WO2014005482A1 - 建立直接链路方法、密钥更新方法和设备 - Google Patents

建立直接链路方法、密钥更新方法和设备 Download PDF

Info

Publication number
WO2014005482A1
WO2014005482A1 PCT/CN2013/077431 CN2013077431W WO2014005482A1 WO 2014005482 A1 WO2014005482 A1 WO 2014005482A1 CN 2013077431 W CN2013077431 W CN 2013077431W WO 2014005482 A1 WO2014005482 A1 WO 2014005482A1
Authority
WO
WIPO (PCT)
Prior art keywords
site
direct link
key
key information
requested
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2013/077431
Other languages
English (en)
French (fr)
Inventor
陆苏
丁志明
树贵明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Device Co Ltd
Original Assignee
Huawei Device Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Device Co Ltd filed Critical Huawei Device Co Ltd
Priority to EP13813204.8A priority Critical patent/EP2846569B1/en
Publication of WO2014005482A1 publication Critical patent/WO2014005482A1/zh
Priority to US14/573,935 priority patent/US20150104019A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup

Definitions

  • the present invention relates to communication technologies, and in particular, to a method for establishing a direct link, a method for updating a key, and a device.
  • STA BACKGROUND A station
  • AP Access Point
  • the STAs at different locations within the coverage of an AP have different rates of direct communication with the APs, and STAs that are farther away from the APs need to forward data through the relay to shorten the STAs and APs. Communication time.
  • the method for generating a direct link between the STA and the relay in the prior art is that the STA generates a random number, and carries the random number in the setup request sent to the AP, and the AP sends the random number to the relay by establishing a request. .
  • the relay After receiving the random number generated by the STA, the relay generates a random number, and calculates a random number generated by the STA and a random number generated by the relay to generate a key for decrypting the service data sent by the STA to the relay.
  • the relay sends the random number generated by the relay to the AP through the setup response sent by the AP.
  • the AP sends the random number generated by the relay to the STA through the establishment of the response, and the random number generated by the STA and the random number generated by the relay are used to calculate the STA to the relay.
  • the key to which the transmitted service data is encrypted. As a result, the signaling overhead is large.
  • Embodiments of the present invention provide a method for establishing a direct link, a requesting site, and a requested site to save signaling overhead.
  • an embodiment of the present invention provides a method for establishing a direct link, including:
  • the requesting station sends a direct link setup request message to the access point, so that the access point sends the direct link setup request message to the requested site, and the direct link setup request message is used for Requesting to establish a direct link between the requesting site and the requested site;
  • the direct link setup response message carries first key information, where the first key information is used for the requesting site and The service data transmitted on the direct link between the requested sites is securely transmitted; the first direct link establishment confirmation message sent by the requesting station to the requested site by using the direct link is performed.
  • the first direct link setup confirmation message is used to indicate that the requesting station receives the first key information generated by the requested site.
  • An embodiment of the present invention provides another method for establishing a direct link, including:
  • the requested site generates first key information, where the first key information is used for secure transmission of service data transmitted on the direct link between the requesting site and the requested site;
  • the requested station sends a direct link setup response message to the access point, so that the access point sends the direct link setup response message to the requesting station, where the direct link setup response message is sent. Carrying the first key information;
  • An embodiment of the present invention provides a requesting site, including:
  • a transmitter configured to send a direct link setup request message to the access point, to enable the access point to send the direct link setup request message to the requested site, where the direct link setup request message is used by Establishing a direct link between the requesting site and the requested site;
  • a receiver configured to receive a direct link setup response message sent by the access point, where the direct link setup response message carries first key information, where the first key information is used for the requesting site Performing secure transmission of traffic data transmitted on the direct link with the requested site; the transmitter is further configured to: transmit, by the direct link, the first direct link to the requested site And establishing a confirmation message, where the first direct link setup confirmation message is used to indicate that the requesting station receives the first key information generated by the requested site.
  • An embodiment of the present invention provides a requested site, including:
  • a receiver configured to receive a direct link setup request message sent by the access point, where the direct link setup request message is used to request to establish a direct link between the request site and the requested site;
  • a processor configured to generate first key information, where the first key information is used to securely transmit service data transmitted on the direct link between the requesting site and the requested site;
  • a transmitter configured to send a direct link setup response message to the access point, to enable the access point to send the direct link setup response message to the requesting station, the direct link setup response message Carrying the first key information
  • the receiver is further configured to: receive a first direct link setup acknowledgement message sent by the requesting station by using the direct link, where the first direct link setup acknowledgement message is used to indicate that the requesting site receives the The first key information generated by the requested site.
  • the method and device for establishing a link provided by the embodiment of the present invention, after receiving the direct link setup request message forwarded by the access point, the requested site carries the requested link generated in the direct link setup response message returned to the access point. Key information, so that the access point returns the direct link setup response message to the requesting site, and the requesting station can perform the service data transmitted on the direct link between the requesting site and the requested site according to the key. Secure transmission, which saves signaling overhead during the process of establishing a link between the requesting site and the requested site.
  • an embodiment of the present invention provides a key update method, including:
  • the requested site generates second key information, the second key information is used to replace the first key information generated by the requested site, and is transmitted on a direct link between the requesting site and the requested site.
  • the requested site transmits the second key information to the access point to cause the access point to transmit the second key information to the requested site.
  • the embodiment of the invention further provides a key update method, including:
  • the requesting site receives the second key information sent by the access point, where the second key information is generated by the requested site, and is used to replace the first key information generated by the requested site, Securely transmitting service data transmitted on the direct link between the requesting site and the requested site;
  • the requesting site replaces the first key information with the second key information, and securely transmits the service data transmitted on the direct link between the requesting site and the requested site.
  • An embodiment of the present invention further provides a requested site, including:
  • a processor configured to generate second key information, where the second key information is used to replace the first key information generated by the requested site, and the direct link between the requesting site and the requested site
  • the transmitted business data is transmitted securely
  • a transmitter configured to send second key information to an access point, so that the access point will be the second Key information is sent to the requested site.
  • An embodiment of the present invention further provides a requesting site, including:
  • a receiver configured to receive the second key information sent by the access point, where the second key information is generated by the requested site, and used to replace the first key information generated by the requested site, Performing secure transmission of service data transmitted on the direct link between the requesting site and the requested site; and a processor, configured to replace the first key information with the second key information, The service data transmitted on the direct link between the requesting site and the requested site is securely transmitted.
  • the second key information may be returned to the requesting site through the access point to make the request
  • the site uses the second key to replace the first key to securely transmit the service data transmitted on the direct link between the requesting site and the requested site, thereby implementing signaling overhead for saving the key update process.
  • FIG. 1 is a flow chart of an embodiment of a method for establishing a direct link according to the present invention
  • FIG. 2 is a flow chart of still another embodiment of a method for establishing a direct link according to the present invention
  • FIG. 3 is a flow chart of another embodiment of a method for establishing a direct link according to the present invention.
  • FIG. 4 is a flow chart of another embodiment of a method for establishing a direct link according to the present invention.
  • FIG. 5 is a schematic structural diagram of an embodiment of a requested site provided by the present invention.
  • FIG. 6 is a schematic structural diagram of an embodiment of an access point provided by the present invention.
  • FIG. 7 is a schematic structural diagram of an embodiment of a request site provided by the present invention.
  • FIG. 8 is a schematic structural diagram of still another embodiment of a request site according to the present invention.
  • FIG. 9 is a schematic structural diagram of an embodiment of a requested site provided by the present invention.
  • FIG. 10 is a schematic structural diagram of an embodiment of a request site provided by the present invention.
  • FIG. 11 is a schematic structural diagram of still another embodiment of a requested site according to the present invention.
  • FIG. 12 is a schematic structural diagram of still another embodiment of a requested site according to the present invention.
  • FIG. 13 is a schematic structural diagram of still another embodiment of a request site according to the present invention
  • FIG. FIG. 14 is a schematic structural diagram of still another embodiment of a request site according to the present invention.
  • GSM Global System for Mobile Communications
  • CDMA Code Division Multiple Access
  • TDMA Time Division Multiple Access
  • WMA Wideband code division multiple access
  • WCDMA Wideband Code Division Multiple Access
  • OFDMA Frequency Division Multiple Access
  • OFDMA Orthogonal Frequency-Division Multiple Access OFDMA Orthogonal Frequency-Division Multiple Access
  • SC-FDMA single carrier FDMA
  • GPRS General Packet Radio Service
  • LTE Long Term Evolution
  • FIG. 1 is a flowchart of an embodiment of a method for establishing a direct link according to the present invention. As shown in FIG. 1 , in this embodiment, an operation performed in a process of establishing a direct link from a requested site side is taken as an example, and the establishment provided by the present invention is provided. The link method is described. The method includes:
  • the requested station receives a direct link setup request message sent by the access point, where the direct link setup request message is used to request to establish a direct link between the request site and the requested site.
  • the requested site generates first key information, where the first key information is used for secure transmission of service data transmitted on a direct link between the requesting site and the requested site.
  • the requested station sends a direct link setup response message to the access point, so that the access point sends a direct link setup response message to the requesting site, where the direct link setup response message carries the first key information.
  • the requested site receives a first direct link setup acknowledgement message sent by the requesting station through the direct link, where the first direct link setup acknowledgement message is used to indicate that the requesting site receives the first key information generated by the requested site.
  • the requesting site referred to in this application may be a wireless requesting site or a wired requesting site.
  • it can be various networks, such as: Wireless Fidelity (WiFi) networks or sites in a cellular network, such as: sensors, meters, etc. (STA).
  • the requested site has the capability of generating the first key information, and may be a wireless requesting station or a wired requesting station.
  • it may be a site such as a sensor or a meter.
  • the requesting site and the requested site are located in the same network, for example, in a Wi Fi network under the same access point.
  • the access point can be a wireless local area network
  • a network element such as an Access Service Network Base Station (ASN BS); or a network element such as the above access point, a controller behind the base station, or an authenticator.
  • ASN BS Access Service Network Base Station
  • ASN BS Access Service Network Base Station
  • the application can be applied to various implementation scenarios, for example: in a WiFi network, as an implementation scenario in which a meter of a requesting station reports a meter reading to an access point; as a temperature and humidity sensor of the requesting station, the measured temperature and humidity are reported to the access point, etc.
  • Implementation scenario not here - enumeration.
  • the requesting site can shorten the communication time of the requesting site and the access point by forwarding the service data reported to the access point by the requested site. .
  • a direct link between the requesting site and the requested site is required to transmit service data.
  • the access point In the process of establishing a direct link between the requesting site and the requested site, the access point is required to forward the direct link setup request message and the direct link setup response message.
  • the requested site may locally generate security for transmitting the service data transmitted on the direct link between the request site and the requested site.
  • the secure transmission may include: adding/decrypting the transmitted data, and/or performing integrity verification.
  • the requested site may send the first key information in the direct link setup response message to the access point, so that the access point sends a direct link setup response message carrying the first key information to the requesting station.
  • the requesting site sends the service data on the direct link (ie, the air interface) between the requested site and the requested site, for example: the meter reading, the detecting data of the sensor, during the life cycle of the first key, the requesting site can use the The first key information encrypts the service data, and after the requested site receives the service data sent by the requesting station, the first key information may be used to decrypt the received service data.
  • the direct link ie, the air interface
  • the first key information may include the first key, or may include the first key and the first The life cycle information of the key.
  • the requested site may further determine the life cycle of the first key after generating the first key, and the first The lifecycle information of the key is sent to the access point in the first key information.
  • the first direct link setup confirmation message (Confirm message) sent by the requesting station through the direct link may be received.
  • the first direct link setup confirmation message is used to indicate that the requesting site receives the first key information generated by the requested site, and the first acknowledgement message may carry a message integrity code (Message Integrity Code) for integrity verification. MIC).
  • the requested station can directly receive the first direct link setup confirmation message sent by the requesting station from the direct link without forwarding the first direct link setup confirmation message through the access point, the requesting site is directly reduced.
  • the number of times a message is sent to an access point can effectively reduce the energy consumption of the requesting site.
  • the requested site is able to receive a first direct link setup confirmation message sent by the requesting site from the direct link.
  • the requesting station may perform integrity verification on the first direct link setup confirmation message received by the requesting station according to the MIC carried therein. If the verification is passed, the requested station may send an Acknowledgement (ACK) to the requesting station through the direct link to indicate that the first key information is correctly received by the integrity verification.
  • ACK Acknowledgement
  • the requested site may generate the second secret in the implementation scenario before the end of the life cycle of the first key, or the timer of the requested site overflows, or the requesting site requests to update the first key information.
  • Key information the second key information is sent to the access point, so that the access point forwards the second key information to the requesting site, so that the requesting site can use the first after the end of the first key life cycle
  • the second key information replaces the first key information, and securely transmits the service data transmitted on the direct link between the requesting site and the requested site.
  • the second key information may include the second key, or may include lifecycle information of the second key and the second key.
  • the requested site may further determine the life cycle of the second key after generating the second key, and The lifecycle information of the key is sent to the access point in the second key information.
  • the requested site may send the second key information to the access point in a message of various formats that interacts with the access point, for example, the second key information may be carried in the
  • the direct link setup response format message is sent to the access point. Since the requested site can generate the second key information and send it to the requesting site before the end of the life cycle of the first key, thereby avoiding the direct connection between the requesting site and the requested site due to the expiration of the first key The link is re-established, which increases the transmission throughput.
  • the second direct link setup confirmation message sent by the requesting station through the direct link may be received (
  • the second direct link setup confirmation message is used to indicate that the requesting station receives the second key information generated by the requested site, and the second direct link setup acknowledgement message may also carry the integrity verification. MIC.
  • the requested station may receive the second direct link setup confirmation message sent by the requesting station through the direct link, and may perform integrity verification according to the MIC carried therein. If the verification is passed, the requested station can send an ACK to the requesting station through the direct link.
  • the direct link setup request message, the direct link setup response message, and the first direct link setup acknowledgement message (Confirm message) and the second direct link setup acknowledgement message (Confirm message) and the second direct link setup acknowledgement message (Confirm message) In addition to carrying the information involved in the embodiment of the present invention, various information existing in the above message is retained, for example: address information of the requesting site, address information of the requested site, request site or requested site support Information such as rate set and Capacities parameters.
  • address information of the requesting site address information of the requested site, request site or requested site support Information such as rate set and Capacities parameters.
  • the existing information carried in the above message refer to the existing agreement such as 802.1 1 developed by the Institute of Electrical and Electronics Engineers (IEEE) standards organization. The relevant description in this, not here - repeat.
  • the method for establishing a link provided by the embodiment, after receiving the direct link setup request message forwarded by the access point, the requested site carries the key generated by the requested site in the direct link setup response message returned to the access point. Information, so that after the access point returns the direct link setup response message to the requesting site, the requesting station can securely transmit the service data transmitted on the direct link between the requesting site and the requested site according to the key, The signaling overhead in the process of establishing a link between the requesting site and the requested site is saved.
  • 2 is a flowchart of still another embodiment of a method for establishing a direct link according to the present invention. As shown in FIG. 2, this embodiment takes an operation performed in the process of establishing a direct link from an access point side as an example, and provides the present invention. The method of establishing a link is explained. The method includes:
  • the access point receives a direct link setup request message sent by the requesting station, where the direct link setup request message is used to request to establish a direct link between the requesting site and the requested site.
  • the access point sends a direct link setup request message to the requested site.
  • the access point receives the direct link setup response message sent by the requested site, where the direct link setup response message carries the first key information, where the first key information is used directly between the requesting site and the requested site.
  • the service data transmitted on the link is transmitted securely.
  • the access point sends a direct link setup response message to the requesting site.
  • the access point may forward the request message of the direct link establishment to the requested site.
  • the requested site may locally generate a first key for securely transmitting the service data transmitted on the direct link between the requesting site and the requested site. information.
  • the requested site may carry the first key information in the direct link setup response message and send it to the access point.
  • the access point may forward the direct link setup response message to the requesting station.
  • the requested site may generate second key information and send the second key information to the access point before the end of the life cycle of the first key.
  • the access point may forward the second key information to the requesting site, so that the requesting station may replace the first key information with the requesting site and the requested information after the end of the life cycle of the first key.
  • the service data transmitted on the direct link between the stations is transmitted securely.
  • the direct link setup request message and the direct link setup response message may be encapsulated into a data frame format and forwarded via the access point.
  • the access point may perform the message forwarding operation without parsing the above message.
  • This scenario is a tunnel-type direct link establishment process.
  • the direct link setup request message and the direct link setup response message may also be forwarded in the format of the management frame via the access point.
  • the access point may parse the message.
  • this implementation scenario is a non-tunneled direct link establishment process.
  • FIG. 3 is a flowchart of another embodiment of a method for establishing a direct link according to the present invention. As shown in FIG. 3, in this embodiment, an operation performed in a process of establishing a direct link from a requesting site side is taken as an example, and the establishment provided by the present invention is provided.
  • the direct link method is described. The method includes:
  • the requesting station sends a direct link setup request message to the access point, so that the access point sends a direct link setup request message to the requested site, where the direct link setup request message is used to request the request site and the requested site. Establish a direct link between them.
  • the requesting station receives a direct link setup response message sent by the access point, where the direct link setup response message carries the first key information, where the first key information is used to directly link the request site to the requested site.
  • the business data transmitted on the road is transmitted securely.
  • the first direct link setup confirmation message sent by the requesting station to the requested station by using the direct link where the first direct link setup confirmation message is used to indicate that the requesting station receives the first key information generated by the requested site.
  • the requesting site can initiate direct link establishment to the requested site.
  • the access point is required to forward the direct link setup request message and the direct link setup response message.
  • the requested site may locally generate the first secret for encrypting/decrypting the service data transmitted on the direct link between the requesting site and the requested site.
  • Key information The first key information is carried in the direct link setup response message and sent to the access point.
  • the requesting station may receive a direct link setup response message carried by the access point carrying the first key information.
  • the first key information may include the first key, or may include lifecycle information of the first key and the first key.
  • the requesting site may use the first key information to encrypt the service data, such as: meter readings, sensor detection data, and the like.
  • the requesting station may return a first direct link setup confirmation message to the requested site through the direct link to indicate that the first generated by the requested site is received.
  • a key message may be used to indicate that the first generated by the requested site is received.
  • the requesting station can also receive the access.
  • the second key information forwarded by the requested site is generated by the requested site before the end of the life cycle of the first key.
  • the requesting station can encrypt the service data transmitted on the direct link between the requesting site and the requested site by using the second key information after the end of the life cycle of the first key.
  • the second key information may include a second key, or may include lifecycle information of the second key and the second key.
  • the second direct link setup confirmation message sent to the requested site by using the direct link is used to indicate that the second generated by the requested site is received. Key information.
  • the method for establishing a link may receive a direct link setup response message that is returned by the access point and carries the key information generated by the requested site.
  • the requesting station can securely transmit the service data transmitted on the direct link between the requesting site and the requested site according to the key, thereby realizing the signaling overhead in the process of establishing a link between the requesting site and the requested site.
  • FIG. 4 is a flowchart of still another embodiment of a key update method according to the present invention. As shown in FIG. 4, the method includes:
  • the requested site generates second key information, where the second key information is used to replace the first key information generated by the requested site, and the service data transmitted on the direct link between the requesting site and the requested site is performed.
  • the requested site sends the second key information to the access point, so that the access point sends the second key information to the requesting site.
  • the first key information may be any key information generated by the requested site, for example, may be key information generated during the process of establishing a direct link between the requested site and the requesting site, or may be the requested site being The key information generated during the process of requesting the site to transmit traffic through the direct link.
  • the requested site may generate the second key information in the implementation scenario before the end of the life cycle of the first key, or the timer of the requested site overflows, or request the site to request to update the first key, which will include Sending the second key information to the access point, so that the access point forwards the second key information to the requesting site, so that the requesting site can use the first after the end of the life cycle of the first key
  • the second key information replaces the first key information, and securely transmits the service data transmitted on the direct link between the requesting site and the requested site.
  • the second key information may include the second key, or may include a life cycle of the second key and the second key, and include the second key and the second key in the second key information.
  • the lifetime of the second key may be determined by the requested site after the second key is generated, and the lifecycle information of the second key is included in the second key information and sent to the access point. .
  • the requested site may send the second key information to the access point in a message of various formats that interacts with the access point, for example, the second key information may be carried in the The direct link setup response format message is sent to the access point.
  • the requested site can generate the second key information and send it to the requesting site before the end of the life cycle of the first key, thereby avoiding the direct connection between the requesting site and the requested site due to the expiration of the first key
  • the link is re-established, which increases the transmission throughput.
  • the requested site may receive a second direct link setup confirmation message (Confirm message) sent by the requesting station through the direct link, where the second direct link setup acknowledgement message is used. And indicating that the requesting site receives the second key information generated by the requested site, and the second direct link setup confirmation message may also carry the MIC for integrity verification.
  • the requested station may receive the second direct link setup confirmation message sent by the requesting station through the direct link, and may perform integrity verification according to the MIC carried therein. If the verification is passed, the requested station can send an ACK to the requesting station through the direct link.
  • FIG. 5 is a flowchart of still another embodiment of a key update method according to the present invention. As shown in FIG. 5, the method includes:
  • the access point receives the second key information sent by the requested site, where the second key information is generated by the requested site, and is used to replace the first key information generated by the requested site, for the requesting site and the requested site.
  • the service data transmitted on the direct link between the two is transmitted securely;
  • the access point sends the second key information to the requesting station.
  • the requested site generates a second key information before the end of the life cycle of the first key, and will be the second
  • the key information is sent to the access point.
  • the access point may forward the second key information to the requesting site, so that the requesting station may replace the first key information with the requesting site and the requested information after the end of the life cycle of the first key.
  • the service data transmitted on the direct link between the stations is transmitted securely.
  • FIG. 6 is a flowchart of still another embodiment of a key update method according to the present invention. As shown in FIG. 6, the method includes:
  • the requesting station receives second key information sent by the access point, where the second key information is generated by the requested site, and is used to replace the first key information generated by the requested site, between the requesting site and the requested site.
  • the service data transmitted on the direct link is transmitted securely;
  • the requesting station replaces the first key information with the second key information, and securely transmits the service data transmitted on the direct link between the requesting site and the requested site.
  • the requesting station may also receive the second key information forwarded by the access point, the second key information being generated by the requested site before the end of the life cycle of the first key. Thereby, the requesting station can encrypt the service data transmitted on the direct link between the requesting station and the requested station by using the second key information after the end of the life cycle of the first key.
  • the second key information includes first key information generated for replacing the requested site, and securely transmits the second key information to the service data transmitted on the direct link between the requesting site and the requested site.
  • the second key information may further include lifecycle information of the second key.
  • the second direct link setup confirmation message sent to the requested site by the direct link is used to indicate that the second key information generated by the requested site is received.
  • the requesting site may receive the second key information used by the requested site to be replaced by the requested site to replace the first key information, thereby replacing the first key information with the second key information.
  • the key information securely transmits the service data transmitted on the direct link between the requesting site and the requested site, and implements signaling overhead for saving the key update process.
  • FIG. 7 is a flowchart of another embodiment of a method for establishing a link according to the present invention. As shown in FIG. 7, the embodiment provides that a requesting station (STA1), an access point (AP), and a requested station (STA2) are established. The interaction process during the link process.
  • STA1 requesting station
  • AP access point
  • STA2 requested station
  • STA1 has determined that it needs to transmit service data to STA through STA2, and STA1 has selected STA2 (that is, obtain STA2 address information).
  • STA1 and STA2 are respectively associated with the same AP, and a corresponding Robust Security Network Association (RSNA) is established, that is, between STA1 and AP, AP A secure two-way link is established with STA2.
  • RSNA Robust Security Network Association
  • the method includes:
  • STA1 sends a direct link setup request message to the AP, where the direct link setup request message is used to request to establish a direct link between the requesting site and the requested site.
  • the direct link setup request message (Setup Request) sent by the STA1 to the AP includes: address information of STA1, address information of STA2, rate set and capability supported by STA1.
  • the direct link setup request message is encrypted by using the PTK generated when STA1 associates with the AP.
  • the process of generating the key 1 ( PTK1 ) when the STA1 is associated with the AP is an existing technology, and details are not described herein again.
  • the address information of the STA1 and the address information of the STA2 carried in the direct link setup request message may be associated with an Association Identifier (AID), where the AID may be allocated by the AP to the STA1 when the STA1 associates with the AP.
  • the association identifier is usually 16 bits long. Compared with the use of a 48-bit Media Access Control (MAC) address, the association identifier with a short length can be used to reduce the transmission load and shorten the link. The frame header of the data frame is established, thereby increasing the throughput of the payload.
  • MAC Media Access Control
  • the AID may be used as the address information of each.
  • the short MAC frame header format of the two addresses shown in Table 1 below can be used.
  • Frame Control indicates that the frame control word occupies 2 bytes; A1 for STA1 occupies 2 bytes for 1 ⁇ of STA1; ⁇ 2 for STA2 ⁇ for STA2 occupies 2 bytes; Control carries the number of the data unit and the number of the data unit fragment, occupying 2 bytes.
  • S702 The AP sends a direct link setup request message to STA2.
  • the AP can select whether to parse the direct link setup request message according to the service requirement. For example, in order to manage the STA1 in the AP range to ensure the quality of the service transmission, the AP can parse the setup request message to learn which STA2 STA1 forwards the service data.
  • the direct link setup request message forwarded by the AP to the STA2 is encrypted by using the key 2 (PTK2) generated when the STA2 is associated with the AP.
  • PTK2 key 2
  • STA2 generates first key information, where the first key information is used for secure transmission of service data transmitted on a direct link between STA1 and STA2.
  • STA2 can generate a unique random number that is not duplicated with other keys as the first key, and can also generate the first key by other key generation methods, and is not limited herein.
  • STA2 may also determine a lifetime of the first key.
  • the STA2 sends a direct link setup response message to the AP, where the direct link setup response message carries the first key information.
  • the first key information includes a first key, or may include lifecycle information of the first key and the first key.
  • the STA2 Similar to the direct link setup request message, the STA2 sends the TDLS setup response message to the AP, including: STA1 address information, STA2 address information, STA2 supported rate set, and capability Capacities parameters.
  • the address information of the STA1 and the address information of the STA2 may also use the AID.
  • the direct link setup response message further carries the first key information generated by STA2.
  • the STA2 direct link setup response message to the AP mode is also encrypted by using the key 2 (PTK2) generated when STA2 is associated with the AP.
  • PTK2 key 2
  • STA2 After sending the direct link setup response message to the AP, STA2 may remain in the active state until the first acknowledgement message in S707 is received or the STA2 timer overflows.
  • S705 The AP sends a direct link setup response message to the requesting site.
  • the direct link setup response message forwarded by the AP to the STA1 may be generated by using the STA1 and the AP to generate a key 1 (PTK1) for encryption.
  • PTK1 key 1
  • S706 The STA1 encrypts the first direct link setup confirmation message with the first key information to generate a first message integrity code MIC.
  • STA1 sends a first direct link setup confirmation message to STA2 through a direct link, where A direct link setup confirmation message carries the first MIC.
  • the first direct link setup confirmation message includes at least: address information of the STA1, address information of the STA2, a first MIC, and the like.
  • the address information of STA1 and the address information of STA2 may use an AID.
  • the STA2 performs integrity verification on the first key received by the requesting station according to the first MIC. If the verification is passed, S709 is executed, otherwise the process ends.
  • the STA2 sends a first acknowledgement message to the STA1 through the direct link, where the first acknowledgement message is used to indicate that the first key information received by the STA1 passes the integrity verification.
  • the process of the first MIC is generated by the STA1 according to the first key information, and the process of performing the integrity verification of the first key information received by the STA1 by the STA1 according to the first MIC is a prior art, and details are not described herein. If STA2 fails to perform integrity verification, STA2 does not send a first acknowledgment message to STA1, and the direct link establishment of STA1 and STA2 fails.
  • the STA1 may use the first key information to encrypt the service data sent to the STA2 on the direct link, and then the STA2 transmits the service data to the AP.
  • the service data forwarded by the STA2 to the AP may be encrypted by the STA 2 (PTK2) when the STA2 associates with the AP.
  • STA1 may also select whether to forward the service data through STA2.
  • STA1 may add a bit indication bit in the signal header or signal A or signal B (Signal or Signal A or Signal B, SIGA) unit of the physical layer (Physical Layer, PHY layer) of the service data, and pass the indicator bit.
  • SIGA Signal A or Signal B
  • PHY layer Physical Layer, PHY layer
  • STA1 can pass the indication position 1 to indicate that the data packet is forwarded by STA2. If 0, it indicates that the data packet is not forwarded by STA2. If STA2 receives the data packet sent by STA1, it can perform discard processing.
  • the access point may send the setup request message to the requested site, and the requested site receives the access point forwarding.
  • the direct link setup request message the direct link setup response message returned to the access point carries the key information generated by the requested site, so that the access point returns the setup response message to the requesting site, requesting the site Ability to direct between the requesting site and the requested site based on the key pair
  • the service data transmitted on the link is transmitted securely, and the signaling overhead in the process of establishing a link between the requesting site and the requested site is saved.
  • FIG. 8 is a flowchart of still another embodiment of a key update method according to the present invention. As shown in FIG. 8, the method includes:
  • STA2 generates second key information, where the second key information is used to replace the first key information, and securely transmit the service data transmitted on the direct link between STA1 and STA2.
  • STA2 may also determine a lifetime of the second key.
  • STA2 may generate a unique random number that is not duplicated with other keys (including the first key) as the second key, or may generate the second key by other key generation methods. There are no restrictions here.
  • the STA2 sends the second key information to the AP.
  • the second key information includes a second key, or may include lifecycle information of the second key and the second key.
  • the second key information sent by the STA2 to the AP can use various existing message formats.
  • the message format of the direct link setup response message (Setu p Response) can be used.
  • the new message may include: STA1 address information, STA2 address information, STA2 supported rate set and Capacities parameters, and second key information.
  • the message can be passed through STA2
  • the RSNA transmission between APs can use the key 2 ( PTK2 ) generated when the association between STA2 and AP is used.
  • the address information of STA1 and the address information of STA2 may use an AID.
  • S803 The AP sends the second key information to the STA1.
  • the AP can select whether to parse the message carrying the lifecycle information of the second key and the second key according to the service requirement.
  • the AP may encrypt the message carrying the second key information by using the key 1 (PTK1) generated when the STA1 is associated with the AP.
  • PTK1 key 1
  • S804 The STA1 encrypts the second direct link setup confirmation message with the second key information to generate a second MIC.
  • the STA1 sends a second direct link setup acknowledgement message to the STA2 through the direct link, and the second direct link setup acknowledgement message carries the second MIC.
  • S807 The STA2 sends a second acknowledgment message to the STA1 through the direct link, where the second acknowledgment message is used to indicate that the second key received by the STA1 passes the integrity verification.
  • S804-S807 is similar to the process of S706-S709. See the description of S706-S709.
  • FIG. 9 is a schematic structural diagram of an embodiment of a requested site according to the present invention. As shown in FIG. 9, the requested site includes: a receiver 1 1 , a processor 12 , and a transmitter 13 ;
  • the receiver 1 1 is configured to receive a direct link setup request message sent by the access point, where the direct link setup request message is used to request to establish a direct link between the request site and the requested site;
  • the processor 12 is configured to generate first key information, where the first key information is used for secure transmission of service data transmitted on a direct link between the requesting site and the requested site;
  • the transmitter 13 is configured to send a direct link setup response message to the access point, so that the access point sends a direct link setup response message to the requesting station, where the direct link setup response message carries the first key information;
  • the receiver 11 may be further configured to: receive a first direct link setup acknowledgement message sent by the requesting station by using a direct link, where the first direct link setup acknowledgement message is used to indicate that the requesting site receives the first secret generated by the requested site. Key information.
  • the first key information sent by the sender 13 includes the first key, or includes a life cycle of the first key and the first key; when the first key information includes the first key and the first key
  • the processor 12 may also be configured to: determine a lifetime of the first key.
  • the processor 12 is further configured to: generate second key information, where the second key information is used to replace the first key information, and the service transmitted on the direct link between the requesting site and the requested site Data is transmitted securely;
  • the transmitter 13 is further configured to: send the second key information to the access point, so that the access point sends the second key information to the requested site.
  • the second key information sent by the sender 13 includes a second key, or a second key and a second The life cycle of the second key; when the second key information includes the life cycle of the second key and the second key, the processor 12 may be further configured to: determine a life cycle of the second key.
  • the receiver 11 may be further configured to: receive a second direct link setup confirmation message sent by the requesting station by using a direct link, where the second direct link setup confirmation message is used to indicate that the requesting site receives the requested site to generate Second key information.
  • the requested site provided by the example of the present invention is the execution device for establishing the direct link method provided by the embodiment of the present invention, and the specific process for performing the method for establishing the direct link may be related to the method embodiment shown in FIG. 3 and FIG. Description, no longer repeat here.
  • the requested site after receiving the direct link setup request message forwarded by the access point, the requested site carries the key information generated by the requested site in the direct link setup response message returned to the access point, so as to enable access.
  • the point After the point returns the direct link setup response message to the requesting site, the requesting station can securely transmit the service data transmitted on the direct link between the requesting site and the requested site according to the key, thereby realizing the saving request site and being The signaling overhead in the process of requesting the site to establish a link.
  • 10 is a schematic structural diagram of an embodiment of a request site according to the present invention. As shown in FIG. 10, the request site includes: a transmitter 21 and a receiver 22;
  • the transmitter 21 is configured to send a direct link setup request message to the access point, so that the access point sends a direct link setup request message to the requested site, and the direct link setup request message is used to request the request site and the Requesting a direct link between the sites;
  • the receiver 22 is configured to receive a direct link setup response message sent by the access point, where the direct link setup response message carries the first key information, where the first key information is used between the request site and the requested site.
  • the service data transmitted on the direct link is transmitted securely;
  • the transmitter 21 is further configured to: establish a confirmation message by using a direct link to the first direct link sent by the requested station, where the first direct link setup confirmation message is used to indicate that the requesting station receives the first key generated by the requested site. information.
  • the first key information received by the receiver 22 may include a first key, or include lifecycle information of the first key and the first key.
  • the receiver 22 is further configured to: receive second key information sent by the access point, where the second key information is generated by the requested site, and the second key information is used to replace the first key,
  • the service data transmitted on the direct link between the site and the requested site is transmitted securely.
  • the second key information received by the receiver 22 may include the second key, or include the second key.
  • the life cycle information of the key and the second key may include the second key, or include the second key.
  • the sender 21 is further configured to: establish, by using a direct link, a second direct link setup confirmation message sent to the requested site, where the second direct link setup confirmation message is used to indicate that the requesting site receives the requested site to generate Second key information.
  • the requesting site provided by the example of the present invention is the execution device for establishing the direct link method provided by the embodiment of the present invention.
  • the execution device for establishing the direct link method provided by the embodiment of the present invention.
  • the requesting site after sending the direct link setup request message to the access point, may receive a direct link setup response message that is returned by the access point and carries the key information generated by the requested site, and the requesting site can The key securely transmits the service data transmitted on the direct link between the requesting site and the requested site, and saves the signaling overhead in the process of establishing a link between the requesting site and the requested site.
  • FIG. 1 is a schematic structural diagram of still another embodiment of a requested site according to the present invention. As shown in FIG. 11, the requested site may include: a processor 31 and a transmitter 32;
  • the processor 31 is configured to generate second key information, where the second key information is used to replace the first key information generated by the requested site, and the service data transmitted on the direct link between the requesting site and the requested site Secure transmission;
  • the sender 32 is configured to send the second key information to the access point, so that the access point sends the second key information to the requested site.
  • the second key information sent by the sender 32 includes a life cycle of the second key, or the second key and the second key; and the second key information includes the second key and the second key
  • the processor 31 may also be configured to: determine a life cycle of the second key.
  • FIG. 12 is a schematic structural diagram of another embodiment of the requested site according to the present invention. As shown in FIG. 12, optionally, on the basis of the embodiment shown in FIG. 11, the requested site may further include:
  • the receiver 33 may be configured to receive a direct link setup acknowledgement message sent by the requesting station through the direct link, where the direct link setup acknowledgement message is used to indicate that the requesting site receives the second key information generated by the requested site.
  • the requested site provided by the example of the present invention is the execution device of the key update method provided by the embodiment of the present invention.
  • the request site includes: a receiver 41 and a processor 42;
  • the receiver 41 is configured to receive second key information sent by the access point, where the second key information is generated by the requested site, and is used to replace the first key information generated by the requested site, to the requesting site and the requested site. Secure transmission of business data transmitted between direct links;
  • the processor 42 is configured to replace the first key information with the second secret information key, and securely transmit the service data transmitted on the direct link between the requesting site and the requested site.
  • the second key information received by the receiver 41 may include a second key, or lifecycle information including the first key and the second key.
  • FIG. 14 is a schematic structural diagram of another embodiment of a requesting site according to the present invention. As shown in FIG. 14, on the basis of the embodiment shown in FIG. 13, the requesting site may further include:
  • the transmitter 43 is configured to send a direct link setup confirmation message to the requested site through the direct link, where the direct link setup acknowledgement message is used to indicate that the requesting station receives the second key information generated by the requested site.
  • the requesting site provided by the example of the present invention is an execution device of the key update method provided by the embodiment of the present invention.
  • the specific process of performing the key update method refer to the related description in the method embodiment shown in FIG. 6 and FIG. This will not be repeated here.
  • the requesting site provided by the embodiment may receive the second key information used by the requested site forwarded by the access point to replace the first key, thereby replacing the first key information with the second key information.
  • the service data transmitted on the direct link between the site and the requested site is securely transmitted, and the signaling overhead of the key update process is saved.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
  • the displayed components may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
  • An integrated unit if implemented as a software functional unit and sold or used as a standalone product, can be stored in a computer readable storage medium.
  • the instructions include a plurality of instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor to perform all or part of the steps of the various embodiments of the present application.
  • the foregoing storage medium includes: a U disk, a removable hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk or an optical disk, and the like, which can store program codes. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Description

建立直接链路方法、 密钥更新方法和设备 本申请要求于 2012年 7月 3 日提交中国专利局、 申请号为 201210226264.X、 发明名称为"建立直接链路方法、 密钥更新方法和设备 "的中国专利申请的优先 权, 其全部内容通过引用结合在本申请中。 技术领域 本发明涉及通信技术, 尤其涉及一种建立直接链路方法、 密钥更新方法和 设备。 背景技术 站点(Station, STA )以与接入点(Access Point, AP )协商的功率与 AP 通信。 由于一个 AP覆盖范围内不同位置的 STA与 AP直接通信的速率是不同 的, 而与 AP距离较远的 STA在与 AP通信时, 需要通过中继设备(Relay )转 发数据来缩短 STA和 AP的通信时间。 现有技术的 STA与 Relay之间直接链路的密钥产生方法为, STA产生一个 随机数, 并在向 AP发送的建立请求中携带该随机数, AP通过建立请求将该随 机数发送给 Relay。 Relay接收到 STA产生的随机数后, 产生一个随机数, 通 过 STA产生的随机数、 Relay产生的随机数进行计算生成用于对 STA向 Relay 发送的业务数据进行解密的密钥。 Relay通过向 AP发送的建立响应携带自身产 生的随机数, AP通过建立响应将 Relay产生的随机数发送给 STA, 通过 STA 产生的随机数、 Relay产生的随机数进行计算生成用于对 STA向 Relay发送的 业务数据进行加密的密钥。 从而导致信令开销大。
发明内容 本发明实施例提供一种建立直接链路方法、 请求站点和被请求站点, 以节 省信令开销。 一方面, 本发明实施例提供一种建立直接链路方法, 包括:
请求站点向接入点发送直接链路建立请求消息, 以使所述接入点将所述直 接链路建立请求消息发送给所述被请求站点, 所述直接链路建立请求消息用于 请求在所述请求站点与被请求站点之间建立直接链路;
所述请求站点接收所述接入点发送的直接链路建立响应消息, 所述直接链 路建立响应消息中携带第一密钥信息, 所述第一密钥信息用于对所述请求站点 与所述被请求站点之间的所述直接链路上传输的业务数据进行安全传输; 所述请求站点通过所述直接链路向所述被请求站点发送的第一直接链路建 立确认消息, 所述第一直接链路建立确认消息用于指示所述请求站点接收到所 述被请求站点生成的所述第一密钥信息。
本发明实施例提供另一种建立直接链路方法, 包括:
被请求站点接收接入点发送的直接链路建立请求消息, 所述直接链路建立 请求消息用于请求在请求站点与所述被请求站点之间建立直接链路;
所述被请求站点生成第一密钥信息, 所述第一密钥信息用于对所述请求站 点与所述被请求站点之间的所述直接链路上传输的业务数据进行安全传输; 所述被请求站点向所述接入点发送直接链路建立响应消息, 以使所述接入 点将所述直接链路建立响应消息发送给所述请求站点, 所述直接链路建立响应 消息中携带第一密钥信息;
所述被请求站点接收所述请求站点通过所述直接链路发送的第一直接链路 建立确认消息, 所述第一直接链路建立确认消息用于指示所述请求站点接收到 所述被请求站点生成的所述第一密钥信息。
本发明实施例提供一种请求站点, 包括:
发送器, 用于向接入点发送直接链路建立请求消息, 以使所述接入点将所 述直接链路建立请求消息发送给所述被请求站点, 所述直接链路建立请求消息 用于请求在所述请求站点与被请求站点之间建立直接链路;
接收器, 用于接收所述接入点发送的直接链路建立响应消息, 所述直接链 路建立响应消息中携带第一密钥信息, 所述第一密钥信息用于对所述请求站点 与所述被请求站点之间的所述直接链路上传输的业务数据进行安全传输; 所述发送器还用于: 通过所述直接链路向所述被请求站点发送的第一直接 链路建立确认消息, 所述第一直接链路建立确认消息用于指示所述请求站点接 收到所述被请求站点生成的所述第一密钥信息。
本发明实施例提供一种被请求站点, 包括:
接收器, 用于接收接入点发送的直接链路建立请求消息, 所述直接链路建 立请求消息用于请求在请求站点与所述被请求站点之间建立直接链路; 处理器, 用于生成第一密钥信息, 所述第一密钥信息用于对所述请求站点 与所述被请求站点之间的所述直接链路上传输的业务数据进行安全传输;
发送器, 用于向所述接入点发送直接链路建立响应消息, 以使所述接入点 将所述直接链路建立响应消息发送给所述请求站点, 所述直接链路建立响应消 息中携带第一密钥信息;
所述接收器还用于: 接收所述请求站点通过所述直接链路发送的第一直接 链路建立确认消息, 所述第一直接链路建立确认消息用于指示所述请求站点接 收到所述被请求站点生成的所述第一密钥信息。
本发明实施例提供的建立链路方法和设备, 被请求站点接收到接入点转发 的直接链路建立请求消息之后, 在返回给接入点的直接链路建立响应消息中携 带被请求站点生成的密钥信息, 以使接入点将该直接链路建立响应消息返回给 请求站点后, 请求站点能够根据该密钥对请求站点与被请求站点之间的直接链 路上传输的业务数据进行安全传输, 实现节省请求站点与被请求站点建立链路 过程中的信令开销。
另一方面, 本发明实施例提供一种密钥更新方法, 包括:
被请求站点生成第二密钥信息, 所述第二密钥信息用于替换所述被请求站 点生成的第一密钥信息, 对请求站点与所述被请求站点之间的直接链路上传输 的业务数据进行安全传输;
所述被请求站点将第二密钥信息发送给接入点, 以使所述接入点将所述第 二密钥信息发送给所述被请求站点。
本发明实施例还提供一种密钥更新方法, 包括:
请求站点接收接入点发送的所述第二密钥信息, 所述第二密钥信息由所述 被请求站点生成, 用于替换所述被请求站点生成的第一密钥信息, 对所述请求 站点与所述被请求站点之间的直接链路上传输的业务数据进行安全传输;
所述请求站点釆用所述第二密钥信息替换所述第一密钥信息, 对所述请求 站点与所述被请求站点之间的直接链路上传输的业务数据进行安全传输。
本发明实施例还提供一种被请求站点, 包括:
处理器, 用于生成第二密钥信息, 所述第二密钥信息用于替换所述被请求 站点生成的第一密钥信息, 对请求站点与所述被请求站点之间的直接链路上传 输的业务数据进行安全传输;
发送器, 用于将第二密钥信息发送给接入点, 以使所述接入点将所述第二 密钥信息发送给所述被请求站点。
本发明实施例还提供一种请求站点, 包括:
接收器, 用于接收接入点发送的所述第二密钥信息, 所述第二密钥信息由 所述被请求站点生成, 用于替换所述被请求站点生成的第一密钥信息, 对所述 请求站点与所述被请求站点之间的直接链路上传输的业务数据进行安全传输; 处理器, 用于釆用所述第二密钥信息替换所述第一密钥信息, 对所述请求 站点与所述被请求站点之间的直接链路上传输的业务数据进行安全传输。
本发明实施例提供的密钥更新方法和设备, 被请求站点产生用于替换第一 密钥的第二密钥后, 可以将第二密钥信息通过接入点返回给请求站点, 以使请 求站点釆用第二密钥替换第一密钥对请求站点与被请求站点之间的直接链路上 传输的业务数据进行安全传输, 实现节省密钥更新过程的信令开销。
附图说明 为了更清楚地说明本发明实施例或现有技术中的技术方案, 下面将对实施 例或现有技术描述中所需要使用的附图作简单地介绍, 显而易见地, 下面描述 中的附图是本发明的一些实施例, 对于本领域普通技术人员来讲, 在不付出创 造性劳动性的前提下, 还可以根据这些附图获得其他的附图。 图 1为本发明的建立直接链路方法一个实施例的流程图;
图 2为本发明的建立直接链路方法又一个实施例的流程图;
图 3为本发明的建立直接链路方法另一个实施例的流程图;
图 4为本发明的建立直接链路方法另一个实施例的流程图;
图 5为本发明提供的被请求站点一个实施例的结构示意图;
图 6为本发明提供的接入点一个实施例的结构示意图;
图 7为本发明提供的请求站点一个实施例的结构示意图;
图 8为本发明提供的请求站点又一个实施例的结构示意图;
图 9为本发明提供的被请求站点一个实施例的结构示意图;
图 10为本发明提供的请求站点一个实施例的结构示意图;
图 1 1为本发明提供的被请求站点又一个实施例的结构示意图;
图 12为本发明提供的被请求站点又一个实施例的结构示意图;
图 13为本发明提供的请求站点又一个实施例的结构示意图; 图 14为本发明提供的请求站点又一个实施例的结构示意图。 具体实施方式 为使本发明实施例的目的、 技术方案和优点更加清楚, 下面将结合本发明 实施例中的附图, 对本发明实施例中的技术方案进行清楚、 完整地描述, 显然, 所描述的实施例是本发明一部分实施例, 而不是全部的实施例。 基于本发明中 的实施例, 本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其 他实施例, 都属于本发明保护的范围。 本文中描述的技术可用于各种通信系统, 例如当前 2G, 3G通信系统和下 一代通信系统, 例如全球移动通信系统(GSM, Global System for Mobile communications ), 码分多址(CDMA, Code Division Multiple Access )系统, 时分多址(TDMA, Time Division Multiple Access ) 系统, 宽带码分多址
( WCDMA, Wideband Code Division Multiple Access ), 频分多址(FDMA, Frequency Division Multiple Access )系统正交频分多址(OFDMA Orthogonal Frequency-Division Multiple Access )系统, 单载波 FDMA ( SC-FDMA )系统, 通用分组无线业务(GPRS, General Packet Radio Service ) 系统, 长期演进 ( LTE, Long Term Evolution ) 系统, 以及其他此类通信系统。
图 1为本发明的建立直接链路方法一个实施例的流程图, 如图 1所示, 本 实施例从被请求站点侧在建立直接链路过程中执行的操作为例, 对本发明提供 的建立链路方法进行说明。 该方法包括:
S101、 被请求站点接收接入点发送的直接链路建立请求消息, 直接链路建 立请求消息用于请求在请求站点与被请求站点之间建立直接链路。
5102、 被请求站点生成第一密钥信息, 第一密钥信息用于对请求站点与被 请求站点之间的直接链路上传输的业务数据进行安全传输。
5103、 被请求站点向接入点发送直接链路建立响应消息, 以使接入点将直 接链路建立响应消息发送给请求站点, 直接链路建立响应消息中携带第一密钥 信息。
S104、 被请求站点接收请求站点通过直接链路发送的第一直接链路建立确 认消息, 第一直接链路建立确认消息用于指示请求站点接收到被请求站点生成 的第一密钥信息。
本申请中涉及的请求站点, 可以是无线请求站点也可以是有线请求站点, 举例来说, 可以是各种网络, 例如: 无线保真(Wireless Fidelity, WiFi ) 网络 或蜂窝网络中的站点, 例如: 传感器、 电表等站点 (STA )。 被请求站点具备生 成第一密钥信息的能力, 可以是无线请求站点也可以是有线请求站点, 例如, 可以是传感器、 电表等站点。 同时, 请求站点和被请求站点位于同一个网络中, 例如, 位于同一个接入点下的 Wi Fi网络中。 接入点可以是无线局域网络
( Wireless Local Area Networks, WLAN ) 中的接入点(Access Point, AP ), 也可以是 WiFi网络中的接入点, 也可以是 GSM网络、 GPRS网络或 CDMA网 络、蜂窝网络中的基站(Base Transceiver Station, BJS \还可以是 CDMA2000 网络或 WCDMA网络中的基站(NodeB ), 还可以是 LTE网络中的演进型基站 ( Evolved NodeB , eNB ), 还可以是 WiMAX网络中的接入服务网络的基站 ( Access Service Network Base Station , ASN BS )等网元; 或也可以是以上 接入点、 基站后面的控制器或认证器等网元。
本申请可以适用于多种实施场景, 例如: 在 WiFi网络中, 作为请求站点的 电表向接入点上报电表读数的实施场景; 作为请求站点的温湿度传感器向接入 点上报测量的温湿度等实施场景, 在此不——列举。 在这种实施场景下, 如果 请求站点与接入点之间的距离较远, 则请求站点可以通过被请求站点转发向接 入点上报的业务数据, 来缩短请求站点和接入点的通信时间。 请求站点与被请 求站点之间需要建立直接链路来传输业务数据。
在请求站点与被请求站点建立直接链路的过程中, 需要接入点转发直接链 路建立请求消息和直接链路建立响应消息。
本发明实施例中, 被请求站点接收到接入点转发的直接链路建立请求消息 后, 可以在本地生成用于对请求站点与被请求站点之间的直接链路上传输的业 务数据进行安全传输的第一密钥信息。 其中, 安全传输可以包括: 对传输数据 进行加 /解密, 和 /或, 完整性验证等操作。 被请求站点可以将第一密钥信息携带 在直接链路建立响应消息中发送给接入点, 以使接入点将携带第一密钥信息的 直接链路建立响应消息发送给请求站点。 从而请求站点在与被请求站点之间的 直接链路(即空口)上发送业务数据, 例如: 电表读数, 传感器的检测数据时, 在第一密钥的生命周期内, 请求站点可以釆用该第一密钥信息对业务数据进行 加密, 被请求站点接收到请求站点发送的业务数据后, 可以釆用第一密钥信息 对接收到的业务数据进行解密。
可选的, 第一密钥信息可以包括第一密钥, 或者可以包括第一密钥和第一 密钥的生命周期信息。 在第一密钥信息包括第一密钥和第一密钥的生命周期信 息的场景下, 被请求站点在生成第一密钥后, 还可以确定第一密钥的生命周期, 并将第一密钥的生命周期信息包括在第一密钥信息中发送给接入点。
进一步的, 被请求站点向接入点发送携带第一密钥信息的直接链路建立响 应消息之后, 可以接收到请求站点通过直接链路发送的第一直接链路建立确认 消息(Confirm消息), 该第一直接链路建立确认消息用于指示请求站点接收到 被请求站点生成的第一密钥信息, 该第一确认消息中可以携带用于完整性验证 的消息完整性码 ( Message Integrity Code, MIC ) 。
由于被请求站点可以从直接链路上直接收到请求站点发送的第一直接链路 建立确认消息, 而不必通过接入点转发该第一直接链路建立确认消息, 因此, 减少了请求站点直接向接入点发送消息的次数, 可以有效降低请求站点的能耗。
被请求站点能够从直接链路上接收到请求站点发送的第一直接链路建立确 认消息。 请求站点可以根据其中携带的 MIC, 对请求站点接收的第一直接链路 建立确认消息进行完整性验证。 若验证通过, 则被请求站点可以通过直接链路 向请求站点发送确认消息 (Acknowledgement, ACK ) , 用于指示通过完整性 验证, 即请求站点正确接收第一密钥信息。
由于第一密钥具有一定的生命周期, 在生命周期结束后, 第一密钥将失效, 无法再用于对请求站点与被请求站点之间的直接链路上传输的业务数据进行安 全传输。 据此, 可选的, 被请求站点可以在第一密钥的生命周期结束之前, 或 者被请求站点的计时器溢出, 或者请求站点请求更新第一密钥信息等实施场景 下, 生成第二密钥信息, 将第二密钥信息发送给接入点, 以使接入点将该第二 密钥信息转发给请求站点, 从而请求站点可以在第一密钥的生命周期结束之 后, 釆用第二密钥信息替换第一密钥信息, 对请求站点与被请求站点之间的直 接链路上传输的业务数据进行安全传输。
可选的, 第二密钥信息可以包括第二密钥, 或者可以包括第二密钥和第二 密钥的生命周期信息。 在第二密钥信息包括第二密钥和第二密钥的生命周期信 息的场景下, 被请求站点在生成第二密钥后, 还可以确定第二密钥的生命周期, 并将第二密钥的生命周期信息包括在第二密钥信息中发送给接入点。
其中, 被请求站点可以将第二密钥信息携带在现有的与接入点之间交互的 各种格式的消息中发送给接入点, 举例来说, 可以将第二密钥信息携带在直接 链路建立响应格式的消息中发送给接入点。 由于被请求站点可以在第一密钥的生命周期结束之前, 产生第二密钥信息 并发送给请求站点, 从而避免了由于第一密钥过期而导致的请求站点与被请求 站点之间的直接链路重新建立, 从而增加了传输吞吐率。
与向请求站点发送第一密钥信息相类似的, 被请求站点将第二密钥信息发 送给接入点之后, 可以接收到请求站点通过直接链路发送的第二直接链路建立 确认消息(Confirm消息), 该第二直接链路建立确认消息用于指示请求站点接 收到被请求站点生成的第二密钥信息, 该第二直接链路建立确认消息中也可以 携带用于完整性验证的 MIC。
被请求站点可以通过直接链路接收请求站点发送的第二直接链路建立确认 消息, 可以根据其中携带的 MIC进行完整性验证。 若验证通过, 则被请求站点 可以通过直接链路向请求站点发送 ACK。
需要说明的是, 本发明实施例涉及的直接链路建立请求消息、 直接链路建 立响应消息、 以及第一直接链路建立确认消息( Confirm消息 )和第二直接链路 建立确认消息(Confirm消息)中, 除了携带本发明实施例中涉及的信息之外, 保留了上述消息中现有的各种信息, 例如: 请求站点的地址信息、 被请求站点 的地址信息、 请求站点或被请求站点支持的速率集合以及能力 ( Capacities )参 数等信息, 对于上述消息中携带的这些现有信息, 可以参见电子电器工程师学 会 ( Institute of Electrical and Electronics Engineers, IEEE )标准组织制定的 例如 802.1 1等现有协议中的相关描述, 在此不——赘述。
本实施例提供的建立链路方法, 被请求站点接收到接入点转发的直接链路 建立请求消息之后, 在返回给接入点的直接链路建立响应消息中携带被请求站 点生成的密钥信息, 以使接入点将该直接链路建立响应消息返回给请求站点 后, 请求站点能够根据该密钥对请求站点与被请求站点之间的直接链路上传输 的业务数据进行安全传输, 实现节省请求站点与被请求站点建立链路过程中的 信令开销。 图 2为本发明的建立直接链路方法又一个实施例的流程图, 如图 2所示, 本实施例从接入点侧在建立直接链路过程中执行的操作为例, 对本发明提供的 建立链路方法进行说明。 该方法包括:
S201、 接入点接收请求站点发送的直接链路建立请求消息, 直接链路建立 请求消息用于请求在请求站点与被请求站点之间建立直接链路。 S202、 接入点将直接链路建立请求消息发送给被请求站点。
S203、 接入点接收被请求站点发送的直接链路建立响应消息, 直接链路建 立响应消息中携带第一密钥信息, 第一密钥信息用于对请求站点与被请求站点 之间的直接链路上传输的业务数据进行安全传输。
S204、 接入点将直接链路建立响应消息发送给请求站点。
接入点接收到请求站点发送的直接链路建立请求消息后, 可以将该直接链 路建立的请求消息转发给被请求站点。
被请求站点接收到接入点转发的直接链路建立请求消息后, 可以在本地生 成用于对请求站点与被请求站点之间的直接链路上传输的业务数据进行安全传 输的第一密钥信息。 被请求站点可以将第一密钥信息携带在直接链路建立响应 消息中发送给接入点。 接入点接收到携带第一密钥信息的直接链路建立响应消 息之后, 可以将该直接链路建立响应消息转发给请求站点。
可选的, 被请求站点可以在第一密钥的生命周期结束之前, 生成第二密钥 信息, 将第二密钥信息发送给接入点。 接入点可以将该第二密钥信息转发给请 求站点, 从而请求站点可以在第一密钥的生命周期结束之后, 釆用第二密钥信 息替换第一密钥信息对请求站点与被请求站点之间的直接链路上传输的业务数 据进行安全传输。
需要说明的是, 作为一种可行的实施方式, 直接链路建立请求消息和直接 链路建立响应消息可以封装成数据帧格式经由接入点转发。 在这种实施场景 下, 接入点可以不对上述消息进行解析, 而仅执行消息转发操作, 这种场景即 为隧道式直接链路建立过程。 作为另一种可行的实施方式, 直接链路建立请求消息和直接链路建立响应 消息也可以以管理帧的格式经由接入点转发, 在该实施场景下, 接入点可以对 上述消息解析, 以便于对请求站点与哪个中继通信进行管理, 这种实施场景即 为非隧道式直接链路建立过程。
本实施例提供的建立链路方法, 接入点将请求站点发送的直接链路建立请 求消息转发给被请求站点之后, 接入点接收的被请求站点返回的直接链路建立 响应消息中携带被请求站点生成的密钥信息, 接入点将该直接链路建立响应消 息返回给请求站点后, 请求站点能够根据该密钥对请求站点与被请求站点之间 的直接链路上传输的业务数据进行加 /解密, 实现节省请求站点与被请求站点建 立链路过程中的信令开销。 图 3为本发明的建立直接链路方法另一个实施例的流程图, 如图 3所示, 本实施例从请求站点侧在建立直接链路过程中执行的操作为例, 对本发明提供 的建立直接链路方法进行说明。 该方法包括:
5301、 请求站点向接入点发送直接链路建立请求消息, 以使接入点将直接 链路建立请求消息发送给被请求站点, 直接链路建立请求消息用于请求在请求 站点与被请求站点之间建立直接链路。
5302、 请求站点接收接入点发送的直接链路建立响应消息, 直接链路建立 响应消息中携带第一密钥信息, 第一密钥信息用于对请求站点与被请求站点之 间的直接链路上传输的业务数据进行安全传输。
5303、 请求站点通过直接链路向被请求站点发送的第一直接链路建立确认 消息, 第一直接链路建立确认消息用于指示请求站点接收到被请求站点生成的 第一密钥信息。
当请求站点与接入点距离较远, 需要被请求站点转发业务数据的实施场景 下, 请求站点可以发起到被请求站点的直接链路建立。 而在请求站点与被请求 站点直接链路建立的过程中, 需要接入点转发直接链路建立请求消息和直接链 路建立响应消息。
被请求站点接收到接入点转发的直接链路建立请求消息后, 可以在本地生 成用于对请求站点与被请求站点之间的直接链路上传输的业务数据进行加 /解密 的第一密钥信息。 并将第一密钥信息携带在直接链路建立响应消息中发送给接 入点。 请求站点可以接收到接入点转发的携带第一密钥信息的直接链路建立响 应消息。
其中, 第一密钥信息中可以包括第一密钥, 或者可以包括第一密钥和第一 密钥的生命周期信息。
请求站点与被请求站点之间的直接链路建立之后, 请求站点可以该上釆用 该第一密钥信息对业务数据, 例如: 电表读数, 传感器的检测数据等进行加密。
需要说明的是, 请求站点接收接入点发送的直接链路建立响应消息之后, 可以通过直接链路向被请求站点返回第一直接链路建立确认消息, 以指示接收 到被请求站点生成的第一密钥信息。
进一步的, 在第一密钥的生命周期结束之前, 请求站点还可以接收到接入 点转发的第二密钥信息, 该第二密钥信息由被请求站点在第一密钥的生命周期 结束之前生成。 从而请求站点可以在第一密钥的生命周期结束之后, 釆用第二 密钥信息对请求站点与被请求站点之间的直接链路上传输的业务数据进行加 密。
其中, 第二密钥信息中可以包括第二密钥, 或者, 可以包括第二密钥和第 二密钥的生命周期信息。
类似的, 请求站点接收接入点发送的第二密钥信息之后, 可以通过直接链 路向被请求站点发送的第二直接链路建立确认消息, 用于指示接收到被请求站 点生成的第二密钥信息。
本实施例提供的建立链路方法, 请求站点向接入点发送直接链路建立请求 消息之后, 可以接收到接入点返回的携带被请求站点生成的密钥信息的直接链 路建立响应消息, 请求站点能够根据该密钥对请求站点与被请求站点之间的直 接链路上传输的业务数据进行安全传输, 实现节省请求站点与被请求站点建立 链路过程中的信令开销。 图 4为本发明提供的密钥更新方法又一个实施例的流程图, 如图 4所示, 该方法包括:
5401、 被请求站点生成第二密钥信息, 第二密钥信息用于替换被请求站点 生成的第一密钥信息, 对请求站点与被请求站点之间的直接链路上传输的业务 数据进行安全传输;
5402、 被请求站点将第二密钥信息发送给接入点, 以使接入点将第二密钥 信息发送给请求站点。
第一密钥信息可以为被请求站点生成的任一密钥信息, 举例来说, 可以是 被请求站点与请求站点建立直接链路过程中生成的密钥信息, 也可以是被请求 站点在与请求站点通过直接链路进行业务传输的过程中生成的密钥信息。
由于第一密钥具有一定的生命周期, 在生命周期结束后, 第一密钥将失效, 无法再用于对请求站点与被请求站点之间的直接链路上传输的业务数据进行安 全传输。 据此, 被请求站点可以在第一密钥的生命周期结束之前, 或者被请求 站点的计时器溢出, 或者请求站点请求更新第一密钥等实施场景下, 生成第二 密钥信息, 将包括第二密钥信息发送给接入点, 以使接入点将该第二密钥信息 转发给请求站点, 从而请求站点可以在第一密钥的生命周期结束之后, 釆用第 二密钥信息替换第一密钥信息, 对请求站点与被请求站点之间的直接链路上传 输的业务数据进行安全传输。
可选的, 第二密钥信息中可以包括第二密钥, 或者可以包括第二密钥和第 二密钥的生命周期, 在第二密钥信息中包括第二密钥和第二密钥的生命周期 时, 被请求站点在生成第二密钥后, 还可以确定第二密钥的生命周期, 并将第 二密钥的生命周期信息包括在第二密钥信息中发送给接入点。
其中, 被请求站点可以将第二密钥信息携带在现有的与接入点之间交互的 各种格式的消息中发送给接入点, 举例来说, 可以将第二密钥信息携带在直接 链路建立响应格式的消息中发送给接入点。
由于被请求站点可以在第一密钥的生命周期结束之前, 产生第二密钥信息 并发送给请求站点, 从而避免了由于第一密钥过期而导致的请求站点与被请求 站点之间的直接链路重新建立, 从而增加了传输吞吐率。
被请求站点将第二密钥信息发送给接入点之后, 可以接收到请求站点通过 直接链路发送的第二直接链路建立确认消息(Confirm消息), 该第二直接链路 建立确认消息用于指示请求站点接收到被请求站点生成的第二密钥信息, 该第 二直接链路建立确认消息中也可以携带用于完整性验证的 MIC。
被请求站点可以通过直接链路接收请求站点发送的第二直接链路建立确认 消息, 可以根据其中携带的 MIC进行完整性验证。 若验证通过, 则被请求站点 可以通过直接链路向请求站点发送 ACK。
本实施例提供的密钥更新方法, 被请求站点产生用于替换第一密钥信息的 第二密钥信息后, 可以将第二密钥信息通过接入点返回给请求站点, 以使请求 站点釆用第二密钥信息替换第一密钥信息对请求站点与被请求站点之间的直接 链路上传输的业务数据进行安全传输, 实现节省密钥更新过程的信令开销。 图 5为本发明提供的密钥更新方法又一个实施例的流程图, 如图 5所示, 该方法包括:
S501、 接入点接收被请求站点发送的第二密钥信息, 第二密钥信息由被请 求站点生成, 用于替换被请求站点生成的第一密钥信息, 对请求站点与被请求 站点之间的直接链路上传输的业务数据进行安全传输;
S502、 接入点将第二密钥信息发送给请求站点。
被请求站点在第一密钥的生命周期结束之前, 生成第二密钥信息, 将第二 密钥信息发送给接入点。 接入点可以将该第二密钥信息转发给请求站点, 从而 请求站点可以在第一密钥的生命周期结束之后, 釆用第二密钥信息替换第一密 钥信息对请求站点与被请求站点之间的直接链路上传输的业务数据进行安全传 输。
本实施例提供的密钥更新方法, 接入点接收到被请求站点产生用于替换第 一密钥的第二密钥信息后, 可以将第二密钥信息转发给请求站点, 以使请求站 点釆用第二密钥信息替换第一密钥信息对请求站点与被请求站点之间的直接链 路上传输的业务数据进行安全传输, 实现节省密钥更新过程的信令开销。 图 6为本发明提供的密钥更新方法又一个实施例的流程图, 如图 6所示, 该方法包括:
S601、 请求站点接收接入点发送的第二密钥信息, 第二密钥信息由被请求 站点生成, 用于替换被请求站点生成的第一密钥信息, 对请求站点与被请求站 点之间的直接链路上传输的业务数据进行安全传输;
S602、 请求站点釆用第二密钥信息替换第一密钥信息, 对请求站点与被请 求站点之间的直接链路上传输的业务数据进行安全传输。
在第一密钥的生命周期结束之前, 请求站点还可以接收到接入点转发的第 二密钥信息, 该第二密钥信息由被请求站点在第一密钥的生命周期结束之前生 成。 从而请求站点可以在第一密钥的生命周期结束之后, 釆用第二密钥信息对 请求站点与被请求站点之间的直接链路上传输的业务数据进行加密。
其中, 第二密钥信息中包括用于替换被请求站点生成的第一密钥信息, 对 请求站点与被请求站点之间的直接链路上传输的业务数据进行安全传输第二密 钥信息。 可选的, 第二密钥信息中还可以包括第二密钥的生命周期信息。
请求站点接收接入点发送的第二密钥信息之后, 可以通过直接链路向被请 求站点发送的第二直接链路建立确认消息, 用于指示接收到被请求站点生成的 第二密钥信息。
本实施例提供的密钥更新方法, 请求站点可以接收到接入点转发的被请求 站点产生用于替换第一密钥信息的第二密钥信息, 从而釆用第二密钥信息替换 第一密钥信息对请求站点与被请求站点之间的直接链路上传输的业务数据进行 安全传输, 实现节省密钥更新过程的信令开销。 图 7为本发明的建立链路方法另一个实施例的流程图, 如图 7所示, 本实 施例提供了请求站点 (STA1 ) 、 接入点 (AP )和被请求站点 (STA2 )在建立 链路过程中交互过程。
需要说明的是 STA1已经确定需要通过 STA2传输业务数据到达 AP, STA1 已选定 STA2 (即获得 STA2地址信息)。 在建立 STA1与 STA2之间的直接链 路之前, STA1和 STA2分别与同一个 AP关联, 并建立了对应的鲁棒安全网络 关联 ( Robust Security Network Association, RSNA ) , 即 STA1与 AP之间, AP与 STA2之间均建立了安全的双向的链路。
该方法包括:
S701、 STA1向 AP发送直接链路建立请求消息, 直接链路建立请求消息 用于请求在请求站点与被请求站点之间建立直接链路。
其中, STA1向 AP发送的直接链路建立请求消息 (Setup Request ) 中包 括: STA1的地址信息, STA2的地址信息, STA1支持的速率集合和能力
Capacities参数等。 该直接链路建立请求消息利用 STA1与 AP进行关联时产生 的 PTK进行加密。 STA1与 AP进行关联时产生密钥 1 ( PTK1 ) 的过程为现有 技术, 在此不再赘述。
可选的, 直接链路建立请求消息中携带的 STA1的地址信息和 STA2的地 址信息, 可以釆用关联标识( Association Identifier, AID ) , AID可以是在 STA1 与 AP进行关联时 AP为 STA1分配的关联标识, 该关联标识的长度通常为 16 比特, 相对于使用 48比特媒体接入控制 ( Media Access Control, MAC )地址, 在 STA2传输时使用长度短的关联标识可以降低传输的负担, 缩短链路建立后 数据帧的帧头, 从而可以提高有效负载的吞吐率。
需要说明的是, STA1与 STA2建立直连链路过程中, 可以釆用 AID作为 各自的地址信息。 STA1与 STA2直连链路建立后, 当 STA1需要向 STA2发送 业务数据时, 可以釆用如下表一所示的两地址的短 MAC帧头格式。
Octets: 2 2 2 2
AID AID Sequence
Frame Control
(A1 for STAI) (A2 for STA2) Control 表一
表一中: Frame Control表示帧控制字, 占用 2个字节; A1 for STA1为 STA1 的 ΑΙβ 占用 2个字节; Α2 for STA2为 STA2的 ΑΙβ 占用 2个字节; Sequence Control携带数据单元的编号和数据单元片段的编号, 占用 2个字节。
5702、 AP将直接链路建立请求消息发送给 STA2。
其中, AP可以根据业务需要选择是否需要解析直接链路建立请求消息。 例 如: 为了管理 AP范围内的各 STA1 , 以保证业务传输质量, AP可以解析建立 请求消息, 以获知 STA1通过哪个 STA2转发业务数据。
AP向 STA2转发的直接链路建立请求消息釆用 STA2与 AP关联时产生的 密钥 2 ( PTK2 )进行加密。
5703、 STA2生成第一密钥信息, 第一密钥信息用于对 STA1与 STA2之 间的直接链路上传输的业务数据进行安全传输。
其中, STA2可以生成一个唯一的不与其他密钥重复的随机数作为第一密 钥, 也可以通过其他密钥生成方式生成第一密钥, 在此并不做出限制。
可选的, STA2还可以确定第一密钥的生命周期。
S704、 STA2向 AP发送直接链路建立响应消息, 直接链路建立响应消息 中携带第一密钥信息。
其中, 第一密钥信息中包括第一密钥, 或者, 可以包括第一密钥和第一密 钥的生命周期信息。
与直接链路建立请求消息类似的, STA2向 AP发送 TDLS建立响应消息中 包括: STA1的地址信息, STA2的地址信息, STA2支持的速率集合和能力 Capacities参数等。 可选的, 该 STA1的地址信息和 STA2的地址信息也可以 釆用 AID。 此外, 该直接链路建立响应消息中还携带 STA2生成的第一密钥信 息。
STA2向 AP方式的直接链路建立响应消息同样釆用 STA2与 AP关联时产 生的密钥 2 ( PTK2 )进行加密。
STA2在向 AP发送直接链路建立响应消息之后, 可以一直处于 active状 态, 直到收到 S707中的第一确认消息或是 STA2的定时器溢出。
5705、 AP将直接链路建立响应消息发送给请求站点。
AP向 STA1转发的直接链路建立响应消息可以釆用 STA1与 AP进行关联 时产生密钥 1 ( PTK1 )进行加密。
5706、 STA1釆用第一密钥信息对第一直接链路建立确认消息进行加密, 生成第一消息完整性码 MIC。
5707、 STA1通过直接链路向 STA2发送第一直接链路建立确认消息, 第 一直接链路建立确认消息中携带第一 MIC。
其中, 第一直接链路建立确认消息(Confirm消息)至少包括: STA1的地 址信息、 STA2的地址信息和第一 MIC等。
可选的, STA1的地址信息和 STA2的地址信息, 可以釆用 AID。
S708、 STA2根据第一 MIC对请求站点接收的第一密钥进行完整性验证。 若验证通过, 则执行 S709, 否则流程结束。
S709、 STA2通过直接链路向 STA1发送第一确认消息, 第一确认消息用 于指示 STA1接收的第一密钥信息通过完整性验证。
其中, STA1根据第一密钥信息生成第一 MIC的过程, 以及 STA2根据第 一 MIC对 STA1接收的第一密钥信息进行完整性验证的过程均为现有技术, 在 此不再赘述。 如果 STA2进行完整性验证失败, 则 STA2不向 STA1发送第一 确认消息, 则 STA1与 STA2的直接链路建立失败。
STA1与 STA2之间的直接链路建立完毕后, STA1可以釆用第一密钥信息 对在直接链路向 STA2发送的业务数据进行加密, 再由 STA2将业务数据传输 至 AP。 其中, STA2向 AP转发的业务数据可以由 STA2与 AP进行关联时产 生密钥 2 ( PTK2 )进行加密。
可选的, STA1在向 AP发送业务数据的过程中,也可以选择是否通过 STA2 转发业务数据。 STA1 可以在业务数据的物理层( Physical Layer, PHY层) 的 帧头的信号或信号 A或信号 B ( Signal 或 Signal A 或 Signal B, SIGA )单元 内添加一个比特的指示位, 通过该指示位指示 STA2是否转发数据包。 例如: STA1可以通过该指示位置 1 , 表示数据包由 STA2转发; 置 0, 表示数据包不 由 STA2转发, 若 STA2接收到 STA1发送的数据包, 可以做丟弃处理。 需要 说明的是, 由于 1 1 ah规范中物理层的循环冗余校验 ( Cyclical Redundancy Check, CRC )校验只有 4个比特, 物理头内的指示位较易受到干扰, 因此, STA2可以进一步分析数据帧 MAC头内的地址信息来确认是否需要向 AP转发 数据帧。
本实施例提供的建立链路方法, 请求站点向接入点发送直接链路建立请求 消息之后, 接入点可以将该建立请求消息发送给被请求站点, 被请求站点接收 到接入点转发的直接链路建立请求消息之后, 在返回给接入点的直接链路建立 响应消息中携带被请求站点生成的密钥信息, 以使接入点将该建立响应消息返 回给请求站点后, 请求站点能够根据该密钥对请求站点与被请求站点之间的直 接链路上传输的业务数据进行安全传输, 实现节省请求站点与被请求站点建立 链路过程中的信令开销。 被请求站点可以从直接链路上直接收到请求站点发送 的直接链路建立确认消息, 而不必通过接入点转发该确认消息, 因此, 减少了 请求站点直接向接入点发送消息的次数, 可以有效降低请求站点的能耗。 图 8为本发明提供的密钥更新方法又一个实施例的流程图, 如图 8所示, 该方法包括:
5801、 STA2生成第二密钥信息, 第二密钥信息用于替换第一密钥信息, 对 STA1与 STA2之间的直接链路上传输的业务数据进行安全传输。
可选的, STA2还可以确定第二密钥的生命周期。
与生成第一密钥类似的, STA2可以生成一个唯一的不与其他密钥(包括第 一密钥) 重复的随机数作为第二密钥, 也可以通过其他密钥生成方式生成第二 密钥, 在此并不做出限制。
5802、 STA2将第二密钥信息发送给 AP。
其中, 第二密钥信息中包括第二密钥, 或者, 可以包括第二密钥和第二密 钥的生命周期信息。
其中, STA2向 AP发送的第二密钥信息可以釆用现有的各种消息格式。 可 选的, 可以釆用直接链路建立响应消息 ( Setu p Response ) 的消息格式。 该新 消息中可以包括: STA1的地址信息、 STA2的地址信息, STA2支持的速率集 合和能力 (Capacities )参数, 以及第二密钥信息。 该消息可以通过 STA2与
AP之间的 RSNA传邋可以釆用 STA2与 AP之间关联时产生的密钥 2( PTK2 ) 进行力口密。
可选的, STA1的地址信息和 STA2的地址信息可以釆用 AID。
5803、 AP将第二密钥信息发送给 STA1。
与 S802类似的, AP可以根据业务需要选择是否需要解析携带第二密钥及 第二密钥的生命周期信息的消息。 AP可以通过 STA1与 AP关联时产生的密钥 1 ( PTK1 )对携带第二密钥信息的消息进行加密。
5804、 STA1釆用第二密钥信息对第二直接链路建立确认消息进行加密, 生成第二 MIC。
S805、 STA1通过直接链路向 STA2发送第二直接链路建立确认消息, 第 二直接链路建立确认消息中携带第二 MIC。 5806、 STA2根据第二 MIC对第三确认消息进行完整性验 若验证通过, 则执行 S417, 否则流程结束。
5807、 STA2通过直接链路向 STA1发送第二确认消息, 第二确认消息用 于指示 STA1接收的第二密钥通过完整性验证。
其中, S804-S807的过程与 S706-S709的过程相类似, 可参见 S706-S709 的相关描述。
本实施例提供的密钥更新方法, 被请求站点可以在密钥的生命周期结束之 前, 产生新的密钥并发送给请求站点, 从而避免了由于密钥过期而导致的请求 站点与被请求站点之间的直接链路重新建立, 从而增加了传输吞吐率。 图 9为本发明提供的被请求站点一个实施例的结构示意图, 如图 9所示, 该被请求站点包括: 接收器 1 1、 处理器 12和发送器 13;
接收器 1 1 , 用于接收接入点发送的直接链路建立请求消息, 直接链路建立 请求消息用于请求在请求站点与被请求站点之间建立直接链路;
处理器 12, 用于生成第一密钥信息, 第一密钥信息用于对请求站点与被请 求站点之间的直接链路上传输的业务数据进行安全传输;
发送器 13, 用于向接入点发送直接链路建立响应消息, 以使接入点将直接 链路建立响应消息发送给请求站点, 直接链路建立响应消息中携带第一密钥信 息;
接收器 1 1还可以用于: 接收请求站点通过直接链路发送的第一直接链路建 立确认消息, 第一直接链路建立确认消息用于指示请求站点接收到被请求站点 生成的第一密钥信息。
可选的, 发送器 13发送的第一密钥信息中包括第一密钥, 或包括第一密钥 和第一密钥的生命周期; 当第一密钥信息中包括第一密钥和第一密钥的生命周 期时, 处理器 12还可以用于: 确定第一密钥的生命周期。
可选的, 处理器 12还可以用于: 生成第二密钥信息, 第二密钥信息用于替 换第一密钥信息, 对请求站点与被请求站点之间的直接链路上传输的业务数据 进行安全传输;
相应的, 发送器 13还可以用于: 将第二密钥信息发送给接入点, 以使接入 点将第二密钥信息发送给被请求站点。
可选的, 发送器 13发送的第二密钥信息中包括第二密钥, 或第二密钥和第 二密钥的生命周期; 当第二密钥信息中包括第二密钥和第二密钥的生命周期 时, 处理器 12还可以用于: 确定第二密钥的生命周期。
可选的, 接收器 1 1还可以用于: 接收请求站点通过直接链路发送的第二直 接链路建立确认消息, 第二直接链路建立确认消息用于指示请求站点接收到被 请求站点生成的第二密钥信息。
本发明实例提供的被请求站点为本发明实施例提供的建立直接链路方法的 执行设备, 其执行建立直接链路方法的具体过程可参见图 3和图 7所示的方法 实施例中的相关描述, 在此不再赘述。
本实施例被请求站点, 接收到接入点转发的直接链路建立请求消息之后, 在返回给接入点的直接链路建立响应消息中携带被请求站点生成的密钥信息, 以使接入点将该直接链路建立响应消息返回给请求站点后, 请求站点能够根据 该密钥对请求站点与被请求站点之间的直接链路上传输的业务数据进行安全传 输, 实现节省请求站点与被请求站点建立链路过程中的信令开销。 图 10为本发明提供的请求站点一个实施例的结构示意图, 如图 10所示, 该请求站点包括: 发送器 21、 接收器 22;
发送器 21 , 用于向接入点发送直接链路建立请求消息, 以使接入点将直接 链路建立请求消息发送给被请求站点, 直接链路建立请求消息用于请求在请求 站点与被请求站点之间建立直接链路;
接收器 22, 用于接收接入点发送的直接链路建立响应消息, 直接链路建立 响应消息中携带第一密钥信息, 第一密钥信息用于对请求站点与被请求站点之 间的直接链路上传输的业务数据进行安全传输;
发送器 21还用于: 通过直接链路向被请求站点发送的第一直接链路建立确 认消息, 第一直接链路建立确认消息用于指示请求站点接收到被请求站点生成 的第一密钥信息。
可选的, 接收器 22接收的第一密钥信息可以包括第一密钥, 或者包括第一 密钥和第一密钥的生命周期信息。
可选的, 接收器 22还可以用于: 接收接入点发送的第二密钥信息, 第二密 钥信息由被请求站点生成, 第二密钥信息用于替换第一密钥, 对请求站点与被 请求站点之间的直接链路上传输的业务数据进行安全传输。
可选的, 接收器 22接收的第二密钥信息可以包括第二密钥, 或包括第二密 钥和第二密钥的生命周期信息。
可选的, 发送器 21还可以用于: 通过直接链路向被请求站点发送的第二直 接链路建立确认消息, 第二直接链路建立确认消息用于指示请求站点接收到被 请求站点生成的第二密钥信息。
本发明实例提供的请求站点为本发明实施例提供的建立直接链路方法的执 行设备, 其执行建立直接链路方法的具体过程可参见图 1和图 7所示的方法实 施例中的相关描述, 在此不再赘述。
本实施例提供的请求站点, 向接入点发送直接链路建立请求消息之后, 可 以接收到接入点返回的携带被请求站点生成的密钥信息的直接链路建立响应消 息, 请求站点能够根据该密钥对请求站点与被请求站点之间的直接链路上传输 的业务数据进行安全传输, 实现节省请求站点与被请求站点建立链路过程中的 信令开销。 图 1 1为本发明提供的被请求站点又一个实施例的结构示意图, 如图 1 1所 示, 该被请求站点可以包括: 处理器 31和发送器 32;
处理器 31 , 用于生成第二密钥信息, 第二密钥信息用于替换被请求站点生 成的第一密钥信息, 对请求站点与被请求站点之间的直接链路上传输的业务数 据进行安全传输;
发送器 32, 用于将第二密钥信息发送给接入点, 以使接入点将第二密钥信 息发送给被请求站点。
可选的, 发送器 32发送的第二密钥信息中包括可以第二密钥, 或第二密钥 和第二密钥的生命周期; 当第二密钥信息中包括第二密钥和第二密钥的生命周 期时, 处理器 31还可以用于: 确定第二密钥的生命周期。
图 12为本发明提供的被请求站点又一个实施例的结构示意图, 如图 12所 示, 可选的, 在图 1 1所示实施例的基础上, 被请求站点还可以包括:
接收器 33, 可以用于接收请求站点通过直接链路发送的直接链路建立确认 消息, 直接链路建立确认消息用于指示请求站点接收到被请求站点生成的第二 密钥信息。
本发明实例提供的被请求站点为本发明实施例提供的密钥更新方法的执行 设备, 其执行密钥更新方法的具体过程可参见图 4和图 8所示的方法实施例中 的相关描述, 在此不再赘述。 本实施例提供的被请求站点, 产生用于替换第一密钥信息的第二密钥信息 后, 可以将第二密钥信息通过接入点返回给请求站点, 以使请求站点釆用第二 密钥信息替换第一密钥信息对请求站点与被请求站点之间的直接链路上传输的 业务数据进行安全传输, 实现节省密钥更新过程的信令开销。 图 13为本发明提供的请求站点又一个实施例的结构示意图,如图 13所示, 该请求站点包括: 接收器 41和处理器 42;
接收器 41 , 用于接收接入点发送的第二密钥信息, 第二密钥信息由被请求 站点生成, 用于替换被请求站点生成的第一密钥信息, 对请求站点与被请求站 点之间的直接链路上传输的业务数据进行安全传输;
处理器 42, 用于釆用第二密信息钥替换第一密钥信息, 对请求站点与被请 求站点之间的直接链路上传输的业务数据进行安全传输。
可选的, 接收器 41接收的第二密钥信息可以包括第二密钥, 或包括第一密 钥和第二密钥的生命周期信息。
图 14为本发明提供的请求站点又一个实施例的结构示意图,如图 14所示, 在图 13所示实施例的基础上, 该请求站点还可以包括:
发送器 43, 用于通过直接链路向被请求站点发送直接链路建立确认消息, 直接链路建立确认消息用于指示请求站点接收到被请求站点生成的第二密钥信 息。
本发明实例提供的请求站点为本发明实施例提供的密钥更新方法的执行设 备, 其执行密钥更新方法的具体过程可参见图 6和图 8所示的方法实施例中的 相关描述, 在此不再赘述。
本实施例提供的请求站点, 可以接收到接入点转发的被请求站点产生用于 替换第一密钥的第二密钥信息, 从而釆用第二密钥信息替换第一密钥信息对请 求站点与被请求站点之间的直接链路上传输的业务数据进行安全传输, 实现节 省密钥更新过程的信令开销。
所属领域的技术人员可以清楚地了解到, 为描述的方便和简洁, 仅以上述 各功能模块的划分进行举例说明, 实际应用中, 可以根据需要而将上述功能分 配由不同的功能模块完成, 即将装置的内部结构划分成不同的功能模块, 以完 成以上描述的全部或者部分功能。 上述描述的系统, 装置和单元的具体工作过 程, 可以参考前述方法实施例中的对应过程, 在此不再赘述。 在本申请所提供的几个实施例中, 应该理解到, 所揭露的系统, 装置和方 法, 可以通过其它的方式实现。 例如, 以上所描述的装置实施例仅仅是示意性 的, 例如, 模块或单元的划分, 仅仅为一种逻辑功能划分, 实际实现时可以有 另外的划分方式, 例如多个单元或组件可以结合或者可以集成到另一个系统, 或一些特征可以忽略, 或不执行。 另一点, 所显示或讨论的相互之间的耦合或 直接耦合或通信连接可以是通过一些接口, 装置或单元的间接耦合或通信连 接, 可以是电性, 机械或其它的形式。 显示的部件可以是或者也可以不是物理单元, 即可以位于一个地方, 或者也可 以分布到多个网络单元上。 可以根据实际的需要选择其中的部分或者全部单元 来实现本实施例方案的目的。
另外, 在本申请各个实施例中的各功能单元可以集成在一个处理单元中, 也可以是各个单元单独物理存在, 也可以两个或两个以上单元集成在一个单元 中。 上述集成的单元既可以釆用硬件的形式实现, 也可以釆用软件功能单元的 形式实现。
集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用 时, 可以存储在一个计算机可读取存储介质中。 基于这样的理解, 本申请的技 术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分 可以以软件产品的形式体现出来, 该计算机软件产品存储在一个存储介质中, 包括若干指令用以使得一台计算机设备(可以是个人计算机, 服务器, 或者网 络设备等)或处理器(processor )执行本申请各个实施例方法的全部或部分步 骤。 而前述的存储介质包括: U盘、 移动硬盘、 只读存储器(ROM, Read-Only Memory ), 随机存取存储器 (RAM, Random Access Memory )、 磁碟或者光 盘等各种可以存储程序代码的介质。
以上, 以上实施例仅用以说明本申请的技术方案, 而非对其限制; 尽管参 照前述实施例对本申请进行了详细的说明, 本领域的普通技术人员应当理解: 其依然可以对前述各实施例所记载的技术方案进行修改, 或者对其中部分技术 特征进行等同替换; 而这些修改或者替换, 并不使相应技术方案的本质脱离本 申请各实施例技术方案的范围。

Claims

权 利 要求
1、 一种建立直接链路方法, 其特征在于, 包括: 请求站点向接入点发送直接链路建立请求消息, 以使所述接入点将所述直 接链路建立请求消息发送给所述被请求站点, 所述直接链路建立请求消息用于 请求在所述请求站点与被请求站点之间建立直接链路;
所述请求站点接收所述接入点发送的直接链路建立响应消息, 所述直接链 路建立响应消息中携带第一密钥信息, 所述第一密钥信息用于对所述请求站点 与所述被请求站点之间的所述直接链路上传输的业务数据进行安全传输;
所述请求站点通过所述直接链路向所述被请求站点发送的第一直接链路建 立确认消息, 所述第一直接链路建立确认消息用于指示所述请求站点接收到所 述被请求站点生成的所述第一密钥信息。
2、 根据权利要求 1所述的方法, 其特征在于, 所述第一密钥信息包括第一 密钥, 或者包括所述第一密钥和所述第一密钥的生命周期信息。
3、 根据权利要求 1或 2所述的方法, 其特征在于, 所述请求站点接收所述 接入点发送的直接链路建立响应消息之后, 还包括:
所述请求站点接收所述接入点发送的第二密钥信息, 所述第二密钥信息由 所述被请求站点生成, 所述第二密钥信息用于替换所述第一密钥信息, 对所述 请求站点与所述被请求站点之间的所述直接链路上传输的业务数据进行安全传 输。
4、 根据权利要求 3所述的方法, 其特征在于, 所述第二密钥信息包括第二 密钥, 或包括所述第二密钥和所述第二密钥的生命周期信息。
5、 根据权利要求 3或 4所述的方法, 其特征在于, 所述请求站点接收所述 接入点发送的第二密钥信息之后, 还包括: 所述请求站点通过所述直接链路向所述被请求站点发送的第二直接链路建 立确认消息, 所述第二直接链路建立确认消息用于指示所述请求站点接收到所 述被请求站点生成的所述第二密钥信息。
6、 一种建立直接链路方法, 其特征在于, 包括:
被请求站点接收接入点发送的直接链路建立请求消息, 所述直接链路建立 请求消息用于请求在请求站点与所述被请求站点之间建立直接链路;
所述被请求站点生成第一密钥信息, 所述第一密钥信息用于对所述请求站 点与所述被请求站点之间的所述直接链路上传输的业务数据进行安全传输; 所述被请求站点向所述接入点发送直接链路建立响应消息, 以使所述接入 点将所述直接链路建立响应消息发送给所述请求站点, 所述直接链路建立响应 消息中携带第一密钥信息;
所述被请求站点接收所述请求站点通过所述直接链路发送的第一直接链路 建立确认消息, 所述第一直接链路建立确认消息用于指示所述请求站点接收到 所述被请求站点生成的所述第一密钥信息。
7、 根据权利要求 6所述的方法, 其特征在于, 所述第一密钥信息中包括第 一密钥, 或包括所述第一密钥和所述第一密钥的生命周期;
当所述第一密钥信息中包括所述第一密钥和所述第一密钥的生命周期时, 所述被请求站点向所述接入点发送直接链路建立响应消息之前, 还包括:
所述被请求站点确定所述第一密钥的生命周期。
8、 根据权利要求 6或 7所述的方法, 其特征在于, 所述被请求站点向所述 接入点发送直接链路建立响应消息之后, 还包括:
所述被请求站点生成第二密钥信息, 所述第二密钥信息用于替换所述第一 密钥信息, 对所述请求站点与所述被请求站点之间的所述直接链路上传输的业 务数据进行安全传输;
所述被请求站点将第二密钥信息发送给所述接入点, 以使所述接入点将所 述第二密钥信息发送给所述被请求站点。
9、 根据权利要求 8所述的方法, 其特征在于, 所述第二密钥信息中包括第 二密钥, 或所述第二密钥和所述第二密钥的生命周期;
当所述第二密钥信息中包括所述第二密钥和所述第二密钥的生命周期时, 所述被请求站点向所述接入点发送直接链路建立响应消息之后, 还包括:
所述被请求站点确定所述第二密钥的生命周期
10、 根据权利要求 8或 9所述的方法, 其特征在于, 所述被请求站点将所 述第二密钥信息发送给所述接入点之后, 还包括:
所述被请求站点接收所述请求站点通过所述直接链路发送的第二直接链路 建立确认消息, 所述第二直接链路建立确认消息用于指示所述请求站点接收到 所述被请求站点生成的第二密钥信息。
1 1、 一种密钥更新方法, 其特征在于, 包括:
被请求站点生成第二密钥信息, 所述第二密钥信息用于替换所述被请求站 点生成的第一密钥信息, 对请求站点与所述被请求站点之间的直接链路上传输 的业务数据进行安全传输;
所述被请求站点将第二密钥信息发送给接入点, 以使所述接入点将所述第 二密钥信息发送给所述被请求站点。
12、 根据权利要求 1 1所述的方法, 其特征在于, 所述第二密钥信息中包括 第二密钥, 或所述第二密钥和所述第二密钥的生命周期;
当所述第二密钥信息中包括所述第二密钥和所述第二密钥的生命周期时, 所述被请求站点将第二密钥信息发送给接入点之前, 还包括:
所述被请求站点确定所述第二密钥的生命周期。
13、 根据权利要求 1 1或 12所述的方法, 其特征在于, 所述被请求站点将 所述第二密钥信息发送给接入点之后, 还包括:
所述被请求站点接收所述请求站点通过所述直接链路发送的直接链路建立 确认消息, 所述直接链路建立确认消息用于指示所述请求站点接收到所述被请 求站点生成的第二密钥信息。
14、 一种密钥更新方法, 其特征在于, 包括:
请求站点接收接入点发送的所述第二密钥信息, 所述第二密钥信息由所述 被请求站点生成, 用于替换所述被请求站点生成的第一密钥信息, 对所述请求 站点与所述被请求站点之间的直接链路上传输的业务数据进行安全传输;
所述请求站点釆用所述第二密钥信息替换所述第一密钥信息, 对所述请求 站点与所述被请求站点之间的直接链路上传输的业务数据进行安全传输。
15、 根据权利要求 14所述的方法, 其特征在于, 所述第二密钥信息包括第 二密钥, 或包括所述第一密钥和所述第二密钥的生命周期信息。
16、 根据权利要求 14或 15所述的方法, 其特征在于, 所述请求站点接收 接入点发送的所述第二密钥信息之后, 还包括:
所述请求站点通过所述直接链路向所述被请求站点发送直接链路建立确认 消息, 所述直接链路建立确认消息用于指示所述请求站点接收到所述被请求站 点生成的第二密钥信息。
17、 一种请求站点, 其特征在于, 包括:
发送器, 用于向接入点发送直接链路建立请求消息, 以使所述接入点将所 述直接链路建立请求消息发送给所述被请求站点, 所述直接链路建立请求消息 用于请求在所述请求站点与被请求站点之间建立直接链路;
接收器, 用于接收所述接入点发送的直接链路建立响应消息, 所述直接链 路建立响应消息中携带第一密钥信息, 所述第一密钥信息用于对所述请求站点 与所述被请求站点之间的所述直接链路上传输的业务数据进行安全传输;
所述发送器还用于: 通过所述直接链路向所述被请求站点发送的第一直接 链路建立确认消息, 所述第一直接链路建立确认消息用于指示所述请求站点接 收到所述被请求站点生成的所述第一密钥信息。
18、 根据权利要求 17所述的请求站点, 其特征在于, 所述接收器接收的所 述第一密钥信息包括第一密钥, 或者包括所述第一密钥和所述第一密钥的生命 周期信息。
19、 根据权利要求 17或 18所述的请求站点, 其特征在于, 所述接收器还 用于: 接收所述接入点发送的第二密钥信息, 所述第二密钥信息由所述被请求 站点生成, 所述第二密钥信息用于替换所述第一密钥信息, 对所述请求站点与 所述被请求站点之间的所述直接链路上传输的业务数据进行安全传输。
20、 根据权利要求 19所述的请求站点, 其特征在于, 所述接收器接收的所 述第二密钥信息包括第二密钥, 或包括所述第二密钥和所述第二密钥的生命周 期信息。
21、 根据权利要求 19或 20所述的请求站点, 其特征在于, 所述发送器还 用于: 通过所述直接链路向所述被请求站点发送的第二直接链路建立确认消 息, 所述第二直接链路建立确认消息用于指示所述请求站点接收到所述被请求 站点生成的所述第二密钥信息。
22、 一种被请求站点, 其特征在于, 包括:
接收器, 用于接收接入点发送的直接链路建立请求消息, 所述直接链路建 立请求消息用于请求在请求站点与所述被请求站点之间建立直接链路;
处理器, 用于生成第一密钥信息, 所述第一密钥信息用于对所述请求站点 与所述被请求站点之间的所述直接链路上传输的业务数据进行安全传输;
发送器, 用于向所述接入点发送直接链路建立响应消息, 以使所述接入点 将所述直接链路建立响应消息发送给所述请求站点, 所述直接链路建立响应消 息中携带第一密钥信息;
所述接收器还用于: 接收所述请求站点通过所述直接链路发送的第一直接 链路建立确认消息, 所述第一直接链路建立确认消息用于指示所述请求站点接 收到所述被请求站点生成的所述第一密钥信息。
23、 根据权利要求 22所述的被请求站点, 其特征在于, 所述发送器发送的 所述第一密钥信息中包括第一密钥, 或包括所述第一密钥和所述第一密钥的生 命周期; 当所述第一密钥信息中包括所述第一密钥和所述第一密钥的生命周期 时, 所述处理器还用于: 确定所述第一密钥的生命周期。
24、 根据权利要求 22或 23所述的被请求站点, 其特征在于, 所述处理器 还用于: 生成第二密钥信息, 所述第二密钥信息用于替换所述第一密钥信息, 对所述请求站点与所述被请求站点之间的所述直接链路上传输的业务数据进行 安全传输;
所述发送器还用于: 将第二密钥信息发送给所述接入点, 以使所述接入点 将所述第二密钥信息发送给所述被请求站点。
25、 根据权利要求 24所述的请求站点, 其特征在于, 所述发送器发送的所 述第二密钥信息中包括第二密钥, 或所述第二密钥和所述第二密钥的生命周 期; 当所述第二密钥信息中包括所述第二密钥和所述第二密钥的生命周期时, 所述处理器还用于: 确定所述第二密钥的生命周期。
26、 根据权利要求 24或 25所述的被请求站点, 其特征在于, 所述接收器 还用于: 接收所述请求站点通过所述直接链路发送的第二直接链路建立确认消 息, 所述第二直接链路建立确认消息用于指示所述请求站点接收到所述被请求 站点生成的第二密钥信息。
27、 一种被请求站点, 其特征在于, 包括:
处理器, 用于生成第二密钥信息, 所述第二密钥信息用于替换所述被请求 站点生成的第一密钥信息, 对请求站点与所述被请求站点之间的直接链路上传 输的业务数据进行安全传输;
发送器, 用于将第二密钥信息发送给接入点, 以使所述接入点将所述第二 密钥信息发送给所述被请求站点。
28、 根据权利要求 27所述的被请求站点, 其特征在于, 所述发送器发送的 所述第二密钥信息中包括第二密钥, 或所述第二密钥和所述第二密钥的生命周 期; 当所述第二密钥信息中包括所述第二密钥和所述第二密钥的生命周期时, 所述处理器还用于: 确定所述第二密钥的生命周期。
29、 根据权利要求 27或 28所述的被请求站点, 其特征在于, 还包括: 接收器, 用于接收所述请求站点通过所述直接链路发送的直接链路建立确 认消息, 所述直接链路建立确认消息用于指示所述请求站点接收到所述被请求 站点生成的第二密钥信息。
30、 一种请求站点, 其特征在于, 包括:
接收器, 用于接收接入点发送的所述第二密钥信息, 所述第二密钥信息由 所述被请求站点生成, 用于替换所述被请求站点生成的第一密钥信息, 对所述 请求站点与所述被请求站点之间的直接链路上传输的业务数据进行安全传输; 处理器, 用于釆用所述第二密钥信息替换所述第一密钥信息, 对所述请求 站点与所述被请求站点之间的直接链路上传输的业务数据进行安全传输。
31、 根据权利要求 30所述的请求站点, 其特征在于, 所述接收器接收的所 述第二密钥信息包括第二密钥, 或包括所述第一密钥和所述第二密钥的生命周 期信息。
32、 根据权利要求 30或 31所述的请求站点, 其特征在于, 还包括: 发送器, 用于通过所述直接链路向所述被请求站点发送直接链路建立确认 消息, 所述直接链路建立确认消息用于指示所述请求站点接收到所述被请求站 点生成的第二密钥信息。
PCT/CN2013/077431 2012-07-03 2013-06-19 建立直接链路方法、密钥更新方法和设备 Ceased WO2014005482A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP13813204.8A EP2846569B1 (en) 2012-07-03 2013-06-19 Method for establishing direct link, and key updating method and device
US14/573,935 US20150104019A1 (en) 2012-07-03 2014-12-17 Direct Link Setup Method, Key Updating Method and Device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201210226264.XA CN103533540A (zh) 2012-07-03 2012-07-03 建立直接链路方法、密钥更新方法和设备
CN201210226264.X 2012-07-03

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US14/573,935 Continuation US20150104019A1 (en) 2012-07-03 2014-12-17 Direct Link Setup Method, Key Updating Method and Device

Publications (1)

Publication Number Publication Date
WO2014005482A1 true WO2014005482A1 (zh) 2014-01-09

Family

ID=49881320

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/077431 Ceased WO2014005482A1 (zh) 2012-07-03 2013-06-19 建立直接链路方法、密钥更新方法和设备

Country Status (4)

Country Link
US (1) US20150104019A1 (zh)
EP (1) EP2846569B1 (zh)
CN (1) CN103533540A (zh)
WO (1) WO2014005482A1 (zh)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10504148B2 (en) 2014-05-23 2019-12-10 Qualcomm Incorporated Peer-to-peer relaying of discovery information
US10142847B2 (en) 2014-05-23 2018-11-27 Qualcomm Incorporated Secure relay of discovery information in wireless networks
US9929863B2 (en) * 2015-10-30 2018-03-27 Palo Alto Research Center Incorporated System and method for efficient and semantically secure symmetric encryption over channels with limited bandwidth
CN107017986B (zh) * 2017-06-05 2020-05-22 深圳市成为信息技术有限公司 一种密钥更新方法及系统
CN114079881B (zh) * 2020-08-13 2024-05-17 华为技术有限公司 一种通信方法及装置
CN116887296B (zh) * 2020-08-21 2024-03-26 华为技术有限公司 一种多链路通信方法、业务与链路映射的方法及设备
KR20230135523A (ko) * 2022-03-16 2023-09-25 한국전자통신연구원 Emlsr을 지원하는 무선랜에서 직접 통신 위한 방법 및 장치
US20260107336A1 (en) * 2022-09-29 2026-04-16 Beijing Xiaomi Mobile Software Co., Ltd. Direct-link establishment method, device and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101471829A (zh) * 2007-12-28 2009-07-01 华为技术有限公司 一种无线局域网中站点的直连方法和设备
CN101594578A (zh) * 2008-05-30 2009-12-02 深圳华为通信技术有限公司 直连链路的建立方法、站设备及通信系统
CN102255723A (zh) * 2010-05-17 2011-11-23 中华电信股份有限公司 非同步密钥更新方法
US20120087356A1 (en) * 2010-10-07 2012-04-12 Qualcomm, Incorporated Tunneled direct link setup through a tunnel
CN102461317A (zh) * 2009-04-06 2012-05-16 英特尔公司 无线网络中的直接对等链路建立

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2005274003B2 (en) * 2004-08-12 2009-03-05 Interdigital Technology Corporation Method and system for controlling access to a wireless communication medium
US20080298328A1 (en) * 2007-06-04 2008-12-04 Suman Sharma Trusted wireless communications with station-to-station link association

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101471829A (zh) * 2007-12-28 2009-07-01 华为技术有限公司 一种无线局域网中站点的直连方法和设备
CN101594578A (zh) * 2008-05-30 2009-12-02 深圳华为通信技术有限公司 直连链路的建立方法、站设备及通信系统
CN102461317A (zh) * 2009-04-06 2012-05-16 英特尔公司 无线网络中的直接对等链路建立
CN102255723A (zh) * 2010-05-17 2011-11-23 中华电信股份有限公司 非同步密钥更新方法
US20120087356A1 (en) * 2010-10-07 2012-04-12 Qualcomm, Incorporated Tunneled direct link setup through a tunnel

Also Published As

Publication number Publication date
CN103533540A (zh) 2014-01-22
EP2846569A4 (en) 2015-05-27
US20150104019A1 (en) 2015-04-16
EP2846569B1 (en) 2017-06-14
EP2846569A1 (en) 2015-03-11

Similar Documents

Publication Publication Date Title
WO2014005482A1 (zh) 建立直接链路方法、密钥更新方法和设备
TWI733675B (zh) 具有加密的客戶端設備上下文的網路架構和安全
CN108347410B (zh) 安全实现方法、设备以及系统
US8848610B2 (en) Lightweight data transmission mechanism
CN103297961B (zh) 一种用于设备间安全通信的设备与系统
CN112205008A (zh) 测距的方法、通信节点、通信设备及存储介质
CN111886885B (zh) 恢复rrc连接时的安全验证
JP6698771B2 (ja) 効果的なアクセスポイント発見のためのシステムおよび方法
US10320754B2 (en) Data transmission method and apparatus
JP7648790B2 (ja) ダイレクトリンクアドレス指定方法およびダイレクトリンクアドレス指定装置
US12156028B2 (en) Wireless network switching method and device
WO2012083828A1 (zh) 本地路由业务的实现方法、基站及系统
CN108781110B (zh) 用于通过通信网络中继数据的系统和方法
WO2017132962A1 (zh) 一种安全参数传输方法及相关设备
CN102835178A (zh) 用于优化无线资源控制连接建立中接入层载体信令传输的装置和方法
CN110226319B (zh) 用于紧急接入期间的参数交换的方法和设备
CN111615837B (zh) 数据传输方法、相关设备以及系统
WO2023050373A1 (zh) 一种通信方法、装置及系统
WO2017095303A1 (en) Provisioning node, communication node and methods therein for handling key identifiers in wireless communication
WO2015064475A1 (ja) 通信制御方法、認証サーバ及びユーザ端末
WO2012137684A1 (ja) 移動通信方法、無線基地局、移動管理ノード及び移動局
WO2026012245A1 (zh) 通信方法、装置及系统
CN115174653A (zh) 节点配对方法
HK1202353B (zh) 无线通信网络中的小数据通信

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13813204

Country of ref document: EP

Kind code of ref document: A1

REEP Request for entry into the european phase

Ref document number: 2013813204

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2013813204

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE