WO2023082209A1 - 通信方法和站点 - Google Patents
通信方法和站点 Download PDFInfo
- Publication number
- WO2023082209A1 WO2023082209A1 PCT/CN2021/130475 CN2021130475W WO2023082209A1 WO 2023082209 A1 WO2023082209 A1 WO 2023082209A1 CN 2021130475 W CN2021130475 W CN 2021130475W WO 2023082209 A1 WO2023082209 A1 WO 2023082209A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- field
- information
- sta
- protection capability
- frame
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 184
- 238000004891 communication Methods 0.000 title claims abstract description 45
- 238000004422 calculation algorithm Methods 0.000 claims description 105
- 230000015654 memory Effects 0.000 claims description 33
- 238000012790 confirmation Methods 0.000 claims description 32
- 230000004044 response Effects 0.000 claims description 27
- 238000004590 computer program Methods 0.000 claims description 25
- 238000012545 processing Methods 0.000 claims description 20
- 239000000284 extract Substances 0.000 claims description 14
- YLKFDHTUAUWZPQ-UHFFFAOYSA-N N-Nitrosodi-n-propylamine Chemical compound CCCN(N=O)CCC YLKFDHTUAUWZPQ-UHFFFAOYSA-N 0.000 claims 56
- 238000010586 diagram Methods 0.000 description 28
- 230000006870 function Effects 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 6
- 230000001360 synchronised effect Effects 0.000 description 5
- 239000000523 sample Substances 0.000 description 4
- 230000003190 augmentative effect Effects 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 238000013507 mapping Methods 0.000 description 2
- 239000007787 solid Substances 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000005728 strengthening Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
Definitions
- the present application relates to the field of communication, and more particularly, to communication methods and stations.
- identity identifiers such as association identifiers (AID, Association Identifier) in block acknowledgment (BA, Block Ack) frames belong to the user's privacy-related information, and such information has not been effectively protected.
- the embodiment of the present application provides a communication method and a site, which can enhance privacy protection.
- An embodiment of the present application proposes a communication method, including: a first STA receives a block confirmation BA frame, the BA frame carries first information and/or protected privacy-related information, and the first information is used for the protected privacy Relevant information is identified.
- the embodiment of the present application also proposes a communication method, including: the second STA sends a BA frame, and the BA frame carries first information and/or protected privacy-related information, and the first information is used for the protected privacy-related information. information to identify.
- the embodiment of the present application also proposes an STA, including: a first receiving module, configured to receive a BA frame, the BA frame carries first information and/or protected privacy-related information, and the first information is used for the protected to identify privacy-related information.
- the embodiment of the present application also proposes a station STA, including: a first sending module, configured to send a BA frame, where the BA frame carries first information and/or protected privacy-related information, and the first information is used for the Protected privacy-related information is identified.
- An embodiment of the present application provides a site, including a processor and a memory.
- the memory is used to store a computer program
- the processor is used to call and run the computer program stored in the memory, so that the first station executes the above-mentioned communication method.
- An embodiment of the present application provides a chip configured to implement the above communication method.
- the chip includes: a processor, configured to invoke and run a computer program from the memory, so that the device installed with the chip executes the above-mentioned communication method.
- An embodiment of the present application provides a computer-readable storage medium for storing a computer program, and when the computer program is run by a device, the device is made to execute the communication method described above.
- An embodiment of the present application provides a computer program product, including computer program instructions, where the computer program instructions cause a computer to execute the communication method described above.
- An embodiment of the present application provides a computer program that, when running on a computer, causes the computer to execute the communication method described above.
- the privacy-related information by carrying the protected privacy-related information in the BA frame and carrying the first information for identifying the protected privacy-related information, the privacy-related information can be protected during transmission, thereby strengthening privacy protection.
- FIG. 1 is a schematic diagram of an application scenario of an embodiment of the present application.
- FIG. 2 is a schematic diagram of the frame format of the Multi-STA BA frame
- Fig. 3 is a flow chart of implementing a communication method according to an embodiment of the present application.
- Fig. 4 is a flow chart of implementing another communication method according to an embodiment of the present application.
- Fig. 5 is a flow chart of implementing a BA frame protection mechanism according to an embodiment of the present application.
- Fig. 6 is a schematic structural diagram of an association request frame according to an embodiment of the present application.
- Fig. 7 is a schematic structural diagram of another association request frame according to an embodiment of the present application.
- Fig. 8 is a schematic structural diagram of another association request frame according to an embodiment of the present application.
- FIG. 9 is a schematic diagram of a frame format after protecting a Multi-STA BA frame according to the present application.
- Fig. 10 is a schematic diagram of another frame format after protecting the Multi-STA BA frame according to the present application
- Fig. 11 is a schematic diagram of a frame format after a Multi-STA BA frame is protected according to the present application.
- FIG. 12 is a schematic diagram of another frame format after the Multi-STA BA frame is protected according to the present application.
- FIG. 13 is a schematic diagram of another frame format after the Multi-STA BA frame is protected according to the present application.
- FIG. 14 is a schematic diagram of an implementation of encrypting and decrypting a Multi-STA BA frame according to the present application.
- Fig. 15 is a flow chart of implementing another communication method according to an embodiment of the present application.
- Fig. 16 is a schematic structural diagram of an STA according to an embodiment of the present application.
- Fig. 17 is a schematic structural diagram of another STA according to an embodiment of the present application.
- FIG. 18 is a schematic structural diagram of a communication device 1800 according to an embodiment of the present application.
- FIG. 19 is a schematic structural diagram of a chip 1900 according to an embodiment of the present application.
- Wireless Local Area Networks Wireless Local Area Networks, WLAN
- Wireless Fidelity Wireless Fidelity, WiFi
- other communication systems for example: Wireless Local Area Networks (Wireless Local Area Networks, WLAN), Wireless Fidelity (Wireless Fidelity, WiFi) or other communication systems.
- the communication system 100 may include an access point (Access Point, AP) 110, and a station (STATION, STA) 120 accessing a network through the access point 110.
- Access Point Access Point
- STA station
- an AP is also called an AP STA, that is, in a sense, an AP is also a kind of STA.
- STA is also called non-AP STA (non-AP STA).
- the communication in the communication system 100 may be the communication between the AP and the non-AP STA, or the communication between the non-AP STA and the non-AP STA, or the communication between the STA and the peer STA, wherein, the peer STA It can refer to the device that communicates with the STA peer.
- the peer STA may be an AP or a non-AP STA.
- the AP is equivalent to a bridge connecting the wired network and the wireless network. Its main function is to connect various wireless network clients together, and then connect the wireless network to the Ethernet.
- the AP device can be a terminal device (such as a mobile phone) or a network device (such as a router) with a WiFi chip.
- the role of the STA in the communication system is not absolute.
- the mobile phone when the mobile phone is connected to the router, the mobile phone is a non-AP STA, and when the mobile phone is used as a hotspot for other mobile phones, the mobile phone acts as an AP. .
- AP and non-AP STA can be applied to the equipment in the Internet of Vehicles, IoT nodes and sensors in the Internet of Things (IoT), smart cameras in smart homes, smart remote controls, smart water meters, etc. And sensors in smart cities, etc.
- IoT Internet of Things
- the non-AP STA can support the 802.11be standard.
- the non-AP STA can also support 802.11ax, 802.11ac, 802.11n, 802.11g, 802.11b, and 802.11a and other current and future wireless local area networks (wireless local area networks, WLAN) standards of the 802.11 family.
- 802.11ax, 802.11ac, 802.11n, 802.11g, 802.11b, and 802.11a and other current and future wireless local area networks (wireless local area networks, WLAN) standards of the 802.11 family.
- WLAN wireless local area networks
- the AP may be a device supporting the 802.11be standard.
- the AP may also be a device supporting multiple current and future WLAN standards of the 802.11 family, such as 802.11ax, 802.11ac, 802.11n, 802.11g, 802.11b, and 802.11a.
- the STA may be a mobile phone (Mobile Phone), tablet computer (Pad), computer, virtual reality (Virtual Reality, VR) device, augmented reality (Augmented Reality, AR) device, Wireless devices in industrial control, set-top boxes, wireless devices in self driving, vehicle communication devices, wireless devices in remote medical, wireless devices in smart grid , wireless devices in transportation safety, wireless devices in smart city or wireless devices in smart home, wireless communication chips/ASIC/SOC/etc.
- the frequency bands supported by the WLAN technology may include but not limited to: low frequency bands (eg 2.4GHz, 5GHz, 6GHz) and high frequency bands (eg 60GHz).
- low frequency bands eg 2.4GHz, 5GHz, 6GHz
- high frequency bands eg 60GHz
- FIG. 1 exemplarily shows one AP STA and two non-AP STAs.
- the communication system 100 may include multiple AP STAs and other numbers of non-AP STAs. This embodiment of the present application does not include Do limited.
- the "indication" mentioned in the embodiments of the present application may be a direct indication, may also be an indirect indication, and may also mean that there is an association relationship.
- a indicates B which can mean that A directly indicates B, for example, B can be obtained through A; it can also indicate that A indirectly indicates B, for example, A indicates C, and B can be obtained through C; it can also indicate that there is an association between A and B relation.
- the term "corresponding" may indicate that there is a direct or indirect correspondence between the two, or that there is an association between the two, or that it indicates and is indicated, configuration and is configuration etc.
- STA is a station in a wireless network.
- a STA can be used as a central node of a wireless network, that is, an access point (AP, Access Point), or as a node connected to a wireless network, that is, a non-AP-STA.
- AP access point
- non-AP-STA the STA serving as a non-AP-STA
- AP the STA serving as AP
- AP the STA serving as AP for short.
- the privacy-related information involved in this application includes the identity identifier information of the STA, such as the association identifier (AID, association identifier) of the STA.
- AID association identifier
- the STA When the STA is associated with the AP, the STA obtains its own AID from the AP. When the AP subsequently sends a control frame (such as a BA frame) to the STA, it carries information to be sent to the STA, and the information includes the AID of the STA. In this way, when the STA receives the control frame, if it recognizes that the AID in the information is the same as or corresponds to its own AID, it can determine that the information is sent to itself by the AP, and then extracts the information and performs subsequent processing.
- a control frame such as a BA frame
- FIG. 2 is a schematic diagram of the frame format of a Multi-STA BA frame.
- a Multi-STA BA frame includes a MAC header, a BA Control (BA Control) field, and a BA Information (BA Information ) field and frame check sequence (FCS, Frame Check Sequence).
- the BA Information field contains one or more information (Per AID TID Info) fields identified by association identifier (AID) and traffic identifier (TID, Traffic Identifer) tuples, and each single association identifier traffic identifier
- the information (Per AID TID Info) field corresponds to a ⁇ AID, TID> tuple.
- the Per AID TID Info field includes the AID TID Information (AID TID Info) field, the Block Ack Starting Sequence Control (Block Ack Starting Sequence Control) field and the Block Ack Bitmap (Block Ack Bitmap) field, where the AID TID Info field contains the AID11 field , the length of the AID11 field is 11 bits (bit), and is used to carry the AID of the STA.
- the Multi-STA BA frame sent by the AP can contain information that needs to be sent to multiple STAs.
- the information of different STAs is carried in different Per AID TID Info fields, and the Per AID TID Info field It carries the AIDs of different STAs, which is used to identify which STA the Per AID TID Info field corresponds to.
- the STA After the STA receives the Multi-STA BA frame, it compares its own AID with the AID carried in each Per AID TID Info field.
- the STA can determine The information in the Per AID TID Info field (such as Ack Type, TID, Block Ack Bitmap, etc.) is for oneself, so the information is extracted and processed later.
- the information in the Per AID TID Info field (such as Ack Type, TID, Block Ack Bitmap, etc.) is for oneself, so the information is extracted and processed later.
- the frame bodies of control frames such as Multi-STA BA frames are not encrypted, and identity identifier information such as STA's AID (identity identifier information is a kind of privacy-related information) is easily tracked by illegal users and easily leaked.
- identity identifier information is a kind of privacy-related information
- the mapping relationship between user AID and MAC address can also reveal whether the user is in the current area.
- the AID and parameter information in the frame may also leak information such as the traffic consumption of the user's ongoing business, which greatly threatens user privacy. Therefore, for control frames carrying unencrypted identity identifier information such as AID and related parameter information, it will lead to serious privacy exposure problems, such as the effective tracking of users through the mapping relationship between AID and MAC address.
- Fig. 3 is a flow chart of implementing a communication method according to an embodiment of the present application, and the method includes at least part of the following content:
- the first STA receives a BA frame, where the BA frame carries first information and/or protected privacy-related information, where the first information is used to identify the protected privacy-related information.
- the above-mentioned BA frame may include a Multi-STA BA frame.
- the aforementioned privacy-related information may include an AID.
- the first STA may receive a Multi-STA BA frame from a second STA (such as an AP), the Multi-STA BA frame carries information for multiple STAs, and the information for different STAs includes the information of the corresponding STA. Protected AID and first information.
- the protected AID may include the ciphertext obtained after encrypting the AID, the summary information obtained after using the information digest algorithm to calculate the AID, the ciphertext obtained after encrypting the AID and other information, and/or the use of information
- the summary algorithm is the summary information obtained after the operation of the AID and other information;
- the first information may include the encryption and/or information summary algorithm used for the aforementioned processing of the AID, so that the first STA can perform an operation on the protected AID. identify.
- the first STA recognizes that a certain protected AID is consistent with its own AID, it can determine that the part of the Multi-STA BA frame containing the protected AID is sent to itself, so it extracts the part of the content and carry out subsequent processing.
- the first STA and the second STA may declare their own protection capabilities for the BA frame, as shown in FIG. 4 , which is a flow chart of another communication method according to an embodiment of the present application. Before the above step S310, it may further include:
- the first STA sends protection capability information of the first STA for the BA frame.
- the first STA receives protection capability information of the second STA for the BA frame.
- step S410 and step S420 have no execution sequence requirement, and any step may be executed first, and may also be executed synchronously.
- the above-mentioned first STA may be a non-AP STA
- the second STA may be an AP.
- each STA sends its own protection capability information for BA frames to the AP, such as announcing that it has the ability to identify the protected AID; the AP sends its own information to each STA.
- the protection capability information of the BA frame such as declaring that it has the ability to protect the AID (such as supporting the encryption of the AID and/or processing the AID by using an information digest algorithm).
- the first STA may also perform key negotiation with the second STA to generate a key.
- the key can be used to encrypt, decrypt, and calculate summary information on the AID.
- the step of performing key agreement has no execution sequence requirement with the above-mentioned steps S410 and S420, and it only needs to complete the key agreement before step S310.
- Fig. 5 is the implementation flowchart of a kind of BA frame protection mechanism according to the embodiment of the present application, in Fig. 5, the above-mentioned first STA is specifically STA, the second STA is specifically AP, and BA frame is specifically Multi-STA, and BA frame is specifically An example is introduced, including the following procedures:
- Scanning stage and authentication stage These two stages are consistent with the traditional IEEE802.11 process. Including: the AP sends a beacon frame (Beacon) to the STA, the STA sends a probe request frame (Probe Request) to the AP, and the AP returns a probe response frame (Probe Response) to the STA.
- Beacon beacon frame
- Probe Request probe request frame
- Probe Response probe response frame
- the above three steps are optional steps for STA discovery APs in a wireless network. It also includes: the STA and the AP send authentication frames (Authentication) to each other to complete the authentication.
- association phase In the association phase, the STA and the AP can declare their respective protection capabilities for BA frames.
- association Request Association Request
- the AP can protect the Multi-STA BA frame according to the capabilities announced by itself and the STA, such as encrypting the Multi-STA BA frame in the Multi-STA BA frame AID or generate an AID summary (for example, use a Hash algorithm to generate an AID summary).
- the STA uses the key to identify whether the protected AID sent by the AP is consistent with its own AID, and if they are consistent, determine the part of the Multi-STA BA frame that contains the protected AID If the content is sent to the STA, the STA can extract this part of the content and perform subsequent processing.
- the Multi-STA BA frame can contain the information sent by the AP to multiple STAs, the information corresponding to different STAs can carry the protected AID of the STA.
- the STA can compare whether its own AID is consistent with each protected AID in the Multi-STA BA frame. If the protected AID with the same comparison result is found, the STA can determine that the part of the information carrying the protected AID in the Multi-STA BA frame belongs to itself, so it extracts this part of the information and processes it;
- the protected AIDs indicate that the part containing these protected AIDs does not belong to itself (it may be that the AP needs to send to other STAs), so the STA does not process this part of information.
- some STAs may have the ability to support the BA frame protection mechanism, while other STAs may not have the ability to support the BA frame protection mechanism (hereinafter referred to as the BA frame protection capability).
- the BA frame protection capability when the AP sends a Multi-STA BA frame, it can protect the AID of the STA with the protection capability of the BA frame, and carry the protected AID of the STA in the Multi-STA BA frame; The AID of the STA with the protection capability of the BA frame is not protected, and the AID of the STA is carried in the Multi-STA BA frame.
- Symmetric encryption algorithm and/or asymmetric encryption algorithm can be used, such as Advanced Encryption Standard (AES, Advanced Encryption Standard) 128 algorithm, AES192 algorithm, AES256 algorithm, Elliptic Curve Cryptography (ECC, Elliptic Curves Cryptography) p256 algorithm, ECC p384 algorithm etc.
- Message digest algorithms can also be used, such as hash (Hash) algorithm, hash-based message authentication code algorithm (HMAC, Hash-based Message Authentication Code) algorithm, encrypted block chaining message authentication code (Cipher-block chaining-MAC, CBC -MAC) algorithm, Galois message authentication code (GMAC, Galois message authentication code mode) algorithm, etc.
- HMAC hash-based message authentication code algorithm
- Cipher-block chaining-MAC Cipher-block chaining-MAC, CBC -MAC
- Galois message authentication code GMAC, Galois message authentication code mode
- This application can use the aforementioned encryption algorithm or message encryption algorithm to protect the AID, and can also use the encryption algorithm and message digest algorithm to protect the AID.
- the AP first encrypts the AID with an encryption algorithm to generate the ciphertext of the AID, and then uses the message digest algorithm to calculate the AID and other information (or the ciphertext of the AID and other information) to generate summary information; The text, summary information and other information mentioned above are carried in the Multi-STA BA frame and sent.
- the STA After receiving the Multi-STA BA frame, the STA decrypts the ciphertext of the AID to obtain the plaintext of the AID, and checks whether the plaintext of the AID is consistent with its own AID; and uses the same message digest algorithm to process the same data (i.e. AID and other information, or AID ciphertext and other information) to calculate, generate summary information, and judge whether the summary information is consistent with the received summary information; if the two judgments are consistent, identify the AID indicated The information is their own.
- the same data i.e. AID and other information, or AID ciphertext and other information
- the message digest algorithm can prevent the message from being tampered with, compared with the way of using the encryption algorithm to protect the AID, the method of using the message digest algorithm to protect the AID, or using both the encryption algorithm and the message digest algorithm to protect the AID
- the method can prevent STAs from making mistakes in identifying the AID and attacks from attackers in the network.
- this application can use the Association Request and Association Response frames to declare their ability to support the Multi-STA BA frame protection mechanism by the STA and the AP respectively during the association phase.
- the first STA may further include: the first STA sends the protection capability information of the first STA for the BA frame.
- the first STA may be a non-AP STA (hereinafter referred to as STA).
- the first STA may send the protection capability information of the first STA to the BA frame to the second STA (such as an AP).
- the protection capability information of the first STA to the BA frame is sent in the association request (Association Request) frame sent by the first STA. and/or carried in authentication frames.
- a new field is added in the association request frame and/or the authentication frame, which is used to carry the protection capability information of the first STA for the BA frame.
- the association request frame and/or the authentication frame includes a first protection capability information field
- the first protection capability information field includes a protection capability field of the first BA frame
- the protection capability field of the first BA frame carries the first STA pair BA Protection capability information of the frame.
- the newly added first protection capability information field may also include at least one of the protection capability field of the first trigger frame (Trigger) and the protection capability field of the first NDPA (Null Data Packet Announcement) item; among them,
- the protection capability field of the first trigger frame may carry the protection capability information of the first STA for the trigger frame;
- the protection capability field of the first NDPA may carry the protection capability information of the first STA for the NDPA.
- FIG. 6 is a schematic structural diagram of an association request frame according to an embodiment of the present application.
- the association request frame includes: MAC header, newly added encryption capability information field (Encryption Capability Information Element field) and FCS field.
- the MAC header includes a frame control (Frame Control) field (the length can be 2 bytes), a duration (Duration) field (the length can be 2 bytes), an address 1 (Address 1) field (the length can be 6 bytes) ), Address 2 field (length can be 6 bytes), Address 3 field (length can be 6 bytes), sequence control (Sequence Control) field, HT control field (HT Control) (length can be 0 or 4 bytes )wait.
- the length of the newly added Encryption Capability Information Element field is variable, and it carries the protection capability information of the first STA for the BA frame.
- the protection capability mainly refers to the encryption capability, and the related protection capability field is also called the encryption capability field; this application does not limit the specific method of protection, which may include encryption and/or the use of information digest algorithms to generate summary information .
- the newly added first protection capability information field may also include a first element identification field, which may carry a specified element identification value, which belongs to the reserved value of the current element identification value and is used to identify the first protection A capability information field; wherein, the reserved value may refer to a reserved value in a published standard, and for a device that complies with the published standard, the reserved value is a value that will not be processed.
- the newly added Encryption Capability Information Element field may include an element identification (Element ID) field (the length can be 1 byte), a length (Length) field (the length can be 1 byte) ) and information (Information) field (variable length).
- the Element ID field carries element identification values that are currently reserved values, such as 2, 4, 8, 9, 17-31, 47, 49, 77, 103, 128-129, 133-136, 149-150, 155- Any value among 156, 165, 173, 176, 178-180, 203, 218-219, 227, 238, 243, 245-254, used to identify the field to which the Element ID field belongs is the newly added Encryption Capability Information Element field.
- the Information field of the Encryption Capability Information Element field may include a Multi-STA BA frame encryption capability (Multi-STA BA Encryption Enabled) field (length may be 1 bit), which is used to carry the first STA pair of Multi-STA BA Encryption Enabled
- the protection capability information of the STA BA frame may further include the trigger frame encryption capability (Trigger Encryption Enabled) field and/or the NDPA encryption capability (NDPA Encryption Enabled) field, which is used to carry the protection capability information of the first STA to the trigger frame and protection capability information to the NDPA.
- the Information field shown in Figure 6 includes the aforementioned three capability fields, but this application does not limit this, and the Information field may include one or more of the aforementioned three capability fields to carry the corresponding protection capacity information.
- a new field is added in the association request frame and/or the authentication frame, which is used to carry the protection capability information of the first STA for the BA frame.
- the association request frame and/or authentication frame includes a first protection capability information field
- the first protection capability information field includes the protection capability field of the first BA frame
- the protection capability field of the first BA frame carries the first STA pair BA Protection capability information of the frame.
- the newly added first protection capability information field may also include at least one of the protection capability field of the first trigger frame (Trigger) and the protection capability field of the first null data packet declaration (NDPA); wherein,
- the protection capability field of the first trigger frame may carry the protection capability information of the first STA for the trigger frame;
- the protection capability field of the first NDPA may carry the protection capability information of the first STA for the NDPA.
- FIG. 7 is a schematic structural diagram of another association request frame according to an embodiment of the present application.
- the association request frame includes: MAC header, newly added encryption capability information field (Encryption Capability Information Element field) and FCS field.
- the MAC header includes a frame control (Frame Control) field (the length can be 2 bytes), a duration (Duration) field (the length can be 2 bytes), an address 1 (Address 1) field (the length can be 6 bytes) ), Address 2 field (length can be 6 bytes), Address 3 field (length can be 6 bytes), sequence control (Sequence Control) field, HT control field (HT Control) (length can be 0 or 4 bytes )wait.
- the length of the newly added Encryption Capability Information Element field is variable, and it carries the protection capability information of the first STA for the BA frame.
- the protection capability mainly refers to the encryption capability, and the related protection capability field is also called the encryption capability field; this application does not limit the specific method of protection, which may include encryption and/or the use of information digest algorithms to generate summary information .
- the newly added first protection capability information field may further include a second element identification field and a first element identification extension field.
- the value of the second element identification field is 255; the first element identification extension field carries a first element extension identification value, and the first element extension identification value is used to identify the first protection capability information field; the first element Extended Identity Values can extend identity values for elements that are currently reserved values.
- the newly added Encryption Capability Information Element field can include an element identification (Element ID) field (the length can be 1 byte), a length (Length) field (the length can be 1 byte) ), Element ID Extension (Element ID Extension) field (length can be 1 byte) and information (Information) field (length is variable).
- the value of the Element ID field is 255
- the Element ID Extension field carries the element extension identification value whose target is a reserved value, such as 0, 32, 35-39, 41-43, 45-51, 55, 57-87, 94 Any value in -255 is used to identify the field to which the Element ID field and the Element ID Extension field belong to is the newly added Encryption Capability Information Element field.
- the Information field in the Encryption Capability Information Element field in Figure 7 is the same as the Information field in Figure 6, and will not be repeated here.
- a new field is added in the original Extended Capability Element (Extended Capability Element) in the association request frame and/or authentication frame, which is used to carry the protection capability information of the first STA for the BA frame.
- the association request frame and/or the association authentication frame includes a first extended capability field
- the first extended capability field includes a protection capability field of the second BA frame
- the protection capability field of the second BA frame carries the protection capability field of the BA frame by the first STA. capability information.
- the original extended capability field (Extended Capability Element), which are used to carry the protection capability of the first STA for the trigger frame and/or the protection capability for NDPA.
- the first extended capability field further includes at least one of the protection capability field of the second trigger frame and the protection capability field of the second NDPA; wherein,
- the protection capability field of the second trigger frame carries the protection capability information of the first STA for the trigger frame
- the protection capability field of the second NDPA carries the protection capability information of the first STA for the NDPA.
- the protection capability field of the second BA frame, the protection capability field of the second trigger frame or the protection capability field of the second NDPA occupies the first position of the first extended capability field.
- the above-mentioned first extended capability field may further include a third element identification field for identifying the first extended capability field.
- FIG. 8 is a schematic structural diagram of another association request frame according to an embodiment of the present application.
- the association request frame includes: MAC header, Extended Capability Element field, x field (Element x), y field (Element y), etc.
- the Extended Capability Element field has a variable length and carries the protection capability information of the first STA for the BA frame, and may also carry the protection capability information of the first STA for the trigger frame and/or the protection capability information of the first STA for the NDPA.
- the protection capability mainly refers to the encryption capability, and the related protection capability field is also called the encryption capability field; this application does not limit the specific method of protection, which may include encryption and/or the use of information digest algorithms to generate summary information .
- the value of the third element identification field in the Extended Capability Element field is 127, and the Multi-STA BA encryption capability field (Multi-STA BA Encryption Enabled) field, trigger frame encryption
- the capability field (Trigger Encryption Enabled) field and the NDPA encryption capability (NDPA Encryption Enabled) field are respectively used to carry the protection capability information of the first STA for the BA frame, the protection capability information for the trigger frame, and the protection capability information for the NDPA.
- a field can occupy any first position, such as B5, B35, B59, B76–B79, B83, B86, B88-Bn, or a newly added bit.
- the first position can refer to a reserved bit in a published standard.
- Figure 8 takes the selection of B88, B89, and B90 as an example.
- the Extended Capability Element field shown in Figure 8 includes the aforementioned three encryption capability fields, but this application does not limit this, and the Extended Capability Element field may include one or more of the aforementioned three encryption capability fields. Multiple types, to carry the corresponding encryption capability information.
- the implementation manner of carrying the protection capability information of the STA for the BA frame in the association request frame and/or the authentication frame sent by the first STA (such as the STA) is introduced above.
- This application may also use an Association Response (Association Response) frame or an authentication frame to carry the protection capability information of the second STA (such as an AP) for the BA frame.
- the specific frame structure can refer to the frame structure proposed by the above three methods, that is, replace the Association Request frame in the above three methods with the Association Response frame to carry the protection capability information of the AP; the specific frame structure is the same as the above Figure 6-8 The frame structures shown are the same, and will not be repeated here.
- the AP may send the STA carrying the first information and the protected privacy-related information to the STA, where the first information is used to identify the protected privacy-related information .
- the above BA frame includes a BA information field
- the BA information field includes at least one first protection field
- the first protection field includes the first Per AID TID Info field
- the first Per AID TID Info field carries the above-mentioned first information and protected privacy-related information.
- the first information above may include at least one of the following: encryption algorithm information and/or message digest algorithm information;
- First indication information where the first indication information is used to indicate whether the first protection field includes the second Per AID TID Info field.
- the above-mentioned second Per AID TID Info field carries at least one of BA bitmap (Block Ack Bitmap), acknowledgment type (Ack Type) and TID.
- the above-mentioned second Per AID TID Info field may refer to the Per AID TID Info field contained in the BA information field of the original Multi-STA BA frame.
- the AP When the AP protects the BA frame, it needs to consider the compatibility of the BA frame with the traditional station (Legacy-STA), that is, the device that complies with the published standard.
- This application mainly modifies the frame body part of the BA frame.
- the protected Multi-STA BA frame includes a MAC header, BA Control field, Duration field, RA field, TA field, BA information (BA Information) field, FCS field, etc.
- the BA Information field includes one or more first protection fields, such as the new Per AID TID Info field (New Per AID TID Info field) in FIG. 9 .
- the New Per AID TID Info field is composed of the first Per AID TID Info field and the second Per AID TID Info field; for example, the first Per AID TID Info field can be the Per AID TID encrypted information field (Per AID TID in Figure 9 AID TID Encrypted Info field), the second Per AID TID Info field can be the original Per AID TID information field (Per AID TID Original Info field) in Figure 9.
- the Per AID TID Encrypted Info field is used to carry the protected AID
- the Per AID TID Original Info is used to carry the Block Ack Starting Sequence Control and Block Ack Bitmap information in the original Per AID TID field.
- a specific design of the position and frame format of Per AID TID Encrypted Info and Per AID TID Original Info in the frame is shown in Figure 9:
- the first Per AID TID Info field includes a protection information field and a protected AID field; wherein,
- the protection information field carries encryption algorithm information and/or message digest algorithm information
- the protected AID field carries protected privacy-related information.
- the first Per AID TID Info field may also include a block confirmation start sequence control field, and the block confirmation start sequence control field is used to indicate the sum of the length of the protection information field and the length of the protected AID field.
- the information protection field included in the above-mentioned first Per AID TID Info field may be included in the first AID TID information field of the first Per AID TID Info field.
- the information contained in the first Per AID TID Info field The included Block Ack Start Sequence Control field may be used to indicate the length of the AID field to be protected.
- the first Per AID TID Info field in this application can carry the first AID value, which is used to identify the first Per AID TID Info field; wherein, the first AID value belongs to the reserved AID value in the published standard, and for devices complying with the published standard, the reserved AID value belongs to the value that is not processed.
- the second Per AID TID Info field in this application can carry a second AID value, and the second AID value is used to identify the second Per AID TID Info field; wherein, the second AID value belongs to the reserved AID value in the published standard , for devices conforming to the published standard, the reserved AID value is a value that is not processed.
- the above-mentioned second AID value may be the same as or different from the first AID value.
- the first Per AID TID Info field in the first Per AID TID Info field (i.e. the Per AID TID Encrypted Info field in Figure 9) (i.e. in the Per AID TID Encrypted Info field) AID11 field) carries the first AID value, such as 2038, 2039, or 2047 or any value in 2008-2044, which is used to indicate that the Per AID TID Info field is the Per AID TID Encrypted Info field.
- the Per AID TID Encrypted Info field includes four parts: the AID TID Info field, the Block Ack Starting Sequence Control field, the Encryption Information field, and the Encrypted AID field.
- the Block Ack Starting Sequence Control field can indicate the sum of the length of the Encryption Information field and the length of the Encrypted AID field.
- the Encryption Information field can carry the encryption method (Encryption Method), and/or the ciphertext length (Encryption Length), and/or the Origin BA Info indication; wherein, the Origin BA Info indication can be used to indicate Whether to include the Per AID TID Original Info field after the Per AID TID Encrypted Info field; the Encrypted AID field may include an Encrpted Contents field for carrying the encrypted ciphertext of the AID, and may also include a padding (Padding) field.
- Encryption Method Encryption Method
- Encryption Length Encryption Length
- the Origin BA Info indication can be used to indicate Whether to include the Per AID TID Original Info field after the Per AID TID Encrypted Info field
- the Encrypted AID field may include an Encrpted Contents field for carrying the encrypted ciphertext of the AID, and may also include a padding (Padding) field.
- the STA After reading the AID TID Info field in the Per AID TID Info field, the STA with the ability to protect the BA frame finds that the AID TID Info field carries the first AID value, and can determine that the Per AID TID Info field is the Per AID TID Encrypted Info field; Afterwards, the STA judges whether the protected AID carried in the Per AID TID Encrypted Info field is consistent with its own AID.
- the Legacy-STA After reading the AID TID Info field in the Per AID TID Info field, the Legacy-STA that does not have the ability to protect BA frames finds that the first AID value carried by the AID TID Info field cannot be valid within the range of 1-2007 AID, indicating that the Per AID TID Info field is not information that the Legacy-STA is capable of processing, then the Legacy-STA will ignore the subsequent corresponding information according to the length indicated in the Block Ack Starting Sequence Control (that is, the information in the Encryption Information field and the Encrypted AID field Information).
- the sum of the lengths of the Encryption Information and Encrypted AID fields should be selected according to the output length requirements of the encryption algorithm (this length is indicated in the Block Ack Starting Sequence Control field), and the sum of the lengths of the Encryption Information and Encrypted AID fields can be 4 , 8, 16, 32, 64 or 128 bytes.
- the length of the Encryption Information field is 2 bytes
- the length of the Encrypted AID field can be 2, 6, 14, 30, 62 or 126 bytes.
- the length of the ciphertext is an integer multiple of 128 bits (i.e.
- the minimum length of the Encrpted Contents field carrying the ciphertext is 16 bytes, in order to satisfy
- the length requirement of the Encrypted AID field can be a padding (Padding) field (that is, B in FIG. 9 ) with a length of 14 bytes.
- the receiving end can judge the length of Encrypted Contents according to the encryption method (Encryption Method) and/or ciphertext length (Encryption Length) in the Encryption Information, so that the Padding field can be ignored.
- the AP uses the second included AID (such as 2038, 2039, or 2047 or any value in 2008-2044) to indicate that the subsequent Per AID TID Info field is the Per AID TID Original Info field, which includes the original Per AID TID Info field
- the STA capable of protecting BA frames recognizes that the protected AID in the Per AID TID Encrypted Info field is consistent with its own AID, after reading the AID TID Info field in the next Per AID TID Info field, if it finds The AID TID Info field carries the second AID value, and it can be determined that the Per AID TID Info field is the Per AID TID Original Info field, and the STA can read the information in the Per AID TID Original Info field.
- the Legacy-STA After reading the AID TID Info field in the Per AID TID Original Info field, the Legacy-STA that does not have the ability to protect BA frames finds that the second AID value carried by the AID TID Info field cannot correspond to the range of 1-2007 If the AID is valid, the Legacy-STA will ignore the subsequent corresponding information (that is, the information in the Block Ack Bitmap field) according to the length indicated in the Block Ack Starting Sequence Control.
- the above-mentioned first AID value and the second AID value may be the same or different. If the first AID value is different from the second AID value, the STA receiving the Multi-STA BA frame can identify the Per AID TID Encrypted Info field and the Per AID TID Original Info field accordingly.
- the STA receiving the Multi-STA BA frame recognizes the first Per AID TID Info field carrying the reserved AID value, it considers the Per AID TID Info field to be the Per AID TID Encrypted Info field, and according to the first indication information in the Per AID TID Encrypted Info field (such as Origin BA Info indication bit information), determine whether the next Per AID TID Info field carrying the same reserved AID value is Per AID TID Original Info field.
- the Origin BA Info indicator bit when the Origin BA Info indicator bit is set to 1, it means that the next Per AID TID Info field carrying the same reserved AID value is the Per AID TID Original Info field; when the Origin BA Info indicator bit is set to 0, it means that the next Per AID TID Info field carrying the same reserved AID value is The Per AID TID Info field of the AID value is not the Per AID TID Original Info field, but corresponds to the Per AID TID Encrypted Info field of other STAs.
- the Origin BA Info indicator bit when the Origin BA Info indicator bit is set to 0, it means that the next Per AID TID Info field carrying the same reserved AID value is the Per AID TID Original Info field; when the Origin BA Info indicator bit is set to 1, it means that the next Per AID TID Info field carrying the same reserved The Per AID TID Info field of the AID value is not the Per AID TID Original Info field, but corresponds to the Per AID TID Encrypted Info field of other STAs.
- the STA extracts the information in the Per AID TID Original Info field and performs subsequent processing.
- FIG. 10 is a schematic diagram of another frame format after the Multi-STA BA frame is protected according to the present application.
- the value of the AID11 field in the Per AID TID Encrypted Info field in Figure 10 is 2038, which is used to identify the field that the AID11 field belongs to as the Per AID TID Encrypted Info field, which indicates that the subsequent Encryption Information field carries the encryption method (Encryption Method),
- the Encrypted AID field carries the protected AID (such as AID ciphertext).
- the value of the AID11 field in the Per AID TID Original Info field in Figure 10 is 2039 (different from the value of the AID11 field in the aforementioned Per AID TID Encrypted Info field), which is used to identify the field that the AID11 field belongs to as Per AID TID Original
- the Info field indicates that the subsequent Block Ack Starting Sequence Control and Block Ack Bitmap fields carry the Block Ack Starting Sequence Control and Block Ack Bitmap information in the original Per AID TID field.
- the Encryption Information field is included in the AID TID Info field (the Encryption Information field is included in the Per AID TID Original Info field in Figure 9), occupying The position of the original Ack Type field and TID field in the AID TID Info field. Therefore, in the embodiment shown in FIG. 10 , the New Per AID TID Info field must include the Per AID TID Original Info field, and the Per AID TID Original Info field includes the Ack Type field and the TID field. Since the New Per AID TID Info field must include the Per AID TID Original Info field, there is no need to include the Origin BA Info indication in the Encryption Information field.
- FIG. 11 is a schematic diagram of another frame format after the Multi-STA BA frame is protected according to the present application.
- the value of the AID11 field in the Per AID TID Encrypted Info field in Figure 11 is 2038 (or 2047 or any value from 2008 to 2044), which is used to identify the field that the AID11 field belongs to as the Per AID TID Encrypted Info field, which indicates that the subsequent
- the Encryption Information field carries the encryption method (Encryption Method), and the Encrypted AID field carries the protected AID (such as AID ciphertext).
- the value of the AID11 field in the Per AID TID Original Info field in Figure 11 is 2038 (or 2047 or any value from 2008 to 2044, which is the same as the value of the AID11 field in the aforementioned Per AID TID Encrypted Info field).
- the Encryption Information field is included in the AID TID Info field, occupying the original Ack Type field and the position of the TID field in the AID TID Info field, so
- the New Per AID TID Info field must include the Per AID TID Original Info field, and the Per AID TID Original Info field includes the Ack Type field and the TID field. Since the New Per AID TID Info field must include the Per AID TID Original Info field, there is no need to include the Origin BA Info indication in the Encryption Information field.
- the receiving end After the receiving end receives the protected Multi-STA BA frame, if it recognizes that the value of AID11 in the Per AID TID Info field in the BA Information is a reserved AID value (such as the above 2038), it can be considered that the Per AID
- the TID Info field is the Per AID TID Encrypted Info field; if the value of AID11 in the next Per AID TID Info field of the Per AID TID Encrypted Info field is the same (as in 2038 above), it can be considered that the Per AID TID Info field is Per AID TID Info field AID TID Original Info field; the aforementioned Per AID TID Encrypted Info field and Per AID TID Original Info field form a New Per AID TID Info field corresponding to an STA.
- Other contents in the receiving processing mechanism are the same as the receiving mechanism in the example in FIG. 9 , and will not be repeated here.
- FIG. 12 is a schematic diagram of another frame format after the Multi-STA BA frame is protected according to the present application.
- the value of the AID11 field under the Per AID TID Encrypted Info field in Figure 12 is 2038 (or 2047 or any value from 2008 to 2044), which is used to identify the field of the AID11 field as the Per AID TID Encrypted Info field, indicating the subsequent Encryption Info Encryption Method and/or Encryption Length are carried in Encrypted AID, and AID ciphertext is carried in Encrypted AID.
- the value of the AID11 field under the Per AID TID Original Info field be 2039 (or 2047 or any value from 2008 to 2044, which is different from the value of the AID11 field under the aforementioned Per AID TID Encrypted Info field), which is used to identify the AID11
- the field to which the field belongs is the Per AID TID Original Info field, indicating that the subsequent Block Ack Starting Sequence Control and Block Ack Bitmap fields are the Block Ack Starting Sequence Control and Block Ack Bitmap information in the original Per AID TID field.
- the Encryption Information field includes an Encryption Method field, an Encryption Length field, and a reserved (Reserve) field, and the lengths of the three fields can be 3 bits, 8 bits, and 5 bits respectively; where the Encryption Method field is used to carry Encryption algorithm or information digest algorithm information, the Encryption Length field is used to carry the length of the protected AID.
- the receiving processing mechanism in this embodiment is also the same as the receiving mechanism in the example in FIG. 9 , and details are not repeated here.
- FIG. 13 is a schematic diagram of another frame format after the Multi-STA BA frame is protected according to the present application.
- the value of the AID11 field in the Per AID TID Encrypted Info field in Figure 13 is 2038 (or 2039 or 2047 or any value in 2008-2044), which is used to identify the field that the AID11 field belongs to as the Per AID TID Encrypted Info field, that is Indicates that the subsequent Encryption Information field carries the encryption method (Encryption Method), and the Encrypted AID field carries the protected AID (such as AID ciphertext).
- the value of the AID11 field in the Per AID TID Original Info field in Figure 12 is 2038 (or 2039 or 2047 or any value from 2008 to 2044, which is the same as the value of the AID11 field in the aforementioned Per AID TID Encrypted Info field).
- the example shown in Figure 13 is similar to the example shown in Figure 12, the difference is that since the value of the AID11 field in the Per AID TID Original Info field is the same as the value of the AID11 field in the Per AID TID Encrypted Info field, in order to identify the Whether the field after the AID TID Encrypted Info field is the Per AID TID Original Info field, you can add the Origin BA Info indicator bit in the Per AID TID Encrypted Info field.
- the Encryption Information field includes an encryption method (Encryption Method) field and/or a ciphertext length (Encryption Length) field; it also includes an Origin BA Info field, and the Origin BA Info field is used to carry the Origin BA Info indicator bit.
- the Encrypted AID field carries the protected AID (such as AID ciphertext). For example, when the Origin BA Info indicator bit is set to 0, it means that the next Per AID TID Info field carrying the same reserved AID value is the Per AID TID Original Info field; when the Origin BA Info indicator bit is set to 1, it means that the next Per AID TID Info field carrying the same reserved AID value is The Per AID TID Info field of the AID value is not the Per AID TID Original Info field, but corresponds to the Per AID TID Encrypted Info field of other STAs.
- the Origin BA Info indicator bit when the Origin BA Info indicator bit is set to 1, it means that the next Per AID TID Info field carrying the same reserved AID value is the Per AID TID Original Info field; when the Origin BA Info indicator bit is set to 0, it means that the next Per AID TID Info field carrying the same reserved The Per AID TID Info field of the AID value is not the Per AID TID Original Info field, but corresponds to the Per AID TID Encrypted Info field of other STAs.
- the frame structures of various protected Multi-STA BA frames are introduced above.
- the AID can be protected by encryption or information digest algorithm, and the STA receiving the protected Multi-STA BA frame can identify whether the AID in the frame is consistent with its own AID.
- the first STA may further include, in the case that the Per AID TID Info field in the BA frame carries the first AID value, the first STA obtains the Per AID TID Info field carrying the first AID value (such as Extract the first information and protected privacy-related information from the above-mentioned Per AID TID Encrypted Info field);
- the first STA identifies the protected privacy-related information based on the first information.
- the above-mentioned protection methods may include encrypting the AID, or using an information digest algorithm to calculate the AID, or using an information digest algorithm to calculate the AID and other information, or using an information digest algorithm to calculate the ciphertext of the AID, or calculating the AID
- the ciphertext and other information are calculated using the information digest algorithm, or the AID is protected by the aforementioned two or more methods.
- the STA that receives the BA frame can decrypt the AID ciphertext, or use the same information digest algorithm to calculate, so as to determine whether the received AID is consistent with its own AID.
- the first STA identifying the protected privacy-related information based on the first information includes:
- the first STA decrypts the protected privacy-related information by using the encryption algorithm information in the first message, and obtains the plaintext of the privacy-related information;
- the first STA compares the plaintext of the privacy-related information with the first STA's own privacy-related information, and if the comparison results are consistent, it determines that the Per AID TID Info field carrying the first AID value is the first STA corresponding to the first STA. Per AID TID Info field;
- the first STA uses the encryption algorithm information and/or message digest algorithm information in the first information to process the privacy-related information of the first STA itself, and compares the processing result with the protected privacy-related information, In the case that the comparison results are consistent, it is determined that the Per AID TID Info field carrying the first AID value is the first Per AID TID Info field corresponding to the first STA.
- next Per AID TID Info field corresponding to the first Per AID TID Info field of the first STA carries the second AID value
- read the BA bitmap information from the next Per AID TID Info field the first AID value and the second AID value can use different values, so that the STA can identify whether a Per AID TID Info field is a Per AID TID Encrypted Info field or a Per AID TID Info field according to the first AID value and the second AID value.
- AID TID Original Info field can be used, so that the STA can identify whether a Per AID TID Info field is a Per AID TID Encrypted Info field or a Per AID TID Info field according to the first AID value and the second AID value.
- the embodiment of the present application may also include: identifying the first indication information (such as the above-mentioned Origin BA Info indication bit) in the first Per AID TID Info field corresponding to the first STA, indicating the next Per AID TID in the first indication information
- the Info field is the second Per AID TID Info field corresponding to the first STA
- the first AID value and the second AID value may use the same value.
- the STA can use the same information digest algorithm to calculate its own AID and the aforementioned other information when receiving the BA frame to determine Whether the calculation result is consistent with the received result, thereby judging whether the protected AID is its own AID.
- the first STA extracts the second information from the next Per AID TID Info field of the Per AID TID Info field (such as the above-mentioned Per AID TID Encrypted Info field) carrying the first AID value;
- the second information may include a BA bitmap , confirm at least one of the category and TID (such as the information contained in the Per AID TID Original Info field);
- the first STA uses the message digest algorithm information in the first information to process the first STA's own privacy-related information and the above-mentioned second information, compares the processing result with the protected privacy-related information, and if the comparison results are consistent In this case, it is determined that the above-mentioned Per AID TID Info field carrying the first AID value is the first Per AID TID Info field corresponding to the first STA (such as the above-mentioned Per AID TID Encrypted Info field).
- the message digest algorithm is used to calculate the information contained in the AID and Per AID TID Original Info fields, when the AP sends the protected Multi-STA BA frame to the STA, it contains multiple New Per AID TID Info fields, each New Per AID
- the AID TID Info field needs to include the Per AID TID Encrypted Info field and the Per AID TID Original Info field. Since the Per AID TID Original Info field must be included, the Per AID TID Encrypted Info field may not carry the above Origin BA Info indicator.
- the embodiment of the present application may further include: in the case that the Per AID TID Info field in the BA frame carries the first AID value or the second AID value, the first STA ignores carrying the first AID value or the second AID value The Per AID TID Info field.
- the Legacy-STA finds that the Per AID TID Info field in the received BA frame carries the first AID value, it can determine that the Per AID TID Info field is the above Per AID TID Encrypted Info field; if it finds that the received The Per AID TID Info field in the BA frame carries the second AID value, then it can be determined that the Per AID TID Info field is the above-mentioned Per AID TID Original Info field. Because Legacy-STA does not have the protection support capability, it cannot identify the AID in the Per AID TID Encrypted Info field, so ignore the information in the Per AID TID Encrypted Info field indicated by the first AID value, and ignore the subsequent Per AID TID Original Info field.
- the first STA uses the encryption algorithm information in the first message to decrypt the protected privacy-related information to obtain the plaintext of the privacy-related information, which may include:
- the first STA determines valid ciphertext in the protected privacy-related information according to the encryption algorithm information in the first information
- Effective plaintext is extracted from the plaintext information to obtain the plaintext of privacy-related information.
- FIG. 14 is a schematic diagram of an implementation of encrypting and decrypting a Multi-STA BA frame according to the present application.
- Figure 14 takes the AES128 encryption algorithm as an example to perform Padding and/or Tweak on the Multi-STA BA frame.
- the AID text field (11 bits) of the Multi-STA BA frame is less than an integer multiple of 16 bytes.
- Tweak random perturbation
- the Encryption Method in the Encryption Information field can determine that the encryption method is the AES128 algorithm, then it can be determined that the length of the encrypted ciphertext is 16 bytes, and the STA extracts the first 16 bytes of ciphertext information in the Encrypted AID field, ignoring the last 14-byte padding, and then use the key to decrypt the ciphertext to obtain the decrypted plaintext;
- the plaintext after step (1) decrypted has padding or scrambling fields (Padding and Tweak fields), and the STA needs to further extract valid plaintext information.
- the extraction method can be: according to the Type or SubType field in the MAC header, it can be determined that the frame is a Multi-STA BA frame, thereby judging that the encrypted data is AID (its length is 11 bits), in Fig. 14, due to Padding and If the Tweak field is placed at the end, the first 11 bits of the decrypted plaintext can be extracted as an effective AID, and the last 117 bits can be ignored.
- Figure 14 is an example of placing the Padding and Tweak fields after the AID plaintext.
- the Padding and Tweak fields can also be placed before the AID plaintext or in other positions. It is sufficient to agree uniformly in the specific implementation. This application No limit.
- Fig. 15 is a flow chart of implementing another communication method according to an embodiment of the present application, the method includes at least part of the following content:
- the second STA sends a BA frame, where the BA frame carries first information and protected privacy-related information, where the first information is used to identify the protected privacy-related information.
- the above BA frame includes a Multi-STA BA frame.
- the aforementioned privacy-related information includes AID information.
- the above BA frame includes a BA information field
- the BA information field includes at least one first protection field
- the first protection field includes the first Per AID TID Info field
- the first Per AID TID Info field carries the first information and the protected privacy-related information.
- the above first information includes at least one of the following: encryption algorithm information and/or message digest algorithm information;
- First indication information where the first indication information is used to indicate whether the first protection field includes the second Per AID TID Info field.
- the above-mentioned second Per AID TID Info field carries at least one of BA bitmap, Ack Type and TID.
- the above-mentioned first Per AID TID Info field includes a protection information field and a protected AID field; wherein,
- the protection information field carries encryption algorithm information and/or message digest algorithm information
- the protected AID field carries protected privacy-related information.
- the above-mentioned first Per AID TID Info field also includes a block confirmation start sequence control field, and the block confirmation start sequence control field is used to indicate the sum of the length of the protection information field and the length of the protected AID field.
- the above-mentioned first Per AID TID Info field includes a protection information field, including:
- the first Per AID TID Info field includes the first AID TID information field, and the first AID TID information field includes the protection information field.
- the above-mentioned first Per AID TID Info field also includes a block confirmation start sequence control field, and the block confirmation start sequence control field is used to indicate the length of the protected AID field.
- the first Per AID TID Info field above carries a first AID value, and the first AID value is used to identify the first Per AID TID Info field.
- the above-mentioned second Per AID TID Info field carries a second AID value, and the second AID value is used to identify the second Per AID TID Info field.
- the second AID value is the same as or different from the first AID value.
- the above method further includes: the second STA receives the protection capability information of the first STA for the BA frame.
- the protection capability information of the first STA for the BA frame is carried in the association request frame and/or authentication frame received by the second STA.
- the above-mentioned association request frame and/or authentication frame includes a first protection capability information field
- the first protection capability information field includes a protection capability field of the first BA frame
- the protection capability field of the first BA frame carries the first STA pair Protection capability information of the BA frame.
- the above-mentioned first protection capability information field further includes at least one of the protection capability field of the first trigger frame and the protection capability field of the first empty data packet declaration NDPA; wherein,
- the protection capability field of the first trigger frame carries the protection capability information of the first STA for the trigger frame
- the protection capability field of the first NDPA carries the protection capability information of the first STA for the NDPA.
- the above-mentioned first protection capability information field further includes a first element identification field.
- the above-mentioned first element identifier field carries a reserved element identifier.
- the above-mentioned first protection capability information field further includes a second element identification field and a first element identification extension field.
- the value of the above-mentioned second element identification field is 255;
- the first element identifier extension field carries the reserved element extension identifier.
- the above-mentioned association request frame and/or association authentication frame includes a first extended capability field
- the first extended capability field includes a protection capability field of the second BA frame
- the protection capability field of the second BA frame carries the first STA pair BA Protection capability information of the frame.
- the above-mentioned first extended capability field further includes a third element identification field.
- the above-mentioned first extended capability field further includes at least one of the protection capability field of the second trigger frame and the protection capability field of the second NDPA; wherein,
- the protection capability field of the second trigger frame carries the protection capability information of the first STA for the trigger frame
- the protection capability field of the second NDPA carries the protection capability information of the first STA for the NDPA.
- the protection capability field of the second BA frame, the protection capability field of the second trigger frame or the protection capability field of the second NDPA occupies a reserved bit of the first extended capability field.
- the foregoing method further includes: the second STA sending the protection capability information of the second STA for the BA frame.
- the protection capability information of the second STA for the BA frame is carried in the association response frame and/or the authentication frame sent by the second STA.
- the above-mentioned association response frame and/or authentication frame includes a second protection capability information field
- the second protection capability information field includes a protection capability field of the third BA frame
- the protection capability field of the third BA frame carries the second STA pair Protection capability information of the BA frame.
- the above-mentioned second protection capability information field further includes at least one of the protection capability field of the third trigger frame and the protection capability field of the third NDPA; wherein,
- the protection capability field of the third trigger frame carries the protection capability information of the second STA for the trigger frame
- the protection capability field of the third NDPA carries the protection capability information of the second STA for the NDPA.
- the above-mentioned second protection capability information field further includes a fourth element identification field.
- the above-mentioned fourth element identification field carries a second element identification value, and the second element identification value is used to identify the second protection capability information field.
- the above-mentioned second protection capability information field further includes a fifth element identification field and a second element identification extension field.
- the value of the fifth element identification field above is 255;
- the second element identification extension field carries a second element extension identification value, and the second element extension identification value is used to identify the second protection capability information field.
- the above-mentioned association response frame and/or authentication frame includes a second extended capability field
- the second extended capability field includes the protection capability field of the fourth BA frame
- the protection capability field of the fourth BA frame carries the second STA pair BA Protection capability information of the frame.
- the above-mentioned second extended capability field further includes a sixth element identification field.
- the above second extended capability field further includes at least one of the protection capability field of the fourth trigger frame and the protection capability field of the fourth NDPA; wherein,
- the protection capability field of the fourth trigger frame carries the protection capability information of the second STA for the trigger frame
- the protection capability field of the fourth NDPA carries the protection capability information of the second STA for the NDPA.
- the protection capability field of the fourth BA frame, the protection capability field of the fourth trigger frame or the protection capability field of the fourth NDPA occupies the second position of the second extension capability field.
- the foregoing second STA includes an access point AP.
- the above method further includes: the second STA performs key negotiation with the first STA to generate a key.
- FIG. 16 is a schematic structural diagram of an STA according to the embodiment of the present application, including:
- the first receiving module 1610 is configured to receive a block acknowledgment BA frame, where the BA frame carries first information and protected privacy-related information, and the first information is used to identify the protected privacy-related information.
- the above BA frame includes a multi-site Multi-STA BA frame.
- the aforementioned privacy-related information includes an association identifier AID.
- the above BA frame includes a BA information field
- the BA information field includes at least one first protection field
- the first protection field includes the first single association identifier flow identifier information (Per AID TID Info) field;
- the first Per AID TID Info field carries the first information and the protected privacy-related information.
- the above-mentioned first information includes at least one of the following:
- First indication information where the first indication information is used to indicate whether the first protection field includes the second Per AID TID Info field.
- the above-mentioned second Per AID TID Info field carries at least one of BA bitmap, Ack Type and TID.
- the above-mentioned first Per AID TID Info field includes a protection information field and a protected AID field; wherein,
- the protection information field carries encryption algorithm information and/or message digest algorithm information
- the protected AID field carries protected privacy-related information.
- the above-mentioned first Per AID TID Info field also includes a block confirmation start sequence control field, and the block confirmation start sequence control field is used to indicate the sum of the length of the protection information field and the length of the protected AID field.
- the above-mentioned first Per AID TID Info field includes a protection information field, including:
- the first Per AID TID Info field includes the first AID TID information field, and the first AID TID information field includes the protection information field.
- the above-mentioned first Per AID TID Info field also includes a block confirmation start sequence control field, and the block confirmation start sequence control field is used to indicate the length of the protected AID field.
- the first Per AID TID Info field above carries a first AID value, and the first AID value is used to identify the first Per AID TID Info field.
- the above-mentioned second Per AID TID Info field carries a second AID value, and the second AID value is used to identify the second Per AID TID Info field.
- the second AID value is the same as or different from the first AID value.
- the above STA further includes: a first identification module, configured to extract the first AID value from the Per AID TID Info field carrying the first AID value when the Per AID TID Info field in the BA frame carries the first AID value.
- a first identification module configured to extract the first AID value from the Per AID TID Info field carrying the first AID value when the Per AID TID Info field in the BA frame carries the first AID value.
- Information and protected privacy-related information identifying the protected privacy-related information based on the first information.
- the above-mentioned first identification module 1610 is used to:
- the above-mentioned first identification module 1610 is used to:
- the above-mentioned STA also includes: a first reading module, configured to read from the next Per AID TID Info field corresponding to the first STA when the next Per AID TID Info field carries the second AID value. Read the BA bitmap information in the Per AID TID Info field.
- the above-mentioned STA also includes: a second reading module, configured to identify the first indication information in the first Per AID TID Info field corresponding to the first STA, where the first indication information indicates the next Per AID TID Info field In the case of the second Per AID TID Info field corresponding to the first STA, read the BA bitmap information from the second Per AID TID Info field corresponding to the first STA.
- a second reading module configured to identify the first indication information in the first Per AID TID Info field corresponding to the first STA, where the first indication information indicates the next Per AID TID Info field In the case of the second Per AID TID Info field corresponding to the first STA, read the BA bitmap information from the second Per AID TID Info field corresponding to the first STA.
- the above-mentioned first identification module 1610 is used to:
- the second information includes at least one of BA bitmap, confirmation category and TID;
- the message digest algorithm information in the first information to process the privacy-related information of the first STA itself and the second information, compare the processing result with the protected privacy-related information, and if the comparison results are consistent, determine whether to carry
- the Per AID TID Info field of the first AID value is the first Per AID TID Info field corresponding to the first STA.
- the above STA further includes: a third reading module, configured to read the BA bitmap information from the next Per AID TID Info field.
- the above-mentioned first identification module is used for:
- the encryption algorithm information in the first information determine the valid ciphertext in the protected privacy-related information
- Effective plaintext is extracted from plaintext information to obtain the plaintext of privacy-related information.
- the above STA further includes: a second identification module, configured to ignore carrying the first AID value or the second AID when the Per AID TID Info field in the BA frame carries the first AID value or the second AID value Value of the Per AID TID Info field.
- a second identification module configured to ignore carrying the first AID value or the second AID when the Per AID TID Info field in the BA frame carries the first AID value or the second AID value Value of the Per AID TID Info field.
- the above-mentioned STA further includes: a first capability announcement module, configured to send protection capability information of the first STA for the BA frame.
- the protection capability information of the first STA for the BA frame is carried in the association request frame and/or the authentication frame sent by the first STA.
- the above-mentioned association request frame and/or authentication frame includes a first protection capability information field
- the first protection capability information field includes a protection capability field of the first BA frame
- the protection capability field of the first BA frame carries the first STA pair Protection capability information of the BA frame.
- the above-mentioned first protection capability information field further includes at least one of the protection capability field of the first trigger frame and the protection capability field of the first empty data packet declaration NDPA; wherein,
- the protection capability field of the first trigger frame carries the protection capability information of the first STA for the trigger frame
- the protection capability field of the first NDPA carries the protection capability information of the first STA for the NDPA.
- the above-mentioned first protection capability information field further includes a first element identification field.
- the above-mentioned first element identification field carries a first element identification value, and the first element identification value is used to identify the first protection capability information field.
- the above-mentioned first protection capability information field further includes a second element identification field and a first element identification extension field.
- the value of the above-mentioned second element identification field is 255;
- the first element identification extension field carries a first element extension identification value, and the first element extension identification value is used to identify the first protection capability information field.
- the above-mentioned association request frame and/or association authentication frame includes a first extended capability field
- the first extended capability field includes a protection capability field of the second BA frame
- the protection capability field of the second BA frame carries the first STA pair BA Protection capability information of the frame.
- the above-mentioned first extended capability field further includes a third element identification field.
- the above-mentioned first extended capability field further includes at least one of the protection capability field of the second trigger frame and the protection capability field of the second NDPA; wherein,
- the protection capability field of the second trigger frame carries the protection capability information of the first STA for the trigger frame
- the protection capability field of the second NDPA carries the protection capability information of the first STA for the NDPA.
- the protection capability field of the second BA frame, the protection capability field of the second trigger frame or the protection capability field of the second NDPA occupies the first position of the first extended capability field.
- the above-mentioned STA further includes: a second receiving module, configured to receive protection capability information of the second STA for the BA frame.
- the protection capability information of the second STA for the BA frame is carried in the association response frame and/or authentication frame received by the first STA.
- the above-mentioned association response frame and/or authentication frame includes a second protection capability information field
- the second protection capability information field includes a protection capability field of the third BA frame
- the protection capability field of the third BA frame carries the second STA pair Protection capability information of the BA frame.
- the above-mentioned second protection capability information field further includes at least one of the protection capability field of the third trigger frame and the protection capability field of the third NDPA; wherein,
- the protection capability field of the third trigger frame carries the protection capability information of the second STA for the trigger frame
- the protection capability field of the third NDPA carries the protection capability information of the second STA for the NDPA.
- the above-mentioned second protection capability information field further includes a fourth element identification field.
- the above fourth element identification field carries a second element identification value, and the second element identification value is used to identify the second protection capability information field.
- the above-mentioned second protection capability information field further includes a fifth element identification field and a second element identification extension field.
- the value of the fifth element identification field above is 255;
- the second element identification extension field carries a second element extension identification value, and the second element extension identification value is used to identify the second protection capability information field.
- the above-mentioned association response frame and/or authentication frame includes a second extended capability field
- the second extended capability field includes the protection capability field of the fourth BA frame
- the protection capability field of the fourth BA frame carries the second STA pair BA Protection capability information of the frame.
- the above-mentioned second extended capability field further includes a sixth element identification field.
- the above second extended capability field further includes at least one of the protection capability field of the fourth trigger frame and the protection capability field of the fourth NDPA; wherein,
- the protection capability field of the fourth trigger frame carries the protection capability information of the second STA for the trigger frame
- the protection capability field of the fourth NDPA carries the protection capability information of the second STA for the NDPA.
- the protection capability field of the fourth BA frame, the protection capability field of the fourth trigger frame or the protection capability field of the fourth NDPA occupies the second position of the second extension capability field.
- the foregoing second STA includes an access point AP.
- the above STA further includes: a first key negotiation module, configured to perform key negotiation with the second STA to generate a key.
- a first key negotiation module configured to perform key negotiation with the second STA to generate a key.
- FIG. 17 is a schematic structural diagram of another STA according to the embodiment of the present application, including:
- the first sending module 1710 is configured to send a BA frame, where the BA frame carries first information and protected privacy-related information, and the first information is used to identify the protected privacy-related information.
- the above BA frame includes a multi-site Multi-STA BA frame.
- the foregoing privacy-related information includes association identifier AID information.
- the above BA frame includes a BA information field
- the BA information field includes at least one first protection field
- the first protection field includes the first Per AID TID Info field
- the first Per AID TID Info field carries the first information and the protected privacy-related information.
- the above-mentioned first information includes at least one of the following:
- First indication information where the first indication information is used to indicate whether the first protection field includes the second Per AID TID Info field.
- the above-mentioned second Per AID TID Info field carries at least one of BA bitmap, Ack Type and TID.
- the above-mentioned first Per AID TID Info field includes a protection information field and a protected AID field; wherein,
- the protection information field carries encryption algorithm information and/or message digest algorithm information
- the protected AID field carries protected privacy-related information.
- the above-mentioned first Per AID TID Info field also includes a block confirmation start sequence control field, and the block confirmation start sequence control field is used to indicate the sum of the length of the protection information field and the length of the protected AID field.
- the above-mentioned first Per AID TID Info field includes a protection information field, including:
- the first Per AID TID Info field includes the first AID TID information field, and the first AID TID information field includes the protection information field.
- the above-mentioned first Per AID TID Info field also includes a block confirmation start sequence control field, and the block confirmation start sequence control field is used to indicate the length of the protected AID field.
- the first Per AID TID Info field above carries a first AID value, and the first AID value is used to identify the first Per AID TID Info field.
- the above-mentioned second Per AID TID Info field carries a second AID value, and the second AID value is used to identify the second Per AID TID Info field.
- the second AID value is the same as or different from the first AID value.
- the above STA further includes: a third receiving module, configured to receive protection capability information of the first STA for the BA frame.
- the protection capability information of the first STA for the BA frame is carried in the association request frame and/or authentication frame received by the third receiving module.
- the above-mentioned association request frame and/or authentication frame includes a first protection capability information field
- the first protection capability information field includes a protection capability field of the first BA frame
- the protection capability field of the first BA frame carries the first STA pair Protection capability information of the BA frame.
- the above-mentioned first protection capability information field further includes at least one of the protection capability field of the first trigger frame and the protection capability field of the first empty data packet declaration NDPA; wherein,
- the protection capability field of the first trigger frame carries the protection capability information of the first STA for the trigger frame
- the protection capability field of the first NDPA carries the protection capability information of the first STA for the NDPA.
- the above-mentioned first protection capability information field further includes a first element identification field.
- the above-mentioned first element identification field carries a first element identification value, and the first element identification value is used to identify the first protection capability information field.
- the above-mentioned first protection capability information field further includes a second element identification field and a first element identification extension field.
- the value of the above-mentioned second element identification field is 255;
- the first element identification extension field carries a first element extension identification value, and the first element extension identification value is used to identify the first protection capability information field.
- the above-mentioned association request frame and/or association authentication frame includes a first extended capability field
- the first extended capability field includes a protection capability field of the second BA frame
- the protection capability field of the second BA frame carries the first STA pair BA Protection capability information of the frame.
- the above-mentioned first extended capability field further includes a third element identification field.
- the above-mentioned first extended capability field further includes at least one of the protection capability field of the second trigger frame and the protection capability field of the second NDPA; wherein,
- the protection capability field of the second trigger frame carries the protection capability information of the first STA for the trigger frame
- the protection capability field of the second NDPA carries the protection capability information of the first STA for the NDPA.
- the protection capability field of the second BA frame, the protection capability field of the second trigger frame or the protection capability field of the second NDPA occupies the first position of the first extended capability field.
- the above-mentioned STA further includes: a second capability announcement module, configured to send protection capability information of the STA for the BA frame.
- the protection capability information of the STA for the BA frame is carried in the association response frame and/or the authentication frame sent by the second capability declaration module.
- the above-mentioned association response frame and/or authentication frame includes a second protection capability information field
- the second protection capability information field includes the protection capability field of the third BA frame
- the protection capability field of the third BA frame carries the protection capacity information
- the above-mentioned second protection capability information field further includes at least one of the protection capability field of the third trigger frame and the protection capability field of the third NDPA; wherein,
- the protection capability field of the third trigger frame carries the protection capability information of the STA for the trigger frame
- the protection capability field of the third NDPA carries the protection capability information of the STA for the NDPA.
- the above-mentioned second protection capability information field further includes a fourth element identification field.
- the above fourth element identification field carries a second element identification value, and the second element identification value is used to identify the second protection capability information field.
- the above-mentioned second protection capability information field further includes a fifth element identification field and a second element identification extension field.
- the value of the fifth element identification field above is 255;
- the second element identification extension field carries a second element extension identification value, and the second element extension identification value is used to identify the second protection capability information field.
- the above-mentioned association response frame and/or authentication frame includes a second extended capability field
- the second extended capability field includes the protection capability field of the fourth BA frame
- the protection capability field of the fourth BA frame carries the STA's information about the BA frame. Protection capability information.
- the above-mentioned second extended capability field further includes a sixth element identification field.
- the above second extended capability field further includes at least one of the protection capability field of the fourth trigger frame and the protection capability field of the fourth NDPA; wherein,
- the protection capability field of the fourth trigger frame carries the protection capability information of the STA for the trigger frame
- the fourth NDPA protection capability field carries STA protection capability information for NDPA.
- the protection capability field of the fourth BA frame, the protection capability field of the fourth trigger frame or the protection capability field of the fourth NDPA occupies the second position of the second extension capability field.
- the foregoing STA includes an access point AP.
- the above STA further includes: a second key negotiation module, configured to perform key negotiation with the first STA to generate a key.
- a second key negotiation module configured to perform key negotiation with the first STA to generate a key.
- each module (submodule, unit or component, etc.) in STA 1600 and STA 1700 in the embodiment of the present application can be realized by different modules (submodule, unit or component, etc.), or can be Realized by the same module (submodule, unit or component, etc.), for example, the first sending module and the second sending module can be different modules or the same module, both of which can be implemented in the embodiment of this application corresponding function in .
- the sending module and the receiving module in the embodiment of the present application may be realized by a transceiver of the device, and part or all of the other modules may be realized by a processor of the device.
- Fig. 18 is a schematic structural diagram of a communication device 1800 according to an embodiment of the present application.
- the communication device 1800 shown in FIG. 18 includes a processor 710, and the processor 710 can call and run a computer program from a memory, so as to implement the method in the embodiment of the present application.
- the communication device 1800 may further include a memory 720 .
- the processor 710 can invoke and run a computer program from the memory 720, so as to implement the method in the embodiment of the present application.
- the memory 720 may be an independent device independent of the processor 710 , or may be integrated in the processor 710 .
- the communication device 1800 may further include a transceiver 730, and the processor 710 may control the transceiver 730 to communicate with other devices, specifically, to send information or data to other devices, or receive other Information or data sent by the device.
- the processor 710 may control the transceiver 730 to communicate with other devices, specifically, to send information or data to other devices, or receive other Information or data sent by the device.
- the transceiver 730 may include a transmitter and a receiver.
- the transceiver 730 may further include antennas, and the number of antennas may be one or more.
- the communication device 1800 may be the STA of the embodiment of the present application, and the communication device 1800 may implement the corresponding process implemented by the STA in each method of the embodiment of the present application.
- the communication device 1800 may implement the corresponding process implemented by the STA in each method of the embodiment of the present application.
- details are not repeated here.
- FIG. 19 is a schematic structural diagram of a chip 1900 according to an embodiment of the present application.
- the chip 1900 shown in FIG. 19 includes a processor 810, and the processor 810 can call and run a computer program from a memory, so as to implement the method in the embodiment of the present application.
- the chip 1900 may further include a memory 820 .
- the processor 810 can call and run a computer program from the memory 820, so as to implement the method in the embodiment of the present application.
- the memory 820 may be an independent device independent of the processor 810 , or may be integrated in the processor 810 .
- the chip 1900 may also include an input interface 830 .
- the processor 810 can control the input interface 830 to communicate with other devices or chips, specifically, can obtain information or data sent by other devices or chips.
- the chip 1900 may also include an output interface 840 .
- the processor 810 can control the output interface 840 to communicate with other devices or chips, specifically, can output information or data to other devices or chips.
- the chip can be applied to the STA in the embodiment of the present application, and the chip can implement the corresponding process implemented by the STA in each method of the embodiment of the present application.
- the chip can implement the corresponding process implemented by the STA in each method of the embodiment of the present application.
- the chip mentioned in the embodiment of the present application may also be called a system-on-chip, a system-on-chip, a system-on-a-chip, or a system-on-a-chip.
- the processor mentioned above can be a general-purpose processor, a digital signal processor (DSP), an off-the-shelf programmable gate array (FPGA), an application specific integrated circuit (ASIC) or Other programmable logic devices, transistor logic devices, discrete hardware components, etc.
- DSP digital signal processor
- FPGA off-the-shelf programmable gate array
- ASIC application specific integrated circuit
- the general-purpose processor mentioned above may be a microprocessor or any conventional processor or the like.
- the aforementioned memories may be volatile memories or nonvolatile memories, or may include both volatile and nonvolatile memories.
- the non-volatile memory can be read-only memory (read-only memory, ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), electrically programmable Erases programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
- the volatile memory may be random access memory (RAM).
- the memory in the embodiment of the present application may also be a static random access memory (static RAM, SRAM), a dynamic random access memory (dynamic RAM, DRAM), Synchronous dynamic random access memory (synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous connection Dynamic random access memory (synch link DRAM, SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DR RAM), etc. That is, the memory in the embodiments of the present application is intended to include, but not be limited to, these and any other suitable types of memory.
- all or part of them may be implemented by software, hardware, firmware or any combination thereof.
- software When implemented using software, it may be implemented in whole or in part in the form of a computer program product.
- the computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on the computer, the processes or functions according to the embodiments of the present application will be generated in whole or in part.
- the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable device.
- the computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, e.g.
- the computer-readable storage medium may be any available medium that can be accessed by a computer, or a data storage device such as a server or a data center integrated with one or more available media.
- the available medium may be a magnetic medium (such as a floppy disk, a hard disk, or a magnetic tape), an optical medium (such as a DVD), or a semiconductor medium (such as a solid state disk (Solid State Disk, SSD)), etc.
- sequence numbers of the above-mentioned processes do not mean the order of execution, and the execution order of the processes should be determined by their functions and internal logic, and should not be used in the embodiments of the present application.
- the implementation process constitutes any limitation.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (179)
- 一种通信方法,包括:第一站点STA接收块确认BA帧,所述BA帧携带第一信息和/或被保护的隐私相关信息,所述第一信息用于对所述被保护的隐私相关信息进行识别。
- 根据权利要求1所述的方法,其中,所述BA帧包括多站点Multi-STA BA帧。
- 根据权利要求1或2所述的方法,其中,所述隐私相关信息包括关联标识符AID。
- 根据权利要求1至3中任一所述的方法,其中,所述BA帧包括BA信息字段;所述BA信息字段包括至少一个第一保护字段;所述第一保护字段包括第一单关联标识符流量标识符信息Per AID TID Info字段;所述第一Per AID TID Info字段携带所述第一信息和/或所述被保护的隐私相关信息。
- 根据权利要求4所述的方法,其中,所述第一信息包括以下至少一项:加密算法信息和/或消息摘要算法信息;所述被保护的隐私相关信息的长度;第一指示信息,所述第一指示信息用于指示所述第一保护字段是否包括第二Per AID TID Info字段。
- 根据权利要求5所述的方法,其中,所述第二Per AID TID Info字段携带BA位图、确认类别Ack Type和TID中的至少一项。
- 根据权利要求6所述的方法,其中,所述第一Per AID TID Info字段包括保护信息字段和被保护的AID字段;其中,所述保护信息字段携带所述加密算法信息和/或消息摘要算法信息;所述被保护的AID字段携带所述被保护的隐私相关信息。
- 根据权利要求7所述的方法,其中,所述第一Per AID TID Info字段还包括块确认开始序列控制字段,所述块确认开始序列控制字段用于指示所述保护信息字段的长度与所述被保护的AID字段的长度之和。
- 根据权利要求7所述的方法,其中,所述第一Per AID TID Info字段包括保护信息字段,包括:所述第一Per AID TID Info字段包括第一AID TID信息字段,所述第一AID TID信息字段包括所述保护信息字段。
- 根据权利要求9所述的方法,其中,所述第一Per AID TID Info字段还包括块确认开始序列控制字段,所述块确认开始序列控制字段用于指示所述被保护的AID字段的长度。
- 根据权利要求7至10中任一所述的方法,其中,所述第一Per AID TID Info字段携带第一AID值,所述第一AID值用于标识所述第一Per AID TID Info字段。
- 根据权利要求11所述的方法,其中,所述第二Per AID TID Info字段携带第二AID值,所述第二AID值用于标识所述第二Per AID TID Info字段。
- 根据权利要求12所述的方法,其中,所述第二AID值与所述第一AID值相同或不同。
- 根据权利要求1至13中任一所述的方法,还包括:在所述BA帧中的Per AID TID Info字段携带第一AID值的情况下,所述第一STA从携带第一AID值的Per AID TID Info字段中提取所述第一信息和所述被保护的隐私相关信息;所述第一STA基于所述第一信息对所述被保护的隐私相关信息进行识别。
- 根据权利要求14所述的方法,其中,所述第一STA基于所述第一信息对所述被保护的隐私相关信息进行识别包括:所述第一STA采用所述第一信息中的加密算法信息对所述被保护的隐私相关信息进行解密,得到所述隐私相关信息的明文;所述第一STA将所述隐私相关信息的明文与所述第一STA自身的隐私相关信息进行比较,在比较结果一致的情况下,确定所述携带第一AID值的Per AID TID Info字段为对应所述第一STA的第一Per AID TID Info字段。
- 根据权利要求14或15所述的方法,其中,所述第一STA基于所述第一信息对所述被保护的隐私相关信息进行识别包括:所述第一STA采用所述第一信息中的加密算法信息和/或消息摘要算法信息对所述第一STA自身的隐私相关信息进行处理,将处理的结果与所述被保护的隐私相关信息进行比较,在比较结果一致的情况下,确定所述携带第一AID值的Per AID TID Info字段为对应所述第一STA的第一Per AID TID Info字段。
- 根据权利要求14至16中任一所述的方法,还包括:在所述对应所述第一STA的第一Per AID TID Info字段的下一个Per AID TID Info字段携带第二AID值的情况下,从所述下一个Per AID TID Info字段中读取BA位图信息。
- 根据权利要求14至16中任一所述的方法,还包括:识别所述对应所述第一STA的第一Per AID TID Info字段中的第一指示信息,在所述第一指示信息指示下一个Per AID TID Info字段为对应所述第一STA的第二Per AID TID Info字段的情况下,从所述对应所述第一STA的第二Per AID TID Info字段中读取BA位图信息。
- 根据权利要求14所述的方法,其中,所述第一STA基于所述第一信息对所述被保护的隐私相关信息进行识别,包括:所述第一STA从所述携带第一AID值的Per AID TID Info字段的下一个Per AID TID Info字段中提取第二信息;所述第二信息包括BA位图、确认类别和TID中的至少一项;所述第一STA采用所述第一信息中的消息摘要算法信息对所述第一STA自身的隐私相关信息及所述第二信息进行处理,将处理的结果与所述被保护的隐私相关信息进行比较,在比较结果一致的情况下,确定所述携带第一AID值的Per AID TID Info字段为对应所述第一STA的第一Per AID TID Info字段。
- 根据权利要求19所述的方法,还包括:从所述下一个Per AID TID Info字段中读取BA位图信息。
- 根据权利要求15所述的方法,其中,所述第一STA采用所述第一信息中的加密算法信息对所述被保护的隐私相关信息进行解密,得到所述隐私相关信息的明文,包括:所述第一STA根据所述第一信息中的加密算法信息,确定所述被保护的隐私相关信息中的有效密文;对所述有效密文进行解密,得到明文信息;从所述明文信息中提取有效明文,得到所述隐私相关信息的明文。
- 根据权利要求1至13中任一所述的方法,还包括:在所述BA帧中的Per AID TID Info字段携带第一AID值或第二AID值的情况下,所述第一STA忽略携带所述第一AID值或第二AID值的Per AID TID Info字段。
- 根据权利要求1至22中任一所述的方法,还包括:所述第一STA发送第一STA对BA帧的保护能力信息。
- 根据权利要求23所述的方法,其中,所述第一STA对BA帧的保护能力信息在所述第一STA发送的关联请求帧和/或认证帧中携带。
- 根据权利要求24所述的方法,其中,所述关联请求帧和/或认证帧包括第一保护能力信息字段,所述第一保护能力信息字段包括第一BA帧的保护能力字段,所述第一BA帧的保护能力字段携带所述第一STA对BA帧的保护能力信息。
- 根据权利要求25所述的方法,其中,所述第一保护能力信息字段还包括第一触发帧的保护能力字段和第一空数据包声明NDPA的保护能力字段中的至少一项;其中,所述第一触发帧的保护能力字段携带所述第一STA对触发帧的保护能力信息;所述第一NDPA的保护能力字段携带所述第一STA对NDPA的保护能力信息。
- 根据权利要求25或26所述的方法,其中,所述第一保护能力信息字段还包括第一元素标识字段。
- 根据权利要求27所述的方法,其中,所述第一元素标识字段携带第一元素标识值,所述第一元素标识值用于标识所述第一保护能力信息字段。
- 根据权利要求25或26所述的方法,其中,所述第一保护能力信息字段还包括第二元素标识字段和第一元素标识扩展字段。
- 根据权利要求29所述的方法,其中,所述第二元素标识字段取值为255;所述第一元素标识扩展字段携带第一元素扩展标识值,所述第一元素扩展标识值用于标识所述第一保护能力信息字段。
- 根据权利要求24所述的方法,其中,所述关联请求帧和/或关联认证帧包括第一扩展能力字段,所述第一扩展能力字段包括第二BA帧的保护能力字段,所述第二BA帧的保护能力字段携带所述第一STA对BA帧的保护能力信息。
- 根据权利要求31所述的方法,其中,所述第一扩展能力字段还包括第三元素标识字段。
- 根据权利要求31或32所述的方法,其中,所述第一扩展能力字段还包括第二触发帧的保护能力字段和第二NDPA的保护能力字段中的至少一项;其中,所述第二触发帧的保护能力字段携带所述第一STA对触发帧的保护能力信息;所述第二NDPA的保护能力字段携带所述第一STA对NDPA的保护能力信息。
- 根据权利要求33所述的方法,其中,所述第二BA帧的保护能力字段、所述第二触发帧的保护能力字段或所述第二NDPA的保护能力字段占据所述第一扩展能力字段的第一位置。
- 根据权利要求1至34中任一所述的方法,还包括:所述第一STA接收第二STA对BA帧的保护能力信息。
- 根据权利要求35所述的方法,其中,所述第二STA对BA帧的保护能力信息在所述第一STA接收的关联响应帧和/或认证帧中携带。
- 根据权利要求36所述的方法,其中,所述关联响应帧和/或认证帧包括第二保护能力信息字段,所述第二保护能力信息字段包括第三BA帧的保护能力字段,所述第三BA帧的保护能力字段携带所述第二STA对BA帧的保护能力信息。
- 根据权利要求37所述的方法,其中,所述第二保护能力信息字段还包括第三触发帧的保护能力字段和第三NDPA的保护能力字段中的至少一项;其中,所述第三触发帧的保护能力字段携带所述第二STA对触发帧的保护能力信息;所述第三NDPA的保护能力字段携带所述第二STA对NDPA的保护能力信息。
- 根据权利要求37或38所述的方法,其中,所述第二保护能力信息字段还包括第四元素标识字段。
- 根据权利要求39所述的方法,其中,所述第四元素标识字段携带第二元素标识值,所述第二元素标识值用于标识所述第二保护能力信息字段。
- 根据权利要求37或38所述的方法,其中,所述第二保护能力信息字段还包括第五元素标识字段和第二元素标识扩展字段。
- 根据权利要求41所述的方法,其中,所述第五元素标识字段取值为255;所述第二元素标识扩展字段携带第二元素扩展标识值,所述第二元素扩展标识值用于标识所述第二保护能力信息字段。
- 根据权利要求36所述的方法,其中,所述关联响应帧和/或认证帧中包括第二扩展能力字段,所述第二扩展能力字段包括第四BA帧的保护能力字段,所述第四BA帧的保护能力字段携带所述第二STA对BA帧的保护能力信息。
- 根据权利要求43所述的方法,其中,所述第二扩展能力字段还包括第六元素标识字段。
- 根据权利要求43或44所述的方法,其中,所述第二扩展能力字段还包括第四触发帧的保护能力字段和第四NDPA的保护能力字段中的至少一项;其中,所述第四触发帧的保护能力字段携带所述第二STA对触发帧的保护能力信息;所述第四NDPA的保护能力字段携带所述第二STA对NDPA的保护能力信息。
- 根据权利要求45所述的方法,其中,所述第四BA帧的保护能力字段、所述第四触发帧的保护能力字段或所述第四NDPA的保护能力字段占据所述第二扩展能力字段的第二位置。
- 根据权利要求36至46任一所述的方法,其中,所述第二STA包括接入点AP。
- 根据权利要求1至47任一所述的方法,还包括:所述第一STA与第二STA进行密钥协商,生成密钥。
- 一种通信方法,包括:第二站点STA发送块确认BA帧,所述BA帧携带第一信息和/或被保护的隐私相关信息,所述第一信息用于对所述被保护的隐私相关信息进行识别。
- 根据权利要求49所述的方法,其中,所述BA帧包括多站点Multi-STA BA帧。
- 根据权利要求49或50所述的方法,其中,所述隐私相关信息包括关联标识符AID信息。
- 根据权利要求49至51中任一所述的方法,其中,所述BA帧包括BA信息字段;所述BA信息字段包括至少一个第一保护字段;所述第一保护字段包括第一单关联标识符流量标识符信息Per AID TID Info字段;所述第一Per AID TID Info字段携带所述第一信息和/或所述被保护的隐私相关信息。
- 根据权利要求52所述的方法,其中,所述第一信息包括以下至少一项:加密算法信息和/或消息摘要算法信息;所述被保护的隐私相关信息的长度;第一指示信息,所述第一指示信息用于指示所述第一保护字段是否包括第二Per AID TID Info字段。
- 根据权利要求53所述的方法,其中,所述第二Per AID TID Info字段携带BA位图、确认类别Ack Type和TID中的至少一项。
- 根据权利要求54所述的方法,其中,所述第一Per AID TID Info字段包括保护信息字段和被保护的AID字段;其中,所述保护信息字段携带所述加密算法信息和/或消息摘要算法信息;所述被保护的AID字段携带所述被保护的隐私相关信息。
- 根据权利要求55所述的方法,其中,所述第一Per AID TID Info字段还包括块确认开始序列控制字段,所述块确认开始序列控制字段用于指示所述保护信息字段的长度与所述被保护的AID字段的长度之和。
- 根据权利要求55所述的方法,其中,所述第一Per AID TID Info字段包括保护信息字段,包括:所述第一Per AID TID Info字段包括第一AID TID信息字段,所述第一AID TID信息字段包括所述保护信息字段。
- 根据权利要求57所述的方法,其中,所述第一Per AID TID Info字段还包括块确认开始序列控制字段,所述块确认开始序列控制字段用于指示所述被保护的AID字段的长度。
- 根据权利要求55至58中任一所述的方法,其中,所述第一Per AID TID Info字段携带第一AID值,所述第一AID值用于标识所述第一Per AID TID Info字段。
- 根据权利要求59所述的方法,其中,所述第二Per AID TID Info字段携带第二AID值,所述第二AID值用于标识所述第二Per AID TID Info字段。
- 根据权利要求60所述的方法,其中,所述第二AID值与所述第一AID值相同或不同。
- 根据权利要求49至61中任一所述的方法,还包括:所述第二STA接收第一STA对BA帧的保护能力信息。
- 根据权利要求62所述的方法,其中,所述第一STA对BA帧的保护能力信息在所述第二STA接收的关联请求帧和/或认证帧中携带。
- 根据权利要求63所述的方法,其中,所述关联请求帧和/或认证帧包括第一保护能力信息字段,所述第一保护能力信息字段包括第一BA帧的保护能力字段,所述第一BA帧的保护能力字段携带所述第一STA对BA帧的保护能力信息。
- 根据权利要求64所述的方法,其中,所述第一保护能力信息字段还包括第一触发帧的保护能力字段和第一空数据包声明NDPA的保护能力字段中的至少一项;其中,所述第一触发帧的保护能力字段携带所述第一STA对触发帧的保护能力信息;所述第一NDPA的保护能力字段携带所述第一STA对NDPA的保护能力信息。
- 根据权利要求64或65所述的方法,其中,所述第一保护能力信息字段还包括第一元素标识字段。
- 根据权利要求66所述的方法,其中,所述第一元素标识字段携带第一元素标识值,所述第一元素标识值用于标识所述第一保护能力信息字段。
- 根据权利要求64或65所述的方法,其中,所述第一保护能力信息字段还包括第二元素标识字段和第一元素标识扩展字段。
- 根据权利要求68所述的方法,其中,所述第二元素标识字段取值为255;所述第一元素标识扩展字段携带第一元素扩展标识值,所述第一元素扩展标识值用于标识所述第一保护能力信息字段。
- 根据权利要求63所述的方法,其中,所述关联请求帧和/或关联认证帧包括第一扩展能力字段,所述第一扩展能力字段包括第二BA帧的保护能力字段,所述第二BA帧的保护能力字段携带所述第一STA对BA帧的保护能力信息。
- 根据权利要求70所述的方法,其中,所述第一扩展能力字段还包括第三元素标识字段。
- 根据权利要求70或71所述的方法,其中,所述第一扩展能力字段还包括第二触发帧的保护能力字段和第二NDPA的保护能力字段中的至少一项;其中,所述第二触发帧的保护能力字段携带所述第一STA对触发帧的保护能力信息;所述第二NDPA的保护能力字段携带所述第一STA对NDPA的保护能力信息。
- 根据权利要求72所述的方法,其中,所述第二BA帧的保护能力字段、所述第二触发帧的保护能力字段或所述第二NDPA的保护能力字段占据所述第一扩展能力字段的第一位置。
- 根据权利要求49至73中任一所述的方法,还包括:所述第二STA发送第二STA对BA帧的保护能力信息。
- 根据权利要求74所述的方法,其中,所述第二STA对BA帧的保护能力信息在所述第二STA发送的关联响应帧和/或认证帧中携带。
- 根据权利要求75所述的方法,其中,所述关联响应帧和/或认证帧包括第二保护能力信息字段,所述第二保护能力信息字段包括第三BA帧的保护能力字段,所述第三BA帧的保护能力字段携带所述第二STA对BA帧的保护能力信息。
- 根据权利要求76所述的方法,其中,所述第二保护能力信息字段还包括第三触发帧的保护能力字段和第三NDPA的保护能力字段中的至少一项;其中,所述第三触发帧的保护能力字段携带所述第二STA对触发帧的保护能力信息;所述第三NDPA的保护能力字段携带所述第二STA对NDPA的保护能力信息。
- 根据权利要求76或77所述的方法,其中,所述第二保护能力信息字段还包括第四元素标识字段。
- 根据权利要求78所述的方法,其中,所述第四元素标识字段携带第二元素标识值,所述第二元素标识值用于标识所述第二保护能力信息字段。
- 根据权利要求78或79所述的方法,其中,所述第二保护能力信息字段还包括第五元素标识字段和第二元素标识扩展字段。
- 根据权利要求80所述的方法,其中,所述第五元素标识字段取值为255;所述第二元素标识扩展字段携带第二元素扩展标识值,所述第二元素扩展标识值用于标识所述第二保护能力信息字段。
- 根据权利要求75所述的方法,其中,所述关联响应帧和/或认证帧中包括第二扩展能力字段,所述第二扩展能力字段包括第四BA帧的保护能力字段,所述第四BA帧的保护能力字段携带所述第二STA对BA帧的保护能力信息。
- 根据权利要求82所述的方法,其中,所述第二扩展能力字段还包括第六元素标识字段。
- 根据权利要求82或83所述的方法,其中,所述第二扩展能力字段还包括第四触发帧的保护能力字段和第四NDPA的保护能力字段中的至少一项;其中,所述第四触发帧的保护能力字段携带所述第二STA对触发帧的保护能力信息;所述第四NDPA的保护能力字段携带所述第二STA对NDPA的保护能力信息。
- 根据权利要求84所述的方法,其中,所述第四BA帧的保护能力字段、所述第四触发帧的保护能力字段或所述第四NDPA的保护能力字段占据所述第二扩展能力字段的第二位置。
- 根据权利要求49至85任一所述的方法,其中,所述第二STA包括接入点AP。
- 根据权利要求49至86任一所述的方法,还包括:所述第二STA与第一STA进行密钥协商,生成密钥。
- 一种站点STA,包括:第一接收模块,用于接收块确认BA帧,所述BA帧携带第一信息和/或被保护的隐私相关信息,所述第一信息用于对所述被保护的隐私相关信息进行识别。
- 根据权利要求88所述的STA,其中,所述BA帧包括多站点Multi-STA BA帧。
- 根据权利要求88或89所述的STA,其中,所述隐私相关信息包括关联标识符AID。
- 根据权利要求88至90中任一所述的STA,其中,所述BA帧包括BA信息字段;所述BA信息字段包括至少一个第一保护字段;所述第一保护字段包括第一单关联标识符流量标识符信息Per AID TID Info字段;所述第一Per AID TID Info字段携带所述第一信息和/或所述被保护的隐私相关信息。
- 根据权利要求91所述的STA,其中,所述第一信息包括以下至少一项:加密算法信息和/或消息摘要算法信息;所述被保护的隐私相关信息的长度;第一指示信息,所述第一指示信息用于指示所述第一保护字段是否包括第二Per AID TID Info字段。
- 根据权利要求92所述的STA,其中,所述第二Per AID TID Info字段携带BA位图、确认类别Ack Type和TID中的至少一项。
- 根据权利要求93所述的STA,其中,所述第一Per AID TID Info字段包括保护信息字段和被保护的AID字段;其中,所述保护信息字段携带所述加密算法信息和/或消息摘要算法信息;所述被保护的AID字段携带所述被保护的隐私相关信息。
- 根据权利要求94所述的STA,其中,所述第一Per AID TID Info字段还包括块确认开始序列控制字段,所述块确认开始序列控制字段用于指示所述保护信息字段的长度与所述被保护的AID字段的长度之和。
- 根据权利要求94所述的STA,其中,所述第一Per AID TID Info字段包括保护信息字段,包括:所述第一Per AID TID Info字段包括第一AID TID信息字段,所述第一AID TID信息字段包括所述保护信息字段。
- 根据权利要求96所述的STA,其中,所述第一Per AID TID Info字段还包括块确认开始序列控 制字段,所述块确认开始序列控制字段用于指示所述被保护的AID字段的长度。
- 根据权利要求94至97中任一所述的STA,其中,所述第一Per AID TID Info字段携带第一AID值,所述第一AID值用于标识所述第一Per AID TID Info字段。
- 根据权利要求98所述的STA,其中,所述第二Per AID TID Info字段携带第二AID值,所述第二AID值用于标识所述第二Per AID TID Info字段。
- 根据权利要求99所述的STA,其中,所述第二AID值与所述第一AID值相同或不同。
- 根据权利要求88至100中任一所述的STA,还包括:第一识别模块,用于在所述BA帧中的Per AID TID Info字段携带第一AID值的情况下,所述第一STA从携带第一AID值的Per AID TID Info字段中提取所述第一信息和所述被保护的隐私相关信息;基于所述第一信息对所述被保护的隐私相关信息进行识别。
- 根据权利要求101所述的STA,其中,所述第一识别模块用于:采用所述第一信息中的加密算法信息对所述被保护的隐私相关信息进行解密,得到所述隐私相关信息的明文;将所述隐私相关信息的明文与所述第一STA自身的隐私相关信息进行比较,在比较结果一致的情况下,确定所述携带第一AID值的Per AID TID Info字段为对应所述第一STA的第一Per AID TID Info字段。
- 根据权利要求101或102所述的STA,其中,所述第一识别模块用于:采用所述第一信息中的加密算法信息和/或消息摘要算法信息对所述第一STA自身的隐私相关信息进行处理,将处理的结果与所述被保护的隐私相关信息进行比较,在比较结果一致的情况下,确定所述携带第一AID值的Per AID TID Info字段为对应所述第一STA的第一Per AID TID Info字段。
- 根据权利要求101至103中任一所述的STA,还包括:第一读取模块,用于在所述对应所述第一STA的第一Per AID TID Info字段的下一个Per AID TID Info字段携带第二AID值的情况下,从所述下一个Per AID TID Info字段中读取BA位图信息。
- 根据权利要求101至103中任一所述的STA,还包括:第二读取模块,用于识别所述对应所述第一STA的第一Per AID TID Info字段中的第一指示信息,在所述第一指示信息指示下一个Per AID TID Info字段为对应所述第一STA的第二Per AID TID Info字段的情况下,从所述对应所述第一STA的第二Per AID TID Info字段中读取BA位图信息。
- 根据权利要求101所述的STA,其中,所述第一识别模块用于:从所述携带第一AID值的Per AID TID Info字段的下一个Per AID TID Info字段中提取第二信息;所述第二信息包括BA位图、确认类别和TID中的至少一项;采用所述第一信息中的消息摘要算法信息对所述第一STA自身的隐私相关信息及所述第二信息进行处理,将处理的结果与所述被保护的隐私相关信息进行比较,在比较结果一致的情况下,确定所述携带第一AID值的Per AID TID Info字段为对应所述第一STA的第一Per AID TID Info字段。
- 根据权利要求106所述的STA,还包括:第三读取模块,用于从所述下一个Per AID TID Info字段中读取BA位图信息。
- 根据权利要求102所述的STA,其中,所述第一识别模块用于:根据所述第一信息中的加密算法信息,确定所述被保护的隐私相关信息中的有效密文;对所述有效密文进行解密,得到明文信息;从所述明文信息中提取有效明文,得到所述隐私相关信息的明文。
- 根据权利要求88至100中任一所述的STA,还包括:第二识别模块,用于在所述BA帧中的Per AID TID Info字段携带第一AID值或第二AID值的情况下,所述第一STA忽略携带所述第一AID值或第二AID值的Per AID TID Info字段。
- 根据权利要求88至109中任一所述的STA,还包括:第一能力宣告模块,用于发送第一STA对BA帧的保护能力信息。
- 根据权利要求110所述的STA,其中,所述第一STA对BA帧的保护能力信息在所述第一STA发送的关联请求帧和/或认证帧中携带。
- 根据权利要求111所述的STA,其中,所述关联请求帧和/或认证帧包括第一保护能力信息字段,所述第一保护能力信息字段包括第一BA帧的保护能力字段,所述第一BA帧的保护能力字段携带所述第一STA对BA帧的保护能力信息。
- 根据权利要求112所述的STA,其中,所述第一保护能力信息字段还包括第一触发帧的保护能力字段和第一空数据包声明NDPA的保护能力字段中的至少一项;其中,所述第一触发帧的保护能力字段携带所述第一STA对触发帧的保护能力信息;所述第一NDPA的保护能力字段携带所述第一STA对NDPA的保护能力信息。
- 根据权利要求112或113所述的STA,其中,所述第一保护能力信息字段还包括第一元素标识字段。
- 根据权利要求114所述的STA,其中,所述第一元素标识字段携带第一元素标识值,所述第一元素标识值用于标识所述第一保护能力信息字段。
- 根据权利要求112或113所述的STA,其中,所述第一保护能力信息字段还包括第二元素标识字段和第一元素标识扩展字段。
- 根据权利要求116所述的STA,其中,所述第二元素标识字段取值为255;所述第一元素标识扩展字段携带第一元素扩展标识值,所述第一元素扩展标识值用于标识所述第一保护能力信息字段。
- 根据权利要求111所述的STA,其中,所述关联请求帧和/或关联认证帧包括第一扩展能力字段,所述第一扩展能力字段包括第二BA帧的保护能力字段,所述第二BA帧的保护能力字段携带所述第一STA对BA帧的保护能力信息。
- 根据权利要求118所述的STA,其中,所述第一扩展能力字段还包括第三元素标识字段。
- 根据权利要求118或119所述的STA,其中,所述第一扩展能力字段还包括第二触发帧的保护能力字段和第二NDPA的保护能力字段中的至少一项;其中,所述第二触发帧的保护能力字段携带所述第一STA对触发帧的保护能力信息;所述第二NDPA的保护能力字段携带所述第一STA对NDPA的保护能力信息。
- 根据权利要求120所述的STA,其中,所述第二BA帧的保护能力字段、所述第二触发帧的保护能力字段或所述第二NDPA的保护能力字段占据所述第一扩展能力字段的第一位置。
- 根据权利要求88至121中任一所述的STA,还包括:第二接收模块,用于接收第二STA对BA帧的保护能力信息。
- 根据权利要求122所述的STA,其中,所述第二STA对BA帧的保护能力信息在所述第一STA接收的关联响应帧和/或认证帧中携带。
- 根据权利要求123所述的STA,其中,所述关联响应帧和/或认证帧包括第二保护能力信息字段,所述第二保护能力信息字段包括第三BA帧的保护能力字段,所述第三BA帧的保护能力字段携带所述第二STA对BA帧的保护能力信息。
- 根据权利要求124所述的STA,其中,所述第二保护能力信息字段还包括第三触发帧的保护能力字段和第三NDPA的保护能力字段中的至少一项;其中,所述第三触发帧的保护能力字段携带所述第二STA对触发帧的保护能力信息;所述第三NDPA的保护能力字段携带所述第二STA对NDPA的保护能力信息。
- 根据权利要求124或125所述的STA,其中,所述第二保护能力信息字段还包括第四元素标识字段。
- 根据权利要求126所述的STA,其中,所述第四元素标识字段携带第二元素标识值,所述第二元素标识值用于标识所述第二保护能力信息字段。
- 根据权利要求124或125所述的STA,其中,所述第二保护能力信息字段还包括第五元素标识字段和第二元素标识扩展字段。
- 根据权利要求128所述的STA,其中,所述第五元素标识字段取值为255;所述第二元素标识扩展字段携带第二元素扩展标识值,所述第二元素扩展标识值用于标识所述第二保护能力信息字段。
- 根据权利要求123所述的STA,其中,所述关联响应帧和/或认证帧中包括第二扩展能力字段,所述第二扩展能力字段包括第四BA帧的保护能力字段,所述第四BA帧的保护能力字段携带所述第二STA对BA帧的保护能力信息。
- 根据权利要求130所述的STA,其中,所述第二扩展能力字段还包括第六元素标识字段。
- 根据权利要求130或131所述的STA,其中,所述第二扩展能力字段还包括第四触发帧的保护能力字段和第四NDPA的保护能力字段中的至少一项;其中,所述第四触发帧的保护能力字段携带所述第二STA对触发帧的保护能力信息;所述第四NDPA的保护能力字段携带所述第二STA对NDPA的保护能力信息。
- 根据权利要求132所述的STA,其中,所述第四BA帧的保护能力字段、所述第四触发帧的保护能力字段或所述第四NDPA的保护能力字段占据所述第二扩展能力字段的第二位置。
- 根据权利要求122至133任一所述的STA,其中,所述第二STA包括接入点AP。
- 根据权利要求88至134任一所述的STA,还包括:第一密钥协商模块,用于与第二STA进行密钥协商,生成密钥。
- 一种站点STA,包括:第一发送模块,用于发送块确认BA帧,所述BA帧携带第一信息和/或被保护的隐私相关信息,所述第一信息用于对所述被保护的隐私相关信息进行识别。
- 根据权利要求136所述的STA,其中,所述BA帧包括多站点Multi-STA BA帧。
- 根据权利要求136或137所述的STA,其中,所述隐私相关信息包括关联标识符AID信息。
- 根据权利要求136至138中任一所述的STA,其中,所述BA帧包括BA信息字段;所述BA信息字段包括至少一个第一保护字段;所述第一保护字段包括第一单关联标识符流量标识符信息Per AID TID Info字段;所述第一Per AID TID Info字段携带所述第一信息和/或所述被保护的隐私相关信息。
- 根据权利要求139所述的STA,其中,所述第一信息包括以下至少一项:加密算法信息和/或消息摘要算法信息;所述被保护的隐私相关信息的长度;第一指示信息,所述第一指示信息用于指示所述第一保护字段是否包括第二Per AID TID Info字段。
- 根据权利要求140所述的STA,其中,所述第二Per AID TID Info字段携带BA位图、确认类别Ack Type和TID中的至少一项。
- 根据权利要求141所述的STA,其中,所述第一Per AID TID Info字段包括保护信息字段和被保护的AID字段;其中,所述保护信息字段携带所述加密算法信息和/或消息摘要算法信息;所述被保护的AID字段携带所述被保护的隐私相关信息。
- 根据权利要求142所述的STA,其中,所述第一Per AID TID Info字段还包括块确认开始序列控制字段,所述块确认开始序列控制字段用于指示所述保护信息字段的长度与所述被保护的AID字段的长度之和。
- 根据权利要求142所述的STA,其中,所述第一Per AID TID Info字段包括保护信息字段,包括:所述第一Per AID TID Info字段包括第一AID TID信息字段,所述第一AID TID信息字段包括所述保护信息字段。
- 根据权利要求144所述的STA,其中,所述第一Per AID TID Info字段还包括块确认开始序列控制字段,所述块确认开始序列控制字段用于指示所述被保护的AID字段的长度。
- 根据权利要求142至145中任一所述的STA,其中,所述第一Per AID TID Info字段携带第一AID值,所述第一AID值用于标识所述第一Per AID TID Info字段。
- 根据权利要求146所述的STA,其中,所述第二Per AID TID Info字段携带第二AID值,所述第二AID值用于标识所述第二Per AID TID Info字段。
- 根据权利要求147所述的STA,其中,所述第二AID值与所述第一AID值相同或不同。
- 根据权利要求146至148中任一所述的STA,还包括:第三接收模块,用于接收第一STA对BA帧的保护能力信息。
- 根据权利要求149所述的STA,其中,所述第一STA对BA帧的保护能力信息在所述第三接收模块接收的关联请求帧和/或认证帧中携带。
- 根据权利要求150所述的STA,其中,所述关联请求帧和/或认证帧包括第一保护能力信息字段,所述第一保护能力信息字段包括第一BA帧的保护能力字段,所述第一BA帧的保护能力字段携带所述第一STA对BA帧的保护能力信息。
- 根据权利要求151所述的STA,其中,所述第一保护能力信息字段还包括第一触发帧的保护能力字段和第一空数据包声明NDPA的保护能力字段中的至少一项;其中,所述第一触发帧的保护能力字段携带所述第一STA对触发帧的保护能力信息;所述第一NDPA的保护能力字段携带所述第一STA对NDPA的保护能力信息。
- 根据权利要求151或152所述的STA,其中,所述第一保护能力信息字段还包括第一元素标识字段。
- 根据权利要求153所述的STA,其中,所述第一元素标识字段携带第一元素标识值,所述第一元素标识值用于标识所述第一保护能力信息字段。
- 根据权利要求151或152所述的STA,其中,所述第一保护能力信息字段还包括第二元素标识字段和第一元素标识扩展字段。
- 根据权利要求155所述的STA,其中,所述第二元素标识字段取值为255;所述第一元素标识扩展字段携带第一元素扩展标识值,所述第一元素扩展标识值用于标识所述第一保护能力信息字段。
- 根据权利要求150所述的STA,其中,所述关联请求帧和/或关联认证帧包括第一扩展能力字段,所述第一扩展能力字段包括第二BA帧的保护能力字段,所述第二BA帧的保护能力字段携带所述第一STA对BA帧的保护能力信息。
- 根据权利要求157所述的STA,其中,所述第一扩展能力字段还包括第三元素标识字段。
- 根据权利要求157或158所述的STA,其中,所述第一扩展能力字段还包括第二触发帧的保护能力字段和第二NDPA的保护能力字段中的至少一项;其中,所述第二触发帧的保护能力字段携带所述第一STA对触发帧的保护能力信息;所述第二NDPA的保护能力字段携带所述第一STA对NDPA的保护能力信息。
- 根据权利要求159所述的STA,其中,所述第二BA帧的保护能力字段、所述第二触发帧的保护能力字段或所述第二NDPA的保护能力字段占据所述第一扩展能力字段的第一位置。
- 根据权利要求136至160中任一所述的STA,还包括:第二能力宣告模块,用于发送所述STA对BA帧的保护能力信息。
- 根据权利要求161所述的STA,其中,所述STA对BA帧的保护能力信息在所述第二能力宣告模块发送的关联响应帧和/或认证帧中携带。
- 根据权利要求162所述的STA,其中,所述关联响应帧和/或认证帧包括第二保护能力信息字段,所述第二保护能力信息字段包括第三BA帧的保护能力字段,所述第三BA帧的保护能力字段携带所述STA对BA帧的保护能力信息。
- 根据权利要求163所述的STA,其中,所述第二保护能力信息字段还包括第三触发帧的保护能力字段和第三NDPA的保护能力字段中的至少一项;其中,所述第三触发帧的保护能力字段携带所述STA对触发帧的保护能力信息;所述第三NDPA的保护能力字段携带所述STA对NDPA的保护能力信息。
- 根据权利要求163或164所述的STA,其中,所述第二保护能力信息字段还包括第四元素标识字段。
- 根据权利要求165所述的STA,其中,所述第四元素标识字段携带第二元素标识值,所述第二元素标识值用于标识所述第二保护能力信息字段。
- 根据权利要求165或166所述的STA,其中,所述第二保护能力信息字段还包括第五元素标识字段和第二元素标识扩展字段。
- 根据权利要求167所述的STA,其中,所述第五元素标识字段取值为255;所述第二元素标识扩展字段携带第二元素扩展标识值,所述第二元素扩展标识值用于标识所述第二保护能力信息字段。
- 根据权利要求162所述的STA,其中,所述关联响应帧和/或认证帧中包括第二扩展能力字段,所述第二扩展能力字段包括第四BA帧的保护能力字段,所述第四BA帧的保护能力字段携带所述STA对BA帧的保护能力信息。
- 根据权利要求169所述的STA,其中,所述第二扩展能力字段还包括第六元素标识字段。
- 根据权利要求169或170所述的STA,其中,所述第二扩展能力字段还包括第四触发帧的保护能力字段和第四NDPA的保护能力字段中的至少一项;其中,所述第四触发帧的保护能力字段携带所述STA对触发帧的保护能力信息;所述第四NDPA的保护能力字段携带所述STA对NDPA的保护能力信息。
- 根据权利要求171所述的STA,其中,所述第四BA帧的保护能力字段、所述第四触发帧的保护能力字段或所述第四NDPA的保护能力字段占据所述第二扩展能力字段的第二位置。
- 根据权利要求136至172任一所述的STA,其中,所述STA包括接入点AP。
- 根据权利要求126至173任一所述的STA,还包括:第二密钥协商模块,用于与第一STA进行密钥协商,生成密钥。
- 一种通信设备,包括:处理器和存储器,该存储器用于存储计算机程序,所述处理器用于调用并运行所述存储器中存储的计算机程序,执行如权利要求1至87中任一项所述的方法。
- 一种芯片,包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有所述芯片的设备执行如权利要求1至87中任一项所述的方法。
- 一种计算机可读存储介质,用于存储计算机程序,所述计算机程序使得计算机执行如权利要求1至87中任一项所述的方法。
- 一种计算机程序产品,包括计算机程序指令,该计算机程序指令使得计算机执行如权利要求1至87中任一项所述的方法。
- 一种计算机程序,所述计算机程序使得计算机执行如权利要求1至87中任一项所述的方法。
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202180102698.6A CN118044240A (zh) | 2021-11-12 | 2021-11-12 | 通信方法和站点 |
MX2024005728A MX2024005728A (es) | 2021-11-12 | 2021-11-12 | Metodo y estacion de comunicacion. |
PCT/CN2021/130475 WO2023082209A1 (zh) | 2021-11-12 | 2021-11-12 | 通信方法和站点 |
US18/658,633 US20240298172A1 (en) | 2021-11-12 | 2024-05-08 | Communication method and station |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2021/130475 WO2023082209A1 (zh) | 2021-11-12 | 2021-11-12 | 通信方法和站点 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US18/658,633 Continuation US20240298172A1 (en) | 2021-11-12 | 2024-05-08 | Communication method and station |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2023082209A1 true WO2023082209A1 (zh) | 2023-05-19 |
Family
ID=86334837
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2021/130475 WO2023082209A1 (zh) | 2021-11-12 | 2021-11-12 | 通信方法和站点 |
Country Status (4)
Country | Link |
---|---|
US (1) | US20240298172A1 (zh) |
CN (1) | CN118044240A (zh) |
MX (1) | MX2024005728A (zh) |
WO (1) | WO2023082209A1 (zh) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104955038A (zh) * | 2014-03-25 | 2015-09-30 | 华为终端有限公司 | 分配寻址标识的方法及接入点、站点和通信系统 |
JP2017121037A (ja) * | 2015-12-25 | 2017-07-06 | 株式会社東芝 | 無線通信装置 |
CN112291780A (zh) * | 2019-07-12 | 2021-01-29 | 苹果公司 | 用于无线站点的身份混淆 |
CN112867005A (zh) * | 2020-12-31 | 2021-05-28 | 乐鑫信息科技(上海)股份有限公司 | 控制帧处理及生成方法、站点、接入点及存储介质 |
-
2021
- 2021-11-12 CN CN202180102698.6A patent/CN118044240A/zh active Pending
- 2021-11-12 MX MX2024005728A patent/MX2024005728A/es unknown
- 2021-11-12 WO PCT/CN2021/130475 patent/WO2023082209A1/zh active Application Filing
-
2024
- 2024-05-08 US US18/658,633 patent/US20240298172A1/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104955038A (zh) * | 2014-03-25 | 2015-09-30 | 华为终端有限公司 | 分配寻址标识的方法及接入点、站点和通信系统 |
JP2017121037A (ja) * | 2015-12-25 | 2017-07-06 | 株式会社東芝 | 無線通信装置 |
CN112291780A (zh) * | 2019-07-12 | 2021-01-29 | 苹果公司 | 用于无线站点的身份混淆 |
CN112867005A (zh) * | 2020-12-31 | 2021-05-28 | 乐鑫信息科技(上海)股份有限公司 | 控制帧处理及生成方法、站点、接入点及存储介质 |
Non-Patent Citations (1)
Title |
---|
CABLELABS: "Considerations on LAA-LTE UL Transmissions without LBT", 3GPP DRAFT; R1-156983 UL LBT, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. RAN WG1, no. Anaheim, CA; 20151115 - 20151122, 15 November 2015 (2015-11-15), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , XP051003299 * |
Also Published As
Publication number | Publication date |
---|---|
CN118044240A (zh) | 2024-05-14 |
MX2024005728A (es) | 2024-05-27 |
US20240298172A1 (en) | 2024-09-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8331567B2 (en) | Methods and apparatuses for generating dynamic pairwise master keys using an image | |
US7881475B2 (en) | Systems and methods for negotiating security parameters for protecting management frames in wireless networks | |
US11962692B2 (en) | Encrypting data in a pre-associated state | |
WO2017133021A1 (zh) | 一种安全处理方法及相关设备 | |
CN116963054B (zh) | Wlan多链路tdls密钥导出 | |
WO2023082209A1 (zh) | 通信方法和站点 | |
US11736272B2 (en) | Identifiable random medium access control addressing | |
US12058526B2 (en) | Multi-band communication method and apparatus | |
WO2024011645A1 (zh) | 密钥生成方法、装置、设备及介质 | |
WO2023082208A1 (zh) | 通信方法和站点 | |
WO2023236216A1 (zh) | 无线通信的方法及设备 | |
WO2024113335A1 (zh) | 无线通信的方法、站点设备和接入点设备 | |
WO2023231019A1 (zh) | 无线通信的方法及设备 | |
WO2024026735A1 (zh) | 认证方法、装置、设备及存储介质 | |
TWI815243B (zh) | 用於wlan多鏈路管理幀尋址的方法和系統 | |
WO2023164949A1 (zh) | 无线通信的方法和设备 | |
WO2023155172A1 (zh) | 通信方法和设备 | |
WO2024217455A1 (zh) | 发送和接收物理层协议数据单元的方法和通信装置 | |
US20240244436A1 (en) | Communication method and apparatus | |
WO2023044792A1 (zh) | 无线通信的方法、站点设备和接入点设备 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21963657 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 202180102698.6 Country of ref document: CN |
|
ENP | Entry into the national phase |
Ref document number: 2024527376 Country of ref document: JP Kind code of ref document: A |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112024008979 Country of ref document: BR |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 112024008979 Country of ref document: BR Kind code of ref document: A2 Effective date: 20240507 |