 2 is a transmission schematic diagram of removing authentication frame in the prior art;
Fig. 3 is a disassociation frame and the structural representation of removing authentication frame in the prior art;
Fig. 4 is based on the attack schematic diagram of removing authentication frame in the prior art;
Fig. 5 is the method for calibration flow chart of the management frames in wireless local area that provides among the present invention;
Fig. 6 is the schematic diagram of the pair temporal key system used among the present invention;
Fig. 7 is the schematic diagram of the group temporary key system used among the present invention;
Fig. 8 is a disassociation frame and the structural representation of removing authentication frame among the present invention;
Fig. 9 is the method for calibration flow chart of management frames in the application scenarios of the present invention;
Figure 10 is the structural representation of the equipment in the WLAN (wireless local area network) that provides among the present invention;
Figure 11 is another structural representation of the equipment in the WLAN (wireless local area network) that provides among the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the invention, the technical scheme in the embodiment of the invention is clearly and completely described, obviously, described embodiment only is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills belong to the scope of protection of the invention not making the every other embodiment that is obtained under the creative work prerequisite.
A kind of method of calibration of management frames in wireless local area is provided among the present invention, as shown in Figure 5, has comprised:
Step s501, when receiving management frames, judge whether carry information integrity verification MIC information in the management frames.
Step s502, when carrying MIC information, utilize pre-configured key that the part of removing MIC information in the management frames is carried out the information integrity verification, obtain the MIC check value.
When the MIC information of carrying in step s503, MIC check value and the management frames is identical, judges that management frames is legal, otherwise judge that management frames is illegal.
Among the present invention, transmit leg is when sending management frames, carry out the information integrity verification by pre-configured key to sent management frames, add MIC (Message Integrity Check, the information integrity verification) information that verification obtains to management frames discipline recipient transmission.The recipient is when receiving the management frames of transmit leg transmission, part except that MIC information in the management frames is carried out the information integrity verification according to pre-configured key, the MIC information of carrying before in MIC information that verification is obtained and the management frames compares, when comparative result is consistent, judge that this management frames is legal and handle, otherwise judge that this management frames is illegal, abandon this management frames.
Among the present invention, transmit leg disposes identical key with the recipient.Below the key that disposes among transmit leg and the recipient is introduced.
Usually; the user by the authentication with related two processes after also to carry out the authentication of user class; RSN (Robust Security Network, RSN)/WPA (WiFi Protected Access, WiFi protects visit)+1X, RSN/WPA+PSK etc. for example.After the finishing of the authentication of user class, AP and user can have pair temporal key PTK and group temporary key GTK (Group TransientKey) separately.
Wherein, system as shown in Figure 6 for pair temporal key PTK (Pairwise Transient Key), pair temporal key PTK launches to obtain by the pairwise master key PMK (PairwiseMaster Key) of pseudo-random function with 256, in RSN/WPA+PSK, pairwise master key is pre-configured.Under the situation of using RSN/WPA+1X, master key is calculated and is got by RADIUS (RemoteAuthentication Dial In User Service, far-end is with dialling in the service for checking credentials) server, and the PTK of different user is differing from each other.No matter be the PTK that adopts TKIP or any cipher mode of CCMP, 128 temporary key TK (Temporal Key) can be arranged all wherein.Among the present invention, TK is used for encrypting the unicast data frames between AP and the user.
Wherein, system as shown in Figure 7 for group temporary key GTK (Group Transient Key), group temporary key GTK launches to obtain by the group master key GMK (Group Master Key) of pseudo-random function with 128, and all users that insert same BSS have identical GTK.No matter be the GTK that adopts TKIP or any cipher mode of CCMP, 128 temporary key GTK can be arranged all wherein.Among the present invention, GTK is used for encrypting the broadcast data frame between AP and the user.
The equipment that has correct PTK and GTK is considered to legal and safe, if the sender utilizes PTK and GTK respectively the management frames (as disassociation frame or releasing authentication frame) of clean culture and broadcasting to be carried out the MIC verification, and the MIC information after the verification is filled up in the management frames, the recipient just can use PTK of oneself and GTK to judge that this management frames is from legitimate device or spoofing attack person after receiving management frames so.For this reason, the MIC field that need to increase a length in management frames among the present invention be 16 bytes.The end that is added on management frames with the MIC field is an example, its structural representation as shown in Figure 8,
Below in conjunction with a concrete application scenarios, describe management frames among the present invention the embodiment of method of calibration.Wherein be that disassociation frame or releasing authentication frame are that example describes with the management frames.As shown in Figure 9, may further comprise the steps:
Step s901, sender carry out the information integrity verification according to pre-configured key to sent disassociation frame or releasing authentication frame, check results are added to the MIC field of disassociation frame or releasing authentication frame.
Concrete, the sender is if send the disassociation frame of a clean culture or remove authentication frame, then after having filled in the disassociation frame or having removed field necessary in the authentication frame, earlier the MIC field is filled out and be complete 0, use the TK among the PTK that entire frame is carried out the information integrity verification then, and check value is inserted the MIC field.
The sender is if send the disassociation frame of a broadcasting or remove authentication frame, after having filled in the disassociation frame or having removed field necessary in the authentication frame, earlier the MIC field is filled out and be complete 0, use the GTK among the GTK that entire frame is carried out the information integrity verification then, and check value is inserted the MIC field.
Step s902, sender send the disassociation frame that carries the MIC field or remove authentication frame.
Step s903, recipient carry out verification and processing according to pre-configured key to the disassociation frame or the releasing authentication frame that receive.
Concrete, the recipient at first reads the MIC field and saves as MIC at the disassociation frame that receives a clean culture or after removing authentication frame Frame, then the MIC field is filled out to complete 0, and use the TK among the own PTK that entire frame is carried out the information integrity verification, obtain check value MIC LocalIf MIC LocalWith MIC FrameEquate, then handle this frame, otherwise abandon.
The recipient at first reads the MIC field and saves as MIC at the disassociation frame that receives a broadcasting or after removing authentication frame Frame, then the MIC field is filled out to complete 0, and use the Grouptemporalkey among the own GTK that entire frame is carried out the information integrity verification, obtain check value MIC LocalIf MIC LocalWith MIC FrameEquate, then handle this frame, otherwise abandon.
Need illustrate, describe the method that the sender handles the management frames of carrying the MIC field in the above-mentioned flow process.For the management frames of not carrying the MIC field that receives, the recipient can handle accordingly according to predetermined strategy, for example when not carrying MIC information in the management frames that receives, judges that directly this management frames is illegal, and abandons.
The method that the application of the invention provides is added MIC information in management frames, make the recipient of management frames to judge the legitimacy of the management frames that receives, has avoided the spoofing attack based on management frames.
The present invention also provides the equipment in a kind of WLAN (wireless local area network), as shown in figure 10, comprising:
Management frames receiving element 10 is used to receive management frames;
MIC information judging unit 20 is used for judging whether management frames carries information integrity verification MIC information; Also be used for when judging that management frames is not carried MIC information, judge that management frames is illegal.Wherein, MIC information is arranged in the MIC field of management frames.
MIC verification unit 30 is used for utilizing pre-configured key that the part of removing MIC information in the management frames is carried out the information integrity verification when MIC information judging unit 20 judges that management frames is carried MIC information, obtains the MIC check value;
Legitimacy judging unit 40 is used for MIC information that the MIC check value that obtains when MIC verification unit 30 and management frames carry when identical, judges that management frames is legal, otherwise judges that management frames is illegal.
As shown in figure 11, in the equipment in the WLAN (wireless local area network) that provides among the present invention, can also comprise:
Management frames generation unit 50 when being used for needs transmission management frames, utilizes pre-configured key to carry out the information integrity verification to sent management frames, and check results is added in the management frames as MIC information;
Management frames transmitting element 60, the MIC management of information frame that has been used to send interpolation that the management frames generation unit generates.
Key storing unit 70 is used for storage sets temporary key GTK and pair temporal key PTK, when management frames is unicast management frames, GTK is offered MIC verification unit 30 and management frames generation unit 50; When management frames is the multicast management frame, PTK is offered MIC verification unit 30 and management frames generation unit 50.
The equipment that the application of the invention provides adds MIC information in management frames, make the recipient of management frames to judge the legitimacy of the management frames that receives, has avoided the spoofing attack based on management frames.
Through the above description of the embodiments, those skilled in the art can be well understood to the present invention and can realize by hardware, also can realize by the mode that software adds necessary general hardware platform.Based on such understanding, technical scheme of the present invention can embody with the form of software product, it (can be CD-ROM that this software product can be stored in a non-volatile memory medium, USB flash disk, portable hard drive etc.) in, comprise some instructions with so that computer equipment (can be personal computer, server, the perhaps network equipment etc.) carry out the described method of each embodiment of the present invention.
It will be appreciated by those skilled in the art that accompanying drawing is the schematic diagram of a preferred embodiment, unit in the accompanying drawing or flow process might not be that enforcement the present invention is necessary.
It will be appreciated by those skilled in the art that the unit in the device among the embodiment can be distributed in the device of embodiment according to the embodiment description, also can carry out respective change and be arranged in the one or more devices that are different from present embodiment.A unit can be merged in the unit of the foregoing description, also can further split into a plurality of subelements.
The invention described above embodiment sequence number is not represented the quality of embodiment just to description.

Claims (10)

1, a kind of method of calibration of management frames in wireless local area is characterized in that, comprising:
When receiving management frames, judge whether carry information integrity verification MIC information in the described management frames;
When carrying MIC information, utilize pre-configured key that the part of removing described MIC information in the described management frames is carried out the information integrity verification, obtain the MIC check value;
When the MIC information of carrying in described MIC check value and the described management frames is identical, judges that described management frames is legal, otherwise judge that described management frames is illegal.
2, method of calibration as claimed in claim 1 is characterized in that, also comprises: when not carrying MIC information in the described management frames, judge that described management frames is illegal.
3, method of calibration as claimed in claim 1 or 2 is characterized in that, described MIC information is arranged in the MIC field of described management frames.
4, the method for claim 1 is characterized in that, also comprises:
When needing to send management frames, utilize pre-configured key that described management frames to be sent is carried out the information integrity verification, check results is added in the described management frames as MIC information;
Send described generation interpolation MIC management of information frame.
As claim 1 or 4 described methods of calibration, it is characterized in that 5, when described management frames was unicast management frames, described pre-configured key was group temporary key GTK; When described management frames was the multicast management frame, described pre-configured key was pair temporal key PTK.
6, the equipment in a kind of WLAN (wireless local area network) is characterized in that, comprising:
The management frames receiving element is used to receive management frames;
MIC information judging unit is used for judging whether described management frames carries information integrity verification MIC information;
The MIC verification unit is used for when the described management frames of described MIC information judgment unit judges is carried MIC information, utilizes pre-configured key that the part of removing described MIC information in the described management frames is carried out the information integrity verification, obtains the MIC check value;
The legitimacy judging unit is used for MIC information that the MIC check value that obtains when described MIC verification unit and described management frames carry when identical, judges that described management frames is legal, otherwise judges that described management frames is illegal.
7, equipment as claimed in claim 6 is characterized in that, described MIC information judging unit also is used for judging that described management frames is illegal when judging that described management frames is not carried MIC information.
As claim 6 or 7 described equipment, it is characterized in that 8, described MIC information is arranged in the MIC field of described management frames.
9, equipment as claimed in claim 6 is characterized in that, also comprises:
The management frames generation unit when being used for needs transmission management frames, utilizes pre-configured key that described management frames to be sent is carried out the information integrity verification, and check results is added in the described management frames as MIC information;
The management frames transmitting element, the MIC management of information frame that has been used to send interpolation that described management frames generation unit generates.
10, as claim 6 or 9 described equipment, it is characterized in that, also comprise:
Key storing unit is used for storage sets temporary key GTK and pair temporal key PTK, when described management frames is unicast management frames, described GTK is offered described MIC verification unit and management frames generation unit; When described management frames is the multicast management frame, described PTK is offered described MIC verification unit and management frames generation unit.
CN200910162177A 2009-08-07 2009-08-07 The method of calibration of management frames in wireless local area and equipment Pending CN101616412A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200910162177A CN101616412A (en) 2009-08-07 2009-08-07 The method of calibration of management frames in wireless local area and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200910162177A CN101616412A (en) 2009-08-07 2009-08-07 The method of calibration of management frames in wireless local area and equipment

Publications (1)

Publication Number Publication Date
CN101616412A true CN101616412A (en) 2009-12-30

Family

ID=41495742

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200910162177A Pending CN101616412A (en) 2009-08-07 2009-08-07 The method of calibration of management frames in wireless local area and equipment

Country Status (1)

Country Link
CN (1) CN101616412A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101860570A (en) * 2010-06-10 2010-10-13 中兴通讯股份有限公司 Method for backuping and restoring user data of mobile terminal
CN102013976A (en) * 2010-12-20 2011-04-13 西安西电捷通无线网络通信股份有限公司 Key management method and system
CN104350703A (en) * 2012-06-04 2015-02-11 西门子公司 Secure transmission of message
CN104486717A (en) * 2014-12-10 2015-04-01 宇龙计算机通信科技(深圳)有限公司 Mobility management entity, mobile terminal, controlled parameter transmission system and controlled parameter transmission method
CN105229966A (en) * 2013-05-24 2016-01-06 高通股份有限公司 For having the system and method for the broadcast WLAN message of message authentication
CN105471879A (en) * 2015-12-04 2016-04-06 三明学院 Novel method for preventing DoS attack of wireless disassociation frame based on rough set
CN105792291A (en) * 2014-12-23 2016-07-20 华为技术有限公司 Channel switching method and wireless access device
CN105828330A (en) * 2015-01-07 2016-08-03 阿里巴巴集团控股有限公司 Access method and access device
CN106231598A (en) * 2016-07-28 2016-12-14 北京坤腾畅联科技有限公司 Wireless network attack immunization method based on frame detection and terminal unit
CN107425961A (en) * 2011-09-12 2017-12-01 高通股份有限公司 The system and method for performing link establishment and certification
WO2022242761A1 (en) * 2021-05-20 2022-11-24 华为技术有限公司 Data transmission method, communication apparatus, computer-readable storage medium, and chip

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101860570B (en) * 2010-06-10 2014-12-10 中兴通讯股份有限公司 Method and system for backuping and restoring user data of mobile terminal
CN101860570A (en) * 2010-06-10 2010-10-13 中兴通讯股份有限公司 Method for backuping and restoring user data of mobile terminal
CN102013976A (en) * 2010-12-20 2011-04-13 西安西电捷通无线网络通信股份有限公司 Key management method and system
CN102013976B (en) * 2010-12-20 2013-07-31 西安西电捷通无线网络通信股份有限公司 Key management method and system
CN107425961A (en) * 2011-09-12 2017-12-01 高通股份有限公司 The system and method for performing link establishment and certification
CN107425961B (en) * 2011-09-12 2021-01-22 高通股份有限公司 System and method for performing link establishment and authentication
CN104350703B (en) * 2012-06-04 2018-01-09 西门子公司 The safe transmission of message
CN104350703A (en) * 2012-06-04 2015-02-11 西门子公司 Secure transmission of message
CN105229966A (en) * 2013-05-24 2016-01-06 高通股份有限公司 For having the system and method for the broadcast WLAN message of message authentication
CN104486717A (en) * 2014-12-10 2015-04-01 宇龙计算机通信科技(深圳)有限公司 Mobility management entity, mobile terminal, controlled parameter transmission system and controlled parameter transmission method
CN104486717B (en) * 2014-12-10 2019-01-25 宇龙计算机通信科技(深圳)有限公司 Mobile management device, mobile terminal, controlled parameter Transmission system and method
CN105792291A (en) * 2014-12-23 2016-07-20 华为技术有限公司 Channel switching method and wireless access device
CN105792291B (en) * 2014-12-23 2019-05-28 华为技术有限公司 A kind of method and radio reception device of channel switching
CN105828330A (en) * 2015-01-07 2016-08-03 阿里巴巴集团控股有限公司 Access method and access device
CN105828330B (en) * 2015-01-07 2019-12-27 阿里巴巴集团控股有限公司 Access method and device
CN105471879A (en) * 2015-12-04 2016-04-06 三明学院 Novel method for preventing DoS attack of wireless disassociation frame based on rough set
CN105471879B (en) * 2015-12-04 2018-11-27 三明学院 Novel based on rough set prevents wireless disassociation frame DoS attack method
CN106231598A (en) * 2016-07-28 2016-12-14 北京坤腾畅联科技有限公司 Wireless network attack immunization method based on frame detection and terminal unit
WO2022242761A1 (en) * 2021-05-20 2022-11-24 华为技术有限公司 Data transmission method, communication apparatus, computer-readable storage medium, and chip

Similar Documents

Publication Publication Date Title
CN101616412A (en) The method of calibration of management frames in wireless local area and equipment
CN106664561B (en) System and method for securing pre-association service discovery
US9843579B2 (en) Dynamically generated SSID
JP5597676B2 (en) Key material exchange
JP3863852B2 (en) Method of controlling access to network in wireless environment and recording medium recording the same
CN101926151B (en) Method and communication network system for establishing security conjunction
EP3364595A1 (en) Key configuration method and key management center, and network element
US10588015B2 (en) Terminal authenticating method, apparatus, and system
CN103609154B (en) A kind of WLAN access authentication method, equipment and system
CN101371491A (en) Method and arrangement for the creation of a wireless mesh network
CN102082665B (en) Identity authentication method, system and equipment in EAP (Extensible Authentication Protocol) authentication
CN102118387A (en) System and method for secure transaction of data between wireless communication device and server
CN103096301A (en) Method for verifying wireless local area network access point and station for the same
EP3146740B1 (en) Cellular network authentication
CN1941695B (en) Method and system for generating and distributing key during initial access network process
US20230076147A1 (en) Method and apparatus for authenticating terminal, computer device and storage medium
CN103313242A (en) Secret key verification method and device
Li et al. Efficient authentication for fast handover in wireless mesh networks
WO2011124051A1 (en) Method and system for terminal authentication
CN105141629A (en) Method for improving network security of public Wi-Fi based on WPA/WPA2 PSK multiple passwords
US20080126455A1 (en) Methods of protecting management frames exchanged between two wireless equipments, and of receiving and transmitting such frames, computer programs, and data media containing said computer programs
EP2770767B1 (en) Method, system, and related device for gsm security
CN101282215A (en) Method and apparatus for distinguishing certificate
CN100499453C (en) Method of the authentication at client end
CN110831000B (en) Secure access method, device and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20091230