WO2021246281A1 - 通信装置、通信方法およびプログラム - Google Patents
通信装置、通信方法およびプログラム Download PDFInfo
- Publication number
- WO2021246281A1 WO2021246281A1 PCT/JP2021/020207 JP2021020207W WO2021246281A1 WO 2021246281 A1 WO2021246281 A1 WO 2021246281A1 JP 2021020207 W JP2021020207 W JP 2021020207W WO 2021246281 A1 WO2021246281 A1 WO 2021246281A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- communication device
- key
- communication
- frequency channel
- link
- Prior art date
Links
- 238000004891 communication Methods 0.000 title claims abstract description 508
- 238000000034 method Methods 0.000 title claims abstract description 112
- 230000008569 process Effects 0.000 claims abstract description 81
- 230000001052 transient effect Effects 0.000 claims description 7
- 230000004044 response Effects 0.000 description 25
- 230000006870 function Effects 0.000 description 14
- 230000008859 change Effects 0.000 description 7
- 238000010586 diagram Methods 0.000 description 6
- 230000015654 memory Effects 0.000 description 6
- 230000005540 biological transmission Effects 0.000 description 4
- 239000000523 sample Substances 0.000 description 4
- 238000004590 computer program Methods 0.000 description 3
- 230000010365 information processing Effects 0.000 description 3
- 238000000060 site-specific infrared dichroism spectroscopy Methods 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 238000010494 dissociation reaction Methods 0.000 description 2
- 230000005593 dissociations Effects 0.000 description 2
- 238000003384 imaging method Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 229940002865 4-way Drugs 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000007639 printing Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/15—Setup of multiple wireless link connections
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/16—Multipoint routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/24—Multipath
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/24—Multipath
- H04L45/245—Link aggregation, e.g. trunking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/047—Key management, e.g. using generic bootstrapping architecture [GBA] without using a trusted network node as an anchor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/047—Key management, e.g. using generic bootstrapping architecture [GBA] without using a trusted network node as an anchor
- H04W12/0471—Key exchange
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/065—Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/04—Wireless resource allocation
- H04W72/044—Wireless resource allocation based on the type of the allocated resource
- H04W72/0453—Resources in frequency domain, e.g. a carrier in FDMA
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
Definitions
- the present invention relates to a communication device and a wireless communication method for performing wireless communication.
- the IEEE802.11ax standard described in Patent Document 1 discloses that wireless communication by OFDMA (Orthogonal Frequency Division Multiple Access) is executed.
- OFDMA Orthogonal Frequency Division Multiple Access
- high peak throughput is realized by executing wireless communication by OFDMA.
- IEEE IEEE 802.11be standard
- AP Access Point
- STA Selection
- a technology is being studied in which one AP (Access Point) establishes a connection with one STA (Station) via a plurality of different frequency channels to carry out higher-speed wireless communication. ..
- PTK is an encryption key for encrypting unicast transmission
- GTK which is a key for encrypting broadcast transmission or multicast communication.
- PTK is an abbreviation for Pairwise Transient Key
- GTK is an abbreviation for Group Transient Key.
- the encryption key when the connection of the communication device is established in the second frequency channel after PTK and GTK are generated and shared in the first frequency channel. There is no provision on how to replace it. Therefore, there is a possibility that the encryption key cannot be exchanged with the communication device that has established the connection in the second frequency channel.
- an object of the present invention is to provide a method for exchanging an encryption key when the number of frequency channels for which a connection has been established changes when communication is performed via a plurality of frequency channels.
- the communication device is A communication device capable of executing multi-link communication conforming to the 802.11 standard series.
- An established means of establishing a link to another communication device via a frequency channel In a state where the first link is established between the communication device and the other communication device via the first frequency channel by the establishment means, the second frequency is added to the first link.
- the first key which is a key for encrypting unicast communication using the second frequency channel
- the second key which is a key for encrypting broadcast communication or multicast communication
- the first sharing means to be shared by the first key sharing process executed with the communication device, Have.
- the second key which is generated by the communication device and is a key for encrypting broadcast communication or multicast communication using the second frequency channel, is transmitted to the other communication device via the first frequency channel.
- the communication device of the present invention is A communication device capable of executing multi-link communication conforming to the 802.11 standard series.
- An established means of establishing a link to another communication device via a frequency channel In a state where the first link is established between the communication device and the other communication device via the first frequency channel by the establishment means, the second frequency is added to the first link.
- a first key for encrypting unicast communication using the second frequency channel when establishing a second link between the communication device and the other communication device via a channel.
- a first sharing means for sharing a key by a first key sharing process performed with the other communication device via the second frequency channel.
- the second key which is generated by the communication device and is a key for encrypting broadcast communication or multicast communication using the second frequency channel, is transmitted to the other communication device via the second frequency channel.
- the communication device of the present invention is A communication device capable of executing multi-link communication conforming to the 802.11 standard series.
- An established means of establishing a link to another communication device via a frequency channel When establishing a first link between the communication device and the other communication device via the first frequency channel by the establishment means, the first frequency channel is used in the first frequency channel.
- the first key which is the key for encrypting the unicast communication, is shared by the first key sharing process executed with another communication device via the first frequency channel. Sharing means and In a state where the first link is established between the communication device and the other communication device via the first frequency channel by the establishment means, the second link is added to the first link.
- a process of generating a key for encrypting the unicast communication of the second frequency channel is executed. Instead, a setting means for setting the first key generated in the first frequency channel as an encryption key used for communication via the second frequency channel, and A second key generated by the communication device, which is a key for encrypting broadcast communication or multicast communication using the second frequency channel, is executed with the other communication device.
- the present invention in communication via a plurality of frequency channels, it is possible to exchange encryption keys even when the number of frequency channels for which a connection has been established changes.
- FIG. 5 is a sequence diagram showing a method of exchanging encryption keys by the communication device 102 when the number of frequency channels for establishing a connection changes. It is a flowchart which the communication apparatus 102 in this embodiment executes.
- FIG. 5 is a sequence diagram showing a method of exchanging encryption keys by the communication device 102 when the number of frequency channels for establishing a connection changes. It is a flowchart which the communication apparatus 102 in this embodiment executes.
- FIG. 5 is a sequence diagram showing a method of exchanging encryption keys by the communication device 102 when the number of frequency channels for establishing a connection changes. It is a flowchart which the communication apparatus 102 in this embodiment executes.
- FIG. 5 is a sequence diagram showing a method of exchanging encryption keys by the communication device 102 when the number of frequency channels for establishing a connection changes. It is a flowchart which the communication apparatus 102 in this embodiment executes.
- the communication device 103 is a station (Station, STA) having a role of participating in the network 101.
- Each communication device corresponds to the IEEE802.11be standard, and can execute wireless communication conforming to the IEEE802.11be standard via the network 101.
- IEEE is an abbreviation for Institute of Electrical and Electronics Engineers.
- Each communication device can communicate in a frequency band of 2.4 GHz band, 5 GHz band, and 6 GHz band.
- the frequency band used by each communication device is not limited to this, and different frequency bands may be used, for example, a 60 GHz band.
- each communication device can communicate using bandwidths of 20 MHz, 40 MHz, 80 MHz, 160 MHz, and 320 MHz.
- the communication devices 102 and 103 can realize multi-user (MU, Multi User) communication in which signals of a plurality of users are multiplexed by executing OFDMA communication conforming to the IEEE802.11be standard.
- OFDMA communication is an abbreviation for Orthogonal Frequency Division Multiple Access (Orthogonal Frequency Division Multiple Access).
- RU Resource Unit
- the AP can communicate with a plurality of STAs in parallel.
- the communication devices 102 and 103 establish a link via a plurality of frequency channels and execute multi-link communication for communication.
- the frequency channel refers to a frequency channel defined in the IEEE 802.11 series standard and capable of executing wireless communication conforming to the 802.11 series standard.
- a plurality of frequency channels are defined in each frequency band of 2.4 GHz band, 5 GHz band, and 6 GHz band.
- the bandwidth of each frequency channel is defined as 20 MHz. By bonding to adjacent frequency channels, a bandwidth of 40 MHz or more may be used in one frequency channel.
- the communication devices 102 and 103 can communicate using the bandwidths of 40 MHz, 80 MHz, 160 MHz, and 320 MHz.
- the communication device 102 establishes 103 a first link 104 via a first frequency channel in the 2.4 GHz band and a second link 105 via a second frequency channel in the 5 GHz band. You can communicate over both links.
- the communication device 102 maintains the second link 105 via the second frequency channel in parallel with the first link 104 via the first frequency channel. In this way, the communication device 102 can improve the throughput in communication with the communication device 103 by establishing a link with the communication device 103 via a plurality of frequency channels.
- the communication devices 102 and 103 may establish a plurality of links having different frequency bands in the multi-link communication.
- the communication devices 102 and 103 are intended to establish a third link in the 6 GHz band in addition to the first first link 104 in the 2.4 GHz band and the second second link 105 in the 5 GHz band. You may do it.
- the link may be established via a plurality of different channels contained in the same frequency band. For example, a first link 104 via 1ch in the 2.4 GHz band and a second Link 105 via 5ch in the 2.4 GHz band may be established. Links with the same frequency band and links with different frequency bands may coexist.
- the communication devices 102 and 103 are via 36ch in the 5GHz band in addition to the first link 104 via 1ch in the 2.4GHz band and the second link 105 via 5ch in the 2.4GHz band.
- a third link may be established.
- the communication device 102 can communicate with the communication device 103 in the other band even when a certain band is congested. It is possible to prevent a decrease in throughput in communication with the communication device 103.
- a plurality of links established by the communication devices 102 and 103 need at least different frequency channels.
- the channel spacing of the frequency channels of the plurality of links established by the communication devices 102 and 103 may be at least 20 MHz or larger.
- the communication devices 102 and 103 establish the first link 104 and the second link 105, but three or more links may be established.
- the communication devices 102 and 103 can divide one data and transmit it to the other device via a plurality of links.
- the communication devices 102 and 103 may transmit the same data via each of the plurality of links, so that the communication via one link can be used as backup communication for the communication via the other link.
- the communication device 102 transmits the same data to the communication device 103 via the first link via the first frequency channel and the second link via the second frequency channel. In this case, for example, even if an error occurs in communication via the first link, the same data is transmitted via the second link, so that the communication device 103 transmits the data transmitted from the communication device 102. Can be received.
- the communication devices 102 and 103 may use different links depending on the type of frame to be communicated and the type of data.
- the management frame may be transmitted via the first link, and the data frame containing data may be transmitted via the second link.
- the management frame specifically refers to a Beacon frame, a Probe Request frame / Response frame, and an Association Request frame / Response frame.
- a Dissociation frame, an Authentication frame, a De-Authentication frame, and an Action frame are also called management frames.
- the Beacon frame is a frame for notifying network information.
- the Probe Request frame is a frame for requesting network information
- the Probe Response frame is a response thereof and is a frame for providing network information.
- the Associate Request frame is a frame that requests a connection
- the Associate Response frame is a response thereof, and is a frame that indicates permission or an error for connection.
- the Dissociation frame is a frame for disconnecting the connection.
- the Authentication frame is a frame for authenticating the remote device
- the De-Autuation frame is a frame for interrupting the authentication of the remote device and disconnecting the connection.
- the Action frame is a frame for performing additional functions other than the above.
- the communication devices 102 and 103 transmit and receive management frames conforming to the IEEE802.11 series standard.
- the communication device 102 transmits data related to a captured image, for example, meta information such as a date, parameters at the time of imaging (aperture value and shutter speed), and position information is transmitted via the first link, and pixel information. May be sent via a second link.
- meta information such as a date, parameters at the time of imaging (aperture value and shutter speed), and position information is transmitted via the first link, and pixel information. May be sent via a second link.
- the communication devices 102 and 103 may be capable of executing MIMO (Multiple-Input Multiple-Output) communication.
- MIMO Multiple-Input Multiple-Output
- the communication devices 102 and 103 have a plurality of antennas, one of which sends a different signal from each antenna using the same frequency channel.
- the receiving side simultaneously receives all the signals arriving from the plurality of streams using the plurality of antennas, separates the signals of each stream, and decodes them.
- MIMO communication Multiple-Input Multiple-Output
- the communication devices 102 and 103 can communicate more data in the same time as compared with the case where MIMO communication is not executed.
- the communication devices 102 and 103 may execute MIMO communication on some links when performing multi-link communication.
- the communication devices 102 and 103 manage operational parameters used for wireless communication such as the number of spatial streams and the communication bandwidth when communicating using MIMO communication at each link. These operational parameters are determined when the connection is established, but the operational parameters can be changed after the connection. For example, it is expected that the operational parameters of the communication bandwidth will be narrowed because the surrounding channels have become crowded. When changing the operation parameters, it is necessary to notify the other device immediately.
- the communication devices 102 and 103 are said to correspond to the IEEE802.11be standard, but in addition to this, they may correspond to at least one of the legacy standards which are the standards prior to the IEEE802.11be standard.
- the legacy standard is the IEEE802.11a / b / g / n / ac / ax standard.
- the communication device 102 include, but are not limited to, a wireless LAN router and a PC.
- the communication device 102 may be any communication device capable of performing multi-link communication with another communication device.
- the communication device 102 may be an information processing device such as a wireless chip capable of executing wireless communication conforming to the IEEE802.11be standard.
- Specific examples of the communication device 103 include, but are not limited to, cameras, tablets, smartphones, PCs, mobile phones, video cameras, and the like.
- the communication device 103 may be any communication device capable of performing multi-link communication with another communication device.
- the communication device 103 may be an information processing device such as a wireless chip capable of executing wireless communication conforming to the IEEE802.11be standard.
- the network of FIG. 1 is a network composed of one AP and one STA, but the number of APs and STAs is not limited to this.
- the opposing STAs may be composed of one to three.
- the opposing APs may be composed of one or three.
- An information processing device such as a wireless chip has an antenna for transmitting the generated signal.
- FIG. 2 shows the hardware configurations of the communication devices 102 and 103 in this embodiment.
- the communication device 102 includes a storage unit 201, a control unit 202, a function unit 203, an input unit 204, an output unit 205, a communication unit 206, and an antenna 207.
- the storage unit 201 is composed of one or more memories such as ROM and RAM, and stores various information such as a computer program for performing various operations described later and communication parameters for wireless communication.
- ROM is an abbreviation for Read Only Memory
- RAM is an abbreviation for Random Access Memory.
- storage media such as flexible disks, hard disks, optical disks, magneto-optical disks, CD-ROMs, CD-Rs, magnetic tapes, non-volatile memory cards, and DVDs. May be used. Further, the storage unit 201 may include a plurality of memories and the like.
- the control unit 202 is composed of one or more processors such as a CPU and an MPU, and controls the entire communication device 102 by executing a computer program stored in the storage unit 201.
- the control unit 202 may control the entire communication device 102 in cooperation with the computer program stored in the storage unit 201 and the OS (Operating System). Further, the control unit 202 generates data or signals (wireless frames) to be transmitted in communication with other communication devices.
- the CPU is an abbreviation for Central Processing Unit
- MPU is an abbreviation for Micro Processing Unit.
- the control unit 202 may include a plurality of processors such as a multi-core processor, and the plurality of processors may control the entire communication device 102.
- control unit 202 controls the function unit 203 to execute predetermined processing such as wireless communication, imaging, printing, and projection.
- the functional unit 203 is hardware for the communication device 102 to execute a predetermined process.
- the communication unit 206 controls wireless communication in accordance with the IEEE802.11be standard. Further, the communication unit 206 may control wireless communication conforming to other IEEE802.11 series standards in addition to the IEEE802.11be standard, or control wired communication such as a wired LAN. The communication unit 206 controls the antenna 207 to transmit and receive signals for wireless communication generated by the control unit 202. If the communication device 102 is compatible with the NFC standard, the Bluetooth standard, or the like in addition to the IEEE802.11be standard, wireless communication may be controlled in accordance with these communication standards.
- NFC is an abbreviation for Near Field Communication.
- Antenna 207 is an antenna capable of communication in the 2.4 GHz band, 5 GHz band, and 6 GHz band.
- the communication device 102 has one antenna, but may have different antennas for each frequency band. Further, when the communication device 102 has a plurality of antennas, the communication device 102 may have a communication unit 206 corresponding to each antenna.
- FIG. 3 shows the functional configurations of the communication devices 102 and 103 in this embodiment.
- the communication devices 102 and 103 are composed of an operation parameter change unit 301, an operation parameter acquisition unit 302, a link selection unit 303, a Power save management unit 304, a MAC frame generation unit 305, and a data transmission / reception unit 306.
- the operation parameter change unit 301 is a block that manages changes in the operation parameters of each link constituting the multi-link of the communication devices 102 and 103.
- the operation parameters may be changed dynamically after the link is established. For example, since the surrounding channels are crowded, it is conceivable to change the operation parameters of the communication bandwidth to narrow the operation parameters.
- the change of the operation parameter may be decided by the own device or may be changed based on the notification from the other device. When there is a notification from the remote device, the operation parameter acquired by the operation parameter acquisition unit 302 is used to make the change.
- the operation parameter acquisition unit 302 is a block that acquires operation parameters included in the MAC frame received from the remote device. Operational parameters can be included in the header part of the MAC frame.
- the link selection unit 303 is a block that determines which link is to be notified from among a plurality of links when notifying the remote device of the change of the operation parameter.
- the encryption key management unit 304 is a block that manages the encryption key of each link.
- the encryption key management unit performs encryption key exchange processing for each link. For example, 4WayHandshake and GroupKeyHandshake processing based on the IEEE802.11 standard are performed, and various encryption keys such as PMK, PTK, GMK, and GTK are also managed.
- PMK is an abbreviation for Pairwise Master Key
- PTK is an abbreviation for Pairwise Transient Key
- GMK is an abbreviation for Group Master Key
- GTK is an abbreviation for Group Transient Key.
- the MAC frame generation unit 305 is a block that generates a MAC frame including the operation parameters generated by the operation parameter change unit 301.
- As the MAC frame generated by the MAC frame generation unit 305 various management frames such as Beacon frame and Probe Response frame, data frames, and the like are assumed.
- the operation parameters included in the MAC frame generated by the MAC frame generation unit 305 are shown in FIG. 5 described later.
- the data transmission / reception unit 306 transmits the wireless frame including the MAC frame generated by the MAC frame generation unit 305 and receives the wireless frame from the remote device.
- FIG. 4 shows a sequence diagram in which a communication device 102 and a communication device 103 exchange an encryption key for encrypting a newly established frequency channel when communicating via a plurality of frequency channels.
- This embodiment shows an example of using two links.
- the link 1 primary link
- the link 2 secondary link
- the second frequency channel for example, 36ch in the 5GHz band.
- the third frequency channel is not shown in FIG. 4, for example, the 6 GHz band can be set as the link 3 (territorial link), and the number of links can be further increased for communication.
- the communication device 102 and the communication device 103 establish the link 1 by the processing of F401 in the first frequency channel. More specifically, the communication device 103 transmits an Authentication Request frame for authentication, and the communication device 102 transmits an Authentication Response frame in response to the authentication request frame. After that, the communication device 103 transmits an Association Request frame for connection, and the communication device 102 transmits an Association Response frame in response to the connection request frame.
- the communication device 102 and the communication device 103 share a unicast key PTK in the process of F402 in the first frequency channel, which is a key sharing process specified in the IEEE 802.11 specification, 4 Way.
- the Handshake process is carried out.
- a PMK used for encrypting the communication between the communication device 102 and the communication device 103 is generated, and the authentication server notifies the communication device 102.
- PMK is used to generate PTK in the 4-way Handshake.
- the communication device 102 exchanges random numbers called Anance and Sonce with the communication device 103 in the 4Way Handshake Messages 1 and 2, and generates a PTK based on the PMK and the random numbers.
- PTK consists of three parts: KEK (Key Encryption Key), KCK (Key Configuration Key), and TK (Temporary Key).
- TK is used for encryption of unicast communication
- KCK is used for encryption of broadcast communication or multicast communication.
- the PTK is transmitted and shared with the communication device 103 in the 4-way Handshake Message 3 of the F402.
- the communication device 102 and the communication device 103 carry out the GroupKeyHandshake process, which is the key sharing process specified in the IEEE802.11 specification, in order to share the GTK in the process of the F403 in the first frequency channel.
- the GTK sharing process can also be performed by the 4-way Handshake, and in that case, the F403 is not performed.
- the communication device 102 and the communication device 103 establish the link 2 by the processing of F404 in the second frequency channel.
- the specific processing of F404 is the same as that of F401.
- the communication device 102 and the communication device 103 are the key sharing process specified in the 802.11 specification in the first frequency channel in order to generate the PTK used for the communication of the second frequency channel. Carry out a 4-way Handshake.
- the specific processing of F405 is the same as that of F402.
- the communication device 102 and the communication device 103 perform a groupkeyhandshake, which is a key sharing process specified in the IEEE802.11 specification, in order to share the group key GTK in the process of F403 in the first frequency channel. implement.
- the specific processing of F406 is the same as that of F403.
- the outband is a method other than wireless communication, for example, PTK and GTK generated by the communication devices 102 and 103 in the first frequency channel can be used by using the wired communication inside the respective communication devices.
- the PTK can be notified to the second frequency channel.
- the encryption key is managed by the encryption key management unit 304.
- the communication device 102 connects to a plurality of communication devices by wire and forms one MLD (Multi Link Device)
- the PTK is shared by using the wire existing between the communication devices.
- PTK and GTK are shared between the respective communication devices by using wired communication instead of wireless communication. Therefore, as compared with the case where PTK and GTK are shared by using wireless communication. It will be possible to share a secure encryption key.
- control unit 202 executes the program stored in the storage unit 201 of the communication device 102, so that the encryption key is exchanged when the number of frequency channels for which the connection is established changes in the multi-link communication. The flow will be explained.
- the processing of this flow chart is started when the power of the communication device is turned on.
- the communication device may start in response to an instruction from the user or application to start multi-link communication.
- the communication device may start when the amount of data to be communicated with the other device becomes equal to or more than a predetermined threshold value.
- the multi-link setting process is started by those triggers (S501).
- connection process and the key exchange process shown in F401 to F403 are performed on the first link (primary link).
- FIG. 6 shows a sequence diagram in which a communication device 102 and a communication device 103 exchange an encryption key for encrypting a newly established frequency channel when communicating via a plurality of frequency channels.
- This embodiment shows an example of using two links.
- the third frequency channel is not shown in FIG. 6, for example, the 6 GHz band can be used as a tertiary link, which is a link 3, and communication can be performed by further increasing the number of links.
- the communication device 102 and the communication device 103 establish the link 1 by the processing of F601 in the first frequency channel. More specifically, the communication device 103 transmits an Authentication Request frame for authentication, and the communication device 102 transmits an Authentication Response frame in response to the authentication request frame. After that, the communication device 103 transmits an Association Request frame to establish a connection, and the communication device 102 transmits an Association Response frame in response to the connection request frame.
- the communication device 102 and the communication device 103 carry out a 4-way Handshake process specified in the IEEE802.11 specification in order to share the PTK in the process of F602 in the first frequency channel.
- the specific processing of F602 is the same as that of F402.
- the communication device 102 and the communication device 103 carry out the GroupKeyHandshake process specified in the IEEE802.11 specification in order to share the GTK which is the group key in the process of F603 in the first frequency channel.
- the specific processing of F603 is the same as that of F403.
- the communication device 102 and the communication device 103 carry out the 4-way Handshake process specified in the IEEE802.11 specification in order to share the PTK in the process of the F802 in the first frequency channel.
- the specific processing of F606 is the same as that of F402.
- the processing of this flow chart is started when the power of the communication device is turned on.
- the communication device may start in response to an instruction from the user or application to start multi-link communication.
- the communication device may start when the amount of data to be communicated with the other device becomes equal to or more than a predetermined threshold value.
- the multi-link setting process is started by those triggers (S701).
- the presence or absence of the secondary link in S703 is determined by whether or not the communication device 102 has received the Association Request frame in F604.
- the connection process and the key exchange process are performed on the second link (secondary link) (S704).
- the presence or absence of the third link (territory link) is confirmed in S705. If the communication device 102 has not received the Association Request frame in S703, the presence or absence of the tertiary link is confirmed in S705.
- the processing after S705 is the same as the secondary link connection processing.
- the communication device 102 when the communication device 102 communicates by the WPA authentication method and communicates via a plurality of frequency channels, each time the number of frequency channels for establishing a connection with the communication device 102 changes.
- the encryption key can be exchanged by executing the key sharing process.
- This embodiment shows an example of using two links.
- the primary link which is link 1
- processes communication via the first frequency channel for example, 1ch in the 2.4GHz band
- the secondary link which is link 2
- uses the second frequency channel for example, 36ch in the 5GHz band.
- the third frequency channel is not shown in FIG. 8, for example, the 6 GHz band can be used as a tertiary link, which is a link 3, and communication can be performed by further increasing the number of links.
- the communication device 102 and the communication device 103 establish the link 1 by the processing of F801 in the first frequency channel. More specifically, the communication device 103 transmits an Authentication Request frame for authentication, and the communication device 102 transmits an Authentication Response frame in response to the authentication request frame. After that, the communication device 103 transmits an Association Request frame for connection, and the communication device 102 transmits an Association Response frame in response to the connection request frame.
- the communication device 102 and the communication device 103 carry out the 4-way Handshake process specified in the IEEE802.11 specification in order to share the PTK in the process of the F802 in the first frequency channel.
- the specific processing of F802 is the same as that of F402.
- the communication device 102 and the communication device 103 carry out the GroupKeyHandshake processing specified in the IEEE802.11 specification in order to share GTK in the processing of F603 in the first frequency channel.
- the specific processing of F803 is the same as that of F403.
- connection process and the key exchange process shown in F801 to F803 are performed on the first link (primary link).
- the presence or absence of the secondary link is determined by whether or not the communication device 102 has received the Association Request frame in F804.
- the connection process is performed on the second link (secondary link) (S904).
- the link of the secondary link is established in S904, the PTK used in the primary link in S905 is shared by using the outband. The sharing method using the outband is as described above. If the communication device 102 has not received the Association Request frame in S903, the presence or absence of the third link (territorial link) is confirmed in S907.
- the encryption key when the communication device 102 communicates via a plurality of frequency channels, the encryption key can be exchanged even when the number of frequency channels established to be connected to the communication device 102 changes. It will be possible. Furthermore, by sharing the encryption key using the outband, it is possible to exchange the encryption key with security as compared with the case of sharing the encryption key via wireless communication.
- GTK is illustrated as an example of a group key, but the present invention is not limited to this.
- IGTK is shared between the communication device 102 and the communication device 103 in addition to GTK.
- IGTK is an abbreviation for Integrity GroupTransient Key. Whether to share only GTK or to share IGTK in addition to GTK is negotiated between the communication device 102 and the communication device 103 in the exchange between the Associate Request frame and the Associate Response frame, and the case is divided.
- a recording medium in which the program code of the software that realizes the above functions is recorded is supplied to the system or the device, and the computer (CPU, MPU) of the system or the device reads and executes the program code stored in the recording medium. You may.
- the program code itself read from the storage medium realizes the function of the above-described embodiment, and the storage medium storing the program code constitutes the above-mentioned device.
- OS is an abbreviation for Operating System.
- the program code read from the storage medium is written to the memory provided in the function expansion board inserted in the computer or the function expansion unit connected to the computer. Then, based on the instruction of the program code, the CPU provided in the function expansion board or the function expansion unit may perform a part or all of the actual processing to realize the above-mentioned function.
- the present invention supplies a program that realizes one or more functions of the above-described embodiment to a system or device via a network or storage medium, and one or more processors in the computer of the system or device reads and executes the program. It can also be realized by the processing to be performed. It can also be realized by a circuit (for example, ASIC) that realizes one or more functions.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
IEEE802.11規格シリーズに準拠したマルチリンク通信を実行可能な通信装置であって、
周波数チャネルを介して他の通信装置との間のリンクを確立する確立手段と、
前記確立手段によって第1の周波数チャネルを介して前記通信装置と前記他の通信装置の間に第1のリンクを確立している状態において、当該第1のリンクに追加して、第2の周波数チャネルを介して前記通信装置と前記他の通信装置の間に第2のリンクを確立する際に、
前記第2の周波数チャネルを用いたユニキャスト通信を暗号化するための鍵である第1の鍵と、ブロードキャスト通信またはマルチキャスト通信を暗号化するための鍵である第2の鍵を、前記他の通信装置との間で実行する第1の鍵共有処理によって共有する第1の共有手段と、
を有する。
IEEE802.11規格シリーズに準拠したマルチリンク通信を実行可能な通信装置であって、
周波数チャネルを介して他の通信装置との間のリンクを確立する確立手段と、
前記確立手段によって第1の周波数チャネルを介して前記通信装置と他の通信装置の間に第1のリンクを確立している状態において、当該第1のリンクに追加して、第2の周波数チャネルを介して前記通信装置と前記他の通信装置の間に第2のリンクを確立する際に、前記第2の周波数チャネルを用いたユニキャスト通信を暗号化するための鍵である第1の鍵を、前記第1の周波数チャネルを介して前記他の通信装置との間で実行する第1の鍵共有処理によって共有する第1の共有手段と、
前記通信装置によって生成され、前記第2の周波数チャネルを用いたブロードキャスト通信またはマルチキャスト通信を暗号化するための鍵である第2の鍵を、前記第1の周波数チャネルを介して前記他の通信装置との間で実行する第2の鍵共有処理によって共有する第2の共有手段と、
前記第1の鍵および前記第2の鍵を前記第2の周波数チャネルを介した通信で使用する暗号鍵に設定する設定手段と、
を有する。
IEEE802.11規格シリーズに準拠したマルチリンク通信を実行可能な通信装置であって、
周波数チャネルを介して他の通信装置との間のリンクを確立する確立手段と、
前記確立手段によって第1の周波数チャネルを介して前記通信装置と前記他の通信装置の間に第1のリンクを確立している状態において、当該第1のリンクに追加して、第2の周波数チャネルを介して前記通信装置と前記他の通信装置の間に第2のリンクを確立する際に、前記第2の周波数チャネルを用いたユニキャスト通信を暗号化するための鍵である第1の鍵を、前記第2の周波数チャネルを介して前記他の通信装置との間で実行する第1の鍵共有処理によって共有する第1の共有手段と、
前記通信装置によって生成され、前記第2の周波数チャネルを用いたブロードキャスト通信またはマルチキャスト通信を暗号化するための鍵である第2の鍵を、前記第2の周波数チャネルを介して前記他の通信装置との間で実行する第2の鍵共有処理によって共有する第2の共有手段と、
を有する。
IEEE802.11規格シリーズに準拠したマルチリンク通信を実行可能な通信装置であって、
周波数チャネルを介して他の通信装置との間のリンクを確立する確立手段と、
前記確立手段によって第1の周波数チャネルを介して前記通信装置と前記他の通信装置の間に第1のリンクを確立する際に、前記第1の周波数チャネルにおいて、前記第1の周波数チャネルを用いたユニキャスト通信を暗号化するための鍵である第1の鍵を、前記第1の周波数チャネルを介して他の通信装置との間で実行する第1の鍵共有処理によって共有する第1の共有手段と、
前記確立手段によって前記第1の周波数チャネルを介して前記通信装置と前記他の通信装置の間に第1のリンクを確立している状態において、当該第1のリンクに追加して、第2の周波数チャネルを介して前記通信装置と前記他の通信装置の間に第2のリンクを確立する際に、前記第2の周波数チャネルのユニキャスト通信を暗号化するための鍵を生成する処理を実行しないで、前記第1の周波数チャネルで生成した前記第1の鍵を前記第2の周波数チャネルを介した通信で使用する暗号鍵に設定する設定手段と、
前記通信装置によって生成され、前記第2の周波数チャネルを用いたブロードキャスト通信またはマルチキャスト通信を暗号化するための鍵である第2の鍵を、前記他の通信装置との間で実行する第2の鍵共有処理によって共有する第3の共有手段と、
を有する。
図4には通信装置102と通信装置103とが複数の周波数チャネルを介して通信を行う場合に新しく接続を確立した周波数チャネルを暗号化するための暗号鍵を交換するシーケンス図を示す。
図6には、通信装置102と通信装置103とが複数の周波数チャネルを介して通信を行う場合に新しく接続を確立した周波数チャネルを暗号化するための暗号鍵を交換するシーケンス図を示す。
図8には、通信装置102と通信装置103とが複数の周波数チャネルを介して通信を行う場合に新しく接続を確立した周波数チャネルを暗号化するための暗号鍵を交換するシーケンス図を示す。
Claims (18)
- IEEE802.11規格シリーズに準拠したマルチリンク通信を実行可能な通信装置であって、
周波数チャネルを介して他の通信装置との間のリンクを確立する確立手段と、
前記確立手段によって第1の周波数チャネルを介して前記通信装置と前記他の通信装置の間に第1のリンクを確立している状態において、当該第1のリンクに追加して、第2の周波数チャネルを介して前記通信装置と前記他の通信装置の間に第2のリンクを確立する際に、
前記第2の周波数チャネルを用いたユニキャスト通信を暗号化するための鍵である第1の鍵と、ブロードキャスト通信またはマルチキャスト通信を暗号化するための鍵である第2の鍵を、前記他の通信装置との間で実行する第1の鍵共有処理によって共有する第1の共有手段と、
を有することを特徴とする通信装置。 - IEEE802.11規格シリーズに準拠したマルチリンク通信を実行可能な通信装置であって、
周波数チャネルを介して他の通信装置との間のリンクを確立する確立手段と、
前記確立手段によって第1の周波数チャネルを介して前記通信装置と他の通信装置の間に第1のリンクを確立している状態において、当該第1のリンクに追加して、第2の周波数チャネルを介して前記通信装置と前記他の通信装置の間に第2のリンクを確立する際に、前記第2の周波数チャネルを用いたユニキャスト通信を暗号化するための鍵である第1の鍵を、前記第1の周波数チャネルを介して前記他の通信装置との間で実行する第1の鍵共有処理によって共有する第1の共有手段と、
前記通信装置によって生成され、前記第2の周波数チャネルを用いたブロードキャスト通信またはマルチキャスト通信を暗号化するための鍵である第2の鍵を、前記第1の周波数チャネルを介して前記他の通信装置との間で実行する第2の鍵共有処理によって共有する第2の共有手段と、
前記第1の鍵および前記第2の鍵を前記第2の周波数チャネルを介した通信で使用する暗号鍵に設定する設定手段と、
を有することを特徴とする通信装置。 - 前記設定手段は、無線通信以外の方法を用いてそれぞれの通信装置内で前記第1の鍵および前記第2の鍵を通知し、前記第2の周波数チャネルで使用する暗号鍵に設定することを特徴とする請求項2に記載の通信装置。
- IEEE802.11規格シリーズに準拠したマルチリンク通信を実行可能な通信装置であって、
周波数チャネルを介して他の通信装置との間のリンクを確立する確立手段と、
前記確立手段によって第1の周波数チャネルを介して前記通信装置と前記他の通信装置の間に第1のリンクを確立している状態において、当該第1のリンクに追加して、第2の周波数チャネルを介して前記通信装置と前記他の通信装置の間に第2のリンクを確立する際に、前記第2の周波数チャネルを用いたユニキャスト通信を暗号化するための鍵である第1の鍵を、前記第2の周波数チャネルを介して前記他の通信装置との間で実行する第1の鍵共有処理によって共有する第1の共有手段と、
前記通信装置によって生成され、前記第2の周波数チャネルを用いたブロードキャスト通信またはマルチキャスト通信を暗号化するための鍵である第2の鍵を、前記第2の周波数チャネルを介して前記他の通信装置との間で実行する第2の鍵共有処理によって共有する第2の共有手段と、
を有することを特徴とする通信装置。 - 前記通信装置はWPA認証方式、WPA-PSK認証方式を用いて通信を行うことを特徴とする請求項4に記載の通信装置。
- IEEE802.11規格シリーズに準拠したマルチリンク通信を実行可能な通信装置であって、
周波数チャネルを介して他の通信装置との間のリンクを確立する確立手段と、
前記確立手段によって第1の周波数チャネルを介して前記通信装置と前記他の通信装置の間に第1のリンクを確立する際に、前記第1の周波数チャネルにおいて、前記第1の周波数チャネルを用いたユニキャスト通信を暗号化するための鍵である第1の鍵を、前記第1の周波数チャネルを介して他の通信装置との間で実行する第1の鍵共有処理によって共有する第1の共有手段と、
前記確立手段によって前記第1の周波数チャネルを介して前記通信装置と前記他の通信装置の間に第1のリンクを確立している状態において、当該第1のリンクに追加して、第2の周波数チャネルを介して前記通信装置と前記他の通信装置の間に第2のリンクを確立する際に、前記第2の周波数チャネルのユニキャスト通信を暗号化するための鍵を生成する処理を実行しないで、前記第1の周波数チャネルで生成した前記第1の鍵を前記第2の周波数チャネルを介した通信で使用する暗号鍵に設定する設定手段と、
前記通信装置によって生成され、前記第2の周波数チャネルを用いたブロードキャスト通信またはマルチキャスト通信を暗号化するための鍵である第2の鍵を、前記他の通信装置との間で実行する第2の鍵共有処理によって共有する第3の共有手段と、
を有することを特徴とする通信装置。 - 前記第3の共有手段を前記第1の周波数チャネルで実行する場合は、前記第3共有手段で共有した第2の鍵を無線通信以外の方法を用いてそれぞれの通信装置内で通知し、前記第2の周波数チャネルで使用する暗号鍵に設定することを特徴とする請求項6に記載の通信装置。
- 前記設定手段は、無線通信以外の方法を用いてそれぞれの通信装置内で前記第1の鍵を通知し、前記第2の周波数チャネルで使用する暗号鍵に設定することを特徴とする請求項6または7に記載の通信装置。
- 前記無線通信以外の方法は、それぞれの通信装置の内部またはMLD(Multi Link Device)を形成する通信装置間を繋ぐ有線を使用して通知する方法であることを特徴とする請求項3、7、8の何れか1項に記載の通信装置。
- 前記第1の鍵共有処理は4WayHandshakeであることを特徴とする請求項1から9の何れか1項に記載の通信装置。
- 前記第1の鍵はPTK(Pairwise Transient Key)であることを特徴とする請求項1から10の何れか1項に記載の通信装置。
- 前記第2の鍵共有処理はGroupKeyHandshakeであることを特徴とする請求項2から11の何れか1項に記載の通信装置。
- 前記第2の鍵はGTK(Group Transient Key)またはIGTK(Integrity Group Transient Key)であることを特徴とする請求項1から12の何れか1項に記載の通信装置。
- IEEE802.11規格シリーズに準拠した通信を行う通信装置の通信方法であって、
周波数チャネルを介して他の通信装置との間のリンクを確立する確立工程と、
前記確立工程によって第1の周波数チャネルを介して前記通信装置と前記他の通信装置の間に第1のリンクを確立している状態において、当該第1のリンクに追加して、第2の周波数チャネルを介して前記通信装置と前記他の通信装置の間に第2のリンクを確立する際に、
前記第2の周波数チャネルを用いたユニキャスト通信を暗号化するための鍵である第1の鍵と、ブロードキャスト通信またはマルチキャスト通信を暗号化するための鍵である第2の鍵を、前記他の通信装置との間で実行する第1の鍵共有処理によって共有する第1の共有工程とを有することを特徴とする通信装置の通信方法。 - IEEE802.11規格シリーズに準拠したマルチリンク通信を実行可能な通信装置と他の通信装置とにおける通信方法であって、
周波数チャネルを介して前記他の通信装置との間のリンクを確立する確立工程と、
前記確立工程によって第1の周波数チャネルを介して前記通信装置と前記他の通信装置の間に第1のリンクを確立している状態において、当該第1のリンクに追加して、第2の周波数チャネルを介して前記通信装置と前記他の通信装置の間に第2のリンクを確立する際に、前記第2の周波数チャネルを用いたユニキャスト通信を暗号化するための鍵である第1の鍵を、前記第1の周波数チャネルを介して前記他の通信装置との間で実行する第1の鍵共有処理によって共有する第1の共有工程と、
前記通信装置によって生成され、前記第2の周波数チャネルを用いたブロードキャスト通信またはマルチキャスト通信を暗号化するための鍵である第2の鍵を、前記第1の周波数チャネルを介して前記他の通信装置との間で実行する第2の鍵共有処理によって共有する第2の共有工程と、
前記第1の鍵および前記第2の鍵を前記第2の周波数チャネルを介した通信で使用する暗号鍵に設定する設定工程と、
を有することを特徴とする通信方法。 - IEEE802.11規格シリーズに準拠したマルチリンク通信を実行可能な通信装置と他の通信装置とにおける通信方法であって、
周波数チャネルを介して前記他の通信装置との間のリンクを確立する確立工程と、
前記確立工程によって第1の周波数チャネルを介して前記通信装置と前記他の通信装置の間に第1のリンクを確立している状態において、当該第1のリンクに追加して、第2の周波数チャネルを介して前記通信装置と前記他の通信装置の間に第2のリンクを確立する際に、前記第2の周波数チャネルを用いたユニキャスト通信を暗号化するための鍵である第1の鍵を、前記第2の周波数チャネルを介して前記他の通信装置との間で実行する第1の鍵共有処理によって共有する第1の共有工程と、
前記通信装置によって生成され、前記第2の周波数チャネルを用いたブロードキャスト通信またはマルチキャスト通信を暗号化するための鍵である第2の鍵を、前記第2の周波数チャネルを介して前記他の通信装置との間で実行する第2の鍵共有処理によって共有する第2の共有工程と、
を有することを特徴とする通信方法。 - IEEE802.11規格シリーズに準拠したマルチリンク通信を実行可能な通信装置と他の通信装置とにおける通信方法であって、
周波数チャネルを介して前記他の通信装置との間のリンクを確立する確立工程と、
前記確立工程によって、第1の周波数チャネルを介して前記通信装置と前記他の通信装置の間に第1のリンクを確立する際に、前記第1の周波数チャネルを用いたユニキャスト通信を暗号化するための鍵である第1の鍵を、前記第1の周波数チャネルを介して前記通信装置と前記他の通信装置が実行する第1の鍵共有処理によって共有する第1の共有工程と、
前記確立工程によって前記第1の周波数チャネルを介して前記通信装置と前記他の通信装置の間に第1のリンクを確立している状態において、当該第1のリンクに追加して、第2の周波数チャネルを介して前記通信装置と前記他の通信装置の間に第2のリンクを確立する際に、前記第2の周波数チャネルのユニキャスト通信を暗号化するための鍵を生成する処理を実行しないで、前記第1の周波数チャネルで生成した前記第1の鍵を、前記第2の周波数チャネルの通信を暗号化する鍵として前記通信装置と前記他の通信装置との間で共有する第2の共有工程と、
前記通信装置によって生成され、前記第2の周波数チャネルを用いたブロードキャスト通信またはマルチキャスト通信を暗号化するための鍵である第2の鍵を、前記他の通信装置との間で実行する第2の鍵共有処理によって共有する第3の共有工程と、
を有することを特徴とする通信方法。 - コンピュータを請求項1から13の何れか1項に記載の通信装置の各手段として機能させるためのプログラム。
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202180039346.0A CN115699832A (zh) | 2020-06-03 | 2021-05-27 | 通信装置、通信方法和程序 |
KR1020227041193A KR20230007430A (ko) | 2020-06-03 | 2021-05-27 | 통신 장치, 통신 방법 및 프로그램 |
EP21818871.2A EP4164312A4 (en) | 2020-06-03 | 2021-05-27 | COMMUNICATION DEVICE, COMMUNICATION METHOD, AND PROGRAM |
BR112022023822A BR112022023822A2 (pt) | 2020-06-03 | 2021-05-27 | Dispositivo de comunicação, método de comunicação, e programa |
US18/059,884 US20230087387A1 (en) | 2020-06-03 | 2022-11-29 | Communication apparatus, communication method, and storage medium |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2020096833A JP2021190936A (ja) | 2020-06-03 | 2020-06-03 | 通信装置、通信方法およびプログラム |
JP2020-096833 | 2020-06-03 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US18/059,884 Continuation US20230087387A1 (en) | 2020-06-03 | 2022-11-29 | Communication apparatus, communication method, and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021246281A1 true WO2021246281A1 (ja) | 2021-12-09 |
Family
ID=78831128
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2021/020207 WO2021246281A1 (ja) | 2020-06-03 | 2021-05-27 | 通信装置、通信方法およびプログラム |
Country Status (7)
Country | Link |
---|---|
US (1) | US20230087387A1 (ja) |
EP (1) | EP4164312A4 (ja) |
JP (1) | JP2021190936A (ja) |
KR (1) | KR20230007430A (ja) |
CN (1) | CN115699832A (ja) |
BR (1) | BR112022023822A2 (ja) |
WO (1) | WO2021246281A1 (ja) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2012531817A (ja) * | 2009-06-24 | 2012-12-10 | マーベル ワールド トレード リミテッド | 無線マルチバンドのセキュリティ |
JP2018050133A (ja) | 2016-09-20 | 2018-03-29 | キヤノン株式会社 | 通信装置、制御方法、及びプログラム |
JP2020096833A (ja) | 2018-12-14 | 2020-06-25 | グローバス メディカル インコーポレイティッド | 追跡マーカーを備えた手術用ロボットオートメーション |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TW201427361A (zh) * | 2012-08-15 | 2014-07-01 | Interdigital Patent Holdings | 增強致能快速安全性設置 |
KR20140142677A (ko) * | 2013-06-04 | 2014-12-12 | 삼성전자주식회사 | 그룹키 사용하여 무선 도킹 기반 서비스를 위한 방법 및 장치 |
-
2020
- 2020-06-03 JP JP2020096833A patent/JP2021190936A/ja active Pending
-
2021
- 2021-05-27 WO PCT/JP2021/020207 patent/WO2021246281A1/ja unknown
- 2021-05-27 CN CN202180039346.0A patent/CN115699832A/zh active Pending
- 2021-05-27 EP EP21818871.2A patent/EP4164312A4/en active Pending
- 2021-05-27 BR BR112022023822A patent/BR112022023822A2/pt unknown
- 2021-05-27 KR KR1020227041193A patent/KR20230007430A/ko active Search and Examination
-
2022
- 2022-11-29 US US18/059,884 patent/US20230087387A1/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2012531817A (ja) * | 2009-06-24 | 2012-12-10 | マーベル ワールド トレード リミテッド | 無線マルチバンドのセキュリティ |
JP2018050133A (ja) | 2016-09-20 | 2018-03-29 | キヤノン株式会社 | 通信装置、制御方法、及びプログラム |
JP2020096833A (ja) | 2018-12-14 | 2020-06-25 | グローバス メディカル インコーポレイティッド | 追跡マーカーを備えた手術用ロボットオートメーション |
Non-Patent Citations (4)
Title |
---|
HUIZHAO WANG (QUANTENNA, A DIVISION OF ON SEMI): "Multi-Link Security And Aggregation Operations", IEEE DRAFT; 11-19-1963-01-00BE-MULTI-LINK-SECURITY-AND-AGGREGATION-OPERATIONS, IEEE-SA MENTOR, PISCATAWAY, NJ USA, vol. 802.11 EHT; 802.11be, no. 1, 15 January 2020 (2020-01-15), Piscataway, NJ USA , pages 1 - 15, XP068172582 * |
PO-KAI HUANG (INTEL): "Multi-link security consideration", IEEE DRAFT; 11-19-1822-09-00BE-MULTI-LINK-SECURITY-CONSIDERATION, IEEE-SA MENTOR, PISCATAWAY, NJ USA, vol. 802.11 EHT; 802.11be, no. 9, 12 May 2020 (2020-05-12), Piscataway, NJ USA , pages 1 - 17, XP068167867 * |
PO-KAI HUANG (INTEL): "Multi-link setup follow up II", IEEE DRAFT; 11-20-0387-00-00BE-MULTI-LINK-SETUP-FOLLOW-UP-II, IEEE-SA MENTOR, PISCATAWAY, NJ USA, vol. 802.11 EHT; 802.11be, no. 0, 13 March 2020 (2020-03-13), Piscataway, NJ USA , pages 1 - 12, XP068167034 * |
See also references of EP4164312A4 |
Also Published As
Publication number | Publication date |
---|---|
CN115699832A (zh) | 2023-02-03 |
KR20230007430A (ko) | 2023-01-12 |
EP4164312A1 (en) | 2023-04-12 |
BR112022023822A2 (pt) | 2022-12-20 |
JP2021190936A (ja) | 2021-12-13 |
US20230087387A1 (en) | 2023-03-23 |
EP4164312A4 (en) | 2024-04-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5780558B2 (ja) | 無線マルチバンドのセキュリティ | |
KR20080077006A (ko) | 관리 프레임 보호 장치 및 방법 | |
WO2021181972A1 (ja) | 通信装置、通信方法、およびプログラム | |
WO2021131974A1 (ja) | 通信装置、通信方法、およびプログラム | |
CN110115067B (zh) | 用于wlan管理的快速传播的操作信息 | |
WO2020203190A1 (ja) | 通信装置、通信方法、及び、プログラム | |
WO2021246281A1 (ja) | 通信装置、通信方法およびプログラム | |
WO2022091943A1 (ja) | 通信装置、制御方法、およびプログラム | |
WO2022163059A1 (ja) | 通信装置、通信装置の制御方法、およびプログラム | |
WO2021256209A1 (ja) | 通信装置、通信方法及びプログラム | |
WO2022259856A1 (ja) | 通信装置、通信方法、およびプログラム | |
WO2021229950A1 (ja) | 通信装置、制御方法、およびプログラム | |
WO2022259858A1 (ja) | 通信装置、通信方法、およびプログラム | |
JP2022188745A (ja) | 通信装置、通信方法、およびプログラム | |
WO2021131975A1 (ja) | 通信装置、制御方法、およびプログラム | |
KR102685310B1 (ko) | 통신 장치, 제어 방법, 및 기억 매체 | |
WO2021187020A1 (ja) | 通信装置、制御方法、およびプログラム | |
WO2022176384A1 (ja) | 通信装置、制御方法、およびプログラム | |
JP2022188744A (ja) | 通信装置、通信方法、およびプログラム | |
JP2022150563A (ja) | 通信装置、通信方法、およびプログラム | |
CN117441364A (zh) | 通信装置、通信方法及程序 | |
CN117441365A (zh) | 通信装置、通信方法和程序 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21818871 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 20227041193 Country of ref document: KR Kind code of ref document: A |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112022023822 Country of ref document: BR |
|
ENP | Entry into the national phase |
Ref document number: 112022023822 Country of ref document: BR Kind code of ref document: A2 Effective date: 20221123 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2021818871 Country of ref document: EP Effective date: 20230103 |