WO2013183881A1 - 액세스 포인트 스캔 방법 - Google Patents
액세스 포인트 스캔 방법 Download PDFInfo
- Publication number
- WO2013183881A1 WO2013183881A1 PCT/KR2013/004607 KR2013004607W WO2013183881A1 WO 2013183881 A1 WO2013183881 A1 WO 2013183881A1 KR 2013004607 W KR2013004607 W KR 2013004607W WO 2013183881 A1 WO2013183881 A1 WO 2013183881A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- access point
- identifier
- generated based
- information generated
- request frame
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
Definitions
- the present invention relates to a method of scanning an access point, and more particularly, to an active access point scan method for quickly scanning an access point.
- wireless local area network is based on radio frequency technology such as personal digital assistant (PDA), laptop computer, portable multimedia player (PMP), etc. It is a technology that allows a user to access the Internet wirelessly at home, a business, or a specific service area by using a portable terminal.
- PDA personal digital assistant
- PMP portable multimedia player
- IEEE 802.11a provides a transmission rate of 54 Mbps using an unlicensed band at 5 GHz.
- IEEE 802.11b applies a direct sequence spread spectrum (DSSS) at 2.4 GHz to provide a transmission rate of 11 Mbps.
- IEEE 802.11g applies orthogonal frequency division multiplexing (OFDM) at 2.4 GHz to provide a transmission rate of 54 Mbps.
- IEEE 802.11n applies multiple input multiple output OFDM (MIMO-OFDM) to provide a transmission rate of 300 Mbps for four spatial streams.
- IEEE 802.11n supports a channel bandwidth of up to 40 MHz, in which case it provides a transmission rate of 600 Mbps.
- VHT Very high throughput
- IEEE 802.11ac is being developed as a standard for providing a very high throughput in the band below 6 GHz
- IEEE 802.11ad is being developed as a standard for providing a very high throughput in the 60 GHz band.
- An object of the present invention for solving the above problems is to provide an access point scanning method of a terminal for searching for an access point based on a compressed service set ID (SSID).
- SSID compressed service set ID
- Another object of the present invention for solving the above problems is to provide a method of operating an access point for searching for an access point based on the compressed SSID.
- a method for scanning an access point of a terminal comprising: generating a probe request frame including information generated based on an identifier of a search target access point, and generating the probe request frame. Transmitting.
- the information generated based on the identifier of the search target access point may have a shorter length than the identifier of the search target access point.
- the identifier of the searched access point may be an SSID, and the information generated based on the identifier of the searched access point may be a hash function value of the identifier of the searched access point.
- the hash function may be a CRC function.
- the probe request frame may include at least two pieces of information generated based on the identifier of the search target access point.
- the method may further include matching and storing the identifier of the searched access point and the information generated based on the identifier.
- a method for scanning an access point of a terminal comprising: generating a probe request frame including information generated based on an identifier of a non-discovery access point; and Transmitting.
- the information generated based on the identifier of the search excluded access point may have a length shorter than the identifier of the search excluded access point.
- the identifier of the search excluded access point may be an SSID
- the information generated based on the identifier of the search excluded access point may be a hash function value of the identifier of the search excluded access point.
- the hash function may be a CRC function.
- the probe request frame may include at least two pieces of information generated based on an identifier of the search exclusion access point.
- the method may further include matching and storing an identifier of the search excluded access point and information generated based on the identifier.
- a method of operating an access point comprising: receiving a probe request frame including information generated based on an identifier of the access point, included in the probe request frame; Determining whether the information generated based on the identifier corresponds to the identifier of the access point; and if the information generated based on the identifier corresponds to the identifier of the access point, a probe corresponding to the probe request frame Sending a response frame.
- the information generated based on the identifier of the access point may have a length shorter than the identifier of the access point.
- the identifier of the access point is an SSID
- the information generated based on the identifier of the access point may be a hash function value of the identifier of the access point.
- the hash function may be a CRC function.
- the probe response frame may include information generated based on the identifier of the access point.
- the information generated based on the identifier of the access point may have a length shorter than the identifier of the access point.
- the identifier of the access point is an SSID
- the information generated based on the identifier of the access point may be a hash function value of the identifier of the access point.
- the hash function may be a CRC function.
- the terminal can search (or exclude from the search) a plurality of access points by transmitting one probe request frame, it is possible to quickly search for a desired access point. As a result, power and time of the terminal consumed to search for an access point can be reduced.
- the terminal may reduce the length of the probe request frame by transmitting the probe request frame including the compressed SSID, thereby reducing the power consumption of the terminal and improve the efficiency of the radio channel.
- the access point determines whether to transmit a probe response frame by comparing the compressed SSID, not the entire SSID, it is possible to quickly transmit a probe response frame.
- FIG. 1 is a conceptual diagram illustrating an embodiment of a configuration of an IEEE 802.11 WLAN system.
- FIG. 2 is a conceptual diagram illustrating a connection process of a terminal in an infrastructure BSS.
- FIG. 3 is a conceptual diagram illustrating a body constituting a probe request frame.
- FIG. 4 is a conceptual diagram illustrating bodies (orders 1 to 14) constituting a probe response frame.
- FIG. 5 is a conceptual diagram illustrating a body (order 15 to last-n) constituting a probe response frame.
- FIG. 6 is a block diagram illustrating a frame configuration for an SSID.
- FIG. 7 is a flowchart illustrating an access point scan method according to an embodiment of the present invention.
- FIG. 8 is a block diagram illustrating a frame configuration for a compressed SSID.
- FIG. 9 is a block diagram illustrating a frame structure for a compressed SSID list.
- first and second may be used to describe various components, but the components should not be limited by the terms. The terms are used only for the purpose of distinguishing one component from another.
- the first component may be referred to as the second component, and similarly, the second component may also be referred to as the first component.
- a station is a physical layer for medium access control (MAC) and wireless medium that conforms to the Institute of Electrical and Electronics Engineers (IEEE) 802.11 standard. By any functional medium that includes an interface.
- the station STA may be divided into a station that is an access point (AP) and a station that is a non-access point (STA).
- a station (STA), which is an access point (AP), may simply be called an access point (AP), and a station (STA), which is a non-AP, may simply be called a terminal.
- the station STA may include a processor and a transceiver, and may further include a user interface and a display device.
- a processor refers to a unit designed to generate a frame to be transmitted through a wireless network or to process a frame received through the wireless network, and performs various functions for controlling a station (STA).
- a transceiver is a unit that is functionally connected to a processor and is designed to transmit and receive a frame through a wireless network for a station (STA).
- An access point may refer to a centralized controller, a base station (BS), a node-B, an e-node-B, a base transceiver system (BTS), or a site controller, and the like. Some or all of the features may be included.
- BS base station
- BTS base transceiver system
- the terminal may be a wireless transmit / receive unit (WTRU), a user equipment (UE), a user terminal (UT), an access terminal (AT), a mobile station (MS), May refer to a mobile terminal, a subscriber unit, a subscriber station (SS), a wireless device, or a mobile subscriber unit, and some of them. Or all of the functions may be included.
- WTRU wireless transmit / receive unit
- UE user equipment
- UT user terminal
- AT access terminal
- MS mobile station
- SS subscriber station
- wireless device or a mobile subscriber unit, and some of them. Or all of the functions may be included.
- a desktop computer a laptop computer, a tablet PC, a wireless phone, a mobile phone, a smart phone, and an e-communication capable of communicating with a terminal
- book readers portable multimedia players (PMPs), portable game consoles, navigation devices, digital cameras, digital multimedia broadcasting (DMB) players, digital audio recorders, digital audio players ),
- DMB digital multimedia broadcasting
- a digital picture recorder, a digital picture player, a digital video recorder, a digital video player, and the like can be used.
- FIG. 1 is a conceptual diagram illustrating an embodiment of a configuration of an IEEE 802.11 WLAN system.
- an IEEE 802.11 WLAN system includes at least one basic service set (BSS).
- BSS means a set of stations (STA 1, STA 2 (AP 1), STA 3, STA 4, STA 5 (AP 2)) that can be successfully synchronized to communicate with each other, the concept of a specific area is no.
- BSS can be classified into Infrastructure BSS (Independent BSS) and Independent BSS (IBSS), and BSS 1 and BSS 2 represent Infrastructure BSS.
- BSS 1 connects a terminal (STA 1), an access point (STA 2 (AP 1)) providing a distribution service and a plurality of access points (STA 2 (AP 1), STA 5 (AP 2)) It may include a distribution system (DS).
- STA 2 an access point STA 2 (AP 1) manages a terminal STA 1.
- BSS 2 connects a terminal (STA 3, STA 4), an access point (STA 5 (AP 2)) providing a distribution service and a plurality of access points (STA 2 (AP 1), STA 5 (AP 2)) It may include a distribution system.
- an access point STA 5 (AP 2) manages terminals STA 3 and STA 4.
- the independent BSS is a BSS operating in an ad-hoc mode. Since the IBSS does not include an access point, there is no centralized management entity. That is, in the IBSS, terminals are managed in a distributed manner. In IBSS, all terminals may be mobile terminals, and thus, are not allowed to be connected to the distribution system (DS), thereby forming a self-contained network.
- DS distribution system
- the access points STA 2 (AP 1) and STA 5 (AP 2) provide access to the distributed system DS through the wireless medium for the terminals STA 1, STA 3, and STA 4 coupled thereto. .
- Communication between terminals STA 1, STA 3, and STA 4 in BSS 1 or BSS 2 is generally performed through an access point STA 2 (AP 1) or STA 5 (AP 2), but a direct link (direct link) If the link is configured, direct communication between the terminals STA 1, STA 3, and STA 4 is possible.
- the plurality of infrastructure BSSs may be interconnected through a distribution system (DS).
- DS distribution system
- a plurality of BSSs connected through a distribution system (DS) is called an extended service set (ESS).
- Stations included in the ESS may communicate with each other, and the UE may move from one BSS to another BSS while seamlessly communicating within the same ESS.
- the distribution system (DS) is a mechanism for one access point to communicate with another access point, whereby the access point transmits frames to, or moves to, another BSS for the terminals that are associated with the BSS it manages.
- a frame may be transmitted for one arbitrary terminal.
- the access point may transmit and receive frames with an external network such as a wired network.
- Such a distribution system (DS) does not necessarily need to be a network, and there is no limitation on its form as long as it can provide a predetermined distribution service defined in the IEEE 802.11 standard.
- the distribution system may be a wireless network such as a mesh network or a physical structure that connects access points to each other.
- the scanning method and the operating method of the access point according to an embodiment of the present invention to be described later can be applied to the IEEE 802.11 WLAN system described above, and in addition to the IEEE 802.11 WLAN system, WPAN (Wireless Personal Area Network) It can be applied to various networks such as a wireless body area network (WBAN).
- WPAN Wireless Personal Area Network
- FIG. 2 is a conceptual diagram illustrating a connection process of a terminal in an infrastructure BSS.
- the terminal STA In order for the STA to transmit and receive data in the intra-structure BSS, the terminal STA must first be connected to the access point AP.
- connection process of the STA in the infrastructure BSS is largely 1) a probe step (AP), 2) an authentication step with the detected access point (AP). ) And 3) an association step with an authenticated access point (AP).
- the STA may first detect neighboring access points (APs) through a detection process.
- the detection process is divided into a passive scanning method and an active scanning method.
- the passive scanning method may be performed by overhearing beacons transmitted by neighboring access points (APs).
- the active scanning method may be performed by broadcasting a probe request frame.
- the AP that receives the probe request frame may transmit a probe response frame corresponding to the probe request frame to the corresponding STA.
- the STA may know the presence of neighboring access points (APs) by receiving a probe response frame.
- the terminal STA may perform authentication with the detected access point AP and may perform authentication with the plurality of detected access points APs.
- An authentication algorithm according to the IEEE 802.11 standard is divided into an open system algorithm for exchanging two authentication frames and a shared key algorithm for exchanging four authentication frames. Through the process of exchanging an authentication request frame and an authentication response frame based on the authentication algorithm, the terminal STA may perform authentication with the access point AP.
- the terminal STA selects one of the authenticated access points APs and performs a connection process with the selected access point AP. That is, the terminal STA transmits an association request frame to the selected access point AP, and the access point AP that receives the association request frame receives an association response frame corresponding to the association request frame. frame is transmitted to the corresponding STA. As such, through the process of exchanging the connection request frame and the connection response frame, the STA may perform a connection process with the access point AP.
- FIG. 3 is a conceptual diagram illustrating a body constituting a probe request frame
- FIG. 4 is a conceptual diagram illustrating bodies 1 to 14 constituting a probe response frame
- FIG. 5 is a diagram illustrating a probe response frame
- FIG. 6 is a conceptual diagram illustrating a body (order 15 to Last-n)
- FIG. 6 is a block diagram illustrating a frame configuration for a service set ID (SSID).
- SSID service set ID
- the terminal transmits a probe request frame including an identifier (service set ID, SSID) of a specific access point for searching for a specific access point,
- the probe request frame does not include a specific identifier (ie, wildcard SSID type) for access point search.
- the access point receiving the probe request frame includes its SSID in the probe request frame or transmits a probe response frame corresponding to the probe request frame when the SSID is a wildcard SSID.
- the frame for the SSID includes an element ID field, a length field, and an SSID field.
- the element ID field may have a size of 1 octet
- the length field may have a size of 1 octet
- the SSID field may have a size of 0 to 32 octets.
- the UE When searching for a plurality of different access points using probe request frames including a specific identifier (SSID), the UE transmits a plurality of probe request frames including different SSIDs, and probe request frames from the plurality of access points. Receive the probe response frame corresponding to the.
- SSID specific identifier
- the UE When searching for a plurality of different access points using probe request frames that do not include a specific identifier (ie, wildcard SSID type), the UE transmits a probe request frame in the form of wildcard SSID and receives all probe request frames. Receive a probe response frame from the access point.
- a specific identifier ie, wildcard SSID type
- FIG. 7 is a flowchart illustrating an access point scan method according to an embodiment of the present invention.
- the terminal 10 may detect a probe request frame including information generated based on the identifier of the access point 20 (AP).
- the generated probe request frame may be transmitted (S110), and a probe response frame corresponding to the probe request frame may be received from the access point 20 (S130).
- the terminal 10 may match and store the generated information based on the identifier and the identifier of the access point 20 (S120). Although step S120 is shown to be performed after step S110, the terminal 10 may perform step S120 simultaneously with step S100 and may be performed after step S100.
- the access point 20 may receive a probe request frame including information generated based on an identifier of the predetermined access point ( S110, it may be determined whether the information generated based on the identifier of the access point included in the probe request frame corresponds to its own identifier (S130), and the information generated based on the identifier of the access point included in the probe request frame
- S corresponds to the identifier of the mobile station
- the probe response frame corresponding to the probe request frame may be transmitted (S140).
- the terminal 10 may generate a probe request frame including information generated based on the identifier of the search target access point 20, or may be generated based on the identifier of the search exclusion access point 20.
- a probe request frame including information can be generated.
- the search target access point 20 refers to the access point 20 that the terminal 10 wants to search for
- the search exclusion access point 20 refers to the access point 20 that the terminal 10 wants to exclude from the search. Means. That is, the search target access point 20 transmits a probe response frame corresponding to the probe request frame received from the terminal 10, and the search exclusion access point 20 corresponds to the probe request frame received from the terminal 10. Transmitted probe response frames are not transmitted.
- the information generated based on the identifier of the searched access point 20 may have a shorter length than the identifier of the searched access point 20, and the information generated based on the identifier of the search excluded access point 20 may be It may have a length shorter than an identifier of the corresponding search exclusion access point 20. That is, the terminal 10 may generate information corresponding to the identifier of the corresponding search target access point 20 having a length shorter than that of the search target access point 20, or may generate information corresponding to the search exclusion access point 20. Information corresponding to the identifier of the corresponding search exclusion access point 20 having a length shorter than the identifier may be generated.
- An identifier of the search target access point (or non-search access point) 20 may mean an SSID.
- the information generated based on the identifier of the searched access point 20 may mean a hash function value of the identifier of the searched access point 20, and is based on the identifier of the search excluded access point 20.
- the generated information may mean a hash function value of an identifier of the corresponding search exclusion access point 20.
- the hash function may mean a cyclic redundancy check (CRC) function, and the hash function value may mean a compressed SSID (that is, a hashed SSID). That is, the terminal 10 may generate a hashed SSID that is information corresponding to the identifier (ie, SSID) of the search target access point 20 based on the CRC function, or based on the CRC function, the search exclusion access point A hashed SSID that is information corresponding to the identifier (ie, SSID) of 20 may be generated.
- CRC cyclic redundancy check
- the terminal 10 may generate a probe request frame including at least two pieces of information generated based on the identifier of the search target access point (or the search non-access point) 20.
- FIG. 8 is a block diagram showing a frame configuration for a compressed SSID
- FIG. 9 is a block diagram showing a frame configuration for a compressed SSID list.
- the frame for the compressed SSID includes an element ID field, a length field, a hashed SSID list field, and the hashed SSID list field At least one hashed SSID field (hashed SSID # 1, hashed SSID # 2, ..., hashed SSID #N).
- the element ID field may have a size of 1 octet
- the length field may have a size of 1 octet
- the hashed SSID list field may have a variable size
- one hashed SSID field may have 4 octets. It may have a size of.
- the terminal 10 uses a hash function (that is, a CRC function) to correspond to the information (that is, the hashed SSID) of the identifier (that is, the SSID) of the search target access point (or the search non-access point) 20. ) Can be created.
- the terminal 10 may generate a hashed SSID having a size of 4 octets, and generate a hashed SSID list field including at least one hashed SSID.
- the hash function may use a CRC function for generating a 4-octet MAC protocol data unit (MPDU) frame check sequence (FCS).
- MPDU 4-octet MAC protocol data unit
- FCS frame check sequence
- the terminal 10 may transmit a probe request frame including information generated based on the identifier of the search target access point (or search exclusion access point) 20, and access point. 20 may receive a probe request frame including information generated based on an identifier of a predetermined access point.
- the terminal 10 may match and store an identifier of the search target access point (or search exclusion access point) 20 and the information generated based on the identifier. Since the identifier of the access point 20 refers to the SSID and the information generated based on the identifier refers to the hashed SSID, the terminal 10 may match and store the SSID and the hashed SSID.
- the access point 20 may determine whether the generated information corresponds to its identifier based on the identifier included in the probe request frame. Since the identifier included in the probe request frame refers to the SSID and the information generated based on the identifier refers to the hashed SSID, the access point 20 may identify the hashed SSID included in the probe request frame and its identifier (that is, the SSID). ), It is possible to determine whether the information (that is, the hashed SSID) is the same.
- the access point 20 may generate information (ie, a hashed SSID) corresponding to its identifier (ie, SSID), or probe from the terminal 10. Before receiving the request frame, information (ie, hashed SSID) corresponding to its identifier (ie, SSID) may be generated.
- the access point 20 may generate information corresponding to its identifier (i.e., SSID) (i.e., a hashed SSID) using a hash function (i.e., CRC function), and generate an identifier (i.e., SSID) in itself.
- the information corresponding to may have a length shorter than its identifier (ie, SSID).
- the information (ie, the hashed SSID) corresponding to the identifier (ie, SSID) generated based on the hash function (ie, the CRC function) may have a size of 4 octets.
- the access point 20 When receiving the probe request frame including the information generated based on the identifier of the access point 20 to be searched, the access point 20 determines whether the information included in the frame request frame and the information corresponding to the identifier thereof are the same. If the information included in the frame request frame and the information corresponding to the identifier thereof are not the same, the frame response frame corresponding to the frame request frame is not transmitted.
- the access point 20 determines the identity of the information included in the frame request frame and the information corresponding to the identifier thereof. If the information included in the frame request frame and the information corresponding to the identifier thereof are the same, the frame response frame corresponding to the frame request frame is not transmitted.
- the access point 20 may transmit a frame response frame corresponding to the probe request frame.
- the access point 20 determines that the information included in the frame request frame and the information corresponding to the identifier thereof are the same. If so, the frame response frame corresponding to the frame request frame may be transmitted.
- the access point 20 When the probe request frame including the information generated based on the identifier of the search exclusion access point 20 is received, the access point 20 is not identical to the information included in the frame request frame and the information corresponding to the identifier thereof. If determined, the frame response frame corresponding to the frame request frame may be transmitted.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (20)
- 단말의 능동적 액세스 포인트 스캔(active access point scan) 방법으로서,검색 대상 액세스 포인트의 식별자에 기초하여 생성된 정보를 포함한 프로브 요청 프레임(probe request frame)을 생성하는 단계; 및상기 프로브 요청 프레임을 전송하는 단계를 포함한 단말의 액세스 포인트 스캔 방법.
- 청구항 1에 있어서,상기 검색 대상 액세스 포인트의 식별자에 기초하여 생성된 정보는 상기 검색 대상 액세스 포인트의 식별자보다 짧은 길이를 가지는, 단말의 액세스 포인트 스캔 방법.
- 청구항 2에 있어서,상기 검색 대상 액세스 포인트의 식별자는 SSID(Service Set Identifier)이며, 상기 검색 대상 액세스 포인트의 식별자에 기초하여 생성된 정보는 상기 검색 대상 액세스 포인트의 식별자의 해쉬(hash) 함수 값인, 단말의 액세스 포인트 스캔 방법.
- 청구항 3에 있어서,상기 해쉬 함수는 CRC(Cyclic Redundancy Check) 함수인, 단말의 액세스 포인트 스캔 방법.
- 청구항 1에 있어서,상기 프로브 요청 프레임은 상기 검색 대상 액세스 포인트의 식별자에 기초하여 생성된 정보를 적어도 둘 이상 포함하는, 단말의 액세스 포인트 스캔 방법.
- 청구항 1에 있어서,상기 검색 대상 액세스 포인트의 식별자와 상기 식별자에 기초하여 생성된 정보를 매칭하여 저장하는 단계를 추가로 포함하는, 단말의 액세스 포인트 스캔 방법.
- 단말의 능동적 액세스 포인트 스캔(active access point scan) 방법으로서,검색 제외 액세스 포인트의 식별자에 기초하여 생성된 정보를 포함한 프로브 요청 프레임(probe request frame)을 생성하는 단계; 및상기 프로브 요청 프레임을 전송하는 단계를 포함한 단말의 액세스 포인트 스캔 방법.
- 청구항 7에 있어서,상기 검색 제외 액세스 포인트의 식별자에 기초하여 생성된 정보는 상기 검색 제외 액세스 포인트의 식별자보다 짧은 길이를 가지는 단말의 액세스 포인트 스캔 방법.
- 청구항 8에 있어서,상기 검색 제외 액세스 포인트의 식별자는 SSID(Service Set Identifier)이며, 상기 검색 제외 액세스 포인트의 식별자에 기초하여 생성된 정보는 상기 검색 제외 액세스 포인트의 식별자의 해쉬(hash) 함수 값인, 단말의 액세스 포인트 스캔 방법.
- 청구항 9에 있어서,상기 해쉬 함수는 CRC(Cyclic Redundancy Check) 함수인, 단말의 액세스 포인트 스캔 방법.
- 청구항 7에 있어서,상기 프로브 요청 프레임은 상기 검색 제외 액세스 포인트의 식별자에 기초하여 생성된 정보를 적어도 둘 이상 포함하는, 단말의 액세스 포인트 스캔 방법.
- 청구항 7에 있어서,상기 검색 제외 액세스 포인트의 식별자와 상기 식별자에 기초하여 생성된 정보를 매칭하여 저장하는 단계를 추가로 포함하는, 단말의 액세스 포인트 스캔 방법.
- 단말의 능동적 액세스 포인트 스캔(active access point scan)을 지원하는 액세스 포인트의 동작 방법으로서,상기 액세스 포인트의 식별자에 기초하여 생성된 정보를 포함한 프로브 요청 프레임(probe request frame)을 수신하는 단계;상기 프로프 요청 프레임에 포함된 상기 식별자에 기초하여 생성된 정보가 상기 액세스 포인트의 식별자에 대응되는지를 판단하는 단계;상기 식별자에 기초하여 생성된 정보가 상기 액세스 포인트의 식별자에 대응되면, 상기 프로프 요청 프레임에 대응된 프로브 응답 프레임(probe response frame)을 전송하는 단계를 포함한 액세스 포인트의 동작 방법.
- 청구항 13에 있어서,상기 액세스 포인트의 식별자에 기초하여 생성된 정보는 상기 액세스 포인트의 식별자보다 짧은 길이를 가지는, 액세스 포인트의 동작 방법.
- 청구항 14에 있어서,상기 액세스 포인트의 식별자는 SSID(Service Set Identifier)이며, 상기 액세스 포인트의 식별자에 기초하여 생성된 정보는 상기 액세스 포인트의 식별자의 해쉬(hash) 함수 값인, 액세스 포인트의 동작 방법.
- 청구항 14에 있어서,상기 해쉬 함수는 CRC(Cyclic Redundancy Check) 함수인, 단말의 액세스 포인트 스캔 방법.
- 청구항 13에 있어서,상기 프로브 응답 프레임은 상기 액세스 포인트의 식별자에 기초하여 생성된 정보를 포함하는, 액세스 포인트의 동작 방법.
- 청구항 17에 있어서,상기 액세스 포인트의 식별자에 기초하여 생성된 정보는 상기 액세스 포인트의 식별자보다 짧은 길이를 가지는, 액세스 포인트의 동작 방법.
- 청구항 18에 있어서,상기 액세스 포인트의 식별자는 SSID(Service Set Identifier)이며, 상기 액세스 포인트의 식별자에 기초하여 생성된 정보는 상기 액세스 포인트의 식별자의 해쉬(hash) 함수 값인, 액세스 포인트의 동작 방법.
- 청구항 19에 있어서,상기 해쉬 함수는 CRC(Cyclic Redundancy Check) 함수인, 액세스 포인트의 동작 방법.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/405,364 US9510274B2 (en) | 2012-06-04 | 2013-05-27 | Method of scanning access point |
CN201380032131.1A CN104396159B (zh) | 2012-06-04 | 2013-05-27 | 一种搜寻接入点的方法 |
US15/277,257 US10123261B2 (en) | 2012-06-04 | 2016-09-27 | Method of scanning access point |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR20120059864 | 2012-06-04 | ||
KR10-2012-0059864 | 2012-06-04 | ||
KR10-2013-0043982 | 2013-04-22 | ||
KR1020130043982A KR20130136380A (ko) | 2012-06-04 | 2013-04-22 | 액세스 포인트 스캔 방법 |
Related Child Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/405,364 A-371-Of-International US9510274B2 (en) | 2012-06-04 | 2013-05-27 | Method of scanning access point |
US15/277,257 Continuation US10123261B2 (en) | 2012-06-04 | 2016-09-27 | Method of scanning access point |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2013183881A1 true WO2013183881A1 (ko) | 2013-12-12 |
Family
ID=49712237
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2013/004607 WO2013183881A1 (ko) | 2012-06-04 | 2013-05-27 | 액세스 포인트 스캔 방법 |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2013183881A1 (ko) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015105679A1 (en) * | 2014-01-07 | 2015-07-16 | Intel Corporation | Apparatus, method and system of obfuscating a wireless communication network identifier |
WO2016058166A1 (zh) * | 2014-10-16 | 2016-04-21 | 华为技术有限公司 | 一种触发注册机协议交互的方法、接入点、站点 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005002116A2 (en) * | 2003-06-13 | 2005-01-06 | Docomo Communications Laboratories Usa, Inc. | Proxy active scan for wireless networks |
KR20090132650A (ko) * | 2007-06-01 | 2009-12-30 | 엘지전자 주식회사 | 무선랜에서의 스캔 절차, 이를 지원하는 스테이션, 및 이를 위한 프레임 포맷 |
KR20100130535A (ko) * | 2009-06-03 | 2010-12-13 | 엘지전자 주식회사 | Ap 선택 정보 제공 방법 |
KR20110085836A (ko) * | 2010-01-20 | 2011-07-27 | 엘지전자 주식회사 | 무선랜에서 능동 스캐닝 방법 및 장치 |
JP2012095191A (ja) * | 2010-10-28 | 2012-05-17 | Kddi Corp | 完全ステルスモード無線lan装置および接続方法 |
-
2013
- 2013-05-27 WO PCT/KR2013/004607 patent/WO2013183881A1/ko active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005002116A2 (en) * | 2003-06-13 | 2005-01-06 | Docomo Communications Laboratories Usa, Inc. | Proxy active scan for wireless networks |
KR20090132650A (ko) * | 2007-06-01 | 2009-12-30 | 엘지전자 주식회사 | 무선랜에서의 스캔 절차, 이를 지원하는 스테이션, 및 이를 위한 프레임 포맷 |
KR20100130535A (ko) * | 2009-06-03 | 2010-12-13 | 엘지전자 주식회사 | Ap 선택 정보 제공 방법 |
KR20110085836A (ko) * | 2010-01-20 | 2011-07-27 | 엘지전자 주식회사 | 무선랜에서 능동 스캐닝 방법 및 장치 |
JP2012095191A (ja) * | 2010-10-28 | 2012-05-17 | Kddi Corp | 完全ステルスモード無線lan装置および接続方法 |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015105679A1 (en) * | 2014-01-07 | 2015-07-16 | Intel Corporation | Apparatus, method and system of obfuscating a wireless communication network identifier |
CN105814926A (zh) * | 2014-01-07 | 2016-07-27 | 英特尔公司 | 使无线通信网络标识符混淆的装置、方法和系统 |
WO2016058166A1 (zh) * | 2014-10-16 | 2016-04-21 | 华为技术有限公司 | 一种触发注册机协议交互的方法、接入点、站点 |
CN105940720A (zh) * | 2014-10-16 | 2016-09-14 | 华为技术有限公司 | 一种触发注册机协议交互的方法、接入点、站点 |
US10375627B2 (en) | 2014-10-16 | 2019-08-06 | Huawei Technologies Co., Ltd. | Method for triggering registrar protocol interaction, access point, and station |
CN105940720B (zh) * | 2014-10-16 | 2019-11-29 | 华为技术有限公司 | 一种触发注册机协议交互的方法、接入点、站点 |
US10609633B2 (en) | 2014-10-16 | 2020-03-31 | Huawei Technologies Co., Ltd. | Method for triggering registrar protocol interaction, access point, and station |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2014014281A1 (ko) | 무선랜 시스템에서 능동 검색 방법 | |
WO2010140742A1 (en) | Method for providing information of access point selection | |
WO2009113798A2 (en) | Scanning method in wireless system | |
WO2010068066A2 (en) | Method and apparatus for band switching in wireless local access network | |
KR102067732B1 (ko) | 액세스 포인트 스캔 방법 | |
WO2011115448A2 (ko) | 무선랜 시스템에서 멀티 밴드 정보 수신 방법 및 장치 | |
WO2013122398A1 (ko) | 무선랜 시스템에서 필터링 기반 스캐닝 방법 및 장치 | |
WO2016018080A1 (en) | Method and apparatus for scanning access point in wireless lan system | |
WO2013183931A1 (en) | Method of active scanning and associating based on configuration information | |
WO2021246656A1 (ko) | 선호 링크 정보 전송 방법 | |
WO2016085243A1 (ko) | 무선랜에서 스테이션의 동작 방법 | |
WO2017209462A1 (ko) | 무선랜 품질 관리 방법 및 장치 | |
WO2012115337A1 (ko) | Tdls를 통한 화이트 스페이스 대역으로의 채널 스위칭 | |
WO2014003479A1 (ko) | Aid 재할당 방법 및 aid 재할당 방법을 수행하는 장치 | |
WO2016111558A1 (ko) | 무선랜 시스템에서 멀티 유저 전송에 관련된 프레임 송수신 방법 및 장치 | |
WO2013032080A1 (ko) | 비 ap로 동작하는 sta을 통한 ds접속 | |
WO2013183881A1 (ko) | 액세스 포인트 스캔 방법 | |
WO2014003472A1 (ko) | 무선랜 시스템에서 액세스 포인트의 검색 방법 | |
WO2013187653A1 (en) | Method of accessing channel in wireless local area network system | |
WO2017209463A1 (ko) | 무선랜에서 동적 연결 변경 방법 및 장치 | |
WO2014003471A1 (ko) | 무선랜 시스템에서 액세스 포인트의 검색 방법 | |
WO2014142569A1 (ko) | 무선랜 시스템에서 다중 대역 기반의 링크 설정 방법 및 장치 | |
WO2013035968A1 (ko) | 무선 근거리 네트워크에서 서비스 또는 액티비티를 제공하기 위한 무선 송수신 유닛 | |
WO2014003473A1 (ko) | 무선랜 시스템에서 aid 변경 방법 | |
WO2016085201A1 (ko) | 다중대역 무선랜 엑세스 포인트간 인접 엑세스 포인트 디스커버리 방법 및 시스템 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 13800339 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 14405364 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 25/03/2015) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 13800339 Country of ref document: EP Kind code of ref document: A1 |