CN105577680B - Key generation method, encrypted data analysis method, device and key management center - Google Patents

Key generation method, encrypted data analysis method, device and key management center Download PDF

Info

Publication number
CN105577680B
CN105577680B CN201610031369.8A CN201610031369A CN105577680B CN 105577680 B CN105577680 B CN 105577680B CN 201610031369 A CN201610031369 A CN 201610031369A CN 105577680 B CN105577680 B CN 105577680B
Authority
CN
China
Prior art keywords
key
terminal
management center
acquisition request
shared
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610031369.8A
Other languages
Chinese (zh)
Other versions
CN105577680A (en
Inventor
茹昭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qingdao Haier Intelligent Home Appliance Technology Co Ltd
Original Assignee
Qingdao Haier Intelligent Home Appliance Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qingdao Haier Intelligent Home Appliance Technology Co Ltd filed Critical Qingdao Haier Intelligent Home Appliance Technology Co Ltd
Priority to CN201610031369.8A priority Critical patent/CN105577680B/en
Publication of CN105577680A publication Critical patent/CN105577680A/en
Application granted granted Critical
Publication of CN105577680B publication Critical patent/CN105577680B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Selective Calling Equipment (AREA)

Abstract

本发明公开了一种密钥生成方法、解析加密数据方法、装置及密钥管理中心,本发明的密钥管理中心通过接收终端发送来的获取密钥请求;根据所述获取密钥请求生成密钥,将所述密钥发送给所述终端,以使所述终端利用所述密钥与家电设备进行安全通信,并将所述家电设备与网络连接,从而大大减少了密钥泄漏的风险,进而有效解决了现有技术中配置家电设备入网的安全性低的问题。

Figure 201610031369

The invention discloses a method for generating a key, a method for parsing encrypted data, a device and a key management center. The key management center of the invention receives a request for obtaining a key sent by a terminal; and generates a key according to the request for obtaining a key. key, and send the key to the terminal, so that the terminal can use the key to securely communicate with the home appliance and connect the home appliance to the network, thereby greatly reducing the risk of key leakage, Further, the problem of low security of configuring home appliances to access the network in the prior art is effectively solved.

