CN104917753A - Method and system for communication based on symmetric keys - Google Patents

Method and system for communication based on symmetric keys Download PDF

Info

Publication number
CN104917753A
CN104917753A CN201510221865.5A CN201510221865A CN104917753A CN 104917753 A CN104917753 A CN 104917753A CN 201510221865 A CN201510221865 A CN 201510221865A CN 104917753 A CN104917753 A CN 104917753A
Authority
CN
China
Prior art keywords
terminal
random number
symmetric key
information
configuration parameters
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510221865.5A
Other languages
Chinese (zh)
Other versions
CN104917753B (en
Inventor
时斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing QIYI Century Science and Technology Co Ltd
Original Assignee
Beijing QIYI Century Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing QIYI Century Science and Technology Co Ltd filed Critical Beijing QIYI Century Science and Technology Co Ltd
Priority to CN201510221865.5A priority Critical patent/CN104917753B/en
Publication of CN104917753A publication Critical patent/CN104917753A/en
Application granted granted Critical
Publication of CN104917753B publication Critical patent/CN104917753B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]

Abstract

Embodiments of the invention provide a method and a system for communication based on symmetric keys. The method comprises the following steps: a first terminal generates a random number; the first terminal generates a first symmetric key according to the random number and data preset in the first terminal; the first terminal generates prompt information for the random number; a second terminal generates a second symmetric key according to the random number and data preset in the second terminal when receiving the random number acquired for the prompt information; the second terminal sends communication information to the first terminal based on the second symmetric key; and the first terminal responds to the communication information based on the first symmetric key. According to the embodiments of the invention, the uniqueness of the keys for each communication is ensured, the strength of the first symmetric key and the second symmetric key is improved, and the security of communication is improved.

Description

A kind of method and system carrying out communicating based on symmetric key
Technical field
The present invention relates to the technical field of communication, particularly relate to a kind of method of carrying out communicating based on symmetric key and a kind of system of carrying out communicating based on symmetric key.
Background technology
Along with developing rapidly of Internet of Things (Internet of Things, IOT) technology, various smart machine also spreads to rapidly in the life of people, such as, and intelligentized Furniture, intelligent kitchen tools, Intelligent worn device etc.
Internet of Things is generally wireless network, and general needs could realize its function by networking, therefore, needs its access network.
But the smart machines such as the Intelligent worn device such as such as bracelet, wireless camera, wireless sound box, smart jack, need wireless connections, but generally do not have user interface (User Interface, UI) can arrange for user.
Now, often through the setting that the control appliances such as mobile phone tell it to network.
Such as, Wi-Fi (wireless boudoir) camera that user newly adds, if the Wi-Fi environment of access own home, then need the title and the password that input Wi-Fi, but this camera itself does not provide visual user interface to arrange, need title and the password of telling its Wi-Fi with other equipment such as mobile phone, panel computer.
In order to avoid password leakage, in advance by key stored in equipment, in broadcasting process, mostly use symmetric key to be encrypted communication process, this key exists by the reverse risk cracked, cause in setting up procedure and be vulnerable to monitor or attack, the fail safe of communication is poor.
Summary of the invention
In view of the above problems, the embodiment of the present invention is proposed to provide a kind of overcoming the problems referred to above or a kind of method of carrying out communicating based on symmetric key of solving the problem at least in part and a kind of system of carrying out communicating based on symmetric key accordingly.
In order to solve the problem, the embodiment of the invention discloses a kind of method of carrying out communicating based on symmetric key, comprising:
First terminal generates random number;
First terminal is according to described random number and data genaration first symmetric key preset in first terminal;
First terminal generates information for described random number;
Second terminal when receiving the random number obtained for described information, according to described random number and data genaration second symmetric key preset in the second terminal;
Second terminal sends the communication information based on described second symmetric key to first terminal;
First terminal responds the communication information based on described first symmetric key.
Preferably, the step that described second terminal sends the communication information based on described second symmetric key to first terminal comprises:
Second terminal adopts described second symmetric key to be encrypted network configuration parameters, to obtain parameter ciphertext;
Described parameter ciphertext is broadcast to first terminal by the second terminal.
Preferably, described first terminal comprises the step that the described communication information responds based on described first symmetric key:
First terminal adopts described first symmetric key to be decrypted described parameter ciphertext, to obtain network configuration parameters;
First terminal adopts described network configuration parameters to arrange, with access network.
Preferably, the step of described first terminal generation random number comprises:
First terminal first time use time or factory reset time, generate random number.
Preferably, the step that described first terminal generates information for described random number comprises:
The number of times that first terminal drives indicator light flicker equal with described random number;
And/or,
First terminal drives random number described in numeral method.
Preferably, described first terminal is the terminal at no user interface.
The embodiment of the invention also discloses a kind of system of carrying out communicating based on symmetric key, described system comprises first terminal and the second terminal;
Wherein, described first terminal comprises:
Random number generation module, for generating random number;
First Symmetric key generation module, for according to described random number and data genaration first symmetric key preset in first terminal;
Information generation module, for generating information for described random number;
Respond module, for responding the communication information based on described first symmetric key;
Described second terminal comprises:
Second Symmetric key generation module, for when receiving the random number obtained for described information, according to described random number and data genaration second symmetric key preset in the second terminal;
Communication module, for sending the communication information based on described second symmetric key to first terminal.
Preferably, described communication module comprises:
Encryption submodule, for adopting described second symmetric key to be encrypted network configuration parameters, to obtain parameter ciphertext;
Broadcast submodule, for being broadcast to first terminal by described parameter ciphertext.
Preferably, described respond module comprises:
Deciphering submodule, is decrypted, to obtain network configuration parameters described parameter ciphertext for adopting described first symmetric key;
Configuration submodule, is arranged for adopting described network configuration parameters, with access network.
Preferably, described random number generation module comprises:
Initial generation submodule, for first time use time or factory reset time, generate random number.
Preferably, described information generation module comprises:
First driven element module, for the number of times driving indicator light flicker equal with described random number;
And/or,
Second driven element module, for driving random number described in numeral method.
Preferably, described first terminal is the terminal at no user interface.
The embodiment of the present invention comprises following advantage:
The embodiment of the present invention is in first terminal and the second terminal, Data Dynamic based on random number and threshold value generates the first symmetric key and the second symmetric key, and communicate with the second symmetric key based on this first symmetric key, ensure that the uniqueness of the key of each communication, improve the intensity of the first symmetric key and the second symmetric key, and then improve the fail safe of communication.
Accompanying drawing explanation
Fig. 1 is a kind of flow chart of steps of carrying out the embodiment of the method communicated based on symmetric key of the present invention;
Fig. 2 is a kind of structured flowchart carrying out the system embodiment communicated based on symmetric key of the present invention.
Embodiment
For enabling above-mentioned purpose of the present invention, feature and advantage become apparent more, and below in conjunction with the drawings and specific embodiments, the present invention is further detailed explanation.
Because the control appliances such as mobile phone generally use radio communication to tell title and the password of the Wi-Fi that the smart machine without UI will connect, and the wireless signal that the control appliances such as mobile phone are launched has certain coverage (7-8 rice or farther), therefore, in the process, the wireless signal that the control appliances such as mobile phone are launched may be received by other equipment, there is the problem that Wi-Fi password is stolen, this problem is not fairly obvious at only house, but obvious in the intensive environment of the user such as the commercial house or group rental.
In like manner, in the region that the wireless signal of the control appliances such as mobile phone can cover, if there is the equipment of a to be added and user bound, so this equipment is just likely arranged by malice and is connected on Wi-Fi that assailant specifies, then add the account of assailant to, cause privacy leakage.
Because the information such as password are easily ravesdropping, if do not encrypted, arbitrary equipment can be heard, user, when arranging network configuration parameters, if there is assailant to monitor by a Wi-Fi equipment, just can obtain the information such as password.
If encryption, the key that encryption uses needs to be kept at device interior, easily analyzedly cracks.Once the device keys of certain manufacturer is cracked, so all equipment just may be monitored and analyze the key messages such as user cipher when configuring.
Therefore, one of core idea proposing the embodiment of the present invention, carries out the setting of network configuration parameters based on the symmetric key dynamically generated, improve fail safe.
With reference to Fig. 1, show a kind of flow chart of steps of carrying out the embodiment of the method communicated based on symmetric key of the present invention, specifically can comprise the steps:
Step 101, first terminal generates random number;
In specific implementation, first terminal can be the terminal at no user interface, such as, and smart jack, intelligent sound, intelligentized Furniture, intelligent kitchen tools etc.
Wherein, user interface can refer to that user (User) and machine (Machine) carry out the interface of interactive operation, and user can be operated machine by this interface.
In embodiments of the present invention, a random number can be generated, calculate a random number as performed the random algorithms such as rand (), specify certain numeral as random number, carry out the setting of network configuration parameters based on this random number.
In one preferred embodiment of the invention, step 101 can comprise following sub-step:
Sub-step S11, first terminal first time use time or factory reset time, generate random number.
Generally, first terminal when first time uses or factory reset time, be in init state, the parameter of setting is the parameter of acquiescence.
Wherein, network configuration parameters is empty, cannot access network, as WLAN (wireless local area network) (Wireless LocalArea Networks, WLAN).Now, can the setting procedure of trigger network configuration parameter.
Certainly, the opportunity of above-mentioned generation random number just exemplarily, when implementing the embodiment of the present invention, can arrange according to actual conditions the opportunity that other generate random number, such as, pressing certain button embodiment of the present invention and do not limited this when powering on.In addition, except the opportunity of above-mentioned generation random number, those skilled in the art can also adopt other to generate the opportunity of random number according to actual needs, and the embodiment of the present invention is not also limited this.
Step 102, first terminal is according to described random number and data genaration first symmetric key preset in first terminal;
The application embodiment of the present invention, can setting data in first terminal in advance, and these data can comprise one or more groups character, can be random length, any character, as binary data.
In embodiments of the present invention, can dynamically generate a random number, introduce the specific factor that first terminal is exclusive, according to the rule of combination preset, this one or more groups character is combined based on this random number, the symmetric key (as the first symmetric key) that on-the-spot generation is new.
Wherein, symmetric key encryption can be named private key encryption again, and the both sides namely transmitted and receive data use identical double secret key expressly to encrypt and decrypt computing.
In one example, certain position in the data, adds random number, obtains the first symmetric key.
In another example, can by data shifts, the value of this displacement is random number, obtains the first symmetric key.
In another example, numeral each in data is added with random number, obtains the first symmetric key.
Certainly, just exemplarily, when implementing the embodiment of the present invention, can arrange the generating mode of other the first symmetric keys according to actual conditions, the embodiment of the present invention is not limited this generating mode of above-mentioned first symmetric key.In addition, except the generating mode of above-mentioned first symmetric key, those skilled in the art can also adopt the generating mode of other the first symmetric key according to actual needs, and the embodiment of the present invention is not also limited this.
Step 103, first terminal generates information for described random number;
In embodiments of the present invention, first terminal after generation random number, can generate corresponding information.
It should be noted that, this information can be the information of non-user interface.
In a kind of preferred exemplary of the embodiment of the present invention, step 103 can comprise following sub-step:
Sub-step S21, the number of times that first terminal drives indicator light flicker equal with described random number;
In this example, if there is indicator light in first terminal, as power supply indicator, signal lamp etc., then with based on this numerical value of indicator light prompting user, can namely drive the number of times that indicator light flicker is equal with random number.
And/or,
Sub-step S22, first terminal drives random number described in numeral method.
In this example, if there is charactron in first terminal, as the intelligentized Furniture such as intelligent electric cooker, Intelligent electric saucepan are used for the charactron etc. of displaying time, then with based on this numerical value of charactron prompting user, namely can drive numeral method random number.
Certainly, just exemplarily, when implementing the embodiment of the present invention, can arrange other informations according to actual conditions, the embodiment of the present invention is not limited this above-mentioned information.In addition, except above-mentioned information, those skilled in the art can also adopt other information according to actual needs, and the embodiment of the present invention is not also limited this.
It should be noted that, this information can be also the broadcast carrying random number, and the embodiment of the present invention is not limited this.
Step 104, the second terminal when receiving the random number obtained for described information, according to described random number and data genaration second symmetric key preset in the second terminal;
In a kind of situation, user after observation information, can input random number in the second terminal.
In another kind of situation, the second terminal can listen to the broadcast carrying random number, therefrom extracts corresponding random number
The application embodiment of the present invention, can arrange the data identical with the data in first terminal in advance in the second terminal, these data also can comprise one or more groups character, also can be random length, any character.
In embodiments of the present invention, the specific factor that first terminal is exclusive can be introduced, according to the rule of combination preset, this one or more groups character be combined based on this random number, the symmetric key (as the second symmetric key) that on-the-spot generation is new.
In one example, certain position in the data, adds random number, obtains the second symmetric key.
In another example, can by data shifts, the value of this displacement is random number, obtains the second symmetric key.
In another example, numeral each in data is added with random number, obtains the second symmetric key.
Certainly, just exemplarily, when implementing the embodiment of the present invention, can arrange the generating mode of other the second symmetric keys according to actual conditions, the embodiment of the present invention is not limited this generating mode of above-mentioned second symmetric key.In addition, except the generating mode of above-mentioned second symmetric key, those skilled in the art can also adopt the generating mode of other the second symmetric key according to actual needs, and the embodiment of the present invention is not also limited this.
It should be noted that, the data (data, random number) generating the first symmetric key and the second symmetric key are identical with mode, and namely the first symmetric key is identical with the content of the second symmetric key, is the symmetric key of a pair correspondence.
Step 105, the second terminal sends the communication information based on described second symmetric key to first terminal;
In specific implementation, the second terminal can communicate with first terminal based on the second symmetric key.
In one preferred embodiment of the invention, step 105 can comprise following sub-step:
Sub-step S31, the second terminal adopts described second symmetric key to be encrypted network configuration parameters, to obtain parameter ciphertext;
In actual applications, the second terminal can adopt the symmetric key encryption algorithms such as AES, DES, 3DES, BLOWFISH, IDEA, FEAL to be encrypted network configuration parameters.
Network configuration parameters may be used for the parameter information of access network.
Such as, if access WLAN by Wi-Fi, then this network configuration parameters generally can comprise SSID (Service Set Identifier, service set), password, in some cases, can also comprise cipher mode etc.
Sub-step S32, described parameter ciphertext is broadcast to first terminal by the second terminal.
In specific implementation, first terminal and the second terminal can be arranged in consolidated network environment, as being arranged in the environment of Wi-Fi, by IP (Internet Protocol, the agreement interconnected between network) physical layer of network sends and carries the broadcast of parameter ciphertext, as the packet of UDP (User Datagram Protocol, User Datagram Protocol).
First terminal, after entering init state, starts to monitor the broadcast in consolidated network (as Wi-Fi), as received the packet of UDP.
Step 106, first terminal responds the communication information based on described first symmetric key.
In specific implementation, first terminal can communicate with the second terminal based on the first symmetric key.
In one preferred embodiment of the invention, step 106 can comprise following sub-step:
Sub-step S41, first terminal adopts described first symmetric key to be decrypted described parameter ciphertext, to obtain network configuration parameters;
Sub-step S42, first terminal adopts described network configuration parameters to arrange, with access network.
In embodiments of the present invention, first terminal is by broadcast, and as the packet (length) of UDP, get parms ciphertext, adopt the symmetric key encryption algorithms such as AES, DES, 3DES, BLOWFISH, IDEA, FEAL to be decrypted parameter ciphertext, obtain network configuration parameters.
First terminal handover network pattern, by interconnection network, as Wi-Fi, completes configuration.
After completing configuration access network, symmetric key (as the first symmetric key, the second symmetric key) lost efficacy, and namely can not communicate based on symmetric key (as the first symmetric key, the second symmetric key) between first terminal with the second terminal.
It should be noted that, for embodiment of the method, in order to simple description, therefore it is all expressed as a series of combination of actions, but those skilled in the art should know, the embodiment of the present invention is not by the restriction of described sequence of movement, because according to the embodiment of the present invention, some step can adopt other orders or carry out simultaneously.Secondly, those skilled in the art also should know, the embodiment described in specification all belongs to preferred embodiment, and involved action might not be that the embodiment of the present invention is necessary.
With reference to Fig. 2, show a kind of structured flowchart carrying out the system embodiment communicated based on symmetric key of the present invention, described system can comprise first terminal 210 and the second terminal 220;
Wherein, described first terminal 210 specifically can comprise as lower module:
Random number generation module 211, for generating random number;
First Symmetric key generation module 212, for according to described random number and data genaration first symmetric key preset in first terminal;
Information generation module 213, for generating information for described random number;
Respond module 214, for responding the communication information based on described first symmetric key;
Described second terminal 220 specifically can comprise as lower module:
Second Symmetric key generation module 221, for when receiving the random number obtained for described information, according to described random number and data genaration second symmetric key preset in the second terminal;
Communication module 222, for sending the communication information based on described second symmetric key to first terminal.
In one preferred embodiment of the invention, described communication module 222 can comprise following submodule:
Encryption submodule, for adopting described second symmetric key to be encrypted network configuration parameters, to obtain parameter ciphertext;
Broadcast submodule, for being broadcast to first terminal by described parameter ciphertext.
In one preferred embodiment of the invention, described respond module 214 can comprise following submodule:
Deciphering submodule, is decrypted, to obtain network configuration parameters described parameter ciphertext for adopting described first symmetric key;
Configuration submodule, is arranged for adopting described network configuration parameters, with access network.
In a kind of preferred exemplary of the embodiment of the present invention, described random number generation module 211 can comprise following submodule:
Initial generation submodule, for first time use time or factory reset time, generate random number.
In a kind of preferred exemplary of the embodiment of the present invention, described information generation module 213 can comprise following submodule:
First driven element module, for the number of times driving indicator light flicker equal with described random number;
And/or,
Second driven element module, for driving random number described in numeral method.
In specific implementation, described first terminal can be the terminal at no user interface.
For system embodiment, due to itself and embodiment of the method basic simlarity, so description is fairly simple, relevant part illustrates see the part of embodiment of the method.
Each embodiment in this specification all adopts the mode of going forward one by one to describe, and what each embodiment stressed is the difference with other embodiments, between each embodiment identical similar part mutually see.
Those skilled in the art should understand, the embodiment of the embodiment of the present invention can be provided as method, device or computer program.Therefore, the embodiment of the present invention can adopt the form of complete hardware embodiment, completely software implementation or the embodiment in conjunction with software and hardware aspect.And the embodiment of the present invention can adopt in one or more form wherein including the upper computer program implemented of computer-usable storage medium (including but not limited to magnetic disc store, CD-ROM, optical memory etc.) of computer usable program code.
The embodiment of the present invention describes with reference to according to the flow chart of the method for the embodiment of the present invention, terminal equipment (system) and computer program and/or block diagram.Should understand can by the combination of the flow process in each flow process in computer program instructions realization flow figure and/or block diagram and/or square frame and flow chart and/or block diagram and/or square frame.These computer program instructions can being provided to the processor of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing terminal equipment to produce a machine, making the instruction performed by the processor of computer or other programmable data processing terminal equipment produce device for realizing the function of specifying in flow chart flow process or multiple flow process and/or block diagram square frame or multiple square frame.
These computer program instructions also can be stored in can in the computer-readable memory that works in a specific way of vectoring computer or other programmable data processing terminal equipment, the instruction making to be stored in this computer-readable memory produces the manufacture comprising command device, and this command device realizes the function of specifying in flow chart flow process or multiple flow process and/or block diagram square frame or multiple square frame.
These computer program instructions also can be loaded on computer or other programmable data processing terminal equipment, make to perform sequence of operations step to produce computer implemented process on computer or other programmable terminal equipment, thus the instruction performed on computer or other programmable terminal equipment is provided for the step realizing the function of specifying in flow chart flow process or multiple flow process and/or block diagram square frame or multiple square frame.
Although described the preferred embodiment of the embodiment of the present invention, those skilled in the art once obtain the basic creative concept of cicada, then can make other change and amendment to these embodiments.So claims are intended to be interpreted as comprising preferred embodiment and falling into all changes and the amendment of embodiment of the present invention scope.
Finally, also it should be noted that, in this article, the such as relational terms of first and second grades and so on is only used for an entity or operation to separate with another entity or operating space, and not necessarily requires or imply the relation that there is any this reality between these entities or operation or sequentially.And, term " comprises ", " comprising " or its any other variant are intended to contain comprising of nonexcludability, thus make to comprise the process of a series of key element, method, article or terminal equipment and not only comprise those key elements, but also comprise other key elements clearly do not listed, or also comprise by the intrinsic key element of this process, method, article or terminal equipment.When not more restrictions, the key element limited by statement " comprising ... ", and be not precluded within process, method, article or the terminal equipment comprising described key element and also there is other identical element.
Above to a kind of method of communicating based on symmetric key provided by the present invention and a kind of system communicated based on symmetric key, be described in detail, apply specific case herein to set forth principle of the present invention and execution mode, the explanation of above embodiment just understands method of the present invention and core concept thereof for helping; Meanwhile, for one of ordinary skill in the art, according to thought of the present invention, all will change in specific embodiments and applications, in sum, this description should not be construed as limitation of the present invention.

Claims (12)

1. carry out the method communicated based on symmetric key, it is characterized in that, comprising:
First terminal generates random number;
First terminal is according to described random number and data genaration first symmetric key preset in first terminal;
First terminal generates information for described random number;
Second terminal when receiving the random number obtained for described information, according to described random number and data genaration second symmetric key preset in the second terminal;
Second terminal sends the communication information based on described second symmetric key to first terminal;
First terminal responds the communication information based on described first symmetric key.
2. method according to claim 1, is characterized in that, the step that described second terminal sends the communication information based on described second symmetric key to first terminal comprises:
Second terminal adopts described second symmetric key to be encrypted network configuration parameters, to obtain parameter ciphertext;
Described parameter ciphertext is broadcast to first terminal by the second terminal.
3. method according to claim 2, is characterized in that, described first terminal comprises the step that the described communication information responds based on described first symmetric key:
First terminal adopts described first symmetric key to be decrypted described parameter ciphertext, to obtain network configuration parameters;
First terminal adopts described network configuration parameters to arrange, with access network.
4. the method according to claim 1 or 2 or 3, is characterized in that, the step that described first terminal generates random number comprises:
First terminal first time use time or factory reset time, generate random number.
5. the method according to claim 1 or 2 or 3, is characterized in that, the step that described first terminal generates information for described random number comprises:
The number of times that first terminal drives indicator light flicker equal with described random number;
And/or,
First terminal drives random number described in numeral method.
6. the method according to claim 1 or 2 or 3, is characterized in that, described first terminal is the terminal at no user interface.
7. carry out the system communicated based on symmetric key, it is characterized in that, described system comprises first terminal and the second terminal;
Wherein, described first terminal comprises:
Random number generation module, for generating random number;
First Symmetric key generation module, for according to described random number and data genaration first symmetric key preset in first terminal;
Information generation module, for generating information for described random number;
Respond module, for responding the communication information based on described first symmetric key;
Described second terminal comprises:
Second Symmetric key generation module, for when receiving the random number obtained for described information, according to described random number and data genaration second symmetric key preset in the second terminal;
Communication module, for sending the communication information based on described second symmetric key to first terminal.
8. system according to claim 7, is characterized in that, described communication module comprises:
Encryption submodule, for adopting described second symmetric key to be encrypted network configuration parameters, to obtain parameter ciphertext;
Broadcast submodule, for being broadcast to first terminal by described parameter ciphertext.
9. system according to claim 8, is characterized in that, described respond module comprises:
Deciphering submodule, is decrypted, to obtain network configuration parameters described parameter ciphertext for adopting described first symmetric key;
Configuration submodule, is arranged for adopting described network configuration parameters, with access network.
10. the system according to claim 7 or 8 or 9, is characterized in that, described random number generation module comprises:
Initial generation submodule, for first time use time or factory reset time, generate random number.
11. systems according to claim 7 or 8 or 9, it is characterized in that, described information generation module comprises:
First driven element module, for the number of times driving indicator light flicker equal with described random number;
And/or,
Second driven element module, for driving random number described in numeral method.
12. systems according to claim 7 or 8 or 9, it is characterized in that, described first terminal is the terminal at no user interface.
CN201510221865.5A 2015-05-04 2015-05-04 A kind of method and system to be communicated based on symmetric key Active CN104917753B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510221865.5A CN104917753B (en) 2015-05-04 2015-05-04 A kind of method and system to be communicated based on symmetric key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510221865.5A CN104917753B (en) 2015-05-04 2015-05-04 A kind of method and system to be communicated based on symmetric key

Publications (2)

Publication Number Publication Date
CN104917753A true CN104917753A (en) 2015-09-16
CN104917753B CN104917753B (en) 2018-07-10

Family

ID=54086459

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510221865.5A Active CN104917753B (en) 2015-05-04 2015-05-04 A kind of method and system to be communicated based on symmetric key

Country Status (1)

Country Link
CN (1) CN104917753B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106411513A (en) * 2016-12-02 2017-02-15 美的智慧家居科技有限公司 Method and device for key negotiation in local area network communication
CN108282330A (en) * 2017-12-29 2018-07-13 平安科技(深圳)有限公司 Key preserves and acquisition device, method and computer readable storage medium
CN108848503A (en) * 2018-06-14 2018-11-20 王佳骏 A kind of smart home dynamic encryption means of communication and system transmitted using merogenesis

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1592141A (en) * 2004-01-17 2005-03-09 中国电子科技集团公司第三十研究所 Terminal to terminal encryption method of cell phone voice and data
US20060104440A1 (en) * 2002-10-30 2006-05-18 Alain Durand Simplified method for renewing symmetrical keys in a digital network
CN1921378B (en) * 2006-09-28 2010-07-28 中国移动通信集团公司 Method and system for negotiating new discrimination key
CN103905384A (en) * 2012-12-26 2014-07-02 北京握奇数据系统有限公司 Embedded inter-terminal session handshake realization method based on security digital certificate

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060104440A1 (en) * 2002-10-30 2006-05-18 Alain Durand Simplified method for renewing symmetrical keys in a digital network
CN1592141A (en) * 2004-01-17 2005-03-09 中国电子科技集团公司第三十研究所 Terminal to terminal encryption method of cell phone voice and data
CN1921378B (en) * 2006-09-28 2010-07-28 中国移动通信集团公司 Method and system for negotiating new discrimination key
CN103905384A (en) * 2012-12-26 2014-07-02 北京握奇数据系统有限公司 Embedded inter-terminal session handshake realization method based on security digital certificate

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106411513A (en) * 2016-12-02 2017-02-15 美的智慧家居科技有限公司 Method and device for key negotiation in local area network communication
CN108282330A (en) * 2017-12-29 2018-07-13 平安科技(深圳)有限公司 Key preserves and acquisition device, method and computer readable storage medium
CN108848503A (en) * 2018-06-14 2018-11-20 王佳骏 A kind of smart home dynamic encryption means of communication and system transmitted using merogenesis
CN108848503B (en) * 2018-06-14 2019-03-26 王佳骏 A kind of smart home dynamic encryption means of communication and system transmitted using merogenesis

Also Published As

Publication number Publication date
CN104917753B (en) 2018-07-10

Similar Documents

Publication Publication Date Title
CN104144049B (en) A kind of encryption communication method, system and device
EP3537652B1 (en) Method for securely controlling smart home appliance and terminal device
CN103731823B (en) Subscription manager-secure routing equipment switching method and equipment
US10009760B2 (en) Providing network credentials
CN105162772A (en) IoT equipment authentication and key agreement method and device
CN108270554B (en) Terminal pairing method and system
CN103607751A (en) Wireless device configuration method and system
CN105764058A (en) Network access method, device and system
CA2929173A1 (en) Key configuration method, system, and apparatus
CN110099427A (en) A kind of method and system to distribution net equipment access network hotspot equipment
CA2922826C (en) Wireless terminal configuration method, apparatus, and wireless terminal
Han et al. A novel secure key paring protocol for RF4CE ubiquitous smart home systems
CN104619040A (en) Method and system for quickly connecting WIFI equipment
EP2890083B1 (en) Key distribution system and method
US20190394033A1 (en) Private key generation method and system, and device
CN102420642B (en) Bluetooth device and communication method thereof
CN105723647A (en) System for sharing a cryptographic key
CN106105131A (en) device pairing
CN103986723A (en) Secret communication control and secret communication method and device
CN104917753A (en) Method and system for communication based on symmetric keys
US10554431B2 (en) Method for device having WLAN function to access network and device for implementing method
CN108306793A (en) Smart machine, intelligent domestic gateway, the method and system for establishing connection
CN106549966B (en) Method and system for switching communication security level, household appliance and mobile terminal
CN107483203B (en) Time-interval encryption method and device for data received by Internet of things access point
KR101398033B1 (en) Remote control system and method using short message

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant