US 12,425,848 B2
Management frame transmission method, apparatus and storage medium
Xiandong Dong, Beijing (CN)
Assigned to BEIJING XIAOMI MOBILE SOFTWARE CO., LTD., Beijing (CN)
Appl. No. 17/919,072
Filed by Beijing Xiaomi Mobile Software Co., Ltd., Beijing (CN)
PCT Filed Apr. 16, 2020, PCT No. PCT/CN2020/085154
§ 371(c)(1), (2) Date Oct. 14, 2022,
PCT Pub. No. WO2021/208025, PCT Pub. Date Oct. 21, 2021.
Prior Publication US 2023/0171594 A1, Jun. 1, 2023
Int. Cl. H04L 9/00 (2022.01); H04W 12/037 (2021.01); H04W 12/06 (2021.01)
CPC H04W 12/037 (2021.01) [H04W 12/06 (2013.01)] 18 Claims
OG exemplary drawing
 
1. A management frame transmission method, performed by a processor of a first device in a wireless local area network, wherein forward transmissions and back transmissions of data are performed between the first device and a second device through the wireless local area network, the first device comprises a first station (STA) or a first access point (AP), and the second device comprises a second AP or a second STA, the method comprising:
negotiating, through a physical layer interface, a unicast session key with the second device through a four-way handshake to select a negotiated unicast session key;
encrypting, in a media access control (MAC) layer, a management frame with the negotiated unicast session key to form an encrypted management frame, wherein the management frame is generated in the MAC layer, and the management frame comprises a reassociation request frame, a disassociation frame, or a deauthentication frame;
sending, through the physical layer interface, the encrypted management frame;
determining, in the MAC layer, whether a management frame receiver is the second device,
in a case that the management frame receiver is the second device, encrypting with the unicast session key, in the MAC layer, subsequent data to be sent and transmitting, through the physical layer interface, the subsequent data, and
in a case that the management frame receiver is not the second device, discarding, in the MAC layer, the subsequent data to prevent the data from being captured by an attacker.