CN102984704A - Authentication and key agreement method and system between light-weight smart mobile phones - Google Patents

Authentication and key agreement method and system between light-weight smart mobile phones Download PDF

Info

Publication number
CN102984704A
CN102984704A CN2012105653113A CN201210565311A CN102984704A CN 102984704 A CN102984704 A CN 102984704A CN 2012105653113 A CN2012105653113 A CN 2012105653113A CN 201210565311 A CN201210565311 A CN 201210565311A CN 102984704 A CN102984704 A CN 102984704A
Authority
CN
China
Prior art keywords
intelligent terminal
data
key
authentication
perception data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012105653113A
Other languages
Chinese (zh)
Other versions
CN102984704B (en
Inventor
任伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China University of Geosciences
Original Assignee
China University of Geosciences
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China University of Geosciences filed Critical China University of Geosciences
Priority to CN201210565311.3A priority Critical patent/CN102984704B/en
Publication of CN102984704A publication Critical patent/CN102984704A/en
Application granted granted Critical
Publication of CN102984704B publication Critical patent/CN102984704B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses an authentication and key agreement method between light-weight smart mobile phones. The method comprises the following steps of collecting data returned from a sensor, allowing a first intelligent terminal and a second intelligent terminal to operate according to a preset mode, collecting corresponding perception data returned from the sensor and generated for the operation, exchanging the collected data, allowing the first intelligent terminal and the second intelligent terminal to exchange partial perception data, verifying the exchanged data, allowing the intelligent terminals to compare and verify the received data and a corresponding part of the self-owned perception data, generating an agreement key, after passing verification, allowing the intelligent terminals to operate the perception data according to the preset mode, and taking a computed value as the agreement key. The method adopts simultaneous operation of the two intelligent terminals to generate the same sensor data as an authentication evidence and a key seed, and as the operation is random, the key is also random, the authentication is reliable, and the key is safe.

Description

Authentication and Key Agreement method and system between a kind of smart mobile phone of lightweight
 
Technical field
The present invention relates to the mobile message security fields, relate in particular to the Authentication and Key Agreement method and system between a kind of smart mobile phone of lightweight.
?
Background technology
Closely may need mutual transmission of information in the situation between two smart mobile phones, but, how before transmission of information, mutually to consult a key and be used for encrypting the information of transmitting, and before transmission of information, recipient or transmit leg are authenticated, to get rid of potential hostile recipient and to forge transmit leg, so before radio communication is set up, need to carry out Authentication and Key Agreement.Authentication be sure of that communication counterpart is legal.Key agreement is for the encryption key of setting up communication.All for the fail safe that guarantees radio communication.
Carry out at present method that intelligent terminal carries out closely authentication mainly based on the challenge response agreement, no matter physically by which kind of mode connect, as by Bluetooth pairing, or by WiFi communication, or NFC communication.Carry out at present intelligent terminal and carry out closely that the method for key agreement mainly relies on key agreement protocol, be usually directed to cryptography arithmetic.
The defective of challenge response agreement and key agreement protocol is: need the cipher function computing, so amount of calculation is large, power consumption is large, has certain delay.
Summary of the invention
The amount of calculation that the technical problem to be solved in the present invention is to carry out for intelligent terminal in the prior art closely authentication and key agreement is large, has the defective of delay, and the Authentication and Key Agreement method and system between a kind of smart mobile phone of lightweight are provided.
The present invention solves the problems of the technologies described above the technical scheme that adopts: the Authentication and Key Agreement method between a kind of smart mobile phone of lightweight may further comprise the steps:
The data that S1, collection are passed back by transducer: the first intelligent terminal and the second intelligent terminal move according to default mode, and then the first intelligent terminal and the second intelligent terminal are collected respectively the perception data M to this action generation that corresponding transducer is passed back, N;
S2, the data of collecting are exchanged: the first intelligent terminal sends to the second intelligent terminal with the part of data M, and the second intelligent terminal sends to the first intelligent terminal with the part of data N;
S3, the one the second intelligent terminals compare checking to the appropriate section of the perception data that receives and own perception data;
S4, generate arranging key: the first intelligent terminal carries out computing to the part of perception data M by default mode, obtains calculated value, with calculated value as arranging key; The second intelligent terminal carries out computing to the appropriate section of perception data N by default mode, obtains calculated value, with calculated value as arranging key.
Press such scheme, the Authentication and Key Agreement method between described smart mobile phone is characterized in that, the computing described in the S3 is Hash operation.
In order to solve the problems of the technologies described above another technical scheme that adopts be: the Authentication and Key Agreement system between a kind of smart mobile phone of lightweight, this system comprises:
Data collection module is used for collecting the perception data by the action acquisition of sensor senses intelligent terminal;
Communication module is for the exchanges data of perception data between intelligent terminal;
Data processing module is used for the perception data of exchange is verified;
Key production module is used for according to the arranging key between perception data generation intelligent terminal.
Press such scheme, sensor assembly can be gravity sensor, or acceleration sensor, or light sensor, or range sensor.
The operation principle of this system is: A and two intelligent terminals of B are put together and dispose this system, move according to certain mode, action by the sensor senses intelligent terminal on the intelligent terminal also obtains the perception data M that this action produces, N, the data collection module mobile phone is collected the data M that is obtained by transducer, N, communication module sends to the part of data M the data processing module of intelligent terminal 2, simultaneously communication module sends to the data processing module of intelligent terminal 1 with the part of data N, and then data processing module compares checking to the appropriate section of the perception data that receives and own perception data; Last key production module according to perception data, is chosen corresponding part, and it is carried out Hash operation, generates the arranging key between intelligent terminal.
The beneficial effect that the present invention produces is: action when utilizing two intelligent terminals, produce identical sensing data as the authority of authentication and the seed of key, because action is at random, so key also is at random, because other intelligent terminals can't obtain identical perception data, therefore authentication is reliably, and key is safe.The inventive method has been simplified authentication method and the cryptographic key negotiation method of existing intelligent terminal.
?
Description of drawings
The invention will be further described below in conjunction with drawings and Examples, in the accompanying drawing:
Fig. 1 is the method flow diagram of the embodiment of the invention;
Fig. 2 is the system construction drawing of the embodiment of the invention.
Embodiment
In order to make purpose of the present invention, technical scheme and advantage clearer, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, is not intended to limit the present invention.
As shown in Figure 1, the Authentication and Key Agreement method between a kind of smart mobile phone of lightweight may further comprise the steps:
The data that S1, collection are passed back by transducer: A and two mobile phones of B are put together, and two mobile phones move according to default mode, such as describing a circle, draw a cross etc., and this action will produce certain perception data to gravity sensor.These data are identical for two mobile phones.Right latter two mobile phone is put the perception data M to this action generation that collecting sensor is respectively passed back, N;
S2, the data of collecting are exchanged: mobile phone A sends to mobile phone B with [0,1/4] part of data M, and mobile phone B sends to mobile phone A with [1/4,1/2] part of data N,
S3, the data of exchange are verified: mobile phone A B compares checking to the corresponding part of the perception data that receives and the perception data of having by oneself;
S4, generate arranging key: mobile phone A B to perception data M, N [1/2,1] part is carried out Hash operation, obtains calculated value H, with H as arranging key.
According to the method described above, the present invention also provides the Authentication and Key Agreement system between a kind of smart mobile phone of lightweight, and as shown in Figure 2, this system comprises:
Data collection module is used for collecting the perception data by the action acquisition of sensor senses intelligent terminal;
Communication module is for the exchanges data of perception data between intelligent terminal;
Data processing module is used for the perception data of exchange is verified;
Key production module is used for according to the arranging key between perception data generation intelligent terminal.
A and two intelligent terminals of B are put together and dispose this system, allow two intelligent terminals of A and B do accelerated motion, the action of acceleration sensor perception intelligent terminal A and B also obtains the perception data M that this action produces, N, the data collection module mobile phone is collected the data M that is obtained by transducer, N, communication module sends to the part of data M the data processing module of intelligent terminal B, simultaneously communication module sends to the data processing module of intelligent terminal A with the part of data N, and then data processing module compares checking to the appropriate section of the perception data that receives and own perception data; Last key production module, according to perception data M, [1/2,1] part of N is carried out Hash operation to it, generates the arranging key between intelligent terminal.
Should be understood that, for those of ordinary skills, can be improved according to the above description or conversion, and all these improvement and conversion all should belong to the protection range of claims of the present invention.

Claims (9)

1. the Authentication and Key Agreement method between the smart mobile phone of a lightweight is characterized in that, may further comprise the steps:
The data that S1, collection are passed back by transducer: the first intelligent terminal and the second intelligent terminal move according to default mode, then the first intelligent terminal is collected the perception data M to this action generation that corresponding transducer is passed back, and the second intelligent terminal is collected the perception data N to this action generation that corresponding transducer is passed back;
S2, the data of collecting are exchanged: the first intelligent terminal sends to the second intelligent terminal with the part of data M, and the second intelligent terminal sends to the first intelligent terminal with the part of data N;
S3, the data of exchange are verified: the first intelligent terminal compares checking to the appropriate section of the part of the data N that receives and own perception data M, and the second intelligent terminal compares checking to the appropriate section of the part of the data M that receives and own perception data N;
S4, generate arranging key: if the verification passes, the first intelligent terminal carries out computing to the part of perception data M by default mode, obtains calculated value, with calculated value as arranging key; The second intelligent terminal carries out computing to the appropriate section of perception data N by default mode, obtains calculated value, with calculated value as arranging key.
2. the Authentication and Key Agreement method between smart mobile phone as claimed in claim 1 is characterized in that, the computing described in the S4 is Hash operation.
3. the Authentication and Key Agreement method between smart mobile phone as claimed in claim 1 is characterized in that, among the S2, the first intelligent terminal is with [0 of data M, 1/4] part is passed to the second intelligent terminal, and the second intelligent terminal is passed to the first intelligent terminal with [1/4,1/2] part of S.
4. the Authentication and Key Agreement method between smart mobile phone as claimed in claim 1 or 2 is characterized in that, among the S4, the first intelligent terminal carries out computing to [1/2,1] part of perception data M.
5. the Authentication and Key Agreement system between the smart mobile phone of a lightweight is characterized in that, this system comprises:
Data collection module is used for collecting the perception data by the action acquisition of sensor senses intelligent terminal;
Communication module is for the exchanges data of perception data between intelligent terminal;
Data processing module is used for the perception data of exchange is verified;
Key production module is for the arranging key that carries out according to perception data between computing generation intelligent terminal.
6. the Authentication and Key Agreement system between smart mobile phone as claimed in claim 5 is characterized in that, described sensor assembly is gravity sensor, or acceleration sensor, or light sensor, or range sensor.
7. the Authentication and Key Agreement system between smart mobile phone as claimed in claim 5, it is characterized in that, the method that described data processing module is verified the perception data of exchange is, the first intelligent terminal is with [0 of the reception perception data, 1/4] part is passed to the second intelligent terminal, the second intelligent terminal with the reception perception data [1/4,1/2] part pass to the first intelligent terminal.
8. the Authentication and Key Agreement system between smart mobile phone as claimed in claim 5 is characterized in that, described key production module is carried out computing according to perception data and generated in the arranging key between intelligent terminal, and operation method is Hash operation.
9. such as the Authentication and Key Agreement system between claim 5 or 8 described smart mobile phones, it is characterized in that, described key production module is carried out computing according to perception data and is generated in the arranging key between intelligent terminal, chooses [1/2,1] part of perception data and carries out computing.
CN201210565311.3A 2012-12-24 2012-12-24 Authentication and key agreement method and system between light-weight smart mobile phones Expired - Fee Related CN102984704B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210565311.3A CN102984704B (en) 2012-12-24 2012-12-24 Authentication and key agreement method and system between light-weight smart mobile phones

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210565311.3A CN102984704B (en) 2012-12-24 2012-12-24 Authentication and key agreement method and system between light-weight smart mobile phones

Publications (2)

Publication Number Publication Date
CN102984704A true CN102984704A (en) 2013-03-20
CN102984704B CN102984704B (en) 2014-11-26

Family

ID=47858348

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210565311.3A Expired - Fee Related CN102984704B (en) 2012-12-24 2012-12-24 Authentication and key agreement method and system between light-weight smart mobile phones

Country Status (1)

Country Link
CN (1) CN102984704B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106332076A (en) * 2015-06-23 2017-01-11 西安中兴新软件有限责任公司 wireless access method, device and system
CN107360570A (en) * 2017-06-23 2017-11-17 中国地质大学(武汉) The lightweight real-time cipher key generation method that Behavior-based control action perceives in Internet of Things wearable device
CN111555872A (en) * 2020-04-30 2020-08-18 平安科技(深圳)有限公司 Communication data processing method, device, computer system and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1564514A (en) * 2004-03-26 2005-01-12 中兴通讯股份有限公司 Self arranged net mode shared key authentication and conversation key consulant method of radio LAN
CN101083530A (en) * 2007-07-13 2007-12-05 北京工业大学 Method for realizing intra-mobile entity authentication and cipher key negotiation using short message

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1564514A (en) * 2004-03-26 2005-01-12 中兴通讯股份有限公司 Self arranged net mode shared key authentication and conversation key consulant method of radio LAN
CN101083530A (en) * 2007-07-13 2007-12-05 北京工业大学 Method for realizing intra-mobile entity authentication and cipher key negotiation using short message

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
OMAR CHEIKHROUHOU ET AL: "A Lightweight User Authentication Scheme for Wireless Sensor Networks", 《COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2010 IEEE/ACS INTERNATIONAL CONFERENCE ON》, 19 May 2010 (2010-05-19) *
WEI REN ET AL: "CoP: An Ultra-Lightweight Secure Network Coding Scheme via Last Forwarder’s Proof", 《TSINGHUA SCIENCE AND TECHNOLOGY》, vol. 17, no. 5, 31 October 2012 (2012-10-31) *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106332076A (en) * 2015-06-23 2017-01-11 西安中兴新软件有限责任公司 wireless access method, device and system
CN107360570A (en) * 2017-06-23 2017-11-17 中国地质大学(武汉) The lightweight real-time cipher key generation method that Behavior-based control action perceives in Internet of Things wearable device
CN107360570B (en) * 2017-06-23 2019-12-20 中国地质大学(武汉) Behavior action perception-based lightweight real-time key generation method and system in wearable equipment of Internet of things
CN111555872A (en) * 2020-04-30 2020-08-18 平安科技(深圳)有限公司 Communication data processing method, device, computer system and storage medium

Also Published As

Publication number Publication date
CN102984704B (en) 2014-11-26

Similar Documents

Publication Publication Date Title
US8285994B2 (en) Two-way authentication between two communication endpoints using a one-way out-of-band (OOB) channel
Wei et al. A privacy-preserving fog computing framework for vehicular crowdsensing networks
EP2873191B1 (en) Mechanisms for certificate revocation status verification on constrained devices
CN101814991B (en) Mutual authentication method and system based on identity
CN107483209B (en) Secure signcryption method based on heterogeneous system
CN106031120B (en) Key management
CN103178964A (en) QR-code-based (quick response code-based) key exchange method for intelligent terminal authentication
CN113595744B (en) Network access method, device, electronic equipment and storage medium
CN102916809B (en) Dynamic authentication method for intelligent power network control command based on state estimation
CN103795541A (en) Secure communication method of electricity information acquisition system of 230M wireless private network channel
CN110401530A (en) A kind of safety communicating method of gas meter, flow meter, system, equipment and storage medium
CN106301793A (en) A kind of PLC certification and the method for secure communication
Park et al. Symmetric key-based authentication and the session key agreement scheme in IoT environment
CN102984704B (en) Authentication and key agreement method and system between light-weight smart mobile phones
CN103236926A (en) Point-to-point-based data transmission system and data transmission method
CN113613197A (en) Vehicle and digital key pairing method and device
Mbarek et al. Energy efficient security protocols for wireless sensor networks: SPINS vs TinySec
Mohammad et al. A survey of authenticated Key Agreement Protocols for securing IoT
Sarkar et al. SEAT: Secure energy-efficient automated public transport ticketing system
CN102158856B (en) Mobile terminal identification code authentication system and method, server and terminal
CN110691358A (en) Access control system based on attribute cryptosystem in wireless sensor network
CN105162592B (en) A kind of method and system of certification wearable device
CN103916851A (en) Safety certification method, device and system
CN102833243B (en) A kind of communication means utilizing finger print information
CN110278077B (en) Method, device, equipment and storage medium for acquiring data information of electric energy meter

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20141126

Termination date: 20181224

CF01 Termination of patent right due to non-payment of annual fee