WO2013064062A1 - Procédé et dispositif de transmission d'un paquet de données - Google Patents

Procédé et dispositif de transmission d'un paquet de données Download PDF

Info

Publication number
WO2013064062A1
WO2013064062A1 PCT/CN2012/083804 CN2012083804W WO2013064062A1 WO 2013064062 A1 WO2013064062 A1 WO 2013064062A1 CN 2012083804 W CN2012083804 W CN 2012083804W WO 2013064062 A1 WO2013064062 A1 WO 2013064062A1
Authority
WO
WIPO (PCT)
Prior art keywords
correspondence
data packet
encryption algorithm
information element
negotiation
Prior art date
Application number
PCT/CN2012/083804
Other languages
English (en)
Chinese (zh)
Inventor
姚宗明
夏林峰
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2013064062A1 publication Critical patent/WO2013064062A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/67Risk-dependent, e.g. selecting a security level depending on risk profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Definitions

  • Embodiments of the present invention relate to the field of communications, and more particularly, to a method and apparatus for transmitting data packets. Background technique
  • IEEE Institute of Electrical and Electronics Engineers, IEEE 802.11 technology develops a common MAC (Medium Access Control) for multiple PHYs (Physical Layers) to build standard WLANs.
  • the main task of the MAC is to establish addressing and channel access control mechanisms for multiple sites in the same network, making communication between multiple sites possible.
  • BSS Basic Service Set
  • AP Access Point
  • ESS Extended Service Set
  • STAs can also communicate directly with each other by self-organizing the network.
  • This network is an independent BSS or IBSS (Alternate Basic Service Set).
  • IEEE 802. Hi is a wireless security protocol and is a general principle.
  • TKIP Temporal Key Integrity Protocol
  • CCMP Counter Mode/CBC-MAC Protocol
  • AES Advanced Encryption Standard
  • CCMP is based on a "chain" mode, which requires processing 16-byte blocks in order, because the chain-encrypted mode requires the output of the previous stage as the source for the input of the next stage.
  • IEEE 802.11ac and IEEE 802.11ad have higher data rates and have had a significant impact on network protocols in other related fields.
  • CCMP may not meet the requirements.
  • a new protocol GCMP Galois/Counter Mode Protocol
  • EDCA Enhanced Distributed Channel Access
  • DCF Distributed Coordinator Function
  • QoS priority quality of service
  • the EDCA mechanism defines four access categories (AC) based on data priority from low to high: AC_BK (background), AC_BE (best effort), AC_VI (video) and AC_VO (voice).
  • AC-BK and AC-BE do not require much real-time data communication.
  • AC-VI and AC-VO the amount of data is large and the real-time requirements are quite high.
  • the existing IEEE 802.11ac protocol specifies the encryption algorithm as follows: In an ESS, if the AP informs the relevant VHT (very High Throughput) STA that it supports CCMP encryption or beacon transmission by the AP.
  • the detection feedback includes HT (High Throughput) capability information or VHT capability information. Therefore, the VHT STA can only use the CCMP encryption algorithm as the only choice of its encryption algorithm, which may result in delay in data packet transmission and result in data packets. The contradiction between security and real-time transmission. Summary of the invention
  • the embodiments of the present invention provide a method and a device for transmitting a data packet, which can resolve the contradiction between the security and real-time performance of the data packet transmission, and improve the transmission efficiency of the data packet.
  • a method for transmitting a data packet including: determining an access category of a data packet; determining an encryption algorithm of the data packet according to a correspondence between an access category of the data packet determined by the negotiation with the receiving end and an encryption algorithm. Encrypting the data packet using the encryption algorithm of the data packet; transmitting the encrypted data packet to the receiving end.
  • a method for transmitting a data packet including: receiving an encrypted data packet from a transmitting end; determining an access category of the data packet; and determining an access category and encryption of the data packet according to the negotiation with the transmitting end Corresponding relationship of the algorithm, determining an encryption algorithm of the data packet; using the encryption algorithm of the data packet to decrypt the data packet.
  • an apparatus for transmitting a data packet including: a first determining unit, configured to determine an access category of the data packet; and a second determining unit, configured to determine, according to the data packet determined by the receiving end, Corresponding relationship between the access category and the encryption algorithm, determining an encryption algorithm of the data packet; an encryption unit for encrypting the data packet using an encryption algorithm of the data packet; and a sending unit, configured to send the encrypted data to the receiving end package.
  • an apparatus for transmitting a data packet including: a receiving unit, configured to receive an encrypted data packet from a transmitting end; a category determining unit, configured to determine an access category of the data packet; and an algorithm determining unit And determining, according to a correspondence between an access category and an encryption algorithm of the data packet determined by the sending end, determining an encryption algorithm of the data packet; and a decryption unit, configured to decrypt the data packet by using an encryption algorithm of the data packet .
