WO2007086705A1 - Communication method for wireless network and wireless network system - Google Patents

Communication method for wireless network and wireless network system Download PDF

Info

Publication number
WO2007086705A1
WO2007086705A1 PCT/KR2007/000477 KR2007000477W WO2007086705A1 WO 2007086705 A1 WO2007086705 A1 WO 2007086705A1 KR 2007000477 W KR2007000477 W KR 2007000477W WO 2007086705 A1 WO2007086705 A1 WO 2007086705A1
Authority
WO
WIPO (PCT)
Prior art keywords
access point
data
station
wireless network
mac address
Prior art date
Application number
PCT/KR2007/000477
Other languages
French (fr)
Inventor
Chan Phill Yun
Seung Hyup Ryu
Sook Hyun Yang
Original Assignee
Lg Electronic Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lg Electronic Inc. filed Critical Lg Electronic Inc.
Publication of WO2007086705A1 publication Critical patent/WO2007086705A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery

Definitions

  • the present invention relates to a communication method for a wireless network and a wireless network system which transfer the information of service providers and protect a MAC address.
  • a communication method its related method in wireless network comprising: processing an information of a service provider list using a specific function or algorithm, and transmitting a data comprising all or part of the processed information by a access point; and receiving the transmitted data from the access point, and processing the received data to decode the original information of the service provider list.
  • a communication method and its related method in a wireless network comprising; transmitting the data comprising a request for a MAC address by a station; receiving the data comprising the request for the MAC address and transmitting to the station the other data comprising a random MAC address in accordance with the request for the MAC address by a access point; and transmitting a data comprising a real MAC address by the station.
  • FIGs. 1 to 3 are schematic diagrams of wireless network systems according to the embodiments of the present invention.
  • FIG. 4 is a flow chart illustrating connection procedure for the data transmission in wireless LAN system of FIG. 3.
  • FIG. 5 is a flow chart of the communication method in the wireless network according to another embodiment of the present invention.
  • FIG. 6 is a flow chart of the communication method in the wireless network according to further embodiment of the present invention. Mode for the Invention
  • FIGs. 1 to 3 are schematic diagrams of the wireless network systems according to the embodiments of the present invention. The same elements or components of FIGs. 1 to 3 use the same reference numbers respectively.
  • the wireless network system for example, a wireless LAN(IO) comprises a plurality of stations or terminals (12), an access point or wireless base station, or a backbone network or distribution system (16).
  • a plurality of stations or terminals(12) are equipped with a Network Interface Card for the wireless LAN and perform an operation of physical layer and MAC layer based on an IEEE 802.11 standard.
  • a plurality of stations(12) are connected with the access point(14) on air and exchange the data frame in the wireless network as shown in FIG.l.
  • the access point(14) functions as a wire or wireless bridge which can relay the data frame from one station to other.
  • the access point has the same function as the bride or the switch of Ethernet.
  • the access point(14) has the same physical layer and MAC layer as the above-described station(12), the access point(14) basically performs the same operation as the station(12). Therefore, it may be considered that the access point(14) is equal to the station(12) case by case.
  • the distribution system(16) is a backbone network to connect a plurality of the access points(14).
  • the ethernet may be generally used as the distribution system(16) and a plurality of various access points(14) are connected with each other, which is called a wireless distribution system.
  • the distribution system(16) it is possible for the distribution system(16) to comprise a router or a switch connected with ethernet, or a plurality of servers connected with a wire or wireless internet network.
  • the wireless network system for example, the wireless
  • LAN(IO) comprises a plurality of stations or terminals (12).
  • the plurality of stations(12) are directly connected with each other. Therefore, there may be no the extra access point(14) and the distribution system(16) in the wireless LAN(IO) as shown in FIG.2 aside from FIG.l.
  • the plurality of stations(12) may be substituted for access point(14) and the distribution system(16) as shown in FIG. 1. There may be omitted some of their functions in the wireless LAN(IO) as shown in FIG.2.
  • the wireless LAN is described above referring to FIG.2, but the wireless network comprising the wireless LAN(IO) according to the embodiment of the present invention is not limited thereon.
  • the wireless network according to the embodiment of the present invention may be implemented by their combination or complete different systems.
  • the wireless network according to the embodiment of the present invention not only exists by itself, but also interworks with an other wireless network system, a mobile communication network or wired/wireless internet network and so on.
  • the wireless LAN system interworks with another disparate mobile communication network such as WCDMA(Wideband Code Division Multiple Access), which provides the roaming service for the terminal.
  • WCDMA Wideband Code Division Multiple Access
  • the terminal makes a phone call using the WCDMA and automatically performs a seamless roaming operation with the wireless LAN in the area which is supported by the wireless LAN.
  • wireless LAN As shown in FIG.l but also the wireless LAN as shown in FIG.2 need to associate the station(12) with the access point(14) or one station with other in order to exchange the data.
  • the wireless network system for example, the wireless
  • LAN(IO) equal to the wireless network system as shown in FIG.l comprises a plurality of stations(12), the access point(14) and the distribution system(16).
  • This wireless network system is connected to the wireless networks different from each other, for example, three wireless network(Network A, B, C).
  • these three wireless network(Network A, B, C) may be Subscription Service Provider Networks(SSPNs) different from each other.
  • SSPNs Subscription Service Provider Networks
  • one of them may be a commercial network in which a RADIUS server was comprised, other of them may be web-based authentication network, and another of them may be VOIP(Voice Over IP) network.
  • FIG. 4 is a flow chart illustrating connection procedure for the data transmission in the wireless LAN system of FIG.3.
  • the wireless network systems of FIG.1 and FIG.2 and the above described various wireless network systems comprise the same or substantially same connection procedure as shown in FIG.4 in order to transmit the data. The more detailed explanation is abbreviated.
  • connection procedure(20) for transmitting the data between the station(12) and the access point(14) comprises a scanning(SlO), an authentication ⁇ ) and an association ⁇ 14). Both the station(12) and the access point(14) apply to the data transmittion(S16) via the above procedure.
  • the scanning(SlO) is a process to find or identify the access point(14) around using beacon or probe message.
  • the scanning(SlO) comprises the passive scanning and the active scanning procedure.
  • the station(12) finds the access point(14) receiving the beacon message which the access point(14) broadcast periodically.
  • the station(12) broadcasts the probe request message or frame for each channel and receives the probe response message or frame which reports their network parameter such as SSID(Service Set ID) and supported rates. Therefore the station(12) finds the access point(14) in the area.
  • the beacon, the probe request and the probe response comprise the MAC header and the frame body respectively.
  • the MAC header and/or the frame body for the beacon message contains various capability information such as supported rates or encoding of the access point(14) and so on, and SSID(Service Set ID) which the access point belongs to.
  • the frame body of the beacon, the probe request or the probe response may contain any Action Management frame or Information Element(IE) so as to take any specific action or operation, or exchange some information.
  • IE Action Management frame or Information Element
  • the authentication ⁇ 12) is the process that the station(12) establishes its identity to the appropriate(right) access point(14) which the station(12) attaches to in the scanning(SlO). In other words, the authentication ⁇ 12) is the process that the station(12) negotiates the validation and the encryption with the access point(14). Because most of the stations(12) perform Open-system authentication, the access point(14) accepts the station(12) at face value without verifying its identity. There are IEEE 802. Ix based EAP-TLS, EAP-TTLS, EAP-FAST or PEAP and the like to bolster the authentication method.
  • the association ⁇ 14) is the process which the station(12) associates with the access point(14) to obtain full access to the wireless network(l ⁇ ), after the authentication has completed. After the association(14) completes, the access point(14) registers the station(12) on the wireless network(l ⁇ ) so frames for the station(12) are delivered to the access point(14). After the association ⁇ 4) is completed, one station(12) may communicate with other station(12) through the access point(14).
  • the station(12) sends an association request message or frame to the access point(14).
  • the received access point(14) sends an association response message or frame which contains AID(association ID) to logically identify an other station.
  • the station(12) and the access point(14) perform the data transmission ⁇ 16) via the above procedures(S 10, S12, S14).
  • a reassociation is almost the same as the association ⁇ 14).
  • the reassociation is the process of changing an association from an old access point to a new one.
  • the station(12) monitors the quality of the signal it receives from the old access point. When the quality of the signal is weaken, the station(12) initiates the reassociation with an other access point.
  • the station(12) may obtain access to the disparate networks through a single access point(14) as described above, referring to FIG.3.
  • the invention allows any number of SSPNs(Subscription Service
  • the invention specifies additional Information Elements(IEs) used in the beacon, the probe request and the probe response messages in order to provide information required by the station(12) as part of its network selection before the association ⁇ 14).
  • IEs Information Elements
  • the station(12) may send multiple probe request messages, each of which queries something about each of the realms.
  • NAIs Network Access Identifiers
  • probe response could be included in a single probe request and in the probe response, however, this could lead to unreasonably large probe messages.
  • Additional realm information could be made available in the probe response or the beacon, as part of the method described above.
  • Hash collisions where two realms hash to the same value are more likely to occur when shorter hashes are used.
  • the effect of hash collisions is that the station(12) may believe a realm to be supported, when in fact the access point(14) does not support it but does support a different realm that is hashed to the same value.
  • the station(12) may attempt to perform the authentication using credentials for the realm it mistakenly believes to be supported, but the authentication will fail. It is, however, desirable to reduce the probability of such collisions where possible by using longer hashes.
  • an adaptive hashing scheme is used, to allow the access point(14) to use a number of different hash lengths.
  • the length of hash chosen might depend on the number of realms being advertised, or how busy the network is particularly in the case of beacons.
  • This scheme may manage all SSPN information which have roaming agreements in the Access Network(AN). As NAI of SSPN in this scheme gets longer, part of NAI of SSPN is hashed and the hashed result is contained in the beacon.
  • the Access network(AN) is commonly called as BSS(Basic Service Set) or
  • ESS Extended Service Set
  • ESS Extended Service Set
  • the access points which belong to the AN include the information of service providers or SSPN.
  • the AN may be described as a single access point or a set of access points which a specific service provider manages in this specification.
  • the access point is used in case of some action or operation, or the subject for the network.
  • the AN or Access Network is used in case of management for the network in this specification.
  • the station(12) sends the probe request to the access point(14) so as to gain the credential or the service information.
  • the station(12) When the information of SSPN which the station would like to obtain access to is not included in the hashed list, the station(12) doesn't send the probe request so that the station(12) determines by itself that it can not be served from the AN.
  • the length of the hashed list used in the beacon will be set to 1-4 octets and is indicated into the beacon frame so as to reduce the hash collision.
  • the Element ID and the Length indicate the ID and the length of information element(IE).
  • the Flags field indicates the Hashed Length as described in the table 2, etc.
  • the final Information field includes the sequence of the hashed realms.
  • B2 indicates whether additional realms are available that are not included in the list of hashed realms in this IE.
  • the station(12) determines that the access point(14) may provide the SSPN wishing to be connected for the station(12), although the hashed value of SSPN wishing to be connected is not included in the hashed list. In this case, as all stations(12) send the probe request, the meaning to send the beacon comes to disappear. Therefore, when the beacon is sent, a list of all SSPN which support the roaming services in the AN(or AP) must be sent.
  • a new Hashed Realms List IE is added, which can be used optionally in beacons and probe response messages as shown in the table 3.
  • the Element ID and the Length indicate the ID and the length of information element(IE).
  • the Hash length(lb) indicates the length of the result value hashed by the hash function.
  • the Hash key indicates the hash key value used for the diversity of the hashed result.
  • the Hashed list is the hashed result of the roaming list hashed by the hash function.
  • the station(12) can receive the different hashed lists from the plurality of the access point(14) as shown in FIG.3. The station(12) can finally get the correct roaming list through the information from the plurality of the beacons such as the different hashed lists from the plurality of the access point(14).
  • a method for selecting a network according to another embodiment of the present invention relates to what the truncated locations of the hashed result value are different, even if every access point(14) uses the same hash key for the hash function.
  • the first access point(APl) sends the first lbyte among the 4bytes hashed result value and the second(AP2) sends the second lbyte among them, so that each of the access points sends the hashed lists different from each other. Therefore, while each of the access points(14) don't send the hash key different from each other, each of the access points(14) can send the different hashed list, without the complexity of the computation.
  • bits BO and B 1 in the Hash length field indicate the hash length that is being used:
  • Bits B2 and B3 in the Hash length field indicate the location of the truncation.
  • B4 in the Hash length field indicates whether additional realms are available that are not included in the list of hashed realms in this IE.
  • a method for selecting a network according to another embodiment of the present invention relates to transmit the list of the service provider ID which is frequently requested, but is not supported.
  • the AN manages the frequency of the service provider ID to which the stations (14) request the connection.
  • the access points(14) belonging to the AN use this information such as the frequency of the requested service provider ID.
  • the AN can give notice of the list of the service provider ID which is frequently requested, but is not supported through the beacon or the probe request as shown in the table 5.
  • the stations(12) don't request the connection to the service provider ID.
  • An information element including the total number of the grouped frames and the current number of a particular frames is included in the beacon, the probe request or the probe response and the like to be sent, as shown in the table 6. That combines the previous information with the present to make one information.
  • the Element ID and the Length indicate the ID and the length of information element(IE).
  • the total number(Total #) indicates the total number of the grouped frame such as the beacon.
  • the current number(Current #) indicates the turn of the particular grouped frame such as the beacon.
  • the grouping of the IE information may apply to the probe request or the probe response. It is possible to combine the information received from the access points(14) different from each other inside the same ESS.
  • a method for selecting a network according to another embodiment of the present invention relates to what receives the type indicating the service domain and whether it supports roaming to confirm the accessibility to the network.
  • the first parameter, service domain is distributed into "O(local)" and "l(global)". Local means that the station(12) cannot connect to servers at the other network domain and only get local domain network services. On the contrary, the station(12) is able to communicate with any correspondent nodes wherever correspondent nodes locate.
  • the second parameter indicates whether the roaming is supported or not.
  • Additional subfield is used to advertise which SSPNs can support to access 802. HAN.
  • the table 8 indicates the service domain, the support of roaming and the combination of the additional subfields. [109] Table 8
  • the case 1 and 3 show only the local domain realm in the additional subfield. Because the case 1 is limited to the "Local" service domain and the case 3 doesn't support other SSPNs and roaming.
  • the case 4 may be not existed, and the case 4 includes the supporting roaming lists in the additional subfield in case of supporting other SSPNs and roaming.
  • the additional subfield may include several hashed roaming list as described above, and may include the not-hashed roaming list.
  • the station(12) If the station(12) locates Case 1, Case 2, Case 3 network, the station(12) only receives the beacon frame and knows whether the station(12) can obtain access to that 802.11 AN through two bits and additional subfield.
  • a method for selecting a network according to another embodiment of the present invention relates to what transmits the grouping information of the roaming service provider.
  • service providers may have a lot of roaming agreement, and these roamed service providers may form a group with a globally unique name for business.
  • the good example for grouping of service providers is an airline alliance: Sky Team alliance, Star alliance, Oneworld alliance, etc.
  • the beacon frame or the probe request can include Service provider Group of unique name instead of realm list.
  • the Element ID and the Length indicate the ID and the length of Information Element(IE).
  • the first bit of flags is set " 1 " .
  • subfield information should consist of sequence of group IDs.
  • the passive and the active method may be used to give notice of the list of SSPNs provided by the access point(14) to the station(12).
  • the passive method is that the station(12) receives the beacon periodically sent by the access point(14), and knows the list of SSPNs included in the beacon.
  • the active method is that the station(12) requests the service provider list to the access point(14) through the probe request, and the access point(14) sends the list of SSPNs to the station(12) through the probe response.
  • a method for selecting a network according to another embodiment of the present invention relates to what uses not- loss compression and compaction of the service provider list.
  • the Information Element(IE) defined by the method for selecting a network according to another embodiment of the present invention may be applied to the beacon and the probe response. It may be applied to the action management frame by a similar method.
  • the commercial wireless LAN appliance includes the non-loss compression feature to compress the data without lowering its quality. The problem of the compression is what needs the decoding time to decompress the compressed data.
  • Each access point(14) has the following MIB (Management Information Base) value for the above method: Dotl lCompressionThreshold, Dotl lCompressionGainThreshold.
  • Dotl ICompressionThreshold is the integer in the unit byte(s). It may not compress the list of which the size is bigger than the "Dotl ICompressionThreshold". "Dotl lCompressionGainThreshold” is equal to or more than "0", and less than or equal to " 1". If the compression efficiency, which is equal to "the size of the compressed list'V'the size of the original list”, would be more than the "Dotl lCompressionGainThreshold", the original list is compressed and sent.
  • the compression algorithms used may be non-loss compression algorithms including one of ITU-T V.42bis(LZW), ITU-T V.44(LZJH), ANSI X3.241(LZS).
  • the present invention can use the new compaction process that is not used previously.
  • the Information Element(IE) which is loaded in the beacon and the probe response may be defined as the table 10.
  • the Length indicates the total size(octets) of the IE.
  • the Compression Algorithm indicates the not-loss compression algorithm that is used for the compression of the SSPN list.
  • the list of compressed SSPN is the list compressed by the compression algorithm.
  • the delimiter may use the proper value according to the method to express the SSPN ID. If the SSPN ID expresses as NAI realm, there is used the special character(e.g. '_', '/') that is not used as NAI realm.
  • the station(12) is not required to use its MAC address as identifier.
  • the station(12) uses an arbitrary MAC address: EMID "ESS MAC Identifier”.
  • the station(12) uses an arbitrary MAC address: AMID "AP MAC Identifier”.
  • the present invention provides the communication method for the wireless network to solve the above-described problem.
  • MAC address anonymity makes an identity of the station(12) not presumed through the MAC address.
  • the transmitted packet on air uses an arbitrary MAC address ('Dynamic MAC address') which is dynamically allocated. Because it is not necessary to protect the MAC address of the access point(14), the access point(14) may use its real MAC address in itself.
  • a method for selecting a network relates to what protects the real MAC address of the station(12) using the arbitrary MAC address and communicates between the access point(14) and the station(12).
  • the station(12) After the station(12) is connected with the access point(12), it transmit its real MAC address to the the access point(14) through the secure method.
  • One action management frame can be considered as a method to support this. Or other management frame is newly defined for use.
  • the method to securely transmit the frame(STA_Real_MAC_Address) including the real MAC address from the station(12) to the access point(14) is described as follows.
  • the access point(14) sends Public key(pub) to the station(12).
  • the Information Element(IE) including the public key may be broadcasted by the beacon.
  • the Real MAC address in the action management frame becomes "c”.
  • the access point(14) decrypts the Real MAC address with the private key(priv).
  • the action management frame in which the station(12) transmits the real MAC address to the access point(14) may be the following table 11.
  • the category in the table 11 indicates protection of MAC address.
  • the reserved action value for the action field is newly defined and is used in the action field.
  • Another information field includes the real MAC address of the station(12).
  • the access point(14) has a map between the real MAC address and the dynamic
  • the packet from/to the station(12) via the layer 2 access point(14) is routed using the real MAC address.
  • the access point(14) requests an authentication to the authentication server, it uses the securely transmitted real MAC address of the station(12).
  • EMID server needs to manage more MAC addresses according to the bigger region of ESS.
  • the EMID server does not manage all EMIDs in ESS, but the access point(14) locally manages all EMIDs in BSS.
  • the EMID server allocates the range of EMIDs to the access point(14) in ESS.
  • the access point(14) allocates some EMIDs among the allocated EMIDs from the EMID server to the station(12) which belongs to one's BSS.
  • the EMID server can allocate the range of EMIDs to the access point(14) in ESS using the concept of subnet mask of IP(internet protocol). In this case, the routing for the layer 2 bridge level became to be easy.
  • the new access point(14) allocates the new EMID to the station(12). Without this restriction requirement, the new access point(14) ascertains whether it is possible to use the EMID which the station(12) requests to the old access point(14) and receives information on the lease time, if the station(12) requests that the new access point(14) wants to use the previously used EMID.
  • APMEu which is AP Management Entity for IEEE 802.1 Iu
  • ESME which is ESS Server Management Entity
  • ESS server management is the entity for ESS server management.
  • APMEu sends MAC_address_range.request to ESME.
  • MAC_address_range.request may be defined as follows.
  • the Range_Size indicates the size of MAC address block, which is interpreted as the same as the size of the subnet of IP address. If the Range_Size is n, the MAC address block with the size of 2° is requested, the detailed example of
  • MAC_address_range.request is the same as follows. [176] MAC_address_range_request
  • the ESME allocates an EMID to the APMEu such as the access point(14) through
  • EMID_AP // EMID which is allocated to AP.
  • Each access point(14) allocates an EMID to the station(12) inside one's BSS.
  • the size of the EMID block which the access point(14) can allocate to the station(12) is fixed at the reasonable value. For example, it has very low possibility for the number of the stations(12) to be greater than 256 in 256/BSS.
  • One access point(14) broadcasts/ mutlicasts an EMID and the range of EMID which wishing to use to the other access points(14) inside one's ESS.
  • An MAC address which is used in order to request [EMID. request], [MAC_Addr_for_request], is separately allocated. [MAC_Addr_for_request] uses the random value within the predetermined range.
  • the other access point(14) which is using them sends the response. Without receiving the response after the EMID .request is sent, it is thought that this EMID is not used. In this case, the other access point(14) informs one access point(14) of using this EMID by itself.
  • EMID.request is defined as follows.
  • MAC_Addr_for_request // MAC address which is used for request, selected from the MAC address pool for reqeust.
  • the communication method in wireless network relates to negotiate a lease time for the station(12).
  • the station(12) can request a lease time which it wishes to get.
  • the lease time which the station(12) wishes to get is also assigned to it.
  • the station(12) may request a lease time extension at an impending time before the expiration of the lease time.
  • the station(12) transmits one's generating AMID and EMID to the access point(14) at the time of request for the initial address.
  • AMID/EMID is transmitted by the method to transmit the probe request with IE(Information Element) including AMID and EMID.
  • the access point(14) informs the station(14) of both the validity of the requested AMID, EMID value and the lease time which may be allocated.
  • the EMID value may be either the confirmation for the requesting value of the station(12) or the newly allocated value. They may be transmitted by the probe response with the IE for allocating AMID/EMID as described in the table 14. It makes the condition, Allocated Lease Time ⁇ requested Lease Time, satisfied.
  • the station(12) may request the lease time extension.
  • the access point may also extend the lease time allocated to the station(12) as needed. It may be requested through the action management frame or management frame which can be defined as follows.
  • Action field is defined as the table 15.
  • Category ID is assigned by the IEEE 802.11. This ID is called as "MAC Addr Lease Time”. The following explanation is based on the action frame.
  • the station(12) informs the access point(14) whether the lease time for some MAC address is changed through the EMID or AMID field.
  • the access point(14) transmits "MAC Addr Lease Time Action Frame" to the station(12) to inform the station(12) of the result of the lease time extension.
  • the lease time is the previous remained lease time + the lease time extension. If the access point(14) can extend the lease time without the station's request, this is applied by transmitting "MAC Addr Lease Time Action Frame" to the station(12).
  • Element or Action Management frame is included in the beacon, the probe request or the probe response to be exchanged between the stations or between the station and the access point, but the present invention is not limited thereof. They may be included in any types of frames or frames, messages to be transmitted. For example, they may be included in any frames used for the authentication, the association, or the presence related service.

Abstract

The present invention relates to communication method for wireless network and wireless network system which transfer the information of service provider and protect MAC address.

Description

Description
COMMUNICATION METHOD FOR WIRELESS NETWORK AND WIRELESS NETWORK SYSTEM
Technical Field
[1] The present invention relates to a communication method for a wireless network and a wireless network system which transfer the information of service providers and protect a MAC address.
Background Art [2] There are a lot of cases which need the information of service providers for a mobile terminal. There are a lot of method which acquire the information of service providers for the mobile terminal. [3] The wireless network also uses a MAC address for its communication. There need an more efficient usage of this MAC address.
Disclosure of Invention
Technical Solution [4] To one aspect, disclosed is a communication method its related method in wireless network comprising: processing an information of a service provider list using a specific function or algorithm, and transmitting a data comprising all or part of the processed information by a access point; and receiving the transmitted data from the access point, and processing the received data to decode the original information of the service provider list. [5] To another aspect, disclosed is a communication method and its related method in a wireless network comprising; transmitting the data comprising a request for a MAC address by a station; receiving the data comprising the request for the MAC address and transmitting to the station the other data comprising a random MAC address in accordance with the request for the MAC address by a access point; and transmitting a data comprising a real MAC address by the station.
Brief Description of the Drawings [6] FIGs. 1 to 3 are schematic diagrams of wireless network systems according to the embodiments of the present invention. [7] FIG. 4 is a flow chart illustrating connection procedure for the data transmission in wireless LAN system of FIG. 3. [8] FIG. 5 is a flow chart of the communication method in the wireless network according to another embodiment of the present invention. [9] FIG. 6 is a flow chart of the communication method in the wireless network according to further embodiment of the present invention. Mode for the Invention
[10] Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings.
[11] These embodiments of the present invention describe the wireless LAN system among wireless network systems by way of example. These embodiments of the present invention are equally or substantially equally applied to various available or permitted wireless network system aside from the wireless LAN system.
[12] In addition, terms and words used in embodiments of the present invention may be used with other terms and words in various wireless network systems. The present invention may comprise various wireless network systems with equivalence or similarity of the following embodiments in spite of a difference of terms and words.
[13]
[14] Wireless Network System
[15] FIGs. 1 to 3 are schematic diagrams of the wireless network systems according to the embodiments of the present invention. The same elements or components of FIGs. 1 to 3 use the same reference numbers respectively.
[16] Referring to FIG.3, the wireless network system, for example, a wireless LAN(IO) comprises a plurality of stations or terminals (12), an access point or wireless base station, or a backbone network or distribution system (16).
[17] A plurality of stations or terminals(12) are equipped with a Network Interface Card for the wireless LAN and perform an operation of physical layer and MAC layer based on an IEEE 802.11 standard. A plurality of stations(12) are connected with the access point(14) on air and exchange the data frame in the wireless network as shown in FIG.l.
[18] The access point(14) functions as a wire or wireless bridge which can relay the data frame from one station to other. The access point has the same function as the bride or the switch of Ethernet.
[19] In addition, because the access point(14) has the same physical layer and MAC layer as the above-described station(12), the access point(14) basically performs the same operation as the station(12). Therefore, it may be considered that the access point(14) is equal to the station(12) case by case.
[20] The distribution system(16) is a backbone network to connect a plurality of the access points(14). The ethernet may be generally used as the distribution system(16) and a plurality of various access points(14) are connected with each other, which is called a wireless distribution system. Broadly speaking, it is possible for the distribution system(16) to comprise a router or a switch connected with ethernet, or a plurality of servers connected with a wire or wireless internet network. [21] Referring to FIG.2, the wireless network system, for example, the wireless
LAN(IO), comprises a plurality of stations or terminals (12). In the wireless LAN(IO), the plurality of stations(12) are directly connected with each other. Therefore, there may be no the extra access point(14) and the distribution system(16) in the wireless LAN(IO) as shown in FIG.2 aside from FIG.l. The plurality of stations(12) may be substituted for access point(14) and the distribution system(16) as shown in FIG. 1. There may be omitted some of their functions in the wireless LAN(IO) as shown in FIG.2.
[22] The wireless LAN is described above referring to FIG.2, but the wireless network comprising the wireless LAN(IO) according to the embodiment of the present invention is not limited thereon. The wireless network according to the embodiment of the present invention may be implemented by their combination or complete different systems. The wireless network according to the embodiment of the present invention not only exists by itself, but also interworks with an other wireless network system, a mobile communication network or wired/wireless internet network and so on.
[23] For example, the wireless LAN system interworks with another disparate mobile communication network such as WCDMA(Wideband Code Division Multiple Access), which provides the roaming service for the terminal. In case the wireless LAN provides the voice service for the terminal for which both the wireless LAN and WCDMA is supported, the terminal makes a phone call using the WCDMA and automatically performs a seamless roaming operation with the wireless LAN in the area which is supported by the wireless LAN.
[24] Not only the wireless LAN as shown in FIG.l but also the wireless LAN as shown in FIG.2 need to associate the station(12) with the access point(14) or one station with other in order to exchange the data.
[25] Referring to FIG. 3, the wireless network system, for example, the wireless
LAN(IO) equal to the wireless network system as shown in FIG.l comprises a plurality of stations(12), the access point(14) and the distribution system(16). This wireless network system is connected to the wireless networks different from each other, for example, three wireless network(Network A, B, C). For example, these three wireless network(Network A, B, C) may be Subscription Service Provider Networks(SSPNs) different from each other. In other words, one of them may be a commercial network in which a RADIUS server was comprised, other of them may be web-based authentication network, and another of them may be VOIP(Voice Over IP) network.
[26] Therefore, a user or subscriber can use the networks (Network A, B, C) different from each other through only one access point(14) with one station(14).
[27]
[28] Connection Procedure [29] FIG. 4 is a flow chart illustrating connection procedure for the data transmission in the wireless LAN system of FIG.3. The wireless network systems of FIG.1 and FIG.2 and the above described various wireless network systems comprise the same or substantially same connection procedure as shown in FIG.4 in order to transmit the data. The more detailed explanation is abbreviated.
[30] Referring to FIGs. 3 and 4, the connection procedure(20) for transmitting the data between the station(12) and the access point(14) comprises a scanning(SlO), an authentication^^) and an association^ 14). Both the station(12) and the access point(14) apply to the data transmittion(S16) via the above procedure.
[31] The scanning(SlO) is a process to find or identify the access point(14) around using beacon or probe message.
[32] The scanning(SlO) comprises the passive scanning and the active scanning procedure. In the passive scanning procedure, the station(12) finds the access point(14) receiving the beacon message which the access point(14) broadcast periodically. In the active scanning procedure, the station(12) broadcasts the probe request message or frame for each channel and receives the probe response message or frame which reports their network parameter such as SSID(Service Set ID) and supported rates. Therefore the station(12) finds the access point(14) in the area.
[33] The beacon, the probe request and the probe response comprise the MAC header and the frame body respectively. For example, the MAC header and/or the frame body for the beacon message contains various capability information such as supported rates or encoding of the access point(14) and so on, and SSID(Service Set ID) which the access point belongs to.
[34] The frame body of the beacon, the probe request or the probe response may contain any Action Management frame or Information Element(IE) so as to take any specific action or operation, or exchange some information.
[35] The authentication^ 12) is the process that the station(12) establishes its identity to the appropriate(right) access point(14) which the station(12) attaches to in the scanning(SlO). In other words, the authentication^ 12) is the process that the station(12) negotiates the validation and the encryption with the access point(14). Because most of the stations(12) perform Open-system authentication, the access point(14) accepts the station(12) at face value without verifying its identity. There are IEEE 802. Ix based EAP-TLS, EAP-TTLS, EAP-FAST or PEAP and the like to bolster the authentication method.
[36] The association^ 14) is the process which the station(12) associates with the access point(14) to obtain full access to the wireless network(lθ), after the authentication has completed. After the association(14) completes, the access point(14) registers the station(12) on the wireless network(lθ) so frames for the station(12) are delivered to the access point(14). After the association^ 4) is completed, one station(12) may communicate with other station(12) through the access point(14).
[37] In the authentication^ 14), the station(12) sends an association request message or frame to the access point(14). The received access point(14) sends an association response message or frame which contains AID(association ID) to logically identify an other station.
[38] The station(12) and the access point(14) perform the data transmission^ 16) via the above procedures(S 10, S12, S14).
[39] A reassociation is almost the same as the association^ 14). The reassociation is the process of changing an association from an old access point to a new one. The station(12) monitors the quality of the signal it receives from the old access point. When the quality of the signal is weaken, the station(12) initiates the reassociation with an other access point.
[40]
[41] Network selection
[42] The station(12) may obtain access to the disparate networks through a single access point(14) as described above, referring to FIG.3.
[43] To one aspect, the invention allows any number of SSPNs(Subscription Service
Provider Networks) to be supported through a single access point. The invention specifies additional Information Elements(IEs) used in the beacon, the probe request and the probe response messages in order to provide information required by the station(12) as part of its network selection before the association^ 14).
[44] According to one of methods which allow any number of SSPNs to be supported through a single access point, if the station(12) has credentials for a number of different realms, then it may send multiple probe request messages, each of which queries something about each of the realms.
[45] Although the above-described domain, realm or service provider network(SSPN) are mentioned differently from each other in this specification, but it may be understood that they have the same or almost the same meaning or the related words or terms. On the other hand, although the service provider may be described as realm string, NAI(Network Access Identifier), roaming ID, SSPN ID, service provider ID, or ESSID and so on, but it may be understood that they have the same or almost the same meaning, or the related words or terms to be modified by the ordinary person in this art in this specification. They may be broadly described as service provider information, SSPN information or realm information in this specification.
[46] As an alternative, multiple NAIs(Network Access Identifiers) could be included in a single probe request and in the probe response, however, this could lead to unreasonably large probe messages. [47] Additional realm information could be made available in the probe response or the beacon, as part of the method described above.
[48] Since, as previously described, the full realm strings may be quite long, a hash of the string instead of the full realm string may be used.
[49] The need to reduce the amount of information in the messages particularly in the case of broadcast messages such as beacons creates a desire to use shorter hashes. Hash collisions (where two realms hash to the same value) are more likely to occur when shorter hashes are used. The effect of hash collisions is that the station(12) may believe a realm to be supported, when in fact the access point(14) does not support it but does support a different realm that is hashed to the same value.
[50] In this case, the station(12) may attempt to perform the authentication using credentials for the realm it mistakenly believes to be supported, but the authentication will fail. It is, however, desirable to reduce the probability of such collisions where possible by using longer hashes.
[51]
[52] Adaptive hash
[53] There may be a scheme using an adaptive hashing as one of schemes using hashing of realm strings.
[54] Therefore, an adaptive hashing scheme is used, to allow the access point(14) to use a number of different hash lengths. The length of hash chosen might depend on the number of realms being advertised, or how busy the network is particularly in the case of beacons.
[55] This scheme may manage all SSPN information which have roaming agreements in the Access Network(AN). As NAI of SSPN in this scheme gets longer, part of NAI of SSPN is hashed and the hashed result is contained in the beacon.
[56] The Access network(AN) is commonly called as BSS(Basic Service Set) or
ESS(Extended Service Set) and is a set of access points which a specific service provider manages. When the specific service provider supports the roaming service, the access points which belong to the AN include the information of service providers or SSPN.
[57] The AN may be described as a single access point or a set of access points which a specific service provider manages in this specification. The access point is used in case of some action or operation, or the subject for the network. The AN or Access Network is used in case of management for the network in this specification.
[58] When the information of SSPN accessable to the station(12), for example, the list of
SSPN ID, is included in the hashed list, the station(12) sends the probe request to the access point(14) so as to gain the credential or the service information.
[59] When the information of SSPN which the station would like to obtain access to is not included in the hashed list, the station(12) doesn't send the probe request so that the station(12) determines by itself that it can not be served from the AN.
[60] Even if the information of SSPN which the station(12) would like to obtain access to may be included in the hashed list, it may not make a roaming agreement with the AN due to the characteristic of the hash(hash collision). The length of the hashed list used in the beacon will be set to 1-4 octets and is indicated into the beacon frame so as to reduce the hash collision.
[61] In addition, when the complete set of the hashed list is not included in one beacon, an other unadvertised SSPN available' bit or an 'unadv' bit are setup in the beacon to give notice of what there is the information of the SSPN not included into the beacon. [62] In cases where the complete set of hashed list(realms) for the information of SSPN cannot be included in the message such as the beacon, an other unadvertised SSPNs available indicator is included in the message.
[63] In detail, a new Hashed Realms List IE is added, which can be used optionally in beacons and probe response messages. [64] Table 1
Figure imgf000009_0002
[65] The Element ID and the Length indicate the ID and the length of information element(IE). The Flags field indicates the Hashed Length as described in the table 2, etc. The final Information field includes the sequence of the hashed realms.
[66] Table 2
BO B1 B2 B3 B4 B5 B6 B7 BS
Figure imgf000009_0001
[67] As described in the table 2, initially, three flag bits are defined in the Flags field: Bits BO and Bl indicate the hash length that is being used( 00 = 1 octet, 01 = 2 octets, 10 = 3 octets, 11 = 4 octets). B2 indicates whether additional realms are available that are not included in the list of hashed realms in this IE.
[68] The reason to give notice of the SSPN list through the beacon is that the stations(12) wishing to connect to SSPN unavailable for the roaming prevent the unnecessary probe request from sending.
[69] When the B2 of the Flags field in the table 2 is set to 'Unadv' bit, the station(12) determines that the access point(14) may provide the SSPN wishing to be connected for the station(12), although the hashed value of SSPN wishing to be connected is not included in the hashed list. In this case, as all stations(12) send the probe request, the meaning to send the beacon comes to disappear. Therefore, when the beacon is sent, a list of all SSPN which support the roaming services in the AN(or AP) must be sent.
[70] As the hashed list becomes longer in this case, so there increases the possibility that the station(12) which is not supported in AN sends the probe request due to the hash collision.
[71]
[72] Hashed list diversity
[73] A method for selecting a network according to another embodiment of the present invention relates not to send all the same beacon in which the hashed roaming list is included, but to send the beacon or the probe response frameincluding the different hashed roaming list which is generated from the hash function with the different hash key value. Therefore, this method supports the diverse beacon.
[74] A new Hashed Realms List IE is added, which can be used optionally in beacons and probe response messages as shown in the table 3.
[75] Table 3
Length Hash Hashed
ID Hash key ibtyesj Lengthf ibi
[76] The Element ID and the Length indicate the ID and the length of information element(IE). The Hash length(lb) indicates the length of the result value hashed by the hash function. The Hash key indicates the hash key value used for the diversity of the hashed result. The Hashed list is the hashed result of the roaming list hashed by the hash function.
[77] As this occurs, the station(12) can receive the different hashed lists from the plurality of the access point(14) as shown in FIG.3. The station(12) can finally get the correct roaming list through the information from the plurality of the beacons such as the different hashed lists from the plurality of the access point(14).
[78]
[79] Hashed list truncation
[80] A method for selecting a network according to another embodiment of the present invention relates to what the truncated locations of the hashed result value are different, even if every access point(14) uses the same hash key for the hash function.
[81] For example, when the length of the hashed result value is 4bytes and the length of the hashed information wishing to send is lbyte, the first access point(APl) sends the first lbyte among the 4bytes hashed result value and the second(AP2) sends the second lbyte among them, so that each of the access points sends the hashed lists different from each other. Therefore, while each of the access points(14) don't send the hash key different from each other, each of the access points(14) can send the different hashed list, without the complexity of the computation.
[82] A new Hashed Realms List IE is added, which can be used optionally in beacons and probe response messages as shown in the table 4.
[83] Table 4
Figure imgf000011_0001
[84] Bits BO and B 1 in the Hash length field indicate the hash length that is being used:
00 = 1 octet, 01 = 2 octets, 10 = 3 octets, 11 = 4 octets. Bits B2 and B3 in the Hash length field indicate the location of the truncation.
[85] B4 in the Hash length field indicates whether additional realms are available that are not included in the list of hashed realms in this IE.
[86]
[87] Providing service provider ID no supported using NAK
[88] A method for selecting a network according to another embodiment of the present invention relates to transmit the list of the service provider ID which is frequently requested, but is not supported.
[89] In other words, if many stations(12) in the AN frequently broadcasts the probe request including the information of SSPN such as the service provider IDs without the roaming agreement, it leads to waste resources of the network.
[90] The AN manages the frequency of the service provider ID to which the stations (14) request the connection. The access points(14) belonging to the AN use this information such as the frequency of the requested service provider ID. The AN can give notice of the list of the service provider ID which is frequently requested, but is not supported through the beacon or the probe request as shown in the table 5. The stations(12) don't request the connection to the service provider ID.
[91] Table 5
Unsupported service provider
ID Length ID Iist
[92] Referring to the table 5, the Element ID and the Length indicate the ID and the length of information element(IE). The Unsupported service provider ID list indicates the list of the service provider ID which is frequently requested, but is not supported. [94] Grouping of information [95] A method for selecting a network according to another embodiment of the present invention relates to what after the information is grouped and then sent, the grouped information element is combined to be an original information.
[96] An information element including the total number of the grouped frames and the current number of a particular frames is included in the beacon, the probe request or the probe response and the like to be sent, as shown in the table 6. That combines the previous information with the present to make one information.
[97] Table 6
Figure imgf000012_0001
[98] Referring to the table 6, the Element ID and the Length indicate the ID and the length of information element(IE). The total number(Total #) indicates the total number of the grouped frame such as the beacon. The current number(Current #) indicates the turn of the particular grouped frame such as the beacon.
[99] The grouping of the IE information may apply to the probe request or the probe response. It is possible to combine the information received from the access points(14) different from each other inside the same ESS.
[100] [101] Type field [102] A method for selecting a network according to another embodiment of the present invention relates to what receives the type indicating the service domain and whether it supports roaming to confirm the accessibility to the network.
[103] We can remove to transmit a heavy beacon or probe response frame containing the hashed realm list by classifying 802.11 AN based on the policy of 802.11 AN. [104] Table 7
Type
Element ID length Inform atiσn (1 octet!
TBD Type Additional subfield
[105] It can be classified based on two parameters: service domain and support of roaming as shown in the table 7. These 802.11 AN classification parameters are able to add newly using reserved bits at Type subfield. The first parameter, service domain, is distributed into "O(local)" and "l(global)". Local means that the station(12) cannot connect to servers at the other network domain and only get local domain network services. On the contrary, the station(12) is able to communicate with any correspondent nodes wherever correspondent nodes locate.
[106] The second parameter indicates whether the roaming is supported or not. [107] Additional subfield is used to advertise which SSPNs can support to access 802. HAN. [108] The table 8 indicates the service domain, the support of roaming and the combination of the additional subfields. [109] Table 8
Figure imgf000013_0001
[HO] The case 1 and 3 show only the local domain realm in the additional subfield. Because the case 1 is limited to the "Local" service domain and the case 3 doesn't support other SSPNs and roaming. The case 4 may be not existed, and the case 4 includes the supporting roaming lists in the additional subfield in case of supporting other SSPNs and roaming. The additional subfield may include several hashed roaming list as described above, and may include the not-hashed roaming list.
[111] These two bits or more are able to decrease sending the unnecessary probe request/ response because the station(12) does not try to confirm whether or not SSPNs can supply access to 802.11 AN.
[112] If the station(12) locates Case 1, Case 2, Case 3 network, the station(12) only receives the beacon frame and knows whether the station(12) can obtain access to that 802.11 AN through two bits and additional subfield.
[113] [114] Service provider grouping [115] A method for selecting a network according to another embodiment of the present invention relates to what transmits the grouping information of the roaming service provider.
[116] As service providers share 802.11 AN by using virtual AP, service providers may have a lot of roaming agreement, and these roamed service providers may form a group with a globally unique name for business. The good example for grouping of service providers is an airline alliance: Sky Team alliance, Star alliance, Oneworld alliance, etc.
[117] For reducing load of the beacon with heavy hashed realm list, the beacon frame or the probe request can include Service provider Group of unique name instead of realm list.
[118] Table 9
Figure imgf000014_0001
[119] Referring to the table 9, the Element ID and the Length indicate the ID and the length of Information Element(IE). [120] If a service provider makes the roaming agreement with the other service provider which does not belongs to any groups, the first bit of flags is set " 1 " . [121] When a service provider is a member of several service provider groups, subfield information should consist of sequence of group IDs. [122]
[123] Non-loss compression
[124] The passive and the active method may be used to give notice of the list of SSPNs provided by the access point(14) to the station(12). The passive method is that the station(12) receives the beacon periodically sent by the access point(14), and knows the list of SSPNs included in the beacon. [125] As described above, the active method is that the station(12) requests the service provider list to the access point(14) through the probe request, and the access point(14) sends the list of SSPNs to the station(12) through the probe response. [126] There can be a problem at the scalability to send the list in itself through the beacon or the probe response by means of indicating each service provider(SSPN), for example Realm, NAI, Roaming ID or ESSID, especially when there are a lot of the service provider(SSPN). [127] As described above, although there may be a method to reduce the size of the service provider list using the hash function, the hash function lead to a hash collision.
In other words, even if the hash function is H(x) and the inputs xl and x2 are not equal, there may occur the same results H(xl) and H(x2) from the hash function. [128] A method for selecting a network according to another embodiment of the present invention relates to what uses not- loss compression and compaction of the service provider list. [129] The Information Element(IE) defined by the method for selecting a network according to another embodiment of the present invention may be applied to the beacon and the probe response. It may be applied to the action management frame by a similar method. [130] The commercial wireless LAN appliance includes the non-loss compression feature to compress the data without lowering its quality. The problem of the compression is what needs the decoding time to decompress the compressed data. [131] However, because the service provider list is requested in the network selection step, the constraint to the decoding time for the station(12) is very low. Because the compression rate of most compression algorithms is high, the constraint to the decoding time for the station(12) is lower.
[132] The compaction simplifies the decoding process and have advantages to reduce the list size of SSPNs, compared to the compression.
[133] Each access point(14) has the following MIB (Management Information Base) value for the above method: Dotl lCompressionThreshold, Dotl lCompressionGainThreshold.
[134] "Dotl ICompressionThreshold" is the integer in the unit byte(s). It may not compress the list of which the size is bigger than the "Dotl ICompressionThreshold". "Dotl lCompressionGainThreshold" is equal to or more than "0", and less than or equal to " 1". If the compression efficiency, which is equal to "the size of the compressed list'V'the size of the original list", would be more than the "Dotl lCompressionGainThreshold", the original list is compressed and sent.
[135] There are many type of compression algorithms that may be used. For example, the compression algorithms used may be non-loss compression algorithms including one of ITU-T V.42bis(LZW), ITU-T V.44(LZJH), ANSI X3.241(LZS).
[136] On the other hand, the present invention can use the new compaction process that is not used previously. The Information Element(IE) which is loaded in the beacon and the probe response may be defined as the table 10.
[137] Table 10
Compress or Canπpressed
ID Lεnαth Algorithm SSPN list
[138] The ID as shown in the table 10 is allocated to Information Element ID (Information
Element ID) based on IEEE 802.11. The Length indicates the total size(octets) of the IE. The Compression Algorithm indicates the not-loss compression algorithm that is used for the compression of the SSPN list. The list of compressed SSPN is the list compressed by the compression algorithm.
[139] After a list of compressed SSPN becomes a string, it is compressed and decoded. If
SSPN = {SSPN1ID, SSPN2ID,...,SSPNnID} (SSPNkID = ID of the k"1 SSPN), the string of the list of SSPN is generated using delimiter to divide each SSPN ID. A list of generated compression SSPN becomes SSPNlID + {Delimiter} + SSPN2ID +
{Delimiter} + + {SSPNnID}. The delimiter may use the proper value according to the method to express the SSPN ID. If the SSPN ID expresses as NAI realm, there is used the special character(e.g. '_', '/') that is not used as NAI realm.
[140] For example, when the supporting SSPN realm is lge.com, lginnotek.com, the string of "lg.org, lge.com_lginnotek.com_lg.org" is composed and the compressed string becomes the value of the list of SSPNs. When the station(12) decodes it, it looks for the delimiter and recognizes the SSPN realm.
[141]
[142] MAC address anonymity
[143] Stations(12) are required to use their actual MAC address for communication with the access point(14).
[144] Within the local network, the station(12) is not required to use its MAC address as identifier. At the ESS(Extended Service Set, the set of BSSs connected with each other through one backbone) level, the station(12) uses an arbitrary MAC address: EMID "ESS MAC Identifier". At the BSS(Basic Service Set, the set of station connected with each other) level, the station(12) uses an arbitrary MAC address: AMID "AP MAC Identifier".
[145] In other words, while each station(12) such as communication device uses one fixed
MAC address, the above-described EMID and AMID instead of the fixed MAC address is dynamically allocated to supply MAC address anonymity.
[146] AMID is exposed into only BSS. Only AMID is shown for the transmitted packet on air. After the station(12) generates the trial AMID, the probe request including the generated AMID value is transmitted to the access point(14). If AMID is unique in BSS which the access point(14) composes of, the access point(14) can send the probe response to confirm the validation of AMID. Either the new EMID or the previous EMID is sent to the station(12).
[147] If AMID which the station(12) send is being used, the access point(14) does not reply anymore. EMID is ensured through 4- way handshake (defined by IEEE 802.1 Ii) for RSN(Robust Security Network) later. As AMID and EMID have the lease time, they are expired after the lease time.
[148] According to this method, EMID should be allocated through the EMID server which is not existing previously.
[149] The above-described method to protect a MAC address such as EMID has the following problems basically. (I)As EMID is uniquely allocated in ESS, it is not necessary for AMID separately. (2) There needs the new architecture such as the EMID server. (3)The requirement to use the real MAC address for other organization such as 3GPP is not satisfied.
[150] 3GPP requests the use of real MAC address so as to define the number of connection according to the subscription of a user. The number of connection may be calculated as the number of MAC address used at the same time according to the specific subscription. Some problems from the above-described method may occur because of possibility of using the same EMID for other ESSs.
[151] The present invention provides the communication method for the wireless network to solve the above-described problem.
[152]
[153] Dynamic address only for BSS
[154] MAC address anonymity makes an identity of the station(12) not presumed through the MAC address. The transmitted packet on air uses an arbitrary MAC address ('Dynamic MAC address') which is dynamically allocated. Because it is not necessary to protect the MAC address of the access point(14), the access point(14) may use its real MAC address in itself.
[155] A method for selecting a network according to another embodiment of the present invention relates to what protects the real MAC address of the station(12) using the arbitrary MAC address and communicates between the access point(14) and the station(12).
[156] Referring to FIG.5, the station(12) transmits the data including the MAC address request such as the probe request( 'Dynamic MAC address request') to the access points(14). After then, the access points(14) receive the dynamic MAC address request from the station(12), and transmit other data including the arbitrary MAC address such as the probe response('dynamic MAC address request') to the station(12) in responsive to the MAC address request of the station(12).
[157] After the station(12) is connected with the access point(12), it transmit its real MAC address to the the access point(14) through the secure method. One action management frame can be considered as a method to support this. Or other management frame is newly defined for use. The method to securely transmit the frame(STA_Real_MAC_Address) including the real MAC address from the station(12) to the access point(14) is described as follows.
[158] The access point(14) sends Public key(pub) to the station(12). As an transmission method, the Information Element(IE) including the public key may be broadcasted by the beacon. Instead of sending a real MAC address for the station(12), the station(12) may send to the access point(14) encryption "c = encrypt (Real MAC Address, pub)" encrypted by the Public key (pub) which is sent by the access point(14). The Real MAC address in the action management frame becomes "c". The access point(14) decrypts the Real MAC address with the private key(priv).
[159] The action management frame in which the station(12) transmits the real MAC address to the access point(14) may be the following table 11.
[160] Table 11
Figure imgf000017_0001
[161] The category in the table 11 indicates protection of MAC address. The reserved action value for the action field is newly defined and is used in the action field. Another information field includes the real MAC address of the station(12).
[162] The access point(14) has a map between the real MAC address and the dynamic
MAC address. The packet from/to the station(12) via the layer 2 access point(14) is routed using the real MAC address. When the access point(14) requests an authentication to the authentication server, it uses the securely transmitted real MAC address of the station(12).
[163]
[164] EMID management method allocating a MAC address block
[165] In case of EMID/ AMID, since an EMID server manages all EMIDs in ESS, the
EMID server needs to manage more MAC addresses according to the bigger region of ESS.
[166] For this reason, the EMID server does not manage all EMIDs in ESS, but the access point(14) locally manages all EMIDs in BSS. The EMID server allocates the range of EMIDs to the access point(14) in ESS. The access point(14) allocates some EMIDs among the allocated EMIDs from the EMID server to the station(12) which belongs to one's BSS.
[167] The EMID server can allocate the range of EMIDs to the access point(14) in ESS using the concept of subnet mask of IP(internet protocol). In this case, the routing for the layer 2 bridge level became to be easy. When the station(12) moves one ESS to other, the new access point(14) allocates the new EMID to the station(12). Without this restriction requirement, the new access point(14) ascertains whether it is possible to use the EMID which the station(12) requests to the old access point(14) and receives information on the lease time, if the station(12) requests that the new access point(14) wants to use the previously used EMID.
[168] This another embodiment defines APMEu and ESME as shown in FIG.6. APMEu, which is AP Management Entity for IEEE 802.1 Iu, is the entity for AP management. ESME, which is ESS Server Management Entity, is the entity for ESS server management.
[169] APMEu sends MAC_address_range.request to ESME. When the access point(14) is connected to the ESS server through the ethernet, it can be transmitted by the IP packet. MAC_address_range.request may be defined as follows.
[170] MAC_address_range.request
[171] {
[172] Range_Size
[173] }
[174]
[175] The Range_Size indicates the size of MAC address block, which is interpreted as the same as the size of the subnet of IP address. If the Range_Size is n, the MAC address block with the size of 2° is requested, the detailed example of
MAC_address_range.request is the same as follows. [176] MAC_address_range_request
[177] {
[178] 4 // request of the MAC address block with the size of 2n(=16).
[179] }
[180] [181] The ESME allocates an EMID to the APMEu such as the access point(14) through
MAC_address_range.confirm. The access point(14) allocates the EMID block which may be used in one's ESS. MAC_address_range.confirm is defined as follows. [182] MAC_address_range.confirm
[183] {
[ 184] EMID_AP, // EMID which is allocated to AP.
[185] Range_Mask // the value equal to or less than the requested Range_Size. if it is allocated to zero, the allocation fails. [186] }
[187]
[188] The detailed example of MAC_address_range.confirm is the same as follows.
[189] MAC_address_range.confirm
[190] {
[191] AB-CD-EF-00-11-CA,
[192] // Bit 47 = 0, Bit 46 = 1
[193] FF-FF-FF-FF-FF-CO
[194] // 4 bit range except for the last 2 bit is allocated. (COh = 1100 0010b)
[195] }
[196] [197] The table 12 is the definition of the MAC address. For example, Bit 47 and Bit 46 follows the definition of original MAC address for indicating that it is an individual & locally administered address. [198] Table 12
Figure imgf000020_0001
US Q it atldruϊH Q — g lo-bβ lly nd irtiπ
Figure imgf000020_0003
ø -ςt-d ΓH us
Figure imgf000020_0002
1— local Iy aAnirti&t&red address j O— individua l address
: 1 — group aderes^
[199]
[200] Distributed EMID block management method
[201] The communication method in wireless network according to another embodiment of the present invention may support the EMID function only by installing 802.1 Iu AP.
[202] There needs a method to prevent an EMID conflict between a plurality of access points (14) for EMID management by a distributed method. This another embodiment provides this method to prevent the EMID conflict between them.
[203] Each access point(14) allocates an EMID to the station(12) inside one's BSS. The size of the EMID block which the access point(14) can allocate to the station(12) is fixed at the reasonable value. For example, it has very low possibility for the number of the stations(12) to be greater than 256 in 256/BSS. One access point(14) broadcasts/ mutlicasts an EMID and the range of EMID which wishing to use to the other access points(14) inside one's ESS. An MAC address which is used in order to request [EMID. request], [MAC_Addr_for_request], is separately allocated. [MAC_Addr_for_request] uses the random value within the predetermined range. If the requested EMID and EMID block from one access point(14) is being used, the other access point(14) which is using them sends the response. Without receiving the response after the EMID .request is sent, it is thought that this EMID is not used. In this case, the other access point(14) informs one access point(14) of using this EMID by itself.
[204] EMID.request is defined as follows.
[205] EMID.request
[206] {
[207] MAC_Addr_for_request // MAC address which is used for request, selected from the MAC address pool for reqeust.
[208] requested_EMID // requesting EMID block
[209] } [210] EMID. confirm is defined as follows. [211] EMID. confirm [212] { [213] requested_EMID , [214] Is_Conflict // True [215] } [216] [217] Lease time negotiation [218] According to current EMID/ AMID technology, the valid lease time for EMID and AMID is allocated.
[219] The communication method in wireless network according to another embodiment of the present invention relates to negotiate a lease time for the station(12). The station(12) can request a lease time which it wishes to get. The lease time which the station(12) wishes to get is also assigned to it. The station(12) may request a lease time extension at an impending time before the expiration of the lease time. The station(12) transmits one's generating AMID and EMID to the access point(14) at the time of request for the initial address. AMID/EMID is transmitted by the method to transmit the probe request with IE(Information Element) including AMID and EMID.
[220] In another embodiment, the IE used for requesting AMID/EMID is modified as the table 13 to request the lease time. The access point(14) allocates the lease time to the station(12) within the requested lease time.
[221] Table 13
Requested Lease Requested Lease
ID Leπgili AI.H) EHID
Time i Λ.IID I Time jQ.lt i
[222] The access point(14) informs the station(14) of both the validity of the requested AMID, EMID value and the lease time which may be allocated. The EMID value may be either the confirmation for the requesting value of the station(12) or the newly allocated value. They may be transmitted by the probe response with the IE for allocating AMID/EMID as described in the table 14. It makes the condition, Allocated Lease Time < requested Lease Time, satisfied.
[223] Table 14
AMID Allocated Lease Allocated Lease
JD Length EI -ID Lisabϊlt/ Time (AI-IIDi Time (EMID]
[224] Before the lease time allocated to the station(12) is expired, the station(12) may request the lease time extension. The access point may also extend the lease time allocated to the station(12) as needed. It may be requested through the action management frame or management frame which can be defined as follows. In case of using the action management frame, Action field is defined as the table 15. Category ID is assigned by the IEEE 802.11. This ID is called as "MAC Addr Lease Time". The following explanation is based on the action frame. [225] Table 15
Action Ctønsr EMID or Lease Time
Category Action
■:=STAcrAPι A[JID Extension
[226] One example of the Action Management frame in the table 15 is the same as follows.
[227] When the station(12) requests the lease time extension, the station(12) transmits to the access point(14) "MAC Addr Lease Time Action Frame" which indicates that Action Owner = STA, and Lease Time Extension = requested lease time extension. The station(12) informs the access point(14) whether the lease time for some MAC address is changed through the EMID or AMID field. The access point(14) transmits "MAC Addr Lease Time Action Frame" to the station(12) to inform the station(12) of the result of the lease time extension.
[228] The field of Action frame which the access point(14) sends to the station(12) indicates that Action Owner = AP, and Lease Time Extension is the assigned lease time additionally assigned to the currently remaining lease time. After the access point(14) transmits "MAC Addr Lease Time action frame", the lease time is the previous remained lease time + the lease time extension. If the access point(14) can extend the lease time without the station's request, this is applied by transmitting "MAC Addr Lease Time Action Frame" to the station(12).
[229] Although the example embodiments of the present invention have been described with reference to the Figures, the present invention is not limited to the examples disclosed in the Figures.
[230] Although the above-described embodiment is described that IEEE 801.11, IEEE
8OLl Ii and IEEE 801. Hu standard and the like are used, but the present invention is not limited to these standards.
[231] Although the above-described embodiment is described that each IE(Information
Element) or Action Management frame is included in the beacon, the probe request or the probe response to be exchanged between the stations or between the station and the access point, but the present invention is not limited thereof. They may be included in any types of frames or frames, messages to be transmitted. For example, they may be included in any frames used for the authentication, the association, or the presence related service.
[232] This application claims benefit of U.S. Provisional patent Application (I)No.
60/763,031 filed in U.S. on Jan 27, 2006, (2) No. 60/764,458 filed in U.S. on Feb 01, 2006, (3)No. 60/765,471 filed in U.S. on Feb 03, 2006, (4) No. 60/771,225 filed in U.S. on Feb 07, 2006, (5) No. 60/772,474 filed in U.S. on Feb 10, 2006, (6) No. 60/774,252 filed in U.S. on Feb 15, 2006, (7) No. 60/ 774,284 filed in U.S. on Feb 16, 2006, (8) No. 60/779,755 filed in U.S. on Mar 06, 2006, which are hereby incorporated herein by reference.

Claims

Claims
[1] A communication method in wireless network comprising: processing an information of a service provider list using a specific function or algorithm, and transmitting a data comprising all or part of the processed information by a access point; and receiving the transmitted data from the access point, and processing the received data to decode the original information of the service provider list.
[2] The communication method of claim 1, wherein the specific function is a hash function, the access point processes the information of the service provider list using the hash function, and the data further comprises the hash key used by the hash function along with all of the processed service provider list.
[3] The communication method of claim 1, wherein the specific function is a hash function, and if the access point transmits the data comprising part of the processed information, the data further comprises the location at which part of the processed information is located
[4] The communication method of claim 1, wherein the specific algorithm is a compression algorithm, and the data comprises the used compression algorithm information for processing.
[5] The communication method of one of claims 1 to 4, wherein the transmitted data is one of a beacon or a probe response.
[6] A communication method of a access point in wireless network comprising: processing an information of a service provider list using a specific function or algorithm; and transmitting the data comprising all or part of the processed information.
[7] The communication method of the access point of claim 6, wherein the specific function is a hash function, the access point processes the information of the service provider list using the hash function, and the data further comprises the hash key used by the hash function together with all of the processed service provider list.
[8] The communication method of the access point of claim 6, wherein the specific function is a hash function, and if the access point transmits the data comprising part of the processed information, the data further comprises the location at which part of the processed information is located.
[9] The communication method of the access point of claim 6, wherein the specific algorithm is a compression algorithm, and the data comprises the used compression algorithm information for processing.
[10] The communication method of the access point of one of claims 6 to 9, wherein the transmitted data is one of a beacon or a probe response.
[11] A station for a wireless network system comprising; receiving the data comprising all or part of the information of a service provider list, which is processed using a specific function or algorithm and is transmitted from the access point, and processing the received data to decode the original information of the service provider list.
[12] A station for the wireless network system of claim 11, wherein the specific function is a hash function, the information of the service provider list is processed using the hash function, and the received data further comprises the hash key used by the hash function along with all of the processed service provider list.
[13] A station for the wireless network system of claim 11, wherein the specific function is a hash function, and if the received data comprises part of the processed information, the data further comprises the location at which part of the processed information is located
[14] A station for the wireless network system of claim 11, wherein the specific algorithm is a compression algorithm, and the data comprises the used compression algorithm information for processing.
[15] A station for the wireless network system of claims 11 to 14, wherein the transmitted data is one of a beacon or a probe response.
[16] A communication method in a wireless network comprising; transmitting the data comprising an information on a provider for which a access point is not supported; and receiving the transmitted data from the access point to a station, and the station performing a specific function or operation using the information included in the data or not.
[17] The communication method of claim 16, wherein the data is one of a beacon or a probe response.
[18] A communication method of a access point in wireless network comprising; comprising an information on a provider for which the access point is not supported into a specific data; and transmitting the specific data comprising an information on a provider for which a access point is not supported through the wireless network.
[19] The communication method of a access point in wireless network of claim 18, wherein the specific data is one of a beacon or a probe response.
[20] A station of a wireless network system comprising; receiving from a access point the specific data comprising an information on a provider for which a access point is not supported; and performing a specific function or operation using the information included in the data or not.
[21] The station of the wireless network system of claim 20, wherein the specific data is one of a beacon or a probe response.
[22] The station of the wireless network system of claim 20, wherein performing a specific function or operation using the information included in the data or not is not requesting a connection with the provider not supported by the access point.
[23] A communication method in wireless network comprising; transmitting a data comprising the total number of grouped information and one's turn among total information through the wireless network by a access point; and receiving the transmitted data from the access point to the station and combining a specific information using the received data.
[24] The communication method of claim 23, wherein the data is one of a beacon or a probe response.
[25] A communication method of a access point in wireless network comprising; grouping the specific information; and transmitting a data comprising the total number of grouped information and one's turn among total information through the wireless network.
[26] The communication method of claim 25, wherein the data is one of a beacon or a probe response.
[27] A station of a wireless network system comprising; receiving from a access point a data comprising the total number of grouped information and one's turn among total information through the wireless network; and combining a specific information using the received data.
[28] The station of claim 27, wherein the data is one of a beacon or a probe response.
[29] A communication method in wireless network comprising; transmitting a data comprising one's network classification through the wireless network by a access point; and receiving the transmitted data from the access point to the station and performing specific function or operation using the network classification of the access point included in the data or not.
[30] The communication method of claim 25, wherein the type field with the network classification of the access point further comprises one of a service domain of the access point or a support for a roaming service.
[31] A wireless network system comprising; a access point transmitting a data comprising one's network classification through the wireless network by a access point; and a station receiving the transmitted data from the access point and performing specific function or operation using the network classification of the access point included in the data or not.
[32] A station of a wireless network system comprising; receiving the transmitted data from the access point and performing specific function or operation using the network classification of the access point included in the data or not.
[33] A communication method in wireless network comprising; transmitting a data comprising the group information that a access point belongs to through the wireless network by the access point ; and receiving the transmitted data from the access point and using the group information of the access point or not by a station .
[34] A wireless network system comprising; a access point transmitting a data comprising the group information that oneself belongs to through the wireless network; and a station receiving the transmitted data from the access point and using the group information of the access point or not.
[35] A communication method in a wireless network comprising; transmitting the data comprising a request for a MAC address by a station; receiving the data comprising the request for the MAC address and transmitting to the station the other data comprising a random MAC address in accordance with the request for the MAC address by a access point; and transmitting a data comprising a real MAC address by the station.
[36] The communication method of claim 35, wherein the data comprising the real
MAC address is a action management frame.
[37] The communication method of claim 36, wherein the real MAC address comprised in the action management frame is ciphered.
[38] A communication method in a wireless network comprising; allocating to station a random MAC address within a assigned range instead of a real MAC address of the station by a access point; and communicating with the access point using the random MAC address by the station.
[39] A communication method of a access point in a wireless network comprising; being assigned from a specific server a random MAC address which a station uses within a predetermined range; and assigning the random MAC address to the specific station instead of a real MAC address of the station within the assigned range.
[40] A communication method of a station in a wireless network comprising; being assigned a random MAC address instead of a real MAC address of the station from a access point within the assigned range; and communicating with the access point using the random MAC address.
[41] An access point in a wireless network comprising; being assigned from a specific server a random MAC address which a station uses within a predetermined range; and assigning the random MAC address to the specific station instead of a real MAC address of the station within the assigned range.
[42] A station in a wireless network comprising; being assigned a random MAC address instead of a real MAC address of the station from a access point within the assigned range; and communicating with the access point using the random MAC address.
[43] A communication method in wireless network comprising; transmitting the data comprising a random MAC address which oneself uses, and the range for another random MAC addresses which oneself can assign, by one of two or more access points; receiving the data and, transmitting to the access point a response on the data, by other of two or more access points, if at least one of the random MAC address and the range for another random MAC addresses is used; and receiving or not the response within a predetermined interval, and using the random MAC address without receiving the response, by the former station.
[44] The communication method of claim 43, further comprising; informing the usage of the random MAC address and the usable range, by the access point.
[45] An wireless network system comprising; one access point transmitting the data comprising a random MAC address which oneself uses and the range for another random MAC addresses which oneself can assign, and receiving or not the response within a predetermined interval, and using the random MAC address without receiving the response; and the other access point receiving the data, and transmitting to the access point a response on the data, by other of two or more access points, if at least one of the random MAC address and the range for another random MAC addresses is used; and
[46] The wireless network system of claim 45, wherein one access point informs the usage of the random MAC address and the usable range, by the access point. [47] A communication method in wireless network comprising; transmitting to a specific station the data comprising a random MAC address and the lease time of the station, by a access point; and receiving the transmitted data from the access point, and communicating with the access point using the random MAC address before the lease time expiration. [48] The communication method of claim 47, further comprising; requesting the extension for the lease time. [49] The communication method of claim 48, wherein the requesting of the extension for the lease time is included in a action management frame. [50] A communication method of an access point in wireless network comprising; transmitting to a specific station the data comprising a random MAC address and the lease time of the station; and communicating with the station using the random MAC address before the lease time expiration. [51] The communication method of claim 50, further comprising; requesting the extension for the lease time. [52] The communication method of claim 51, wherein the requesting of the extension for the lease time is included in a action management frame. [53] A station of a wireless network system comprising; receiving from a access point the data comprising a random MAC address and the lease time of a specific station; and communicating with the access point using the random MAC address before the lease time expiration. [54] The station of claim 53, wherein the station further requests to the access point the extension for the lease time. [55] The station of claim 53, wherein the requesting of the extension for the lease time is included in a action management frame.
PCT/KR2007/000477 2006-01-27 2007-01-26 Communication method for wireless network and wireless network system WO2007086705A1 (en)

Applications Claiming Priority (16)

Application Number Priority Date Filing Date Title
US76303106P 2006-01-27 2006-01-27
US60/763,031 2006-01-27
US76445806P 2006-02-01 2006-02-01
US60/764,458 2006-02-01
US76547106P 2006-02-03 2006-02-03
US60/765,471 2006-02-03
US77122506P 2006-02-07 2006-02-07
US60/771,225 2006-02-07
US77247406P 2006-02-10 2006-02-10
US60/772,474 2006-02-10
US77425206P 2006-02-15 2006-02-15
US60/774,252 2006-02-15
US77428406P 2006-02-16 2006-02-16
US60/774,284 2006-02-16
US77975506P 2006-03-06 2006-03-06
US60/779,755 2006-03-06

Publications (1)

Publication Number Publication Date
WO2007086705A1 true WO2007086705A1 (en) 2007-08-02

Family

ID=38309444

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2007/000477 WO2007086705A1 (en) 2006-01-27 2007-01-26 Communication method for wireless network and wireless network system

Country Status (1)

Country Link
WO (1) WO2007086705A1 (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009134288A1 (en) 2008-04-30 2009-11-05 Nortel Networks Limited Advertising support for a plurality of service networks by a wireless access point
EP2166799A1 (en) * 2008-09-19 2010-03-24 NTT DoCoMo, Inc. Method and apparatus for implementing a virtual network
WO2013009776A3 (en) * 2011-07-10 2013-03-21 Qualcomm Incorporated Systems, methods and apparatuses for low-overhead wireless beacon timing
WO2013009771A3 (en) * 2011-07-10 2013-05-10 Qualcomm Incorporated Systems and methods for low-overhead wireless beacons having compressed network identifiers
WO2013086033A1 (en) * 2011-12-05 2013-06-13 Qualcomm Incorporated Systems and methods for low overhead paging
US9232473B2 (en) 2011-07-10 2016-01-05 Qualcomm Incorporated Systems and methods for low-overhead wireless beacon timing
US9253808B2 (en) 2011-07-10 2016-02-02 Qualcomm Incorporated Systems and methods for low-overhead wireless beacons having next full beacon indications
WO2016149005A1 (en) * 2015-03-13 2016-09-22 Intel IP Corporation Systems and methods to enable network coordinated mac randomization for wi-fi privacy
US9538552B2 (en) 2012-03-30 2017-01-03 Lg Electronics Inc. Method and apparatus for transceiving beacon in wireless LAN system
US9560630B2 (en) 2011-08-12 2017-01-31 Qualcomm Incorporated Devices for reduced overhead paging
US9560632B2 (en) 2011-08-12 2017-01-31 Qualcomm Incorporated Devices for title of invention reduced overhead paging
WO2017026930A1 (en) * 2015-08-11 2017-02-16 Telefonaktiebolaget Lm Ericsson (Publ) Methods and devices for privacy enhancement in networks
EP3499936A4 (en) * 2016-08-31 2019-06-19 Huawei Technologies Co., Ltd. Method for establishing association in wireless local area network, terminal and access point
CN110650220A (en) * 2019-09-11 2020-01-03 珠海格力电器股份有限公司 MAC address acquisition method and detection device
US20210266735A1 (en) * 2018-06-29 2021-08-26 Nokia Technologies Oy Methods, device and computer-readable medium for protecting mac addresses

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030007464A1 (en) * 2001-06-25 2003-01-09 Balani Ram Jethanand Method and device for effecting venue specific wireless communication
US20050060319A1 (en) * 2002-08-02 2005-03-17 Cisco Technology, Inc. Method for central planning and distributed control of client roaming and reassociation

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030007464A1 (en) * 2001-06-25 2003-01-09 Balani Ram Jethanand Method and device for effecting venue specific wireless communication
US20050060319A1 (en) * 2002-08-02 2005-03-17 Cisco Technology, Inc. Method for central planning and distributed control of client roaming and reassociation

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
CROW B.P. ET AL.: "IEEE 802.11 Wireless Local Area Networks", COMMUNICATIONS MAGAZINE, IEEE, vol. 35, no. 9, September 1997 (1997-09-01), pages 116 - 126, XP000704431 *

Cited By (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009134288A1 (en) 2008-04-30 2009-11-05 Nortel Networks Limited Advertising support for a plurality of service networks by a wireless access point
EP2291801A1 (en) * 2008-04-30 2011-03-09 Nortel Networks Limited Advertising support for a plurality of service networks by a wireless access point
JP2011523256A (en) * 2008-04-30 2011-08-04 ノーテル・ネットワークス・リミテッド Advertisements about wireless access points supporting multiple service networks
EP2291801A4 (en) * 2008-04-30 2013-01-09 Nortel Networks Ltd Advertising support for a plurality of service networks by a wireless access point
EP2166799A1 (en) * 2008-09-19 2010-03-24 NTT DoCoMo, Inc. Method and apparatus for implementing a virtual network
JP2010081603A (en) * 2008-09-19 2010-04-08 Ntt Docomo Inc Method and node for implementing virtual network
CN103650575B (en) * 2011-07-10 2017-09-19 高通股份有限公司 System and method for the low overhead wireless beacon with compressed network identifier
WO2013009776A3 (en) * 2011-07-10 2013-03-21 Qualcomm Incorporated Systems, methods and apparatuses for low-overhead wireless beacon timing
AU2012282766B2 (en) * 2011-07-10 2015-07-30 Qualcomm Incorporated Systems and methods for low-overhead wireless beacons having compressed network identifiers
WO2013009771A3 (en) * 2011-07-10 2013-05-10 Qualcomm Incorporated Systems and methods for low-overhead wireless beacons having compressed network identifiers
US9167609B2 (en) 2011-07-10 2015-10-20 Qualcomm Incorporated Systems and methods for low-overhead wireless beacon timing
US9232473B2 (en) 2011-07-10 2016-01-05 Qualcomm Incorporated Systems and methods for low-overhead wireless beacon timing
US9253808B2 (en) 2011-07-10 2016-02-02 Qualcomm Incorporated Systems and methods for low-overhead wireless beacons having next full beacon indications
US9642171B2 (en) 2011-07-10 2017-05-02 Qualcomm Incorporated Systems and methods for low-overhead wireless beacons having compressed network identifiers
US9560630B2 (en) 2011-08-12 2017-01-31 Qualcomm Incorporated Devices for reduced overhead paging
US9560632B2 (en) 2011-08-12 2017-01-31 Qualcomm Incorporated Devices for title of invention reduced overhead paging
WO2013086033A1 (en) * 2011-12-05 2013-06-13 Qualcomm Incorporated Systems and methods for low overhead paging
US9137778B2 (en) 2011-12-05 2015-09-15 Qualcomm Incorporated Systems and methods for low overhead paging
US10104611B2 (en) 2011-12-05 2018-10-16 Qualcomm Incorporated Systems and methods for low overhead paging
US9591612B2 (en) 2011-12-05 2017-03-07 Qualcomm Incorporated Systems and methods for low overhead paging
US9538552B2 (en) 2012-03-30 2017-01-03 Lg Electronics Inc. Method and apparatus for transceiving beacon in wireless LAN system
WO2016149005A1 (en) * 2015-03-13 2016-09-22 Intel IP Corporation Systems and methods to enable network coordinated mac randomization for wi-fi privacy
US9930009B2 (en) 2015-03-13 2018-03-27 Intel IP Corporation Systems and methods to enable network coordinated MAC randomization for wi-fi privacy
CN108809831A (en) * 2015-03-13 2018-11-13 英特尔Ip公司 The system and method for realizing the network cooperation MAC randomizations for WI-FI privacies
CN107210965B (en) * 2015-03-13 2020-12-11 英特尔Ip公司 System and method for implementing network collaborative MAC randomization for WI-FI privacy
US11196709B2 (en) 2015-03-13 2021-12-07 Intel Corporation Systems and methods to enable network coordinated MAC randomization for Wi-Fi privacy
WO2017026930A1 (en) * 2015-08-11 2017-02-16 Telefonaktiebolaget Lm Ericsson (Publ) Methods and devices for privacy enhancement in networks
EP3499936A4 (en) * 2016-08-31 2019-06-19 Huawei Technologies Co., Ltd. Method for establishing association in wireless local area network, terminal and access point
US10674353B2 (en) 2016-08-31 2020-06-02 Huawei Technologies Co., Ltd. Association establishment method in wireless local area network, terminal, and access point
US20210266735A1 (en) * 2018-06-29 2021-08-26 Nokia Technologies Oy Methods, device and computer-readable medium for protecting mac addresses
US11877147B2 (en) * 2018-06-29 2024-01-16 Nokia Technologies Oy Methods, device and computer-readable medium for protecting MAC addresses
CN110650220A (en) * 2019-09-11 2020-01-03 珠海格力电器股份有限公司 MAC address acquisition method and detection device

Similar Documents

Publication Publication Date Title
WO2007086705A1 (en) Communication method for wireless network and wireless network system
US6959009B2 (en) Address acquisition
US6671735B1 (en) System and method for using an IP address as a wireless unit identifier
US8725138B2 (en) Methods for network selection and discovery of service information in public wireless hotspots
US7346039B2 (en) Communication system
US8411650B2 (en) Method and system for providing virtual private network services through a mobile IP home agent
JP4364791B2 (en) Technology for IP communication between wireless devices
NZ544738A (en) System and method for using an IP address as a wireless unit identifier
US11234124B2 (en) Terminal information transfer method and relevant products
KR20160126079A (en) Access node device for forwarding data packets
CN107005430B (en) Communication method, device and system based on data link layer
KR20140125785A (en) Method and apparatus for efficient security management of disaster message in mobile communication system
CA2661050A1 (en) Dynamic temporary mac address generation in wireless networks
US8264997B2 (en) System and method for providing message push service in wireless communication system
KR20130036875A (en) Method and inter working function for roaming gateway service in a mobile communication system
JP4971445B2 (en) Method for transferring an emergency message of a terminal device in a communication network
US20240040496A1 (en) Ue access identity determination for 3gpp and non-3gpp accesses

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 07708636

Country of ref document: EP

Kind code of ref document: A1