Abstract:
A file transfer method includes: sending, by a sending device, a ready request message to a multicast group in a multicast manner; when receiving a first ready message returned by a first device in the multicast group, sending, by the sending device, a master receiving device determining message to the first device, where the master receiving device determining message is used to notify the first device that the first device has been selected as a master receiving device, and sending a data packet of a to-be-sent file to the multicast group in a multicast manner; and when a second device newly joins the multicast group, sending a first message to the second device to notify it in time of information about a file that is currently being transferred, so that the newly joined device can start receiving immediately.
Abstract:
A key configuration method includes acquiring, by a first device, a public key of a second device through a secure medium; sending, by the first device, information used for obtaining a shared key to the second device; and obtaining, by the second device, a shared key using a private key of the second device and the information that is used for obtaining a shared key. The first device obtains the shared key using the information used for obtaining a shared key or using a private key of the first device. The present disclosure ensures that the public key of the second device reaches the first device, avoids that an attacker masquerades as the second device to establish a secure connection with the first device, so that the attacker cannot listen to a message between the first device and the second device.
Abstract:
A method for configuring a wireless device includes acquiring, by a third device, information about a first device, sharing a first key with the first device, and sending a first trigger message to the first device, where the first trigger message includes information about the third device; and acquiring, by the third device, information about a second device, sharing a second key with the second device, and sending a second trigger message to the second device, where the second trigger message includes the information about the third device and the information about the first device, such that the second device negotiates, according to the information about the third device and the information about the first device and based on authentication of the third device, with the first device to generate a third key, and establishes a connection between the first device and the second device using the third key.
Abstract:
A method for establishing a connection between devices, a configuration device, and a wireless device. The method includes acquiring configuration password information of a first wireless device and device identifier information of the first wireless device; performing verification on the configuration password information of the first wireless device with the first wireless device; and sending, to the first wireless device, a first encryption value obtained after a generated device connection code is encrypted; acquiring configuration password information of the second wireless device and device identifier information of the second wireless device; performing verification on the configuration password information of the second wireless device with the second wireless device; and sending, to the second wireless device, a second encryption value obtained after the device connection code is encrypted and the device identifier information of the first wireless device.
Abstract:
A method for positioning a wireless terminal, and a related device and system are provided. The method includes: obtaining, by a wireless terminal, a positioning service period and an identifier of a positioning channel from a first access point; switching, by the wireless terminal, to the positioning channel in the positioning service period; and broadcasting, by the wireless terminal, a location measurement message through the positioning channel, so that at least three access points in an access point group where the first access point is located obtain positioning measurement data after receiving the location measurement message, so as to estimate a location of the wireless terminal. Embodiments of the present invention can shorten positioning time of the wireless terminal, reduce power consumption, and improve utilization of a network wireless channel.
Abstract:
Embodiments of the present invention provide a device association method, apparatus, and system, where the method includes: receiving a broadcast frame or a configuration response frame that includes access identification information generated by a first device and that is sent by a second device; and identifying the second device according to the access identification information and associating with the second device. In the embodiments of the present invention, the first device identifies a matched second device according to the access identification information, and then may directly associate with the second device, thereby avoiding a process of selecting a correct second device from multiple second devices, simplifying a process for the first device to join a WLAN in which the second device is located, and also making an operation by a user simpler.
Abstract:
A method for link setup includes sending a first authentication message including a user identifier to an access point (AP). A second authentication message sent by the AP according to the user identifier is received and includes an EAP method request message and a ANonce of the AP. A first PTK is generated according to the ANonce, an SNonce, and a first MSK. A third authentication message is sent to the AP. The third authentication message includes an EAP method response message, the SNonce, and a first MIC that is generated according to the first PTK. A fourth authentication message is sent by the AP when it authenticates, according to a second PTK, that the first MIC is correct. The fourth authentication message includes an EAP-Success message, configuration information configured by the AP for the terminal, and a second MIC. The second MIC is authenticated according to the first PTK.
Abstract:
A method, an apparatus, and a system for transmitting a traffic indication message, which relate to a wireless fidelity (WiFi) technology and are mainly applicable to a traffic indication message processing procedure. The method includes: compressing a delivery traffic indication message, and generating a traffic indication message; and transmitting the traffic indication message, where the traffic indication message includes compression method indication information and the compressed delivery traffic indication message.
Abstract:
A method, a machine to machine (M2M) terminal, an access point (AP), and a system for achieving a machine to machine service are provided. The method includes: determining an AP that supports the M2M service; establishing a communication connection to the AP; receiving service configuration information sent by the AP; and sending a service data report message to the AP according to the service configuration information, where the service data report message includes service data corresponding to the M2M service. The M2M terminal includes a determining module, a connection module, a first receiving module, and a first sending module. The AP includes a first determining module, a connection module, a first sending module, and a first receiving module. The system includes the M2M terminal, the AP, and the M2M server according to embodiments of the present invention.
Abstract:
A method, related device, and system for configuring a wireless local area network device are provided. A configuration device obtains working channel information of a wireless local area network. The working channel information is used to indicate a working channel of the wireless local area network. The configuration device receives a configuration instruction sent by an access point. The configuration instruction is received through the working channel according to the working channel information. The configuration instruction is sent after the access point receives a configuration request of an application terminal, and the configuration instruction is used to instruct the configuration device to send configuration information. The configuration device sends the configuration information through the working channel information, so that the application terminal performs network configuration with the access point according to the configuration information.