  • the embodiment of the present invention can solve the contradiction between the security and the real-time performance of the data packet transmission by configuring the corresponding encryption algorithm for the data packets of different access categories, and improve the transmission efficiency of the data packet.
  • FIG. 1 is a schematic flow chart of a method of transmitting a data packet according to an embodiment of the present invention.
  • 2 is a schematic flow chart of a method of transmitting a data packet according to another embodiment of the present invention.
  • FIG. 3 is a schematic flowchart of a process of transmitting a data packet according to another embodiment of the present invention.
  • 4 is a schematic diagram of a format of a negotiating information element according to an embodiment of the present invention.
  • FIG. 5 is a block diagram of an apparatus for transmitting data packets in accordance with one embodiment of the present invention.
  • FIG. 6 is a block diagram of an apparatus for transmitting a data packet in accordance with another embodiment of the present invention. detailed description
  • FIG. 1 is a schematic flow chart of a method of transmitting a data packet according to an embodiment of the present invention.
  • the method of Figure 1 is performed by a transmitting end, for example, the transmitting end may be a station in a wireless local area network, such as a STA defined in a WLAN.
  • the access category can be four access categories in the EDCA mechanism: AC—BK (background),
  • AC BE best effort
  • AC VI video
  • AC VO voice
  • the sending end may negotiate with the receiving end to determine the correspondence between the access category of the data packet and the encryption algorithm, for example, in the process of detecting the request/detecting response and/or the associated request/association response, the sending end and the receiving end may The correspondence is determined by negotiation, or the corresponding relationship is determined by negotiating with the receiving end through newly added dedicated signaling.
  • the sending end may negotiate with the receiving end to determine a correspondence between the access category of the data packet and the encryption algorithm, for example, sending a detection request to the receiving end.
  • the receiver negotiates with the receiving end to determine the correspondence.
  • the sending end may generate a first negotiation information element, where the first negotiation information element indicates the first correspondence, and sends the first negotiation information element to the receiving end.
  • the sender may send the first negotiation information element when sending a detection request or an association request to the receiving end.
  • the sending end may receive a response message returned by the receiving end, where the response message carries a second negotiation information element from the receiving end, where the second negotiation information element indicates a second correspondence, according to the first The corresponding relationship and the second correspondence, the sending end determines the correspondence.
  • the sending end may also receive an acknowledgement message returned by the receiving end for confirming acceptance of the first negotiation information element.
  • the sender may receive a response message or a confirmation message returned by the receiving end when detecting or correlating the detection request or the association request to the sender.
  • the receiving end may not return any response message, and the default is to accept the first negotiation information element of the sending end.
  • the embodiment of the invention is not limited.
  • the sending end determines that the corresponding relationship is the first correspondence or the second correspondence; and if the second correspondence is the first correspondence The sender determines that the correspondence is the second correspondence.
  • the access class with higher real-time performance may correspond to a less complex encryption algorithm.
  • the access category AC-VI or AC-VO has higher real-time requirements.
  • a less complex encryption algorithm such as TKIP or GCMP can be used.
  • Category AC—BK or AC—BE has lower requirements for real-time performance.
  • more complex encryption algorithms such as CCMP can be used.
  • the sender and the receiver can synthesize each other's security configuration and negotiate the encryption algorithm of the data packets of different access categories.
  • embodiments of the present invention are not limited to the specific categories and specific algorithms described above.
  • the sending end may negotiate with the receiving end to determine a key corresponding to the encryption algorithm in the corresponding relationship. For example, for the encryption algorithm in the corresponding relationship, the sending end and the receiving end separately calculate and negotiate to determine the encryption algorithm. Corresponding unicast and multicast keys.
  • the sending end may use a key corresponding to the encryption algorithm determined by the receiving end to negotiate, and encrypt the data packet according to the encryption algorithm of the data packet determined in 120, and update the key. For the next packet encryption.
  • the embodiment of the present invention can solve the contradiction between the security and the real-time performance of the data packet transmission by configuring the corresponding encryption algorithm for the data packets of different access categories, and improve the transmission efficiency of the data packet.
  • FIG. 2 is a schematic flow chart of a method of transmitting a data packet according to another embodiment of the present invention.
  • the method of Figure 2 is performed by the receiving end.
  • the receiving end can be an access point in a wireless local area network, such as an AP defined in a WLAN.
  • the access category can be four access categories in the EDCA mechanism: AC—BK (background), AC_BE (best effort), AC_VI (video), and AC_VO (voice).
  • AC—BK background
  • AC_BE best effort
  • AC_VI video
  • AC_VO voice
  • embodiments of the present invention are not limited to the specific access categories described above.
  • the receiving end may negotiate with the sending end to determine the correspondence between the access category of the data packet and the encryption algorithm, for example, in the process of detecting the request/detecting response and/or the associated request/association response, the receiving end and the transmitting end may The correspondence is determined by negotiation, or the corresponding relationship is determined by negotiating with the sender through the newly added dedicated signaling.
  • the receiving end may negotiate with the transmitting end to determine a correspondence between the access category of the data packet and the encryption algorithm. For example, in the process of making a detection response or an association response at the receiving end, the correspondence is determined by negotiating with the transmitting end.
  • the receiving end may receive the first negotiation information element from the sending end, where the first negotiation information element indicates the first correspondence relationship; according to the first correspondence, the receiving end generates the second negotiation information element, where The negotiation information element indicates the second correspondence relationship; the receiving end returns a response message carrying the second negotiation information element to the sending end.
  • the receiving end can also return to the sender for confirmation. Accept the confirmation message of the first negotiation information element.
  • the receiving end may send a response message carrying the second negotiation information element or an acknowledgement message for confirming acceptance of the first negotiation information element to the transmitting end when the detection response or the association response is sent to the sending end. .
  • the receiving end may not return any response message, and the default is to accept the first negotiation information element of the sending end.
  • the embodiments of the present invention are not limited.
  • the second corresponding relationship is the same as the first corresponding relationship; if the receiving end does not accept the first corresponding relationship, the second corresponding relationship corresponds to the first correspondence
  • the relationship is different. For example, if the receiving end does not support the encryption algorithm or the non-correlation configuration in the correspondence indicated by the first negotiation information element of the transmitting end, the receiving end configures a corresponding encryption algorithm for the data packets of different access categories according to the situation of the receiving end, thereby A second correspondence is established, and a second negotiation information element is generated to indicate the second correspondence.
  • the access class with higher real-time performance may correspond to a lower complexity encryption algorithm.
  • the access category AC-VI or AC-VO has higher real-time requirements.
  • a less complex encryption algorithm such as TKIP or GCMP can be used.
  • Category AC—BK or AC—BE has lower requirements for real-time performance.
  • more complex encryption algorithms such as CCMP can be used. The sender and the receiver can synthesize each other's security configuration and negotiate the encryption algorithm of the data packets of different access categories.
  • the receiving end may negotiate with the sending end to determine a key corresponding to the encryption algorithm in the corresponding relationship, for example, for the encryption algorithm in the corresponding relationship, the receiving end and the sending end separately calculate and negotiate to determine the encryption algorithm. Corresponding unicast and multicast keys.
  • the receiving end may use the key corresponding to the encryption algorithm in the correspondence determined by the sending end to negotiate, according to the encryption algorithm of the data packet determined in 230, decrypt the data packet, and update the key, so as to perform the next time. Packet decryption.
  • the embodiment of the present invention can solve the contradiction between the security and the real-time performance of the data packet transmission by configuring the corresponding encryption algorithm for the data packets of different access categories, and improve the transmission efficiency of the data packet.
  • FIG. 3 is a schematic flowchart of a process of transmitting a data packet according to another embodiment of the present invention.
  • the sending end of the data packet is the STA defined in the WLAN
  • the receiving end is the AP defined in the WLAN as an example.
  • STAs and APs in a BSS work in two modes of operation, MU-MIM0 (Multiple User MIMO) mode and SU-MIMO (Single User MIMO) mode.
  • MU-MIMO mode the AP simultaneously transmits data to multiple STAs or simultaneously receives data from multiple STAs.
  • SU-MIMO mode the AP transmits and receives data to and from only one STA at a time. Embodiments of the invention are applicable to either mode.
  • the STA generates a first negotiation information element, where the first negotiation information element indicates a first correspondence between the access category of the data packet and the encryption algorithm.
  • the STA sends a first negotiation information element to the AP.
  • the STA may send the first negotiation information element to the AP when sending a detection request or an association request to the AP.
  • the AP generates, according to the received first negotiation information element from the STA, a second negotiation information element, where the second negotiation information element indicates a second correspondence between the access category of the data packet and the encryption algorithm.
  • the second correspondence is the same as the first correspondence, and if the AP does not accept the first correspondence from the STA, according to the In the case, the second correspondence is established, and the second negotiation information element is generated to indicate the second correspondence.
  • the AP returns a response message carrying the second negotiation information element to the STA.
  • the AP may return a response message carrying the second negotiation information element to the STA when the detection response or the association response is sent to the STA, or the AP may return an acknowledgement to accept the first negotiation information element.
  • the message, or the AP may not return any message, and the default is to accept the first negotiation information element of the STA.
  • the embodiments of the present invention are not limited.
  • the STA determines, according to the response message that the second negotiation information element is returned by the AP, the correspondence between the access category of the data packet and the encryption algorithm.
  • the STA determines that the correspondence relationship is the first correspondence relationship or the second correspondence relationship; Different from the first correspondence, the STA determines that the correspondence is the second correspondence.
  • the access class with higher real-time performance may correspond to a less complex encryption algorithm.
  • the access category AC-VI or AC-VO has higher real-time requirements.
  • a less complex encryption algorithm such as TKIP or GCMP can be used.
  • Category AC—BK or AC—BE for real-time Lower requirements in order to achieve higher security, you can use more complex encryption algorithms, such as CCMP.
  • the sender and the receiver can synthesize each other's security configuration and negotiate encryption algorithms for different access category data packets.
  • the STA and the AP negotiate to determine a key corresponding to the encryption algorithm in the correspondence.
  • the unicast and multicast keys corresponding to the encryption algorithm are separately calculated and negotiated for the encryption algorithm in the corresponding relationship. Used to encrypt or decrypt packets when sending or receiving data packets between STAs and APs.
  • the STA Before sending a data packet to the AP, the STA determines an access category of the data packet.
  • the STA determines an encryption algorithm of the data packet according to the correspondence determined by the negotiation with the AP.
  • the STA encrypts the data packet by using an encryption algorithm of the data packet.
  • the STA may encrypt the data packet using a key corresponding to the encryption algorithm that has been negotiated with the AP.
  • the STA then updates the key for the next packet encryption.
  • the STA sends an encrypted data packet to the AP.
  • the AP After receiving the encrypted data packet from the STA, the AP determines an access category of the data packet.
  • the AP determines an encryption algorithm of the data packet according to the correspondence determined by the STA.
  • the AP decrypts the data packet by using an encryption algorithm of the data packet.
  • the AP may encrypt the data packet using a key corresponding to the encryption algorithm that has been negotiated with the STA. The AP then updates the key for the next packet decryption.
  • the embodiment of the present invention can solve the contradiction between the security and the real-time performance of the data packet transmission by configuring the corresponding encryption algorithm for the data packets of different access categories, and improve the transmission efficiency of the data packet.
  • FIG. 4 is a schematic diagram of a format of a negotiating information element according to an embodiment of the present invention.
  • the information element ID can help identify that the information element is a negotiation information element; the length represents the information element ID field and the length field in the negotiation information element.
  • the overall length of the other fields; AC-VI encryption algorithm, AC-VO encryption algorithm, AC-BE encryption algorithm and AC-BK encryption algorithm field respectively represent the encryption algorithm corresponding to each access category, for example, 0 means no encryption, 1 for TKIP, 2 for GCMP, 3 for CCMP, 4 ⁇ 255 is reserved and not used temporarily.
  • the negotiation information element in the embodiment of the present invention can solve the contradiction between the security and the real-time performance of the data packet transmission by indicating the encryption algorithm corresponding to different access categories, and improve the transmission efficiency of the data packet.
  • FIG. 5 is a block diagram of an apparatus for transmitting data packets in accordance with one embodiment of the present invention.
  • An example of the device 500 of Figure 5 is a transmitting end, such as a station or access point in a wireless local area network, such as a STA or AP defined in a WLAN.
  • the device 500 includes: a first determining unit 510, a second determining unit 520, an encrypting unit 530, and a transmitting unit 540.
  • the first determining unit 510 determines an access category of the data packet.
  • the second determining unit 520 determines the encryption algorithm of the data packet according to the correspondence between the access category and the encryption algorithm of the data packet determined in agreement with the receiving end.
  • the encryption unit 530 is configured to encrypt the data packet by using an encryption algorithm of the data packet.
  • the sending unit 540 is configured to send the encrypted data packet to the receiving end.
  • the embodiment of the present invention can solve the contradiction between the security and the real-time performance of the data packet transmission by configuring the corresponding encryption algorithm for the data packets of different access categories, and improve the transmission efficiency of the data packet.
  • the device 500 may further include a negotiation determining unit 550, and determine the corresponding relationship by negotiating with the receiving end.
  • the negotiation determining unit 550 may receive a response message returned by the receiving end, where the response message carries a second negotiation information element from the receiving end, where the second negotiation information element indicates the second correspondence, And determining the correspondence according to the first correspondence relationship and the second correspondence relationship.
  • the negotiation determining unit 550 is further configured to determine that the corresponding relationship is the first correspondence relationship or the second correspondence relationship if the second correspondence relationship is the same as the first correspondence relationship, or if the second correspondence relationship is different from the first correspondence relationship, Then, the correspondence is determined to be the second correspondence.
  • FIG. 6 is a block diagram of an apparatus for transmitting a data packet in accordance with another embodiment of the present invention.
  • An example of the device 600 of Figure 6 is a receiving end, such as a station or access point in a wireless local area network, such as a STA or AP defined in a WLAN.
  • the device 600 includes: a receiving unit 610, a class determining unit 620, an algorithm determining unit 630, and a decrypting unit 640.
  • the receiving unit 610 receives the encrypted data packet from the transmitting end.
  • the category determining unit 620 determines an access category of the data packet.
  • the algorithm determining unit 630 determines an encryption algorithm of the data packet according to the correspondence between the access category and the encryption algorithm of the data packet determined in agreement with the transmitting end.
  • the decryption unit 640 decrypts the data packet using the encryption algorithm of the data packet.
  • the embodiment of the present invention can solve the contradiction between the security and the real-time performance of the data packet transmission by configuring the corresponding encryption algorithm for the data packets of different access categories, and improve the transmission efficiency of the data packet.
  • the device 600 further includes a negotiation determining unit.
  • the negotiation determining unit 650 may receive the first negotiation information element from the sending end, where the first negotiation information element indicates the first correspondence, and generates the second negotiation information according to the first correspondence.
  • the second negotiation information element indicates the second correspondence, and returns a response message carrying the second negotiation information element to the sending end.
  • a communication system may include the above-described device 500 or device 600.
  • the disclosed systems, devices, and methods may be implemented in other ways.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored, or not executed.
  • the coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be electrical, mechanical or otherwise.
  • the components displayed for the unit may or may not be physical units, ie may be located in one place, or may be distributed over multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solution of the embodiment.
  • each functional unit in various embodiments of the present invention may be integrated in one processing unit. It is also possible that each unit physically exists alone, or two or more units may be integrated in one unit.
  • the functions, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium.
  • the technical solution of the present invention which is essential or contributes to the prior art, or a part of the technical solution, may be embodied in the form of a software product, which is stored in a storage medium, including
  • the instructions are used to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present invention.
  • the foregoing storage medium includes: a U disk, a removable hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk or an optical disk, and the like, which can store program codes. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Des modes de réalisation de la présente invention concernent un procédé et un dispositif permettant de transmettre un paquet de données. Le procédé consiste : à déterminer un type d'accès d'un paquet de données ; en fonction de la corrélation entre le type d'accès et un algorithme de cryptage du paquet de données négocié avec un récepteur, à déterminer un algorithme de cryptage du paquet de données ; à utiliser l'algorithme de cryptage du paquet de données pour crypter le paquet de données ; et à envoyer le paquet de données crypté au récepteur. Dans le mode de réalisation de la présente invention, des paquets de données de différents types d'accès sont configurés avec des algorithmes de cryptage correspondants de manière à résoudre le conflit entre la sécurité et les performances en temps réel de la transmission de paquets de données, pour améliorer ainsi l'efficacité de transmission des paquets de données.
PCT/CN2012/083804 2011-10-31 2012-10-31 Procédé et dispositif de transmission d'un paquet de données WO2013064062A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201110336753.6 2011-10-31
CN201110336753.6A CN103096303B (zh) 2011-10-31 2011-10-31 传输数据包的方法及设备

Publications (1)

Publication Number Publication Date
WO2013064062A1 true WO2013064062A1 (fr) 2013-05-10

Family

ID=48191330

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2012/083804 WO2013064062A1 (fr) 2011-10-31 2012-10-31 Procédé et dispositif de transmission d'un paquet de données

Country Status (2)

Country Link
CN (1) CN103096303B (fr)
WO (1) WO2013064062A1 (fr)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104182501B (zh) * 2014-08-18 2018-01-02 曾蔚峰 远程预约门诊系统
CN107438247B (zh) * 2016-05-26 2020-04-03 新华三技术有限公司 无线中继实现方法及装置
CN107040293B (zh) * 2017-03-02 2020-12-22 义乌市智享通讯设备有限公司 多用户输入输出通信系统及方法
MX2019015149A (es) 2017-07-25 2020-02-19 Guangdong Oppo Mobile Telecommunications Corp Ltd Metodo de conmutacion, dispositivo de red de acceso y dispositivo de terminal.
KR20210075119A (ko) 2018-10-15 2021-06-22 광동 오포 모바일 텔레커뮤니케이션즈 코포레이션 리미티드 무선 통신 방법 및 기기
CN111885637B (zh) * 2020-07-21 2021-05-18 广芯微电子(广州)股份有限公司 一种基站信号强度测试方法、装置、系统及存储介质
CN111859345A (zh) * 2020-07-28 2020-10-30 郑州奥腾网络科技有限公司 一种计算机数据安全存储系统
CN112468485A (zh) * 2020-11-24 2021-03-09 广东电力信息科技有限公司 一种物联网消息报文处理方法、装置、终端及存储介质

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070160210A1 (en) * 2002-01-02 2007-07-12 Candelore Brant L Star pattern partial encryption method
CN101267297A (zh) * 2008-04-01 2008-09-17 华为技术有限公司 一种在通信系统中实现加密的方法及装置
CN101562813A (zh) * 2009-05-12 2009-10-21 中兴通讯股份有限公司 实时数据业务的实现方法、实时数据业务系统和移动终端

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101924905A (zh) * 2010-09-01 2010-12-22 新邮通信设备有限公司 可视电话通信中加解密的方法及系统

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070160210A1 (en) * 2002-01-02 2007-07-12 Candelore Brant L Star pattern partial encryption method
CN101267297A (zh) * 2008-04-01 2008-09-17 华为技术有限公司 一种在通信系统中实现加密的方法及装置
CN101562813A (zh) * 2009-05-12 2009-10-21 中兴通讯股份有限公司 实时数据业务的实现方法、实时数据业务系统和移动终端

Also Published As

Publication number Publication date
CN103096303B (zh) 2016-04-20
CN103096303A (zh) 2013-05-08

Similar Documents

Publication Publication Date Title
WO2013064062A1 (fr) Procédé et dispositif de transmission d'un paquet de données
EP2080387B1 (fr) Configuration et connexion à un réseau sans fil multimédia
JP5780558B2 (ja) 無線マルチバンドのセキュリティ
KR101019300B1 (ko) 애드 혹 무선 네트워크에서 인증 키 요소의 보안 처리를 위한 방법 및 시스템
JP6522861B2 (ja) 複数のセキュリティレベルを備える無線通信システム
CN103581901B (zh) 一种Wi‑Fi无线网络接入配置信息的处理方法和设备
KR101485279B1 (ko) 링크 계층 보안 전송을 지원하는 스위칭 장치 및 그의 데이터 처리 방법
WO2016101494A1 (fr) Procédé d'accès intelligent sans fil
WO2012083828A1 (fr) Procédé, station de base et système de mise en œuvre de trafic d'acheminement local
US9872175B2 (en) Packet processing method, apparatus, and system
WO2009097789A1 (fr) Procédé et système de communication pour établir une association de sécurité
KR101518438B1 (ko) 보안 네트워크 아키텍쳐를 확립하기 위한 방법, 보안 통신을 위한 방법 및 시스템
US20240107313A1 (en) Control frame processing method, control frame generating method, station, access point, and storage medium
CN107801187A (zh) 加解密方法、装置及系统
US11297496B2 (en) Encryption and decryption of management frames
US8094634B2 (en) Sender and/or helper node modifications to enable security features in cooperative wireless communications
WO2022237561A1 (fr) Procédé et appareil de communication
WO2010097003A1 (fr) Procédé permettant de réaliser une intégration de wapi et de capwap par mode mac fractionné
WO2010097004A1 (fr) Procédé permettant de réaliser une intégration d'infrastructure wapi et de points capwap par un mode mac séparé
EP4061038B1 (fr) Procédé de commutation de réseau sans fil et dispositif
TWI842187B (zh) 無線通信裝置、無線中繼設備及無線接入點
US11997482B2 (en) Association protection for wireless networks
WO2022198671A1 (fr) Procédé et appareil de communication
CN115037504A (zh) 通信方法及装置
Mavrogiannopoulos On Bluetooth. Security

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12845181

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 12845181

Country of ref document: EP

Kind code of ref document: A1