CN104917753B - A kind of method and system to be communicated based on symmetric key - Google Patents

A kind of method and system to be communicated based on symmetric key Download PDF

Info

Publication number
CN104917753B
CN104917753B CN201510221865.5A CN201510221865A CN104917753B CN 104917753 B CN104917753 B CN 104917753B CN 201510221865 A CN201510221865 A CN 201510221865A CN 104917753 B CN104917753 B CN 104917753B
Authority
CN
China
Prior art keywords
terminal
symmetric key
random number
prompt message
submodule
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510221865.5A
Other languages
Chinese (zh)
Other versions
CN104917753A (en
Inventor
时斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing QIYI Century Science and Technology Co Ltd
Original Assignee
Beijing QIYI Century Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing QIYI Century Science and Technology Co Ltd filed Critical Beijing QIYI Century Science and Technology Co Ltd
Priority to CN201510221865.5A priority Critical patent/CN104917753B/en
Publication of CN104917753A publication Critical patent/CN104917753A/en
Application granted granted Critical
Publication of CN104917753B publication Critical patent/CN104917753B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]

Abstract

An embodiment of the present invention provides a kind of method and system to be communicated based on symmetric key, this method includes:First terminal generates random number;First terminal generates the first symmetric key according to the random number and data preset in first terminal;First terminal generates prompt message for the random number;Second terminal generates the second symmetric key when receiving the random number for prompt message acquisition, according to the random number and data preset in second terminal;Second terminal is based on second symmetric key and sends the communication information to first terminal;First terminal responds the communication information based on first symmetric key.The embodiment of the present invention ensure that the uniqueness of the key to communicate every time, improve the intensity of the first symmetric key and the second symmetric key, and then improve the safety of communication.

Description

A kind of method and system to be communicated based on symmetric key
Technical field
The present invention relates to the technical field of communication, more particularly to a kind of method to be communicated based on symmetric key and one The system that kind is communicated based on symmetric key.
Background technology
With the rapid development of Internet of Things (Internet of Things, IOT) technology, various smart machines are also rapid general And in people’s lives, for example, intelligentized Furniture, intelligent kitchen tools, intelligent wearable device etc..
Internet of Things is generally wireless network, its function could be realized by networking by generally requiring, and therefore, it is necessary to be accessed net Network.
But the smart machines such as the intelligent wearable devices such as bracelet, wireless camera, wireless sound box, intelligent socket, it needs Wireless connection is wanted, but typically no user interface (User Interface, UI) is configured for user.
At this point, tell its setting to network often through control devices such as mobile phones.
For example, the newly added Wi-Fi of user (wireless pillow) camera, if the Wi-Fi environment of access own home, needs The title and password of Wi-Fi is inputted, but this camera is not provided with visual user interface and is configured in itself, needs to use The other equipments such as mobile phone, tablet computer tell the title and password of its Wi-Fi.
In order to avoid password leakage, key is stored in equipment in advance, uses symmetric key pair mostly in broadcasting process Communication process is encrypted, which has the risk inversely cracked, causes to be vulnerable to monitoring or attack in setting up procedure, leads to The safety of letter is poor.
Invention content
In view of the above problems, it is proposed that the embodiment of the present invention overcomes the above problem or at least partly in order to provide one kind A kind of method to be communicated based on symmetric key and corresponding one kind to solve the above problems is communicated based on symmetric key System.
To solve the above-mentioned problems, the embodiment of the invention discloses a kind of method to be communicated based on symmetric key, packets It includes:
First terminal generates random number;
First terminal generates the first symmetric key according to the random number and data preset in first terminal;
First terminal generates prompt message for the random number;
Second terminal receive for the prompt message obtain random number when, according to the random number with Preset data generate the second symmetric key in second terminal;
Second terminal is based on second symmetric key and sends the communication information to first terminal;
First terminal responds the communication information based on first symmetric key.
Preferably, the step of second terminal sends the communication information based on second symmetric key to first terminal is wrapped It includes:
Second terminal is encrypted network configuration parameters using second symmetric key, to obtain parameter ciphertext;
Second terminal broadcasts the parameter ciphertext to first terminal.
Preferably, the step of first terminal responds the communication information based on first symmetric key is wrapped It includes:
First terminal is decrypted the parameter ciphertext using first symmetric key, to obtain network configuration ginseng Number;
First terminal is configured using the network configuration parameters, to access network.
Preferably, the step of first terminal generation random number includes:
First terminal generates random number when using first time or during factory reset.
Preferably, the first terminal includes for the step of random number generation prompt message:
First terminal driving indicator light flickers the number equal with the random number;
And/or
First terminal drive digital tube shows the random number.
Preferably, the first terminal is the terminal at no user interface.
The embodiment of the invention also discloses a kind of systems to be communicated based on symmetric key, whole the system comprises first End and second terminal;
Wherein, the first terminal includes:
Random number generation module, for generating random number;
First Symmetric key generation module, for being generated according to the random number and data preset in first terminal First symmetric key;
Prompt message generation module, for being directed to the random number generation prompt message;
Respond module responds the communication information for being based on first symmetric key;
The second terminal includes:
Second Symmetric key generation module, for receive for the prompt message obtain random number when, according to The second symmetric key is generated according to the random number and data preset in second terminal;
Communication module sends the communication information for being based on second symmetric key to first terminal.
Preferably, the communication module includes:
Submodule is encrypted, for network configuration parameters to be encrypted using second symmetric key, to obtain parameter Ciphertext;
Submodule is broadcasted, for broadcasting the parameter ciphertext to first terminal.
Preferably, the respond module includes:
Submodule is decrypted, for the parameter ciphertext to be decrypted using first symmetric key, to obtain network Parameter is configured;
Submodule is configured, for being configured using the network configuration parameters, to access network.
Preferably, the random number generation module includes:
Submodule is initially generated, for when using first time or during factory reset, generating random number.
Preferably, the prompt message generation module includes:
First driving submodule, for indicator light to be driven to flicker the number equal with the random number;
And/or
Second driving submodule, the random number is shown for drive digital tube.
Preferably, the first terminal is the terminal at no user interface.
The embodiment of the present invention includes advantages below:
The embodiment of the present invention is in first terminal and second terminal, the data dynamic generation based on random number and threshold value the One symmetric key and the second symmetric key, and communicated based on first symmetric key and the second symmetric key, it ensure that every The uniqueness of the key of secondary communication, improves the intensity of the first symmetric key and the second symmetric key, and then improves communication Safety.
Description of the drawings
Fig. 1 is a kind of step flow chart of embodiment of the method to be communicated based on symmetric key of the present invention;
Fig. 2 is a kind of structure diagram of system embodiment to be communicated based on symmetric key of the present invention.
Specific embodiment
In order to make the foregoing objectives, features and advantages of the present invention clearer and more comprehensible, it is below in conjunction with the accompanying drawings and specific real Applying mode, the present invention is described in further detail.
Since the control devices such as mobile phone generally tell the name of the smart machine of the no UI Wi-Fi to be connected using wireless communication Title and password, and the wireless signal of the control devices such as mobile phone transmitting has certain coverage area (7-8 meters or farther), therefore, During this, the wireless signal of the control devices such as mobile phone transmitting may be received by other equipment, be stolen there are Wi-Fi passwords Problem, this problem are not fairly obvious in only house, but brighter in the intensive environment of the users such as the commercial house or group rental It is aobvious.
Similarly, in the region that can be covered in the wireless signal of the control devices such as mobile phone, if there is one it is to be added and The equipment of user bound, then this equipment is possible to be set by malice and be connected on the Wi-Fi that attacker specifies, Ran Houtian The account of attacker is added to, leads to privacy leakage.
Since the information such as password are easily ravesdropping, if do not encrypted, arbitrary equipment can be heard, user matches in setting network When putting parameter, as soon as if there is attacker is monitored with a Wi-Fi equipment, the information such as password can be obtained.
If encryption, encrypting the key used needs to be stored in inside equipment, easily analyzed to crack.Once some manufacturer Device keys be cracked, then all equipment may be monitored in configuration and analyze the key messages such as user password.
Therefore, it is proposed to one of the core concepts of the embodiments of the present invention, the symmetric key based on dynamic generation carries out network The setting of parameter is configured, improves safety.
With reference to Fig. 1, a kind of step flow of embodiment of the method to communicate based on symmetric key of the present invention is shown Figure, specifically may include steps of:
Step 101, first terminal generation random number;
In the concrete realization, first terminal can be the terminal at no user interface, for example, intelligent socket, intelligent sound, intelligence Energy furniture, intelligent kitchen tools etc..
Wherein, user interface can refer to user (User) and machine (Machine) interacts the interface of operation, Yong Huke To be operated by the interface to machine.
In embodiments of the present invention, a random number can be generated, such as performs rand () random algorithm and calculates one Random number specifies some number to carry out the setting of network configuration parameters based on the random number as random number.
In one preferred embodiment of the invention, step 101 can include following sub-step:
Sub-step S11, first terminal generate random number when using first time or during factory reset.
Under normal circumstances, first terminal is when using or during factory reset first time, in init state, setting Parameter be acquiescence parameter.
Wherein, network configuration parameters are sky, network can not be accessed, such as WLAN (Wireless Local Area Networks, WLAN).At this point it is possible to trigger the setting procedure of network configuration parameters.
Certainly, the opportunity of above-mentioned generation random number is intended only as example, can basis when implementing the embodiment of the present invention Actual conditions set the opportunity of other generation random numbers, for example, pressing some button embodiment of the present invention when powering on to this not It limits.In addition, other than the opportunity of above-mentioned generation random number, those skilled in the art can also adopt according to actual needs With the opportunity of other generation random numbers, the embodiment of the present invention does not also limit this.
Step 102, first terminal is symmetrical according to the random number and data generation first preset in first terminal Key;
Using the embodiment of the present invention, data can be set in first terminal in advance, which can include one group or more Group character can be random length, such as any character, binary data.
In embodiments of the present invention, can the exclusive specific factor of first terminal, base be introduced with one random number of dynamic generation One or more groups of characters are combined according to preset rule of combination in the random number, locally produce new symmetric key (such as the first symmetric key).
Wherein, symmetric key encryption can be named private key encryption again, that is, send and receive the both sides of data use it is identical Key pair in plain text operation is encrypted and decrypted.
In one example, random number is added in some position in data, obtains the first symmetric key.
In another example, data can be shifted, the value of the displacement is random number, obtains the first symmetric key.
In another example, number each in data with random number is added, obtains the first symmetric key.
Certainly, the generating mode of above-mentioned first symmetric key is intended only as example, can be with when implementing the embodiment of the present invention The generating mode of other the first symmetric keys is set according to actual conditions, and the embodiment of the present invention does not limit this.In addition, it removes Outside the generating mode of above-mentioned first symmetric key, those skilled in the art can also use other first pairs according to actual needs Claim the generating mode of key, the embodiment of the present invention does not also limit this.
Step 103, first terminal generates prompt message for the random number;
In embodiments of the present invention, first terminal can generate corresponding prompt message after random number is generated.
It should be noted that the prompt message can be the prompt message of non-user interface.
In a kind of preferable example of the embodiment of the present invention, step 103 can include following sub-step:
Sub-step S21, first terminal driving indicator light flicker the number equal with the random number;
In this example, if having indicator light in first terminal, such as power supply indicator, signal lamp then can be with Based on the indicator light prompting user numerical value, that is, indicator light is driven to flicker the number equal with random number.
And/or
Sub-step S22, first terminal drive digital tube show the random number.
In this example, if having charactron in first terminal, such as intelligent electric cooker, intelligent electric cooking pot intelligentized Furniture are used It, then can be to be based on the charactron prompting user numerical value in charactron of display time etc., i.e. drive digital tube shows random number Value.
Certainly, above-mentioned prompt message is intended only as example, when implementing the embodiment of the present invention, can be set according to actual conditions Other prompt messages are put, the embodiment of the present invention does not limit this.In addition, other than above-mentioned prompt message, art technology Personnel can also use other prompt messages according to actual needs, and the embodiment of the present invention does not also limit this.
It should be noted that the prompt message can also carry the broadcast of random number, the embodiment of the present invention is to this It does not limit.
Step 104, second terminal is when receiving the random number for prompt message acquisition, according to described random Numerical value generates the second symmetric key with data preset in second terminal;
In a kind of situation, user can input random number after prompt message is observed in second terminal.
In another situation, second terminal can listen to the broadcast for carrying random number, and therefrom extraction is corresponding Random number
Using the embodiment of the present invention, the number identical with the data in first terminal can be set in second terminal in advance According to the data can also include one or more groups of characters, or random length, any character.
In embodiments of the present invention, the exclusive specific factor of first terminal can be introduced, based on the random number according to pre- If rule of combination one or more groups of characters are combined, locally produce new symmetric key (such as the second symmetric key).
In one example, random number is added in some position in data, obtains the second symmetric key.
In another example, data can be shifted, the value of the displacement is random number, obtains the second symmetric key.
In another example, number each in data with random number is added, obtains the second symmetric key.
Certainly, the generating mode of above-mentioned second symmetric key is intended only as example, can be with when implementing the embodiment of the present invention The generating mode of other the second symmetric keys is set according to actual conditions, and the embodiment of the present invention does not limit this.In addition, it removes Outside the generating mode of above-mentioned second symmetric key, those skilled in the art can also use other second pairs according to actual needs Claim the generating mode of key, the embodiment of the present invention does not also limit this.
It should be noted that the data (data, random number) of the first symmetric key of generation and the second symmetric key and side Formula is identical, i.e., the content of the first symmetric key and the second symmetric key is identical, is a pair of corresponding symmetric key.
Step 105, second terminal is based on second symmetric key and sends the communication information to first terminal;
In the concrete realization, second terminal can be communicated based on the second symmetric key with first terminal.
In one preferred embodiment of the invention, step 105 can include following sub-step:
Sub-step S31, second terminal is encrypted network configuration parameters using second symmetric key, to be joined Number ciphertext;
In practical applications, it is symmetrical close that AES, DES, 3DES, BLOWFISH, IDEA, FEAL etc. may be used in second terminal Network configuration parameters are encrypted in key Encryption Algorithm.
Network configuration parameters can be used for accessing the parameter information of network.
If for example, accessing WLAN by Wi-Fi, which can generally include SSID (Service Set Identifier, service set), password, in some cases, can also be including cipher mode etc..
Sub-step S32, second terminal broadcast the parameter ciphertext to first terminal.
In the concrete realization, first terminal can be located in consolidated network environment with second terminal, such as be located at the ring of Wi-Fi In border, sent by the physical layer of IP (Internet Protocol, the agreement interconnected between network) network and carry parameter ciphertext Broadcast, such as the data packet of UDP (User Datagram Protocol, User Datagram Protocol).
First terminal begins listening for the broadcast in consolidated network (such as Wi-Fi) after init state is entered, and such as receives The data packet of UDP.
Step 106, first terminal responds the communication information based on first symmetric key.
In the concrete realization, first terminal can be communicated based on the first symmetric key with second terminal.
In one preferred embodiment of the invention, step 106 can include following sub-step:
Sub-step S41, first terminal is decrypted the parameter ciphertext using first symmetric key, to obtain net Parameter is configured in network;
Sub-step S42, first terminal is configured using the network configuration parameters, to access network.
In embodiments of the present invention, first terminal is by broadcast, and such as the data packet (length) of UDP, get parms ciphertext, adopts Parameter ciphertext is decrypted with symmetric key encryption algorithms such as AES, DES, 3DES, BLOWFISH, IDEA, FEAL, obtains net Parameter is configured in network.
First terminal handover network pattern by connecting network, such as Wi-Fi, completes configuration.
After completing that access network is configured, symmetric key (such as the first symmetric key, the second symmetric key) failure, i.e., the Symmetric key (such as the first symmetric key, the second symmetric key) can be not based between one terminal and second terminal to communicate.
It should be noted that for embodiment of the method, in order to be briefly described, therefore it is all expressed as to a series of action group It closes, but those skilled in the art should know, the embodiment of the present invention is not limited by described sequence of movement, because according to According to the embodiment of the present invention, certain steps may be used other sequences or be carried out at the same time.Secondly, those skilled in the art also should Know, embodiment described in this description belongs to preferred embodiment, and the involved action not necessarily present invention is implemented Necessary to example.
With reference to Fig. 2, a kind of structure diagram of system embodiment to communicate based on symmetric key of the present invention is shown, The system can include first terminal 210 and second terminal 220;
Wherein, the first terminal 210 can specifically include following module:
Random number generation module 211, for generating random number;
First Symmetric key generation module 212, for according to the random number and data preset in first terminal Generate the first symmetric key;
Prompt message generation module 213, for being directed to the random number generation prompt message;
Respond module 214 responds the communication information for being based on first symmetric key;
The second terminal 220 can specifically include following module:
Second Symmetric key generation module 221, for receive for the prompt message obtain random number when, The second symmetric key is generated according to the random number and data preset in second terminal;
Communication module 222 sends the communication information for being based on second symmetric key to first terminal.
In one preferred embodiment of the invention, the communication module 222 can include following submodule:
Submodule is encrypted, for network configuration parameters to be encrypted using second symmetric key, to obtain parameter Ciphertext;
Submodule is broadcasted, for broadcasting the parameter ciphertext to first terminal.
In one preferred embodiment of the invention, the respond module 214 can include following submodule:
Submodule is decrypted, for the parameter ciphertext to be decrypted using first symmetric key, to obtain network Parameter is configured;
Submodule is configured, for being configured using the network configuration parameters, to access network.
In a kind of preferable example of the embodiment of the present invention, the random number generation module 211 can include following son Module:
Submodule is initially generated, for when using first time or during factory reset, generating random number.
In a kind of preferable example of the embodiment of the present invention, the prompt message generation module 213 can include following son Module:
First driving submodule, for indicator light to be driven to flicker the number equal with the random number;
And/or
Second driving submodule, the random number is shown for drive digital tube.
In the concrete realization, the first terminal can be the terminal at no user interface.
For system embodiment, since it is basicly similar to embodiment of the method, so description is fairly simple, it is related Part illustrates referring to the part of embodiment of the method.
Each embodiment in this specification is described by the way of progressive, the highlights of each of the examples are with The difference of other embodiment, just to refer each other for identical similar part between each embodiment.
It should be understood by those skilled in the art that, the embodiment of the embodiment of the present invention can be provided as method, apparatus or calculate Machine program product.Therefore, the embodiment of the present invention can be used complete hardware embodiment, complete software embodiment or combine software and The form of the embodiment of hardware aspect.Moreover, the embodiment of the present invention can be used one or more wherein include computer can With in the computer-usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) of program code The form of the computer program product of implementation.
The embodiment of the present invention be with reference to according to the method for the embodiment of the present invention, terminal device (system) and computer program The flowchart and/or the block diagram of product describes.It should be understood that flowchart and/or the block diagram can be realized by computer program instructions In each flow and/or block and flowchart and/or the block diagram in flow and/or box combination.These can be provided Computer program instructions are set to all-purpose computer, special purpose computer, Embedded Processor or other programmable data processing terminals Standby processor is to generate a machine so that is held by the processor of computer or other programmable data processing terminal equipments Capable instruction generation is used to implement in one flow of flow chart or multiple flows and/or one box of block diagram or multiple boxes The device for the function of specifying.
These computer program instructions, which may also be stored in, can guide computer or other programmable data processing terminal equipments In the computer-readable memory to work in a specific way so that the instruction being stored in the computer-readable memory generates packet The manufacture of command device is included, which realizes in one flow of flow chart or multiple flows and/or one side of block diagram The function of being specified in frame or multiple boxes.
These computer program instructions can be also loaded into computer or other programmable data processing terminal equipments so that Series of operation steps are performed on computer or other programmable terminal equipments to generate computer implemented processing, thus The instruction offer performed on computer or other programmable terminal equipments is used to implement in one flow of flow chart or multiple flows And/or specified in one box of block diagram or multiple boxes function the step of.
Although the preferred embodiment of the embodiment of the present invention has been described, those skilled in the art once know base This creative concept can then make these embodiments other change and modification.So appended claims are intended to be construed to Including preferred embodiment and fall into all change and modification of range of embodiment of the invention.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation Between there are any actual relationship or orders.Moreover, term " comprising ", "comprising" or its any other variant meaning Covering non-exclusive inclusion, so that process, method, article or terminal device including a series of elements are not only wrapped Those elements are included, but also including other elements that are not explicitly listed or are further included as this process, method, article Or the element that terminal device is intrinsic.In the absence of more restrictions, it is wanted by what sentence "including a ..." limited Element, it is not excluded that also there are other identical elements in the process including the element, method, article or terminal device.
Symmetric key is based on to a kind of method to communicate based on symmetric key provided by the present invention and one kind above The system to communicate, is described in detail, specific case used herein to the principle of the present invention and embodiment into Elaboration is gone, the explanation of above example is only intended to facilitate the understanding of the method and its core concept of the invention;Meanwhile for this The those skilled in the art in field, thought according to the present invention, there will be changes in specific embodiments and applications, In conclusion the content of the present specification should not be construed as limiting the invention.

Claims (10)

  1. A kind of 1. method to be communicated based on symmetric key, which is characterized in that including:
    First terminal generates random number;Wherein, the first terminal includes:The terminal at no user interface;
    First terminal generates the first symmetric key according to the random number and data preset in first terminal;
    First terminal generates prompt message for the random number;Including:First terminal driving indicator light flicker with it is described with The equal number of machine numerical value;
    Second terminal is when receiving the random number for prompt message acquisition, according to the random number and second Preset data generate the second symmetric key in terminal;
    Second terminal is based on second symmetric key and sends the communication information to first terminal;
    First terminal responds the communication information based on first symmetric key.
  2. 2. according to the method described in claim 1, it is characterized in that, the second terminal is based on second symmetric key to the The step of one terminal transmission communication information, includes:
    Second terminal is encrypted network configuration parameters using second symmetric key, to obtain parameter ciphertext;
    Second terminal broadcasts the parameter ciphertext to first terminal.
  3. 3. according to the method described in claim 2, it is characterized in that, the first terminal is based on first symmetric key to institute The step of communication information is responded is stated to include:
    First terminal is decrypted the parameter ciphertext using first symmetric key, to obtain network configuration parameters;
    First terminal is configured using the network configuration parameters, to access network.
  4. 4. according to the method described in claims 1 or 2 or 3, which is characterized in that the first terminal generates the step of random number Including:
    First terminal generates random number when using first time or during factory reset.
  5. 5. according to the method described in claims 1 or 2 or 3, which is characterized in that the first terminal is given birth to for the random number It is further included into the step of prompt message:
    First terminal drive digital tube shows the random number.
  6. 6. a kind of system to be communicated based on symmetric key, which is characterized in that the system comprises first terminal and second eventually End;
    Wherein, the first terminal includes:The terminal at no user interface;
    Wherein, the first terminal includes:
    Random number generation module, for generating random number;
    First Symmetric key generation module, for according to the random number and data generation first preset in first terminal Symmetric key;
    Prompt message generation module, for being directed to the random number generation prompt message;The prompt message generation module is also Including:First driving submodule, for indicator light to be driven to flicker the number equal with the random number;
    Respond module responds the communication information for being based on first symmetric key;
    The second terminal includes:
    Second Symmetric key generation module, for when receiving the random number obtained for the prompt message, according to institute It states random number and generates the second symmetric key with data preset in second terminal;
    Communication module sends the communication information for being based on second symmetric key to first terminal.
  7. 7. system according to claim 6, which is characterized in that the communication module includes:
    Submodule is encrypted, for network configuration parameters to be encrypted using second symmetric key, to obtain parameter ciphertext;
    Submodule is broadcasted, for broadcasting the parameter ciphertext to first terminal.
  8. 8. system according to claim 7, which is characterized in that the respond module includes:
    Submodule is decrypted, for the parameter ciphertext to be decrypted using first symmetric key, to obtain network configuration Parameter;
    Submodule is configured, for being configured using the network configuration parameters, to access network.
  9. 9. the system described according to claim 6 or 7 or 8, which is characterized in that the random number generation module includes:
    Submodule is initially generated, for when using first time or during factory reset, generating random number.
  10. 10. the system described according to claim 6 or 7 or 8, which is characterized in that the prompt message generation module further includes:
    Second driving submodule, the random number is shown for drive digital tube.
CN201510221865.5A 2015-05-04 2015-05-04 A kind of method and system to be communicated based on symmetric key Active CN104917753B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510221865.5A CN104917753B (en) 2015-05-04 2015-05-04 A kind of method and system to be communicated based on symmetric key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510221865.5A CN104917753B (en) 2015-05-04 2015-05-04 A kind of method and system to be communicated based on symmetric key

Publications (2)

Publication Number Publication Date
CN104917753A CN104917753A (en) 2015-09-16
CN104917753B true CN104917753B (en) 2018-07-10

Family

ID=54086459

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510221865.5A Active CN104917753B (en) 2015-05-04 2015-05-04 A kind of method and system to be communicated based on symmetric key

Country Status (1)

Country Link
CN (1) CN104917753B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106411513B (en) * 2016-12-02 2019-10-18 美的智慧家居科技有限公司 Cryptographic key negotiation method and device in local area network communication
CN108282330A (en) * 2017-12-29 2018-07-13 平安科技(深圳)有限公司 Key preserves and acquisition device, method and computer readable storage medium
CN108848503B (en) * 2018-06-14 2019-03-26 王佳骏 A kind of smart home dynamic encryption means of communication and system transmitted using merogenesis

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1592141A (en) * 2004-01-17 2005-03-09 中国电子科技集团公司第三十研究所 Terminal to terminal encryption method of cell phone voice and data
CN1921378B (en) * 2006-09-28 2010-07-28 中国移动通信集团公司 Method and system for negotiating new discrimination key
CN103905384A (en) * 2012-12-26 2014-07-02 北京握奇数据系统有限公司 Embedded inter-terminal session handshake realization method based on security digital certificate

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004045184A1 (en) * 2002-10-30 2004-05-27 Thomson Licensing S.A. Method for renewing symmetrical keys in a digital network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1592141A (en) * 2004-01-17 2005-03-09 中国电子科技集团公司第三十研究所 Terminal to terminal encryption method of cell phone voice and data
CN1921378B (en) * 2006-09-28 2010-07-28 中国移动通信集团公司 Method and system for negotiating new discrimination key
CN103905384A (en) * 2012-12-26 2014-07-02 北京握奇数据系统有限公司 Embedded inter-terminal session handshake realization method based on security digital certificate

Also Published As

Publication number Publication date
CN104917753A (en) 2015-09-16

Similar Documents

Publication Publication Date Title
KR101949116B1 (en) Proximity Discovery, Authentication and Link Establishment Between Mobile Devices in 3GPP LTE
JP6929390B2 (en) Wireless local area network configuration method and device
US11805411B2 (en) Establishing connections between WiFi access points and wireless devices via light fidelity access points
US9202042B2 (en) Automatic device pairing
EP3082354B1 (en) Location privacy protection methods and devices
CN108476140B (en) Method for safely controlling smart home and terminal equipment
US11122060B2 (en) Detection of security threats in a mesh network
CN103458399A (en) Intelligent WIFI module and method for configuring device supporting WIFI connection into WIFI network
WO2018137351A1 (en) Method, relevant device and system for processing network key
CN108270554B (en) Terminal pairing method and system
CN106656547B (en) Method and device for updating network configuration of household electrical appliance
CA2929173A1 (en) Key configuration method, system, and apparatus
CN105764058A (en) Network access method, device and system
CN106533662A (en) Methods and devices for transmitting network safety secret key
US10880079B2 (en) Private key generation method and system, and device
CN106105131A (en) device pairing
CN113630727B (en) Intelligent household network distribution method, device and system, electronic equipment and storage medium
US20180095500A1 (en) Tap-to-dock
CN104917753B (en) A kind of method and system to be communicated based on symmetric key
CN106851608A (en) Network setting method and system for networking device
CN112188488A (en) Network distribution method, device and system
CN105159121A (en) Household electrical appliance and on-off control method and system and intelligent apparatus
CN108494764B (en) Identity authentication method and device
Tuen Security in Internet of Things Systems
CN107483203B (en) Time-interval encryption method and device for data received by Internet of things access point

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant