Abstract:
An information query method, including sending, by a first device, a data-excluded information query request frame, where the data-excluded information query request frame includes first control information and a first hash value; receiving, by the first device, a data-excluded information query response frame sent by a second device. The data-excluded information query response frame includes second control information, a second hash value, and an address of the second device. The method also includes sending, by the first device, a data-contained information query request frame to the second device when the first device determines that a third hash value is consistent with the second hash value, so that the second device responds to the data-contained information query request frame when receiving the data-contained information query request frame. Correspondingly, the present disclosure further provides a related device.
Abstract:
The present invention provides a method and system for controlling access of a terminal device to a wireless network. The method includes: receiving, by an access point device, a first wireless network access request message sent by a first terminal device; receiving, by the access point device, feedback information of one or more directional devices within a predetermined area; judging, by the access point device according to the received feedback information, whether N directional devices within the predetermined area all find the first wireless network access request message by monitoring; and if yes, enabling the first terminal device to access the wireless network, where the N is the number of the directional devices within the predetermined area.
Abstract:
A wireless terminal configuration method, device, and system. The method provided in the embodiments of the present disclosure includes acquiring, by a configuration device, device identification information and configuration password information of a wireless terminal; sending, by the configuration device, configuration triggering information to the wireless terminal according to the device identification information of the wireless terminal; performing, by the configuration device, verification with the wireless terminal according to the configuration password information; sending, by the configuration device, credential information required for the wireless terminal to access an access point (AP) and device identification information of the AP to the wireless terminal; and sending, by the configuration device, the credential information and the device identification information of the wireless terminal to the AP.
Abstract:
A method for implementing power saving of an access point on a wireless communication network includes: when detecting that no mobile terminal is associated, switching, by the access point, from a normal working mode to a power saving working mode; and periodically broadcasting, by the access point, a simplified beacon frame in the power saving working mode, where the simplified frame includes only a service set identity. An embodiment of the present invention further provides an access point on a wireless communication network. The access point broadcasts the simplified beacon frame in the power saving working mode. Therefore, the length of the beacon frame is shortened, thereby shortening the sending time to achieve the objective of reducing power consumption.
Abstract:
A method and user equipment for discovering a device user to improve security of user identifier information, so that user equipment discover each other securely. The method includes receiving a first message that is sent by a second user equipment and at least includes implicit user identifier information of the second user equipment, obtaining, according to correspondences stored in a first user equipment, a user identifier corresponding to the implicit user identifier information of the second user equipment; and determining, in the user identifier corresponding to the implicit user identifier information of the second user equipment, a user identifier of the second user equipment, to discover a user of the second user equipment. The present disclosure is applicable to the field of communications.
Abstract:
A security authentication method, device, and system are provided. A first device and a second device perform security authentication by using a first mapping key and a second mapping key, where the first mapping key is generated according to an initial key of the first device and a first predetermined algorithm, the second mapping key is generated according to an initial key of the second device and the first predetermined algorithm. A device in embodiments of the present invention performs security authentication by using a mapped initial key, which can increase the difficulty for an attacker to acquire a key, thereby improving security of a wireless network connection.
Abstract:
A device discovery method, apparatus and system. The method includes transmitting a detection request message on a set transmit channel, where the detection request message carries interception rule information of a local device, and the interception rule information includes at least interception time information and/or interception channel information; and intercepting, according to the interception rule information, a detection response message transmitted by another device. The device discovery method, apparatus and system provided by the embodiments of the present invention can improve the device discovery efficiency.
Abstract:
An antenna communication method and device are provided. The antenna communication method includes: establishing a communication tunnel between a Customer Premises Equipment (CPE) and a mobile terminal; receiving, by the CPE, a first request message sent by the mobile terminal; receiving, by the CPE, first communication data of the mobile terminal through the communication tunnel after receiving the first request message, and sending the first communication data to the BS according to the air interface connection information in the first request message; and receiving, by the CPE, second communication data sent by the BS according to the air interface connection information in the first request message, and sending the second communication data to the mobile terminal through the communication tunnel.
Abstract:
A method includes transmitting, by a first station to an access point, a direct link setup request message destined for a second station, where the direct link setup request message is used to request setup of a direct link between the first station and the second station, receiving, by the first station from the access point, a direct link setup response message point, where the direct link setup response message includes a first key information, and where the first key information is used to perform a secure transmission for service data transmitted in the direct link between the first station and the second station, and transmitting, by the first station to the second station over the direct link, a first direct link setup confirm message, where the first direct link setup confirm message is used to indicate that the first station has received the first key information.
Abstract:
An access point (AP) response method including receiving, by an AP, a probe request message and allowing to a probe response message to be returned to the terminal when a roaming agreement is signed. According to this invention, only an AP instead of all APs on a network needs to return the probe response message to the terminal, a same network roaming agreement is signed between the network in which the AP is located and a network in which the terminal is located. Therefore, network resources are saved. In addition, it avoids that the terminal processes the probe response message returned by the AP for which the network roaming agreement is not signed, thereby reducing time for discovering the AP by the terminal, and increasing a network access speed of the terminal accordingly.