[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN115811751A - Configuration information acquisition and configuration method, terminal equipment and access point equipment - Google Patents

Configuration information acquisition and configuration method, terminal equipment and access point equipment Download PDF

Info

Publication number
CN115811751A
CN115811751A CN202211365038.XA CN202211365038A CN115811751A CN 115811751 A CN115811751 A CN 115811751A CN 202211365038 A CN202211365038 A CN 202211365038A CN 115811751 A CN115811751 A CN 115811751A
Authority
CN
China
Prior art keywords
configuration
information
access point
association
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211365038.XA
Other languages
Chinese (zh)
Inventor
何锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou V Solution Telecommunication Technology Co ltd
Original Assignee
Guangzhou V Solution Telecommunication Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou V Solution Telecommunication Technology Co ltd filed Critical Guangzhou V Solution Telecommunication Technology Co ltd
Priority to CN202211365038.XA priority Critical patent/CN115811751A/en
Publication of CN115811751A publication Critical patent/CN115811751A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to a method for acquiring and configuring configuration information, a terminal device and an access point device, wherein the method comprises the following steps: receiving a broadcast beacon frame sent by access point equipment, wherein the broadcast beacon frame carries configuration capability description information; sending an association request frame to the access point device under the condition that the configuration capability description information is confirmed to support an association configuration process, wherein the association request frame comprises configuration request information; receiving an association response frame sent by the access point device, wherein the association response frame carries configuration response information, and the configuration response information is generated by encrypting according to configuration information corresponding to the configuration request information; and decrypting the configuration response information to restore the configuration information, and analyzing the configuration information to take the corresponding configuration into effect. The technical scheme provided by the invention can reduce the access time.

Description

Configuration information acquisition and configuration method, terminal equipment and access point equipment
Technical Field
The invention relates to the field of internet communication, in particular to a configuration information obtaining method, a configuration information configuring method, terminal equipment and access point equipment.
Background
At present, the process of connecting a Wi-Fi terminal to the Internet through a Wi-Fi access point is divided into two steps: (1) Through an IEEE802.11 protocol, the Wi-Fi terminal and the Wi-Fi access point perform identity authentication to establish wireless connection; (2) And the Wi-Fi access point sends network configuration information to the Wi-Fi terminal through a DHCP protocol. After the two steps, the Wi-Fi terminal can access the Internet through the transfer of the Wi-Fi access point.
However, such an access method requires multiple information interactions between the access point device and the terminal device, which results in a long access time. In some application occasions sensitive to access time (for example, during a voice call, a terminal device switches an access point device), the existing access mode often has lower access efficiency.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a method for acquiring and configuring configuration information, a terminal device, and an access point device, which can reduce access time.
In order to achieve the above object, an aspect of the present invention provides a method for acquiring configuration information, where the method is applied in a terminal device, and the method includes: receiving a broadcast beacon frame sent by access point equipment, wherein the broadcast beacon frame carries configuration capability description information; sending an association request frame to the access point device under the condition that the configuration capability description information is confirmed to support an association configuration process, wherein the association request frame comprises configuration request information; receiving an association response frame sent by the access point device, wherein the association response frame carries configuration response information, and the configuration response information is generated by encrypting according to configuration information corresponding to the configuration request information; and decrypting the configuration response information to restore the configuration information, and analyzing the configuration information to take the corresponding configuration into effect.
In one embodiment, the configuration request information includes an information type identifier and a configuration request list, where the configuration request list includes configuration identifiers of respective configurations to be requested.
In one embodiment, the configuration response message includes an information type identifier, a preset random number, and encrypted data, where the encrypted data is obtained by encrypting a user key, the preset random number, and the configuration information.
In one embodiment, decrypting the configuration reply information comprises:
and generating a decryption key according to the user key and the preset random number, and decrypting the encrypted data in the configuration response information by using the decryption key.
In one embodiment, the configuration information includes one or more configuration items, and the configuration items are used to characterize a corresponding relationship between a configuration identifier and a configuration parameter.
In another aspect, the present invention further provides a terminal device, where the terminal device includes a memory and a processor, where the memory is used to store a computer program, and the computer program is executed by the processor to implement the above-mentioned method for acquiring configuration information.
The invention also provides a configuration method of configuration information, which is applied to the access point equipment and comprises the following steps: sending a broadcast beacon frame to terminal equipment, wherein the broadcast beacon frame carries configuration capability description information; receiving an association request frame sent by the terminal equipment under the condition that the description information of the configuration capability indicates that the association configuration process is supported, wherein the association request frame comprises configuration request information; and constructing configuration information according to the configuration request information, encrypting the configuration information to generate configuration response information, and sending an associated response frame carrying the configuration response information to the terminal equipment, so that the terminal equipment takes the corresponding configuration based on the associated response frame into effect.
In one embodiment, constructing configuration information from the configuration request information comprises:
identifying a configuration request list from the configuration request information, and distributing corresponding configuration parameters for each configuration identifier to be configured in the configuration request list so as to generate configuration items representing the corresponding relationship between the configuration identifiers and the configuration parameters;
and taking the combination of one or more configuration items as the configuration information obtained by the construction.
In one embodiment, encrypting the configuration information comprises:
and generating an encryption key according to the user key and a preset random number, and encrypting the configuration information by using the encryption key.
In another aspect, the present invention further provides an access point device, where the access point device includes a memory and a processor, where the memory is used to store a computer program, and the computer program, when executed by the processor, implements the configuration method of the configuration information described above.
In another aspect, the present invention further provides a computer storage medium for storing a computer program, where the computer program is executed by a processor to implement the above-mentioned method for acquiring configuration information or the method for configuring configuration information.
The invention has the beneficial effects that:
the invention simplifies the process that the Wi-Fi terminal is connected to the Internet through the Wi-Fi access point: in the first step, the transmission of network configuration information is increased in the process of establishing connection based on the IEEE802.11 protocol, so that the operation of the second step is saved, and the time required by the Wi-Fi terminal to access the Internet is shortened.
Specifically, the invention carries extra self-defined configuration request information and configuration response information through an 802.11 protocol association request frame and an association response frame which are transmitted by the Wi-Fi terminal and the Wi-Fi access point in the association process, thereby replacing a DHCP protocol, realizing the transmission of the configuration information and shortening the time required by the Wi-Fi terminal to access the Internet. In order to avoid configuration information leakage, symmetric data encryption is carried out on configuration response information by using a secret key of identity authentication during Wi-Fi connection, and decryption is carried out by using the secret key when a Wi-Fi terminal receives a ciphertext. Compared with the common Wi-Fi equipment, the method for configuring the parameters through the DHCP process after association shortens the time for configuring the parameters, and when the Wi-Fi terminal is switched among different Wi-Fi access points, the function of accessing the terminal to the Internet can be quickly recovered, so that the method can be applied to time-sensitive access scenes.
Drawings
Fig. 1 is a schematic diagram illustrating steps of a method for acquiring configuration information according to an embodiment of the present invention;
FIG. 2 is a diagram illustrating steps of a configuration method for configuring information according to an embodiment of the present invention;
fig. 3 shows a schematic structural diagram of a terminal device in an embodiment of the present invention;
fig. 4 shows a schematic structural diagram of an access point device in one embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the technical solutions of the present invention will be further clearly and completely described below with reference to the embodiments of the present invention. It should be noted that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example one
Referring to fig. 1, the present application provides a method for acquiring configuration information, where the method is applied in a terminal device, and the method includes the following steps.
S11: receiving a broadcast beacon frame sent by access point equipment, wherein the broadcast beacon frame carries configuration capability description information;
s13: sending an association request frame to the access point equipment under the condition that the configuration capability description information representation supports an association configuration process, wherein the association request frame comprises configuration request information;
s15: receiving an association response frame sent by the access point device, wherein the association response frame carries configuration response information, and the configuration response information is generated by encrypting according to configuration information corresponding to the configuration request information;
s17: and decrypting the configuration response information to restore the configuration information, and analyzing the configuration information to take the corresponding configuration into effect. :
correspondingly, referring to fig. 2, the present application also provides a method for configuring configuration information, where the method is applied to an access point device, and the method may include the following steps.
S21: sending a broadcast beacon frame to a terminal device, wherein the broadcast beacon frame carries configuration capability description information;
s23: receiving an association request frame sent by the terminal equipment under the condition that the description information of the configuration capability indicates that the association configuration process is supported, wherein the association request frame comprises configuration request information;
s25: and constructing configuration information according to the configuration request information, encrypting the configuration information to generate configuration response information, and sending an associated response frame carrying the configuration response information to the terminal equipment, so that the terminal equipment takes the corresponding configuration based on the associated response frame into effect.
The terminal device may be an electronic device used by a user. For example, the terminal device may be a laptop, a smartphone, a tablet, a smart wearable device, or the like, in which the Wi-Fi communication module is installed. The above-mentioned access point device may be a router capable of providing networking function, or other integrated device with router function.
In this embodiment, the interaction process between the access point device and the terminal device may be generally described through the following steps:
s1: access point broadcast beacon frame F beacon Carrying custom configuration capability description information I cap Indicating that the associated process is supported to transmit the configuration information;
s2: terminal reception F beacon Confirming the capabilities of the access point.
S3: the terminal sends an association request frame F to the access point a And requesting to establish the Wi-Fi connection. Carrying custom configuration request information I a
S4: the access point receives the association request frame F a For configuration request information I a And (4) carrying out analysis.
S5, the access point requests the information I according to the configuration a Constructing configuration information S, encrypting S and generating configuration response information I b
S6: the access point sends a carrying configuration response message I to the terminal b Associated response frame F b Receiving the association request of the terminal;
s7, the terminal receives the associated response frame F b Confirming that the association is established;
s8: the terminal pair configures response information I b Decrypting to obtain configuration information S;
s9: the terminal parses the configuration information S and validates the configuration.
Wherein, the content of the respective definition information in the above steps is as follows:
1. configuration capability description information I cap
I cap =(Type,Capability)
The Type is an information Type identifier, and each Type of information has a unique value. When the Capability is 1, the support of the associated configuration process is indicated; when 0, it indicates that the associated configuration flow is not supported.
2. Configuration request information I a
I a =(Type,ConfigReqList)
The Type is an information Type identifier, and each Type of information has a unique value. ConfigReqList is a configuration request list, and the content thereof is as follows:
ConfigReqList=(ConfigId1,ConfigId2,ConfigId3,...ConfigIdN)
each configuration is represented by a unique identity ConfigId.
3. Configuration response information I b
I b =(Type,Nonce,EncryptData)
The Type is an information Type identifier, and each Type of information has a unique value. Nonce is a random number used for data encryption. EncryptData is encrypted data. The user KEY is KEY, and the relationship between the configuration information S and EncryptData is as follows:
EncryptData=EncryptFn(KEY,Nonce,S)
EncryptFn is a data encryption algorithm, and a public algorithm or a private algorithm can be selected according to needs.
4. Configuration information S:
S=([ConfigId1,Data1],[ConfigId2,Data2],...[ConfigIdN,DataN])
the configuration information S is in the form of a list, each element of the list being a configuration identity ConfigId and a parameter value Data.
In one specific application example, two Wi-Fi wireless routers (device A, device B) and one Wi-Fi handset (device C). The devices a, B each have an uplink interface to the internet and provide Wi-Fi access point functionality. The intranet IP address of the device a is 192.168.1.1, and the intranet IP address of the device B is 192.168.2.1. Both devices a, B enable DNS proxy functionality.
The device C first confirms that both the devices a and B support the association configuration flow:
step 1: the device A and the device B send beacon frames once every 100ms and carry configuration capability description information I cap The information type is marked as 1, and the information content is as follows:
I cap =(Type=1,Capability=1)
step 2: and the device C receives the beacon frame and confirms that the devices A and B both support the association configuration process.
The process of device C establishing association with device a is as follows:
step 1: the device C associates with the device A and sends an association request frame F a1 Carries configuration request information I a1 This information type is identified as 2. Requesting to acquire configuration information such as an IP address, a subnet mask, a default gateway, a DNS server and the like, wherein each configuration identifier is defined as follows:
configuration name Configuring an identification value configId
IP address 1
Subnet mask 2
Default gateway 3
DNS server 4
I a1 The information content is as follows:
I a1 =(Type=2,ConfigReqList=[1,2,3,4])
and 2, step: device a receives association request frame F a1 From I a1 The device C requests to acquire configuration data such as an IP address, a subnet mask, a default gateway, a DNS server, and the like.
And step 3: the configuration data allocated by device a to device C is as follows:
configuration name Configuring data
IP address 192.168.1.2
Subnet mask 255.255.255.0
Default gateway 192.168.1.1
DNS server 192.168.1.1
Configuration information S 1 The content is as follows:
S 1 =([1,”192.168.1.2”],[2,”255.255.255.0”],
[3,”192.168.1.1”],[4,”192.168.1.1”])
assume that the KEY used by devices A and C is KEY 1 = abcdefgh, random number Nonce 1 =123. The encryption algorithm of the configuration information is AES-128, and a 128-bit encryption KEY is generated for KEY and Nonce through the MD5 algorithm. The encrypted data operates as follows:
EncryptData 1 =AES-128 encrypt (encryption key, plaintext data) =
AES-128 encrypt (MD5(abcdefgh|123),S 1 )
The device A generates a configuration response message I b1 The type of information is identified as 3, and the information content is:
I b1 =(Type=3,Nonce=123,EncryptData 1 )
and 4, step 4: device A sends an association response frame F to device C b1 Carrying configuration response information I b1
And 5: device C receives F b1
And 6: from F b1 Extraction of I b1 Using KEY 1 = abcdefgh to decrypt the encrypted data, obtaining configuration information S 1r
S 1r =AES-128 decrypt (decryption Key, ciphertext data) = AES-128 decrypt (MD5(abcdefgh|123),EncryptData 1 )
And 7: device C is according to S 1r The content sets the network parameters of the device. 192.168.1.2 IP address, 255.255.255.0 subnet mask, 192.168 default gateway1.1, DNS Server 192.168.1.1.
Through the steps, the device C establishes Wi-Fi connection with the device A, acquires the network configuration parameters and can normally access the Internet through the device A.
And the equipment C is connected with the equipment A through the Wi-Fi, is accessed to the Internet, and is gradually far away from the equipment A and close to the equipment B due to the movement of the position of the equipment C in the conversation process with the User. And the equipment C decides to actively disconnect the connection with the equipment A, switches to the equipment B and accesses the Internet. Device C first sends a disconnect request frame to device a and then starts to establish an association with device B as follows:
step 1: the device C associates with the device B and sends an association request frame F a2 Carries configuration request information I a2 This information type is identified as 2. And requesting to acquire configuration information such as an IP address, a subnet mask, a default gateway, a DNS server and the like.
I a2 The information content is as follows:
I a2 =(Type=2,ConfigReqList=[1,2,3,4])
step 2: device B receives association request frame F a2 From I a2 The device C requests to obtain configuration data such as an IP address, a subnet mask, a default gateway, a DNS server, and the like.
And step 3: the configuration data allocated by device B to device C is as follows:
configuration name Configuring data
IP address 192.168.2.2
Subnet mask 255.255.255.0
Default gateway 192.168.2.1
DNS server 192.168.2.1
Configuration information S 2 The content is as follows:
S 2 =([1,”192.168.2.2”],[2,”255.255.255.0”],
[3,”192.168.2.1”],[4,”192.168.2.1”])
assume that the KEY used by devices B and C is KEY 2 = ABCDEFGH, random number Nonce 2 =456. The encrypted data operates as follows:
EncryptData 2 =AES-128 encrypt (encryption key, plaintext data) =
AES-128 encrypt (MD5(ABCDEFGH|456),S 2 )
The device B generates a configuration response message I b2 The type of information is identified as 3, and the information content is:
I b2 =(Type=3,Nonce=456,EncryptData 2 )
and 4, step 4: the device B sends an association response frame F to the device C b2 Carrying configuration response information I b2
And 5: device C receives F b2
And 6: from F b2 Extraction of I b2 Using KEY 2 = ABCDEFGH decrypt encrypted data to obtain configuration information S 2r
S 2r =AES-128 decrypt (decryption Key, ciphertext data) = AES-128 decrypt (MD5(ABCDEFGH|456),EncryptData 2 )
And 7: device C is according to S 2r The content sets the network parameters of the device. An IP address of 192.168.2.2, a subnet mask of 255.255.255.0,default gateway 192.168.2.1 and dns server 192.168.2.1.
Through the steps, the device C establishes Wi-Fi connection with the device B, acquires the network configuration parameters and can normally access the Internet through the device B.
As can be seen from the above, when the technical solution of the present application is implemented, the configuration request information includes an information type identifier and a configuration request list, and the configuration request list includes configuration identifiers of configurations to be requested. The configuration response information comprises an information type identifier, a preset random number and encrypted data, and the encrypted data is obtained by encrypting a user key, the preset random number and the configuration information. The configuration information comprises one or more configuration items, and the configuration items are used for representing the corresponding relation between the configuration identification and the configuration parameters.
The step of decrypting the configuration response information by the terminal equipment comprises the following steps:
and generating a decryption key according to the user key and the preset random number, and decrypting the encrypted data in the configuration response information by using the decryption key.
In addition, the step of the access point device constructing the configuration information according to the configuration request information comprises:
identifying a configuration request list from the configuration request information, and distributing corresponding configuration parameters for each configuration identifier to be configured in the configuration request list so as to generate configuration items representing the corresponding relationship between the configuration identifiers and the configuration parameters; and taking the combination of one or more configuration items as the configuration information obtained by the construction.
The step of encrypting the configuration information by the access point device includes:
and generating an encryption key according to the user key and a preset random number, and encrypting the configuration information by using the encryption key.
The invention simplifies the process that the Wi-Fi terminal is connected to the Internet through the Wi-Fi access point: in the first step, the transmission of network configuration information is increased in the process of establishing connection based on the IEEE802.11 protocol, so that the operation of the second step is saved, and the time required by the Wi-Fi terminal to access the Internet is shortened.
Specifically, the invention carries extra self-defined configuration request information and configuration response information through an 802.11 protocol association request frame and an association response frame which are transmitted by the Wi-Fi terminal and the Wi-Fi access point in the association process, thereby replacing a DHCP protocol, realizing the transmission of the configuration information and shortening the time required by the Wi-Fi terminal to access the Internet. In order to avoid configuration information leakage, symmetric data encryption is carried out on configuration response information by using a secret key of identity authentication during Wi-Fi connection, and decryption is carried out by using the secret key when a Wi-Fi terminal receives a ciphertext. Compared with the common Wi-Fi equipment, the method for configuring the parameters through the DHCP process after the association shortens the time for configuring the parameters, and when the Wi-Fi terminal is switched among different Wi-Fi access points, the function of accessing the terminal to the Internet can be quickly recovered, so that the method can be applied to time-sensitive access scenes.
Example two
Referring to fig. 3, the present invention further provides a terminal device, where the terminal device includes a memory and a processor, the memory is used for storing a computer program, and when the computer program is executed by the processor, the method for acquiring the configuration information is implemented.
Referring to fig. 4, the present invention further provides an access point device, where the access point device includes a memory and a processor, where the memory is used to store a computer program, and when the computer program is executed by the processor, the access point device implements the configuration method for the configuration information.
The present invention further provides a computer storage medium for storing a computer program, wherein when the computer program is executed by a processor, the method for acquiring configuration information or the method for configuring configuration information is implemented.
The processor may be a Central Processing Unit (CPU). The Processor may also be other general purpose processors, digital Signal Processors (DSPs), application Specific Integrated Circuits (ASICs), field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components, or a combination thereof.
The memory, as a non-transitory computer-readable storage medium, may be used to store non-transitory software programs, non-transitory computer-executable programs, and modules, such as program instructions/modules corresponding to the methods in the embodiments of the present disclosure. The processor executes various functional applications and data processing of the processor by executing non-transitory software programs, instructions and modules stored in the memory, that is, the method in the above method embodiment is realized.
The memory may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created by the processor, and the like. Further, the memory may include high speed random access memory, and may also include non-transitory memory, such as at least one disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, the memory optionally includes memory located remotely from the processor, and such remote memory may be coupled to the processor via a network.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is specific and detailed, but not to be understood as limiting the scope of the present invention. It should be noted that various changes and modifications can be made by those skilled in the art without departing from the spirit of the invention, and these changes and modifications are all within the scope of the invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A method for acquiring configuration information is applied to a terminal device, and the method comprises the following steps:
receiving a broadcast beacon frame sent by access point equipment, wherein the broadcast beacon frame carries configuration capability description information;
sending an association request frame to the access point device under the condition that the configuration capability description information is confirmed to support an association configuration process, wherein the association request frame comprises configuration request information;
receiving an association response frame sent by the access point device, wherein the association response frame carries configuration response information, and the configuration response information is generated by encrypting according to configuration information corresponding to the configuration request information;
and decrypting the configuration response information to restore the configuration information, and analyzing the configuration information to take the corresponding configuration into effect.
2. The method according to claim 1, wherein the configuration request information includes an information type identifier and a configuration request list, and the configuration request list includes configuration identifiers of respective configurations to be requested;
the configuration response information comprises an information type identifier, a preset random number and encrypted data, and the encrypted data is obtained by encrypting a user key, the preset random number and the configuration information;
the configuration information comprises one or more configuration items, and the configuration items are used for representing the corresponding relation between the configuration identification and the configuration parameters.
3. The method of claim 1 or 2, wherein decrypting the configuration reply information comprises:
and generating a decryption key according to the user key and a preset random number, and decrypting the encrypted data in the configuration response information by using the decryption key.
4. A terminal device, characterized in that the terminal device comprises a memory for storing a computer program and a processor, which computer program, when executed by the processor, carries out the method according to any one of claims 1 to 3.
5. A computer storage medium for storing a computer program which, when executed by a processor, implements a method as claimed in any one of claims 1 to 3.
6. A configuration method of configuration information is applied to an access point device, and the method comprises the following steps:
sending a broadcast beacon frame to a terminal device, wherein the broadcast beacon frame carries configuration capability description information;
receiving an association request frame sent by the terminal equipment under the condition that the description information of the configuration capability supports an association configuration process, wherein the association request frame comprises configuration request information;
and constructing configuration information according to the configuration request information, encrypting the configuration information to generate configuration response information, and sending an associated response frame carrying the configuration response information to the terminal equipment so as to enable the terminal equipment to take corresponding configuration into effect based on the associated response frame.
7. The method of claim 6, wherein constructing configuration information according to the configuration request information comprises:
identifying a configuration request list from the configuration request information, and distributing corresponding configuration parameters for each configuration identifier to be configured in the configuration request list so as to generate configuration items representing the corresponding relationship between the configuration identifiers and the configuration parameters;
and taking the combination of one or more configuration items as the configuration information obtained by the construction.
8. The method of claim 6, wherein encrypting the configuration information comprises:
and generating an encryption key according to the user key and a preset random number, and encrypting the configuration information by using the encryption key.
9. An access point device, characterized in that the access point device comprises a memory for storing a computer program which, when executed by the processor, implements the method according to any one of claims 6 to 8.
10. A computer storage medium, characterized in that the computer storage medium is used to store a computer program which, when executed by a processor, implements the method of any one of claims 6 to 8.
CN202211365038.XA 2022-11-03 2022-11-03 Configuration information acquisition and configuration method, terminal equipment and access point equipment Pending CN115811751A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211365038.XA CN115811751A (en) 2022-11-03 2022-11-03 Configuration information acquisition and configuration method, terminal equipment and access point equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211365038.XA CN115811751A (en) 2022-11-03 2022-11-03 Configuration information acquisition and configuration method, terminal equipment and access point equipment

Publications (1)

Publication Number Publication Date
CN115811751A true CN115811751A (en) 2023-03-17

Family

ID=85482876

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211365038.XA Pending CN115811751A (en) 2022-11-03 2022-11-03 Configuration information acquisition and configuration method, terminal equipment and access point equipment

Country Status (1)

Country Link
CN (1) CN115811751A (en)

Similar Documents

Publication Publication Date Title
JP6928143B2 (en) Network architecture and security with encrypted client device context
JP6882255B2 (en) Network security architecture
US20190068591A1 (en) Key Distribution And Authentication Method And System, And Apparatus
US9686675B2 (en) Systems, methods and devices for deriving subscriber and device identifiers in a communication network
US11510052B2 (en) Identity information processing method, device, and system
CN107005400B (en) Service processing method and device
US9967738B2 (en) Methods and arrangements for enabling data transmission between a mobile device and a static destination address
CN114285570A (en) Secret key configuration and security policy determination method and device
EP3748928A1 (en) Method and system for apparatus awaiting network configuration to access hot spot network apparatus
CN116781444A (en) Connecting to home local area network via mobile communication network
WO2020088026A1 (en) Authentication method employing general bootstrapping architecture (gba) and related apparatus
KR102094216B1 (en) Security supporting method and system for proximity based service device to device discovery and communication in mobile telecommunication system environment
JP2019522945A (en) Operations related to user equipment that uses secret identifiers
WO2017167249A1 (en) Private network access method, device and system
WO2017197596A1 (en) Communication method, network equipment, and user equipment
TW201705780A (en) Network architecture and security with encrypted network reachability contexts
WO2016179966A1 (en) Method for realizing network access, terminal and computer storage medium
WO2018176187A1 (en) Data transmission method, user equipment, and control plane node
WO2014201783A1 (en) Encryption and authentication method, system and terminal for ad hoc network
CN115811751A (en) Configuration information acquisition and configuration method, terminal equipment and access point equipment
JP2017513412A (en) Method and system for determining that a SIM and a SIP client are located on the same mobile device
US12081591B2 (en) Over-the-top management in a communication network
US12127088B2 (en) Over-the-top management in a communication network
EP3454583B1 (en) Network connection method, and secure node determination method and device
CN118614099A (en) Authentication mechanism for accessing edge data network based on TLS-PSK

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination