CN108092958A - Information authentication method, device, computer equipment and storage medium - Google Patents

Information authentication method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN108092958A
CN108092958A CN201711268194.3A CN201711268194A CN108092958A CN 108092958 A CN108092958 A CN 108092958A CN 201711268194 A CN201711268194 A CN 201711268194A CN 108092958 A CN108092958 A CN 108092958A
Authority
CN
China
Prior art keywords
key
configuration information
encrypted
wifi equipment
data packet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711268194.3A
Other languages
Chinese (zh)
Other versions
CN108092958B (en
Inventor
王武志
卓贵明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Gongjin Electronics Co Ltd
Original Assignee
Chengdu City Common Dimension Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu City Common Dimension Technology Co Ltd filed Critical Chengdu City Common Dimension Technology Co Ltd
Priority to CN201711268194.3A priority Critical patent/CN108092958B/en
Publication of CN108092958A publication Critical patent/CN108092958A/en
Application granted granted Critical
Publication of CN108092958B publication Critical patent/CN108092958B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention relates to a kind of information authentication method, device, computer equipment and storage medium, including:Obtain the first key identical with WIFI equipment, receive the data packet that WIFI equipment is sent, and generate the second key, the second key is encrypted using first key, obtain the 3rd key, the 3rd key and data packet are sent to WIFI equipment, receive the encrypted configuration information that WIFI equipment is sent, configuration information is that WIFI equipment is encrypted to obtain using the second key, second key is that WIFI equipment obtains the 3rd secret key decryption, encrypted configuration information is decrypted, the configuration information after being decrypted.Information decryption and the WIFI equipment successful match sent by exchanging key to WIFI equipment so as to reduce the configuration step of connection relation between network amplifier and WIFI equipment, and then improves the efficiency that wireless network establishes connection.

Description

Information authentication method, device, computer equipment and storage medium
Technical field
The present invention relates to fields of communication technology, more particularly to a kind of information authentication method, device, computer equipment and deposit Storage media.
Background technology
With the development of science and technology, WLAN has been widely applied to all trades and professions.Since the house of inhabitation is got over Come that bigger, room number is more and more, and traditional home wireless network router transmission power is relatively low, when house is larger or wears When wall number is more, the problem of wireless network that router is sent is present with signal dead angle and weak output signal.In order to solve this A little problems, traditional settling mode are to enhance signal strength using wireless network amplifier, realize that stablizing for wireless signal is through walls.
Due to generally requiring to configure equipment using wireless network amplifier enhancing signal strength, user needs to log in WEB (World Wide Web, WWW), selection cipher mode and input key etc., cause radio network router and nothing The configuration of link information between line network amplifier is very cumbersome, so that wireless network establishes the less efficient of connection.
The content of the invention
Based on this, it is necessary to for matching somebody with somebody for the link information between above-mentioned radio network router and wireless network amplifier Put that process is very cumbersome so that wireless network establish connection it is less efficient the problem of, a kind of information authentication method, dress are provided It puts, computer equipment and storage medium.
A kind of information authentication method, including:
Obtain the first key identical with WIFI equipment;
The data packet that the WIFI equipment is sent is received, and generates the second key;
Second key is encrypted using the first key, obtains the 3rd key;
The 3rd key and the data packet are sent to the WIFI equipment;
The encrypted configuration information that the WIFI equipment is sent is received, the configuration information is that the WIFI equipment uses What second key was encrypted, second key is that the WIFI equipment obtains the 3rd secret key decryption 's;
The encrypted configuration information is decrypted, the configuration information after being decrypted.
In one embodiment, the data packet includes stamp, challenge field and random number at the first time;In the reception After the data packet that the WIFI equipment is sent, the method further includes:
Extract first time stamp, challenge field and the random number in the data packet;
According to the first key, informative abstract calculating is carried out to first time stamp, challenge field and random number, Obtain result of calculation;
The second current timestamp is obtained, second timestamp and the result of calculation are sent to the WIFI and set It is standby.
In one embodiment, it is described that second key is encrypted using the first key, it is close to obtain the 3rd Key, including:
According to the first key by the Parameter Switch of second key be ciphertext;
The ciphertext of the conversion is obtained, obtains encrypted 3rd key.
In one embodiment, it is described that the encrypted configuration information is decrypted, match somebody with somebody confidence after being decrypted Breath, including:
Extract the ciphertext parameter of second key;
The encrypted configuration information is decrypted according to the ciphertext parameter, the configuration information after being decrypted, The configuration information includes service set, authentication mode and channel information.
A kind of information authentication method, including:
Obtain the first key identical with network amplifier;
Data packet is sent to the network amplifier, the data packet is used to indicate the network amplifier using described the The second key of generation is encrypted in one key, obtains the 3rd key;
Receive the solicited message that the network amplifier is sent, the solicited message includes the 3rd key and described Data packet;
Configuration information is encrypted according to the solicited message, obtains encrypted configuration information;
The encrypted configuration information is sent to the network amplifier.
In one embodiment, the data packet includes challenge field, at the first time stamp and random number;The reception institute After the solicited message for stating network amplifier transmission, the method further includes:
Obtain the second timestamp when the network amplifier sends the solicited message;
The challenge field in the data packet is extracted, and is asked using the challenge field and the first key to described Information and second timestamp is asked to be verified;
After being proved to be successful, the 3rd key in the solicited message is extracted, and using the first key to the described 3rd Key is decrypted, and obtains second key.
A kind of information authenticating apparatus, including:
First acquisition module, for obtaining the first key identical with WIFI equipment;
Packet-receiving module for receiving the data packet that the WIFI equipment is sent, and generates the second key;
Cipher key encryption block for second key to be encrypted using the first key, obtains the 3rd key;
Information sending module, for sending the 3rd key and the data packet to the WIFI equipment;
Configuration information receiving module, for receiving the encrypted configuration information that the WIFI equipment is sent, the configuration Information is that the WIFI equipment is encrypted to obtain using second key, and second key is the WIFI equipment pair What the 3rd secret key decryption obtained;
Configuration information deciphering module, for the encrypted configuration information to be decrypted, the configuration after being decrypted Information.
In one embodiment, a kind of information authenticating apparatus, including:
Second acquisition module, for obtaining the first key identical with network amplifier;
Packet sending module, for sending data packet to the network amplifier, the data packet is used for the network Amplifier is generated the second key and second key is encrypted using the first key, obtains the 3rd key;
Information receiving module, for receiving the solicited message that the network amplifier is sent, the solicited message includes institute State the 3rd key and the data packet sent to the network amplifier;
Configuration information encrypting module, for, to encrypted configuration information is needed to be encrypted, being obtained according to the solicited message To encrypted configuration information;
Configuration information sending module, for sending the encrypted configuration information to the network amplifier.
A kind of computer equipment including memory, processor and is stored in the memory and can be in the processing The step of computer program run on device, the processor realizes method as described above when performing the computer program.
A kind of computer readable storage medium, the computer-readable recording medium storage have computer program, the meter The step of calculation machine program realizes method as described above when being executed by processor.
Above- mentioned information authentication method, device, computer equipment and storage medium, by obtaining identical with WIFI equipment the One key receives the data packet that WIFI equipment is sent, and generates the second key, and the second key is added using first key It is close, the 3rd key is obtained, the 3rd key and data packet is sent to WIFI equipment, receives encrypted the matching somebody with somebody of WIFI equipment transmission Confidence ceases, and configuration information is that WIFI equipment is encrypted to obtain using the second key, and the second key is WIFI equipment to the 3rd What secret key decryption obtained, encrypted configuration information is decrypted, the configuration information after being decrypted.Due to WIFI equipment with Network amplifier possesses the second identical key, therefore, after network amplifier receives the encryption information of WIFI equipment transmission, It can be decrypted using the second cipher key pair information.Since first key encrypts the second key, it ensure that information passes Defeated security, the information decryption sent to WIFI equipment by exchanging key and WIFI equipment successful match, so as to reduce The configuration step of connection relation between network amplifier and WIFI equipment, and then improve the efficiency that wireless network establishes connection.
Description of the drawings
Fig. 1 is the applied environment figure of information authentication method in one embodiment;
Fig. 2 is the cut-away view of one embodiment Computer equipment;
Fig. 3 is the flow chart of message authentication method in one embodiment;
Fig. 4 is the method flow diagram that solicited message is sent in one embodiment;
Fig. 5 is the flow chart of message authentication method in another embodiment;
Fig. 6 is the method flow diagram verified in one embodiment to information;
Fig. 7 is the structure diagram of information authenticating apparatus in one embodiment;
Fig. 8 is the structure diagram of information authenticating apparatus in another embodiment.
Specific embodiment
To enable objects, features and advantages of the present invention more obvious understandable, below in conjunction with the accompanying drawings to the tool of the present invention Body embodiment is described in detail.Many details are elaborated in the following description in order to fully understand the present invention. But the invention can be embodied in many other ways as described herein, those skilled in the art can without prejudice to Similar improvement is done in the case of intension of the present invention, therefore the present invention is not limited to the specific embodiments disclosed below.
Fig. 1 is the applied environment figure of information authentication method in one embodiment.As shown in Figure 1, the application environment includes net Network amplifier 110 and WIFI equipment 120, wherein, it is carried out between network amplifier 110 and WIFI equipment 120 by ethernet line Communication.
Network amplifier 110 has the function of to amplify network signal, and WIFI equipment can be router, network amplifier 110 can obtain the first key identical with WIFI equipment 120.Network amplifier 110 is receiving the transmission of WIFI equipment 120 After data packet, the information in data packet can be extracted and generate the second key.First key pair may be employed in network amplifier 110 Second key is encrypted, and obtains the 3rd key, and network amplifier 110 can send out obtained the 3rd key and solicited message Give WIFI equipment 120.WIFI equipment 120 can test information after the information of the transmission of network amplifier 110 is received Card, and the 3rd key is decrypted using first key, obtain the second key.WIFI equipment 120 can use the second key Configuration information is encrypted, then encrypted configuration information is sent to network amplifier 110, network amplifier 110 receives After the encrypted configuration information sent to WIFI equipment, the configuration information after the second key pair encryption can be used to be solved It is close, finally obtain configuration information.Network amplifier 110 can preserve the configuration information obtained after decryption.
In one embodiment, a kind of computer equipment is provided, which can be network amplifier 110, It can also be WIFI equipment 120.The internal structure of computer equipment is as shown in Fig. 2, the computer equipment is total including passing through system Processor, storage medium, memory and the network interface of line connection.Wherein, the storage medium of computer equipment is stored with operation System, database further include the computer program for being used to implement information authentication method and device.The processor is used to provide calculating And control ability, support the operation of entire computer equipment.The computer program be processed execution when, may be such that processor realize Information authentication method.The operation for inside saving as the computer program that information authentication method and device are realized in storage medium provides ring Border, network interface is used to carry out network communication with external with computer equipment, for example, network amplifier 120 passes through network interface Obtain the first key identical with WIFI equipment.Structure shown in Figure 2, only with the relevant part-structure of application scheme Block diagram, do not form the restriction for the terminal being applied thereon to application scheme, specific terminal can include than in figure Shown more or fewer components either combine some components or are arranged with different components.
In one embodiment, a kind of information authentication method is provided, is put with being applied to the network in above application environment Big device comes for example, as shown in figure 3, including the following steps:
Step S302 obtains the first key identical with WIFI equipment.
Wherein, WIFI equipment is connected with network, can provide the interface for accessing network for each terminal as gateway, here WIFI equipment can be router.Key is a kind of parameter, is to be converted into ciphertext in plain text or be converted into ciphertext in plain text The parameter inputted in algorithm.
After network amplifier and WIFI equipment, which are powered, to be worked normally, the network specified is inserted by using ethernet line When network amplifier is connected by interface with WIFI equipment, network amplifier can be immediately obtained by the ethernet line connected To the first key identical with WIFI equipment.
Step S304 receives the data packet that WIFI equipment is sent, and generates the second key.
WIFI equipment can send data packet by the ethernet line connected.It can be root that WIFI equipment, which sends data packet, According to customized Ethernet proprietary protocol, data are carried out by way of Linux Raw socket (Linux raw sockets) Bag sends and receives.What customized Ethernet proprietary protocol can define data packet sends and receives interval time.
WIFI equipment can send data packet according to self-defined Ethernet proprietary protocol certain interval of time, for example, every 3 Second just send a data packet.Network amplifier, can be in data packet after the data packet of WIFI equipment transmission is received Information extract, according in the data packet of extraction information generate the second key.
Step S306 is encrypted the second key using first key, obtains the 3rd key.
When detecting ethernet line insertion, WIFI equipment has just consulted common first key with network amplifier.It is raw Into after the second key, network amplifier can be encrypted the second key using first key, and it is close to obtain the encrypted 3rd Key.
Step S308 sends the 3rd key and data packet to WIFI equipment.
The 3rd obtained key can be sent to WIFI equipment by network amplifier.Network amplifier is to the letter in data packet After breath extracts, while generating and sending three keys, data packet can also be then forwarded to WIFI equipment.
Step S310, receives the encrypted configuration information that WIFI equipment is sent, and configuration information is WIFI equipment using the What two keys were encrypted, the second key is that WIFI equipment obtains the 3rd secret key decryption.
WIFI equipment receive network amplifier transmission the 3rd key and data packet after, can to receive the 3rd Key is decrypted, the second key after being decrypted.This when, it is close that network amplifier with WIFI equipment has been owned by second Key, WIFI equipment can use the second key that can obtain encrypted configuration to encrypted configuration information is needed to be encrypted Information.Obtained encrypted configuration information can be sent to network amplifier by WIFI equipment, i.e. network amplifier can connect Receive the encrypted configuration information that WIFI equipment is sent.
Encrypted configuration information is decrypted in step S312, the configuration information after being decrypted.
Network amplifier and WIFI equipment have been owned by the second key, network amplifier receive it is encrypted with confidence After breath, the configuration information after the second key pair encryption can be used to be decrypted.Configuration information is that WIFI equipment is close using second Network amplifier is sent to after key encryption, the encrypting and decrypting based on key can only all use the principle of same key, and network is put Big device can only just use the configuration information after the second key pair encryption to be decrypted.Network amplifier can be decrypted after match somebody with somebody Confidence ceases.
By obtaining the first key identical with WIFI equipment, the data packet that WIFI equipment is sent is received, and generates second Key is encrypted the second key using first key, obtains the 3rd key, sends the 3rd key and data packet to WIFI Equipment receives the encrypted configuration information that WIFI equipment is sent, and configuration information is that WIFI equipment is added using the second key Close to obtain, the second key is that WIFI equipment obtains the 3rd secret key decryption, encrypted configuration information is decrypted, is obtained Configuration information after to decryption.Since WIFI equipment and network amplifier possess the second identical key, when network amplifies After device receives the encryption information of WIFI equipment transmission, it can be decrypted using the second cipher key pair information.Due to first key Second key is encrypted, ensure that the security of information transmission, the information sent by exchanging key to WIFI equipment Decryption and WIFI equipment successful match, so as to reduce the configuration step of connection relation between network amplifier and WIFI equipment, And then improve the efficiency that wireless network establishes connection.
In one embodiment, as described in Figure 4, a kind of information authentication method provided further includes the mistake for sending solicited message Journey, specific steps include:
Step S402 extracts first time stamp, challenge field and random number in data packet.
Wherein, first time stamp is specific time point when WIFI equipment sends data packet to network amplifier. It is one section of parameter to challenge field, for being transmitted after password Hybrid Encryption, ensureing password not plaintext transmission, can be random a string Character string, in units of byte, for example, byte be 20 challenge field.Random number is according to first time stamp, WIFI equipment MAC (Media Access Control) address generated as random number seed.Network amplifier can extract data First time stamp, challenge field and random number in bag.
According to first key, informative abstract meter is carried out to first time stamp, challenge field and random number by step S404 It calculates, obtains result of calculation.
Informative abstract, which calculates, SHA-256 (Secure Hash Algorithm) to be used to calculate.Network amplifier can use first Timestamp, first key, challenge field and nonce count calculate informative abstract, and the result calculated can be a string of characters String.
Step S406, obtains the second current timestamp, and the second timestamp and result of calculation are sent to WIFI equipment.
Network amplifier can get the second timestamp by the current time, then by the second timestamp and calculate Informative abstract result by Request ask in a manner of be sent to WIFI equipment.
First time stamp, challenge field and the random number in data packet are extracted, according to first key, at the first time Stamp, challenge field and random number carry out informative abstract calculating, obtain result of calculation, obtain the second current timestamp, by the Two timestamps and result of calculation are sent to WIFI equipment.Informative abstract is calculated using first key, and uses Request request hairs Result of calculation is sent, improves the security of information transmission.
In one embodiment, a kind of information authentication method provided further includes the process that the second key is encrypted, It specifically includes:According to first key by the Parameter Switch of the second key be ciphertext;The ciphertext of conversion is obtained, obtains encrypted the Three keys.
The effect of key is exactly to encrypted information is needed to be encrypted.The process that cipher key pair information is encrypted is exactly will Cleartext information is converted into the process of cipher-text information.Network amplifier can use first key to turn the plaintext parameter of the second key Change ciphertext parameter into.The ciphertext parameter for the conversion that network amplifier is got is exactly encrypted 3rd key.
By the Parameter Switch of the second key it is ciphertext according to first key, obtains the ciphertext of conversion, obtains encrypted the Three keys.By the way that the second key is encrypted to obtain the 3rd key, the security in message transmitting procedure is improved.
In one embodiment, a kind of information authentication method provided further includes the process that configuration information is decrypted, Specific steps include:Extract the ciphertext parameter of the second key.Encrypted configuration information is decrypted according to ciphertext parameter, is obtained Configuration information after to decryption, configuration information include service set, authentication mode and channel information.
Configuration information is encrypted using the second key, equally, decryption when be also required to using the second key into Row decryption.Network amplifier can extract the ciphertext parameter of the second key, using the ciphertext parameter of the second key to encrypted Configuration information is decrypted.Configuration information can include service set, authentication mode and channel information.Network amplifier makes It can be obtained by the configuration information after decryption after configuration information is decrypted with the ciphertext parameter of the second key, that is, service Set identifier, authentication mode and channel information etc..
By extracting the ciphertext parameter of the second key, encrypted configuration information is decrypted according to ciphertext parameter, is obtained Configuration information after to decryption, configuration information include service set, authentication mode and channel information.Due to the use of second Configuration information is decrypted in key, therefore obtained configuration information is more accurate, while also ensures the safety of configuration information Property.
Another embodiment provides a kind of information authentication method, to be applied to the WIFI equipment in application environment Come for example, as shown in figure 5, including the following steps:
Step S502 obtains the first key identical with network amplifier.
Wherein, the effect of network amplifier is extended network signal, and the mesh of access network is reached by connecting WIFI equipment 's.After network amplifier and WIFI equipment, which are powered, to be worked normally, the network interface specified is inserted by using ethernet line When network amplifier is connected with WIFI equipment, WIFI equipment can be immediately obtained and net by the ethernet line connected The identical first key of network amplifier.
Step S504 sends data packet to network amplifier, and data packet is used to indicate network amplifier using first key Second key of generation is encrypted, obtains the 3rd key.
When WIFI equipment detects ethernet line access, it can start to send data packet to network amplifier.WIFI equipment It can be sent out according to customized Ethernet proprietary protocol by way of Linux Raw socket (Linux raw sockets) Send data packet.Containing stamp at the first time, the challenge information such as field and random number in data packet, network amplifier can basis The data packet that WIFI equipment is sent is encrypted the second key of generation using first key, and obtains the 3rd key.
Step S506, receives the solicited message that network amplifier is sent, and solicited message includes the 3rd key and data packet.
WIFI equipment can also receive the Request solicited messages of network amplifier transmission.It wherein, can be in solicited message The 3rd key of network amplifier generation is included, the data packet by network amplifier processing can also be included.
Step S508 is encrypted configuration information according to solicited message, obtains encrypted configuration information.
Network amplifier send solicited message in can include summary info result of calculation and the second key is added The 3rd key obtained after close.Wherein, calculating summary info is calculated using SHA-256 (Secure Hash Algorithm).WIFI equipment The 3rd key can be decrypted using first key, the second key after being decrypted.WIFI equipment can also use solution Configuration information is encrypted in the second key after close, obtains encrypted configuration information.
Step S510 sends encrypted configuration information to network amplifier.
WIFI equipment can equally use Linux Raw socket (the original sets of Linux by self-defined Ethernet protocol Connect word) mode, encrypted configuration information is sent to network amplifier.
By obtaining the first key identical with network amplifier, data packet is sent to network amplifier, data packet is used for Instruction network amplifier is encrypted the second key of generation using first key, obtains the 3rd key, receives network amplification The solicited message that device is sent, solicited message include the 3rd key and data packet, configuration information are added according to solicited message It is close, encrypted configuration information is obtained, sends encrypted configuration information to network amplifier.Since first key is close to second Key is encrypted, and ensure that the security of information transmission, the information decryption that is sent to WIFI equipment by exchanging key and WIFI equipment successful match, so as to reduce the configuration step of connection relation between network amplifier and WIFI equipment, Jin Erti High wireless network establishes the efficiency of connection.
As shown in fig. 6, in one embodiment, a kind of information authentication method provided further includes what information was verified Process specifically includes:
Step S602 obtains the second timestamp when network amplifier sends solicited message.
Second timestamp is the specific time point that network amplifier sends solicited message.WIFI equipment can be according to network The time that amplifier sends solicited message gets the second timestamp.
Step S604 extracts the challenge field in data packet, and using challenge field and first key to solicited message And second timestamp verified.
WIFI equipment, which is sent in the data packet in network amplifier, to be included challenge field and stabs at the first time.WIFI Equipment can extract the challenge field in data packet and stab at the first time.WIFI equipment first can be according to the first time of extraction It stabs and the second timestamp verifies the time, it can also be by the challenge field of extraction and the challenge for being sent to network amplifier Field is verified.
Step S606 after being proved to be successful, extracts the 3rd key in solicited message, and using first key to the 3rd key It is decrypted, obtains the second key.
After WIFI equipment is proved to be successful challenge field and timestamp, the 3rd key in solicited message can be extracted. WIFI equipment has identical first key with network amplifier, it is possible to the 3rd key is decrypted using first key, 3rd key is encrypted to obtain to the second key.It is close that WIFI equipment can obtain second after the 3rd key is decrypted Key.
The second timestamp when sending solicited message by obtaining network amplifier, extracts the challenge field in data packet, And solicited message and the second timestamp are verified using challenge field and first key, after being proved to be successful, extraction please The 3rd key in information is sought, and the 3rd key is decrypted using first key, obtains the second key.Information is tested The second key can be just obtained after demonstrate,proving and decrypting, ensure that the security of information transmission.
In one embodiment, a kind of information authentication method is provided, realizes that this method is as follows:
First, when WIFI equipment and network amplifier detect ethernet line insertion, WIFI equipment can with network amplifier To reciprocally negotiate shared key, shared key here can be first key.After negotiating about cipher key shared, WIFI equipment and network Amplifier can get identical first key.WIFI equipment can send data packet to network amplifier.WIFI equipment It can be sent out according to customized Ethernet proprietary protocol by way of Linux Raw socket (Linux raw sockets) Send data packet.
Secondly, network amplifier can receive the data packet of WIFI equipment transmission, and generate the second key.WIFI equipment can To send data packet according to self-defined Ethernet proprietary protocol certain interval of time, for example, just sending a data every 3 seconds Bag.Network amplifier can extract the information in data packet after the data packet of WIFI equipment transmission is received, according to Information in the data packet of extraction generates the second key.
Then, network amplifier can extract first time stamp, challenge field and the random number in data packet.Wherein, Stamp is specific time point when WIFI equipment sends data packet to network amplifier at the first time.It is one section to challenge field Parameter, for being transmitted after password Hybrid Encryption, ensureing password not plaintext transmission, can be a string of random character strings, with word It saves as unit, for example, byte is 20 challenge field.Random number is the MAC (Media according to first time stamp, WIFI equipment Access Control) address generates as random number seed.When network amplifier can extract first in data packet Between stamp, challenge field and random number.Further according to first key, letter is carried out to first time stamp, challenge field and random number Digest calculations are ceased, obtain result of calculation.Informative abstract, which calculates, SHA-256 (Secure Hash Algorithm) to be used to calculate, and calculate The result come can be a string of character strings.Network amplifier can obtain the second current timestamp, by the second timestamp and meter It calculates result and is sent to WIFI equipment.Network amplifier can get the second timestamp by the current time, then during by second Between the informative abstract result stabbing and calculate be sent to WIFI equipment in a manner that Request is asked.
Then, network amplifier may be employed first key and the second key be encrypted, and obtain the 3rd key.It is detecting When being inserted into ethernet line, WIFI equipment has just consulted common first key with network amplifier.After generating the second key, net Network amplifier can be encrypted the second key using first key, obtain encrypted 3rd key.Network amplifier can Using according to first key by the Parameter Switch of the second key as ciphertext.The effect of key is exactly to encrypted information is needed to add It is close.The process that cipher key pair information is encrypted is exactly that cleartext information is converted into the process of cipher-text information.Network amplifier can be with Using first key by the plaintext Parameter Switch of the second key into ciphertext parameter.Network amplifier can also obtain the close of conversion Text obtains encrypted 3rd key.The ciphertext parameter for the conversion that network amplifier is got is exactly encrypted 3rd key.
Then, network amplifier can send the 3rd key and data packet to WIFI equipment.Network amplifier can incite somebody to action The 3rd obtained key is sent to WIFI equipment.After network amplifier extracts the information in data packet, generation is concurrent While sending three keys, data packet can also be then forwarded to WIFI equipment.Network amplifier can also receive WIFI equipment The encrypted configuration information sent, configuration information is that WIFI equipment is encrypted to obtain using the second key, the second key It is that WIFI equipment obtains the 3rd secret key decryption.Encrypted configuration information can be decrypted in network amplifier, obtain Configuration information after decryption.Network amplifier has been owned by the second key with WIFI equipment, and network amplifier is receiving encryption After configuration information afterwards, the configuration information after the second key pair encryption can be used to be decrypted.Configuration information is WIFI equipment Network amplifier is sent to after being encrypted using the second key, the encrypting and decrypting based on key can only all use the original of same key Reason, network amplifier can only just use the configuration information after the second key pair encryption to be decrypted.Network amplifier can obtain Configuration information after decryption.
Then, WIFI equipment can receive network amplifier transmission solicited message, solicited message include the 3rd key with And data packet.WIFI equipment can also receive the Request solicited messages of network amplifier transmission.It wherein, can in solicited message With the 3rd key generated comprising network amplifier, the data packet by network amplifier processing can also be included.
Then, WIFI equipment obtains the second timestamp when network amplifier sends solicited message.Second timestamp is net Network amplifier sends the specific time point of solicited message.WIFI equipment can according to network amplifier send solicited message when Between get the second timestamp.WIFI equipment can extract the challenge field in data packet, and use challenge field and first Key verifies solicited message and the second timestamp.After being proved to be successful, WIFI equipment can be extracted in solicited message 3rd key, and the 3rd key is decrypted using first key, obtain the second key.After WIFI equipment can send encryption Configuration information to network amplifier.
Then, network amplifier receives the encrypted configuration information that WIFI equipment is sent, and configuration information is WIFI equipment It is encrypted using the second key, the second key is that WIFI equipment obtains the 3rd secret key decryption.WIFI equipment exists After the 3rd key and the data packet that receive network amplifier transmission, the 3rd key received can be decrypted, obtained The second key after decryption.This when, network amplifier have been owned by the second key with WIFI equipment, and WIFI equipment can make With the second key to encrypted configuration information is needed to be encrypted, encrypted configuration information can be obtained.WIFI equipment can be with Obtained encrypted configuration information is sent to network amplifier, i.e. network amplifier can receive adding for WIFI equipment transmission Configuration information after close.
Finally, encrypted configuration information is decrypted in network amplifier, the configuration information after being decrypted.Network is put Big device can also extract the ciphertext parameter of the second key, and encrypted configuration information is decrypted according to ciphertext parameter, is obtained Configuration information after decryption, configuration information include service set, authentication mode and channel information.
As shown in fig. 7, in one embodiment, a kind of information authenticating apparatus is provided, including:
First acquisition module 710, for obtaining the first key identical with WIFI equipment.
Packet-receiving module 720 for receiving the data packet of WIFI equipment transmission, and generates the second key.
Cipher key encryption block 730 for the second key to be encrypted using first key, obtains the 3rd key.
Information sending module 740, for sending the 3rd key and data packet to WIFI equipment.
Configuration information receiving module 750, for receiving the encrypted configuration information of WIFI equipment transmission, configuration information is What WIFI equipment was encrypted using the second key, the second key is that WIFI equipment obtains the 3rd secret key decryption.
Configuration information deciphering module 760 for encrypted configuration information to be decrypted, matches somebody with somebody confidence after being decrypted Breath.
In one embodiment, data packet includes stamp, challenge field and random number at the first time.Information sending module 740 can be also used for first time stamp, challenge field and random number in extraction data packet, according to first key, to first Timestamp, challenge field and random number carry out informative abstract calculating, obtain result of calculation, obtain the second current timestamp, Second timestamp and result of calculation are sent to WIFI equipment.
In one embodiment, cipher key encryption block 730 can be also used for the parameter of the second key according to first key Ciphertext is converted to, obtains the ciphertext of conversion, obtains encrypted 3rd key.
In one embodiment, configuration information deciphering module 760 can be also used for the ciphertext parameter of the second key of extraction, root Encrypted configuration information is decrypted according to ciphertext parameter, the configuration information after being decrypted, configuration information includes services set Mark, authentication mode and channel information.
As shown in figure 8, another embodiment provides a kind of information authenticating apparatus, including:
Second acquisition module 810, for obtaining the first key identical with network amplifier.
Packet sending module 820, for sending data packet to network amplifier, data packet generates for network amplifier Second key is simultaneously encrypted the second key using first key, obtains the 3rd key.
Information receiving module 830, for receiving the solicited message of network amplifier transmission, solicited message includes the 3rd key And the data packet to network amplifier transmission.
Configuration information encrypting module 840, for, to encrypted configuration information is needed to be encrypted, being obtained according to solicited message Encrypted configuration information.
Configuration information sending module 850, for sending encrypted configuration information to network amplifier.
In one embodiment, when information receiving module 830 can be also used for obtaining network amplifier transmission solicited message The second timestamp, extract the challenge field in data packet, and using challenge field and first key to solicited message and Second timestamp is verified, after being proved to be successful, extracts the 3rd key in solicited message, and close to the 3rd using first key Key is decrypted, and obtains the second key.
In one embodiment, a kind of computer readable storage medium is also provided, the computer-readable recording medium storage There is computer program, which realizes following steps when being executed by processor:Obtain first identical with WIFI equipment Key receives the data packet that WIFI equipment is sent, and generates the second key, and the second key is encrypted using first key, The 3rd key is obtained, the 3rd key and data packet is sent to WIFI equipment, receives the encrypted configuration that WIFI equipment is sent Information, configuration information are that WIFI equipment is encrypted to obtain using the second key, and the second key is that WIFI equipment is close to the 3rd What key was decrypted, encrypted configuration information is decrypted, the configuration information after being decrypted.
In one embodiment, computer program is executed by processor transmission solicited message, including:It extracts in data packet Stamp, challenge field and random number at the first time, according to first key, to first time stamp, challenge field and random number into Row information digest calculations, obtain result of calculation, obtain the second current timestamp, the second timestamp and result of calculation are sent to WIFI equipment.
In one embodiment, computer program, which is executed by processor, is encrypted the second key, including:According to first The Parameter Switch of second key is ciphertext by key, is obtained the ciphertext of conversion, is obtained encrypted 3rd key.
In one embodiment, computer program, which is executed by processor, is decrypted configuration information, including:Extraction second The ciphertext parameter of key is decrypted encrypted configuration information according to ciphertext parameter, and the configuration information after being decrypted is matched somebody with somebody Confidence breath includes service set, authentication mode and channel information.
In another embodiment, a kind of computer readable storage medium is also provided, which deposits Computer program is contained, which realizes following steps when being executed by processor:It obtains identical with network amplifier First key sends data packet to network amplifier, and data packet is used to indicate network amplifier using first key to generation Second key is encrypted, and obtains the 3rd key, receives the solicited message that network amplifier is sent, it is close that solicited message includes the 3rd Key and data packet are encrypted configuration information according to solicited message, obtain encrypted configuration information, send encrypted Configuration information is to network amplifier.
In one embodiment, computer program, which is executed by processor, verifies information, including:Obtain network amplification Device sends the second timestamp during solicited message, extracts the challenge field in data packet, and close using challenge field and first Key verifies solicited message and the second timestamp, after being proved to be successful, extracts the 3rd key in solicited message, and uses The 3rd key is decrypted in first key, obtains the second key.
One of ordinary skill in the art will appreciate that realizing all or part of flow in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, it is non-volatile computer-readable that the program can be stored in one It takes in storage medium, in the embodiment of the present invention, which can be stored in the non-volatile memory medium of computer system, and It is performed by least one processor in the computer system, to realize the flow for including the embodiment such as above-mentioned each method.This Non-volatile and/or volatibility may include to any reference of memory, storage, database or other media used in application Memory.Suitable nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include random access memory (RAM), it is used as external cache.By way of illustration and not limitation, RAM is available in many forms, such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDR SDRAM), enhanced SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) directly RAM (RDRAM), straight Connect memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM).
Each technical characteristic of embodiment described above can be combined arbitrarily, to make description succinct, not to above-mentioned reality It applies all possible combination of each technical characteristic in example to be all described, as long as however, the combination of these technical characteristics is not deposited In contradiction, the scope that this specification is recorded all is considered to be.
Embodiment described above only expresses the several embodiments of the present invention, and description is more specific and detailed, but simultaneously It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that come for those of ordinary skill in the art It says, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to the protection of the present invention Scope.Therefore, the protection domain of patent of the present invention should be determined by the appended claims.

Claims (10)

1. a kind of information authentication method, which is characterized in that the described method includes:
Obtain the first key identical with WIFI equipment;
The data packet that the WIFI equipment is sent is received, and generates the second key;
Second key is encrypted using the first key, obtains the 3rd key;
The 3rd key and the data packet are sent to the WIFI equipment;
The encrypted configuration information that the WIFI equipment is sent is received, the configuration information is described in the WIFI equipment uses What the second key was encrypted, second key is that the WIFI equipment obtains the 3rd secret key decryption;
The encrypted configuration information is decrypted, the configuration information after being decrypted.
2. according to the method described in claim 1, it is characterized in that, the data packet include at the first time stamp, challenge field with And random number;After the data packet for receiving the WIFI equipment and sending, the method further includes:
Extract first time stamp, challenge field and the random number in the data packet;
According to the first key, informative abstract calculating is carried out to first time stamp, challenge field and random number, is obtained Result of calculation;
The second current timestamp is obtained, second timestamp and the result of calculation are sent to the WIFI equipment.
3. according to the method described in claim 1, which is characterized in that described close to described second using the first key Key is encrypted, and obtains the 3rd key, including:
According to the first key by the Parameter Switch of second key be ciphertext;
The ciphertext of the conversion is obtained, obtains encrypted 3rd key.
4. method according to claim 1, which is characterized in that it is described that the encrypted configuration information is decrypted, it obtains Configuration information after to decryption, including:
Extract the ciphertext parameter of second key;
The encrypted configuration information is decrypted according to the ciphertext parameter, the configuration information after being decrypted is described Configuration information includes service set, authentication mode and channel information.
5. a kind of information authentication method, which is characterized in that the described method includes:
Obtain the first key identical with network amplifier;
Data packet is sent to the network amplifier, it is close using described first that the data packet is used to indicate the network amplifier The second key of generation is encrypted in key, obtains the 3rd key;
The solicited message that the network amplifier is sent is received, the solicited message includes the 3rd key and the data Bag;
Configuration information is encrypted according to the solicited message, obtains encrypted configuration information;
The encrypted configuration information is sent to the network amplifier.
6. according to the method described in claim 5, it is characterized in that, the data packet include challenge field, at the first time stamp with And random number;After the solicited message for receiving the network amplifier and sending, the method further includes:
Obtain the second timestamp when the network amplifier sends the solicited message;
The challenge field in the data packet is extracted, and the request is believed using the challenge field and the first key Breath and second timestamp are verified;
After being proved to be successful, the 3rd key in the solicited message is extracted, and using the first key to the 3rd key It is decrypted, obtains second key.
7. a kind of information authenticating apparatus, which is characterized in that described device includes:
First acquisition module, for obtaining the first key identical with WIFI equipment;
Packet-receiving module for receiving the data packet that the WIFI equipment is sent, and generates the second key;
Cipher key encryption block for second key to be encrypted using the first key, obtains the 3rd key;
Information sending module, for sending the 3rd key and the data packet to the WIFI equipment;
Configuration information receiving module, for receiving the encrypted configuration information that the WIFI equipment is sent, the configuration information The WIFI equipment is encrypted to obtain using second key, and second key is the WIFI equipment to described What the 3rd secret key decryption obtained;
Configuration information deciphering module, for the encrypted configuration information to be decrypted, the configuration information after being decrypted.
8. a kind of information authenticating apparatus, which is characterized in that described device includes:
Second acquisition module, for obtaining the first key identical with network amplifier;
Packet sending module, for sending data packet to the network amplifier, the data packet is amplified for the network Device is generated the second key and second key is encrypted using the first key, obtains the 3rd key;
Information receiving module, for receiving the solicited message that the network amplifier is sent, the solicited message includes described the Three keys and the data packet sent to the network amplifier;
Configuration information encrypting module, for, to encrypted configuration information is needed to be encrypted, being added according to the solicited message Configuration information after close;
Configuration information sending module, for sending the encrypted configuration information to the network amplifier.
9. a kind of computer equipment, including memory, processor and it is stored in the memory and can be in the processor The computer program of upper operation, which is characterized in that the processor realized when performing the computer program as claim 1 to The step of any one of 6 the method.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists In when the computer program is executed by processor the step of realization such as any one of claim 1 to 6 the method.
CN201711268194.3A 2017-12-05 2017-12-05 Information authentication method and device, computer equipment and storage medium Active CN108092958B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711268194.3A CN108092958B (en) 2017-12-05 2017-12-05 Information authentication method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711268194.3A CN108092958B (en) 2017-12-05 2017-12-05 Information authentication method and device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN108092958A true CN108092958A (en) 2018-05-29
CN108092958B CN108092958B (en) 2021-05-28

Family

ID=62173718

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711268194.3A Active CN108092958B (en) 2017-12-05 2017-12-05 Information authentication method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN108092958B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110310392A (en) * 2019-05-22 2019-10-08 平安科技(深圳)有限公司 Unlocking method of vehicle, device, computer equipment and storage medium
WO2020000428A1 (en) * 2018-06-29 2020-01-02 Nokia Shanghai Bell Co., Ltd. Methods, devices and computer readable medium for key management
CN113411283A (en) * 2020-03-16 2021-09-17 中国电信股份有限公司 Bidirectional authentication method, device and system
CN114520730A (en) * 2020-11-20 2022-05-20 腾讯科技(深圳)有限公司 Data transmission method, device, system, computer equipment and storage medium
CN114697000A (en) * 2020-12-28 2022-07-01 深圳Tcl新技术有限公司 Network distribution method, device, terminal and computer readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101621796A (en) * 2009-07-22 2010-01-06 中兴通讯股份有限公司 Method and device for access point automatic alignment in wireless distribution system
CN102204391A (en) * 2011-05-27 2011-09-28 华为终端有限公司 Repeater wps connection method and device
CN102685745A (en) * 2012-04-23 2012-09-19 深圳市江波龙电子有限公司 Wireless access point (AP) equipment authentication method and system
CN104754565A (en) * 2013-12-27 2015-07-01 中兴通讯股份有限公司 Wireless parameter sending and receiving method and device
CN106341867A (en) * 2016-08-30 2017-01-18 合肥润东通信科技股份有限公司 Wireless matching device and wireless matching method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101621796A (en) * 2009-07-22 2010-01-06 中兴通讯股份有限公司 Method and device for access point automatic alignment in wireless distribution system
CN102204391A (en) * 2011-05-27 2011-09-28 华为终端有限公司 Repeater wps connection method and device
CN102685745A (en) * 2012-04-23 2012-09-19 深圳市江波龙电子有限公司 Wireless access point (AP) equipment authentication method and system
CN104754565A (en) * 2013-12-27 2015-07-01 中兴通讯股份有限公司 Wireless parameter sending and receiving method and device
CN106341867A (en) * 2016-08-30 2017-01-18 合肥润东通信科技股份有限公司 Wireless matching device and wireless matching method

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020000428A1 (en) * 2018-06-29 2020-01-02 Nokia Shanghai Bell Co., Ltd. Methods, devices and computer readable medium for key management
CN112368989A (en) * 2018-06-29 2021-02-12 上海诺基亚贝尔股份有限公司 Method, apparatus and computer readable medium for key management
CN112368989B (en) * 2018-06-29 2023-02-03 上海诺基亚贝尔股份有限公司 Method, apparatus and computer readable medium for key management
CN110310392A (en) * 2019-05-22 2019-10-08 平安科技(深圳)有限公司 Unlocking method of vehicle, device, computer equipment and storage medium
CN110310392B (en) * 2019-05-22 2021-07-16 平安科技(深圳)有限公司 Vehicle unlocking method and device, computer equipment and storage medium
CN113411283A (en) * 2020-03-16 2021-09-17 中国电信股份有限公司 Bidirectional authentication method, device and system
CN113411283B (en) * 2020-03-16 2022-08-30 中国电信股份有限公司 Bidirectional authentication method, device and system
CN114520730A (en) * 2020-11-20 2022-05-20 腾讯科技(深圳)有限公司 Data transmission method, device, system, computer equipment and storage medium
CN114520730B (en) * 2020-11-20 2023-06-20 腾讯科技(深圳)有限公司 Data transmission method, device, system, computer equipment and storage medium
CN114697000A (en) * 2020-12-28 2022-07-01 深圳Tcl新技术有限公司 Network distribution method, device, terminal and computer readable storage medium

Also Published As

Publication number Publication date
CN108092958B (en) 2021-05-28

Similar Documents

Publication Publication Date Title
CN108092958A (en) Information authentication method, device, computer equipment and storage medium
CN1964258B (en) Method for secure device discovery and introduction
CN108683510B (en) User identity updating method for encrypted transmission
CN108683501B (en) Multiple identity authentication system and method with timestamp as random number based on quantum communication network
US20070189528A1 (en) Wireless LAN transmitting and receiving apparatus and key distribution method
Saxena et al. Dynamic secrets and secret keys based scheme for securing last mile smart grid wireless communication
CN108400867A (en) A kind of authentication method based on public encryption system
CN105871918A (en) Household appliance, communication system and method between household appliance and cloud server as well as cloud server
JP6807153B2 (en) Devices and related methods for secure hearing device communication
US11924911B2 (en) Extreme-high-throughput fast initial link setup support in multi-link operation in wireless communications
EP3570487B1 (en) Private key generation method, device and system
WO2011142353A1 (en) Communication device and communication method
CN112672342B (en) Data transmission method, device, equipment, system and storage medium
CN105407109A (en) Data secure transmission method between Bluetooth devices
CN108964895B (en) User-to-User identity authentication system and method based on group key pool and improved Kerberos
US9356931B2 (en) Methods and apparatuses for secure end to end communication
Moscaritolo et al. Silent circle instant messaging protocol protocol specification
CN106209756B (en) Password update method, user equipment, subscriber location servers and domain router
CN102281303A (en) Data exchange method
CN106209384B (en) Use the client terminal of security mechanism and the communication authentication method of charging unit
Agosta et al. Cyber-security analysis and evaluation for smart home management solutions
CN108965266B (en) User-to-User identity authentication system and method based on group key pool and Kerberos
CN110784870A (en) Wireless local area network secure communication method and system and authentication server
KR100599199B1 (en) System and method for generating encryption key of wireless device in wireless local area network secure system
DE102021113263A1 (en) Extreme-High-Throughput-Fast-Initial-Link-Setup-Support in a multi-link operation in radio communications

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20231110

Address after: No.2, Danzi North Road, Kengzi street, Pingshan District, Shenzhen, Guangdong 518000

Patentee after: SHENZHEN GONGJIN ELECTRONICS Co.,Ltd.

Address before: 610000 area B, 10th floor, building 1, No.168, Tianfu 5th Street, high tech Zone, Chengdu, Sichuan Province

Patentee before: CHENGDU GONGWEI TECHNOLOGY CO.,LTD.