Figure 201610031369

Description

Key generation method, encrypted data analysis method, device and key management center
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a key generation method, an encrypted data analysis device, and a key management center.
Background
The existing method for accessing the network of the household appliance is mainly to configure the household appliance to access the network by sending multicast messages through a mobile phone. However, the keys in the method are the same, that is, the terminals all use the same key to interact with the home appliance, so that the risk of key leakage is high.
Disclosure of Invention
The invention provides a key generation method, a method and a device for analyzing encrypted data and a key management center, which aim to solve the problem of low network access security of household electrical appliance configuration in the prior art.
One aspect of the present invention provides a method for generating a key, including:
receiving a key acquisition request sent by a terminal, wherein the key acquisition request carries an equipment identifier and a terminal identifier;
generating a secret key according to the secret key acquisition request, and sending the secret key to the terminal, wherein the secret key is used for enabling the terminal to be in safe communication with household appliances so as to connect the household appliances with a network;
wherein the key uniquely corresponds to the get key request.
Preferably, the method further comprises: setting a shared key corresponding to the household appliance according to the household appliance in advance, and setting a timestamp after receiving the key acquiring request;
the step of generating a key according to the key acquisition request specifically includes:
and generating the secret key according to the equipment identifier, the terminal identifier, the shared secret key and the timestamp.
Preferably, the generating a key according to the key obtaining request, and the sending the key to the terminal specifically includes:
and generating a key according to the key acquisition request, obtaining a corresponding public key according to the generated key, and sending the public key serving as a final key to the terminal.
Preferably, the method further comprises: setting a shared key corresponding to the household appliance according to the household appliance in advance, and setting a timestamp after receiving the key acquiring request;
the generating a key according to the key obtaining request and sending the key to the terminal specifically include:
and randomly generating a secret key, encrypting the secret key, the equipment identifier, the terminal identifier and the timestamp by the shared secret key to obtain an encrypted message, and sending the encrypted message and the secret key to the terminal.
Preferably, the method further comprises: setting a shared key corresponding to the household appliance according to the household appliance in advance, and setting a timestamp after receiving the key acquiring request;
the generating a key according to the key obtaining request and sending the key to the terminal specifically include:
randomly generating a pair of public key and private key, encrypting the private key, the equipment identifier, the terminal identifier and the timestamp by the shared key to obtain an encrypted message, taking the public key as a final key, and sending the encrypted message and the public key to the terminal.
Preferably, after the key obtaining request sent by the receiving terminal and before the key is generated according to the key obtaining request, the method further includes:
and judging whether the terminal is legal or not, and generating a key according to the key acquisition request when the terminal is judged to be legal.
In another aspect, the present invention provides a method for parsing encrypted data, the method comprising:
receiving encrypted data sent by a terminal, wherein the encrypted data is data obtained by encrypting preset networking data by the terminal according to a key generated by a key management center, the key is generated by the key management center according to a key acquisition request sent by the terminal, the key uniquely corresponds to the key acquisition request, and the key acquisition request carries an equipment identifier and a terminal identifier;
and analyzing the encrypted data to obtain the networking data, and accessing the network according to the networking data.
Preferably, the method further comprises: receiving a timestamp and a terminal identifier sent by the terminal;
the analyzing the encrypted data to obtain the networking data specifically includes:
obtaining the secret key according to the timestamp, the terminal identification, the equipment identification and the shared secret key, and analyzing the encrypted data according to the secret key to obtain the networking data;
the shared secret key is preset by the secret key management center according to household appliances; the timestamp is a time value set by the key management center after receiving a key acquisition request of the terminal.
Preferably, the analyzing the encrypted data to obtain the networking data specifically includes:
and obtaining a corresponding public key according to the secret key, and analyzing the encrypted data by taking the public key as a final secret key to obtain the networking data.
Preferably, the method further comprises: receiving an encrypted message sent by a terminal;
the analyzing the encrypted data to obtain the networking data specifically includes:
analyzing the encrypted message according to a shared key to obtain a timestamp and the key, and analyzing the encrypted data according to the key to obtain the networking data;
the shared secret key is preset by the secret key management center according to household appliances, and the timestamp is the time set by the secret key management center after receiving a secret key acquisition request of the terminal.
Preferably, the method further comprises: receiving an encrypted message sent by the terminal;
the analyzing the encrypted data to obtain the networking data specifically includes:
analyzing the encrypted message according to a shared key to obtain a timestamp and a private key, obtaining a corresponding public key according to the private key, and analyzing the encrypted data according to the public key to obtain the networking data;
the shared secret key is preset by the secret key management center according to household appliances, and the timestamp is the time set by the secret key management center after receiving a secret key acquisition request of the terminal.
Preferably, after the analyzing the encrypted data to obtain the networking data, before accessing the network according to the networking data, the method further includes:
and verifying the timestamp, and accessing the network according to the networking data when the timestamp is verified to be legal.
In still another aspect, the present invention provides a key generation apparatus, including:
the device comprises a receiving unit, a sending unit and a receiving unit, wherein the receiving unit is used for receiving a key obtaining request sent by a terminal, and the key obtaining request carries an equipment identifier and a terminal identifier;
and the generating unit is used for generating a key according to the key acquiring request and sending the key to the terminal, wherein the key is used for enabling the terminal to be in safe communication with the household appliance so as to connect the household appliance with a network, and the key uniquely corresponds to the key acquiring request.
Preferably, the apparatus further comprises: a setting unit;
the setting unit is used for setting a shared key corresponding to the household appliance according to the household appliance in advance, and setting a timestamp after receiving the key acquisition request;
the generating unit is further configured to generate the key according to the device identifier, the terminal identifier, the shared key, and the timestamp, and send the key to the terminal.
Preferably, the generating unit is further configured to generate a key according to the key obtaining request, obtain a corresponding public key according to the generated key, and send the public key to the terminal as a final key.
Preferably, the apparatus further comprises a setting unit;
the setting unit is used for setting a shared key corresponding to the household appliance according to the household appliance in advance, and setting a timestamp after receiving the key acquisition request;
the generating unit is further configured to randomly generate a secret key, encrypt the secret key, the device identifier, the terminal identifier, and the timestamp with the shared secret key to obtain an encrypted message, and send the encrypted message and the secret key to the terminal.
Preferably, the apparatus further comprises: a setting unit;
the setting unit is used for setting a shared key corresponding to the household appliance according to the household appliance in advance, and setting a timestamp after receiving the key acquisition request;
the generation unit is further configured to randomly generate a pair of a public key and a private key, encrypt the private key, the device identifier, the terminal identifier, and the timestamp with the shared key to obtain an encrypted message, use the public key as a final key, and send the encrypted message and the public key to the terminal.
In yet another aspect, the present invention further provides an apparatus for parsing encrypted data, including:
the terminal comprises a receiving module, a sending module and a receiving module, wherein the receiving module is used for receiving encrypted data sent by the terminal, the encrypted data is obtained by encrypting preset networking data by the terminal according to a key generated by a key management center, the key is generated by the key management center according to a key acquiring request sent by the terminal, the key uniquely corresponds to the key acquiring request, and the key acquiring request carries an equipment identifier and a terminal identifier;
and the analysis module is used for analyzing the encrypted data to obtain the networking data and accessing the network according to the networking data.
Preferably, the receiving module is further configured to receive a timestamp and a terminal identifier sent by the terminal;
the analysis is also used for obtaining the key according to the timestamp, the terminal identifier, the equipment identifier and the shared key, and analyzing the encrypted data according to the key to obtain the networking data;
the shared secret key is preset by the secret key management center according to household appliances, and the timestamp is the time set by the secret key management center after receiving a secret key acquisition request of the terminal.
Preferably, the receiving module is further configured to receive a timestamp and a terminal identifier sent by the terminal;
the analysis module is further configured to obtain a corresponding public key according to the secret key, and analyze the encrypted data using the public key as a final secret key to obtain the networking data.
Preferably, the receiving module is further configured to receive an encrypted message sent by the terminal;
the analysis module is further configured to analyze the encrypted message according to a shared key to obtain a timestamp and the key, and analyze the encrypted data according to the key to obtain the networking data;
the shared key is preset by the key management center according to household appliances, and the timestamp is the time set by the key management center after receiving a key acquisition request of the terminal.
Preferably, the receiving module is further configured to receive an encrypted message sent by the terminal;
the analysis module is further used for analyzing the encrypted message according to a shared secret key to obtain a timestamp and a private key, obtaining a corresponding public key according to the private key, and analyzing the encrypted data according to the public key to obtain the networking data;
the shared secret key is preset by the secret key management center according to household appliances, and the timestamp is the time set by the secret key management center after receiving a secret key acquisition request of the terminal.
Preferably, the apparatus further comprises a verification module;
and the verification module is used for verifying the timestamp and accessing the network according to the networking data when the timestamp is verified to be legal.
In still another aspect, the present invention provides a key management center including any one of the key generation apparatuses described above.
The invention has the following beneficial effects:
the key management center generates corresponding keys according to the key acquiring requests sent by the terminal, so that different key acquiring requests correspond to different keys, thereby greatly reducing the risk of key leakage and further effectively solving the problem of low security of the re-networking of the household appliances after the household appliances are configured to be networked and disconnected in the prior art.
