Abstract:
The present invention discloses a data transmission method and device. The method includes: receiving, by a device in a first BSS, a data frame sent by a device in a second BSS, where the data frame sent by the device in the second BSS includes a Preamble sequence and a MAC frame; transmit power of the Preamble sequence is first power; transmit power of the MAC frame is second power; and the first power is higher than the second power; if the data frame received by the device in the first BSS includes the Preamble sequence but does not include the MAC frame, setting a NAV value according to a SIG field in the Preamble sequence; and transmitting data according to the NAV value.
Abstract:
A key configuration method includes acquiring, by a first device, a public key of a second device through a secure medium; sending, by the first device, information used for obtaining a shared key to the second device; and obtaining, by the second device, a shared key using a private key of the second device and the information that is used for obtaining a shared key. The first device obtains the shared key using the information used for obtaining a shared key or using a private key of the first device. The present disclosure ensures that the public key of the second device reaches the first device, avoids that an attacker masquerades as the second device to establish a secure connection with the first device, so that the attacker cannot listen to a message between the first device and the second device.
Abstract:
Embodiments of the present invention provide a method, device and system for configuring multiple devices, where multiple devices are configured simply and securely in a centralized manner. The method includes: acquiring, by a configuration device, device identity information, configuration password information, and network role attributes of at least two devices needing to be configured on a same wireless local area network WLAN; determining a central node device of the WLAN according to the network role attributes of the at least two devices; and sending device identity information and configuration password information of a non-central node device to the central node device, or sending, by the configuration device, device identity information and configuration password information of the central node device to the non-central node device.
Abstract:
A method includes transmitting, by a first station to an access point, a direct link setup request message destined for a second station, where the direct link setup request message is used to request setup of a direct link between the first station and the second station, receiving, by the first station from the access point, a direct link setup response message point, where the direct link setup response message includes a first key information, and where the first key information is used to perform a secure transmission for service data transmitted in the direct link between the first station and the second station, and transmitting, by the first station to the second station over the direct link, a first direct link setup confirm message, where the first direct link setup confirm message is used to indicate that the first station has received the first key information.
Abstract:
A secure connection method for a network device includes: acquiring a public key operation value of a second device in an out-of-band manner; sending public key information of a first device to the second device; receiving public key information of the second device that is sent by the second device, and decrypting the public key information of the second device by using a private key of the first device, to obtain the public key of the second device; and performing a preset-algorithm operation on the public key of the second device to obtain a copy of the public key operation value of the second device, and after the copy of the public key operation value of the second device matches the public key operation value of the second device, accepting received connection information sent by the second device.
Abstract:
A secure connection method for a network device includes: acquiring a public key operation value of a second device in an out-of-band manner; sending public key information of a first device to the second device; receiving public key information of the second device that is sent by the second device, and decrypting the public key information of the second device by using a private key of the first device, to obtain the public key of the second device; and performing a preset-algorithm operation on the public key of the second device to obtain a copy of the public key operation value of the second device, and after the copy of the public key operation value of the second device matches the public key operation value of the second device, accepting received connection information sent by the second device.