-
公开(公告)号:US09980248B2
公开(公告)日:2018-05-22
申请号:US14142549
申请日:2013-12-27
发明人: Ji Chen , Zhiming Ding , Ping Fang , Yi Luo
CPC分类号: H04W72/005 , H04W48/12 , H04W72/10
摘要: Embodiments of the present invention disclose a method for a device to access a network, an access point, a network access device, and a system. The method includes: generating, by an access point, a broadcast frame, where the broadcast frame includes feature information of a network access device; and the feature information is used for indicating a feature of the network access device; and broadcasting, by the access point, the broadcast frame, so that a specific network access device initiates a network access procedure to the access point; where the specific network access device is a network access device which receives the broadcast frame and has the feature indicated by the feature information. By adopting the present invention, contention collisions among network access devices can be reduced through a manner of accessing a network in batches.
-
公开(公告)号:US10097524B2
公开(公告)日:2018-10-09
申请号:US15106871
申请日:2013-12-31
发明人: Xiaoxian Li , Zhiming Ding , Gaokun Pang , Su Lu
IPC分类号: H04L29/00 , H04L29/06 , H04L12/24 , G06F21/42 , H04W4/80 , H04L29/08 , H04L9/08 , H04W4/00 , H04W12/02 , H04W84/12
摘要: A network configuration method, including acquiring a public key operation value of a second device in an out-of-band manner, acquiring a public key copy of the second device that is sent by the second device and that is used to perform key exchange, performing an operation of the preset algorithm on the public key copy of the second device, to obtain a public key operation value copy of the second device, and generating a first exchange key according to a private key that is used by the first device to perform key exchange and the acquired public key copy of the second device after the public key operation value copy of the second device matches the public key operation value of the second device, and hence the method simplifies a network configuration process.
-
公开(公告)号:US09906953B2
公开(公告)日:2018-02-27
申请号:US14823080
申请日:2015-08-11
发明人: Zhenguo Du , Ping Fang , Zhiming Ding , Gaokun Pang
IPC分类号: H04M1/66 , H04W12/04 , H04W76/02 , H04L29/12 , G06F21/00 , H04L29/06 , H04L29/08 , H04W12/02
CPC分类号: H04W12/04 , G06F21/00 , H04L61/1547 , H04L61/605 , H04L63/00 , H04L63/08 , H04L67/16 , H04W12/02 , H04W76/14
摘要: A method and user equipment for discovering a device user to improve security of user identifier information, so that user equipment discover each other securely. The method includes receiving a first message that is sent by a second user equipment and at least includes implicit user identifier information of the second user equipment, obtaining, according to correspondences stored in a first user equipment, a user identifier corresponding to the implicit user identifier information of the second user equipment; and determining, in the user identifier corresponding to the implicit user identifier information of the second user equipment, a user identifier of the second user equipment, to discover a user of the second user equipment. The present disclosure is applicable to the field of communications.
-
公开(公告)号:US09866641B2
公开(公告)日:2018-01-09
申请号:US14900141
申请日:2013-06-19
发明人: Ji Chen , Ping Fang , Zhiming Ding , Zhenguo Du
摘要: Embodiments of the present invention provide an information query method and device, which can reduce a waste of resources in an information query process, and decrease power consumption. The method includes: sending, by a requesting device in a broadcast manner, a first query request message, where the first query request message carries a first query condition and information about a group identity; and when the requesting device receives a first query response message sent by a responding device that meets the first query condition, sending, by the requesting device, a second query request message that uses the group identity as a receiving address, so that the responding device processes the second query request message.
-
公开(公告)号:US10244388B2
公开(公告)日:2019-03-26
申请号:US15198918
申请日:2016-06-30
发明人: Zhiming Ding
IPC分类号: H04L21/00 , H04W12/02 , H04W8/26 , H04W64/00 , H04L12/24 , H04L29/06 , H04W4/02 , H04W12/06 , H04W84/12 , H04W88/08
摘要: A location privacy protection method includes generating an identifier update notification message to be sent to at least one access point, where the identifier update notification message includes a first identifier of a wireless terminal, to indicate that the identifier update notification message is to be sent by the wireless terminal. The identifier update notification message further includes second identifier information of the wireless terminal. The method further includes sending the identifier update notification message, so that the access point acquires a second identifier according to the second identifier information, and uses the second identifier as an identifier of the wireless terminal; and sending a subsequent message including the second identifier to the access point, to indicate that the subsequent message is sent by the wireless terminal.
-
公开(公告)号:US10091650B2
公开(公告)日:2018-10-02
申请号:US14924132
申请日:2015-10-27
发明人: Xiaoxian Li , Zhiming Ding
摘要: A wireless terminal configuration method, device, and system. The method provided in the embodiments of the present disclosure includes acquiring, by a configuration device, device identification information and configuration password information of a wireless terminal; sending, by the configuration device, configuration triggering information to the wireless terminal according to the device identification information of the wireless terminal; performing, by the configuration device, verification with the wireless terminal according to the configuration password information; sending, by the configuration device, credential information required for the wireless terminal to access an access point (AP) and device identification information of the AP to the wireless terminal; and sending, by the configuration device, the credential information and the device identification information of the wireless terminal to the AP.
-
公开(公告)号:US10003966B2
公开(公告)日:2018-06-19
申请号:US15139749
申请日:2016-04-27
发明人: Gaokun Pang , Zhiming Ding , Su Lu
CPC分类号: H04W12/04 , H04L9/002 , H04L9/0825 , H04L9/0827 , H04L9/0841 , H04L9/0863 , H04L9/3226 , H04L63/0428 , H04L63/061 , H04L63/18 , H04L2209/805 , H04L2463/062 , H04W4/80 , H04W12/003 , H04W12/06 , H04W76/14
摘要: A key configuration method includes acquiring, by a first device, a public key of a second device through a secure medium; sending, by the first device, information used for obtaining a shared key to the second device; and obtaining, by the second device, a shared key using a private key of the second device and the information that is used for obtaining a shared key. The first device obtains the shared key using the information used for obtaining a shared key or using a private key of the first device. The present disclosure ensures that the public key of the second device reaches the first device, avoids that an attacker masquerades as the second device to establish a secure connection with the first device, so that the attacker cannot listen to a message between the first device and the second device.
-
公开(公告)号:US10218501B2
公开(公告)日:2019-02-26
申请号:US15282598
申请日:2016-09-30
发明人: Gaokun Pang , Zhiming Ding
摘要: A method includes: securely obtaining, by a first device, a first public key estimated value of a second device in an out-of-band manner; encrypting an asymmetric encryption public key by using the first public key estimated value; sending the encrypted asymmetric encryption public key to the second device; receiving an encrypted first key-exchange public key sent by the second device; decrypting the encrypted first key-exchange public key by using an asymmetric encryption private key; performing an operation based on the decrypted first key-exchange public key, to obtain a second public key estimated value; and when the first public key estimated value is consistent with the second public key estimated value, determining that the decrypted first key-exchange public key is correct, generating a shared key by using a key-exchange private key and the first key-exchange public key, and establishing a secure connection to the second device by using the shared key.
-
公开(公告)号:US10104530B2
公开(公告)日:2018-10-16
申请号:US14889783
申请日:2013-05-08
发明人: Ji Chen , Zhiming Ding , Zhenguo Du
摘要: An information query method, including sending, by a first device, a data-excluded information query request frame, where the data-excluded information query request frame includes first control information and a first hash value; receiving, by the first device, a data-excluded information query response frame sent by a second device. The data-excluded information query response frame includes second control information, a second hash value, and an address of the second device. The method also includes sending, by the first device, a data-contained information query request frame to the second device when the first device determines that a third hash value is consistent with the second hash value, so that the second device responds to the data-contained information query request frame when receiving the data-contained information query request frame. Correspondingly, the present disclosure further provides a related device.
-
公开(公告)号:US09872175B2
公开(公告)日:2018-01-16
申请号:US14734812
申请日:2015-06-09
发明人: Zhiming Ding , Guiming Shu
CPC分类号: H04W12/06 , H04L63/0464 , H04L63/162 , H04W12/02
摘要: A packet processing method, apparatus, and system. A first node receives a first packet sent by a relay device, where the first packet includes data in a second packet sent by a second node to the relay device, the data in the second packet is encrypted by using second additional authentication data and a session key between the first node and the second node, and the second additional authentication data is generated by the second node according to at least address information in a packet header of the second packet by using a second rule; the first node generates first additional authentication data according to address information in a packet header of the first packet by using a first rule, and decrypts the data in the first packet by using the first additional authentication data and the session key.
-
-
-
-
-
-
-
-
-