Drawings
Fig. 1 is a schematic flow chart of a key generation method according to an embodiment of the present invention;
FIG. 2 is a schematic flow chart diagram of another key generation method according to an embodiment of the present invention;
FIG. 3 is a flow chart illustrating a further method for key generation according to an embodiment of the present invention;
FIG. 4 is a flow chart illustrating a further method for key generation according to an embodiment of the present invention;
FIG. 5 is a flow chart illustrating yet another key generation method according to an embodiment of the present invention;
FIG. 6 is a flow chart illustrating a method of parsing encrypted data according to an embodiment of the invention;
fig. 7 is a schematic structural diagram of a key generation apparatus according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of an apparatus for parsing encrypted data according to an embodiment of the present invention.
Detailed Description
In order to solve the problem of low security of network access of the household electrical equipment and network reconnection of the household electrical equipment after network disconnection in the prior art, the invention provides a key generation method, a key analysis method, a device and a key management center. The present invention will be described in further detail below with reference to the drawings and examples. It should be understood that the specific embodiments described herein are merely illustrative of the invention and do not limit the invention.
Method embodiment one
An embodiment of the present invention provides a key generation method, where an execution subject of the method is a key management center, and referring to fig. 1, the method includes:
s101, receiving a key acquisition request sent by a terminal, wherein the key acquisition request carries an equipment identifier and a terminal identifier;
and S102, generating a secret key according to the secret key acquisition request, and sending the secret key to the terminal, wherein the secret key is used for enabling the terminal to be in safe communication with the household appliance equipment so as to connect the household appliance equipment with a network, and the secret key is uniquely corresponding to the secret key acquisition request.
According to the method and the device, the corresponding key is generated according to the key acquiring request sent by the terminal, so that different key acquiring requests correspond to different keys, the risk of key leakage is greatly reduced, and the problem of low security of network access of the household electrical appliance equipment and network reconnection of the household electrical appliance equipment after network disconnection in the prior art is effectively solved.
That is, in the method according to the embodiment of the present invention, when the home appliance needs to be configured to access the network, or when the home appliance has already accessed the local area network but the local area network loses the connection with the internet, at this time, the terminal in the local area network wants to send some confidential information to the home appliance through the secure path, and the terminal may also apply for the key from the 3G network to the key management center, and establish a secure communication path according to the method of the present invention, so as to implement the connection between the home appliance and the network.
In specific implementation, the key obtaining request according to the embodiment of the present invention carries the device identifier dID and the terminal identifier tID, and certainly, a person skilled in the art may also carry other information in the key obtaining request, so as to be used by the key management center to generate a corresponding key, such as setting a number of the key obtaining request, and the like.
The device Identification dID is used for identifying the household electrical appliance to distinguish different household electrical appliances, the device Identification dID is acquired from the household electrical appliance by a terminal, and the specific acquisition method can be realized by scanning a two-dimensional code, Near Field Communication (NFC) contact, Personal Identification Number (PIN) manual input, sensor sensing and other modes.
The method of the embodiment of the invention further comprises the following steps:
setting a shared key corresponding to the household appliance according to the household appliance in advance, and setting a timestamp after receiving the key acquiring request;
step S102 in the embodiment of the present invention specifically includes:
and generating the secret key according to the equipment identifier, the terminal identifier, the shared secret key and the timestamp, and sending the secret key to the terminal so that the terminal can carry out safe communication with household appliances by using the secret key.
The method comprises the steps of setting different shared keys according to different household appliances in advance, generating the keys by the shared keys, the appliance identification, the terminal identification and the timestamp, sending the keys to the terminal, encrypting data to be sent to the household appliances by the terminal by using the keys to obtain encrypted data, and sending the encrypted data to the household appliances so as to realize the network access of the household appliances.
It should be noted that, in the key management center according to the embodiment of the present invention, a shared key corresponding to a home appliance needs to be set according to the home appliance, each shared key is stored, and the shared key is sent to the corresponding home appliance, so that the home appliance decrypts encrypted data. In addition, for greater security, the shared key is known only to the key management center and the corresponding home devices.
The method according to the invention will be illustrated below by means of a specific example:
fig. 2 is a schematic flow chart of another method for generating a secret key according to an embodiment of the present invention, and as shown in fig. 2, the method for configuring a home device to access a network includes:
1. a user logs in a key management center to authenticate the identity of a terminal and establishes a secure channel;
specifically, the terminal can establish a secure authenticated communication channel with the key management center by adopting a certificate mutual authentication mode. Of course, those skilled in the art may also use techniques such as Secure Sockets Layer (SSL) or Transport Layer Security (TLS), Internet protocol Security (IPsec) to establish a secure communication channel;
2. the terminal obtains a home appliance identifier dID;
the specific acquisition mode can be realized by scanning a two-dimensional code, NFC contact, manual PIN code input, sensor sensing and the like;
3. a terminal sends a key acquisition request to a key management center, wherein the request carries a self identifier (namely, a terminal identifier tID which can be a mobile phone number, MAC and the like) and a household appliance identifier dID;
4. the key management center judges whether the tID is a legal terminal;
5. the key management center finds a shared key master _ key of the device according to the dID;
6. the key management center generates a time stamp T;
7. the key management center calculates a key KeyD according to the master _ key, the dID, the tID and the T;
8. the key management center returns KeyD and T to the terminal;
9. the terminal encrypts the data m to be transmitted by using KeyD to obtain a ciphertext EKeyD(m);
10. Terminal sending EKeyD(m),tID,T;
11. Reception of Home appliance EKeyD(m),tID,T;
12. The home device verifies that the timestamp is valid;
13. the household appliance calculates a key KeyD according to the master _ key, the dID, the tID and the T;
14. KeyD decryption message E for household applianceKeyD(m) to obtain m.
It should be noted that, in the embodiment of the present invention, by adding the timestamp and verifying whether the timestamp is valid by the home appliance device, replay attack of others can be effectively prevented, so as to further enhance the security of network access of the home appliance device configured in the present invention and network reconnection of the home appliance device after network disconnection.
In the method according to the embodiment of the present invention, step S102 further includes: and generating a key according to the key acquisition request, obtaining a corresponding public key according to the generated key, and sending the public key serving as a final key to the terminal so that the terminal can carry out safe communication with the household appliance by using the public key to realize the network access of the household appliance, or the household appliance disconnected from the network is accessed to the network again.
Namely, in the embodiment of the invention, the key management center sets the public and private keys so as to further improve the network access security of the configured household electrical appliance.
Fig. 3 is a schematic flow chart of a further method for key generation according to an embodiment of the present invention, which will be described in detail below with reference to fig. 3, it should be noted that relevant portions of the method of fig. 3 can be understood with reference to the method described in fig. 2, and for the sake of brevity, the description is not repeated here:
1. a user logs in a key management center to authenticate the identity of a terminal and establishes a secure channel;
2. the method comprises the steps that a terminal obtains a home appliance identification dID, and the specific obtaining mode can be achieved by scanning a two-dimensional code, NFC contact, manual input of a PIN code, sensor sensing and the like;
3. the terminal sends a key obtaining request to the key management center, wherein the request message carries a self identifier tID (which can be a mobile phone number, MAC and the like) and a household appliance identifier dID;
4. the key management center judges whether the tID is a legal terminal;
5. the key management center finds a shared key master _ key of the device according to the dID;
6. the key management center generates a time stamp T;
7. the Key management center calculates a private Key Key _ pri according to the master _ Key, the dID, the tID and the T;
8. the Key management center calculates a public Key Key _ pub corresponding to Key _ pri;
9. the Key management center returns Key _ pub and T to the terminal;
10. the terminal encrypts data m to be sent by using Key _ pub to obtain a ciphertext EKey _ pub (m);
11. the terminal sends EKey _ pub (m), tID and T;
12. the household appliance equipment receives EKey _ pub (m), tID and T;
13. the home device verifies that the timestamp is valid;
14. the household appliance calculates a Key Key _ pri according to the master _ Key, the dID, the tID and the T;
15. the Key _ pri is used by the household appliance to decrypt the EKey _ pub (m) to obtain m.
The embodiment of the invention also provides another method for generating the secret key, which specifically comprises the following steps:
the method comprises the steps of setting a shared secret key corresponding to the household appliance in advance according to the household appliance, setting a timestamp after receiving a secret key obtaining request, randomly generating a secret key, encrypting the secret key, an appliance identifier, a terminal identifier and the timestamp through the shared secret key to obtain an encrypted message, and sending the encrypted message and the secret key to the terminal, so that the terminal utilizes the encrypted message and the secret key to carry out safe communication with the household appliance, and the purpose that the household appliance which is disconnected from a network is configured to be accessed to the network or the household appliance which is disconnected from the network is accessed to the network again is achieved.
That is, after receiving the key acquiring request, the key management center of the invention randomly generates a key, encrypts the key with other identifiers and timestamps to obtain an encrypted message, then sends the key and the encrypted message to the terminal, the terminal encrypts the information by using the key, and then sends the encrypted information and the encrypted message to the household appliance, thereby realizing the safe network access of the household appliance.
Fig. 4 is a schematic flow chart of a further method for key generation according to an embodiment of the present invention, which will be described in detail below with reference to fig. 4, and it should be noted that relevant portions of the method can be understood with reference to the method described in fig. 2, and for the sake of brevity, the description is not repeated here:
1. a user logs in a key management center to authenticate the identity of a terminal and establishes a secure channel;
2. the method comprises the steps that a terminal obtains a home appliance identification dID, and the specific obtaining mode can be achieved by scanning a two-dimensional code, NFC contact, manual input of a PIN code, sensor sensing and the like;
3. the terminal sends a key obtaining request to the key management center, wherein the request message carries a self identifier tID (which can be a mobile phone number, MAC and the like) and a household appliance identifier dID;
4. the key management center judges whether the tID is a legal terminal;
5. the key management center finds a shared key master _ key of the device according to the dID;
6. the key management center generates a key KeyD and a time stamp T;
7. the key management center encrypts KeyD, dID, tID and T by using master _ key to obtain Emaster _ key (KeyD, tID, dID and T);
8. the key management center returns KeyD, tID, dID, T and Emaster _ key (KeyD, tID, dID, T) to the terminal;
9. the terminal encrypts data m to be transmitted by using KeyD to obtain a ciphertext EKeyD (m);
10. the terminal sends EKeyD (m), Emaster _ key (KeyD, tID, dID, T);
11. the household appliance receives EKeyD (m), Emaster _ key (KeyD, tID, dID, T);
12. the home appliance equipment decrypts owner _ key (KeyD, tID, dID, T) by using master _ key to obtain KeyD, tID, dID, T;
13. the home device verifies that the timestamp is valid;
14. the home device decrypts the message ekeyd (m) with KeyD to obtain m.
The embodiment of the invention also provides a method for generating the key, which comprises the following steps:
the method comprises the steps of setting a shared secret key corresponding to the household appliance in advance according to the household appliance, setting a timestamp after receiving a secret key obtaining request, randomly generating a pair of public key and private key, encrypting the private key, an appliance identification, a terminal identification and the timestamp through the shared secret key to obtain an encrypted message, using the public key as a final secret key, and sending the encrypted message and the public key to the terminal, so that the terminal utilizes the encrypted message and the public key to carry out safe communication with the household appliance to realize the network access of the household appliance, or to re-access the household appliance disconnected with the network.
Fig. 5 is a flowchart of yet another method for generating a key according to an embodiment of the present invention, which is described below with reference to fig. 5:
1. a user logs in a key management center to authenticate the identity of a terminal and establishes a secure channel;
2. the method comprises the steps that a terminal obtains a home appliance identification dID, and the specific obtaining mode can be achieved by scanning a two-dimensional code, NFC contact, manual input of a PIN code, sensor sensing and the like;
3. the terminal sends a key obtaining request to the key management center, wherein the request message carries a self identifier tID (which can be a mobile phone number, MAC and the like) and a household appliance identifier dID;
4. the key management center judges whether the tID is a legal terminal;
5. the key management center finds a shared key master _ key of the device according to the dID;
6. the Key management center generates a public Key pair Key _ pub, a private Key pair Key _ pri and a time stamp T;
7. the Key management center encrypts Key _ pri, dID, tID and T by using master _ Key to obtain Emaster _ Key (Key _ pri, tID, dID and T);
8. the Key management center returns Key _ pub, tID, dID, T and Emaster _ Key (Key _ pri, tID, dID, T) to the terminal;
9. the terminal encrypts data m to be sent by using Key _ pub to obtain a ciphertext Ekey _ pub (m);
10. the terminal sends Ekey _ pub (m), Emaster _ Key (Key _ pri, tID, dID, T);
11. the household appliance equipment receives Ekey _ pub (m) and Emaster _ Key (Key _ pri, tID, dID and T);
12. the home appliance equipment decrypts owner _ Key (Key _ pri, tID, dID, T) by using master _ Key to obtain Key _ pri, tID, dID, T;
13. the home device verifies that the timestamp is valid;
14. the home appliance device decrypts the message Ekey _ pub (m) with Key _ pri to obtain m.
In summary, the present invention provides a method for a terminal to securely send configuration information to an intelligent home appliance, in which the terminal obtains an identifier of a home appliance, and sends the identifier and the identifier to a key management center to request a key, so as to obtain an encryption key generated by the key management center according to a shared key preset with the home appliance, and the terminal uses the encryption key to encrypt a message and securely transmit the message to the home appliance, thereby greatly reducing the risk of key leakage.
Method embodiment two
Corresponding to the method for key generation introduced in fig. 1, the present embodiment provides a method for parsing encrypted data, where an execution subject of the method is a home device, and referring to fig. 6, an execution subject of the method is a home device, and the method includes:
s601, receiving encrypted data sent by a terminal, wherein the encrypted data is obtained by encrypting preset networking data by the terminal according to a key generated by a key management center, the key is generated by the key management center according to a key acquisition request sent by the terminal, the key uniquely corresponds to the key acquisition request, and the key acquisition request carries an equipment identifier and a terminal identifier;
s602, analyzing the encrypted data to obtain the networking data, and accessing the network according to the networking data.
The keys of the invention are generated by the key management center according to the specific key acquisition request, namely, all the keys are different, thereby greatly reducing the risk of key leakage and further improving the network access safety of the household electrical appliance.
The key described in the embodiment of the present invention may be a key transmitted from the key management center through the terminal, or may be a key generated by the home appliance itself according to a method for generating a key by the key management center.
The encrypted data is obtained by encrypting data or messages by the terminal according to the key produced by the key management center, and after the household appliance receives the encrypted data, the household appliance analyzes the encrypted data to analyze the data or messages and configures an access network according to the data or messages.
The networking data described in the embodiment of the present invention is data for networking the home appliance and the key management center by the terminal, and of course, a person skilled in the art may encrypt other data according to the method described in the present invention as needed, so as to better ensure the security of the data.
The encrypted data is obtained by encrypting data to be transmitted by using a key generated by any one of the methods in the embodiment.
Corresponding to the method flow of key generation in fig. 2, the home appliance device according to the embodiment of the present invention further receives a timestamp and a terminal identifier sent by the terminal;
the analyzing the encrypted data to obtain the networking data in the embodiment of the present invention specifically includes:
obtaining the secret key according to the timestamp, the terminal identification, the equipment identification and the shared secret key, and analyzing the encrypted data according to the secret key to obtain the networking data;
the shared secret key is preset by the secret key management center according to household appliances; the timestamp is a time value set by the key management center after receiving a key acquisition request of the terminal.
That is, the home appliance device in the embodiment of the present invention obtains the key according to the corresponding shared key set by the key management center, the timestamp and the terminal identifier sent by the terminal, and the device identifier of the home appliance device itself, and analyzes the encrypted data according to the key to obtain specific networking data.
Corresponding to the method flow of key generation in fig. 3, the analyzing the encrypted data to obtain the networking data in the method according to the embodiment of the present invention specifically includes:
and obtaining a corresponding public key according to the secret key, and analyzing the encrypted data by taking the public key as a final secret key to obtain the networking data.
Namely, the invention further improves the security of configuring the network access of the household electrical appliance equipment by setting the public key corresponding to the secret key.
Corresponding to the method flow of key generation in fig. 4, the analyzing the encrypted data to obtain the networking data according to the method in the embodiment of the present invention specifically includes:
analyzing the encrypted message according to a shared key to obtain a timestamp and the key, and analyzing the encrypted data according to the key to obtain the networking data;
the shared secret key is preset by the secret key management center according to household appliances, and the timestamp is the time set by the secret key management center after receiving a secret key acquisition request of the terminal.
That is, the embodiment of the present invention obtains the key by parsing the encrypted message through the shared key.
Corresponding to the method flow of key generation in fig. 5, the analyzing the encrypted data to obtain the networking data in the embodiment of the present invention specifically includes:
analyzing the encrypted message according to a shared key to obtain a timestamp and a private key, obtaining a corresponding public key according to the private key, and analyzing the encrypted data according to the public key to obtain the networking data;
the shared secret key is preset by the secret key management center according to household appliances, and the timestamp is the time set by the secret key management center after receiving a secret key acquisition request of the terminal.
That is to say, the embodiment of the present invention sets the public and private key to better improve the security of configuring the home appliance to access the network.
After the analyzing the encrypted data to obtain the networking data and before accessing the network according to the networking data, the embodiment of the present invention further includes:
and verifying the timestamp, and accessing the network according to the networking data when the timestamp is verified to be legal.
Namely, the invention can effectively prevent other people from illegally attacking the household appliance by verifying the timestamp in the secret key through the household appliance, thereby further improving the safety of the household appliance accessing the network.
That is to say, the method of the present invention applies the secret key generated by the secret key management center in the first embodiment of the method to perform secure communication with the terminal, thereby greatly improving the security of the home appliance network access.
The key described in the present invention is obtained according to the method in the first method embodiment, and the related content can be understood with reference to the related part of the first method embodiment, which is not described herein again.
Apparatus embodiment one
An embodiment of the present invention provides a key generation apparatus, and referring to fig. 7, the apparatus includes a receiving unit and a generating unit coupled to each other, specifically:
the device comprises a receiving unit, a sending unit and a receiving unit, wherein the receiving unit is used for receiving a key obtaining request sent by a terminal, and the key obtaining request carries an equipment identifier and a terminal identifier;
the generation unit is used for generating a secret key according to the secret key acquisition request and sending the secret key to the terminal, wherein the secret key is used for enabling the terminal to be in safe communication with household appliances so as to connect the household appliances with a network;
wherein the key uniquely corresponds to the get key request.
According to the method and the device, the corresponding key is generated according to the key acquiring request sent by the terminal, so that different key acquiring requests correspond to different keys, the risk of key leakage is greatly reduced, and the problem of low security of network access of the household electrical appliance equipment and network reconnection of the household electrical appliance equipment after network disconnection in the prior art is effectively solved.
In specific implementation, the key obtaining request according to the embodiment of the present invention carries the device identifier dID and the terminal identifier tID, and certainly, a person skilled in the art may also carry other information in the key obtaining request, so as to be used by the key management center to generate a corresponding key, such as setting a number of the key obtaining request, and the like.
The device Identification dID is used for identifying the household electrical appliance to distinguish different household electrical appliances, the device Identification dID is acquired from the household electrical appliance by a terminal, and the specific acquisition method can be realized by scanning a two-dimensional code, Near Field Communication (NFC) contact, Personal Identification Number (PIN) manual input, sensor sensing and other modes.
The embodiment of the present invention further provides a preferred implementation manner, and the apparatus further includes: a setting unit;
the setting unit is used for setting a shared key corresponding to the household appliance according to the household appliance in advance, and setting a timestamp after receiving the key acquisition request;
the generating unit is specifically configured to generate the key according to the device identifier, the terminal identifier, the shared key, and the timestamp, and send the key to the terminal, so that the terminal performs secure communication with the home appliance by using the key, and connects the home appliance with a network.
The invention sets different shared keys according to different household appliances in advance, generates the shared keys with the appliance identification, the terminal identification and the timestamp, sends the keys to the terminal, and the terminal encrypts data to be sent to the household appliances by using the keys and sends the encrypted data to the household appliances so as to realize the network access of the household appliances.
It should be noted that, in the embodiment of the present invention, by adding the timestamp and verifying whether the timestamp is valid by the home appliance device, replay attack of others can be effectively prevented, so as to further enhance the security of network access of the home appliance device configured in the present invention and network reconnection of the home appliance device after network disconnection.
The generation unit in the embodiment of the present invention is further configured to generate a key according to the key acquisition request, obtain a corresponding public key according to the generated key, and send the public key to the terminal as a final key, so that the terminal performs secure communication with the home appliance device by using the public key.
Namely, in the embodiment of the invention, the key management center sets the public and private keys so as to further improve the security of the network access of the household electrical appliance after the network access of the household electrical appliance is configured and the network access of the household electrical appliance is reconnected after the network is disconnected.
The embodiment of the present invention further provides another preferred embodiment, and the apparatus of the present invention further includes: a setting unit;
the setting unit is used for setting a shared key corresponding to the household appliance according to the household appliance in advance, and setting a timestamp after receiving the key acquisition request;
the generation unit is further configured to randomly generate a secret key after receiving the secret key obtaining request, encrypt the secret key, the device identifier, the terminal identifier, and the timestamp with the shared secret key to obtain an encrypted message, and send the encrypted message and the secret key to the terminal, so that the terminal performs secure communication with the home appliance device by using the encrypted message and the secret key.
That is, after receiving the key acquiring request, the key management center of the present invention randomly generates a key, encrypts the key with other identifiers and timestamps to obtain an encrypted message, and then sends the key and the encrypted message to the terminal, which encrypts the information by using the key and then sends the encrypted information and the encrypted message to the home appliance, thereby achieving better security of the home appliance in the network.
The embodiment of the present invention further provides a preferred embodiment, and the apparatus of the present invention further includes: a setting unit;
the setting unit is used for setting a shared key corresponding to the household appliance according to the household appliance in advance, and setting a timestamp after receiving the key acquisition request;
the generation unit is further used for randomly generating a pair of public key and private key after receiving the key acquisition request, encrypting the private key, the equipment identifier, the terminal identifier and the timestamp through the shared key to obtain an encrypted message, using the public key as a final key, and sending the encrypted message and the public key to the terminal, so that the terminal utilizes the encrypted message and the public key to perform secure communication with the household appliance, and connects the household appliance with a network.
That is, after receiving the key acquisition request, the key management center of the present invention randomly generates a pair of public key and private key, encrypts the private key, the identifier and the timestamp with the shared key to obtain an encrypted message, and sends the encrypted message and the public key to the terminal, thereby realizing secure network access of the configured home appliance.
Relevant parts of the device embodiment of the invention can be understood by referring to the method embodiment part, and are not described herein again.
Device embodiment II
An embodiment of the present invention provides a device for parsing encrypted data, referring to fig. 8, where the device is disposed on a home appliance, and the device includes a receiving module and a parsing module that are coupled to each other, specifically:
the terminal comprises a receiving module, a sending module and a receiving module, wherein the receiving module is used for receiving encrypted data sent by the terminal, the encrypted data is obtained by encrypting preset networking data by the terminal according to a key generated by a key management center, the key is generated by the key management center according to a key acquiring request sent by the terminal, the key uniquely corresponds to the key acquiring request, and the key acquiring request carries an equipment identifier and a terminal identifier;
and the analysis module is used for analyzing the encrypted data to obtain the networking data and accessing the network according to the networking data.
The keys of the invention are generated by the key management center according to the specific key acquisition request, namely, all the keys are different, so that the risk of key leakage is reduced, and the network access safety of the household electrical appliance is improved.
The key described in the embodiment of the present invention may be a key transmitted from the key management center through the terminal, or may be a key generated by the home appliance itself according to a method for generating a key by the key management center.
The encrypted data is obtained by encrypting data to be transmitted by using a key generated by any one of the methods in the embodiment.
Preferably, the receiving module in the embodiment of the present invention is further configured to receive a timestamp and a terminal identifier sent by the terminal;
the analysis is also used for obtaining the key according to the timestamp, the terminal identifier, the equipment identifier and the shared key, and analyzing the encrypted data according to the key to obtain the networking data;
the shared secret key is preset by the secret key management center according to household appliances, and the timestamp is the time set by the secret key management center after receiving a secret key acquisition request of the terminal.
That is, the home appliance device in the embodiment of the present invention obtains the key according to the corresponding shared key set by the key management center, the timestamp and the terminal identifier sent by the terminal, and the device identifier of the home appliance device itself, and analyzes the encrypted data according to the key to obtain specific networking data.
Preferably, the receiving module of the apparatus of the present invention is further configured to receive a timestamp and a terminal identifier sent by the terminal; the analysis module is further configured to obtain a corresponding public key according to the secret key, and analyze the encrypted data using the public key as a final secret key to obtain the networking data.
Namely, the invention further improves the security of configuring the network access of the household electrical appliance equipment by setting the public key corresponding to the secret key.
Preferably, the receiving module of the apparatus according to the embodiment of the present invention is further configured to receive an encrypted message sent by the terminal; the analysis module is further configured to analyze the encrypted message according to a shared key to obtain a timestamp and the key, and analyze the encrypted data according to the key to obtain the networking data; the shared key is preset by the key management center according to household appliances, and the timestamp is the time set by the key management center after receiving a key acquisition request of the terminal.
Preferably, the receiving module of the apparatus according to the embodiment of the present invention is further configured to receive an encrypted message sent by the terminal; the analysis module is further used for analyzing the encrypted message according to a shared secret key to obtain a timestamp and a private key, obtaining a corresponding public key according to the private key, and analyzing the encrypted data according to the public key to obtain the networking data; the shared secret key is preset by the secret key management center according to household appliances, and the timestamp is the time set by the secret key management center after receiving a secret key acquisition request of the terminal.
Preferably, the device of the present invention further comprises a verification module;
and the verification module is used for verifying the timestamp in the secret key and enabling the household appliance to access the network according to the networking data when the timestamp is verified to be legal.
Namely, the invention can effectively prevent other people from illegally attacking the household appliance by verifying the timestamp in the secret key through the household appliance, thereby further improving the safety of the household appliance accessing the network.
That is to say, the method of the present invention applies the secret key generated by the secret key management center in the first embodiment of the method to perform secure communication with the terminal, thereby greatly improving the security of the home appliance network access.
Relevant parts of the device embodiment of the invention can be understood by referring to the method embodiment part, and are not described herein again.
Key management center embodiments
The embodiment of the invention provides a key management center, which comprises any one of the devices in the device embodiments, so that the security of the re-network of the household electrical appliance after the household electrical appliance is configured to access the network and the network is disconnected is improved.
The related content in the embodiments of the present invention can be understood by referring to the apparatus embodiments and the method embodiments, and will not be described herein again.
The invention can at least achieve the following beneficial effects:
1. different terminals or different devices of the invention share different passwords at different times, thereby greatly reducing the risk of secret key leakage;
2. before generating the key, the key management center judges the legality of the terminal, thereby further improving the security of the network access of the household electrical appliance configured and the network re-access of the household electrical appliance after the network is disconnected;
3. the method of the invention adds the timestamp, thereby effectively preventing replay attack of others and improving the safety of the household appliance which is configured to access the network and the household appliance which is disconnected from the network to access the network again to a certain extent.
Although the preferred embodiments of the present invention have been disclosed for illustrative purposes, those skilled in the art will appreciate that various modifications, additions and substitutions are possible, and the scope of the invention should not be limited to the embodiments described above.

Claims (20)

1.一种密钥生成方法,其特征在于,包括:1. a key generation method, is characterized in that, comprises: 接收终端发送来的获取密钥请求,所述获取密钥请求中携带设备标识和终端标识;receiving a key acquisition request sent by the terminal, where the key acquisition request carries a device identifier and a terminal identifier; 根据所述获取密钥请求生成密钥,将所述密钥发送给所述终端,其中,所述密钥用于使所述终端与家电设备进行安全通信,以将所述家电设备与网络连接;A key is generated according to the key acquisition request, and the key is sent to the terminal, wherein the key is used to enable the terminal to securely communicate with a home appliance, so as to connect the home appliance to a network ; 其中,所述密钥与所述获取密钥请求唯一对应;Wherein, the key is uniquely corresponding to the request for obtaining a key; 该方法还包括:预先根据所述家电设备设置与所述家电设备相对应的共享密钥,并在接收到所述获取密钥请求后,设置时间戳;The method further includes: setting a shared key corresponding to the home appliance according to the home appliance in advance, and after receiving the key acquisition request, setting a time stamp; 所述根据所述获取密钥请求生成密钥的步骤具体包括:The step of generating a key according to the key acquisition request specifically includes: 根据所述设备标识、所述终端标识、所述共享密钥以及所述时间戳生成所述密钥。The key is generated according to the device identification, the terminal identification, the shared key and the timestamp. 2.根据权利要求1所述的方法,其特征在于,所述根据所述获取密钥请求生成密钥,将所述密钥发送给所述终端具体包括:2. The method according to claim 1, wherein the generating a key according to the key acquisition request, and sending the key to the terminal specifically comprises: 根据所述获取密钥请求生成密钥,并根据生成的所述密钥得到其对应的公钥,将所述公钥作为最终的密钥发送给所述终端。A key is generated according to the key acquisition request, a corresponding public key is obtained according to the generated key, and the public key is sent to the terminal as a final key. 3.根据权利要求1所述的方法,其特征在于,还包括:预先根据所述家电设备设置与所述家电设备相对应的共享密钥,并在接收到所述获取密钥请求后,设置时间戳;3. The method according to claim 1, further comprising: setting a shared key corresponding to the home appliance according to the home appliance in advance, and after receiving the key acquisition request, setting timestamp; 所述根据所述获取密钥请求生成密钥,将所述密钥发送给所述终端具体包括:The generating a key according to the key obtaining request, and sending the key to the terminal specifically includes: 随机产生一个密钥,将该随机产生的密钥、所述设备标识、所述终端标识以及所述时间戳通过所述共享密钥进行加密得到加密消息,并将所述加密消息以及所述共享密钥发送给所述终端。Randomly generate a key, encrypt the randomly generated key, the device ID, the terminal ID and the time stamp with the shared key to obtain an encrypted message, and encrypt the encrypted message and the shared key. The key is sent to the terminal. 4.根据权利要求1所述的方法,其特征在于,还包括:预先根据所述家电设备设置与所述家电设备相对应的共享密钥,并在接收到所述获取密钥请求后,设置时间戳;4. The method according to claim 1, further comprising: setting a shared key corresponding to the home appliance according to the home appliance in advance, and after receiving the key acquisition request, setting timestamp; 所述根据所述获取密钥请求生成密钥,将所述密钥发送给所述终端具体包括:The generating a key according to the key obtaining request, and sending the key to the terminal specifically includes: 随机产生一对公钥和私钥,将所述私钥、所述设备标识、所述终端标识以及所述时间戳通过所述共享密钥进行加密得到加密消息,将所述公钥作为最终的密钥,并将所述加密消息以及所述公钥发送给所述终端。Randomly generate a pair of public key and private key, encrypt the private key, the device ID, the terminal ID, and the timestamp through the shared key to obtain an encrypted message, and use the public key as the final key, and send the encrypted message and the public key to the terminal. 5.根据权利要求1、3或4所述的方法,其特征在于,所述接收终端发送来的获取密钥请求之后,所述根据所述获取密钥请求生成密钥之前,还包括:5. The method according to claim 1, 3 or 4, wherein after the receiving the key acquisition request sent by the terminal, before generating the key according to the key acquisition request, the method further comprises: 判断所述终端是否合法,当判定所述终端合法时,根据所述获取密钥请求生成密钥。It is determined whether the terminal is legal, and when it is determined that the terminal is legal, a key is generated according to the key acquisition request. 6.一种解析加密数据的方法,其特征在于,包括:6. A method for parsing encrypted data, comprising: 接收终端发送来的加密数据,其中,所述加密数据是所述终端根据密钥管理中心生成的密钥对预设的连网数据进行加密而得到的数据,且所述密钥是所述密钥管理中心根据所述终端发来的获取密钥请求生成的,所述密钥与所述获取密钥请求唯一对应,所述获取密钥请求中携带设备标识和终端标识;Receive the encrypted data sent by the terminal, wherein the encrypted data is the data obtained by the terminal encrypting the preset networking data according to the key generated by the key management center, and the key is the encrypted data. Generated by the key management center according to a request for obtaining a key sent by the terminal, the key uniquely corresponds to the request for obtaining a key, and the request for obtaining a key carries a device identifier and a terminal identifier; 对所述加密数据进行解析得到所述连网数据,并根据所述连网数据接入网络;Parsing the encrypted data to obtain the networking data, and accessing the network according to the networking data; 该方法还包括:接收所述终端发送来的时间戳和终端标识;The method further includes: receiving a timestamp and a terminal identifier sent by the terminal; 所述对所述加密数据进行解析得到所述连网数据具体包括:The obtaining of the networking data by parsing the encrypted data specifically includes: 根据所述时间戳、所述终端标识、设备标识和共享密钥得到所述密钥,并根据所述密钥对所述加密数据进行解析得到所述连网数据;Obtain the key according to the timestamp, the terminal identification, the device identification and the shared key, and parse the encrypted data according to the key to obtain the networking data; 其中,所述共享密钥为所述密钥管理中心根据家电设备而预先设置的;所述时间戳为所述密钥管理中心在接收到所述终端的获取密钥请求后而设置的时间值。The shared key is preset by the key management center according to the home appliance; the time stamp is a time value set by the key management center after receiving the key acquisition request from the terminal . 7.根据权利要求6所述的方法,其特征在于,所述对所述加密数据进行解析得到所述连网数据具体包括:7. The method according to claim 6, wherein the obtaining the networking data by parsing the encrypted data specifically comprises: 根据所述密钥得到其对应的公钥,将所述公钥作为最终的密钥对所述加密数据进行解析得到所述连网数据。The corresponding public key is obtained according to the key, and the public key is used as the final key to parse the encrypted data to obtain the networking data. 8.根据权利要求6所述的方法,其特征在于,还包括:接收终端发送来的加密消息;8. The method according to claim 6, further comprising: receiving an encrypted message sent by the terminal; 所述对所述加密数据进行解析得到所述连网数据具体包括:The obtaining of the networking data by parsing the encrypted data specifically includes: 根据共享密钥对所述加密消息进行解析,得到时间戳和所述密钥,根据所述密钥对所述加密数据进行解析得到所述连网数据;Parsing the encrypted message according to the shared key to obtain a timestamp and the key, and parsing the encrypted data according to the key to obtain the networking data; 其中,所述共享密钥为所述密钥管理中心根据家电设备而预先设置的,所述时间戳为所述密钥管理中心在接收到所述终端的获取密钥请求后而设置的时间。The shared key is preset by the key management center according to the household appliance, and the time stamp is the time set by the key management center after receiving the key acquisition request from the terminal. 9.根据权利要求6所述的方法,其特征在于,还包括:接收所述终端发送来的加密消息;9. The method according to claim 6, further comprising: receiving an encrypted message sent by the terminal; 所述对所述加密数据进行解析得到所述连网数据具体包括:The obtaining of the networking data by parsing the encrypted data specifically includes: 根据共享密钥对所述加密消息进行解析,得到时间戳和私钥,并根据该私钥得到其对应的公钥,根据所述公钥对所述加密数据进行解析得到所述连网数据;Analyze the encrypted message according to the shared key to obtain a timestamp and a private key, obtain the corresponding public key according to the private key, and parse the encrypted data according to the public key to obtain the networking data; 其中,所述共享密钥为所述密钥管理中心根据家电设备而预先设置的,所述时间戳为所述密钥管理中心在接收到所述终端的获取密钥请求后而设置的时间。The shared key is preset by the key management center according to the household appliance, and the time stamp is the time set by the key management center after receiving the key acquisition request from the terminal. 10.根据权利要求6、7或9所述的方法,其特征在于,所述对所述加密数据进行解析得到所述连网数据之后,所述根据所述连网数据接入网络之前,还包括:10 . The method according to claim 6 , 7 or 9 , wherein after the networked data is obtained by parsing the encrypted data, before the network access according to the networked data, the method further 10 . include: 对所述时间戳进行验证,并在验证所述时间戳合法时,根据所述连网数据接入网络。The time stamp is verified, and when it is verified that the time stamp is valid, the network is accessed according to the networking data. 11.一种密钥生成装置,其特征在于,包括:11. A key generation device, characterized in that, comprising: 接收单元,用于接收终端发送来的获取密钥请求,所述获取密钥请求中携带设备标识和终端标识;a receiving unit, configured to receive a key acquisition request sent by the terminal, where the key acquisition request carries a device identifier and a terminal identifier; 生成单元,用于根据所述获取密钥请求生成密钥,将所述密钥发送给所述终端,其中,所述密钥用于使所述终端与家电设备进行安全通信,以将所述家电设备与网络连接,所述密钥与所述获取密钥请求唯一对应;A generating unit, configured to generate a key according to the key acquisition request, and send the key to the terminal, wherein the key is used to enable the terminal to perform secure communication with the home appliance, so as to transmit the key to the terminal. The home appliance is connected to the network, and the key uniquely corresponds to the request for obtaining the key; 还包括:设置单元;Also includes: setting unit; 所述设置单元,用于预先根据所述家电设备设置与所述家电设备相对应的共享密钥,并在接收到所述获取密钥请求后,设置时间戳;the setting unit, configured to set a shared key corresponding to the home appliance according to the home appliance in advance, and after receiving the key acquisition request, set a time stamp; 所述生成单元还用于,根据所述设备标识、所述终端标识、所述共享密钥以及所述时间戳生成所述密钥,并将所述密钥发送给所述终端。The generating unit is further configured to generate the key according to the device identifier, the terminal identifier, the shared key and the timestamp, and send the key to the terminal. 12.根据权利要求11所述的装置,其特征在于,12. The apparatus of claim 11, wherein 所述生成单元还用于,根据所述获取密钥请求生成密钥,并根据生成的所述密钥得到其对应的公钥,将所述公钥作为最终的密钥发送给所述终端。The generating unit is further configured to generate a key according to the key acquisition request, obtain a corresponding public key according to the generated key, and send the public key to the terminal as a final key. 13.根据权利要求11所述的装置,其特征在于,还包括:设置单元;13. The device of claim 11, further comprising: a setting unit; 所述设置单元,用于预先根据所述家电设备设置与所述家电设备相对应的共享密钥,并在接收到所述获取密钥请求后,设置时间戳;the setting unit, configured to set a shared key corresponding to the home appliance according to the home appliance in advance, and after receiving the key acquisition request, set a time stamp; 所述生成单元还用于,随机产生一个密钥,将该随机产生的密钥、所述设备标识、所述终端标识以及所述时间戳通过所述共享密钥进行加密得到加密消息,并将所述加密消息以及所述共享密钥发送给所述终端。The generating unit is further configured to randomly generate a key, encrypt the randomly generated key, the device identification, the terminal identification and the time stamp through the shared key to obtain an encrypted message, and The encrypted message and the shared key are sent to the terminal. 14.根据权利要求11所述的装置,其特征在于,还包括:设置单元;14. The device of claim 11, further comprising: a setting unit; 所述设置单元,用于预先根据所述家电设备设置与所述家电设备相对应的共享密钥,并在接收到所述获取密钥请求后,设置时间戳;the setting unit, configured to set a shared key corresponding to the home appliance according to the home appliance in advance, and after receiving the key acquisition request, set a time stamp; 所述生成单元还用于,随机产生一对公钥和私钥,将所述私钥、所述设备标识、所述终端标识以及所述时间戳通过所述共享密钥进行加密得到加密消息,将所述公钥作为最终的密钥,并将所述加密消息以及所述公钥发送给所述终端。The generating unit is further configured to randomly generate a pair of public key and private key, and encrypt the private key, the device identification, the terminal identification and the time stamp with the shared key to obtain an encrypted message, The public key is used as the final key, and the encrypted message and the public key are sent to the terminal. 15.一种解析加密数据的装置,其特征在于,包括:15. A device for parsing encrypted data, comprising: 接收模块,用于接收终端发送来的加密数据,其中,所述加密数据是所述终端根据密钥管理中心生成的密钥对预设的连网数据进行加密而得到的数据,且所述密钥是所述密钥管理中心根据所述终端发来的获取密钥请求生成的,所述密钥与所述获取密钥请求唯一对应,所述获取密钥请求中携带设备标识和终端标识;The receiving module is configured to receive encrypted data sent by the terminal, wherein the encrypted data is the data obtained by the terminal encrypting the preset networking data according to the key generated by the key management center, and the encrypted data is obtained by encrypting the preset networking data. The key is generated by the key management center according to a request for obtaining a key sent by the terminal, the key uniquely corresponds to the request for obtaining a key, and the request for obtaining a key carries a device identifier and a terminal identifier; 解析模块,用于对所述加密数据进行解析得到所述连网数据,并根据所述连网数据接入网络;a parsing module, configured to parse the encrypted data to obtain the networking data, and access the network according to the networking data; 所述接收模块还用于,接收所述终端发送来的时间戳和终端标识;The receiving module is further configured to receive the timestamp and the terminal identifier sent by the terminal; 所述解析还用于,根据所述时间戳、所述终端标识、设备标识和共享密钥得到所述密钥,并根据所述密钥对所述加密数据进行解析得到所述连网数据;The parsing is further used to obtain the key according to the timestamp, the terminal identifier, the device identifier and the shared key, and to parse the encrypted data according to the key to obtain the networking data; 其中,所述共享密钥为所述密钥管理中心根据家电设备而预先设置的,所述时间戳为所述密钥管理中心在接收到所述终端的获取密钥请求后而设置的时间。The shared key is preset by the key management center according to the home appliance, and the time stamp is the time set by the key management center after receiving the key acquisition request from the terminal. 16.根据权利要求15所述的装置,其特征在于,16. The apparatus of claim 15, wherein 所述接收模块还用于,接收所述终端发送来的时间戳和终端标识;The receiving module is further configured to receive the timestamp and the terminal identifier sent by the terminal; 所述解析模块还用于,根据所述密钥得到其对应的公钥,将所述公钥作为最终的密钥对所述加密数据进行解析得到所述连网数据。The parsing module is further configured to obtain the corresponding public key according to the key, and use the public key as the final key to parse the encrypted data to obtain the networking data. 17.根据权利要求15所述的装置,其特征在于,17. The apparatus of claim 15, wherein 所述接收模块还用于,接收所述终端发送来的加密消息;The receiving module is further configured to receive an encrypted message sent by the terminal; 所述解析模块还用于,根据共享密钥对所述加密消息进行解析,得到时间戳和所述密钥,根据所述密钥对所述加密数据进行解析得到所述连网数据;The parsing module is further configured to parse the encrypted message according to the shared key to obtain a timestamp and the key, and parse the encrypted data according to the key to obtain the networking data; 其中,所述共享密钥是所述密钥管理中心根据家电设备而预先设置的,所述时间戳为所述密钥管理中心在接收到所述终端的获取密钥请求后而设置的时间。The shared key is preset by the key management center according to the home appliance, and the time stamp is the time set by the key management center after receiving the key acquisition request from the terminal. 18.根据权利要求15所述的装置,其特征在于,18. The apparatus of claim 15, wherein 所述接收模块还用于,接收所述终端发送来的加密消息;The receiving module is further configured to receive an encrypted message sent by the terminal; 所述解析模块还用于,根据共享密钥对所述加密消息进行解析,得到时间戳和私钥,并根据该私钥得到其对应的公钥,根据所述公钥对所述加密数据进行解析得到所述连网数据;The parsing module is further configured to parse the encrypted message according to the shared key, obtain a timestamp and a private key, obtain its corresponding public key according to the private key, and perform the encrypted data analysis according to the public key. parsing to obtain the networking data; 其中,所述共享密钥为所述密钥管理中心根据家电设备而预先设置的,所述时间戳为所述密钥管理中心在接收到所述终端的获取密钥请求后而设置的时间。The shared key is preset by the key management center according to the household appliance, and the time stamp is the time set by the key management center after receiving the key acquisition request from the terminal. 19.根据权利要求15、17或18所述的装置,其特征在于,还包括验证模块;19. The apparatus according to claim 15, 17 or 18, characterized in that, further comprising a verification module; 所述验证模块,用于对所述时间戳进行验证,并在验证所述时间戳合法时,根据所述连网数据接入网络。The verification module is used for verifying the time stamp, and when verifying that the time stamp is legal, access the network according to the networking data. 20.一种密钥管理中心,其特征在于,该密钥管理中心包括权利要求11-14中任意一项所述的装置。20. A key management center, characterized in that the key management center comprises the device according to any one of claims 11-14.
CN201610031369.8A 2016-01-18 2016-01-18 Key generation method, encrypted data analysis method, device and key management center Active CN105577680B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610031369.8A CN105577680B (en) 2016-01-18 2016-01-18 Key generation method, encrypted data analysis method, device and key management center

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610031369.8A CN105577680B (en) 2016-01-18 2016-01-18 Key generation method, encrypted data analysis method, device and key management center

Publications (2)

Publication Number Publication Date
CN105577680A CN105577680A (en) 2016-05-11
CN105577680B true CN105577680B (en) 2021-03-26

Family

ID=55887337

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610031369.8A Active CN105577680B (en) 2016-01-18 2016-01-18 Key generation method, encrypted data analysis method, device and key management center

Country Status (1)

Country Link
CN (1) CN105577680B (en)

Families Citing this family (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106130958B (en) * 2016-06-08 2019-02-01 美的集团股份有限公司 The communication system and method for household appliance and terminal, household appliance, terminal
CN105959189B (en) * 2016-06-08 2019-09-13 美的集团股份有限公司 Household appliance and its with the communication system and method for Cloud Server and terminal, terminal
CN106506289B (en) * 2016-10-31 2020-05-01 邯郸美的制冷设备有限公司 Networking method and device, router and intelligent household appliance
CN106411715B (en) * 2016-11-02 2019-11-19 中国人民公安大学 A kind of security instant communication method and system based on cloud
EP3334188B1 (en) 2016-12-08 2021-03-24 GN Hearing A/S Hearing device, user application, and method of creating a trusted bond between hearing device and user application
US11522685B2 (en) * 2017-04-14 2022-12-06 Mitsubishi Electric Corporation Key management system, communication device and key sharing method
CN107171791A (en) * 2017-05-24 2017-09-15 舒翔 A kind of data encryption/decryption method and encrypting and deciphering system based on biological characteristic
CN107332661A (en) * 2017-06-29 2017-11-07 环球智达科技(北京)有限公司 The method of data encryption
CN107171797A (en) * 2017-07-18 2017-09-15 郑州云海信息技术有限公司 A kind of data ciphering method and device
CN109617678A (en) * 2018-11-20 2019-04-12 上海庆科信息技术有限公司 Intelligent lock system and password store method, device, equipment, computer media
CN109547445B (en) * 2018-11-27 2021-05-14 北京酷我科技有限公司 Method and system for verifying legality of network request of client
CN110519052B (en) * 2019-08-23 2022-07-05 青岛海尔科技有限公司 Data interaction method and device based on Internet of Things operating system
CN112448808B (en) * 2019-08-29 2024-09-20 斑马智行网络(香港)有限公司 Communication method, device, access point, server, system and storage medium
CN112448811A (en) * 2019-09-03 2021-03-05 上海云从汇临人工智能科技有限公司 Data security management method, data security management device and data security management system
CN110784317B (en) * 2019-10-30 2022-09-13 京东方科技集团股份有限公司 Data encryption interaction method, device and system
CN111277574B (en) * 2020-01-14 2022-05-17 杭州涂鸦信息技术有限公司 Method and system for generating timeliness offline secret key for secure communication of shared equipment
CN111565107B (en) * 2020-07-14 2020-11-27 腾讯科技(深圳)有限公司 Key processing method and device based on cloud service platform and computer equipment
CN114258013B (en) * 2020-09-11 2023-10-31 中国联合网络通信集团有限公司 Data encryption methods, equipment and storage media
CN115529130B (en) * 2022-11-25 2023-04-25 无锡沐创集成电路设计有限公司 Data processing method, terminal, server, system, device, medium and product
CN116782210B (en) * 2023-08-07 2024-04-30 数盾信息科技股份有限公司 Dynamic encryption key generation method of high-speed encryption algorithm

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005229489A (en) * 2004-02-16 2005-08-25 Matsushita Electric Ind Co Ltd Common information generation method and communication system for internet home appliances
CN102202291A (en) * 2010-03-22 2011-09-28 中国移动通信集团公司 Card-free terminal, service access method and system thereof, terminal with card and bootstrapping server function (BSF)
CN103309307A (en) * 2013-05-15 2013-09-18 重庆邮电大学 Smart household appliance control method based on object access control
CN103795560A (en) * 2012-11-01 2014-05-14 云永科技股份有限公司 Management method of networked device identifier and networked device
EP2814273A1 (en) * 2013-06-10 2014-12-17 Whirlpool Corporation Method of connecting an appliance to a WIFI network
CN104244030A (en) * 2014-09-17 2014-12-24 四川迪佳通电子有限公司 Recorded program sharing method and system
CN104506497A (en) * 2014-12-10 2015-04-08 青岛海信电器股份有限公司 Information issuing method and system
CN104793508A (en) * 2015-04-21 2015-07-22 珠海格力电器股份有限公司 Networking control method, device and system for household appliances

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005229489A (en) * 2004-02-16 2005-08-25 Matsushita Electric Ind Co Ltd Common information generation method and communication system for internet home appliances
CN102202291A (en) * 2010-03-22 2011-09-28 中国移动通信集团公司 Card-free terminal, service access method and system thereof, terminal with card and bootstrapping server function (BSF)
CN103795560A (en) * 2012-11-01 2014-05-14 云永科技股份有限公司 Management method of networked device identifier and networked device
CN103309307A (en) * 2013-05-15 2013-09-18 重庆邮电大学 Smart household appliance control method based on object access control
EP2814273A1 (en) * 2013-06-10 2014-12-17 Whirlpool Corporation Method of connecting an appliance to a WIFI network
CN104244030A (en) * 2014-09-17 2014-12-24 四川迪佳通电子有限公司 Recorded program sharing method and system
CN104506497A (en) * 2014-12-10 2015-04-08 青岛海信电器股份有限公司 Information issuing method and system
CN104793508A (en) * 2015-04-21 2015-07-22 珠海格力电器股份有限公司 Networking control method, device and system for household appliances

Also Published As

Publication number Publication date
CN105577680A (en) 2016-05-11

Similar Documents

Publication Publication Date Title
CN105577680B (en) Key generation method, encrypted data analysis method, device and key management center
US10812969B2 (en) System and method for configuring a wireless device for wireless network access
US9055047B2 (en) Method and device for negotiating encryption information
CN109462850B (en) Network configuration method of intelligent equipment and intelligent equipment
CN111052672B (en) Secure key transfer protocol without certificate or pre-shared symmetric key
US9668230B2 (en) Security integration between a wireless and a wired network using a wireless gateway proxy
KR101038064B1 (en) Application certification
CN101371550B (en) Method and system for automatically and freely providing user of mobile communication terminal with service access warrant of on-line service
Shen et al. Secure device-to-device communications over WiFi direct
CN114765534B (en) Private key distribution system and method based on national secret identification cryptographic algorithm
JP2020202594A (en) Computer implemented system and method for secure session establishment and encrypted exchange of data
CN105828332B (en) improved method of wireless local area network authentication mechanism
US12041452B2 (en) Non-3GPP device access to core network
CN110192381A (en) Key transmission method and device
US10158608B2 (en) Key establishment for constrained resource devices
WO2006050200A2 (en) Method and apparatus for authentication of mobile devices
CN112312393A (en) 5G application access authentication method and 5G application access authentication network architecture
WO2007028328A1 (en) Method, system and device for negotiating about cipher key shared by ue and external equipment
CN105577365B (en) A key negotiation method and device for user access to WLAN
US8498617B2 (en) Method for enrolling a user terminal in a wireless local area network
CN110719169A (en) Method and device for transmitting router safety information
WO2016176902A1 (en) Terminal authentication method, management terminal and application terminal
Kindberg et al. Authenticating public wireless networks with physical evidence
RU2779029C1 (en) Access of a non-3gpp compliant apparatus to the core network
JP2023138927A (en) System and method for managing data-file transmission and access right to data file

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant