CN115811751A - Configuration information acquisition and configuration method, terminal equipment and access point equipment - Google Patents
Configuration information acquisition and configuration method, terminal equipment and access point equipment Download PDFInfo
- Publication number
- CN115811751A CN115811751A CN202211365038.XA CN202211365038A CN115811751A CN 115811751 A CN115811751 A CN 115811751A CN 202211365038 A CN202211365038 A CN 202211365038A CN 115811751 A CN115811751 A CN 115811751A
- Authority
- CN
- China
- Prior art keywords
- configuration
- information
- access point
- association
- request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention relates to a method for acquiring and configuring configuration information, a terminal device and an access point device, wherein the method comprises the following steps: receiving a broadcast beacon frame sent by access point equipment, wherein the broadcast beacon frame carries configuration capability description information; sending an association request frame to the access point device under the condition that the configuration capability description information is confirmed to support an association configuration process, wherein the association request frame comprises configuration request information; receiving an association response frame sent by the access point device, wherein the association response frame carries configuration response information, and the configuration response information is generated by encrypting according to configuration information corresponding to the configuration request information; and decrypting the configuration response information to restore the configuration information, and analyzing the configuration information to take the corresponding configuration into effect. The technical scheme provided by the invention can reduce the access time.
Description
Technical Field
The invention relates to the field of internet communication, in particular to a configuration information obtaining method, a configuration information configuring method, terminal equipment and access point equipment.
Background
At present, the process of connecting a Wi-Fi terminal to the Internet through a Wi-Fi access point is divided into two steps: (1) Through an IEEE802.11 protocol, the Wi-Fi terminal and the Wi-Fi access point perform identity authentication to establish wireless connection; (2) And the Wi-Fi access point sends network configuration information to the Wi-Fi terminal through a DHCP protocol. After the two steps, the Wi-Fi terminal can access the Internet through the transfer of the Wi-Fi access point.
However, such an access method requires multiple information interactions between the access point device and the terminal device, which results in a long access time. In some application occasions sensitive to access time (for example, during a voice call, a terminal device switches an access point device), the existing access mode often has lower access efficiency.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a method for acquiring and configuring configuration information, a terminal device, and an access point device, which can reduce access time.
In order to achieve the above object, an aspect of the present invention provides a method for acquiring configuration information, where the method is applied in a terminal device, and the method includes: receiving a broadcast beacon frame sent by access point equipment, wherein the broadcast beacon frame carries configuration capability description information; sending an association request frame to the access point device under the condition that the configuration capability description information is confirmed to support an association configuration process, wherein the association request frame comprises configuration request information; receiving an association response frame sent by the access point device, wherein the association response frame carries configuration response information, and the configuration response information is generated by encrypting according to configuration information corresponding to the configuration request information; and decrypting the configuration response information to restore the configuration information, and analyzing the configuration information to take the corresponding configuration into effect.
In one embodiment, the configuration request information includes an information type identifier and a configuration request list, where the configuration request list includes configuration identifiers of respective configurations to be requested.
In one embodiment, the configuration response message includes an information type identifier, a preset random number, and encrypted data, where the encrypted data is obtained by encrypting a user key, the preset random number, and the configuration information.
In one embodiment, decrypting the configuration reply information comprises:
and generating a decryption key according to the user key and the preset random number, and decrypting the encrypted data in the configuration response information by using the decryption key.
In one embodiment, the configuration information includes one or more configuration items, and the configuration items are used to characterize a corresponding relationship between a configuration identifier and a configuration parameter.
In another aspect, the present invention further provides a terminal device, where the terminal device includes a memory and a processor, where the memory is used to store a computer program, and the computer program is executed by the processor to implement the above-mentioned method for acquiring configuration information.
The invention also provides a configuration method of configuration information, which is applied to the access point equipment and comprises the following steps: sending a broadcast beacon frame to terminal equipment, wherein the broadcast beacon frame carries configuration capability description information; receiving an association request frame sent by the terminal equipment under the condition that the description information of the configuration capability indicates that the association configuration process is supported, wherein the association request frame comprises configuration request information; and constructing configuration information according to the configuration request information, encrypting the configuration information to generate configuration response information, and sending an associated response frame carrying the configuration response information to the terminal equipment, so that the terminal equipment takes the corresponding configuration based on the associated response frame into effect.
In one embodiment, constructing configuration information from the configuration request information comprises:
identifying a configuration request list from the configuration request information, and distributing corresponding configuration parameters for each configuration identifier to be configured in the configuration request list so as to generate configuration items representing the corresponding relationship between the configuration identifiers and the configuration parameters;
and taking the combination of one or more configuration items as the configuration information obtained by the construction.
In one embodiment, encrypting the configuration information comprises:
and generating an encryption key according to the user key and a preset random number, and encrypting the configuration information by using the encryption key.
In another aspect, the present invention further provides an access point device, where the access point device includes a memory and a processor, where the memory is used to store a computer program, and the computer program, when executed by the processor, implements the configuration method of the configuration information described above.
In another aspect, the present invention further provides a computer storage medium for storing a computer program, where the computer program is executed by a processor to implement the above-mentioned method for acquiring configuration information or the method for configuring configuration information.
The invention has the beneficial effects that:
the invention simplifies the process that the Wi-Fi terminal is connected to the Internet through the Wi-Fi access point: in the first step, the transmission of network configuration information is increased in the process of establishing connection based on the IEEE802.11 protocol, so that the operation of the second step is saved, and the time required by the Wi-Fi terminal to access the Internet is shortened.
Specifically, the invention carries extra self-defined configuration request information and configuration response information through an 802.11 protocol association request frame and an association response frame which are transmitted by the Wi-Fi terminal and the Wi-Fi access point in the association process, thereby replacing a DHCP protocol, realizing the transmission of the configuration information and shortening the time required by the Wi-Fi terminal to access the Internet. In order to avoid configuration information leakage, symmetric data encryption is carried out on configuration response information by using a secret key of identity authentication during Wi-Fi connection, and decryption is carried out by using the secret key when a Wi-Fi terminal receives a ciphertext. Compared with the common Wi-Fi equipment, the method for configuring the parameters through the DHCP process after association shortens the time for configuring the parameters, and when the Wi-Fi terminal is switched among different Wi-Fi access points, the function of accessing the terminal to the Internet can be quickly recovered, so that the method can be applied to time-sensitive access scenes.
Drawings
Fig. 1 is a schematic diagram illustrating steps of a method for acquiring configuration information according to an embodiment of the present invention;
FIG. 2 is a diagram illustrating steps of a configuration method for configuring information according to an embodiment of the present invention;
fig. 3 shows a schematic structural diagram of a terminal device in an embodiment of the present invention;
fig. 4 shows a schematic structural diagram of an access point device in one embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the technical solutions of the present invention will be further clearly and completely described below with reference to the embodiments of the present invention. It should be noted that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example one
Referring to fig. 1, the present application provides a method for acquiring configuration information, where the method is applied in a terminal device, and the method includes the following steps.
S11: receiving a broadcast beacon frame sent by access point equipment, wherein the broadcast beacon frame carries configuration capability description information;
s13: sending an association request frame to the access point equipment under the condition that the configuration capability description information representation supports an association configuration process, wherein the association request frame comprises configuration request information;
s15: receiving an association response frame sent by the access point device, wherein the association response frame carries configuration response information, and the configuration response information is generated by encrypting according to configuration information corresponding to the configuration request information;
s17: and decrypting the configuration response information to restore the configuration information, and analyzing the configuration information to take the corresponding configuration into effect. :
correspondingly, referring to fig. 2, the present application also provides a method for configuring configuration information, where the method is applied to an access point device, and the method may include the following steps.
S21: sending a broadcast beacon frame to a terminal device, wherein the broadcast beacon frame carries configuration capability description information;
s23: receiving an association request frame sent by the terminal equipment under the condition that the description information of the configuration capability indicates that the association configuration process is supported, wherein the association request frame comprises configuration request information;
s25: and constructing configuration information according to the configuration request information, encrypting the configuration information to generate configuration response information, and sending an associated response frame carrying the configuration response information to the terminal equipment, so that the terminal equipment takes the corresponding configuration based on the associated response frame into effect.
The terminal device may be an electronic device used by a user. For example, the terminal device may be a laptop, a smartphone, a tablet, a smart wearable device, or the like, in which the Wi-Fi communication module is installed. The above-mentioned access point device may be a router capable of providing networking function, or other integrated device with router function.
In this embodiment, the interaction process between the access point device and the terminal device may be generally described through the following steps:
s1: access point broadcast beacon frame F beacon Carrying custom configuration capability description information I cap Indicating that the associated process is supported to transmit the configuration information;
s2: terminal reception F beacon Confirming the capabilities of the access point.
S3: the terminal sends an association request frame F to the access point a And requesting to establish the Wi-Fi connection. Carrying custom configuration request information I a ;
S4: the access point receives the association request frame F a For configuration request information I a And (4) carrying out analysis.
S5, the access point requests the information I according to the configuration a Constructing configuration information S, encrypting S and generating configuration response information I b ;
S6: the access point sends a carrying configuration response message I to the terminal b Associated response frame F b Receiving the association request of the terminal;
s7, the terminal receives the associated response frame F b Confirming that the association is established;
s8: the terminal pair configures response information I b Decrypting to obtain configuration information S;
s9: the terminal parses the configuration information S and validates the configuration.
Wherein, the content of the respective definition information in the above steps is as follows:
1. configuration capability description information I cap :
I cap =(Type,Capability)
The Type is an information Type identifier, and each Type of information has a unique value. When the Capability is 1, the support of the associated configuration process is indicated; when 0, it indicates that the associated configuration flow is not supported.
2. Configuration request information I a :
I a =(Type,ConfigReqList)
The Type is an information Type identifier, and each Type of information has a unique value. ConfigReqList is a configuration request list, and the content thereof is as follows:
ConfigReqList=(ConfigId1,ConfigId2,ConfigId3,...ConfigIdN)
each configuration is represented by a unique identity ConfigId.
3. Configuration response information I b :
I b =(Type,Nonce,EncryptData)
The Type is an information Type identifier, and each Type of information has a unique value. Nonce is a random number used for data encryption. EncryptData is encrypted data. The user KEY is KEY, and the relationship between the configuration information S and EncryptData is as follows:
EncryptData=EncryptFn(KEY,Nonce,S)
EncryptFn is a data encryption algorithm, and a public algorithm or a private algorithm can be selected according to needs.
4. Configuration information S:
S=([ConfigId1,Data1],[ConfigId2,Data2],...[ConfigIdN,DataN])
the configuration information S is in the form of a list, each element of the list being a configuration identity ConfigId and a parameter value Data.
In one specific application example, two Wi-Fi wireless routers (device A, device B) and one Wi-Fi handset (device C). The devices a, B each have an uplink interface to the internet and provide Wi-Fi access point functionality. The intranet IP address of the device a is 192.168.1.1, and the intranet IP address of the device B is 192.168.2.1. Both devices a, B enable DNS proxy functionality.
The device C first confirms that both the devices a and B support the association configuration flow:
step 1: the device A and the device B send beacon frames once every 100ms and carry configuration capability description information I cap The information type is marked as 1, and the information content is as follows:
I cap =(Type=1,Capability=1)
step 2: and the device C receives the beacon frame and confirms that the devices A and B both support the association configuration process.
The process of device C establishing association with device a is as follows:
step 1: the device C associates with the device A and sends an association request frame F a1 Carries configuration request information I a1 This information type is identified as 2. Requesting to acquire configuration information such as an IP address, a subnet mask, a default gateway, a DNS server and the like, wherein each configuration identifier is defined as follows:
configuration name | Configuring an identification value configId |
IP address | 1 |
Subnet mask | 2 |
Default gateway | 3 |
DNS server | 4 |
I a1 The information content is as follows:
I a1 =(Type=2,ConfigReqList=[1,2,3,4])
and 2, step: device a receives association request frame F a1 From I a1 The device C requests to acquire configuration data such as an IP address, a subnet mask, a default gateway, a DNS server, and the like.
And step 3: the configuration data allocated by device a to device C is as follows:
configuration name | Configuring data |
IP address | 192.168.1.2 |
Subnet mask | 255.255.255.0 |
Default gateway | 192.168.1.1 |
DNS server | 192.168.1.1 |
Configuration information S 1 The content is as follows:
S 1 =([1,”192.168.1.2”],[2,”255.255.255.0”],
[3,”192.168.1.1”],[4,”192.168.1.1”])
assume that the KEY used by devices A and C is KEY 1 = abcdefgh, random number Nonce 1 =123. The encryption algorithm of the configuration information is AES-128, and a 128-bit encryption KEY is generated for KEY and Nonce through the MD5 algorithm. The encrypted data operates as follows:
EncryptData 1 =AES-128 encrypt (encryption key, plaintext data) =
AES-128 encrypt (MD5(abcdefgh|123),S 1 )
The device A generates a configuration response message I b1 The type of information is identified as 3, and the information content is:
I b1 =(Type=3,Nonce=123,EncryptData 1 )
and 4, step 4: device A sends an association response frame F to device C b1 Carrying configuration response information I b1 。
And 5: device C receives F b1 。
And 6: from F b1 Extraction of I b1 Using KEY 1 = abcdefgh to decrypt the encrypted data, obtaining configuration information S 1r 。
S 1r =AES-128 decrypt (decryption Key, ciphertext data) = AES-128 decrypt (MD5(abcdefgh|123),EncryptData 1 )
And 7: device C is according to S 1r The content sets the network parameters of the device. 192.168.1.2 IP address, 255.255.255.0 subnet mask, 192.168 default gateway1.1, DNS Server 192.168.1.1.
Through the steps, the device C establishes Wi-Fi connection with the device A, acquires the network configuration parameters and can normally access the Internet through the device A.
And the equipment C is connected with the equipment A through the Wi-Fi, is accessed to the Internet, and is gradually far away from the equipment A and close to the equipment B due to the movement of the position of the equipment C in the conversation process with the User. And the equipment C decides to actively disconnect the connection with the equipment A, switches to the equipment B and accesses the Internet. Device C first sends a disconnect request frame to device a and then starts to establish an association with device B as follows:
step 1: the device C associates with the device B and sends an association request frame F a2 Carries configuration request information I a2 This information type is identified as 2. And requesting to acquire configuration information such as an IP address, a subnet mask, a default gateway, a DNS server and the like.
I a2 The information content is as follows:
I a2 =(Type=2,ConfigReqList=[1,2,3,4])
step 2: device B receives association request frame F a2 From I a2 The device C requests to obtain configuration data such as an IP address, a subnet mask, a default gateway, a DNS server, and the like.
And step 3: the configuration data allocated by device B to device C is as follows:
configuration name | Configuring data |
IP address | 192.168.2.2 |
Subnet mask | 255.255.255.0 |
Default gateway | 192.168.2.1 |
DNS server | 192.168.2.1 |
Configuration information S 2 The content is as follows:
S 2 =([1,”192.168.2.2”],[2,”255.255.255.0”],
[3,”192.168.2.1”],[4,”192.168.2.1”])
assume that the KEY used by devices B and C is KEY 2 = ABCDEFGH, random number Nonce 2 =456. The encrypted data operates as follows:
EncryptData 2 =AES-128 encrypt (encryption key, plaintext data) =
AES-128 encrypt (MD5(ABCDEFGH|456),S 2 )
The device B generates a configuration response message I b2 The type of information is identified as 3, and the information content is:
I b2 =(Type=3,Nonce=456,EncryptData 2 )
and 4, step 4: the device B sends an association response frame F to the device C b2 Carrying configuration response information I b2 。
And 5: device C receives F b2 。
And 6: from F b2 Extraction of I b2 Using KEY 2 = ABCDEFGH decrypt encrypted data to obtain configuration information S 2r 。
S 2r =AES-128 decrypt (decryption Key, ciphertext data) = AES-128 decrypt (MD5(ABCDEFGH|456),EncryptData 2 )
And 7: device C is according to S 2r The content sets the network parameters of the device. An IP address of 192.168.2.2, a subnet mask of 255.255.255.0,default gateway 192.168.2.1 and dns server 192.168.2.1.
Through the steps, the device C establishes Wi-Fi connection with the device B, acquires the network configuration parameters and can normally access the Internet through the device B.
As can be seen from the above, when the technical solution of the present application is implemented, the configuration request information includes an information type identifier and a configuration request list, and the configuration request list includes configuration identifiers of configurations to be requested. The configuration response information comprises an information type identifier, a preset random number and encrypted data, and the encrypted data is obtained by encrypting a user key, the preset random number and the configuration information. The configuration information comprises one or more configuration items, and the configuration items are used for representing the corresponding relation between the configuration identification and the configuration parameters.
The step of decrypting the configuration response information by the terminal equipment comprises the following steps:
and generating a decryption key according to the user key and the preset random number, and decrypting the encrypted data in the configuration response information by using the decryption key.
In addition, the step of the access point device constructing the configuration information according to the configuration request information comprises:
identifying a configuration request list from the configuration request information, and distributing corresponding configuration parameters for each configuration identifier to be configured in the configuration request list so as to generate configuration items representing the corresponding relationship between the configuration identifiers and the configuration parameters; and taking the combination of one or more configuration items as the configuration information obtained by the construction.
The step of encrypting the configuration information by the access point device includes:
and generating an encryption key according to the user key and a preset random number, and encrypting the configuration information by using the encryption key.
The invention simplifies the process that the Wi-Fi terminal is connected to the Internet through the Wi-Fi access point: in the first step, the transmission of network configuration information is increased in the process of establishing connection based on the IEEE802.11 protocol, so that the operation of the second step is saved, and the time required by the Wi-Fi terminal to access the Internet is shortened.
Specifically, the invention carries extra self-defined configuration request information and configuration response information through an 802.11 protocol association request frame and an association response frame which are transmitted by the Wi-Fi terminal and the Wi-Fi access point in the association process, thereby replacing a DHCP protocol, realizing the transmission of the configuration information and shortening the time required by the Wi-Fi terminal to access the Internet. In order to avoid configuration information leakage, symmetric data encryption is carried out on configuration response information by using a secret key of identity authentication during Wi-Fi connection, and decryption is carried out by using the secret key when a Wi-Fi terminal receives a ciphertext. Compared with the common Wi-Fi equipment, the method for configuring the parameters through the DHCP process after the association shortens the time for configuring the parameters, and when the Wi-Fi terminal is switched among different Wi-Fi access points, the function of accessing the terminal to the Internet can be quickly recovered, so that the method can be applied to time-sensitive access scenes.
Example two
Referring to fig. 3, the present invention further provides a terminal device, where the terminal device includes a memory and a processor, the memory is used for storing a computer program, and when the computer program is executed by the processor, the method for acquiring the configuration information is implemented.
Referring to fig. 4, the present invention further provides an access point device, where the access point device includes a memory and a processor, where the memory is used to store a computer program, and when the computer program is executed by the processor, the access point device implements the configuration method for the configuration information.
The present invention further provides a computer storage medium for storing a computer program, wherein when the computer program is executed by a processor, the method for acquiring configuration information or the method for configuring configuration information is implemented.
The processor may be a Central Processing Unit (CPU). The Processor may also be other general purpose processors, digital Signal Processors (DSPs), application Specific Integrated Circuits (ASICs), field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components, or a combination thereof.
The memory, as a non-transitory computer-readable storage medium, may be used to store non-transitory software programs, non-transitory computer-executable programs, and modules, such as program instructions/modules corresponding to the methods in the embodiments of the present disclosure. The processor executes various functional applications and data processing of the processor by executing non-transitory software programs, instructions and modules stored in the memory, that is, the method in the above method embodiment is realized.
The memory may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created by the processor, and the like. Further, the memory may include high speed random access memory, and may also include non-transitory memory, such as at least one disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, the memory optionally includes memory located remotely from the processor, and such remote memory may be coupled to the processor via a network.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is specific and detailed, but not to be understood as limiting the scope of the present invention. It should be noted that various changes and modifications can be made by those skilled in the art without departing from the spirit of the invention, and these changes and modifications are all within the scope of the invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.
Claims (10)
1. A method for acquiring configuration information is applied to a terminal device, and the method comprises the following steps:
receiving a broadcast beacon frame sent by access point equipment, wherein the broadcast beacon frame carries configuration capability description information;
sending an association request frame to the access point device under the condition that the configuration capability description information is confirmed to support an association configuration process, wherein the association request frame comprises configuration request information;
receiving an association response frame sent by the access point device, wherein the association response frame carries configuration response information, and the configuration response information is generated by encrypting according to configuration information corresponding to the configuration request information;
and decrypting the configuration response information to restore the configuration information, and analyzing the configuration information to take the corresponding configuration into effect.
2. The method according to claim 1, wherein the configuration request information includes an information type identifier and a configuration request list, and the configuration request list includes configuration identifiers of respective configurations to be requested;
the configuration response information comprises an information type identifier, a preset random number and encrypted data, and the encrypted data is obtained by encrypting a user key, the preset random number and the configuration information;
the configuration information comprises one or more configuration items, and the configuration items are used for representing the corresponding relation between the configuration identification and the configuration parameters.
3. The method of claim 1 or 2, wherein decrypting the configuration reply information comprises:
and generating a decryption key according to the user key and a preset random number, and decrypting the encrypted data in the configuration response information by using the decryption key.
4. A terminal device, characterized in that the terminal device comprises a memory for storing a computer program and a processor, which computer program, when executed by the processor, carries out the method according to any one of claims 1 to 3.
5. A computer storage medium for storing a computer program which, when executed by a processor, implements a method as claimed in any one of claims 1 to 3.
6. A configuration method of configuration information is applied to an access point device, and the method comprises the following steps:
sending a broadcast beacon frame to a terminal device, wherein the broadcast beacon frame carries configuration capability description information;
receiving an association request frame sent by the terminal equipment under the condition that the description information of the configuration capability supports an association configuration process, wherein the association request frame comprises configuration request information;
and constructing configuration information according to the configuration request information, encrypting the configuration information to generate configuration response information, and sending an associated response frame carrying the configuration response information to the terminal equipment so as to enable the terminal equipment to take corresponding configuration into effect based on the associated response frame.
7. The method of claim 6, wherein constructing configuration information according to the configuration request information comprises:
identifying a configuration request list from the configuration request information, and distributing corresponding configuration parameters for each configuration identifier to be configured in the configuration request list so as to generate configuration items representing the corresponding relationship between the configuration identifiers and the configuration parameters;
and taking the combination of one or more configuration items as the configuration information obtained by the construction.
8. The method of claim 6, wherein encrypting the configuration information comprises:
and generating an encryption key according to the user key and a preset random number, and encrypting the configuration information by using the encryption key.
9. An access point device, characterized in that the access point device comprises a memory for storing a computer program which, when executed by the processor, implements the method according to any one of claims 6 to 8.
10. A computer storage medium, characterized in that the computer storage medium is used to store a computer program which, when executed by a processor, implements the method of any one of claims 6 to 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211365038.XA CN115811751A (en) | 2022-11-03 | 2022-11-03 | Configuration information acquisition and configuration method, terminal equipment and access point equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211365038.XA CN115811751A (en) | 2022-11-03 | 2022-11-03 | Configuration information acquisition and configuration method, terminal equipment and access point equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115811751A true CN115811751A (en) | 2023-03-17 |
Family
ID=85482876
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211365038.XA Pending CN115811751A (en) | 2022-11-03 | 2022-11-03 | Configuration information acquisition and configuration method, terminal equipment and access point equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115811751A (en) |
-
2022
- 2022-11-03 CN CN202211365038.XA patent/CN115811751A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6928143B2 (en) | Network architecture and security with encrypted client device context | |
JP6882255B2 (en) | Network security architecture | |
US20190068591A1 (en) | Key Distribution And Authentication Method And System, And Apparatus | |
US9686675B2 (en) | Systems, methods and devices for deriving subscriber and device identifiers in a communication network | |
US11510052B2 (en) | Identity information processing method, device, and system | |
CN107005400B (en) | Service processing method and device | |
US9967738B2 (en) | Methods and arrangements for enabling data transmission between a mobile device and a static destination address | |
CN114285570A (en) | Secret key configuration and security policy determination method and device | |
EP3748928A1 (en) | Method and system for apparatus awaiting network configuration to access hot spot network apparatus | |
CN116781444A (en) | Connecting to home local area network via mobile communication network | |
WO2020088026A1 (en) | Authentication method employing general bootstrapping architecture (gba) and related apparatus | |
KR102094216B1 (en) | Security supporting method and system for proximity based service device to device discovery and communication in mobile telecommunication system environment | |
JP2019522945A (en) | Operations related to user equipment that uses secret identifiers | |
WO2017167249A1 (en) | Private network access method, device and system | |
WO2017197596A1 (en) | Communication method, network equipment, and user equipment | |
TW201705780A (en) | Network architecture and security with encrypted network reachability contexts | |
WO2016179966A1 (en) | Method for realizing network access, terminal and computer storage medium | |
WO2018176187A1 (en) | Data transmission method, user equipment, and control plane node | |
WO2014201783A1 (en) | Encryption and authentication method, system and terminal for ad hoc network | |
CN115811751A (en) | Configuration information acquisition and configuration method, terminal equipment and access point equipment | |
JP2017513412A (en) | Method and system for determining that a SIM and a SIP client are located on the same mobile device | |
US12081591B2 (en) | Over-the-top management in a communication network | |
US12127088B2 (en) | Over-the-top management in a communication network | |
EP3454583B1 (en) | Network connection method, and secure node determination method and device | |
CN118614099A (en) | Authentication mechanism for accessing edge data network based on TLS-PSK |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |