CN104917753B - A kind of method and system to be communicated based on symmetric key - Google Patents
A kind of method and system to be communicated based on symmetric key Download PDFInfo
- Publication number
- CN104917753B CN104917753B CN201510221865.5A CN201510221865A CN104917753B CN 104917753 B CN104917753 B CN 104917753B CN 201510221865 A CN201510221865 A CN 201510221865A CN 104917753 B CN104917753 B CN 104917753B
- Authority
- CN
- China
- Prior art keywords
- terminal
- symmetric key
- random number
- prompt message
- submodule
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
Abstract
An embodiment of the present invention provides a kind of method and system to be communicated based on symmetric key, this method includes:First terminal generates random number;First terminal generates the first symmetric key according to the random number and data preset in first terminal;First terminal generates prompt message for the random number;Second terminal generates the second symmetric key when receiving the random number for prompt message acquisition, according to the random number and data preset in second terminal;Second terminal is based on second symmetric key and sends the communication information to first terminal;First terminal responds the communication information based on first symmetric key.The embodiment of the present invention ensure that the uniqueness of the key to communicate every time, improve the intensity of the first symmetric key and the second symmetric key, and then improve the safety of communication.
Description
Technical field
The present invention relates to the technical field of communication, more particularly to a kind of method to be communicated based on symmetric key and one
The system that kind is communicated based on symmetric key.
Background technology
With the rapid development of Internet of Things (Internet of Things, IOT) technology, various smart machines are also rapid general
And in people’s lives, for example, intelligentized Furniture, intelligent kitchen tools, intelligent wearable device etc..
Internet of Things is generally wireless network, its function could be realized by networking by generally requiring, and therefore, it is necessary to be accessed net
Network.
But the smart machines such as the intelligent wearable devices such as bracelet, wireless camera, wireless sound box, intelligent socket, it needs
Wireless connection is wanted, but typically no user interface (User Interface, UI) is configured for user.
At this point, tell its setting to network often through control devices such as mobile phones.
For example, the newly added Wi-Fi of user (wireless pillow) camera, if the Wi-Fi environment of access own home, needs
The title and password of Wi-Fi is inputted, but this camera is not provided with visual user interface and is configured in itself, needs to use
The other equipments such as mobile phone, tablet computer tell the title and password of its Wi-Fi.
In order to avoid password leakage, key is stored in equipment in advance, uses symmetric key pair mostly in broadcasting process
Communication process is encrypted, which has the risk inversely cracked, causes to be vulnerable to monitoring or attack in setting up procedure, leads to
The safety of letter is poor.
Invention content
In view of the above problems, it is proposed that the embodiment of the present invention overcomes the above problem or at least partly in order to provide one kind
A kind of method to be communicated based on symmetric key and corresponding one kind to solve the above problems is communicated based on symmetric key
System.
To solve the above-mentioned problems, the embodiment of the invention discloses a kind of method to be communicated based on symmetric key, packets
It includes:
First terminal generates random number;
First terminal generates the first symmetric key according to the random number and data preset in first terminal;
First terminal generates prompt message for the random number;
Second terminal receive for the prompt message obtain random number when, according to the random number with
Preset data generate the second symmetric key in second terminal;
Second terminal is based on second symmetric key and sends the communication information to first terminal;
First terminal responds the communication information based on first symmetric key.
Preferably, the step of second terminal sends the communication information based on second symmetric key to first terminal is wrapped
It includes:
Second terminal is encrypted network configuration parameters using second symmetric key, to obtain parameter ciphertext;
Second terminal broadcasts the parameter ciphertext to first terminal.
Preferably, the step of first terminal responds the communication information based on first symmetric key is wrapped
It includes:
First terminal is decrypted the parameter ciphertext using first symmetric key, to obtain network configuration ginseng
Number;
First terminal is configured using the network configuration parameters, to access network.
Preferably, the step of first terminal generation random number includes:
First terminal generates random number when using first time or during factory reset.
Preferably, the first terminal includes for the step of random number generation prompt message:
First terminal driving indicator light flickers the number equal with the random number;
And/or
First terminal drive digital tube shows the random number.
Preferably, the first terminal is the terminal at no user interface.
The embodiment of the invention also discloses a kind of systems to be communicated based on symmetric key, whole the system comprises first
End and second terminal;
Wherein, the first terminal includes:
Random number generation module, for generating random number;
First Symmetric key generation module, for being generated according to the random number and data preset in first terminal
First symmetric key;
Prompt message generation module, for being directed to the random number generation prompt message;
Respond module responds the communication information for being based on first symmetric key;
The second terminal includes:
Second Symmetric key generation module, for receive for the prompt message obtain random number when, according to
The second symmetric key is generated according to the random number and data preset in second terminal;
Communication module sends the communication information for being based on second symmetric key to first terminal.
Preferably, the communication module includes:
Submodule is encrypted, for network configuration parameters to be encrypted using second symmetric key, to obtain parameter
Ciphertext;
Submodule is broadcasted, for broadcasting the parameter ciphertext to first terminal.
Preferably, the respond module includes:
Submodule is decrypted, for the parameter ciphertext to be decrypted using first symmetric key, to obtain network
Parameter is configured;
Submodule is configured, for being configured using the network configuration parameters, to access network.
Preferably, the random number generation module includes:
Submodule is initially generated, for when using first time or during factory reset, generating random number.
Preferably, the prompt message generation module includes:
First driving submodule, for indicator light to be driven to flicker the number equal with the random number;
And/or
Second driving submodule, the random number is shown for drive digital tube.
Preferably, the first terminal is the terminal at no user interface.
The embodiment of the present invention includes advantages below:
The embodiment of the present invention is in first terminal and second terminal, the data dynamic generation based on random number and threshold value the
One symmetric key and the second symmetric key, and communicated based on first symmetric key and the second symmetric key, it ensure that every
The uniqueness of the key of secondary communication, improves the intensity of the first symmetric key and the second symmetric key, and then improves communication
Safety.
Description of the drawings
Fig. 1 is a kind of step flow chart of embodiment of the method to be communicated based on symmetric key of the present invention;
Fig. 2 is a kind of structure diagram of system embodiment to be communicated based on symmetric key of the present invention.
Specific embodiment
In order to make the foregoing objectives, features and advantages of the present invention clearer and more comprehensible, it is below in conjunction with the accompanying drawings and specific real
Applying mode, the present invention is described in further detail.
Since the control devices such as mobile phone generally tell the name of the smart machine of the no UI Wi-Fi to be connected using wireless communication
Title and password, and the wireless signal of the control devices such as mobile phone transmitting has certain coverage area (7-8 meters or farther), therefore,
During this, the wireless signal of the control devices such as mobile phone transmitting may be received by other equipment, be stolen there are Wi-Fi passwords
Problem, this problem are not fairly obvious in only house, but brighter in the intensive environment of the users such as the commercial house or group rental
It is aobvious.
Similarly, in the region that can be covered in the wireless signal of the control devices such as mobile phone, if there is one it is to be added and
The equipment of user bound, then this equipment is possible to be set by malice and be connected on the Wi-Fi that attacker specifies, Ran Houtian
The account of attacker is added to, leads to privacy leakage.
Since the information such as password are easily ravesdropping, if do not encrypted, arbitrary equipment can be heard, user matches in setting network
When putting parameter, as soon as if there is attacker is monitored with a Wi-Fi equipment, the information such as password can be obtained.
If encryption, encrypting the key used needs to be stored in inside equipment, easily analyzed to crack.Once some manufacturer
Device keys be cracked, then all equipment may be monitored in configuration and analyze the key messages such as user password.
Therefore, it is proposed to one of the core concepts of the embodiments of the present invention, the symmetric key based on dynamic generation carries out network
The setting of parameter is configured, improves safety.
With reference to Fig. 1, a kind of step flow of embodiment of the method to communicate based on symmetric key of the present invention is shown
Figure, specifically may include steps of:
Step 101, first terminal generation random number;
In the concrete realization, first terminal can be the terminal at no user interface, for example, intelligent socket, intelligent sound, intelligence
Energy furniture, intelligent kitchen tools etc..
Wherein, user interface can refer to user (User) and machine (Machine) interacts the interface of operation, Yong Huke
To be operated by the interface to machine.
In embodiments of the present invention, a random number can be generated, such as performs rand () random algorithm and calculates one
Random number specifies some number to carry out the setting of network configuration parameters based on the random number as random number.
In one preferred embodiment of the invention, step 101 can include following sub-step:
Sub-step S11, first terminal generate random number when using first time or during factory reset.
Under normal circumstances, first terminal is when using or during factory reset first time, in init state, setting
Parameter be acquiescence parameter.
Wherein, network configuration parameters are sky, network can not be accessed, such as WLAN (Wireless Local Area
Networks, WLAN).At this point it is possible to trigger the setting procedure of network configuration parameters.
Certainly, the opportunity of above-mentioned generation random number is intended only as example, can basis when implementing the embodiment of the present invention
Actual conditions set the opportunity of other generation random numbers, for example, pressing some button embodiment of the present invention when powering on to this not
It limits.In addition, other than the opportunity of above-mentioned generation random number, those skilled in the art can also adopt according to actual needs
With the opportunity of other generation random numbers, the embodiment of the present invention does not also limit this.
Step 102, first terminal is symmetrical according to the random number and data generation first preset in first terminal
Key;
Using the embodiment of the present invention, data can be set in first terminal in advance, which can include one group or more
Group character can be random length, such as any character, binary data.
In embodiments of the present invention, can the exclusive specific factor of first terminal, base be introduced with one random number of dynamic generation
One or more groups of characters are combined according to preset rule of combination in the random number, locally produce new symmetric key
(such as the first symmetric key).
Wherein, symmetric key encryption can be named private key encryption again, that is, send and receive the both sides of data use it is identical
Key pair in plain text operation is encrypted and decrypted.
In one example, random number is added in some position in data, obtains the first symmetric key.
In another example, data can be shifted, the value of the displacement is random number, obtains the first symmetric key.
In another example, number each in data with random number is added, obtains the first symmetric key.
Certainly, the generating mode of above-mentioned first symmetric key is intended only as example, can be with when implementing the embodiment of the present invention
The generating mode of other the first symmetric keys is set according to actual conditions, and the embodiment of the present invention does not limit this.In addition, it removes
Outside the generating mode of above-mentioned first symmetric key, those skilled in the art can also use other first pairs according to actual needs
Claim the generating mode of key, the embodiment of the present invention does not also limit this.
Step 103, first terminal generates prompt message for the random number;
In embodiments of the present invention, first terminal can generate corresponding prompt message after random number is generated.
It should be noted that the prompt message can be the prompt message of non-user interface.
In a kind of preferable example of the embodiment of the present invention, step 103 can include following sub-step:
Sub-step S21, first terminal driving indicator light flicker the number equal with the random number;
In this example, if having indicator light in first terminal, such as power supply indicator, signal lamp then can be with
Based on the indicator light prompting user numerical value, that is, indicator light is driven to flicker the number equal with random number.
And/or
Sub-step S22, first terminal drive digital tube show the random number.
In this example, if having charactron in first terminal, such as intelligent electric cooker, intelligent electric cooking pot intelligentized Furniture are used
It, then can be to be based on the charactron prompting user numerical value in charactron of display time etc., i.e. drive digital tube shows random number
Value.
Certainly, above-mentioned prompt message is intended only as example, when implementing the embodiment of the present invention, can be set according to actual conditions
Other prompt messages are put, the embodiment of the present invention does not limit this.In addition, other than above-mentioned prompt message, art technology
Personnel can also use other prompt messages according to actual needs, and the embodiment of the present invention does not also limit this.
It should be noted that the prompt message can also carry the broadcast of random number, the embodiment of the present invention is to this
It does not limit.
Step 104, second terminal is when receiving the random number for prompt message acquisition, according to described random
Numerical value generates the second symmetric key with data preset in second terminal;
In a kind of situation, user can input random number after prompt message is observed in second terminal.
In another situation, second terminal can listen to the broadcast for carrying random number, and therefrom extraction is corresponding
Random number
Using the embodiment of the present invention, the number identical with the data in first terminal can be set in second terminal in advance
According to the data can also include one or more groups of characters, or random length, any character.
In embodiments of the present invention, the exclusive specific factor of first terminal can be introduced, based on the random number according to pre-
If rule of combination one or more groups of characters are combined, locally produce new symmetric key (such as the second symmetric key).
In one example, random number is added in some position in data, obtains the second symmetric key.
In another example, data can be shifted, the value of the displacement is random number, obtains the second symmetric key.
In another example, number each in data with random number is added, obtains the second symmetric key.
Certainly, the generating mode of above-mentioned second symmetric key is intended only as example, can be with when implementing the embodiment of the present invention
The generating mode of other the second symmetric keys is set according to actual conditions, and the embodiment of the present invention does not limit this.In addition, it removes
Outside the generating mode of above-mentioned second symmetric key, those skilled in the art can also use other second pairs according to actual needs
Claim the generating mode of key, the embodiment of the present invention does not also limit this.
It should be noted that the data (data, random number) of the first symmetric key of generation and the second symmetric key and side
Formula is identical, i.e., the content of the first symmetric key and the second symmetric key is identical, is a pair of corresponding symmetric key.
Step 105, second terminal is based on second symmetric key and sends the communication information to first terminal;
In the concrete realization, second terminal can be communicated based on the second symmetric key with first terminal.
In one preferred embodiment of the invention, step 105 can include following sub-step:
Sub-step S31, second terminal is encrypted network configuration parameters using second symmetric key, to be joined
Number ciphertext;
In practical applications, it is symmetrical close that AES, DES, 3DES, BLOWFISH, IDEA, FEAL etc. may be used in second terminal
Network configuration parameters are encrypted in key Encryption Algorithm.
Network configuration parameters can be used for accessing the parameter information of network.
If for example, accessing WLAN by Wi-Fi, which can generally include SSID (Service Set
Identifier, service set), password, in some cases, can also be including cipher mode etc..
Sub-step S32, second terminal broadcast the parameter ciphertext to first terminal.
In the concrete realization, first terminal can be located in consolidated network environment with second terminal, such as be located at the ring of Wi-Fi
In border, sent by the physical layer of IP (Internet Protocol, the agreement interconnected between network) network and carry parameter ciphertext
Broadcast, such as the data packet of UDP (User Datagram Protocol, User Datagram Protocol).
First terminal begins listening for the broadcast in consolidated network (such as Wi-Fi) after init state is entered, and such as receives
The data packet of UDP.
Step 106, first terminal responds the communication information based on first symmetric key.
In the concrete realization, first terminal can be communicated based on the first symmetric key with second terminal.
In one preferred embodiment of the invention, step 106 can include following sub-step:
Sub-step S41, first terminal is decrypted the parameter ciphertext using first symmetric key, to obtain net
Parameter is configured in network;
Sub-step S42, first terminal is configured using the network configuration parameters, to access network.
In embodiments of the present invention, first terminal is by broadcast, and such as the data packet (length) of UDP, get parms ciphertext, adopts
Parameter ciphertext is decrypted with symmetric key encryption algorithms such as AES, DES, 3DES, BLOWFISH, IDEA, FEAL, obtains net
Parameter is configured in network.
First terminal handover network pattern by connecting network, such as Wi-Fi, completes configuration.
After completing that access network is configured, symmetric key (such as the first symmetric key, the second symmetric key) failure, i.e., the
Symmetric key (such as the first symmetric key, the second symmetric key) can be not based between one terminal and second terminal to communicate.
It should be noted that for embodiment of the method, in order to be briefly described, therefore it is all expressed as to a series of action group
It closes, but those skilled in the art should know, the embodiment of the present invention is not limited by described sequence of movement, because according to
According to the embodiment of the present invention, certain steps may be used other sequences or be carried out at the same time.Secondly, those skilled in the art also should
Know, embodiment described in this description belongs to preferred embodiment, and the involved action not necessarily present invention is implemented
Necessary to example.
With reference to Fig. 2, a kind of structure diagram of system embodiment to communicate based on symmetric key of the present invention is shown,
The system can include first terminal 210 and second terminal 220;
Wherein, the first terminal 210 can specifically include following module:
Random number generation module 211, for generating random number;
First Symmetric key generation module 212, for according to the random number and data preset in first terminal
Generate the first symmetric key;
Prompt message generation module 213, for being directed to the random number generation prompt message;
Respond module 214 responds the communication information for being based on first symmetric key;
The second terminal 220 can specifically include following module:
Second Symmetric key generation module 221, for receive for the prompt message obtain random number when,
The second symmetric key is generated according to the random number and data preset in second terminal;
Communication module 222 sends the communication information for being based on second symmetric key to first terminal.
In one preferred embodiment of the invention, the communication module 222 can include following submodule:
Submodule is encrypted, for network configuration parameters to be encrypted using second symmetric key, to obtain parameter
Ciphertext;
Submodule is broadcasted, for broadcasting the parameter ciphertext to first terminal.
In one preferred embodiment of the invention, the respond module 214 can include following submodule:
Submodule is decrypted, for the parameter ciphertext to be decrypted using first symmetric key, to obtain network
Parameter is configured;
Submodule is configured, for being configured using the network configuration parameters, to access network.
In a kind of preferable example of the embodiment of the present invention, the random number generation module 211 can include following son
Module:
Submodule is initially generated, for when using first time or during factory reset, generating random number.
In a kind of preferable example of the embodiment of the present invention, the prompt message generation module 213 can include following son
Module:
First driving submodule, for indicator light to be driven to flicker the number equal with the random number;
And/or
Second driving submodule, the random number is shown for drive digital tube.
In the concrete realization, the first terminal can be the terminal at no user interface.
For system embodiment, since it is basicly similar to embodiment of the method, so description is fairly simple, it is related
Part illustrates referring to the part of embodiment of the method.
Each embodiment in this specification is described by the way of progressive, the highlights of each of the examples are with
The difference of other embodiment, just to refer each other for identical similar part between each embodiment.
It should be understood by those skilled in the art that, the embodiment of the embodiment of the present invention can be provided as method, apparatus or calculate
Machine program product.Therefore, the embodiment of the present invention can be used complete hardware embodiment, complete software embodiment or combine software and
The form of the embodiment of hardware aspect.Moreover, the embodiment of the present invention can be used one or more wherein include computer can
With in the computer-usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) of program code
The form of the computer program product of implementation.
The embodiment of the present invention be with reference to according to the method for the embodiment of the present invention, terminal device (system) and computer program
The flowchart and/or the block diagram of product describes.It should be understood that flowchart and/or the block diagram can be realized by computer program instructions
In each flow and/or block and flowchart and/or the block diagram in flow and/or box combination.These can be provided
Computer program instructions are set to all-purpose computer, special purpose computer, Embedded Processor or other programmable data processing terminals
Standby processor is to generate a machine so that is held by the processor of computer or other programmable data processing terminal equipments
Capable instruction generation is used to implement in one flow of flow chart or multiple flows and/or one box of block diagram or multiple boxes
The device for the function of specifying.
These computer program instructions, which may also be stored in, can guide computer or other programmable data processing terminal equipments
In the computer-readable memory to work in a specific way so that the instruction being stored in the computer-readable memory generates packet
The manufacture of command device is included, which realizes in one flow of flow chart or multiple flows and/or one side of block diagram
The function of being specified in frame or multiple boxes.
These computer program instructions can be also loaded into computer or other programmable data processing terminal equipments so that
Series of operation steps are performed on computer or other programmable terminal equipments to generate computer implemented processing, thus
The instruction offer performed on computer or other programmable terminal equipments is used to implement in one flow of flow chart or multiple flows
And/or specified in one box of block diagram or multiple boxes function the step of.
Although the preferred embodiment of the embodiment of the present invention has been described, those skilled in the art once know base
This creative concept can then make these embodiments other change and modification.So appended claims are intended to be construed to
Including preferred embodiment and fall into all change and modification of range of embodiment of the invention.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by
One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation
Between there are any actual relationship or orders.Moreover, term " comprising ", "comprising" or its any other variant meaning
Covering non-exclusive inclusion, so that process, method, article or terminal device including a series of elements are not only wrapped
Those elements are included, but also including other elements that are not explicitly listed or are further included as this process, method, article
Or the element that terminal device is intrinsic.In the absence of more restrictions, it is wanted by what sentence "including a ..." limited
Element, it is not excluded that also there are other identical elements in the process including the element, method, article or terminal device.
Symmetric key is based on to a kind of method to communicate based on symmetric key provided by the present invention and one kind above
The system to communicate, is described in detail, specific case used herein to the principle of the present invention and embodiment into
Elaboration is gone, the explanation of above example is only intended to facilitate the understanding of the method and its core concept of the invention;Meanwhile for this
The those skilled in the art in field, thought according to the present invention, there will be changes in specific embodiments and applications,
In conclusion the content of the present specification should not be construed as limiting the invention.
Claims (10)
- A kind of 1. method to be communicated based on symmetric key, which is characterized in that including:First terminal generates random number;Wherein, the first terminal includes:The terminal at no user interface;First terminal generates the first symmetric key according to the random number and data preset in first terminal;First terminal generates prompt message for the random number;Including:First terminal driving indicator light flicker with it is described with The equal number of machine numerical value;Second terminal is when receiving the random number for prompt message acquisition, according to the random number and second Preset data generate the second symmetric key in terminal;Second terminal is based on second symmetric key and sends the communication information to first terminal;First terminal responds the communication information based on first symmetric key.
- 2. according to the method described in claim 1, it is characterized in that, the second terminal is based on second symmetric key to the The step of one terminal transmission communication information, includes:Second terminal is encrypted network configuration parameters using second symmetric key, to obtain parameter ciphertext;Second terminal broadcasts the parameter ciphertext to first terminal.
- 3. according to the method described in claim 2, it is characterized in that, the first terminal is based on first symmetric key to institute The step of communication information is responded is stated to include:First terminal is decrypted the parameter ciphertext using first symmetric key, to obtain network configuration parameters;First terminal is configured using the network configuration parameters, to access network.
- 4. according to the method described in claims 1 or 2 or 3, which is characterized in that the first terminal generates the step of random number Including:First terminal generates random number when using first time or during factory reset.
- 5. according to the method described in claims 1 or 2 or 3, which is characterized in that the first terminal is given birth to for the random number It is further included into the step of prompt message:First terminal drive digital tube shows the random number.
- 6. a kind of system to be communicated based on symmetric key, which is characterized in that the system comprises first terminal and second eventually End;Wherein, the first terminal includes:The terminal at no user interface;Wherein, the first terminal includes:Random number generation module, for generating random number;First Symmetric key generation module, for according to the random number and data generation first preset in first terminal Symmetric key;Prompt message generation module, for being directed to the random number generation prompt message;The prompt message generation module is also Including:First driving submodule, for indicator light to be driven to flicker the number equal with the random number;Respond module responds the communication information for being based on first symmetric key;The second terminal includes:Second Symmetric key generation module, for when receiving the random number obtained for the prompt message, according to institute It states random number and generates the second symmetric key with data preset in second terminal;Communication module sends the communication information for being based on second symmetric key to first terminal.
- 7. system according to claim 6, which is characterized in that the communication module includes:Submodule is encrypted, for network configuration parameters to be encrypted using second symmetric key, to obtain parameter ciphertext;Submodule is broadcasted, for broadcasting the parameter ciphertext to first terminal.
- 8. system according to claim 7, which is characterized in that the respond module includes:Submodule is decrypted, for the parameter ciphertext to be decrypted using first symmetric key, to obtain network configuration Parameter;Submodule is configured, for being configured using the network configuration parameters, to access network.
- 9. the system described according to claim 6 or 7 or 8, which is characterized in that the random number generation module includes:Submodule is initially generated, for when using first time or during factory reset, generating random number.
- 10. the system described according to claim 6 or 7 or 8, which is characterized in that the prompt message generation module further includes:Second driving submodule, the random number is shown for drive digital tube.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510221865.5A CN104917753B (en) | 2015-05-04 | 2015-05-04 | A kind of method and system to be communicated based on symmetric key |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510221865.5A CN104917753B (en) | 2015-05-04 | 2015-05-04 | A kind of method and system to be communicated based on symmetric key |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104917753A CN104917753A (en) | 2015-09-16 |
CN104917753B true CN104917753B (en) | 2018-07-10 |
Family
ID=54086459
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510221865.5A Active CN104917753B (en) | 2015-05-04 | 2015-05-04 | A kind of method and system to be communicated based on symmetric key |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104917753B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106411513B (en) * | 2016-12-02 | 2019-10-18 | 美的智慧家居科技有限公司 | Cryptographic key negotiation method and device in local area network communication |
CN108282330A (en) * | 2017-12-29 | 2018-07-13 | 平安科技(深圳)有限公司 | Key preserves and acquisition device, method and computer readable storage medium |
CN108848503B (en) * | 2018-06-14 | 2019-03-26 | 王佳骏 | A kind of smart home dynamic encryption means of communication and system transmitted using merogenesis |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1592141A (en) * | 2004-01-17 | 2005-03-09 | 中国电子科技集团公司第三十研究所 | Terminal to terminal encryption method of cell phone voice and data |
CN1921378B (en) * | 2006-09-28 | 2010-07-28 | 中国移动通信集团公司 | Method and system for negotiating new discrimination key |
CN103905384A (en) * | 2012-12-26 | 2014-07-02 | 北京握奇数据系统有限公司 | Embedded inter-terminal session handshake realization method based on security digital certificate |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2004045184A1 (en) * | 2002-10-30 | 2004-05-27 | Thomson Licensing S.A. | Method for renewing symmetrical keys in a digital network |
-
2015
- 2015-05-04 CN CN201510221865.5A patent/CN104917753B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1592141A (en) * | 2004-01-17 | 2005-03-09 | 中国电子科技集团公司第三十研究所 | Terminal to terminal encryption method of cell phone voice and data |
CN1921378B (en) * | 2006-09-28 | 2010-07-28 | 中国移动通信集团公司 | Method and system for negotiating new discrimination key |
CN103905384A (en) * | 2012-12-26 | 2014-07-02 | 北京握奇数据系统有限公司 | Embedded inter-terminal session handshake realization method based on security digital certificate |
Also Published As
Publication number | Publication date |
---|---|
CN104917753A (en) | 2015-09-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101949116B1 (en) | Proximity Discovery, Authentication and Link Establishment Between Mobile Devices in 3GPP LTE | |
JP6929390B2 (en) | Wireless local area network configuration method and device | |
US11805411B2 (en) | Establishing connections between WiFi access points and wireless devices via light fidelity access points | |
US9202042B2 (en) | Automatic device pairing | |
EP3082354B1 (en) | Location privacy protection methods and devices | |
CN108476140B (en) | Method for safely controlling smart home and terminal equipment | |
US11122060B2 (en) | Detection of security threats in a mesh network | |
CN103458399A (en) | Intelligent WIFI module and method for configuring device supporting WIFI connection into WIFI network | |
WO2018137351A1 (en) | Method, relevant device and system for processing network key | |
CN108270554B (en) | Terminal pairing method and system | |
CN106656547B (en) | Method and device for updating network configuration of household electrical appliance | |
CA2929173A1 (en) | Key configuration method, system, and apparatus | |
CN105764058A (en) | Network access method, device and system | |
CN106533662A (en) | Methods and devices for transmitting network safety secret key | |
US10880079B2 (en) | Private key generation method and system, and device | |
CN106105131A (en) | device pairing | |
CN113630727B (en) | Intelligent household network distribution method, device and system, electronic equipment and storage medium | |
US20180095500A1 (en) | Tap-to-dock | |
CN104917753B (en) | A kind of method and system to be communicated based on symmetric key | |
CN106851608A (en) | Network setting method and system for networking device | |
CN112188488A (en) | Network distribution method, device and system | |
CN105159121A (en) | Household electrical appliance and on-off control method and system and intelligent apparatus | |
CN108494764B (en) | Identity authentication method and device | |
Tuen | Security in Internet of Things Systems | |
CN107483203B (en) | Time-interval encryption method and device for data received by Internet of things access point |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |