Method of sending message, method of establishing secure connection, access point and work station

A technology for sending messages and access points, which is applied in the field of communication and can solve problems such as network access delay

Inactive Publication Date: 2013-07-10
ZTE CORP
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0029] The embodiment of the present invention provides a method for sending a message, a method for establishing a

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of sending message, method of establishing secure connection, access point and work station
  • Method of sending message, method of establishing secure connection, access point and work station
  • Method of sending message, method of establishing secure connection, access point and work station

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0136] like Figure 5 As shown, it is a signaling flowchart of Embodiment 1 of the method for establishing a secure connection in the present invention, and the process includes:

[0137] Step 501, with Figure 4 The steps 401-411 in are the same, and will not be repeated here;

[0138]Step 502, AP generates PTK according to received PMK, and SNonce and ANonde, and generates KCK and KEK according to PTK; AP uses generated KCK to verify MSDU MIC; Verification is successful, AP uses generated KEK to decrypt DHCP-Discover message;

[0139] The process of decrypting the DHCP Discover message may also occur after step 503 .

[0140] Step 503, the AP sends an association reply message to the STA, and the association reply message sent by the AP to the STA may include AID, EAP_Success, EAPoL-Key and MIC; wherein the EAPoL-Key includes GTK and IGTK;

[0141] Step 504, the AP sends a DHCP-Discover message to the DHCP server, wherein the Rapid Commit option is carried;

[0142] Among t

Embodiment 2

[0153] like Image 6 As shown, it is a signaling flowchart of Embodiment 2 of the method for establishing a secure connection in the present invention, and the process includes:

[0154] Step 601, and Figure 4 The steps 401-411 in are the same, and will not be repeated here;

[0155] Step 602, AP generates PTK according to received PMK, and SNonce and ANonde, and generates KCK and KEK according to PTK; AP uses generated KCK to check MSDU MIC; Verification is successful, AP uses generated KEK to decrypt DHCP-Discover message;

[0156] Step 603, AP sends DHCP-Discover message to DHCP server, and this message carries Rapid Commit option;

[0157] Among them, the fast IP address allocation mechanism is optional.

[0158] In step 604, a timer is set in the AP, and starts timing after the AP sends a DHCP-Discover message to the DHCP server. If the timer expires and the AP has not received the DHCP-Ack message sent by the DHCP server, the AP sends an association reply message to th

Embodiment 3

[0165] like Figure 7 As shown, it is a signaling flow chart of Embodiment 3 of the method for establishing a secure connection in the present invention, and the process includes:

[0166] Step 701, with Figure 4 The steps 401-411 in are the same, and will not be repeated here;

[0167] Step 702, AP generates PTK according to received PMK, and SNonce and ANonde, and generates KCK and KEK according to PTK; AP uses generated KCK to verify MSDU MIC; Verification is successful, AP uses generated KEK to decrypt DHCP-Discover message;

[0168] Step 703, the AP sends a DHCP-Discover w / Rapid Commit message to the DHCP server;

[0169] Among them, the fast IP address allocation mechanism is optional.

[0170] Step 704, AP sends a DHCP-Discover message to the DHCP server, and this message carries the Rapid Commit option; a timer is set in the AP, and starts counting after the AP sends the DHCP-Discover message to the DHCP server, if the timer expires, the AP has not yet After receiv

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method of sending a message, a method of establishing secure connection, an access point and a work station, wherein the method of sending the message includes the steps that the access point (AP) generates a pair transient key (PTK) and / or checking message integrity code (MIC); the AP sends an association reply message to the station (STA) and conducts a dynamic host configuration protocol (DHCP) process with a DHCP server; or the association reply message which contains an internet protocol (IP) address is only sent to the STA. The method of sending the message, the method of establishing the secure connection, the access point and the work station can accelerate the speed that the STA establishes a secure link and reduce the delay that a terminal initially accesses to a wireless local area network (WLAN). Performance is greatly improved especially for the scene that a large amount of users need to access to the WLAN in a short time, and user experience is well improved.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products