WO2015192665A1 - 基于临时mac地址的接入方法、装置及系统 - Google Patents

基于临时mac地址的接入方法、装置及系统 Download PDF

Info

Publication number
WO2015192665A1
WO2015192665A1 PCT/CN2015/072518 CN2015072518W WO2015192665A1 WO 2015192665 A1 WO2015192665 A1 WO 2015192665A1 CN 2015072518 W CN2015072518 W CN 2015072518W WO 2015192665 A1 WO2015192665 A1 WO 2015192665A1
Authority
WO
WIPO (PCT)
Prior art keywords
sta
tma
base station
message
authentication
Prior art date
Application number
PCT/CN2015/072518
Other languages
English (en)
French (fr)
Inventor
王海光
王贵林
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP15809901.0A priority Critical patent/EP3145232A4/en
Publication of WO2015192665A1 publication Critical patent/WO2015192665A1/zh
Priority to US15/380,780 priority patent/US20170099289A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/10Access restriction or access information delivery, e.g. discovery data delivery using broadcasted information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/14Access restriction or access information delivery, e.g. discovery data delivery using user query or user detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2101/00Indexing scheme associated with group H04L61/00
    • H04L2101/60Types of network addresses
    • H04L2101/618Details of network addresses
    • H04L2101/622Layer-2 addresses, e.g. medium access control [MAC] addresses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/75Temporary identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices

Definitions

  • the present invention relates to the field of network communications, and in particular, to a temporary MAC address-based access method, apparatus, and system.
  • WLAN Wireless Local Area Network
  • devices can communicate through an infrastructure mode (Infrastructure Mode).
  • infrastructure Mode Infrastructure Mode
  • AP Access Point
  • Other non-base station nodes Stations, non-base station devices in the WLAN network must first establish a connection with the AP to communicate with other nodes in the network and other nodes on the Internet.
  • the AP and the STA usually communicate using a global MAC (Media Access Control) layer allocated by the device manufacturer at the time of production, and the MAC address is almost during the lifetime of the device. Changeless.
  • the MAC address of the sender and the receiver included in the MAC packet is sent in plain text, and the third party can easily obtain the MAC address information through interception.
  • the MAC address has a single correspondence with the device (such as a mobile phone), and according to the device, the personal information of the user who owns the device can be contacted, so the leakage of the MAC address means the leakage of personal privacy.
  • MAC has become a personal privacy message that cannot be ignored.
  • the temporary MAC address is generally a local MAC address, that is, the 47th bit of the MAC address is set to 1.
  • the TMA can be generated by a base station or a user within a certain range. The resulting method can be randomly selected or assigned by the local system.
  • the STA When the TMA is used for wireless network communication in the related art, when one STA is to be connected to one base station, the STA must determine whether the base station is within the communication range. There are currently two ways to determine one Whether the base station is in the STA communication range, one of the modes is the passive discovery mode, that is, the STA listens to the discovery message (such as beacon message) sent by the base station on one channel; when on a certain channel When the target base station is discovered, the STA can send an authentication request (Access Request) to access the base station. The other mode is the active mode, that is, the STA actively sends a request message (Probe Request) on a channel.
  • the passive discovery mode that is, the STA listens to the discovery message (such as beacon message) sent by the base station on one channel; when on a certain channel
  • the STA can send an authentication request (Access Request) to access the base station.
  • the other mode is the active mode, that is, the STA actively sends a request message (Probe Request)
  • the base station If the target base station receives the inquiry signaling, the base station responds with a request response message (Probe Response), and asks for a response.
  • the content of the message is similar to the discovery message.
  • a STA receives the inquiry response message, it can decide whether to access the discovered base station according to the content of the inquiry response message. In a related access authentication, the STA may use the generated TMA to send an inquiry message to the base station, and the STA transmits an authentication message to the base station using another TMA and continues to use the TMA thereafter.
  • the inventor has found that at least the following problems exist in the prior art: when the base station does not support the use of the TMA by the STA, the STA may continuously use the generated TMA to perform access authentication to the base station, which may cause the STA to fail. Normal communication.
  • the STA may continuously use the generated TMA to perform access authentication to the base station, which may cause the STA to fail to perform normal communication.
  • the embodiment of the present invention provides a temporary MAC address based on the temporary MAC address. Access method, device and system. The technical solution is as follows:
  • the first aspect provides an access method based on a temporary MAC address, which is applied to a base station, where the method includes:
  • the base station And transmitting, in the access authentication process that the non-base station device STA performs wireless communication to the base station, a message for indicating, by the STA, whether the base station supports the STA to use the temporary MAC address TMA, so that the STA according to the message
  • the base station sends an authentication message, where the authentication message is an authentication message sent by the STA to the base station by using the TMA when the message is used to indicate that the base station supports the STA to use the TMA;
  • the message is a discovery message
  • the sending, by the STA, a message indicating whether to support the STA to use the TMA includes:
  • the sending of the discovery message is broadcast every predetermined time interval, and the discovery message includes a first indicator for indicating whether the base station supports the STA to use the TMA.
  • the discovery message is further A generation rule for instructing the STA to generate the TMA is included.
  • the discovery message further includes The STA uploads a second indicator of the real MAC address RMA of the STA.
  • the STA Before the STA sends a message indicating whether the base station supports the STA to use the temporary MAC address TMA, the STA further includes:
  • the message is an inquiry response message, and the sending, by the STA, a message for indicating whether to support the STA to use the temporary MAC address TMA, includes:
  • the inquiry response message including a first indicator for indicating whether the base station supports the STA to use the TMA.
  • the Send a query response message including:
  • the base station When the base station supports the STA to use the TMA, it is determined whether the TMA conflicts with a pre-stored TMA, and the pre-stored TMA includes a TMA used by each STA that performs a wireless communication connection with the base station;
  • the inquiry response message for indicating that the STA is not allowed to communicate using the TMA is sent to the STA.
  • the query response message when the first indicator use When the base station is instructed to support the STA to use the TMA, the query response message further includes a generation rule for instructing the STA to generate the TMA.
  • the query response message is further A second indicator for indicating whether the STA needs to upload the real MAC address RMA of the STA is included.
  • the message sends an authentication response message to the STA, including:
  • the base station When the base station supports the STA to use the TMA, it is determined whether the TMA conflicts with a pre-stored TMA, and the pre-stored TMA includes a TMA used by each STA that performs a wireless communication connection with the base station;
  • an authentication response message is sent to the STA to indicate that the STA is not allowed to communicate using the TMA.
  • the method further includes:
  • Generating a public key and a private key transmitting the public key to the STA; receiving an RMA encrypted by the STA by using the public key; and decrypting the encrypted RMA by using the private key.
  • the method further includes:
  • the pre-stored RMA list stores an RMA of an STA that allows access to the base station
  • the access authentication is allowed to be completed.
  • an access method based on a temporary MAC address is provided, which is applied to a base station.
  • the method includes:
  • the TMA is used to send an authentication message to the base station.
  • the message is a discovery message
  • the receiving, by the base station, a message that is used by the base station to indicate whether the base station supports the STA to use the temporary MAC address TMA includes:
  • the base station And receiving, by the base station, a discovery message that is broadcast and sent every predetermined time interval, where the discovery message includes a first indicator used to indicate whether the base station supports the STA to use the TMA.
  • the discovery message is further A generation rule for instructing the STA to generate the TMA is included.
  • the first indicator When the first indicator is used to indicate that the base station supports the STA to use the TMA, generating the TMA by using the generating rule;
  • Sending the authentication message to the base station by using the TMA so that the base station receives the authentication message, parses the TMA by using the authentication message, and sends an authentication response message to the STA according to the authentication message, where The authentication response message is used to indicate whether the base station allows the STA to communicate using the TMA.
  • the discovery message further includes A second indicator for indicating whether the STA needs to upload the real MAC address RMA of the STA.
  • the method Before the message sent by the base station to indicate whether the base station supports the STA to use the temporary MAC address TMA, the method further includes:
  • the message parses out the TMA; when the base station supports the STA using the TMA, detecting whether the TMA conflicts with a pre-stored TMA, the pre-stored TMA includes a TMA used by each STA that is in wireless communication connection with the base station And if the detection result is that the TMA does not collide with the pre-stored TMA, sending an inquiry response message to the STA for instructing the STA to use the TMA to communicate, so that the STA confirms use in subsequent communication.
  • the TMA completes the current access authentication; if the detection result is that the TMA conflicts with the pre-stored TMA, sending an inquiry response message to the STA indicating that the STA is not allowed to communicate using the TMA;
  • the message is the query response message, and the receiving, by the base station, the message that is used by the base station to indicate whether the base station supports the STA to use the temporary MAC address TMA includes:
  • the inquiry response message includes a first indicator for indicating whether the base station supports the STA to use the TMA.
  • the query response message when the first indicator When the base station is configured to support the STA to use the TMA, the query response message further includes a generation rule for instructing the STA to generate the TMA.
  • the TMA is used to send the authentication message to the base station, including:
  • the first indicator in the query response message is used to indicate that the base station supports the STA to use the TMA, determining whether the query response message is used to indicate that the STA is allowed to communicate using the TMA in the inquiry message;
  • the inquiry response message is used to indicate that the STA is allowed to communicate using the TMA in the inquiry message, confirming that the TMA is used in subsequent communication, and the TMA is used to send an authentication message to the base station;
  • the inquiry response message is used to indicate that the STA is not allowed to communicate using the TMA in the inquiry message
  • another TMA is generated by using the generation rule, and the generated TMA is used to send to the base station. Authentication message.
  • the query response message is further A second indicator for indicating whether the STA is required to upload the RMA of the STA is included.
  • the message is used to indicate that the base station supports the STA to use the TMA, and after the TMA sends the authentication message to the base station, the message further includes:
  • the authentication response message is used to indicate that the STA is allowed to communicate using the TMA, confirming that the TMA is used in subsequent communication;
  • the authentication response message When the authentication response message is used to indicate that the STA is not allowed to use the TMA for communication, determine whether the number of TMAs generated by the STA in the current access authentication reaches a predetermined threshold; if the judgment result is that the STA is in the If the number of TMAs generated in the access authentication does not reach the predetermined threshold, another TMA is generated according to the generation rule, and an authentication message is sent to the base station by using the TMA; If the number of TMAs generated in the secondary access authentication reaches the predetermined threshold, the current access authentication is terminated.
  • the method further includes:
  • a third aspect provides an access device based on a temporary MAC address, which is applied to a base station, where the device includes:
  • a message sending module in a process of access authentication in which the non-base station device STA performs wireless communication with the base station, sending, to the STA, a message indicating whether the base station supports the STA to use the temporary MAC address TMA, so that the STA is configured according to the STA Sending, by the message, an authentication message to the base station, where the authentication message is used by the STA when the message is used to indicate that the base station supports the STA to use the TMA.
  • An authentication message receiving module configured to receive the authentication message, and parse the TMA by using the authentication message
  • a response sending module configured to send an authentication response message to the STA according to the authentication message received by the authentication message receiving module, where the authentication response message is used to indicate whether the base station allows the STA to use the TMA Communication.
  • the message is a discovery message
  • the message sending module is further configured to:
  • the sending of the discovery message is broadcast every predetermined time interval, and the discovery message includes a first indicator for indicating whether the base station supports the STA to use the TMA.
  • the discovery message is further A generation rule for instructing the STA to generate the TMA is included.
  • the discovery message further includes The STA uploads a second indicator of the real MAC address RMA of the STA.
  • the apparatus further includes:
  • An inquiry message receiving module configured to receive an inquiry message sent by the STA by using the generated TMA
  • the message is a query response message
  • the message sending module is further configured to:
  • the inquiry response message including a first indicator for indicating whether the base station supports the STA to use the TMA.
  • the message sending module include:
  • a parsing unit configured to parse the TMA by using the query message
  • a first determining unit configured to determine, when the base station supports the STA to use the TMA, whether the TMA conflicts with a pre-stored TMA, where the pre-stored TMA includes a TMA used by each STA that performs a wireless communication connection with the base station ;
  • a first response sending unit configured to: when the determining result of the first determining unit is that the TMA does not collide with the pre-stored TMA, send, to the STA, an indication for allowing the STA to use the The TMA performs the inquiry response message for communication, so that the STA confirms that the TMA is used in subsequent communication;
  • a second response sending unit configured to: when the judgment result of the first determining unit is that the TMA conflicts with the pre-stored TMA, send, to the STA, an indication that the STA is not allowed to use the TMA for communication.
  • the inquiry response message configured to: when the judgment result of the first determining unit is that the TMA conflicts with the pre-stored TMA, send, to the STA, an indication that the STA is not allowed to use the TMA for communication.
  • the query response message when the first indicator When the base station is configured to support the STA to use the TMA, the query response message further includes a generation rule for instructing the STA to generate the TMA.
  • the query response message is further A second indicator for indicating whether the STA needs to upload the real MAC address RMA of the STA is included.
  • the response sending module include:
  • a second determining unit configured to determine, when the base station supports the STA to use the TMA, whether the TMA conflicts with a pre-stored TMA, where the pre-stored TMA includes a TMA used by each STA that performs a wireless communication connection with the base station ;
  • a third response sending unit configured to send, to the STA, an indication for allowing the STA to use the TMA for communication when the judgment result of the second determining unit is that the TMA does not collide with a pre-stored TMA Authenticating a response message for the STA to confirm that the TMA is used in subsequent communications;
  • a fourth response sending unit configured to send, when the judgment result of the second determining unit is that the TMA collides with the pre-stored TMA, to notify the STA that the STA is not allowed to use the TMA for communication. Authentication response message.
  • the apparatus further includes:
  • a first generating module configured to perform key signaling information interaction with the STA, generate a key common to the STA according to the key signaling information, and receive, by the first receiving module, the STA utilization An RMA after the key is encrypted;
  • a first decryption module configured to use the key pair to encrypt the RMA decryption;
  • a second generating module configured to generate a public key and a private key
  • a public key sending module configured to send the public key to the STA
  • a second receiving module configured to receive, after the STA is encrypted by using the public key
  • the second decryption module is configured to decrypt the encrypted RMA by using the private key.
  • the apparatus further includes:
  • a detecting module configured to detect whether the decrypted RMA exists in a pre-stored RMA list, where the pre-stored RMA list stores an RMA of an STA that allows access to the base station;
  • the access module is configured to allow the access authentication to be completed when the detection result of the detection module is that the RMA obtained by the decryption exists in the pre-stored RMA list.
  • a fourth aspect provides a temporary MAC address-based access device, which is applied to a non-base station device STA that performs a wireless communication connection with a base station, where the device includes:
  • a message receiving module configured to receive, in an access authentication process that the non-base station device STA performs wireless communication with the base station, a message sent by the base station to indicate whether the base station supports the STA to use the temporary MAC address TMA;
  • the authentication message sending module is configured to send an authentication message to the base station by using the TMA when the message received by the message receiving module is used to indicate that the base station supports the STA to use the TMA.
  • the message is a discovery message
  • the message receiving module is further configured to:
  • the base station And receiving, by the base station, a discovery message that is broadcast and sent every predetermined time interval, where the discovery message includes a first indicator used to indicate whether the base station supports the STA to use the TMA.
  • the discovery message is further A generation rule for instructing the STA to generate the TMA is included.
  • the authentication message sending module includes:
  • a first generating unit configured to generate a TMA by using the generating rule when the first indicator is used to indicate that the base station supports the STA to use the TMA;
  • An authentication message sending unit configured to send the authentication message to the base station by using the TMA, so that the base station receives the authentication message, parses the TMA by using the authentication message, and sends the TMA according to the authentication message.
  • the STA sends an authentication response message, where the authentication response message is used to indicate the Whether the base station allows the STA to communicate using the TMA.
  • the discovery message further includes A second indicator for indicating whether the STA needs to upload the real MAC address RMA of the STA.
  • the apparatus further includes:
  • An inquiry message sending module configured to send an inquiry message to the base station by using the generated TMA, so that the base station parses the TMA by using the inquiry message; and when the base station supports the STA to use the TMA, detecting whether the TMA is related to Pre-stored TMA conflicts, the pre-stored TMA includes TMA used by each STA that is in wireless communication connection with the base station; if the detection result is that the TMA does not collide with the pre-stored TMA, then the TMA is sent to the STA.
  • the message is the query response message, and the message receiving module is further configured to:
  • the inquiry response message includes a first indicator for indicating whether the base station supports the STA to use the TMA.
  • the query response message when the first indicator When the base station is configured to support the STA to use the TMA, the query response message further includes a generation rule for instructing the STA to generate the TMA.
  • the authentication message sending module includes:
  • a third determining unit configured to: when the first indicator in the query response message is used to indicate that the base station supports the STA to use the TMA, determine whether the query response message is used to indicate that the STA is allowed to use the query message. TMA for communication;
  • An address confirming unit configured to: when the judgment result of the third determining unit is that the query response message is used to indicate that the STA is allowed to communicate using the TMA in the query message, using the TMA in the query message Communication
  • a second generating unit configured to generate, by using the generating rule, when the determining result of the third determining unit is that the query response message is used to indicate that the STA is not allowed to communicate using the TMA in the query message
  • a TMA sends an inquiry message or an authentication message to the base station by using the generated TMA.
  • the query response message is further A second indicator for indicating whether the STA is required to upload the RMA of the STA is included.
  • the apparatus further includes:
  • the response receiving module is configured to receive the authentication response message sent by the base station, where the authentication response message is that the base station parses the authentication message by using the authentication message after receiving the authentication message sent by the STA a TMA, and an authentication response message sent to the STA according to the authentication message, where the authentication response message is used to indicate whether the base station allows the STA to communicate using the TMA;
  • An address confirmation module configured to: when the authentication response message is used to indicate that the STA is allowed to communicate using the TMA, confirm that the TMA is used in subsequent communication;
  • a determining module configured to: when the authentication response message is used to indicate that the STA is not allowed to use the TMA for communication, determine whether the number of TMAs generated by the STA in the current access authentication reaches a predetermined threshold; a module, configured to generate another TMA according to the generation rule when the judgment result of the determining module is that the number of TMAs generated by the STA in the current access authentication does not reach the predetermined threshold, and use the TMA Sending an authentication message to the base station; the access termination module is configured to terminate the current access when the judgment result of the determining module is that the number of TMAs generated by the STA in the current access authentication reaches the predetermined threshold Certification.
  • the apparatus further includes:
  • a fourth generation module configured to perform key signaling information interaction with the base station, generate a key shared with the base station according to the key signaling information, and use a first encryption module to utilize the key pair
  • the RMA of the STA performs encryption
  • the first sending module is configured to send the encrypted RMA to the base station, so that the base station decrypts the encrypted RMA by using the key
  • a public key receiving module configured to receive a public key sent by the base station, where the public key is generated by the base station, and a second encryption module, configured to encrypt the RMA of the STA by using the public key; hair And a sending module, configured to send the encrypted RMA to the base station, so that the base station decrypts the RMA by using the generated private key.
  • a fifth aspect provides an access system based on a temporary MAC address, where the system includes a base station and at least one non-base station device STA;
  • the base station includes a temporary MAC address based access device as described in the third aspect and any of the various possible implementations of the third aspect;
  • the STA includes a temporary MAC address based access device as described in the fourth aspect and any of the various possible implementations of the fourth aspect.
  • a base station in a sixth aspect, includes: a transmitter and a receiver,
  • the transmitter is configured to send, to the STA, a message for indicating whether the base station supports the STA to use the temporary MAC address TMA in an access authentication process in which the non-base station device STA performs wireless communication with the base station, so as to
  • the STA sends an authentication message to the base station according to the message, where the authentication message is an authentication message sent by the STA to the base station by using the TMA when the message is used to indicate that the base station supports the STA to use the TMA;
  • the receiver is configured to receive the authentication message, and parse the TMA by using the authentication message;
  • the transmitter is further configured to send an authentication response message to the STA according to the authentication message, where the authentication response message is used to indicate whether the base station allows the STA to communicate using the TMA.
  • the message is a discovery message
  • the transmitter is further configured to:
  • the sending of the discovery message is broadcast every predetermined time interval, and the discovery message includes a first indicator for indicating whether the base station supports the STA to use the TMA.
  • the discovery message is further A generation rule for instructing the STA to generate the TMA is included.
  • the discovery message further includes The STA uploads a second indicator of the real MAC address RMA of the STA.
  • the receiver is further use Receiving an inquiry message sent by the STA by using the generated TMA;
  • the message is a query response message, and the sender is further configured to:
  • the inquiry response message including a first indicator for indicating whether the base station supports the STA to use the TMA.
  • the apparatus further includes processing ,
  • the processor is configured to parse the TMA by using the query message
  • the processor is further configured to: when the base station supports the STA to use the TMA, determine whether the TMA conflicts with a pre-stored TMA, where the pre-stored TMA includes used by each STA that performs wireless communication connection with the base station. TMA;
  • the transmitter is further configured to: when the judgment result of the processor is that the TMA does not collide with a pre-stored TMA, send the STA to the STA to indicate that the STA is allowed to use the TMA for communication. Inquiring a response message for the STA to confirm the use of the TMA in subsequent communications;
  • the transmitter is further configured to: when the judgment result of the processor is that the TMA collides with a pre-stored TMA, send the STA to the STA to indicate that the STA is not allowed to use the TMA for communication. Ask for a response message.
  • the query response message when the first indicator When the base station is configured to support the STA to use the TMA, the query response message further includes a generation rule for instructing the STA to generate the TMA.
  • the query response message is further A second indicator for indicating whether the STA needs to upload the real MAC address RMA of the STA is included.
  • the processor is further When the base station supports the use of the TMA by the STA, determining whether the TMA conflicts with a pre-stored TMA, where the pre-stored TMA includes a TMA used by each STA that is in wireless communication connection with the base station;
  • the transmitter is further configured to: at the judgment result of the processor, the TMA is not pre-stored When the TMAs collide, sending, to the STA, an authentication response message indicating that the STA is allowed to communicate using the TMA, so that the STA confirms that the TMA is used in subsequent communications;
  • the transmitter is further configured to: when the judgment result of the processor is that the TMA collides with a pre-stored TMA, send an authentication response to the STA to indicate that the STA is not allowed to communicate using the TMA. Message.
  • the processor is further And configured to perform key signaling information interaction with the STA, generate a key common to the STA according to the key signaling information, and the receiver is further configured to receive, by the STA, the key by using the key. a subsequent RMA; the processor is further configured to decrypt the encrypted RMA by using the key; or
  • the processor is further configured to generate a public key and a private key; the transmitter is further configured to send the public key to the STA; the receiver is further configured to receive, by the STA, the public The key-encrypted RMA; the processor is further configured to decrypt the encrypted RMA by using the private key.
  • the processor is further A method for detecting whether the decrypted RMA exists in a pre-stored RMA list, where the pre-stored RMA list stores an RMA of an STA that allows access to the base station;
  • the processor is further configured to allow the access authentication to be completed when the RMA obtained by the decryption result is present in the pre-stored RMA list.
  • a non-base station device STA includes: a receiver and a transmitter
  • the receiver is configured to receive, during an access authentication process that the non-base station device STA performs wireless communication with the base station, a message sent by the base station to indicate whether the base station supports the STA to use the temporary MAC address TMA;
  • the transmitter is further configured to: when the message received by the receiver is used to indicate that the base station supports the STA to use the TMA, use the TMA to send an authentication message to the base station.
  • the message is a discovery message
  • the receiver is further configured to:
  • the base station And receiving, by the base station, a discovery message that is broadcast and sent every predetermined time interval, where the discovery message includes a first indicator used to indicate whether the base station supports the STA to use the TMA.
  • the discovery message when the first indicator is used to indicate that the base station supports the STA to use the TMA, the discovery message further includes a generation rule for instructing the STA to generate the TMA.
  • the STA further includes a processor
  • the processor is configured to generate a TMA by using the generating rule when the first indicator is used to indicate that the base station supports the STA to use the TMA;
  • the transmitter is configured to send the authentication message to the base station by using the TMA, so that the base station receives the authentication message, parses the TMA by using the authentication message, and sends the TMA according to the authentication message.
  • the STA sends an authentication response message, where the authentication response message is used to indicate whether the base station allows the STA to communicate using the TMA.
  • the discovery message further includes A second indicator for indicating whether the STA needs to upload the real MAC address RMA of the STA.
  • the transmitter is further And transmitting, by using the generated TMA, an inquiry message to the base station, so that the base station parses the TMA by using the inquiry message; and when the base station supports the STA using the TMA, detecting whether the TMA conflicts with a pre-stored TMA
  • the pre-stored TMA includes a TMA used by each STA that is in wireless communication connection with the base station; if the detection result is that the TMA does not collide with the pre-stored TMA, sending, to the STA, The STA uses the TMA to perform an inquiry response message for communication, so that the STA confirms that the TMA is used in subsequent communication; if the detection result is that the TMA conflicts with the pre-stored TMA, the STA is sent to indicate that the TMA is not An inquiry response message allowing the STA to communicate using the TMA;
  • the message is the query response message, and the receiver is further configured to:
  • the inquiry response message includes a first indicator for indicating whether the base station supports the STA to use the TMA.
  • the query response message when the first indicator When the base station is configured to support the STA to use the TMA, the query response message further includes a generation rule for instructing the STA to generate the TMA.
  • the processor is further When the first indicator in the query response message is used to indicate that the base station supports the STA to use the TMA, determining whether the query response message is used to indicate that the STA is allowed to communicate using the TMA in the query message;
  • the processor is further configured to: when the judgment result is that the inquiry response message is used to indicate that the STA is allowed to communicate using the TMA in the inquiry message, confirming that the TMA is used in subsequent communication, the transmitter Also used to send an authentication message to the base station by using the TMA;
  • the processor is further configured to: when the judgment result is that the query response message is used to indicate that the STA is not allowed to communicate using the TMA in the query message, generate another TMA by using the generating rule, where the sending The machine is further configured to send an authentication message to the base station by using the generated TMA.
  • the query response message is further A second indicator for indicating whether the STA is required to upload the RMA of the STA is included.
  • the receiver is further For receiving an authentication response message sent by the base station, the authentication response message is that after the base station receives the authentication message sent by the STA, the base station parses the TMA by using the authentication message, and according to the An authentication response message sent by the authentication message to the STA, where the authentication response message is used to indicate whether the base station allows the STA to communicate using the TMA;
  • the processor is further configured to: when the authentication response message is used to indicate that the STA is allowed to communicate using the TMA, confirm that the TMA is used in subsequent communications;
  • the processor is further configured to: when the authentication response message is used to indicate that the STA is not allowed to communicate by using the TMA, determine whether the number of TMAs generated by the STA in the current access authentication reaches a predetermined threshold; The processor is further configured to: when the result of the determination is that the number of TMAs generated by the STA in the current access authentication does not reach the predetermined threshold, generate another TMA according to the generating rule, triggering the use of the transmitter.
  • the TMA sends an authentication message to the base station; the processor is further configured to terminate the current access authentication when the number of TMAs generated by the STA in the current access authentication reaches the predetermined threshold.
  • the processor is further use Performing key signaling information interaction with the base station, and generating a key common to the base station according to the key signaling information; the processor is further configured to use the key to pair the STA of the RMA Encrypting; the transmitter is further configured to send the encrypted RMA to the base station, so that the base station decrypts the encrypted RMA by using the key; or
  • the receiver is further configured to receive a public key that is sent by the base station, where the public key is generated by the base station, and the processor is further configured to encrypt the RMA of the STA by using the public key;
  • the transmitter is further configured to send the encrypted RMA to the base station, so that the base station decrypts the RMA by using the generated private key.
  • the eighth aspect provides an access system based on a temporary MAC address, where the system includes a base station and at least one non-base station device STA;
  • the base station is the base station described in any of the sixth aspect and the various possible implementation manners of the sixth aspect;
  • the STA is the STA described in any of the seventh aspect and the various possible implementations of the seventh aspect.
  • the base station sends a message to the STA to indicate whether the base station supports the STA to use the temporary MAC address TMA, and solves the problem that when the base station does not support the STA using the TMA,
  • the STA continuously uses the generated TMA to perform access authentication to the base station, which is easy to cause the STA to fail to perform normal communication. Since the base station can inform the STA whether it supports the STA to use the TMA, it can avoid that the STA does not support the STA using the TMA when the base station does not support the STA. The case of being denied access can further ensure that the STA uses the RMA for access authentication and achieves the effect of wireless communication.
  • FIG. 1 is a schematic diagram of an implementation environment involved in a temporary MAC address-based access method provided in some embodiments of the present invention
  • FIG. 2 is a method for providing a temporary MAC address based access method according to an embodiment of the present invention flow chart
  • 3A is a flowchart of a method for accessing a temporary MAC address based method according to another embodiment of the present invention.
  • FIG. 3B is a schematic structural diagram of beacon signaling provided in some embodiments of the present invention.
  • 3C is a schematic structural diagram of a MAC address provided by some embodiments of the present invention.
  • 3D is a schematic structural diagram of authentication response signaling provided in some embodiments of the present invention.
  • FIG. 3E is a flowchart of a method for encrypting and uploading an RMA provided in an embodiment of the present invention
  • FIG. 3F is a flowchart of a method for performing encrypted uploading of an RMA according to another embodiment of the present invention.
  • 3G is a schematic structural diagram of a base station and an STA provided in an embodiment of the present invention.
  • FIG. 4 is a flowchart of a method for accessing a temporary MAC address based method according to still another embodiment of the present invention.
  • FIG. 5 is a schematic structural diagram of a temporary MAC address-based access system according to an embodiment of the present invention.
  • FIG. 6 is a schematic structural diagram of a temporary MAC address-based access system provided in another embodiment of the present invention.
  • FIG. 7 is a schematic structural diagram of a temporary MAC address-based access system provided in still another embodiment of the present invention.
  • FIG. 8 is a schematic structural diagram of a base station provided in an embodiment of the present invention.
  • FIG. 9 is a schematic structural diagram of a base station provided in another embodiment of the present invention.
  • FIG. 10 is a schematic structural diagram of a STA according to an embodiment of the present invention.
  • FIG. 11 is a schematic structural diagram of a STA according to another embodiment of the present invention.
  • FIG. 12 is a schematic structural diagram of a temporary MAC address-based access system according to still another embodiment of the present invention.
  • FIG. 1 there is shown a temporary MAC based field provided in some embodiments of the present invention.
  • a schematic diagram of an implementation environment involved in an access method for an address the implementation environment including a base station AP 120 and at least one non-base station device STA 140.
  • the non-base station device STA 140 must first establish a connection with the base station AP 120 to communicate with other nodes in the network and other nodes on the Internet.
  • the non-base station device STA 140 In a wireless local area network, when a non-base station equipment device STA 140 is to be connected to a base station AP 120, the non-base station device STA 140 must determine whether the base station AP 120 is within communication range.
  • the temporary MAC address-based access method is applicable to the implementation environment shown in FIG. in.
  • the temporary MAC address-based access method may include:
  • the base station sends a message to the STA to indicate whether the base station supports the STA to use the temporary MAC address TMA.
  • the STA receives a message sent by the base station to indicate whether the base station supports the STA to use the temporary MAC address TMA.
  • the STA sends the authentication message to the base station by using the TMA.
  • the base station receives the authentication message, and parses the TMA by using the authentication message;
  • the base station sends an authentication response message to the STA according to the authentication message, where the authentication response message is used to indicate whether the base station allows the STA to use the TMA for communication.
  • Step 201, step 204, and step 205 may be separately implemented as a temporary MAC address-based access method with the base station as the execution subject, and step 202 and step 203 may be separately implemented as a temporary MAC address-based connection with the STA as the main body. Into the method.
  • the access method based on the temporary MAC address provided by the embodiment of the present invention in the access authentication process in which the non-base station device STA performs wireless communication to the base station, the base station sends a message to the STA to indicate whether the base station supports the STA.
  • the message of the temporary MAC address TMA is solved.
  • the STA may continuously use the generated TMA to perform access authentication to the base station, which may easily cause the STA to fail to perform normal communication; Whether the STA is used by the STA or not is supported, so that the STA can be prevented from being denied access when the base station does not support the STA using the TMA, thereby ensuring that the STA uses the RMA for access authentication and achieves the effect of wireless communication.
  • a STA In a wireless local area network, when a STA is to be connected to a base station, the STA must determine whether the base station is within communication range. There are two ways to determine whether a base station is in the STA communication range.
  • One of the methods is passive discovery mode, that is, the STA listens to the discovery message sent by the base station on a channel (such as beacon message). When the target base station is found on a certain channel, the STA can send an authentication request (Access Request) to access the base station.
  • Access Request authentication request
  • this passive discovery mode when the STA performs access authentication for wireless communication to the base station, the operations that the base station and the STA need to perform are as shown in FIG. 3A.
  • the temporary MAC address-based access method may include:
  • the base station broadcasts a sending discovery message every predetermined time interval, where the discovery message includes a first indicator used to indicate whether the base station supports the STA to use the TMA.
  • the base station When the STA determines whether the AP is in the STA communication range, if the passive discovery mode is adopted, the base station broadcasts a transmission discovery message, so that the STA within the communication range of the base station can receive the discovery message.
  • the base station may indicate whether the STA is allowed to use the TMA, that is, the discovery message may include a first indicator for indicating whether the base station supports the STA to use the TMA.
  • the first indicator when the first indicator is used to indicate that the base station supports the STA to use the TMA, the first indicator may take one of values 1 and 0, and when the first indicator is used to indicate that the base station does not support When the STA uses the TMA, the first indicator may take the value of the other of 1 and 0.
  • the beacon signaling may indicate whether the STA is supported by the TMA in the capability field, and indicates whether the requirement is required in the capability extension field.
  • the STA provides a real AMC address after the connection is established.
  • the base station may broadcast and send a message at a predetermined time interval, and the predetermined time interval may be set according to an actual situation, which is not limited in this embodiment.
  • the discovery message is used.
  • a generation rule for instructing the STA to generate the TMA may also be included.
  • the generation rules described herein may include generating a generation algorithm of the TMA, a range of TMAs that can be generated, and the like.
  • the AP may specify that the STA may randomly generate an address as a TMA within a range of 0x400000000000 ⁇ 0x400000fffff.
  • the MAC address is a 48-bit number. Please refer to FIG. 3C, which shows a schematic structural diagram of a MAC address provided by some embodiments of the present invention.
  • the highest two bits of the MAC address namely, the 48th and the 47th. It is a special meaning mark.
  • the 48th bit is the unicast/multicast flag. When the flag is set to 0, it indicates that the address is a unicast address. When the flag is set to 1, it indicates that an address is a multicast address.
  • the 47th bit is the address type flag. When the address type flag is set to 0, it indicates that an address is a global address, that is, the address is globally unique.
  • the address type identifier When the address type identifier is set to 1, it indicates that an address is a local address, which may be unique only when it is local, and not unique worldwide. The remaining 46 bits of the MAC address are the address identifier.
  • the MAC address is managed by the IEEE and sold to the device vendor as an address block. The device vendor assigns a global address to each device while the device is being produced.
  • the address type flag of the 47th bit of the TMA is usually set to 1.
  • the STA receives, by the base station, the discovery message that is sent and sent every predetermined time interval.
  • the base station broadcasts the discovery message
  • the STA is within the communication range with the base station
  • the discovery message sent by the base station broadcast may be received.
  • the STA When the first indicator is used to indicate that the base station supports the STA to use the TMA, the STA generates the TMA by using the generation rule.
  • the discovery message When the first indicator in the discovery message is used to indicate that the base station supports the STA to use the TMA, the discovery message usually carries the generation rule for generating the TMA, and the STA can generate the TMA according to the generation rule of the TMA. That is, the STA generates a TMA located in the range of the TMA that can be generated according to the generation algorithm of the generated TMA.
  • the STA sends the authentication message to the base station by using the generated TMA.
  • the destination MAC address of the authentication message is the MAC address of the base station, and the source MAC address of the authentication message is TMA.
  • the authentication message may be an authentication request (Authentication Request).
  • the base station receives an authentication message sent by the STA by using the generated TMA.
  • the base station parses the TMA by using the authentication message
  • the base station can parse the source MAC address in the authentication message, that is, the TMA generated by the STA.
  • the base station determines whether the TMA conflicts with the pre-stored TMA, and the pre-stored TMA includes the TMA used by each STA that performs wireless communication connection with the base station;
  • the base station In order to ensure that the MAC generated by the TMA is in compliance with the regulations, the base station needs to judge the TMA, that is, whether the TMA conflicts with the pre-stored TMA, where the pre-stored TMA is the TMA used by the STA within the communication range of the base station, in order to avoid these STA's TMA conflicts and therefore needs to be compared to the TMA of these STAs.
  • the base station sends a reply message to the STA for instructing the STA to use the TMA to perform communication;
  • the STA may send a reply message indicating that the STA is allowed to communicate using the TMA.
  • the reply message may be an authentication response message or other messages.
  • the base station sends a reply message to the STA for indicating that the STA is not allowed to use the TMA for communication;
  • the STA may send a reply message indicating that the STA is not allowed to use the TMA for communication, and the reply message may be an authentication response message, or may be Other special messages.
  • a field can be added to the authentication response message, and the value in the field is used to indicate whether the STA is allowed to communicate using the TMA.
  • a status code can be added to the authentication response signaling to notify the STA that initiated the authentication that the TMA cannot be used.
  • FIG. 3D it is a schematic structural diagram of the authentication response signaling provided in some embodiments of the present invention.
  • the status code is equal to a specific value (such as one of 0 or 1,)
  • the STA is displayed.
  • the generated TMA is non-compliant, otherwise, when the status code is another specific value (such as another one of 0 or 1), it indicates that the TMA generated by the STA is compliant.
  • the STA receives a reply message sent by the base station.
  • the STA confirms that the TMA is used in subsequent communications.
  • the STA determines whether to allow the STA to use the TMA for communication according to the value of the field in the reply message (such as the authentication response message) for indicating whether to allow the STA to use the TMA, and when the reply message (for example, the authentication response message) indicates that the STA is allowed to use the TMA.
  • the STA can continue Continue to use the TMA for communication.
  • the STA determines whether the number of TMAs generated by the STA in the current access authentication reaches a predetermined threshold.
  • a reply message such as an authentication response message
  • the STA When a reply message, such as an authentication response message, is used to indicate that the STA is not allowed to communicate using the TMA, it indicates that the TMA of the STA conflicts with the pre-stored TMA, so if it wants to continue to access the base station, the STA needs to regenerate a new TMA.
  • To perform access authentication in order to prevent the TMA generated by the STA from colliding with the pre-stored TMA, it is necessary to detect the number of times the TMA has been generated before generating a new TMA. When the number of times exceeds a predetermined threshold, the STA is stopped. Enter the AP.
  • the STA If the result of the determination is that the number of TMAs generated by the STA in the current access authentication does not reach the predetermined threshold, the STA generates another TMA according to the generation rule.
  • the STA generates another TMA according to the generation rule, and continues to perform step 304 until the current access authentication is completed or the current access authentication is terminated.
  • the STA terminates the current access authentication.
  • the result of the judgment is that the number of TMAs generated by the STA in the current access authentication reaches a predetermined threshold, it indicates that multiple accesses have failed, and the base station is no longer accessed by using the TMA.
  • the discovery message may further include a second indicator for indicating whether the STA needs to upload the RMA of the STA, that is, the base station requests the STA to upload the RMA.
  • the base station can separately send a message for indicating that the STA needs to upload the RMA by sending the second indicator in the discovery message.
  • the RMA may be encrypted before the STA uploads the RMA to the base station.
  • the temporary MAC address-based access method may include the following two methods when encrypting the RMA:
  • FIG. 3E is a flowchart of a method for performing encrypted uploading of an RMA provided in an embodiment of the present invention.
  • the method for performing encrypted uploading on the RMA includes:
  • the base station and the STA perform key signaling information interaction
  • the base station generates a key common to the STA according to the key signaling information
  • the STA generates a key shared with the base station according to the key signaling information
  • the STA encrypts the RMA of the STA by using a key
  • the STA sends the encrypted RMA to the base station
  • the base station decrypts the encrypted RMA by using a key.
  • FIG. 3F is a flowchart of a method for performing encrypted uploading of an RMA according to another embodiment of the present invention.
  • the method for performing encrypted uploading to the RMA includes:
  • the base station generates a public key and a private key
  • the base station sends the public key to the STA
  • the STA receives the public key sent by the base station
  • the STA encrypts the STA's RMA by using the public key
  • the STA sends the encrypted RMA to the base station
  • the base station receives the RMA after the STA encrypts by using the public key
  • the base station decrypts the encrypted RMA by using the private key.
  • the base station when the base station allows the STA to use the non-conflicting TMA, the base station may also first verify whether the RMA sent by the STA is qualified, that is, send the STA to indicate that the STA is allowed to be allowed. Before replying to a message using TMA, it can also include:
  • the pre-stored RMA list stores the RMA of the STA that allows access to the base station
  • a step of transmitting a reply message to the STA indicating that the STA is allowed to communicate using the TMA is performed.
  • the base station after decrypting the RMA of the STA, the base station can directly store the RMA without using the RMA in the pre-stored RMA list as the basis for transmitting the discovery message.
  • the RMA of the STA may be used to generate a key, and according to This key encrypts the data that needs to be transmitted.
  • the base station and the STA may each be provided with a specific unit, as shown in FIG. 3G, which shows the present invention.
  • FIG. 3G shows the present invention.
  • the base station g1 may include a TMA verification unit g1a and an RMA parsing verification unit g1b
  • the STA g2 may include a TMA generation unit g2a, an RMA upload decision unit g2b, and an RMA upload unit g2c
  • the TMA verification unit g1a can perform the above step 307
  • the RMA analysis verification unit g1b can execute the solution.
  • the TMA generating unit g2a may perform the above steps 303 and 313, and the RMA uploading decision unit g2b may be used to perform the decision whether to use the encrypted long-distance RMA, the RMA uploading unit g2c Then, the RMA can be transmitted to the base station g1.
  • the first indicator carried in the discovery message is used to indicate that the STA is not supported by the TMA.
  • the discovery message may not carry the generation rule of generating the TMA, so that the STA is in the STA.
  • the TMA is not generated.
  • the STA determines that the base station needs to continue to access the base station, the RMA can be used to access the base station. Since the RMA is easily leaked, the STA can generate an alert message for use. Remind users to access the base station to provide RMA, which poses a threat to privacy. If the user agrees to provide the RMA, the STA may continue to access the base station by using the RMA. Otherwise, the STA does not initiate a network access request to the base station.
  • the STA may also decide whether to access the base station and provide the RMA according to the system configuration provided by the STA.
  • step 301, step 305 to step 309 can be separately implemented as a temporary MAC address-based access method with the base station as the execution subject, and the above steps 302 to 304 and steps 310 to 314 can be separately implemented. It becomes a temporary MAC address-based access method that uses STA as the main body of execution.
  • the access method based on the temporary MAC address provided by the embodiment of the present invention in the access authentication process in which the non-base station device STA performs wireless communication to the base station, the base station sends a message to the STA to indicate whether the base station supports the STA.
  • the message of the temporary MAC address TMA is solved.
  • the STA may continuously use the generated TMA to perform access authentication to the base station, which may easily cause the STA to fail to perform normal communication; Whether the STA is used by the STA or not is supported, so that the STA can be prevented from being denied access when the base station does not support the STA using the TMA, thereby ensuring that the STA uses the RMA for access authentication and achieves the effect of wireless communication.
  • a STA In a wireless local area network, when a STA is to be connected to a base station, the STA must determine whether the base station is within communication range. There are currently two ways to determine whether a base station is within the STA communication range. The other way is the active mode, that is, the STA actively sends an inquiry message (Probe Request) on one channel, if the target base station receives the inquiry message. Otherwise, the base station will respond to a request response message (Probe Response), and the content of the response message is similar to the discovery message. When a STA receives the inquiry response message, it can decide whether to access the discovery according to the content of the inquiry response message. Base station. In this active discovery mode, when the STA performs access authentication for wireless communication to the base station, the operations that the base station and the STA need to perform are as shown in FIG. 4.
  • the temporary MAC address-based access method may include:
  • the STA sends an inquiry message to the base station by using the generated TMA.
  • the TMA here is usually the existing TMA of the STA or the randomly generated TMA, and the STA actively uses the TMA to send an inquiry message to the base station, that is, the TMA is used as the source MAC address of the inquiry message.
  • the inquiry message may be a special signaling, ie, Request Request.
  • the base station receives an inquiry message sent by the STA by using the generated TMA.
  • the base station parses the TMA by using the inquiry message
  • the base station can parse the source MAC address in the inquiry message, that is, the TMA of the STA.
  • step 404 may be performed. Otherwise, the inquiry reply message is directly sent to the STA, where the inquiry reply message carries a first indicator for indicating that the STA is not supported to use the TMA.
  • the base station determines whether the parsed TMA conflicts with the pre-stored TMA, and the pre-stored TMA includes the TMA used by each STA that performs wireless communication connection with the base station;
  • the base station sends a reply message to the STA for instructing the STA to use the TMA for communication, where the reply message further includes, to indicate whether the base station supports the STA to use the TMA.
  • the reply message mentioned here may be a query response message or other messages.
  • the base station Since the STA actively sends an inquiry message to the base station, the base station needs to inform the STA whether to allow the STA to use the TMA, and if the STA is allowed to use the TMA, if the TMA in the detection inquiry message does not conflict with the pre-stored TMA, it indicates that the STA can directly use the TMA. TMA, at this time, the base station can directly send a reply message to the STA for instructing the STA to use the TMA for communication.
  • the special signaling for indicating the inquiry response message, and the special signaling is the Probe Response.
  • the base station sends the STA to the STA for sending a reply message indicating that the STA is not allowed to communicate using the TMA, and the reply message further includes a first indicator for indicating whether the base station supports the STA to use the TMA, and a generation rule for instructing the STA to generate the TMA;
  • reply message mentioned here may be a query response message or other messages.
  • the first indicator carried in the reply message in step 405 is used to indicate that the base station supports the STA to use the TMA, because the step 404 is performed when the base station supports the STA to use the TMA. That is, if the base station supports the STA to use the TMA and detects that the TMA in the inquiry message does not collide with the pre-stored TMA, the base station directly sends a reply message to the STA indicating that the STA is allowed to communicate using the TMA, and the reply message carries The first indicator is used to indicate that the base station supports the STA to use the TMA; if the base station allows the STA to use the TMA and detects that the TMA in the inquiry message collides with the pre-stored TMA, the base station sends a message to the STA to indicate that the STA is not allowed to use the TMA for communication.
  • the reply message also carries a first indicator for indicating whether the base station supports the STA to use the TMA (the first indicator is used to indicate that the base station supports the STA to use the TMA), and is used to instruct the STA to generate the TMA. Generate rules, etc.
  • the STA receives a reply message sent by the base station.
  • the reply message may be an inquiry response message fed back by the base station, or may be another message sent by the base station.
  • the reply message carries a first indicator for indicating whether the base station supports the STA to use the TMA.
  • the reply message further includes Generate TMA generation rules.
  • the STA confirms that the TMA is used in the subsequent communication, and uses the TMA to send the authentication message to the base station.
  • the reply message is used to indicate that the STA is not allowed to use the TMA for communication
  • the first indicator is used to indicate that the base station supports the STA to use the TMA
  • another TMA is generated according to the generation rule, and the generated TMA is used to send the authentication message to the base station.
  • the reply message When the reply message is used to indicate that the STA is not allowed to communicate using the TMA, it indicates that the TMA of the STA conflicts with the pre-stored TMA, so the STA needs to regenerate the new TMA, and the TMA generated by the STA is always in conflict with the pre-stored TMA. Therefore, it is necessary to detect the number of times the TMA has been generated before generating a new TMA, and when the number of times exceeds a predetermined threshold, stop the STA from continuing to access.
  • the base station When the reply message is used to indicate that the STA is not allowed to communicate using the TMA, it indicates that the TMA of the STA conflicts with the pre-stored TMA, so the STA needs to regenerate the new TMA, and the TMA generated by the STA is always in conflict with the pre-stored TMA. Therefore, it is necessary to detect the number of times the TMA has been generated before generating a new TMA, and when the number of times exceeds a predetermined threshold, stop the S
  • the STA may first determine whether the number of times the TMA generated by the STA in the current access authentication reaches a predetermined threshold; The number of TMAs generated by the STA in the current access authentication does not reach the predetermined threshold, and the STA generates another TMA according to the generation rule, and sends the authentication message to the base station by using the generated TMA; the TMA generated by the STA in the current access authentication. If the number of times does not reach the predetermined threshold, the STA generates another TMA according to the generation rule, and continues to send the authentication message until the access authentication is completed or the access authentication is terminated.
  • the authentication message mentioned here is the same as the authentication message in step 304 described in FIG. 3A, and after step 409 or step 410, the base station may continue to execute the figure when receiving the authentication message sent by the STA. Step 305 described in 3A.
  • the reply message may further include a second indicator for indicating whether the STA needs to upload the RMA of the STA, that is, the base station requests the STA to upload the RMA.
  • the RMA may be encrypted before the STA uploads the RMA to the base station.
  • the temporary MAC address-based access method may include two modes when encrypting the RMA.
  • the base station when the base station allows the STA to use the non-conflicting TMA, the base station may also first verify whether the RMA sent by the STA is qualified, that is, send the STA to indicate that the STA is allowed to be allowed. Before replying to a message using TMA, it can also include:
  • the pre-stored RMA list stores the RMA of the STA that allows access to the base station
  • a step of transmitting a reply message to the STA indicating that the STA is allowed to communicate using the TMA is performed.
  • the base station can directly store the RMA without determining whether the RMA conforms to the pre-stored RMA list as the basis for sending the reply message.
  • the RMA of the STA may be used to generate a key, and according to This key encrypts the data that needs to be transmitted.
  • the base station when it does not support the STA to use the TMA, it carries in the reply message.
  • the first indicator is used to indicate that the STA is not supported by the TMA.
  • the reply message may not carry the generation rule of the TMA, so that the STA does not generate the TMA after learning the first indicator.
  • the RMA can be used to access the base station. Since the RMA is easily leaked, the STA can generate an alert message for reminding the user to access the base station to provide an RMA, thereby posing a threat to privacy. If the user agrees to provide the RMA, the STA can continue to access the base station using the RMA. Otherwise, the STA does not initiate a network access request to the base station.
  • the STA may also decide whether to access the base station and provide the RMA according to the system configuration provided by the STA.
  • the access method based on the temporary MAC address provided by the embodiment of the present invention in the access authentication process in which the non-base station device STA performs wireless communication to the base station, the base station sends a message to the STA to indicate whether the base station supports the STA.
  • the message of the temporary MAC address TMA is solved.
  • the STA may continuously use the generated TMA to perform access authentication to the base station, which may easily cause the STA to fail to perform normal communication; Whether the STA is used by the STA or not is supported, so that the STA can be prevented from being denied access when the base station does not support the STA using the TMA, thereby ensuring that the STA uses the RMA for access authentication and achieves the effect of wireless communication.
  • FIG. 5 shows a schematic structural diagram of a temporary MAC address-based access system provided in an embodiment of the present invention
  • the system can be applied to the implementation environment shown in FIG. 1.
  • the system can include a base station 52 and at least one non-base station device STA 54, wherein the base station 52 includes a temporary MAC address based access device 520, and the STA 54 includes a temporary MAC address based access device 540.
  • the temporary MAC address-based access device 520 located in the base station 52 may include a message sending module 522, an authentication message receiving module 524, and a response sending module 526.
  • the message sending module 522 can be configured to send, to the STA, a message for indicating whether the base station supports the STA to use the temporary MAC address TMA, in the access authentication process for the non-base station device STA to perform wireless communication with the base station, so that the STA sends the message to the base station according to the message.
  • Sending an authentication message where the authentication message is an authentication message sent by the STA to the base station by using the TMA when the message is used to indicate that the base station supports the STA to use the TMA;
  • the authentication message receiving module 524 is configured to receive the authentication message, and parse the TMA by using the authentication message;
  • the response sending module 526 is configured to send an authentication response message to the STA according to the authentication message received by the authentication message receiving module 524, where the authentication response message is used to indicate whether the base station allows the STA to use the TMA. Communicate.
  • the temporary MAC address-based access device 540 located in the STA 54 may include a message receiving module 542 and an authentication message sending module 544.
  • the message receiving module 542 is configured to receive, by the base station, a message sent by the base station to indicate whether the base station supports the STA to use the temporary MAC address TMA in the access authentication process of the non-base station device STA performing wireless communication with the base station;
  • the authentication message sending module 544 is configured to use the TMA to send an authentication message to the base station when the message received by the message receiving module 542 is used to indicate that the base station supports the STA to use the TMA.
  • the base station 52 having the foregoing apparatus 520 may separately implement a temporary MAC address-based access method
  • the non-base station device 54 having the foregoing apparatus 540 may also separately implement a temporary MAC address-based access method.
  • the base station sends a STA to the STA to indicate whether the base station supports the STA during the access authentication process of the non-base station device STA to the base station.
  • the message of the temporary MAC address TMA is solved.
  • the STA may continuously use the generated TMA to perform access authentication to the base station, which may easily cause the STA to fail to perform normal communication; Whether the STA is used by the STA or not is supported, so that the STA can be prevented from being denied access when the base station does not support the STA using the TMA, thereby ensuring that the STA uses the RMA for access authentication and achieves the effect of wireless communication.
  • FIG. 6 is a schematic structural diagram of a temporary MAC address-based access system provided in another embodiment of the present invention
  • the system can be applied to the implementation environment shown in FIG. 1.
  • the system can include a base station 62 and at least one non-base station device STA 64, wherein the base station 62 includes a temporary MAC address based access device 620, and the STA 64 includes a temporary MAC address based access device 640.
  • the temporary MAC address-based access device 620 located in the base station 62 may include: a message sending module 622, and an authentication message receiving Module 624 and response transmitting module 626.
  • the message sending module 622 may be configured to send, to the STA, a message for indicating whether the base station supports the STA to use the temporary MAC address TMA, in the access authentication process for the non-base station device STA to perform wireless communication with the base station, so that the STA sends the message to the base station according to the message.
  • Sending an authentication message the authentication message is an authentication cancellation sent by the STA to the base station by using the TMA when the message is used to indicate that the base station supports the STA to use the TMA. interest;
  • the authentication message receiving module 624 can be configured to receive the authentication message, and parse the TMA by using the authentication message;
  • the response sending module 626 can be configured to send an authentication response message to the STA according to the authentication message received by the authentication message receiving module 624, where the authentication response message is used to indicate whether the base station allows the STA to use the TMA for communication.
  • the message is a discovery message
  • the message sending module 622 can also be used to:
  • the discovery message is broadcasted every predetermined time interval, and the discovery message includes a first indicator for indicating whether the base station supports the STA to use the TMA.
  • the discovery message when the first indicator is used to indicate that the base station supports the STA to use the TMA, the discovery message further includes a generation rule for instructing the STA to generate the TMA.
  • the discovery message further includes a second indicator for indicating whether the STA needs to upload the real MAC address RMA of the STA.
  • the response sending module 626 may include: a second determining unit 626a, a third responding sending unit 626b, and a fourth responding sending unit 626c.
  • the second determining unit 626a may be configured to determine whether the TMA conflicts with the pre-stored TMA when the base station supports the STA to use the TMA, and the pre-stored TMA includes the TMA used by each STA that performs wireless communication connection with the base station;
  • the third response sending unit 626b may be configured to: when the judgment result of the second determining unit 626a is that the TMA does not collide with the pre-stored TMA, send an authentication response message to the STA for instructing the STA to use the TMA for communication, so that the STA confirms Use the TMA in subsequent communications;
  • the fourth response sending unit 626c may be configured to send, to the STA, an authentication response message indicating that the STA is not allowed to communicate using the TMA when the determination result of the second determining unit 626a is that the TMA conflicts with the pre-stored TMA.
  • the temporary MAC address-based access device 620 further includes: a first generation module 628, a first receiving module 6210, a first decryption module 6212, or The second generation module 6214, the public key transmission module 6216, the second reception module 6218, and the second decryption module 6220.
  • the first generating module 628 can be configured to perform key signaling information interaction with the STA, according to the key letter. The information is used to generate a key common to the STA; the first receiving module 6210 can be configured to receive the RMA encrypted by the STA by using the key; the first decrypting module 6212 can be configured to decrypt the encrypted RMA by using the key; or ,
  • the second generation module 6214 can be configured to generate a public key and a private key.
  • the public key sending module 6216 can be configured to send the public key to the STA.
  • the second receiving module 6218 can be used to receive the RMA after the STA encrypts the public key.
  • the second decryption module 6220 can be configured to decrypt the encrypted RMA by using a private key.
  • the temporary MAC address-based access device 620 may further include: a detecting module 6222 and an accessing module 6224.
  • the detecting module 6222 can be configured to detect whether the decrypted RMA exists in the pre-stored RMA list, and the pre-stored RMA list stores the RMA of the STA that is allowed to access the base station;
  • the accessing module 6224 is configured to allow the access authentication to be completed when the detection result of the detecting module 6222 is that the decrypted RMA exists in the pre-stored RMA list.
  • the temporary MAC address-based access device 640 located in the STA 64 may include: a message receiving module 642 and an authentication. Message sending module 644.
  • the message receiving module 642 may be configured to receive, during an access authentication process that the non-base station device STA performs wireless communication with the base station, a message sent by the base station to indicate whether the base station supports the STA to use the temporary MAC address TMA;
  • the authentication message sending module 644 can be configured to use the TMA to send an authentication message to the base station when the message received by the message receiving module 642 is used to indicate that the base station supports the STA to use the TMA.
  • the message is a discovery message
  • the message receiving module 642 can also be used to:
  • the receiving base station broadcasts a discovery message that is sent every predetermined time interval, and the discovery message includes a first indicator for indicating whether the base station supports the STA to use the TMA.
  • the discovery message when the first indicator is used to indicate that the base station supports the STA to use the TMA, the discovery message further includes a generation rule for instructing the STA to generate the TMA.
  • the authentication message sending module 644 may include: a first generating unit 644a and an authentication message sending unit 644b.
  • the first generating unit 644a may be configured to: when the first indicator is used to indicate that the base station supports the STA In TMA, the generation rule is used to generate TMA;
  • the authentication message sending unit 644b may be configured to send an authentication message to the base station by using the TMA, so that the base station receives the authentication message, parses the TMA by using the authentication message, and sends an authentication response message to the STA according to the authentication message, where the authentication response message is used to indicate whether the base station allows the STA. Communicate using TMA.
  • the discovery message further includes a second indicator for indicating whether the STA needs to upload the real MAC address RMA of the STA.
  • the access device 640 based on the temporary MAC address may further include: a response receiving module 646, an address confirming module 648, a determining module 6410, and a third generating module. 6412 and access termination module 6414.
  • the response receiving module 646 may be configured to receive an authentication response message sent by the base station, where the authentication response message is an authentication response message sent by the base station to the STA according to the authentication message after receiving the authentication message sent by the STA, The authentication response message is used to indicate whether the base station allows the STA to communicate using the TMA;
  • the address confirmation module 648 may be configured to: when the authentication response message is used to indicate an authentication response message that allows the STA to communicate using the TMA, confirming that the TMA is used in subsequent communication;
  • the determining module 6410 may be configured to determine, when the authentication response message is used to indicate that the STA does not allow the STA to use the TMA for communication, to determine whether the number of TMAs generated by the STA in the current access authentication reaches a predetermined threshold.
  • the third generation module 6412 And when the judgment result of the determining module 6410 is that the number of TMAs generated by the STA in the current access authentication does not reach the predetermined threshold, another TMA is generated according to the generating rule, and the authentication message is sent to the base station by using the TMA;
  • the module 6414 is configured to terminate the current access authentication when the judgment result of the determining module 6410 is that the number of TMAs generated by the STA in the current access authentication reaches a predetermined threshold.
  • the access device 640 based on the temporary MAC address may further include: a fourth generation module 6416, a first encryption module 6418, and a first sending module 6420. Or, the public key receiving module 6422, the second encryption module 6424, and the second sending module 6426.
  • the fourth generation module 6416 can be configured to perform key signaling information interaction with the base station, and generate a key common to the base station according to the key signaling information.
  • the first encryption module 6418 can be used to perform the RMA of the STA by using the key.
  • the first sending module 6420 is configured to send the encrypted RMA to the base station, so that the base station decrypts the encrypted RMA by using the key; or
  • the public key receiving module 6422 can be configured to receive a public key sent by the base station, where the public key is generated by the base station;
  • the second encryption module 6424 can be configured to encrypt the RMA of the STA by using the public key.
  • the second sending module 6426 can be configured to send the encrypted RMA to the base station, so that the base station decrypts the RMA by using the generated private key.
  • the base station 62 having the foregoing apparatus 620 can separately implement a temporary MAC address-based access method, and the non-base station device STA 64 having the foregoing apparatus 640 can also separately implement a temporary MAC address-based access method.
  • the base station sends a STA to the STA to indicate whether the base station supports the STA during the access authentication process of the non-base station device STA to the base station.
  • the message of the temporary MAC address TMA is solved.
  • the STA may continuously use the generated TMA to perform access authentication to the base station, which may easily cause the STA to fail to perform normal communication; Whether the STA is used by the STA or not is supported, so that the STA can be prevented from being denied access when the base station does not support the STA using the TMA, thereby ensuring that the STA uses the RMA for access authentication and achieves the effect of wireless communication.
  • FIG. 7 is a schematic structural diagram of a temporary MAC address-based access system provided in still another embodiment of the present invention
  • the system can be applied to the implementation environment shown in FIG. 1.
  • the system can include a base station 72 and at least one non-base station device STA 74, wherein the base station 72 includes a temporary MAC address based access device 720, and the STA 74 also includes a temporary MAC address based access device 740.
  • the temporary MAC address-based access device 720 located in the base station 72 may include: a message sending module 722, and an authentication message receiving Module 724 and response transmitting module 726.
  • the message sending module 722 is configured to send, to the STA, a message for indicating whether the base station supports the STA to use the temporary MAC address TMA, in the access authentication process for the non-base station device STA to perform wireless communication with the base station, so that the STA sends the message to the base station according to the message.
  • Sending an authentication message where the authentication message is an authentication message sent by the STA to the base station by using the TMA when the message is used to indicate that the base station supports the STA to use the TMA;
  • the authentication message receiving module 724 can be configured to receive the authentication message, and parse the TMA by using the authentication message;
  • the response sending module 726 can be used to perform the authentication cancellation according to the authentication message receiving module 724.
  • the information is sent to the STA, and the authentication response message is used to indicate whether the base station allows the STA to use the TMA for communication.
  • the temporary MAC address-based access device 720 may further include an inquiry message receiving module 728.
  • the query message receiving module 728 can be configured to receive an inquiry message sent by the STA by using the generated TMA;
  • the message is a query response message, and the message sending module 722 can also be used to:
  • the inquiry response message is sent to the STA, and the inquiry response message includes a first indicator for indicating whether the base station supports the STA to use the TMA.
  • the message sending module 722 can include: a parsing unit 722a, a first judging unit 722b, a first responding sending unit 722c, and a second responding sending unit 722d.
  • the parsing unit 722a can be configured to parse the TMA by using the query message
  • the first determining unit 722b may be configured to determine whether the TMA conflicts with the pre-stored TMA when the base station supports the STA to use the TMA, and the pre-stored TMA includes the TMA used by each STA that performs wireless communication connection with the base station;
  • the first response sending unit 722c may be configured to: when the judgment result of the first determining unit 722b is that the TMA does not collide with the pre-stored TMA, send an inquiry response message for indicating that the STA is allowed to use the TMA for communication, so that the STA confirms Use the TMA in subsequent communications;
  • the second response sending unit 722d may be configured to send, when the first determination unit 722b determines that the TMA collides with the pre-stored TMA, an inquiry response message for indicating that the STA is not allowed to communicate using the TMA.
  • the query response message when the first indicator is used to indicate that the base station supports the STA to use the TMA, the query response message further includes a generation rule for instructing the STA to generate the TMA.
  • the query response message further includes a second indicator for indicating whether the STA needs to upload the real MAC address RMA of the STA.
  • the access device 720 based on the temporary MAC address may further include: a first generating module 7210, a first receiving module 7212, a first decrypting module 7214, or The second generation module 7216, the public key sending module 7218, the second receiving module 7220, and the second decrypting module 7222.
  • the first generating module 7210 may be configured to perform key signaling information interaction with the STA, and generate a key common to the STA according to the key signaling information.
  • the first receiving module 7212 may be configured to receive the STA encrypted by using the key.
  • the first decryption module 7214 can be used to decrypt the encrypted RMA by using a key; or
  • the second generating module 7216 may be configured to generate a public key and a private key; the public key sending module 7218 may be configured to send the public key to the STA; and the second receiving module 7220 may be configured to receive the RMA encrypted by the STA by using the public key.
  • the second decryption module 7222 can be configured to decrypt the encrypted RMA by using a private key.
  • the temporary MAC address-based access device 720 may further include: a detecting module 7224 and an accessing module 7226.
  • the detecting module 7224 is configured to detect whether the decrypted RMA exists in the pre-stored RMA list, where the pre-stored RMA list stores the RMA of the STA that is allowed to access the base station;
  • the access module 7226 can be configured to allow the access authentication to be completed when the detection result of the detection module 7224 is that the decrypted RMA exists in the pre-stored RMA list.
  • the temporary MAC address-based access device 740 located in the base station 74 may include: a message receiving module. 742.
  • the message receiving module 742 may be configured to receive, by the base station, a message sent by the base station to indicate whether the base station supports the STA to use the temporary MAC address TMA in the access authentication process of the non-base station device STA performing wireless communication with the base station;
  • the authentication message sending module 744 can be configured to use the TMA to send an authentication message to the base station when the message received by the message receiving module 742 is used to indicate that the base station supports the STA to use the TMA.
  • the temporary MAC address-based access device 740 may further include: an inquiry message sending module 746.
  • the query message sending module 746 can be configured to use the generated TMA to send an inquiry message to the base station, so that the base station parses the TMA by using the inquiry message; when the base station supports the STA to use the TMA, it is detected whether the TMA conflicts with the pre-stored TMA, and the pre-stored TMA includes A TMA used by each STA that performs a wireless communication connection with the base station; if the detection result is that the TMA does not collide with the pre-stored TMA, an inquiry response message for instructing the STA to allow the STA to communicate using the TMA is sent to the STA, so that the STA confirms the subsequent The TMA is used in communication; if the detection result is that the TMA conflicts with the pre-stored TMA, an inquiry response message for instructing the STA to be allowed to communicate using the TMA is sent to the STA.
  • the message is a query response message, and the message receiving module 742 can also be used to:
  • the inquiry response message includes a first indicator for indicating whether the base station supports the STA to use the TMA.
  • the query response message when the first indicator is used to indicate that the base station supports the STA to use the TMA, the query response message further includes a generation rule for instructing the STA to generate the TMA.
  • the authentication message sending module 744 may include: a third determining unit 744a, an address confirming unit 744b, and a second generating unit 744c.
  • the third determining unit 744a may be configured to: when the first indicator in the query response message is used to indicate that the base station supports the STA to use the TMA, determine whether the query response message is used to indicate that the STA is allowed to use the TMA in the query message to communicate;
  • the address confirmation unit 744b may be configured to confirm that the TMA is used in subsequent communication when the judgment result of the third determining unit 744a is an inquiry response message for indicating that the STA is allowed to communicate using the TMA in the inquiry message;
  • the second generating unit 744c may be configured to generate another TMA by using the generating rule when the determining result of the third determining unit 744a is an inquiry response message for indicating that the STA is not allowed to communicate using the TMA in the query message, and using the generated TMA. Send an authentication message to the base station.
  • the authentication message described here is the authentication message sent by the authentication message sending module 646 described in FIG. 6.
  • the second generating unit 744c may be configured to generate another TMA by using the generating rule when the determining result of the third determining unit 744 is a query response message for indicating that the STA is not allowed to communicate using the TMA in the query message.
  • the authentication message sending module 644 transmits the authentication message to the base station by using the generated TMA.
  • the query response message further includes a second indicator for indicating whether the STA needs to upload the RMA of the STA.
  • the temporary MAC address-based access device 740 may include: a response receiving module 748, an address confirming module 7410, a determining module 7412, and a third generating module 7414. And access termination module 7416.
  • the response receiving module 748 is configured to receive an authentication response message sent by the base station, where the authentication response message is used by the base station to parse the TMA by using the authentication message, and the authentication response message sent to the STA according to the authentication message, and the authentication is performed.
  • the response message is used to indicate whether the base station allows STA uses TMA for communication;
  • the address confirmation module 7410 is configured to: when the authentication response message is used to indicate that the STA is allowed to communicate using the TMA, confirming that the TMA is used in the subsequent communication;
  • the determining module 7412 is configured to: when the authentication response message is used to indicate that the STA is not allowed to use the TMA for communication, determine whether the number of TMAs generated by the STA in the current access authentication reaches a predetermined threshold; and the third generating module 7414 is configured to determine The result of the module is that when the number of TMAs generated by the STA in the current access authentication does not reach the predetermined threshold, another TMA is generated according to the generation rule, and the authentication message is sent to the base station by using the TMA; the access termination module 7416 is used for determining The result of the module is that the STA access termination authentication is terminated when the number of TMAs generated by the STA in the current access authentication reaches a predetermined threshold.
  • the temporary MAC address-based access device 740 includes: a fourth generation module 7418, a first encryption module 7420, and a first sending module 7422, or The public key receiving module 7244, the second encryption module 7426, and the second sending module 7428.
  • the fourth generation module 7418 may be configured to perform key signaling information interaction with the base station, and generate a key common to the base station according to the key signaling information.
  • the first encryption module 7420 may be configured to perform the RMA of the STA by using the key.
  • the first sending module 7422 can be configured to send the encrypted RMA to the base station, so that the base station decrypts the encrypted RMA by using the key; or
  • the public key receiving module 7244 can be configured to receive the public key sent by the base station, and the public key is generated by the base station; the second encryption module 7426 can be used to encrypt the RMA of the STA by using the public key; the second sending module 7428 can be used.
  • the encrypted RMA is sent to the base station, so that the base station decrypts the RMA by using the generated private key.
  • the base station 72 having the foregoing apparatus 720 can separately implement a temporary MAC address-based access method
  • the non-base station device 74 having the foregoing apparatus 740 can also separately implement a temporary MAC address-based access method.
  • the base station sends a STA to the STA to indicate whether the base station supports the STA during the access authentication process of the non-base station device STA to the base station.
  • the message of the temporary MAC address TMA is solved.
  • the STA may continuously use the generated TMA to perform access authentication to the base station, which may easily cause the STA to fail to perform normal communication; Whether the STA is used by the STA or not is supported, so that the STA can be prevented from being denied access when the base station does not support the STA using the TMA, thereby ensuring that the STA uses the RMA for access authentication and achieves the effect of wireless communication.
  • the access device of the temporary MAC address provided by the foregoing embodiment is only illustrated by the division of the foregoing functional modules. In actual applications, the actual application may be performed as needed.
  • the above function allocation is completed by different functional modules, that is, the internal structure of the base station and the non-base station device STA are divided into different functional modules to complete all or part of the functions described above.
  • the temporary MAC address-based access device provided by the foregoing embodiment is in the same concept as the temporary MAC address-based access method embodiment, and the specific implementation process is described in detail in the method embodiment, and details are not described herein again.
  • the base station may be the base station AP 120 in the implementation environment shown in FIG.
  • the base station can include a transmitter 802 and a receiver 804.
  • the transmitter 802 is configured to send, to the STA, a message for indicating whether the base station supports the STA to use the temporary MAC address TMA, in the access authentication process for the non-base station device STA to perform wireless communication with the base station, so that the STA sends the authentication message to the base station according to the message.
  • the authentication message is an authentication message sent by the STA to the base station by using the TMA when the message is used to indicate that the base station supports the STA to use the TMA.
  • the receiver 804 is configured to receive an authentication message, and parse the TMA by using the authentication message;
  • the transmitter 802 is further configured to send an authentication response message to the STA according to the authentication message received by the receiver 804, where the authentication response message is used to indicate whether the base station allows the STA to use the TMA for communication.
  • the base station sends a message to the STA to indicate whether the base station supports the STA to use the temporary MAC address TMA in the access authentication process of the non-base station device STA performing radio communication with the base station; It solves the problem that when the base station does not support the use of the TMA by the STA, the STA will continuously use the generated TMA to perform access authentication to the base station, which may easily cause the STA to fail to perform normal communication; since the base station can inform the STA whether it supports the STA to use the TMA, It is achieved that the STA can be prevented from being denied access when the base station does not support the STA using the TMA, thereby ensuring that the STA uses the RMA for access authentication and achieves the effect of wireless communication.
  • the base station may be the base station AP 120 in the implementation environment shown in FIG.
  • the base station can include a transmitter 902, a processor 904, a receiver 906, and a memory 908, wherein the processor 904 is coupled to the receiver 906, the transmitter 902, and the memory 908, respectively, and the memory 908 stores at least one type of computer software.
  • the processor 904 can utilize the computer software stored in the memory 908 to implement the corresponding functions.
  • the base station may include a transmitter 902, which may be used in an access authentication process in which the non-base station device STA performs wireless communication with the base station.
  • Authentication message ;
  • the receiver 906 is configured to receive an authentication message, and parse the TMA by using the authentication message;
  • the transmitter 902 is further configured to send an authentication response message to the STA according to the authentication message received by the receiver 906, where the authentication response message is used to indicate whether the base station allows the STA to use the TMA for communication.
  • the message is a discovery message
  • the transmitter 902 can also be used to:
  • the discovery message is broadcasted every predetermined time interval, and the discovery message includes a first indicator for indicating whether the base station supports the STA to use the TMA.
  • the discovery message when the first indicator is used to indicate that the base station supports the STA to use the TMA, the discovery message further includes a generation rule for instructing the STA to generate the TMA.
  • the discovery message further includes a second indicator for indicating whether the STA needs to upload the real MAC address RMA of the STA.
  • the receiver 906 is further configured to receive an inquiry message sent by the STA by using the generated TMA.
  • the message is a query response message, the sender 902, which can also be used to:
  • the inquiry response message is sent to the STA, and the inquiry response message includes a first indicator for indicating whether the base station supports the STA to use the TMA.
  • the processor 904 can be configured to parse the TMA by using the query message;
  • the processor 904 is further configured to: when the base station supports the STA to use the TMA, determine whether the TMA conflicts with the pre-stored TMA, where the pre-stored TMA includes a TMA used by each STA that performs a wireless communication connection with the base station;
  • the transmitter 902 is further configured to: when the judgment result of the processor 904 is that the TMA does not collide with the pre-stored TMA, send an inquiry response message to the STA for instructing the STA to use the TMA for communication, so that the STA confirms the subsequent communication. Use the TMA;
  • the transmitter 902 is further configured to send, when the processor 904 determines that the TMA collides with the pre-stored TMA, an inquiry response message for indicating that the STA is not allowed to communicate using the TMA.
  • the query response message when the first indicator is used to indicate that the base station supports the STA to use the TMA, the query response message further includes a generation rule for instructing the STA to generate the TMA.
  • the query response message further includes a second indicator for indicating whether the STA needs to upload the real MAC address RMA of the STA.
  • the processor 904 is further configured to: when the base station supports the STA to use the TMA, determine whether the TMA conflicts with the pre-stored TMA, where the pre-stored TMA includes a TMA used by each STA that performs a wireless communication connection with the base station;
  • the transmitter 902 is further configured to: when the judgment result of the processor 904 is that the TMA does not collide with the pre-stored TMA, send an authentication response message to the STA for instructing the STA to use the TMA for communication, so that the STA confirms use in the subsequent communication.
  • TMA a judgment result of the processor 904 is that the TMA does not collide with the pre-stored TMA
  • the transmitter 902 is further configured to: when the judgment result of the processor 904 is that the TMA collides with the pre-stored TMA, send an authentication response message to the STA for indicating that the STA is not allowed to communicate using the TMA.
  • the processor 904 is further configured to perform key signaling information interaction with the STA, and generate a key common to the STA according to the key signaling information;
  • the receiver 906 is further configured to receive an RMA encrypted by the STA by using a key, and the processor 904 is further configured to decrypt the encrypted RMA by using the key;
  • the processor 904 is further configured to generate a public key and a private key; the transmitter 902 is further configured to send the public key to the STA; the receiver 906 is further configured to receive the RMA encrypted by the STA by using the public key, and the processor 904. It is also used to decrypt the encrypted RMA with a private key.
  • the processor 904 is further configured to detect whether the decrypted RMA exists in the pre-stored RMA list, and the pre-stored RMA list stores the allowed access.
  • the processor 904 is further configured to allow the access authentication to be completed when the RMA obtained by the decryption result is present in the pre-stored RMA list.
  • the base station in the access authentication process in which the non-base station device STA performs wireless communication with the base station, the base station sends a message to the STA to indicate whether the base station supports the STA.
  • the message of the temporary MAC address TMA is used to solve the problem that when the base station does not support the use of the TMA by the STA, the STA may continuously use the generated TMA to perform access authentication to the base station, which may easily cause the STA to fail to perform normal communication; Whether it supports the use of the TMA by the STA, so that the STA can be prevented from being denied access when the base station does not support the STA using the TMA, thereby ensuring that the STA uses the RMA for access authentication and achieves the effect of wireless communication.
  • the STA may be a non-base station device STA 140 in the implementation environment shown in FIG.
  • the STA may include a receiver 1002 and a transmitter 1004.
  • the receiver 1002 is configured to receive, by the base station, a message sent by the base station to indicate whether the base station supports the STA to use the temporary MAC address TMA, in an access authentication process in which the non-base station device STA performs wireless communication with the base station;
  • the transmitter 1004 is further configured to use the TMA to send an authentication message to the base station when the message received by the receiver 1002 is used to indicate that the base station supports the STA to use the TMA.
  • the STA provided by the embodiment of the present invention sends a message for indicating whether the base station supports the STA to use the temporary MAC address TMA, in the process of performing the access authentication of the non-base station device STA to the base station. It solves the problem that when the base station does not support the use of the TMA by the STA, the STA will continuously use the generated TMA to perform access authentication to the base station, which may easily cause the STA to fail to perform normal communication; since the base station can inform the STA whether it supports the STA to use the TMA, It is achieved that the STA can be prevented from being denied access when the base station does not support the STA using the TMA, thereby ensuring that the STA uses the RMA for access authentication and achieves the effect of wireless communication.
  • the STA may be a non-base station device STA 140 in the implementation environment shown in FIG.
  • the STA may include a receiver 1102, a processor 1104, a transmitter 1106, and a memory 1108, wherein the processor 1104 is coupled to the receiver 1102, the transmitter 1106, and the memory 1108, respectively, and the memory 1108 stores at least one type of computer software for processing.
  • the processor 1104 can utilize the computer software stored in the memory 1108 to implement the corresponding functions.
  • the STA may include a receiver 1102 and a transmitter 1106.
  • the receiver 1102 can be used for access authentication of wireless communication by the non-base station device STA to the base station. During the authentication process, the receiving base station sends a message indicating whether the base station supports the STA to use the temporary MAC address TMA;
  • the transmitter 1106 is further configured to: when the message received by the receiver 1102 is used to indicate that the base station supports the STA to use the TMA, use the TMA to send the authentication message to the base station.
  • the message is a discovery message
  • the receiver 1102 can also be used to:
  • the receiving base station broadcasts a discovery message that is sent every predetermined time interval, and the discovery message includes a first indicator for indicating whether the base station supports the STA to use the TMA.
  • the discovery message when the first indicator is used to indicate that the base station supports the STA to use the TMA, the discovery message further includes a generation rule for instructing the STA to generate the TMA.
  • the STA may further include a processor 1104.
  • the processor 1104 may be configured to generate a TMA by using a generation rule when the first indicator is used to indicate that the base station supports the STA to use the TMA;
  • the sender 1106 may be configured to send an authentication message to the base station by using the TMA, so that the base station receives the authentication message, parses the TMA by using the authentication message, and sends an authentication response message to the STA according to the authentication message, where the authentication response message is used to indicate whether the base station allows the STA to use the TMA. Communicate.
  • the discovery message further includes a second indicator for indicating whether the STA needs to upload the real MAC address RMA of the STA.
  • the transmitter 1106 is further configured to send an inquiry message to the base station by using the generated TMA, so that the base station parses the TMA by using the inquiry message; and the base station supports the STA.
  • the TMA it is detected whether the TMA conflicts with the pre-stored TMA, and the pre-stored TMA includes the TMA used by each STA that performs wireless communication connection with the base station; if the detection result is that the TMA does not conflict with the pre-stored TMA, the STA is sent to the STA for An inquiry response message indicating that the STA is allowed to communicate using the TMA, so that the STA confirms that the TMA is used in subsequent communication; if the detection result is that the TMA conflicts with the pre-stored TMA, the STA is sent to indicate that the STA is not allowed to communicate using the TMA. Ask for a response message;
  • the message is a query response message, and the receiver 1102 can also be used to:
  • the inquiry response message includes a first indicator for indicating whether the base station supports the STA to use the TMA.
  • the query response message when the first indicator is used to indicate that the base station supports the STA to use the TMA, the query response message further includes a generation rule for instructing the STA to generate the TMA.
  • the processor 1104 is further configured to: when the first indicator in the query response message is used to indicate that the base station supports the STA to use the TMA, determine whether the query response message is Used to indicate that the STA is allowed to communicate using the TMA in the inquiry message;
  • the processor 1104 is further configured to: when the judgment result is an inquiry response message, to indicate that the STA is allowed to use the TMA in the inquiry message to communicate, use the TMA in the inquiry message to communicate, and confirm that the TMA is used in the subsequent communication, and the transmitter Also used to send an authentication message to a base station by using TMA;
  • the processor 1104 is further configured to: when the judgment result is an inquiry response message, to indicate that the STA is not allowed to use the TMA in the inquiry message to communicate, generate another TMA by using the generation rule, and the transmitter 1106 is further configured to use the generated TMA direction.
  • the base station sends an inquiry message or an authentication message.
  • the query response message further includes a second indicator for indicating whether the STA needs to upload the RMA of the STA.
  • the receiver 1102 is further configured to receive an authentication response message sent by the base station, where the authentication response message is that the base station uses the authentication after receiving the authentication message sent by the STA.
  • the message parses the TMA and sends an authentication response message to the STA according to the authentication message, where the authentication response message is used to indicate whether the base station allows the STA to use the TMA for communication;
  • the processor 1104 is further configured to: when the authentication response message is used to indicate that the STA is allowed to use the TMA for communication, to confirm that the TMA is used in the subsequent communication;
  • the processor 1104 is further configured to: when the authentication response message is used to indicate that the STA is not allowed to use the TMA for communication, determine whether the number of TMAs generated by the STA in the current access authentication reaches a predetermined threshold; and the processor 1104 is further configured to determine The result is that when the number of TMAs generated by the STA in the current access authentication does not reach the predetermined threshold, another TMA is generated according to the generation rule, and the triggering transmitter 1106 sends an authentication message to the base station by using the TMA; the processor 1104 is further used to determine the result. If the number of TMAs generated by the STA in the current access authentication reaches a predetermined threshold, the access authentication is terminated.
  • the processor 1104 is further configured to perform key signaling information interaction with the base station, and generate a key common to the base station according to the key signaling information.
  • the processor 1104 is further configured to encrypt the RMA of the STA by using a key;
  • the transmitter 1106 may further be configured to send the encrypted RMA to the base station, so that the base station decrypts the encrypted RMA by using the key; or ,
  • the receiver 1102 is further configured to receive a public key sent by the base station, where the public key is generated by the base station; the processor 1104 is further configured to encrypt the RMA of the STA by using the public key; and the transmitter 1106 can also be used to encrypt the The subsequent RMA is sent to the base station so that the base station decrypts the RMA using the generated private key.
  • the STA provided by the embodiment of the present invention sends a message for indicating whether the base station supports the STA to use the temporary MAC address TMA, in the process of performing the access authentication of the non-base station device STA to the base station. It solves the problem that when the base station does not support the use of the TMA by the STA, the STA will continuously use the generated TMA to perform access authentication to the base station, which may easily cause the STA to fail to perform normal communication; since the base station can inform the STA whether it supports the STA to use the TMA, It is achieved that the STA can be prevented from being denied access when the base station does not support the STA using the TMA, thereby ensuring that the STA uses the RMA for access authentication and achieves the effect of wireless communication.
  • FIG. 12 it is a schematic structural diagram of a temporary MAC address-based access system provided in another embodiment of the present invention.
  • the temporary MAC address-based access system can be applied to the implementation shown in FIG. 1. Environment.
  • the temporary MAC address based access system may include a base station 1202 and at least one non-base station device STA 1204.
  • the base station 1202 may be a base station as described in FIG. 8 or FIG. 9; the non-base station device STA 1204 may be a STA as described in FIG. 10 or FIG.
  • the temporary MAC address-based access system when the base station does not support the use of the TMA by the STA, causes the STA to continuously use the generated TMA to perform access authentication to the base station, which may cause the STA to fail. Normal communication.
  • the invention solves the problem by the method in which the base station carries in the message whether to allow the STA to use the TMA access.
  • the disclosed systems, devices, and methods may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of the unit may be only a logical function division.
  • there may be another division manner for example, multiple units or components may be combined. Or it can be integrated into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the functions may be stored in a computer readable storage medium if implemented in the form of a software functional unit and sold or used as a standalone product.
  • the technical solution of the present invention which is essential or contributes to the prior art, or a part of the technical solution, may be embodied in the form of a software product, which is stored in a storage medium, including
  • the instructions are used to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present invention.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like, which can store program codes. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明实施例提供了一种基于临时MAC地址的接入方法、装置及系统,涉及网络通信领域。所述方法包括:在STA向基站进行无线通信的接入认证过程中,向STA发送用于指示基站是否支持STA使用临时MAC地址TMA的消息。本发明通过向STA发送用于指示基站是否支持STA使用临时MAC地址TMA的消息;解决了当基站不支持STA使用TMA时,会导致STA不断地利用生成的TMA向基站进行接入认证,容易导致STA无法进行正常通信的问题;达到了可以避免STA在基站不支持STA使用TMA时被拒绝接入的情况,进而可以保证STA利用RMA进行接入认证,实现无线通信的效果。

Description

基于临时MAC地址的接入方法、装置及系统 技术领域
本发明涉及网络通信领域,特别涉及一种基于临时MAC地址的接入方法、装置及系统。
背景技术
当使用无线局域网(WLAN,Wireless Local Area Network)技术进行通信时,设备之间可以通过一种有架构的网络模式(Infrastructure Mode)进行通信,在这种架构下,网络中有一个中心节点,通常称为AP(Access Point,基站),其它非基站节点STA(Station,WLAN网中非基站设备)必需首先与AP建立连接,才能与网络中的其它节点及互联网上的其它节点进行通信。
在当前的无线局域网通信中,AP和STA通常使用设备商在生产时分配的全局MAC(Media Access Control,媒体接入控制子层)地址进行通信,该MAC地址在设备的使用寿命过程中几乎是不变的。在无线局域网通信中,MAC数据包中所包含的发送方和接收方的MAC地址是以明文的方式发送的,第三方可以很容易通过监听获取MAC地址信息。又由于MAC地址与设备(比如手机)之间具有单一对应性,而根据设备又可以联系到拥有设备的用户的个人信息,因此MAC地址的泄露也就意味为个人隐私的泄露。MAC已经成为了一种不可忽视的个人隐私信息。
在无线网络环境中,为了避免因MAC地址的泄露而造成对个人隐私的威胁,需要对MAC地址进行保护。当前已有提议使用临时MAC地址(TMA,Temporal MAC Address)替代设备制造商提供的真实MAC地址(RMA,Real MAC Address)。但是当使用TMA时,由于其非唯一性,系统需要解决TMA冲突的问题。临时MAC地址一般来说是一个本地的MAC地址(Local MAC Address),即MAC地址的第47位设置为1。TMA可以由基站或者用户在某一个范围内产生。产生的方法可以是随机选取,或者由本地系统分配。
在相关技术中使用TMA进行无线网络通信时,当一个STA要连接到一个基站时,该STA必须确定基站是否在通信范围内。目前有两种方式可以确定一 个基站是否在STA通信范围内,其中一种方式是被动发现方式,也即:STA在一个信道上监听基站所发送的发现消息(比如信标信令,beacon message);当在某个信道上发现了目标基站时,STA就可以发送认证消息(Authentication Request),接入该基站。另一种方式是主动方式,也即:STA在一个信道上主动发送询问消息(Probe Request),如果目标基站收到了询问信令,则该基站会回应一个询问回应消息(Probe Response),询问回应消息的内容与发现消息类似,当一个STA收到询问回应消息后,可根据询问回应消息的内容来决定是否接入发现的基站。在一种相关的接入认证中,STA可以利用生成的TMA向基站发送询问消息,而STA利用另外一个TMA向基站发送认证消息并在之后继续使用该TMA。
在实现本发明的过程中,发明人发现现有技术至少存在以下问题:当基站不支持STA使用TMA时,可能会导致STA不断地利用生成的TMA向基站进行接入认证,容易导致STA无法进行正常通信。
发明内容
为了解决当基站不支持STA使用TMA时,会导致STA不断地利用生成的TMA向基站进行接入认证,容易导致STA无法进行正常通信的问题,本发明实施例提供了一种基于临时MAC地址的接入方法、装置及系统。所述技术方案如下:
第一方面,提供了一种基于临时MAC地址的接入方法,应用于基站中,所述方法包括:
在非基站设备STA向所述基站进行无线通信的接入认证过程中,向所述STA发送用于指示所述基站是否支持STA使用临时MAC地址TMA的消息,以便所述STA根据所述消息向所述基站发送认证消息,所述认证消息是所述STA在所述消息用于指示所述基站支持STA使用TMA时,利用TMA向所述基站发送的认证消息;
接收所述认证消息,利用所述认证消息解析出所述TMA;
根据所述认证消息向所述STA发送认证回应消息,所述认证回应消息用于指示所述基站是否允许所述STA使用所述TMA进行通信。
在第一方面的第一种可能的实施方式中,所述消息为发现消息,所述向所述STA发送用于指示是否支持STA使用TMA的消息,包括:
每隔预定时间间隔广播发送发现消息,所述发现消息包括用于指示所述基站是否支持STA使用TMA的第一指标。
结合第一方面或者第一方面的第一种可能的实施方式,在第二种可能的实施方式中,当所述第一指标用于指示所述基站支持STA使用TMA时,所述发现消息还包括用于指示STA生成TMA的生成规则。
结合第一方面、第一方面的第一种可能的实施方式或者第一方面的第二种可能的实施方式,在第三种可能的实施方式中,所述发现消息还包括用于指示是否需要所述STA上传所述STA的真实MAC地址RMA的第二指标。
结合第一方面、第一方面的第一种可能的实施方式至第一方面的第三种可能的实施方式中的任意一种,在第四种可能的实施方式中,在所述向所述STA发送用于指示所述基站是否支持STA使用临时MAC地址TMA的消息之前,还包括:
接收所述STA利用生成的TMA发送的询问消息;
所述消息为询问回应消息,所述向所述STA发送用于指示是否支持STA使用临时MAC地址TMA的消息,包括:
向所述STA发送询问回应消息,所述询问回应消息包括用于指示所述基站是否支持STA使用TMA的第一指标。
结合第一方面、第一方面的第一种可能的实施方式至第一方面的第四种可能的实施方式中的任意一种,在第五种可能的实施方式中,所述向所述STA发送询问回应消息,包括:
利用所述询问消息解析出所述TMA;
在所述基站支持STA使用TMA时,判断所述TMA是否与预存的TMA相冲突,所述预存的TMA包括与所述基站进行无线通信连接的各个STA所使用的TMA;
若判断结果为所述TMA不与预存的TMA相冲突,则向所述STA发送用于指示允许所述STA使用所述TMA进行通信的所述询问回应消息,以便所述STA确认在后续通信中使用所述TMA;
若判断结果为所述TMA与预存的TMA相冲突,则向所述STA发送用于指示不允许所述STA使用所述TMA进行通信的所述询问回应消息。
结合第一方面、第一方面的第一种可能的实施方式至第一方面的第五种可能的实施方式中的任意一种,在第六种可能的实施方式中,当所述第一指标用 于指示所述基站支持STA使用TMA时,所述询问回应消息还包括用于指示STA生成TMA的生成规则。
结合第一方面、第一方面的第一种可能的实施方式至第一方面的第六种可能的实施方式中的任意一种,在第七种可能的实施方式中,所述询问回应消息还包括用于指示是否需要所述STA上传所述STA的真实MAC地址RMA的第二指标。
结合第一方面、第一方面的第一种可能的实施方式至第一方面的第七种可能的实施方式中的任意一种,在第八种可能的实施方式中,所述根据所述认证消息向所述STA发送认证回应消息,包括:
在所述基站支持STA使用TMA时,判断所述TMA是否与预存的TMA相冲突,所述预存的TMA包括与所述基站进行无线通信连接的各个STA所使用的TMA;
若判断结果为所述TMA不与预存的TMA相冲突,则向所述STA发送用于指示允许所述STA使用所述TMA进行通信的认证回应消息,以便所述STA确认在后续通信中使用所述TMA;
若判断结果为所述TMA与预存的TMA相冲突,则向所述STA发送用于指示不允许所述STA使用所述TMA进行通信的认证回应消息。
结合第一方面、第一方面的第一种可能的实施方式至第一方面的第八种可能的实施方式中的任意一种,在第九种可能的实施方式中,所述方法还包括:
与所述STA进行密钥信令信息交互,根据所述密钥信令信息生成与所述STA共同的密钥;接收所述STA利用所述密钥加密后的RMA;利用所述密钥对所述加密后的RMA进行解密;或,
生成公钥和私钥;将所述公钥发送给所述STA;接收所述STA利用所述公钥加密后的RMA;利用所述私钥对所述加密后的RMA进行解密。
结合第一方面、第一方面的第一种可能的实施方式至第一方面的第九种可能的实施方式中的任意一种,在第十种可能的实施方式中,所述方法还包括:
检测解密得到的所述RMA是否存在于预存的RMA列表中,所述预存的RMA列表存储有允许接入所述基站的STA的RMA;
若检测结果为解密得到的所述RMA存在于预存的RMA列表中,允许完成本次接入认证。
第二方面,提供了一种基于临时MAC地址的接入方法,应用于与基站进 行无线通信连接的非基站设备STA中,所述方法包括:
在非基站设备STA向所述基站进行无线通信的接入认证过程中,接收所述基站发送的用于指示所述基站是否支持STA使用临时MAC地址TMA的消息;
当所述消息用于指示所述基站支持STA使用TMA时,利用TMA向所述基站发送认证消息。
在第二方面的第一种可能的实施方式中,所述消息为发现消息,所述接收所述基站发送的用于指示所述基站是否支持STA使用临时MAC地址TMA的消息,包括:
接收所述基站每隔预定时间间隔广播发送的发现消息,所述发现消息包括用于指示所述基站是否支持STA使用TMA的第一指标。
结合第二方面或者第二方面的第一种可能的实施方式,在第二种可能的实施方式中,当所述第一指标用于指示所述基站支持STA使用TMA时,所述发现消息还包括用于指示STA生成TMA的生成规则。
结合第二方面、第二方面的第一种可能的实施方式或者第二方面的第二种可能的实施方式,在第三种可能的实施方式中,所述当所述消息用于指示所述基站支持STA使用TMA时,利用TMA向所述基站发送认证消息,包括:
当所述第一指标用于指示所述基站支持STA使用TMA时,利用所述生成规则生成TMA;
利用所述TMA向所述基站发送所述认证消息,以便所述基站接收所述认证消息,利用所述认证消息解析出所述TMA;根据所述认证消息向所述STA发送认证回应消息,所述认证回应消息用于指示所述基站是否允许所述STA使用所述TMA进行通信。
结合第二方面、第二方面的第一种可能的实施方式至第二方面的第三种可能的实施方式中的任意一种,在第四种可能的实施方式中,所述发现消息还包括用于指示是否需要所述STA上传所述STA的真实MAC地址RMA的第二指标。
结合第二方面、第二方面的第一种可能的实施方式至第二方面的第四种可能的实施方式中的任意一种,在第五种可能的实施方式中,在所述接收所述基站发送的用于指示所述基站是否支持STA使用临时MAC地址TMA的消息之前,还包括:
利用生成的TMA向所述基站发送询问消息,以便所述基站利用所述询问 消息解析出所述TMA;在所述基站支持STA使用TMA时,检测所述TMA是否与预存的TMA相冲突,所述预存的TMA包括与所述基站进行无线通信连接的各个STA所使用的TMA;若检测结果为所述TMA不与预存的TMA相冲突,则向所述STA发送用于指示允许所述STA使用所述TMA进行通信的询问回应消息,以便所述STA确认在后续通信中使用所述TMA,完成本次接入认证;若检测结果为所述TMA与预存的TMA相冲突,则向所述STA发送用于指示不允许所述STA使用所述TMA进行通信的询问回应消息;
所述消息为所述询问回应消息,所述接收所述基站发送的用于指示所述基站是否支持STA使用临时MAC地址TMA的消息,包括:
接收所述基站发送的所述询问回应消息,所述询问回应消息包括用于指示所述基站是否支持STA使用TMA的第一指标。
结合第二方面、第二方面的第一种可能的实施方式至第二方面的第五种可能的实施方式中的任意一种,在第六种可能的实施方式中,当所述第一指标用于指示所述基站支持STA使用TMA时,所述询问回应消息还包括用于指示STA生成TMA的生成规则。
结合第二方面、第二方面的第一种可能的实施方式至第二方面的第六种可能的实施方式中的任意一种,在第七种可能的实施方式中,所述当所述消息用于指示所述基站支持STA使用TMA时,利用TMA向所述基站发送认证消息,包括:
当所述询问回应消息中的第一指标用于指示所述基站支持STA使用TMA时,判断所述询问回应消息是否用于指示允许所述STA使用所述询问消息中的TMA进行通信;
当判断结果为所述询问回应消息用于指示允许所述STA使用所述询问消息中的TMA进行通信,则确认在后续通信中使用所述TMA,利用所述TMA向所述基站发送认证消息;
当判断结果为所述询问回应消息用于指示不允许所述STA使用所述询问消息中的TMA进行通信,则利用所述生成规则生成另一个TMA,利用生成的所述TMA向所述基站发送认证消息。
结合第二方面、第二方面的第一种可能的实施方式至第二方面的第七种可能的实施方式中的任意一种,在第八种可能的实施方式中,所述询问回应消息还包括用于指示是否需要所述STA上传所述STA的RMA的第二指标。
结合第二方面、第二方面的第一种可能的实施方式至第二方面的第八种可能的实施方式中的任意一种,在第九种可能的实施方式中,在所述当所述消息用于指示所述基站支持STA使用TMA时,利用TMA向所述基站发送认证消息之后,还包括:
接收所述基站发送的认证回应消息,所述认证回应消息是所述基站在接收到所述STA发送的所述认证消息之后,利用所述认证消息解析出所述TMA,并根据所述认证消息向所述STA发送的认证回应消息,所述认证回应消息用于指示所述基站是否允许所述STA使用所述TMA进行通信;
当所述认证回应消息用于指示允许所述STA使用所述TMA进行通信,确认在后续通信中使用所述TMA;
当所述认证回应消息用于指示不允许所述STA使用所述TMA进行通信,则判断所述STA在本次接入认证中生成的TMA次数是否达到预定阈值;若判断结果为所述STA在本次接入认证中生成的TMA次数未达到所述预定阈值,则根据所述生成规则生成另一个TMA,并利用所述TMA向所述基站发送认证消息;若判断结果为所述STA在本次接入认证中生成的TMA次数达到所述预定阈值,则终止本次接入认证。
结合第二方面、第二方面的第一种可能的实施方式至第二方面的第九种可能的实施方式中的任意一种,在第十种可能的实施方式中,所述方法还包括:
与所述基站进行密钥信令信息交互,根据所述密钥信令信息生成与所述基站共同的密钥;利用所述密钥对所述STA的RMA进行加密;将加密后的所述RMA发送给所述基站,以便所述基站利用所述密钥对所述加密后的RMA进行解密;或,
接收所述基站发送的公钥,所述公钥是所述基站生成的;利用所述公钥对所述STA的RMA进行加密;将加密后的所述RMA发送给所述基站,以便所述基站利用生成的私钥对所述RMA进行解密。
第三方面,提供了一种基于临时MAC地址的接入装置,应用于基站中,所述装置包括:
消息发送模块,在非基站设备STA向所述基站进行无线通信的接入认证过程中,向所述STA发送用于指示所述基站是否支持STA使用临时MAC地址TMA的消息,以便所述STA根据所述消息向所述基站发送认证消息,所述认证消息是所述STA在所述消息用于指示所述基站支持STA使用TMA时,利 用TMA向所述基站发送的认证消息;
认证消息接收模块,用于接收所述认证消息,利用所述认证消息解析出所述TMA;
回应发送模块,用于根据所述认证消息接收模块接收到的所述认证消息向所述STA发送认证回应消息,所述认证回应消息用于指示所述基站是否允许所述STA使用所述TMA进行通信。
在第三方面的第一种可能的实施方式中,所述消息为发现消息,所述消息发送模块,还用于:
每隔预定时间间隔广播发送发现消息,所述发现消息包括用于指示所述基站是否支持STA使用TMA的第一指标。
结合第三方面或者第三方面的第一种可能的实施方式,在第二种可能的实施方式中,当所述第一指标用于指示所述基站支持STA使用TMA时,所述发现消息还包括用于指示STA生成TMA的生成规则。
结合第三方面、第三方面的第一种可能的实施方式或者第三方面的第二种可能的实施方式,在第三种可能的实施方式中,所述发现消息还包括用于指示是否需要所述STA上传所述STA的真实MAC地址RMA的第二指标。
结合第三方面、第三方面的第一种可能的实施方式至第三方面的第三种可能的实施方式中的任意一种,在第四种可能的实施方式中,所述装置还包括:
询问消息接收模块,用于接收所述STA利用生成的TMA发送的询问消息;
所述消息为询问回应消息,所述消息发送模块,还用于:
向所述STA发送询问回应消息,所述询问回应消息包括用于指示所述基站是否支持STA使用TMA的第一指标。
结合第三方面、第三方面的第一种可能的实施方式至第三方面的第四种可能的实施方式中的任意一种,在第五种可能的实施方式中,所述消息发送模块,包括:
解析单元,用于利用所述询问消息解析出所述TMA;
第一判断单元,用于在所述基站支持STA使用TMA时,判断所述TMA是否与预存的TMA相冲突,所述预存的TMA包括与所述基站进行无线通信连接的各个STA所使用的TMA;
第一回应发送单元,用于在所述第一判断单元的判断结果为所述TMA不与预存的TMA相冲突,则向所述STA发送用于指示允许所述STA使用所述 TMA进行通信的所述询问回应消息,以便所述STA确认在后续通信中使用所述TMA;
第二回应发送单元,用于在所述第一判断单元的判断结果为所述TMA与预存的TMA相冲突时,向所述STA发送用于指示不允许所述STA使用所述TMA进行通信的所述询问回应消息。
结合第三方面、第三方面的第一种可能的实施方式至第三方面的第五种可能的实施方式中的任意一种,在第六种可能的实施方式中,当所述第一指标用于指示所述基站支持STA使用TMA时,所述询问回应消息还包括用于指示STA生成TMA的生成规则。
结合第三方面、第三方面的第一种可能的实施方式至第三方面的第六种可能的实施方式中的任意一种,在第七种可能的实施方式中,所述询问回应消息还包括用于指示是否需要所述STA上传所述STA的真实MAC地址RMA的第二指标。
结合第三方面、第三方面的第一种可能的实施方式至第三方面的第七种可能的实施方式中的任意一种,在第八种可能的实施方式中,所述回应发送模块,包括:
第二判断单元,用于在所述基站支持STA使用TMA时,判断所述TMA是否与预存的TMA相冲突,所述预存的TMA包括与所述基站进行无线通信连接的各个STA所使用的TMA;
第三回应发送单元,用于在所述第二判断单元的判断结果为所述TMA不与预存的TMA相冲突时,向所述STA发送用于指示允许所述STA使用所述TMA进行通信的认证回应消息,以便所述STA确认在后续通信中使用所述TMA;
第四回应发送单元,用于在所述第二判断单元的判断结果为所述TMA与预存的TMA相冲突时,向所述STA发送用于指示不允许所述STA使用所述TMA进行通信的认证回应消息。
结合第三方面、第三方面的第一种可能的实施方式至第三方面的第八种可能的实施方式中的任意一种,在第九种可能的实施方式中,所述装置还包括:
第一生成模块,用于与所述STA进行密钥信令信息交互,根据所述密钥信令信息生成与所述STA共同的密钥;第一接收模块,用于接收所述STA利用所述密钥加密后的RMA;第一解密模块,用于利用所述密钥对所述加密后的 RMA进行解密;或,
第二生成模块,用于生成公钥和私钥;公钥发送模块,用于将所述公钥发送给所述STA;第二接收模块,用于接收所述STA利用所述公钥加密后的RMA;第二解密模块,用于利用所述私钥对所述加密后的RMA进行解密。
结合第三方面、第三方面的第一种可能的实施方式至第三方面的第九种可能的实施方式中的任意一种,在第十种可能的实施方式中,所述装置还包括:
检测模块,用于检测解密得到的所述RMA是否存在于预存的RMA列表中,所述预存的RMA列表存储有允许接入所述基站的STA的RMA;
允许接入模块,用于在所述检测模块的检测结果为解密得到的所述RMA存在于预存的RMA列表中时,允许完成本次接入认证。
第四方面,提供了一种基于临时MAC地址的接入装置,应用于与基站进行无线通信连接的非基站设备STA中,所述装置包括:
消息接收模块,用于在非基站设备STA向所述基站进行无线通信的接入认证过程中,接收所述基站发送的用于指示所述基站是否支持STA使用临时MAC地址TMA的消息;
认证消息发送模块,用于当所述消息接收模块接收到的所述消息用于指示所述基站支持STA使用TMA时,利用TMA向所述基站发送认证消息。
在第四方面的第一种可能的实施方式中,所述消息为发现消息,所述消息接收模块,还用于:
接收所述基站每隔预定时间间隔广播发送的发现消息,所述发现消息包括用于指示所述基站是否支持STA使用TMA的第一指标。
结合第四方面或者第四方面的第一种可能的实施方式,在第二种可能的实施方式中,当所述第一指标用于指示所述基站支持STA使用TMA时,所述发现消息还包括用于指示STA生成TMA的生成规则。
结合第四方面、第四方面的第一种可能的实施方式或者第四方面的第二种可能的实施方式,在第三种可能的实施方式中,所述认证消息发送模块,包括:
第一生成单元,用于当所述询第一指标用于指示所述基站支持STA使用TMA时,利用所述生成规则生成TMA;
认证消息发送单元,用于利用所述TMA向所述基站发送所述认证消息,以便所述基站接收所述认证消息,利用所述认证消息解析出所述TMA;根据所述认证消息向所述STA发送认证回应消息,所述认证回应消息用于指示所述 基站是否允许所述STA使用所述TMA进行通信。
结合第四方面、第四方面的第一种可能的实施方式至第四方面的第三种可能的实施方式中的任意一种,在第四种可能的实施方式中,所述发现消息还包括用于指示是否需要所述STA上传所述STA的真实MAC地址RMA的第二指标。
结合第四方面、第四方面的第一种可能的实施方式至第四方面的第四种可能的实施方式中的任意一种,在第五种可能的实施方式中,所述装置还包括:
询问消息发送模块,用于利用生成的TMA向所述基站发送询问消息,以便所述基站利用所述询问消息解析出所述TMA;在所述基站支持STA使用TMA时,检测所述TMA是否与预存的TMA相冲突,所述预存的TMA包括与所述基站进行无线通信连接的各个STA所使用的TMA;若检测结果为所述TMA不与预存的TMA相冲突,则向所述STA发送用于指示允许所述STA使用所述TMA进行通信的询问回应消息,以便所述STA确认在后续通信中使用所述TMA;若检测结果为所述TMA与预存的TMA相冲突,则向所述STA发送用于指示不允许所述STA使用所述TMA进行通信的询问回应消息;
所述消息为所述询问回应消息,所述消息接收模块,还用于:
接收所述基站发送的所述询问回应消息,所述询问回应消息包括用于指示所述基站是否支持STA使用TMA的第一指标。
结合第四方面、第四方面的第一种可能的实施方式至第四方面的第五种可能的实施方式中的任意一种,在第六种可能的实施方式中,当所述第一指标用于指示所述基站支持STA使用TMA时,所述询问回应消息还包括用于指示STA生成TMA的生成规则。
结合第四方面、第四方面的第一种可能的实施方式至第四方面的第六种可能的实施方式中的任意一种,在第七种可能的实施方式中,所述认证消息发送模块,包括:
第三判断单元,用于当所述询问回应消息中的第一指标用于指示所述基站支持STA使用TMA时,判断所述询问回应消息是否用于指示允许所述STA使用所述询问消息中的TMA进行通信;
地址确认单元,用于当所述第三判断单元的判断结果为所述询问回应消息用于指示允许所述STA使用所述询问消息中的TMA进行通信时,利用所述询问消息中的TMA进行通信;
第二生成单元,用于当所述第三判断单元的判断结果为所述询问回应消息用于指示不允许所述STA使用所述询问消息中的TMA进行通信时,利用所述生成规则生成另一个TMA,利用生成的所述TMA向所述基站发送询问消息或者认证消息。
结合第四方面、第四方面的第一种可能的实施方式至第四方面的第七种可能的实施方式中的任意一种,在第八种可能的实施方式中,所述询问回应消息还包括用于指示是否需要所述STA上传所述STA的RMA的第二指标。
结合第四方面、第四方面的第一种可能的实施方式至第四方面的第八种可能的实施方式中的任意一种,在第九种可能的实施方式中,所述装置还包括:
回应接收模块,用于接收所述基站发送的所述认证回应消息,所述认证回应消息是所述基站在接收到所述STA发送的所述认证消息之后,利用所述认证消息解析出所述TMA,并根据所述认证消息向所述STA发送的认证回应消息,所述认证回应消息用于指示所述基站是否允许所述STA使用所述TMA进行通信;
地址确认模块,用于当所述认证回应消息用于指示允许所述STA使用所述TMA进行通信,确认在后续通信中使用所述TMA;
判断模块,用于当所述认证回应消息用于指示不允许所述STA使用所述TMA进行通信,则判断所述STA在本次接入认证中生成的TMA次数是否达到预定阈值;第三生成模块,用于在所述判断模块的判断结果为所述STA在本次接入认证中生成的TMA次数未达到所述预定阈值时,根据所述生成规则生成另一个TMA,并利用所述TMA向所述基站发送认证消息;接入终止模块,用于在所述判断模块的判断结果为所述STA在本次接入认证中生成的TMA次数达到所述预定阈值时,终止本次接入认证。
结合第四方面、第四方面的第一种可能的实施方式至第四方面的第九种可能的实施方式中的任意一种,在第十种可能的实施方式中,所述装置还包括:
第四生成模块,用于与所述基站进行密钥信令信息交互,根据所述密钥信令信息生成与所述基站共同的密钥;第一加密模块,用于利用所述密钥对所述STA的RMA进行加密;第一发送模块,用于将加密后的所述RMA发送给所述基站,以便所述基站利用所述密钥对所述加密后的RMA进行解密;或,
公钥接收模块,用于接收所述基站发送的公钥,所述公钥是所述基站生成的;第二加密模块,用于利用所述公钥对所述STA的RMA进行加密;第二发 送模块,用于将加密后的所述RMA发送给所述基站,以便所述基站利用生成的私钥对所述RMA进行解密。
第五方面,提供了一种基于临时MAC地址的接入系统,所述系统包括基站和至少一个非基站设备STA;
所述基站包括如第三方面以及第三方面的各种可能的实施方式中任一种所描述的基于临时MAC地址的接入装置;
所述STA包括如第四方面以及第四方面的各种可能的实施方式中任一种所描述的基于临时MAC地址的接入装置。
第六方面,提供了一种基站,所述基站包括:发送机和接收机,
所述发送机,用于在非基站设备STA向所述基站进行无线通信的接入认证过程中,向所述STA发送用于指示所述基站是否支持STA使用临时MAC地址TMA的消息,以便所述STA根据所述消息向所述基站发送认证消息,所述认证消息是所述STA在所述消息用于指示所述基站支持STA使用TMA时,利用TMA向所述基站发送的认证消息;
所述接收机,用于接收所述认证消息,利用所述认证消息解析出所述TMA;
所述发送机,还用于根据所述认证消息向所述STA发送认证回应消息,所述认证回应消息用于指示所述基站是否允许所述STA使用所述TMA进行通信。
在第六方面的第一种可能的实施方式中,所述消息为发现消息,所述发送机还用于:
每隔预定时间间隔广播发送发现消息,所述发现消息包括用于指示所述基站是否支持STA使用TMA的第一指标。
结合第六方面或者第六方面的第一种可能的实施方式,在第二种可能的实施方式中,当所述第一指标用于指示所述基站支持STA使用TMA时,所述发现消息还包括用于指示STA生成TMA的生成规则。
结合第六方面、第六方面的第一种可能的实施方式或者第六方面的第二种可能的实施方式,在第三种可能的实施方式中,所述发现消息还包括用于指示是否需要所述STA上传所述STA的真实MAC地址RMA的第二指标。
结合第六方面、第六方面的第一种可能的实施方式至第六方面的第三种可能的实施方式中的任意一种,在第四种可能的实施方式中,所述接收机,还用 于接收所述STA利用生成的TMA发送的询问消息;
所述消息为询问回应消息,所述发送机,还用于:
向所述STA发送询问回应消息,所述询问回应消息包括用于指示所述基站是否支持STA使用TMA的第一指标。
结合第六方面、第六方面的第一种可能的实施方式至第六方面的第四种可能的实施方式中的任意一种,在第五种可能的实施方式中,所述装置还包括处理器,
所述处理器,用于利用所述询问消息解析出所述TMA;
所述处理器,还用于在所述基站支持STA使用TMA时,判断所述TMA是否与预存的TMA相冲突,所述预存的TMA包括与所述基站进行无线通信连接的各个STA所使用的TMA;
所述发送机,还用于在所述处理器的判断结果为所述TMA不与预存的TMA相冲突,则向所述STA发送用于指示允许所述STA使用所述TMA进行通信的所述询问回应消息,以便所述STA确认在后续通信中使用所述TMA;
所述发送机,还用于在所述处理器的判断结果为所述TMA与预存的TMA相冲突时,向所述STA发送用于指示不允许所述STA使用所述TMA进行通信的所述询问回应消息。
结合第六方面、第六方面的第一种可能的实施方式至第六方面的第五种可能的实施方式中的任意一种,在第六种可能的实施方式中,当所述第一指标用于指示所述基站支持STA使用TMA时,所述询问回应消息还包括用于指示STA生成TMA的生成规则。
结合第六方面、第六方面的第一种可能的实施方式至第六方面的第六种可能的实施方式中的任意一种,在第七种可能的实施方式中,所述询问回应消息还包括用于指示是否需要所述STA上传所述STA的真实MAC地址RMA的第二指标。
结合第六方面、第六方面的第一种可能的实施方式至第六方面的第七种可能的实施方式中的任意一种,在第八种可能的实施方式中,所述处理器,还用于在所述基站支持STA使用TMA时,判断所述TMA是否与预存的TMA相冲突,所述预存的TMA包括与所述基站进行无线通信连接的各个STA所使用的TMA;
所述发送机,还用于在所述处理器的判断结果为所述TMA不与预存的 TMA相冲突时,向所述STA发送用于指示允许所述STA使用所述TMA进行通信的认证回应消息,以便所述STA确认在后续通信中使用所述TMA;
所述发送机,还用于在所述处理器的判断结果为所述TMA与预存的TMA相冲突时,向所述STA发送用于指示不允许所述STA使用所述TMA进行通信的认证回应消息。
结合第六方面、第六方面的第一种可能的实施方式至第六方面的第八种可能的实施方式中的任意一种,在第九种可能的实施方式中,所述处理器,还用于与所述STA进行密钥信令信息交互,根据所述密钥信令信息生成与所述STA共同的密钥;所述接收机,还用于接收所述STA利用所述密钥加密后的RMA;所述处理器,还用于利用所述密钥对所述加密后的RMA进行解密;或,
所述处理器,还用于生成公钥和私钥;所述发送机,还用于将所述公钥发送给所述STA;所述接收机,还用于接收所述STA利用所述公钥加密后的RMA;所述处理器,还用于利用所述私钥对所述加密后的RMA进行解密。
结合第六方面、第六方面的第一种可能的实施方式至第六方面的第九种可能的实施方式中的任意一种,在第十种可能的实施方式中,所述处理器,还用于检测解密得到的所述RMA是否存在于预存的RMA列表中,所述预存的RMA列表存储有允许接入所述基站的STA的RMA;
所述处理器,还用于在检测结果为解密得到的所述RMA存在于预存的RMA列表中时,允许完成本次接入认证。
第七方面,提供了一种非基站设备STA,所述STA包括:接收机和发送机,
所述接收机,用于在非基站设备STA向所述基站进行无线通信的接入认证过程中,接收所述基站发送的用于指示所述基站是否支持STA使用临时MAC地址TMA的消息;
所述发送机,还用于当所述接收机接收到的所述消息用于指示所述基站支持STA使用TMA时,利用TMA向所述基站发送认证消息。
在第七方面的第一种可能的实施方式中,所述消息为发现消息,所述接收机还用于:
接收所述基站每隔预定时间间隔广播发送的发现消息,所述发现消息包括用于指示所述基站是否支持STA使用TMA的第一指标。
结合第七方面或者第七方面的第一种可能的实施方式,在第二种可能的实 施方式中,当所述第一指标用于指示所述基站支持STA使用TMA时,所述发现消息还包括用于指示STA生成TMA的生成规则。
结合第七方面、第七方面的第一种可能的实施方式或者第七方面的第二种可能的实施方式,在第三种可能的实施方式中,所述STA还包括处理器,
所述处理器,用于当所述第一指标用于指示所述基站支持STA使用TMA时,利用所述生成规则生成TMA;
所述发送机,用于利用所述TMA向所述基站发送所述认证消息,以便所述基站接收所述认证消息,利用所述认证消息解析出所述TMA;根据所述认证消息向所述STA发送认证回应消息,所述认证回应消息用于指示所述基站是否允许所述STA使用所述TMA进行通信。
结合第七方面、第七方面的第一种可能的实施方式至第七方面的第三种可能的实施方式中的任意一种,在第四种可能的实施方式中,所述发现消息还包括用于指示是否需要所述STA上传所述STA的真实MAC地址RMA的第二指标。
结合第七方面、第七方面的第一种可能的实施方式至第七方面的第四种可能的实施方式中的任意一种,在第五种可能的实施方式中,所述发送机,还用于利用生成的TMA向所述基站发送询问消息,以便所述基站利用所述询问消息解析出所述TMA;在所述基站支持STA使用TMA时,检测所述TMA是否与预存的TMA相冲突,所述预存的TMA包括与所述基站进行无线通信连接的各个STA所使用的TMA;若检测结果为所述TMA不与预存的TMA相冲突,则向所述STA发送用于指示允许所述STA使用所述TMA进行通信的询问回应消息,以便所述STA确认在后续通信中使用所述TMA;若检测结果为所述TMA与预存的TMA相冲突,则向所述STA发送用于指示不允许所述STA使用所述TMA进行通信的询问回应消息;
所述消息为所述询问回应消息,所述接收机还用于:
接收所述基站发送的所述询问回应消息,所述询问回应消息包括用于指示所述基站是否支持STA使用TMA的第一指标。
结合第七方面、第七方面的第一种可能的实施方式至第七方面的第五种可能的实施方式中的任意一种,在第六种可能的实施方式中,当所述第一指标用于指示所述基站支持STA使用TMA时,所述询问回应消息还包括用于指示STA生成TMA的生成规则。
结合第七方面、第七方面的第一种可能的实施方式至第七方面的第六种可能的实施方式中的任意一种,在第七种可能的实施方式中,所述处理器,还用于当所述询问回应消息中的第一指标用于指示所述基站支持STA使用TMA时,判断所述询问回应消息是否用于指示允许所述STA使用所述询问消息中的TMA进行通信;
所述处理器,还用于当判断结果为所述询问回应消息用于指示允许所述STA使用所述询问消息中的TMA进行通信,则确认在后续通信中使用所述TMA,所述发送机还用于利用所述TMA向所述基站发送认证消息;
所述处理器,还用于当判断结果为所述询问回应消息用于指示不允许所述STA使用所述询问消息中的TMA进行通信,则利用所述生成规则生成另一个TMA,所述发送机还用于利用生成的所述TMA向所述基站发送认证消息。
结合第七方面、第七方面的第一种可能的实施方式至第七方面的第七种可能的实施方式中的任意一种,在第八种可能的实施方式中,所述询问回应消息还包括用于指示是否需要所述STA上传所述STA的RMA的第二指标。
结合第七方面、第七方面的第一种可能的实施方式至第七方面的第八种可能的实施方式中的任意一种,在第九种可能的实施方式中,所述接收机,还用于接收所述基站发送的认证回应消息,所述认证回应消息是所述基站在接收到所述STA发送的所述认证消息之后,利用所述认证消息解析出所述TMA,并根据所述认证消息向所述STA发送的认证回应消息,所述认证回应消息用于指示所述基站是否允许所述STA使用所述TMA进行通信;
所述处理器,还用于当所述认证回应消息用于指示允许所述STA使用所述TMA进行通信,确认在后续通信中使用所述TMA;
所述处理器,还用于当所述认证回应消息用于指示不允许所述STA使用所述TMA进行通信,则判断所述STA在本次接入认证中生成的TMA次数是否达到预定阈值;所述处理器,还用于当判断结果为所述STA在本次接入认证中生成的TMA次数未达到所述预定阈值时,根据所述生成规则生成另一个TMA,触发所述发送机利用所述TMA向所述基站发送认证消息;所述处理器,还用于当判断结果为所述STA在本次接入认证中生成的TMA次数达到所述预定阈值,则终止本次接入认证。
结合第七方面、第七方面的第一种可能的实施方式至第七方面的第九种可能的实施方式中的任意一种,在第十种可能的实施方式中,所述处理器,还用 于与所述基站进行密钥信令信息交互,根据所述密钥信令信息生成与所述基站共同的密钥;所述处理器,还用于利用所述密钥对所述STA的RMA进行加密;所述发送机,还用于将加密后的所述RMA发送给所述基站,以便所述基站利用所述密钥对所述加密后的RMA进行解密;或,
所述接收机,还用于接收所述基站发送的公钥,所述公钥是所述基站生成的;所述处理器,还用于利用所述公钥对所述STA的RMA进行加密;所述发送机,还用于将加密后的所述RMA发送给所述基站,以便所述基站利用生成的私钥对所述RMA进行解密。
第八方面,提供了一种基于临时MAC地址的接入系统,所述系统包括基站和至少一个非基站设备STA;
所述基站为第六方面以及第六方面的各种可能的实施方式中任一种所描述的基站;
所述STA为第七方面以及第七方面的各种可能的实施方式中任一种所描述的STA。
本发明实施例提供的技术方案带来的有益效果是:
通过在非基站设备STA向基站进行无线通信的接入认证过程中,基站向STA发送用于指示基站是否支持STA使用临时MAC地址TMA的消息;解决了当基站不支持STA使用TMA时,会导致STA不断地利用生成的TMA向基站进行接入认证,容易导致STA无法进行正常通信的问题;由于基站可以告知STA其是否支持STA使用TMA,因此达到了可以避免STA在基站不支持STA使用TMA时被拒绝接入的情况,进而可以保证STA利用RMA进行接入认证,实现无线通信的效果。
附图说明
为了更清楚地说明本发明实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是本发明部分实施例中提供的基于临时MAC地址的接入方法所涉及的实施环境的示意图;
图2是本发明一个实施例中提供的基于临时MAC地址的接入方法的方法 流程图;
图3A是本发明另一个实施例中提供的基于临时MAC地址的接入方法的方法流程图;
图3B是本发明部分实施例中提供的信标信令的结构示意图;
图3C是本发明部分实施例提供的MAC地址的结构示意图;
图3D是本发明部分实施例中提供的认证回应信令的结构示意图;
图3E是本发明的一个实施例中提供的对RMA进行加密上传的方法流程图;
图3F是本发明的另一个实施例中提供的对RMA进行加密上传的方法流程图;
图3G是本发明一个实施例中提供的基站和STA的结构示意图;
图4是本发明再一个实施例中提供的基于临时MAC地址的接入方法的方法流程图;
图5是本发明一个实施例中提供的基于临时MAC地址的接入系统的结构示意图;
图6是本发明另一个实施例中提供的基于临时MAC地址的接入系统的结构示意图;
图7是本发明再一个实施例中提供的基于临时MAC地址的接入系统的结构示意图;
图8是本发明一个实施例中提供的基站的结构示意图;
图9是本发明另一个实施例中提供的基站的结构示意图;
图10是本发明本发明一个实施例中提供的STA的结构示意图;
图11是本发明本发明另一个实施例中提供的STA的结构示意图;
图12是本发明还一个实施例中提供的基于临时MAC地址的接入系统的结构示意图。
具体实施方式
为使本发明的目的、技术方案和优点更加清楚,下面将结合附图对本发明实施方式作进一步地详细描述。
请参见图1所示,其示出了本发明部分实施例中提供的基于临时MAC地 址的接入方法所涉及的实施环境的示意图,该实施环境包括基站AP 120和至少一个非基站设备STA 140。
非基站设备STA 140必须首先与基站AP 120建立连接,才能与网络中的其它节点及互联网上的其它节点进行通信。在无线局域网中,当一个非基站设备设备STA 140要连接到一个基站AP 120时,该非基站设备STA 140必须确定该基站AP 120是否在通信范围内。
请参见图2所示,其示出了本发明一个实施例中提供的基于临时MAC地址的接入方法的方法流程图,该基于临时MAC地址的接入方法可应用于图1所示实施环境中。该基于临时MAC地址的接入方法可以包括:
201,在非基站设备STA向基站进行无线通信的接入认证过程中,基站向STA发送用于指示基站是否支持STA使用临时MAC地址TMA的消息;
202,STA接收基站发送的用于指示基站是否支持STA使用临时MAC地址TMA的消息;
203,当消息用于指示基站支持STA使用TMA时,STA利用TMA向基站发送认证消息;
204,基站接收认证消息,利用认证消息解析出TMA;
205,基站根据认证消息向STA发送认证回应消息,认证回应消息用于指示基站是否允许STA使用TMA进行通信。
其中,步骤201、步骤204和步骤205可以单独实施成为以基站为执行主体的基于临时MAC地址的接入方法,步骤202和步骤203可以单独实施成为以STA为执行主体的基于临时MAC地址的接入方法。
综上所述,本发明实施例提供的基于临时MAC地址的接入方法,通过在非基站设备STA向基站进行无线通信的接入认证过程中,基站向STA发送用于指示基站是否支持STA使用临时MAC地址TMA的消息;解决了当基站不支持STA使用TMA时,会导致STA不断地利用生成的TMA向基站进行接入认证,容易导致STA无法进行正常通信的问题;由于基站可以告知STA其是否支持STA使用TMA,因此达到了可以避免STA在基站不支持STA使用TMA时被拒绝接入的情况,进而可以保证STA利用RMA进行接入认证,实现无线通信的效果。
在无线局域网中,当一个STA要连接到一个基站时,该STA必须确定基站是否在通信范围内。目前有两种方式可以确定一个基站是否在STA通信范围内,其中一种方式是被动发现方式,也即:STA在一个信道上监听基站所发送的发现消息(比如信标信令,beacon message);当在某个信道上发现了目标基站时,STA就可以发送认证消息(Authentication Request),接入该基站。在这种被动发现方式中,在STA向基站进行无线通信的接入认证时,基站以及STA所需要执行的操作如图3A所示。
请参见图3A所示,其示出了本发明另一个实施例中提供的基于临时MAC地址的接入方法的方法流程图,该基于临时MAC地址的接入方法可应用于图1所示实施环境中。该基于临时MAC地址的接入方法可以包括:
301,基站每隔预定时间间隔广播发送发现消息,发现消息包括用于指示基站是否支持STA使用TMA的第一指标;
STA在确定AP是否在STA通信范围内时,如果采用的是被动发现方式,则基站会广播发送发现消息,这样在基站的通信范围内的STA则可以接收到该发现消息。
此时,基站可以表明是否允许STA使用TMA,也即该发现消息可以包括用于指示基站是否支持STA使用TMA的第一指标。
在一种可能的实现方式中,当第一指标在用于指示基站支持STA使用TMA时,第一指标可以取值为1和0中的一种,当第一指标在用于指示基站不支持STA使用TMA时,第一指标可以取值为1和0中的另一种。
在实际应用中,有一个专门的信令用于表示发现消息,该专门的信令即为基站广播发送的信标信令(beacon message)。基站可以使用信标信令中的能力(Capability)及能力扩展(Extended Capability)域来实现向STA表明是否可以在通信中使用临时MAC地址及是否要求STA上传真实的MAC地址。请参见图3B所示,其示出了本发明部分实施例中提供的信标信令的结构示意图,该信标信令可以在能力域表明是否支持STA使用TMA,在能力扩展域表明是否要求STA在连接建立后提供真实的AMC地址。
在一种可能的实现方式中,为了便于STA的接入,基站可以每隔预定时间间隔广播发送消息,该预定时间间隔可以根据实际情况设定,本实施例对此不作限定。
通常来讲,当第一指标用于指示基站支持STA使用TMA时,该发现消息 还可以包括用于指示STA生成TMA的生成规则。这里所讲的生成规则可以包括生成TMA的生成算法以及可生成的TMA的范围等。例如,AP可以规定STA可以在0x400000000000–0x400000ffffff范围内随机产生一个地址作为TMA。
通常,MAC地址是一个48比特的数字,请参见图3C所示,其示出了本发明部分实施例提供的MAC地址的结构示意图,MAC地址中最高的两位,即第48位和第47为是有特殊意义的标识位。其中第48位是单播/多播标识位,该标识位设置为0时,表明这个地址是一个单播地址,标识位设置为1时,表明一个地址是多播地址。第47位是地址类型标识位,当地址类型标识设置为0时,表明一个地址是全局地址,即该地址是全球唯一的。当地址类型标识设置为1时,表明一个地址是局部地址,该地址可能只是在某个局部时唯一的,在全球并不唯一。MAC地址的剩余46位是地址标识。MAC地址是由IEEE管理并以地址块的方式出售给设备商。设备商在生产设备时分配全局地址给每一个设备。这里在生成TMA时,该TMA的第47位的地址类型标识位通常设置为1。
302,STA接收基站每隔预定时间间隔广播发送的该发现消息;
当基站广播发现消息时,如果STA在与基站的通信范围内,则可以接收到基站广播发送的该发现消息。
303,STA在第一指标用于指示基站支持STA使用TMA时,利用生成规则生成TMA;
当发现消息中的第一指标为用于指示基站支持STA使用TMA时,此时发现消息中通常还会携带有生成TMA的生成规则,STA则可以根据该TMA的生成规则生成TMA。也即STA根据生成TMA的生成算法生成一个位于可生成的TMA的范围中的TMA。
304,STA利用生成的TMA向基站发送认证消息;
也就是说,认证消息的目标MAC地址是基站的MAC地址,认证消息的源MAC地址即为TMA。
在无线通信协议中,该认证消息可以为一种认证信令(Authentication Request)。
305,基站接收STA利用生成的TMA发送的认证消息;
306,基站利用认证消息解析出TMA;
基站可以解析出认证消息中的源MAC地址,即STA生成的TMA。
307,基站在基站支持STA使用TMA时,判断TMA是否与预存的TMA相冲突,预存的TMA包括与基站进行无线通信连接的各个STA所使用的TMA;
为了保证TMA生成的MAC符合规定,基站需要对TMA进行判断,即判断TMA是否与预存的TMA相冲突,这里预存的TMA是在该基站的通信范围内的STA所使用的TMA,为了避免与这些STA的TMA相冲突,因此需要与这些STA的TMA进行对比。
308,若判断结果为TMA不与预存的TMA相冲突,基站则向STA发送用于指示允许STA使用该TMA进行通信的答复消息;
当基站检测到STA的TMA不与其他STA使用的TMA相冲突时,则可以向STA下发一个用于指示允许STA使用TMA进行通信的答复消息。
常见的,在无线通信协议中,该答复消息可以为一种认证回应消息(Authentication Response),也可以是其它消息。
309,若判断结果为TMA与预存的TAM相冲突,基站则向STA发送用于指示不允许STA使用该TMA进行通信的答复消息;
当基站判断到STA的TMA不与其他STA使用的TMA相冲突时,则可以向STA下发一个用于指示不允许STA使用TMA进行通信的答复消息,答复消息可以是认证回应消息,也可以是其它专门的消息。
通常来讲,可以在认证回应消息中添加一个域,该域中的取值用于指示是否允许STA使用TMA进行通信。比如,当认证回应信令可以作为一个认证回应消息时,可以在认证回应信令中添加一个状态码(Status Code)通知发起认证的STA该TMA不可以使用。请参见图3D所示,其示出了本发明部分实施例中提供的认证回应信令的结构示意图,当状态码等于某个特定的值(比如0或1中的一种)时,表明STA产生的TMA是不合规的,否则,当状态码为另一个特定的值(比如0或1中的另一种)时,表明STA产生的TMA是合规的。
310,STA接收基站发送的答复消息;
311,当答复消息用于指示允许STA使用TMA进行通信时,STA则确认在后续通信中使用该TMA;
STA根据答复消息(比如说认证回应消息)中用于指示是否允许STA使用TMA的域的值,确定是否允许STA使用TMA进行通信,当答复消息(比如说,认证回应消息)指示允许STA使用TMA进行通信时时,STA则可以继 续利用该TMA进行通信。
312,当答复消息用于指示不允许STA使用TMA进行通信时,STA则判断STA在本次接入认证中生成的TMA次数是否达到预定阈值;
当答复消息,比如为认证回应消息,用于指示不允许STA使用TMA进行通信时时,表明该STA的TMA与预存的TMA相冲突,因此如果想要继续接入基站,STA需要重新生成新的TMA以进行接入认证,而为了避免STA生成的TMA一直与预存的TMA相冲突,因此需要在生成新的TMA之前,检测已经生成TMA的次数,当次数超过预定阈值时,则停止该STA继续接入该AP。
313,若判断结果为STA在本次接入认证中生成的TMA次数未达到预定阈值,STA则根据生成规则生成另一个TMA;
并继续执行利用生成的临时MAC地址TMA向基站发送认证消息的步骤。
当STA在本次接入认证中生成的TMA次数未达到预定阈值,STA则根据生成规则生成另一个TMA,并继续执行步骤304,直到完成本次接入认证,或终止本次接入认证。
314,若判断结果为STA在本次接入认证中生成的TMA次数达到预定阈值,STA则终止本次接入认证。
当判断结果为STA在本次接入认证中生成的TMA次数达到预定阈值时,则表明多次接入均失败,此时在不再利用TMA接入该基站。
在实际应用中,根据基站或系统配置,该发现消息还可以包括用于指示是否需要STA上传STA的RMA的第二指标,也即基站要求STA上传RMA。很显然,基站在需要STA上传RMA时,除了可以通过在发现消息中携带第二指标,还可以通过向STA单独发送一个用于指示需要STA上传RMA的消息。为了避免RMA的泄露,可以在STA向基站上传RMA前对RMA进行加密。在一种可能的实现方式中,该基于临时MAC地址的接入方法在对RMA进行加密时,可以包括如下两种方式:
第一种方式,请参见图3E所示,其示出了本发明的一个实施例中提供的对RMA进行加密上传的方法流程图,该对RMA进行加密上传的方法包括:
3b1,基站与STA进行密钥信令信息交互;
3b2,基站根据密钥信令信息生成与STA共同的密钥;
3b3,STA根据密钥信令信息生成与基站共同的密钥;
3b4,STA利用密钥对STA的RMA进行加密;
3b5,STA将加密后的RMA发送给基站;
3b6,基站利用密钥对加密后的RMA进行解密。
第二种方式,请参见图3F所示,其示出了本发明的另一个实施例中提供的对RMA进行加密上传的方法流程图,该对RMA进行加密上传的方法包括:
3c1,基站生成公钥和私钥;
3c2,基站将公钥发送给STA;
3c3,STA接收基站发送的公钥;
3c4,STA利用公钥对STA的RMA进行加密;
3c5,STA将加密后的RMA发送给基站;
3c6,基站接收STA利用公钥加密后的RMA;
3c7,基站利用私钥对加密后的RMA进行解密。
在一种可能的实现方式中,根据系统或基站的配置,基站在允许STA使用不冲突的TMA时,还可以先验证该STA发送的RMA是否合格,也即在向STA发送用于指示允许STA使用TMA进行通信的答复消息之前,还可以包括:
第一,检测解密得到的RMA是否存在于预存的RMA列表中,预存的RMA列表存储有允许接入基站的STA的RMA;
第二,若检测结果为解密得到的RMA存在于预存的RMA列表中,则执行向STA发送用于指示允许STA使用TMA进行通信的答复消息的步骤。
很显然,根据基站或系统配置,基站在解密得到STA的RMA之后,可以直接将该RMA进行存储,而不需要将RMA是否存在于预存的RMA列表中作为发送发现消息的依据。
在另一种可能的实现方式中,如果STA成功完成向基站的接入认证,则在后续通信的过程中,为了保证数据传输的安全性,还可以利用该STA的RMA生成密钥,并根据该密钥对需要传输的数据进行加密。
在再一种可能的实现方式中,为了实现本发明所提出的基于临时MAC地址的接入方法,基站以及STA均可以设置有特定的单元,请参见图3G所示,其示出了本发明一个实施例中提供的基站和STA的结构示意图,其中基站g1可以包括TMA验证单元g1a和RMA解析验证单元g1b,STA g2可以包括TMA生成单元g2a、RMA上传决策单元g2b和RMA上传单元g2c,其中的TMA验证单元g1a则可以执行上述步骤307,RMA解析验证单元g1b则可以执行解 密得到的RMA是否存在于预存的RMA列表中的步骤;TMA生成单元g2a可以执行上述步骤303和步骤313,RMA上传决策单元g2b可以用于执行决策是否使用加密方式长传RMA,RMA上传单元g2c则可以将RMA长传给基站g1。
需要补充说明的是,当基站不支持STA使用TMA时,发现消息中所携带的第一指标用于指示不支持STA使用TMA,此时发现消息中可以不携带生成TMA的生成规则,这样STA在得知第一指标之后则不会生成TMA,此时,如果STA判断还需要继续接入基站,则可以使用RMA接入基站,由于RMA容易被泄露,因此STA可以生成一个提醒信息,以用于提醒用户接入该基站要提供RMA,进而对隐私构成威胁。如果用户同意提供RMA,则STA可利用该RMA继续接入该基站,否则,STA不向基站发起网络接入请求。
此外,当基站在发现消息中表明要WLAN设备STA提供RMA时,STA也可根据STA提供的系统配置决定是否要接入该基站并提供RMA。
还需要补充说明的是,上述步骤301、步骤305至步骤309可以单独实施成为以基站为执行主体的基于临时MAC地址的接入方法,上述步骤302至步骤304以及步骤310至步骤314可以单独实施成为以STA为执行主体的基于临时MAC地址的接入方法。
综上所述,本发明实施例提供的基于临时MAC地址的接入方法,通过在非基站设备STA向基站进行无线通信的接入认证过程中,基站向STA发送用于指示基站是否支持STA使用临时MAC地址TMA的消息;解决了当基站不支持STA使用TMA时,会导致STA不断地利用生成的TMA向基站进行接入认证,容易导致STA无法进行正常通信的问题;由于基站可以告知STA其是否支持STA使用TMA,因此达到了可以避免STA在基站不支持STA使用TMA时被拒绝接入的情况,进而可以保证STA利用RMA进行接入认证,实现无线通信的效果。
在无线局域网中,当一个STA要连接到一个基站时,该STA必须确定基站是否在通信范围内。目前有两种方式可以确定一个基站是否在STA通信范围内,其中的另一种方式是主动方式,也即:STA在一个信道上主动发送询问消息(Probe Request),如果目标基站收到了询问信令,则该基站会回应一个询问回应消息(Probe Response),询问回应消息的内容与发现消息类似,当一个STA收到询问回应消息后,可根据询问回应消息的内容来决定是否接入发现的基 站。在这种主动发现方式中,在STA向基站进行无线通信的接入认证时,基站以及STA所需要执行的操作如图4所示。
请参见图4所示,其示出了本发明再一个实施例中提供的基于临时MAC地址的接入方法的方法流程图,该基于临时MAC地址的接入方法可应用于图1所示实施环境中。STA在向基站进行无线通信的接入认证时,该基于临时MAC地址的接入方法可以包括:
401,STA利用生成的TMA向基站发送询问消息;
这里的TMA通常是STA已有的TMA或者随机生成的TMA,STA主动利用该TMA向基站发送询问消息,也即将TMA作为询问消息的源MAC地址。
在实际应用中,在无线通信协议中,该询问消息可以为一个专门的信令,即询问信令(Probe Request)。
402,基站接收STA利用生成的TMA发送的询问消息;
403,基站利用询问消息解析出TMA;
基站可以解析该询问消息中的源MAC地址,即STA的TMA。
如果基站允许STA使用TMA进行通信,则可以执行步骤404,否则直接向STA发送询问回复消息,该询问回复消息中携带有用于指示不支持STA使用TMA的第一指标。
404,基站在基站支持STA使用TMA时,判断解析出的该TMA是否与预存的TMA相冲突,预存的TMA包括与基站进行无线通信连接的各个STA所使用的TMA;
405,若判断结果为TMA不与预存的TMA相冲突,基站则向STA发送用于指示允许STA使用该TMA进行通信的答复消息,该答复消息中还包括用于指示基站是否支持STA使用TMA的第一指标;
这里所讲的答复消息可以为询问回应消息,也可以为其它消息。
由于是STA主动向基站发送询问消息,因此基站需要告知STA是否允许STA使用TMA,且在允许STA使用TMA时,如果检测询问消息中的TMA不与预存的TMA相冲突,表明STA可以直接使用该TMA,此时基站可以直接则向STA发送用于指示允许STA使用TMA进行通信的答复消息。
在实际应用中,针对于询问信令,有一个专门的信令用于表示询问回应消息,该专门的信令即为测试答复信令(Probe Response)。
406,若判断结果为TMA与预存的TMA相冲突,基站则向STA发送用于 指示不允许STA使用该TMA进行通信的答复消息,该答复消息中还包括用于指示基站是否支持STA使用TMA的第一指标、用于指示STA生成TMA的生成规则;
同样,这里所讲的答复消息可以为询问回应消息,也可以为其它消息。
由于步骤404是在基站支持STA使用TMA时进行的判断,因此步骤405中答复消息中携带的第一指标用于指示基站支持STA使用TMA。也即,如果基站支持STA使用TMA且检测到询问消息中的TMA不与预存的TMA相冲突,基站则直接向STA发送用于指示允许STA使用该TMA进行通信的答复消息,该答复消息中携带的第一指标用于指示基站支持STA使用TMA;如果基站允许STA使用TMA且检测到询问消息中的TMA与预存的TMA相冲突,基站则向STA发送用于指示不允许STA使用该TMA进行通信的答复消息,同时,该答复消息中还同时携带有用于指示基站是否支持STA使用TMA的第一指标(此时第一指标用于指示基站支持STA使用该TMA)、用于指示STA生成TMA的生成规则等。
407,STA接收基站发送的答复消息;
该答复消息可以为基站反馈的询问回应消息,也可以为基站发送的其它消息。
很显然,该答复消息中携带有用于指示基站是否支持STA使用TMA的第一指标,当所述第一指标用于指示所述基站支持STA使用TMA时,该答复消息中还包括用于指示STA生成TMA的生成规则。
408,当答复消息中的第一指标用于指示基站支持STA使用TMA时,检测答复消息是否用于指示允许STA使用询问消息中的TMA进行通信;
409,当答复消息用于指示允许STA使用询问消息中的TMA进行通信时,STA则确认在后续通信中使用该TMA,利用该TMA向基站发送认证消息;
410,当答复消息用于指示不允许STA使用TMA进行通信时,则在第一指标用于指示基站支持STA使用TMA时,根据生成规则生成另一个TMA,利用生成的TMA向基站发送认证消息。
当答复消息用于指示不允许STA使用TMA进行通信时,表明该STA的TMA与预存的TMA相冲突,因此需要STA重新生成新的TMA,而为了避免STA生成的TMA一直与预存的TMA相冲突,因此需要在生成新的TMA之前,检测已经生成TMA的次数,当次数超过预定阈值时,则停止该STA继续接入 该基站。
在一种可能的实现方式中,当答复消息用于指示不允许STA使用TMA进行通信时,STA还可以首先判断STA在本次接入认证中生成的TMA次数是否达到预定阈值;若判断结果为STA在本次接入认证中生成的TMA次数未达到预定阈值,STA则根据生成规则生成另一个TMA,并利用生成的TMA向基站发送认证消息;当STA在本次接入认证中生成的TMA次数未达到预定阈值,STA则根据生成规则生成另一个TMA,并继续发送认证消息,直到完成本次接入认证,或终止接入认证。
需要指出的是,这里所讲的认证消息与图3A中所描述的步骤304中的认证消息相同,且在步骤409或步骤410之后,基站在接收到STA发送的认证消息时,可以继续执行图3A中所描述的步骤305。
在实际应用中,根据基站或系统配置,该答复消息还可以包括用于指示是否需要STA上传STA的RMA的第二指标,也即基站要求STA上传RMA。为了避免RMA的泄露,可以在STA向基站上传RMA前对RMA进行加密。在一种可能的实现方式中,该基于临时MAC地址的接入方法在对RMA进行加密时,可以包括两种方式,可以分别参见图3E和图3F的描述,这里就不再赘述。
在一种可能的实现方式中,根据系统或基站的配置,基站在允许STA使用不冲突的TMA时,还可以先验证该STA发送的RMA是否合格,也即在向STA发送用于指示允许STA使用TMA进行通信的答复消息之前,还可以包括:
第一,检测解密得到的RMA是否存在于预存的RMA列表中,预存的RMA列表存储有允许接入基站的STA的RMA;
第二,若检测结果为解密得到的RMA存在于预存的RMA列表中,则执行向STA发送用于指示允许STA使用TMA进行通信的答复消息的步骤。
很显然,基站在解密得到STA的RMA之后,可以直接将该RMA进行存储,而不需要将RMA是否符合存在于预存的RMA列表中作为发送答复消息的依据。
在另一种可能的实现方式中,如果STA成功完成向基站的接入认证,则在后续通信的过程中,为了保证数据传输的安全性,还可以利用该STA的RMA生成密钥,并根据该密钥对需要传输的数据进行加密。
需要补充说明的是,当基站不支持STA使用TMA时,在答复消息中携带 的第一指标用于指示不支持STA使用TMA,此时答复消息中可以不携带生成TMA的生成规则,这样STA在得知第一指标之后则不会生成TMA,此时,STA则判断还需要继续接入基站,则可以使用RMA接入基站,由于RMA容易被泄露,因此STA可以生成一个提醒信息,以用于提醒用户接入该基站要提供RMA,进而对隐私构成威胁。如果用户同意提供RMA,则STA可利用该RMA继续接入该基站。否则,STA不向基站发起网络接入请求。
此外,当基站在答复消息中表明要WLAN设备STA提供RMA时,STA也可根据STA提供的系统配置决定是否要接入该基站并提供RMA。
综上所述,本发明实施例提供的基于临时MAC地址的接入方法,通过在非基站设备STA向基站进行无线通信的接入认证过程中,基站向STA发送用于指示基站是否支持STA使用临时MAC地址TMA的消息;解决了当基站不支持STA使用TMA时,会导致STA不断地利用生成的TMA向基站进行接入认证,容易导致STA无法进行正常通信的问题;由于基站可以告知STA其是否支持STA使用TMA,因此达到了可以避免STA在基站不支持STA使用TMA时被拒绝接入的情况,进而可以保证STA利用RMA进行接入认证,实现无线通信的效果。
请参见图5所示,其示出了本发明一个实施例中提供的基于临时MAC地址的接入系统的结构示意图,该系统可应用于图1所示实施环境中。该系统可以包括基站52和至少一个非基站设备STA 54,其中基站52包含有基于临时MAC地址的接入装置520,STA 54包含有基于临时MAC地址的接入装置540。
位于基站52中的基于临时MAC地址的接入装置520,可以包括:消息发送模块522、认证消息接收模块524和回应发送模块526。
该消息发送模块522,可以用于在非基站设备STA向基站进行无线通信的接入认证过程中,向STA发送用于指示基站是否支持STA使用临时MAC地址TMA的消息,以便STA根据消息向基站发送认证消息,认证消息是STA在消息用于指示基站支持STA使用TMA时,利用TMA向基站发送的认证消息;
认证消息接收模块524,用于接收认证消息,利用认证消息解析出TMA;
回应发送模块526,用于根据认证消息接收模块524接收到的认证消息向STA发送认证回应消息,认证回应消息用于指示基站是否允许STA使用TMA 进行通信。
位于STA54中的基于临时MAC地址的接入装置540,可以包括:消息接收模块542和认证消息发送模块544。
消息接收模块542,用于在非基站设备STA向基站进行无线通信的接入认证过程中,接收基站发送的用于指示基站是否支持STA使用临时MAC地址TMA的消息;
认证消息发送模块544,用于当所示消息接收模块542接收到的消息用于指示基站支持STA使用TMA时,利用TMA向基站发送认证消息。
在实际应用中,具有上述装置520的基站52可以单独实施基于临时MAC地址的接入方法,具有上述装置540的非基站设备54也可以单独实施基于临时MAC地址的接入方法。
综上所述,本发明实施例提供的基于临时MAC地址的接入系统,通过在非基站设备STA向基站进行无线通信的接入认证过程中,基站向STA发送用于指示基站是否支持STA使用临时MAC地址TMA的消息;解决了当基站不支持STA使用TMA时,会导致STA不断地利用生成的TMA向基站进行接入认证,容易导致STA无法进行正常通信的问题;由于基站可以告知STA其是否支持STA使用TMA,因此达到了可以避免STA在基站不支持STA使用TMA时被拒绝接入的情况,进而可以保证STA利用RMA进行接入认证,实现无线通信的效果。
请参见图6所示,其示出了本发明另一个实施例中提供的基于临时MAC地址的接入系统的结构示意图,该系统可应用于图1所示实施环境中。该系统可以包括基站62和至少一个非基站设备STA 64,其中基站62包含有基于临时MAC地址的接入装置620,STA 64包含有基于临时MAC地址的接入装置640。
对于基站62来讲,在图6所示实施例中的第一种可能的实现方式中,位于基站62中的基于临时MAC地址的接入装置620,可以包括:消息发送模块622、认证消息接收模块624和回应发送模块626。
该消息发送模块622,可以用于在非基站设备STA向基站进行无线通信的接入认证过程中,向STA发送用于指示基站是否支持STA使用临时MAC地址TMA的消息,以便STA根据消息向基站发送认证消息,认证消息是STA在消息用于指示基站支持STA使用TMA时,利用TMA向基站发送的认证消 息;
认证消息接收模块624,可以用于接收认证消息,利用认证消息解析出TMA;
回应发送模块626,可以用于根据认证消息接收模块624接收到的认证消息向STA发送认证回应消息,认证回应消息用于指示基站是否允许STA使用TMA进行通信。
在图6所示实施例中的第二种可能的实现方式中,消息为发现消息,消息发送模块622,还可以用于:
每隔预定时间间隔广播发送发现消息,发现消息包括用于指示基站是否支持STA使用TMA的第一指标。
在图6所示实施例中的第三种可能的实现方式中,当第一指标用于指示基站支持STA使用TMA时,发现消息还包括用于指示STA生成TMA的生成规则。
在图6所示实施例中的第四种可能的实现方式中,发现消息还包括用于指示是否需要STA上传STA的真实MAC地址RMA的第二指标。
在图6所示实施例中的第五种可能的实现方式中,回应发送模块626可以包括:第二判断单元626a、第三回应发送单元626b和第四回应发送单元626c。
第二判断单元626a,可以用于在基站支持STA使用TMA时,判断TMA是否与预存的TMA相冲突,预存的TMA包括与基站进行无线通信连接的各个STA所使用的TMA;
第三回应发送单元626b,可以用于在第二判断单元626a的判断结果为TMA不与预存的TMA相冲突时,向STA发送用于指示允许STA使用TMA进行通信的认证回应消息,以便STA确认在后续通信中使用该TMA;
第四回应发送单元626c,可以用于在第二判断单元626a的判断结果为TMA与预存的TMA相冲突时,向STA发送用于指示不允许STA使用TMA进行通信的认证回应消息。
在图6所示实施例中的第六种可能的实现方式中,基于临时MAC地址的接入装置620还包括:第一生成模块628、第一接收模块6210、第一解密模块6212,或,第二生成模块6214、公钥发送模块6216、第二接收模块6218、第二解密模块6220。
第一生成模块628,可以用于与STA进行密钥信令信息交互,根据密钥信 令信息生成与STA共同的密钥;第一接收模块6210,可以用于接收STA利用密钥加密后的RMA;第一解密模块6212,可以用于利用密钥对加密后的RMA进行解密;或,
第二生成模块6214,可以用于生成公钥和私钥;公钥发送模块6216,可以用于将公钥发送给STA;第二接收模块6218,可以用于接收STA利用公钥加密后的RMA;第二解密模块6220,可以用于利用私钥对加密后的RMA进行解密。
在图6所示实施例中的第七种可能的实现方式中,基于临时MAC地址的接入装置620还可以包括:检测模块6222和允许接入模块6224。
检测模块6222,可以用于检测解密得到的RMA是否存在于预存的RMA列表中,预存的RMA列表存储有允许接入基站的STA的RMA;
允许接入模块6224,可以用于在检测模块6222的检测结果为解密得到的RMA存在于预存的RMA列表中时,允许完成本次接入认证。
对应的,对于STA 64来讲,在图6所示实施例中的第八种可能的实现方式中,位于STA64中的基于临时MAC地址的接入装置640,可以包括:消息接收模块642和认证消息发送模块644。
消息接收模块642,可以用于在非基站设备STA向基站进行无线通信的接入认证过程中,接收基站发送的用于指示基站是否支持STA使用临时MAC地址TMA的消息;
认证消息发送模块644,可以用于当消息接收模块642接收到的消息用于指示基站支持STA使用TMA时,利用TMA向基站发送认证消息。
在图6所示实施例中的第九种可能的实现方式中,消息为发现消息,消息接收模块642,还可以用于:
接收基站每隔预定时间间隔广播发送的发现消息,发现消息包括用于指示基站是否支持STA使用TMA的第一指标。
在图6所示实施例中的第十种可能的实现方式中,当第一指标用于指示基站支持STA使用TMA时,发现消息还包括用于指示STA生成TMA的生成规则。
在图6所示实施例中的第十一种可能的实现方式中,认证消息发送模块644可以包括:第一生成单元644a和认证消息发送单元644b。
第一生成单元644a,可以用于当第一指标用于指示基站支持STA使用 TMA时,利用生成规则生成TMA;
认证消息发送单元644b,可以用于利用TMA向基站发送认证消息,以便基站接收认证消息,利用认证消息解析出TMA;根据认证消息向STA发送认证回应消息,认证回应消息用于指示基站是否允许STA使用TMA进行通信。
在图6所示实施例中的第十二种可能的实现方式中,发现消息还包括用于指示是否需要STA上传STA的真实MAC地址RMA的第二指标。
在图6所示实施例中的第十三种可能的实现方式中,基于临时MAC地址的接入装置640还可以包括:回应接收模块646、地址确认模块648、判断模块6410、第三生成模块6412和接入终止模块6414。
回应接收模块646,可以用于接收基站发送的认证回应消息,认证回应消息是基站在接收到STA发送的认证消息之后,利用认证消息解析出TMA,并根据认证消息向STA发送的认证回应消息,认证回应消息用于指示基站是否允许STA使用TMA进行通信;
地址确认模块648,可以用于当认证回应消息用于指示允许STA使用TMA进行通信的认证回应消息,确认在后续通信中使用该TMA;
判断模块6410,可以用于当认证回应消息用于指示不允许STA使用TMA进行通信的认证回应消息,则判断STA在本次接入认证中生成的TMA次数是否达到预定阈值;第三生成模块6412,用于在判断模块6410的判断结果为STA在本次接入认证中生成的TMA次数未达到预定阈值时,根据生成规则生成另一个TMA,并利用该TMA向基站发送认证消息;接入终止模块6414,用于在判断模块6410的判断结果为STA在本次接入认证中生成的TMA次数达到预定阈值时,终止本次接入认证。
在图6所示实施例中的第十三种可能的实现方式中,基于临时MAC地址的接入装置640还可以包括:第四生成模块6416、第一加密模块6418、第一发送模块6420,或,公钥接收模块6422、第二加密模块6424、第二发送模块6426。
第四生成模块6416,可以用于与基站进行密钥信令信息交互,根据密钥信令信息生成与基站共同的密钥;第一加密模块6418,可以用于利用密钥对STA的RMA进行加密;第一发送模块6420,可以用于将加密后的RMA发送给基站,以便基站利用密钥对加密后的RMA进行解密;或,
公钥接收模块6422,可以用于接收基站发送的公钥,公钥是基站生成的; 第二加密模块6424,可以用于利用公钥对STA的RMA进行加密;第二发送模块6426,可以用于将加密后的RMA发送给基站,以便基站利用生成的私钥对RMA进行解密。
在实际应用中,具有上述装置620的基站62可以单独实施基于临时MAC地址的接入方法,具有上述装置640的非基站设备STA 64也可以单独实施基于临时MAC地址的接入方法。
综上所述,本发明实施例提供的基于临时MAC地址的接入系统,通过在非基站设备STA向基站进行无线通信的接入认证过程中,基站向STA发送用于指示基站是否支持STA使用临时MAC地址TMA的消息;解决了当基站不支持STA使用TMA时,会导致STA不断地利用生成的TMA向基站进行接入认证,容易导致STA无法进行正常通信的问题;由于基站可以告知STA其是否支持STA使用TMA,因此达到了可以避免STA在基站不支持STA使用TMA时被拒绝接入的情况,进而可以保证STA利用RMA进行接入认证,实现无线通信的效果。
请参见图7所示,其示出了本发明再一个实施例中提供的基于临时MAC地址的接入系统的结构示意图,该系统可应用于图1所示实施环境中。该系统可以包括基站72和至少一个非基站设备STA 74,其中基站72包含有基于临时MAC地址的接入装置720,STA 74也包含有基于临时MAC地址的接入装置740。
对于基站72来讲,在图7所示实施例中的第一种可能的实现方式中,位于基站72中的基于临时MAC地址的接入装置720,可以包括:消息发送模块722、认证消息接收模块724和回应发送模块726。
该消息发送模块722,可以用于在非基站设备STA向基站进行无线通信的接入认证过程中,向STA发送用于指示基站是否支持STA使用临时MAC地址TMA的消息,以便STA根据消息向基站发送认证消息,认证消息是STA在消息用于指示基站支持STA使用TMA时,利用TMA向基站发送的认证消息;
认证消息接收模块724,可以用于接收认证消息,利用认证消息解析出TMA;
回应发送模块726,可以用于根据认证消息接收模块724接收到的认证消 息向STA发送认证回应消息,认证回应消息用于指示基站是否允许STA使用TMA进行通信。
在图7所示实施例中的第二种可能的实现方式中,基于临时MAC地址的接入装置720还可以包括:询问消息接收模块728。
询问消息接收模块728,可以用于接收STA利用生成的TMA发送的询问消息;
消息为询问回应消息,消息发送模块722还可以用于:
向STA发送询问回应消息,询问回应消息包括用于指示基站是否支持STA使用TMA的第一指标。
在图7所示实施例中的第三种可能的实现方式中,消息发送模块722可以包括:解析单元722a、第一判断单元722b、第一回应发送单元722c和第二回应发送单元722d。
解析单元722a,可以用于利用询问消息解析出TMA;
第一判断单元722b,可以用于在基站支持STA使用TMA时,判断TMA是否与预存的TMA相冲突,预存的TMA包括与基站进行无线通信连接的各个STA所使用的TMA;
第一回应发送单元722c,可以用于在第一判断单元722b的判断结果为TMA不与预存的TMA相冲突,则向STA发送用于指示允许STA使用TMA进行通信的询问回应消息,以便STA确认在后续通信中使用该TMA;
第二回应发送单元722d,可以用于在第一判断单元722b的判断结果为TMA与预存的TMA相冲突时,向STA发送用于指示不允许STA使用TMA进行通信的询问回应消息。
在图7所示实施例中的第四种可能的实现方式中,当第一指标用于指示基站支持STA使用TMA时,询问回应消息还包括用于指示STA生成TMA的生成规则。
在图7所示实施例中的第五种可能的实现方式中,询问回应消息还包括用于指示是否需要STA上传STA的真实MAC地址RMA的第二指标。
在图7所示实施例中的第六种可能的实现方式中,基于临时MAC地址的接入装置720还可以包括:第一生成模块7210、第一接收模块7212、第一解密模块7214,或,第二生成模块7216、公钥发送模块7218、第二接收模块7220、第二解密模块7222。
第一生成模块7210,可以用于与STA进行密钥信令信息交互,根据密钥信令信息生成与STA共同的密钥;第一接收模块7212,可以用于接收STA利用密钥加密后的RMA;第一解密模块7214,可以用于利用密钥对加密后的RMA进行解密;或,
第二生成模块7216,可以用于生成公钥和私钥;公钥发送模块7218,可以用于将公钥发送给STA;第二接收模块7220,可以用于接收STA利用公钥加密后的RMA;第二解密模块7222,可以用于利用私钥对加密后的RMA进行解密。
在图7所示实施例中的第七种可能的实现方式中,基于临时MAC地址的接入装置720还可以包括:检测模块7224和允许接入模块7226。
检测模块7224,可以用于检测解密得到的RMA是否存在于预存的RMA列表中,预存的RMA列表存储有允许接入基站的STA的RMA;
允许接入模块7226,可以用于在检测模块7224的检测结果为解密得到的RMA存在于预存的RMA列表中时,允许完成本次接入认证。
对应的,对于非基站设备STA74来讲,在图7所示实施例中的第八种可能的实现方式中,位于基站74中的基于临时MAC地址的接入装置740,可以包括:消息接收模块742。
消息接收模块742,可以用于在非基站设备STA向基站进行无线通信的接入认证过程中,接收基站发送的用于指示基站是否支持STA使用临时MAC地址TMA的消息;
认证消息发送模块744,可以用于当消息接收模块742接收到的消息用于指示基站支持STA使用TMA时,利用TMA向基站发送认证消息。
在图7所示实施例中的第九种可能的实现方式中,基于临时MAC地址的接入装置740还可以包括:询问消息发送模块746。
询问消息发送模块746,可以用于利用生成的TMA向基站发送询问消息,以便基站利用询问消息解析出TMA;在基站支持STA使用TMA时,检测TMA是否与预存的TMA相冲突,预存的TMA包括与基站进行无线通信连接的各个STA所使用的TMA;若检测结果为TMA不与预存的TMA相冲突,则向STA发送用于指示允许STA使用TMA进行通信的询问回应消息,以便STA确认在后续通信中使用该TMA;若检测结果为TMA与预存的TMA相冲突,则向STA发送用于指示不允许STA使用TMA进行通信的询问回应消息。
消息为询问回应消息,消息接收模块742还可以用于:
接收基站发送的询问回应消息,询问回应消息包括用于指示基站是否支持STA使用TMA的第一指标。
在图7所示实施例中的第十种可能的实现方式中,当第一指标用于指示基站支持STA使用TMA时,询问回应消息还包括用于指示STA生成TMA的生成规则。
在图7所示实施例中的第十一种可能的实现方式中,认证消息发送模块744可以包括:第三判断单元744a、地址确认单元744b和第二生成单元744c。
第三判断单元744a,可以用于当询问回应消息中的第一指标用于指示基站支持STA使用TMA时,判断询问回应消息是否用于指示允许STA使用询问消息中的TMA进行通信;
地址确认单元744b,可以用于当第三判断单元744a的判断结果为询问回应消息用于指示允许STA使用询问消息中的TMA进行通信时,确认在后续通信中使用该TMA;
第二生成单元744c,可以用于当第三判断单元744a的判断结果为询问回应消息用于指示不允许STA使用询问消息中的TMA进行通信时,利用生成规则生成另一个TMA,利用生成的TMA向基站发送认证消息。
这里所讲的认证消息即为图6中所描述的认证消息发送模块646所发送的认证消息。
也即,第二生成单元744c,可以用于当第三判断单元744的判断结果为询问回应消息用于指示不允许STA使用询问消息中的TMA进行通信时,利用生成规则生成另一个TMA,触发认证消息发送模块644利用生成的该TMA向基站发送认证消息。
在图7所示实施例中的第十二种可能的实现方式中,询问回应消息还包括用于指示是否需要STA上传STA的RMA的第二指标。
在图7所示实施例中的第十三种可能的实现方式中,基于临时MAC地址的接入装置740可以包括:回应接收模块748、地址确认模块7410、判断模块7412、第三生成模块7414和接入终止模块7416。
回应接收模块748,用于接收基站发送的认证回应消息,认证回应消息是基站在接收到STA发送的认证消息之后,利用认证消息解析出TMA,并根据认证消息向STA发送的认证回应消息,认证回应消息用于指示基站是否允许 STA使用TMA进行通信;
地址确认模块7410,用于当认证回应消息用于指示允许STA使用TMA进行通信,确认在后续通信中使用TMA;
判断模块7412,用于当认证回应消息用于指示不允许STA使用TMA进行通信,则判断STA在本次接入认证中生成的TMA次数是否达到预定阈值;第三生成模块7414,用于在判断模块的判断结果为STA在本次接入认证中生成的TMA次数未达到预定阈值时,根据生成规则生成另一个TMA,并利用TMA向基站发送认证消息;接入终止模块7416,用于在判断模块的判断结果为STA在本次接入认证中生成的TMA次数达到预定阈值时,终止本次接入认证。
在图7所示实施例中的第十四种可能的实现方式中,基于临时MAC地址的接入装置740包括:第四生成模块7418、第一加密模块7420和第一发送模块7422,或,公钥接收模块7424、第二加密模块7426和第二发送模块7428。
第四生成模块7418,可以用于与基站进行密钥信令信息交互,根据密钥信令信息生成与基站共同的密钥;第一加密模块7420,可以用于利用密钥对STA的RMA进行加密;第一发送模块7422,可以用于将加密后的RMA发送给基站,以便基站利用密钥对加密后的RMA进行解密;或,
公钥接收模块7424,可以用于接收基站发送的公钥,公钥是基站生成的;第二加密模块7426,可以用于利用公钥对STA的RMA进行加密;第二发送模块7428,可以用于将加密后的RMA发送给基站,以便基站利用生成的私钥对RMA进行解密。
在实际应用中,具有上述装置720的基站72可以单独实施基于临时MAC地址的接入方法,具有上述装置740的非基站设备74也可以单独实施基于临时MAC地址的接入方法。
综上所述,本发明实施例提供的基于临时MAC地址的接入系统,通过在非基站设备STA向基站进行无线通信的接入认证过程中,基站向STA发送用于指示基站是否支持STA使用临时MAC地址TMA的消息;解决了当基站不支持STA使用TMA时,会导致STA不断地利用生成的TMA向基站进行接入认证,容易导致STA无法进行正常通信的问题;由于基站可以告知STA其是否支持STA使用TMA,因此达到了可以避免STA在基站不支持STA使用TMA时被拒绝接入的情况,进而可以保证STA利用RMA进行接入认证,实现无线通信的效果。
需要说明的是:上述实施例提供的基于临时MAC地址的接入装置在STA向基站进行无线通信的接入认证时,仅以上述各功能模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能模块完成,即将基站和非基站设备STA的内部结构划分成不同的功能模块,以完成以上描述的全部或者部分功能。另外,上述实施例提供的基于临时MAC地址的接入装置与基于临时MAC地址的接入方法实施例属于同一构思,其具体实现过程详见方法实施例,这里不再赘述。
请参见图8所示,其示出了本发明一个实施例中提供的基站的结构示意图,该基站可以为图1所示实施环境中的基站AP 120。该基站可以包括发送机802和接收机804。
发送机802,用于在非基站设备STA向基站进行无线通信的接入认证过程中,向STA发送用于指示基站是否支持STA使用临时MAC地址TMA的消息,以便STA根据消息向基站发送认证消息,认证消息是STA在消息用于指示基站支持STA使用TMA时,利用TMA向基站发送的认证消息;
接收机804,用于接收认证消息,利用认证消息解析出TMA;
发送机802,还用于根据接收机804接收到的认证消息向STA发送认证回应消息,认证回应消息用于指示基站是否允许STA使用TMA进行通信。
综上所述,本发明实施例提供的基站,通过在非基站设备STA向基站进行无线通信的接入认证过程中,基站向STA发送用于指示基站是否支持STA使用临时MAC地址TMA的消息;解决了当基站不支持STA使用TMA时,会导致STA不断地利用生成的TMA向基站进行接入认证,容易导致STA无法进行正常通信的问题;由于基站可以告知STA其是否支持STA使用TMA,因此达到了可以避免STA在基站不支持STA使用TMA时被拒绝接入的情况,进而可以保证STA利用RMA进行接入认证,实现无线通信的效果。
请参见图9所示,其示出了本发明另一个实施例中提供的基站的结构示意图,该基站可以为图1所示实施环境中的基站AP 120。该基站可以包括发送机902、处理器904、接收机906和存储器908,其中处理器904分别与接收机906、发送机902和存储器908耦合,存储器908中存储有至少一种计算机软件,处 理器904可以利用存储器908中存储的计算机软件实现相应的功能。
在图9所示实施例中的第一种可能的实现方式中,该基站可以包括发送机902,该发送机902,可以用于在非基站设备STA向基站进行无线通信的接入认证过程中,向STA发送用于指示基站是否支持STA使用临时MAC地址TMA的消息,以便STA根据消息向基站发送认证消息,认证消息是STA在消息用于指示基站支持STA使用TMA时,利用TMA向基站发送的认证消息;
接收机906,用于接收认证消息,利用认证消息解析出TMA;
发送机902,还用于根据接收机906接收到的认证消息向STA发送认证回应消息,认证回应消息用于指示基站是否允许STA使用TMA进行通信。
在图9所示实施例中的第二种可能的实现方式中,消息为发现消息,发送机902还可以用于:
每隔预定时间间隔广播发送发现消息,发现消息包括用于指示基站是否支持STA使用TMA的第一指标。
在图9所示实施例中的第三种可能的实现方式中,当第一指标用于指示基站支持STA使用TMA时,发现消息还包括用于指示STA生成TMA的生成规则。
在图9所示实施例中的第四种可能的实现方式中,发现消息还包括用于指示是否需要STA上传STA的真实MAC地址RMA的第二指标。
在图9所示实施例中的第五种可能的实现方式中,接收机906,还可以用于接收STA利用生成的TMA发送的询问消息;
消息为询问回应消息,发送机902,还可以用于:
向STA发送询问回应消息,询问回应消息包括用于指示基站是否支持STA使用TMA的第一指标。
在图9所示实施例中的第六种可能的实现方式中,处理器904,可以用于利用询问消息解析出TMA;
处理器904,还可以用于在基站支持STA使用TMA时,判断TMA是否与预存的TMA相冲突,预存的TMA包括与基站进行无线通信连接的各个STA所使用的TMA;
发送机902,还可以用于在处理器904的判断结果为TMA不与预存的TMA相冲突,则向STA发送用于指示允许STA使用TMA进行通信的询问回应消息,以便STA确认在后续通信中使用该TMA;
发送机902,还可以用于在处理器904的判断结果为TMA与预存的TMA相冲突时,向STA发送用于指示不允许STA使用TMA进行通信的询问回应消息。
在图9所示实施例中的第七种可能的实现方式中,当第一指标用于指示基站支持STA使用TMA时,询问回应消息还包括用于指示STA生成TMA的生成规则。
在图9所示实施例中的第八种可能的实现方式中,询问回应消息还包括用于指示是否需要STA上传STA的真实MAC地址RMA的第二指标。
在图9所示实施例中的第九种可能的实现方式中,
处理器904,还用于在基站支持STA使用TMA时,判断TMA是否与预存的TMA相冲突,预存的TMA包括与基站进行无线通信连接的各个STA所使用的TMA;
发送机902,还用于在处理器904的判断结果为TMA不与预存的TMA相冲突时,向STA发送用于指示允许STA使用TMA进行通信的认证回应消息,以便STA确认在后续通信中使用TMA;
发送机902,还用于在处理器904的判断结果为TMA与预存的TMA相冲突时,向STA发送用于指示不允许STA使用TMA进行通信的认证回应消息。
在图9所示实施例中的第十种可能的实现方式中,处理器904,还可以用于与STA进行密钥信令信息交互,根据密钥信令信息生成与STA共同的密钥;接收机906,还用于接收STA利用密钥加密后的RMA;处理器904,还用于利用密钥对加密后的RMA进行解密;或,
处理器904,还可以用于生成公钥和私钥;发送机902,还用于将公钥发送给STA;接收机906,还用于接收STA利用公钥加密后的RMA;处理器904,还用于利用私钥对加密后的RMA进行解密。
在图9所示实施例中的第十一种可能的实现方式中,处理器904,还可以用于检测解密得到的RMA是否存在于预存的RMA列表中,预存的RMA列表存储有允许接入基站的STA的RMA;
处理器904,还可以用于在检测结果为解密得到的RMA存在于预存的RMA列表中时,允许完成本次接入认证。
综上所述,本发明实施例提供的基站,通过在非基站设备STA向基站进行无线通信的接入认证过程中,基站向STA发送用于指示基站是否支持STA使 用临时MAC地址TMA的消息;解决了当基站不支持STA使用TMA时,会导致STA不断地利用生成的TMA向基站进行接入认证,容易导致STA无法进行正常通信的问题;由于基站可以告知STA其是否支持STA使用TMA,因此达到了可以避免STA在基站不支持STA使用TMA时被拒绝接入的情况,进而可以保证STA利用RMA进行接入认证,实现无线通信的效果。
请参见图10所示,其示出了本发明一个实施例中提供的STA的结构示意图,该STA可以为图1所示实施环境中的非基站设备STA 140。该STA可以包括:接收机1002和发送机1004。
接收机1002,用于在非基站设备STA向基站进行无线通信的接入认证过程中,接收基站发送的用于指示基站是否支持STA使用临时MAC地址TMA的消息;
发送机1004,还用于当接收机1002接收到的消息用于指示基站支持STA使用TMA时,利用TMA向基站发送认证消息。
综上所述,本发明实施例提供的STA,通过在非基站设备STA向基站进行无线通信的接入认证过程中,基站向STA发送用于指示基站是否支持STA使用临时MAC地址TMA的消息;解决了当基站不支持STA使用TMA时,会导致STA不断地利用生成的TMA向基站进行接入认证,容易导致STA无法进行正常通信的问题;由于基站可以告知STA其是否支持STA使用TMA,因此达到了可以避免STA在基站不支持STA使用TMA时被拒绝接入的情况,进而可以保证STA利用RMA进行接入认证,实现无线通信的效果。
请参见图11所示,其示出了本发明另一个实施例中提供的STA的结构示意图,该STA可以为图1所示实施环境中的非基站设备STA 140。该STA可以包括:接收机1102、处理器1104、发送机1106和存储器1108,其中处理器1104分别与接收机1102、发送机1106和存储器1108耦合,存储器1108中存储有至少一种计算机软件,处理器1104可以利用存储器1108中存储的计算机软件实现相应的功能。
在图11所示实施例中的第一种可能的实现方式中,该STA可以包括接收机1102和发送机1106,
接收机1102,可以用于在非基站设备STA向基站进行无线通信的接入认 证过程中,接收基站发送的用于指示基站是否支持STA使用临时MAC地址TMA的消息;
发送机1106,还用于当接收机1102接收到的消息用于指示基站支持STA使用TMA时,利用TMA向基站发送认证消息。
在图11所示实施例中的第二种可能的实现方式中,消息为发现消息,接收机1102还可以用于:
接收基站每隔预定时间间隔广播发送的发现消息,发现消息包括用于指示基站是否支持STA使用TMA的第一指标。
在图11所示实施例中的第三种可能的实现方式中,当第一指标用于指示基站支持STA使用TMA时,发现消息还包括用于指示STA生成TMA的生成规则。
在图11所示实施例中的第四种可能的实现方式中,STA还可以包括处理器1104,
处理器1104,可以用于当第一指标用于指示基站支持STA使用TMA时,利用生成规则生成TMA;
发送机1106,可以用于利用TMA向基站发送认证消息,以便基站接收认证消息,利用认证消息解析出TMA;根据认证消息向STA发送认证回应消息,认证回应消息用于指示基站是否允许STA使用TMA进行通信。
在图11所示实施例中的第五种可能的实现方式中,发现消息还包括用于指示是否需要STA上传STA的真实MAC地址RMA的第二指标。
在图11所示实施例中的第六种可能的实现方式中,发送机1106,还可以用于利用生成的TMA向基站发送询问消息,以便基站利用询问消息解析出TMA;在基站支持STA使用TMA时,检测TMA是否与预存的TMA相冲突,预存的TMA包括与基站进行无线通信连接的各个STA所使用的TMA;若检测结果为TMA不与预存的TMA相冲突,则向STA发送用于指示允许STA使用TMA进行通信的询问回应消息,以便STA确认在后续通信中使用该TMA;若检测结果为TMA与预存的TMA相冲突,则向STA发送用于指示不允许STA使用TMA进行通信的询问回应消息;
消息为询问回应消息,接收机1102还可以用于:
接收基站发送的询问回应消息,询问回应消息包括用于指示基站是否支持STA使用TMA的第一指标。
在图11所示实施例中的第七种可能的实现方式中,当第一指标用于指示基站支持STA使用TMA时,询问回应消息还包括用于指示STA生成TMA的生成规则。
在图11所示实施例中的第八种可能的实现方式中,处理器1104,还可以用于当询问回应消息中的第一指标用于指示基站支持STA使用TMA时,判断询问回应消息是否用于指示允许STA使用询问消息中的TMA进行通信;
处理器1104,还可以用于当判断结果为询问回应消息用于指示允许STA使用询问消息中的TMA进行通信,则利用询问消息中的TMA进行通信,确认在后续通信中使用该TMA,发送机还用于利用TMA向基站发送认证消息;
处理器1104,还可以用于当判断结果为询问回应消息用于指示不允许STA使用询问消息中的TMA进行通信,则利用生成规则生成另一个TMA,发送机1106还用于利用生成的TMA向基站发送询问消息或者认证消息。
在图11所示实施例中的第九种可能的实现方式中,询问回应消息还包括用于指示是否需要STA上传STA的RMA的第二指标。
在图11所示实施例中的第十种可能的实现方式中,接收机1102,还用于接收基站发送的认证回应消息,认证回应消息是基站在接收到STA发送的认证消息之后,利用认证消息解析出TMA,并根据认证消息向STA发送的认证回应消息,认证回应消息用于指示基站是否允许STA使用TMA进行通信;
处理器1104,还用于当认证回应消息用于指示允许STA使用TMA进行通信,确认在后续通信中使用TMA;
处理器1104,还用于当认证回应消息用于指示不允许STA使用TMA进行通信,则判断STA在本次接入认证中生成的TMA次数是否达到预定阈值;处理器1104,还用于当判断结果为STA在本次接入认证中生成的TMA次数未达到预定阈值时,根据生成规则生成另一个TMA,触发发送机1106利用TMA向基站发送认证消息;处理器1104,还用于当判断结果为STA在本次接入认证中生成的TMA次数达到预定阈值,则终止本次接入认证。
在图11所示实施例中的第十一种可能的实现方式中,处理器1104,还可以用于与基站进行密钥信令信息交互,根据密钥信令信息生成与基站共同的密钥;处理器1104,还可以用于利用密钥对STA的RMA进行加密;发送机1106,还可以用于将加密后的RMA发送给基站,以便基站利用密钥对加密后的RMA进行解密;或,
接收机1102,还可以用于接收基站发送的公钥,公钥是基站生成的;处理器1104,还可以用于利用公钥对STA的RMA进行加密;发送机1106,还可以用于将加密后的RMA发送给基站,以便基站利用生成的私钥对RMA进行解密。
综上所述,本发明实施例提供的STA,通过在非基站设备STA向基站进行无线通信的接入认证过程中,基站向STA发送用于指示基站是否支持STA使用临时MAC地址TMA的消息;解决了当基站不支持STA使用TMA时,会导致STA不断地利用生成的TMA向基站进行接入认证,容易导致STA无法进行正常通信的问题;由于基站可以告知STA其是否支持STA使用TMA,因此达到了可以避免STA在基站不支持STA使用TMA时被拒绝接入的情况,进而可以保证STA利用RMA进行接入认证,实现无线通信的效果。
请参见图12所示,其示出了本发明还一个实施例中提供的基于临时MAC地址的接入系统的结构示意图,该基于临时MAC地址的接入系统可以应用于为图1所示实施环境中。该基于临时MAC地址的接入系统可以包括:基站1202和至少一个非基站设备STA1204。
基站1202可以为如图8或图9中所描述的基站;非基站设备STA 1204可以为如图10或图11中所描述的STA。
综上所述,本发明实施例提供的基于临时MAC地址的接入系统,当基站不支持STA使用TMA时,会导致STA不断地利用生成的TMA向基站进行接入认证,容易导致STA无法进行正常通信。本发明通过基站在消息中携带是否允许STA使用TMA接入的方法,解决了该问题。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本发明的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,可以仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本发明各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本发明各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本发明的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本发明的保护范围之内。因此,本发明的保护范围应所述以权利要求的保护范围为准。

Claims (45)

  1. 一种基于临时MAC地址的接入方法,应用于基站中,其特征在于,所述方法包括:
    在非基站设备STA向所述基站进行无线通信的接入认证过程中,向所述STA发送用于指示所述基站是否支持STA使用临时MAC地址TMA的消息,以便所述STA根据所述消息向所述基站发送认证消息,所述认证消息是所述STA在所述消息用于指示所述基站支持STA使用TMA时,利用TMA向所述基站发送的认证消息;
    接收所述认证消息,利用所述认证消息解析出所述TMA;
    根据所述认证消息向所述STA发送认证回应消息,所述认证回应消息用于指示所述基站是否允许所述STA使用所述TMA进行通信。
  2. 根据权利要求1所述的方法,其特征在于,所述消息为发现消息,所述向所述STA发送用于指示是否支持STA使用TMA的消息,包括:
    每隔预定时间间隔广播发送发现消息,所述发现消息包括用于指示所述基站是否支持STA使用TMA的第一指标。
  3. 根据权利要求2所述的方法,其特征在于,当所述第一指标用于指示所述基站支持STA使用TMA时,所述发现消息还包括用于指示STA生成TMA的生成规则。
  4. 根据权利要求2所述的方法,其特征在于,所述发现消息还包括用于指示是否需要所述STA上传所述STA的真实MAC地址RMA的第二指标。
  5. 根据权利要求1所述的方法,其特征在于,在所述向所述STA发送用于指示所述基站是否支持STA使用临时MAC地址TMA的消息之前,还包括:
    接收所述STA利用生成的TMA发送的询问消息;
    所述消息为询问回应消息,所述向所述STA发送用于指示是否支持STA使用临时MAC地址TMA的消息,包括:
    向所述STA发送询问回应消息,所述询问回应消息包括用于指示所述基站 是否支持STA使用TMA的第一指标。
  6. 根据权利要求5所述的方法,其特征在于,所述向所述STA发送询问回应消息,包括:
    利用所述询问消息解析出所述TMA;
    在所述基站支持STA使用TMA时,判断所述TMA是否与预存的TMA相冲突,所述预存的TMA包括与所述基站进行无线通信连接的各个STA所使用的TMA;
    若判断结果为所述TMA不与预存的TMA相冲突,则向所述STA发送用于指示允许所述STA使用所述TMA进行通信的所述询问回应消息,以便所述STA确认在后续通信中使用所述TMA;
    若判断结果为所述TMA与预存的TMA相冲突,则向所述STA发送用于指示不允许所述STA使用所述TMA进行通信的所述询问回应消息。
  7. 根据权利要求5所述的方法,其特征在于,当所述第一指标用于指示所述基站支持STA使用TMA时,所述询问回应消息还包括用于指示STA生成TMA的生成规则。
  8. 根据权利要求5所述的方法,其特征在于,所述询问回应消息还包括用于指示是否需要所述STA上传所述STA的真实MAC地址RMA的第二指标。
  9. 根据权利要求1至8中任一所述的方法,其特征在于,所述根据所述认证消息向所述STA发送认证回应消息,包括:
    在所述基站支持STA使用TMA时,判断所述TMA是否与预存的TMA相冲突,所述预存的TMA包括与所述基站进行无线通信连接的各个STA所使用的TMA;
    若判断结果为所述TMA不与预存的TMA相冲突,则向所述STA发送用于指示允许所述STA使用所述TMA进行通信的认证回应消息,以便所述STA确认在后续通信中使用所述TMA;
    若判断结果为所述TMA与预存的TMA相冲突,则向所述STA发送用于指示不允许所述STA使用所述TMA进行通信的认证回应消息。
  10. 根据权利要求9所述的方法,其特征在于,所述方法还包括:
    与所述STA进行密钥信令信息交互,根据所述密钥信令信息生成与所述STA共同的密钥;接收所述STA利用所述密钥加密后的RMA;利用所述密钥对所述加密后的RMA进行解密;或,
    生成公钥和私钥;将所述公钥发送给所述STA;接收所述STA利用所述公钥加密后的RMA;利用所述私钥对所述加密后的RMA进行解密。
  11. 根据权利要求10所述的方法,其特征在于,所述方法还包括:
    检测解密得到的所述RMA是否存在于预存的RMA列表中,所述预存的RMA列表存储有允许接入所述基站的STA的RMA;
    若检测结果为解密得到的所述RMA存在于预存的RMA列表中,允许完成本次接入认证。
  12. 一种基于临时MAC地址的接入方法,应用于与基站进行无线通信连接的非基站设备STA中,其特征在于,所述方法包括:
    在非基站设备STA向所述基站进行无线通信的接入认证过程中,接收所述基站发送的用于指示所述基站是否支持STA使用临时MAC地址TMA的消息;
    当所述消息用于指示所述基站支持STA使用TMA时,利用TMA向所述基站发送认证消息。
  13. 根据权利要求12所述的方法,其特征在于,所述消息为发现消息,所述接收所述基站发送的用于指示所述基站是否支持STA使用临时MAC地址TMA的消息,包括:
    接收所述基站每隔预定时间间隔广播发送的发现消息,所述发现消息包括用于指示所述基站是否支持STA使用TMA的第一指标。
  14. 根据权利要求13所述的方法,其特征在于,当所述第一指标用于指示所述基站支持STA使用TMA时,所述发现消息还包括用于指示STA生成TMA的生成规则。
  15. 根据权利要求14所述的方法,其特征在于,所述当所述消息用于指示所述基站支持STA使用TMA时,利用TMA向所述基站发送认证消息,包括:
    当所述第一指标用于指示所述基站支持STA使用TMA时,利用所述生成规则生成TMA;
    利用所述TMA向所述基站发送所述认证消息,以便所述基站接收所述认证消息,利用所述认证消息解析出所述TMA;根据所述认证消息向所述STA发送认证回应消息,所述认证回应消息用于指示所述基站是否允许所述STA使用所述TMA进行通信。
  16. 根据权利要求13所述的方法,其特征在于,所述发现消息还包括用于指示是否需要所述STA上传所述STA的真实MAC地址RMA的第二指标。
  17. 根据权利要求12所述的方法,其特征在于,在所述接收所述基站发送的用于指示所述基站是否支持STA使用临时MAC地址TMA的消息之前,还包括:
    利用生成的TMA向所述基站发送询问消息,以便所述基站利用所述询问消息解析出所述TMA;在所述基站支持STA使用TMA时,检测所述TMA是否与预存的TMA相冲突,所述预存的TMA包括与所述基站进行无线通信连接的各个STA所使用的TMA;若检测结果为所述TMA不与预存的TMA相冲突,则向所述STA发送用于指示允许所述STA使用所述TMA进行通信的询问回应消息,以便所述STA确认在后续通信中使用所述TMA;若检测结果为所述TMA与预存的TMA相冲突,则向所述STA发送用于指示不允许所述STA使用所述TMA进行通信的询问回应消息;
    所述消息为所述询问回应消息,所述接收所述基站发送的用于指示所述基站是否支持STA使用临时MAC地址TMA的消息,包括:
    接收所述基站发送的所述询问回应消息,所述询问回应消息包括用于指示所述基站是否支持STA使用TMA的第一指标。
  18. 根据权利要求17所述的方法,其特征在于,当所述第一指标用于指示所述基站支持STA使用TMA时,所述询问回应消息还包括用于指示STA生成TMA的生成规则。
  19. 根据权利要求18所述的方法,其特征在于,所述当所述消息用于指示所述基站支持STA使用TMA时,利用TMA向所述基站发送认证消息,包括:
    当所述询问回应消息中的第一指标用于指示所述基站支持STA使用TMA时,判断所述询问回应消息是否用于指示允许所述STA使用所述询问消息中的TMA进行通信;
    当判断结果为所述询问回应消息用于指示允许所述STA使用所述询问消息中的TMA进行通信,则确认在后续通信中使用所述TMA,利用所述TMA向所述基站发送认证消息;
    当判断结果为所述询问回应消息用于指示不允许所述STA使用所述询问消息中的TMA进行通信,则利用所述生成规则生成另一个TMA,利用生成的所述TMA向所述基站发送认证消息。
  20. 根据权利要求17所述的方法,其特征在于,所述询问回应消息还包括用于指示是否需要所述STA上传所述STA的RMA的第二指标。
  21. 根据权利要求12至20中任一所述的方法,其特征在于,在所述当所述消息用于指示所述基站支持STA使用TMA时,利用TMA向所述基站发送认证消息之后,还包括:
    接收所述基站发送的认证回应消息,所述认证回应消息是所述基站在接收到所述STA发送的所述认证消息之后,利用所述认证消息解析出所述TMA,并根据所述认证消息向所述STA发送的认证回应消息,所述认证回应消息用于指示所述基站是否允许所述STA使用所述TMA进行通信;
    当所述认证回应消息用于指示允许所述STA使用所述TMA进行通信,确认在后续通信中使用所述TMA;
    当所述认证回应消息用于指示不允许所述STA使用所述TMA进行通信,则判断所述STA在本次接入认证中生成的TMA次数是否达到预定阈值;若判断结果为所述STA在本次接入认证中生成的TMA次数未达到所述预定阈值,则根据所述生成规则生成另一个TMA,并利用所述TMA向所述基站发送认证消息;若判断结果为所述STA在本次接入认证中生成的TMA次数达到所述预定阈值,则终止本次接入认证。
  22. 根据权利要求21所述的方法,其特征在于,所述方法还包括:
    与所述基站进行密钥信令信息交互,根据所述密钥信令信息生成与所述基站共同的密钥;利用所述密钥对所述STA的RMA进行加密;将加密后的所述RMA发送给所述基站,以便所述基站利用所述密钥对所述加密后的RMA进行解密;或,
    接收所述基站发送的公钥,所述公钥是所述基站生成的;利用所述公钥对所述STA的RMA进行加密;将加密后的所述RMA发送给所述基站,以便所述基站利用生成的私钥对所述RMA进行解密。
  23. 一种基于临时MAC地址的接入装置,应用于基站中,其特征在于,所述装置包括:
    消息发送模块,用于在非基站设备STA向所述基站进行无线通信的接入认证过程中,向所述STA发送用于指示所述基站是否支持STA使用临时MAC地址TMA的消息,以便所述STA根据所述消息向所述基站发送认证消息,所述认证消息是所述STA在所述消息用于指示所述基站支持STA使用TMA时,利用TMA向所述基站发送的认证消息;
    认证消息接收模块,用于接收所述认证消息,利用所述认证消息解析出所述TMA;
    回应发送模块,用于根据所述认证消息接收模块接收到的所述认证消息向所述STA发送认证回应消息,所述认证回应消息用于指示所述基站是否允许所述STA使用所述TMA进行通信。
  24. 根据权利要求23所述的装置,其特征在于,所述消息为发现消息,所述消息发送模块,还用于:
    每隔预定时间间隔广播发送发现消息,所述发现消息包括用于指示所述基站是否支持STA使用TMA的第一指标。
  25. 根据权利要求24所述的装置,其特征在于,当所述第一指标用于指示所述基站支持STA使用TMA时,所述发现消息还包括用于指示STA生成TMA的生成规则。
  26. 根据权利要求24所述的装置,其特征在于,所述发现消息还包括用于指示是否需要所述STA上传所述STA的真实MAC地址RMA的第二指标。
  27. 根据权利要求23所述的装置,其特征在于,所述装置还包括:
    询问消息接收模块,用于接收所述STA利用生成的TMA发送的询问消息;
    所述消息为询问回应消息,所述消息发送模块,还用于:
    向所述STA发送询问回应消息,所述询问回应消息包括用于指示所述基站是否支持STA使用TMA的第一指标。
  28. 根据权利要求27所述的装置,其特征在于,所述消息发送模块,包括:
    解析单元,用于利用所述询问消息解析出所述TMA;
    第一判断单元,用于在所述基站支持STA使用TMA时,判断所述TMA是否与预存的TMA相冲突,所述预存的TMA包括与所述基站进行无线通信连接的各个STA所使用的TMA;
    第一回应发送单元,用于在所述第一判断单元的判断结果为所述TMA不与预存的TMA相冲突,则向所述STA发送用于指示允许所述STA使用所述TMA进行通信的所述询问回应消息,以便所述STA确认在后续通信中使用所述TMA;
    第二回应发送单元,用于在所述第一判断单元的判断结果为所述TMA与预存的TMA相冲突时,向所述STA发送用于指示不允许所述STA使用所述TMA进行通信的所述询问回应消息。
  29. 根据权利要求27所述的装置,其特征在于,当所述第一指标用于指示所述基站支持STA使用TMA时,所述询问回应消息还包括用于指示STA生成TMA的生成规则。
  30. 根据权利要求27所述的装置,其特征在于,所述询问回应消息还包括用于指示是否需要所述STA上传所述STA的真实MAC地址RMA的第二指标。
  31. 根据权利要求23至30中任一所述的装置,其特征在于,所述回应发送模块,包括:
    第二判断单元,用于在所述基站支持STA使用TMA时,判断所述TMA是否与预存的TMA相冲突,所述预存的TMA包括与所述基站进行无线通信连接的各个STA所使用的TMA;
    第三回应发送单元,用于在所述第二判断单元的判断结果为所述TMA不与预存的TMA相冲突时,向所述STA发送用于指示允许所述STA使用所述TMA进行通信的认证回应消息,以便所述STA确认在后续通信中使用所述TMA;
    第四回应发送单元,用于在所述第二判断单元的判断结果为所述TMA与预存的TMA相冲突时,向所述STA发送用于指示不允许所述STA使用所述TMA进行通信的认证回应消息。
  32. 根据权利要求31所述的装置,其特征在于,所述装置还包括:
    第一生成模块,用于与所述STA进行密钥信令信息交互,根据所述密钥信令信息生成与所述STA共同的密钥;第一接收模块,用于接收所述STA利用所述密钥加密后的RMA;第一解密模块,用于利用所述密钥对所述加密后的RMA进行解密;或,
    第二生成模块,用于生成公钥和私钥;公钥发送模块,用于将所述公钥发送给所述STA;第二接收模块,用于接收所述STA利用所述公钥加密后的RMA;第二解密模块,用于利用所述私钥对所述加密后的RMA进行解密。
  33. 根据权利要求32所述的装置,其特征在于,所述装置还包括:
    检测模块,用于检测解密得到的所述RMA是否存在于预存的RMA列表中,所述预存的RMA列表存储有允许接入所述基站的STA的RMA;
    允许接入模块,用于在所述检测模块的检测结果为解密得到的所述RMA存在于预存的RMA列表中时,允许完成本次接入认证。
  34. 一种基于临时MAC地址的接入装置,应用于与基站进行无线通信连接的非基站设备STA中,其特征在于,所述装置包括:
    消息接收模块,用于在非基站设备STA向所述基站进行无线通信的接入认证过程中,接收所述基站发送的用于指示所述基站是否支持STA使用临时MAC地址TMA的消息;
    认证消息发送模块,用于当所述消息接收模块接收到的所述消息用于指示 所述基站支持STA使用TMA时,利用TMA向所述基站发送认证消息。
  35. 根据权利要求34所述的装置,其特征在于,所述消息为发现消息,所述消息接收模块,还用于:
    接收所述基站每隔预定时间间隔广播发送的发现消息,所述发现消息包括用于指示所述基站是否支持STA使用TMA的第一指标。
  36. 根据权利要求35所述的装置,其特征在于,当所述第一指标用于指示所述基站支持STA使用TMA时,所述发现消息还包括用于指示STA生成TMA的生成规则。
  37. 根据权利要求36所述的装置,其特征在于,所述认证消息发送模块,包括:
    第一生成单元,用于当所述第一指标用于指示所述基站支持STA使用TMA时,利用所述生成规则生成TMA;
    认证消息发送单元,用于利用所述TMA向所述基站发送所述认证消息,以便所述基站接收所述认证消息,利用所述认证消息解析出所述TMA;根据所述认证消息向所述STA发送认证回应消息,所述认证回应消息用于指示所述基站是否允许所述STA使用所述TMA进行通信。
  38. 根据权利要求35所述的装置,其特征在于,所述发现消息还包括用于指示是否需要所述STA上传所述STA的真实MAC地址RMA的第二指标。
  39. 根据权利要求34所述的装置,其特征在于,所述装置还包括:
    询问消息发送模块,用于利用生成的TMA向所述基站发送询问消息,以便所述基站利用所述询问消息解析出所述TMA;在所述基站支持STA使用TMA时,检测所述TMA是否与预存的TMA相冲突,所述预存的TMA包括与所述基站进行无线通信连接的各个STA所使用的TMA;若检测结果为所述TMA不与预存的TMA相冲突,则向所述STA发送用于指示允许所述STA使用所述TMA进行通信的询问回应消息,以便所述STA确认在后续通信中使用所述TMA;若检测结果为所述TMA与预存的TMA相冲突,则向所述STA发送用 于指示不允许所述STA使用所述TMA进行通信的询问回应消息;
    所述消息为所述询问回应消息,所述消息接收模块,还用于:
    接收所述基站发送的所述询问回应消息,所述询问回应消息包括用于指示所述基站是否支持STA使用TMA的第一指标。
  40. 根据权利要求39所述的装置,其特征在于,当所述第一指标用于指示所述基站支持STA使用TMA时,所述询问回应消息还包括用于指示STA生成TMA的生成规则。
  41. 根据权利要求40所述的装置,其特征在于,所述认证消息发送模块,包括:
    第三判断单元,用于当所述询问回应消息中的第一指标用于指示所述基站支持STA使用TMA时,判断所述询问回应消息是否用于指示允许所述STA使用所述询问消息中的TMA进行通信;
    地址确认单元,用于当所述第三判断单元的判断结果为所述询问回应消息用于指示允许所述STA使用所述询问消息中的TMA进行通信时,确认在后续通信中使用所述TMA;
    第二生成单元,用于当所述第三判断单元的判断结果为所述询问回应消息用于指示不允许所述STA使用所述询问消息中的TMA进行通信时,利用所述生成规则生成另一个TMA,利用生成的所述TMA向所述基站发送认证消息。
  42. 根据权利要求39所述的装置,其特征在于,所述询问回应消息还包括用于指示是否需要所述STA上传所述STA的RMA的第二指标。
  43. 根据权利要求34至42所述的装置,其特征在于,所述装置还包括:
    回应接收模块,用于接收所述基站发送的所述认证回应消息,所述认证回应消息是所述基站在接收到所述STA发送的所述认证消息之后,利用所述认证消息解析出所述TMA,并根据所述认证消息向所述STA发送的认证回应消息,所述认证回应消息用于指示所述基站是否允许所述STA使用所述TMA进行通信;
    地址确认模块,用于当所述认证回应消息用于指示允许所述STA使用所述 TMA进行通信,确认在后续通信中使用所述TMA;
    判断模块,用于当所述认证回应消息用于指示不允许所述STA使用所述TMA进行通信,则判断所述STA在本次接入认证中生成的TMA次数是否达到预定阈值;第三生成模块,用于在所述判断模块的判断结果为所述STA在本次接入认证中生成的TMA次数未达到所述预定阈值时,根据所述生成规则生成另一个TMA,并利用所述TMA向所述基站发送认证消息;接入终止模块,用于在所述判断模块的判断结果为所述STA在本次接入认证中生成的TMA次数达到所述预定阈值时,终止本次接入认证。
  44. 根据权利要求43所述的装置,其特征在于,所述装置还包括:
    第四生成模块,用于与所述基站进行密钥信令信息交互,根据所述密钥信令信息生成与所述基站共同的密钥;第一加密模块,用于利用所述密钥对所述STA的RMA进行加密;第一发送模块,用于将加密后的所述RMA发送给所述基站,以便所述基站利用所述密钥对所述加密后的RMA进行解密;或,
    公钥接收模块,用于接收所述基站发送的公钥,所述公钥是所述基站生成的;第二加密模块,用于利用所述公钥对所述STA的RMA进行加密;第二发送模块,用于将加密后的所述RMA发送给所述基站,以便所述基站利用生成的私钥对所述RMA进行解密。
  45. 一种基于临时MAC地址的接入系统,其特征在于,所述系统包括基站和至少一个非基站设备STA;
    所述基站包括如权利要求23至33中任一所述的基于临时MAC地址的接入装置;
    所述STA包括如权利要求34至44中任一所述的基于临时MAC地址的接入装置。
PCT/CN2015/072518 2014-06-16 2015-02-09 基于临时mac地址的接入方法、装置及系统 WO2015192665A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP15809901.0A EP3145232A4 (en) 2014-06-16 2015-02-09 Access method, apparatus and system based on temporary mac address
US15/380,780 US20170099289A1 (en) 2014-06-16 2016-12-15 Temporary Mac Address-Based Access Method, Apparatus, and System

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410267784.4A CN105228144B (zh) 2014-06-16 2014-06-16 基于临时mac地址的接入方法、装置及系统
CN201410267784.4 2014-06-16

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US15/380,780 Continuation US20170099289A1 (en) 2014-06-16 2016-12-15 Temporary Mac Address-Based Access Method, Apparatus, and System

Publications (1)

Publication Number Publication Date
WO2015192665A1 true WO2015192665A1 (zh) 2015-12-23

Family

ID=54934837

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/072518 WO2015192665A1 (zh) 2014-06-16 2015-02-09 基于临时mac地址的接入方法、装置及系统

Country Status (4)

Country Link
US (1) US20170099289A1 (zh)
EP (1) EP3145232A4 (zh)
CN (1) CN105228144B (zh)
WO (1) WO2015192665A1 (zh)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160342979A1 (en) * 2014-04-08 2016-11-24 Capital One Services, Llc Systems and methods for transaction authentication using dynamic wireless beacon devices
CN111464482B (zh) * 2019-01-18 2022-11-08 中兴通讯股份有限公司 认证处理方法、装置、存储介质及电子装置
CN111954283A (zh) * 2019-05-17 2020-11-17 华为技术有限公司 一种接入无线局域网的方法和终端
WO2023230812A1 (en) * 2022-05-31 2023-12-07 Nokia Shanghai Bell Co., Ltd. Rma generation

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1852330A (zh) * 2005-10-21 2006-10-25 华为技术有限公司 虚拟终端临时媒体访问控制地址动态变更的方法
CN1852329A (zh) * 2005-10-21 2006-10-25 华为技术有限公司 无线局域网临时媒体访问控制地址的动态分配和回收方法
US20070070960A1 (en) * 2005-09-27 2007-03-29 Amit Barak Device, system, and method of multi-entity wireless communication adapter having a multi-channel mode
CN101047587A (zh) * 2006-06-30 2007-10-03 华为技术有限公司 一种非无线局域网终端访问外部网络的系统及方法
US20130142094A1 (en) * 2011-12-02 2013-06-06 Qualcomm Incorporated Systems and methods for frame filtering and for enabling frame filtering

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FI113515B (fi) * 2002-01-18 2004-04-30 Nokia Corp Osoitteistus langattomissa lähiverkoissa
CA2661050C (en) * 2006-08-18 2013-10-15 Telcordia Technologies, Inc. Dynamic temporary mac address generation in wireless networks

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070070960A1 (en) * 2005-09-27 2007-03-29 Amit Barak Device, system, and method of multi-entity wireless communication adapter having a multi-channel mode
CN1852330A (zh) * 2005-10-21 2006-10-25 华为技术有限公司 虚拟终端临时媒体访问控制地址动态变更的方法
CN1852329A (zh) * 2005-10-21 2006-10-25 华为技术有限公司 无线局域网临时媒体访问控制地址的动态分配和回收方法
CN101047587A (zh) * 2006-06-30 2007-10-03 华为技术有限公司 一种非无线局域网终端访问外部网络的系统及方法
US20130142094A1 (en) * 2011-12-02 2013-06-06 Qualcomm Incorporated Systems and methods for frame filtering and for enabling frame filtering

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3145232A4 *

Also Published As

Publication number Publication date
CN105228144A (zh) 2016-01-06
EP3145232A4 (en) 2017-04-19
CN105228144B (zh) 2019-04-19
EP3145232A1 (en) 2017-03-22
US20170099289A1 (en) 2017-04-06

Similar Documents

Publication Publication Date Title
EP2979401B1 (en) System and method for indicating a service set identifier
CN106851632B (zh) 一种智能设备接入无线局域网的方法及装置
US10244388B2 (en) Location privacy protection method, apparatus, and system
EP1804462B1 (en) Method and apparatus for transmitting message to wireless devices that are classified into groups
EP3065334A1 (en) Key configuration method, system and apparatus
WO2015144050A1 (zh) 分配寻址标识的方法及接入点、站点和通信系统
US20070218875A1 (en) Detecting address spoofing in wireless network environments
EP3223452A1 (en) Method and apparatus for providing service on basis of identifier of user equipment
CN107567017B (zh) 无线连接系统、装置及方法
US20160255501A1 (en) Selection and use of a security agent for device-to-device (d2d) wireless communications
JP2015502104A (ja) 融合ワイヤレスネットワークにおいての認証の方法およびデバイス
US8661244B2 (en) Method and apparatus for establishing secured link between devices
KR20090115292A (ko) 버튼 방식의 무선 랜 설정 방법 및 장치
WO2015192665A1 (zh) 基于临时mac地址的接入方法、装置及系统
US11962692B2 (en) Encrypting data in a pre-associated state
KR101718775B1 (ko) 통신 보안 처리 방법 및 장치
WO2022116092A1 (zh) 一种WiFi安全认证方法及通信装置
CN102883265B (zh) 接入用户的位置信息发送和接收方法、设备及系统
WO2016045635A2 (zh) 一种通信方法、装置及系统
WO2017095303A1 (en) Provisioning node, communication node and methods therein for handling key identifiers in wireless communication
WO2017118269A1 (zh) 一种空口标识的保护方法及装置
US11902775B2 (en) Encrypted nonces as rotated device addresses
CN113194471B (zh) 基于区块链网络的无线网络接入方法、装置和终端
CN102811441A (zh) 管理移动ip密钥的方法和装置
KR101338486B1 (ko) I-wlan의 게이트웨이 및 그의 호 추적 방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15809901

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

REEP Request for entry into the european phase

Ref document number: 2015809901

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2015809901

Country of ref document: EP