CN108092958A - Information authentication method, device, computer equipment and storage medium - Google Patents
Information authentication method, device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN108092958A CN108092958A CN201711268194.3A CN201711268194A CN108092958A CN 108092958 A CN108092958 A CN 108092958A CN 201711268194 A CN201711268194 A CN 201711268194A CN 108092958 A CN108092958 A CN 108092958A
- Authority
- CN
- China
- Prior art keywords
- key
- configuration information
- encrypted
- wifi equipment
- data packet
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 52
- 239000000284 extract Substances 0.000 claims description 25
- 238000004364 calculation method Methods 0.000 claims description 18
- 238000004590 computer program Methods 0.000 claims description 17
- 238000006243 chemical reaction Methods 0.000 claims description 9
- 230000005540 biological transmission Effects 0.000 description 28
- 238000000605 extraction Methods 0.000 description 8
- 230000008569 process Effects 0.000 description 8
- 238000010586 diagram Methods 0.000 description 5
- 238000004422 calculation algorithm Methods 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 230000003321 amplification Effects 0.000 description 2
- 230000006872 improvement Effects 0.000 description 2
- 238000003780 insertion Methods 0.000 description 2
- 230000037431 insertion Effects 0.000 description 2
- 238000003199 nucleic acid amplification method Methods 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 210000004209 hair Anatomy 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention relates to a kind of information authentication method, device, computer equipment and storage medium, including:Obtain the first key identical with WIFI equipment, receive the data packet that WIFI equipment is sent, and generate the second key, the second key is encrypted using first key, obtain the 3rd key, the 3rd key and data packet are sent to WIFI equipment, receive the encrypted configuration information that WIFI equipment is sent, configuration information is that WIFI equipment is encrypted to obtain using the second key, second key is that WIFI equipment obtains the 3rd secret key decryption, encrypted configuration information is decrypted, the configuration information after being decrypted.Information decryption and the WIFI equipment successful match sent by exchanging key to WIFI equipment so as to reduce the configuration step of connection relation between network amplifier and WIFI equipment, and then improves the efficiency that wireless network establishes connection.
Description
Technical field
The present invention relates to fields of communication technology, more particularly to a kind of information authentication method, device, computer equipment and deposit
Storage media.
Background technology
With the development of science and technology, WLAN has been widely applied to all trades and professions.Since the house of inhabitation is got over
Come that bigger, room number is more and more, and traditional home wireless network router transmission power is relatively low, when house is larger or wears
When wall number is more, the problem of wireless network that router is sent is present with signal dead angle and weak output signal.In order to solve this
A little problems, traditional settling mode are to enhance signal strength using wireless network amplifier, realize that stablizing for wireless signal is through walls.
Due to generally requiring to configure equipment using wireless network amplifier enhancing signal strength, user needs to log in
WEB (World Wide Web, WWW), selection cipher mode and input key etc., cause radio network router and nothing
The configuration of link information between line network amplifier is very cumbersome, so that wireless network establishes the less efficient of connection.
The content of the invention
Based on this, it is necessary to for matching somebody with somebody for the link information between above-mentioned radio network router and wireless network amplifier
Put that process is very cumbersome so that wireless network establish connection it is less efficient the problem of, a kind of information authentication method, dress are provided
It puts, computer equipment and storage medium.
A kind of information authentication method, including:
Obtain the first key identical with WIFI equipment;
The data packet that the WIFI equipment is sent is received, and generates the second key;
Second key is encrypted using the first key, obtains the 3rd key;
The 3rd key and the data packet are sent to the WIFI equipment;
The encrypted configuration information that the WIFI equipment is sent is received, the configuration information is that the WIFI equipment uses
What second key was encrypted, second key is that the WIFI equipment obtains the 3rd secret key decryption
's;
The encrypted configuration information is decrypted, the configuration information after being decrypted.
In one embodiment, the data packet includes stamp, challenge field and random number at the first time;In the reception
After the data packet that the WIFI equipment is sent, the method further includes:
Extract first time stamp, challenge field and the random number in the data packet;
According to the first key, informative abstract calculating is carried out to first time stamp, challenge field and random number,
Obtain result of calculation;
The second current timestamp is obtained, second timestamp and the result of calculation are sent to the WIFI and set
It is standby.
In one embodiment, it is described that second key is encrypted using the first key, it is close to obtain the 3rd
Key, including:
According to the first key by the Parameter Switch of second key be ciphertext;
The ciphertext of the conversion is obtained, obtains encrypted 3rd key.
In one embodiment, it is described that the encrypted configuration information is decrypted, match somebody with somebody confidence after being decrypted
Breath, including:
Extract the ciphertext parameter of second key;
The encrypted configuration information is decrypted according to the ciphertext parameter, the configuration information after being decrypted,
The configuration information includes service set, authentication mode and channel information.
A kind of information authentication method, including:
Obtain the first key identical with network amplifier;
Data packet is sent to the network amplifier, the data packet is used to indicate the network amplifier using described the
The second key of generation is encrypted in one key, obtains the 3rd key;
Receive the solicited message that the network amplifier is sent, the solicited message includes the 3rd key and described
Data packet;
Configuration information is encrypted according to the solicited message, obtains encrypted configuration information;
The encrypted configuration information is sent to the network amplifier.
In one embodiment, the data packet includes challenge field, at the first time stamp and random number;The reception institute
After the solicited message for stating network amplifier transmission, the method further includes:
Obtain the second timestamp when the network amplifier sends the solicited message;
The challenge field in the data packet is extracted, and is asked using the challenge field and the first key to described
Information and second timestamp is asked to be verified;
After being proved to be successful, the 3rd key in the solicited message is extracted, and using the first key to the described 3rd
Key is decrypted, and obtains second key.
A kind of information authenticating apparatus, including:
First acquisition module, for obtaining the first key identical with WIFI equipment;
Packet-receiving module for receiving the data packet that the WIFI equipment is sent, and generates the second key;
Cipher key encryption block for second key to be encrypted using the first key, obtains the 3rd key;
Information sending module, for sending the 3rd key and the data packet to the WIFI equipment;
Configuration information receiving module, for receiving the encrypted configuration information that the WIFI equipment is sent, the configuration
Information is that the WIFI equipment is encrypted to obtain using second key, and second key is the WIFI equipment pair
What the 3rd secret key decryption obtained;
Configuration information deciphering module, for the encrypted configuration information to be decrypted, the configuration after being decrypted
Information.
In one embodiment, a kind of information authenticating apparatus, including:
Second acquisition module, for obtaining the first key identical with network amplifier;
Packet sending module, for sending data packet to the network amplifier, the data packet is used for the network
Amplifier is generated the second key and second key is encrypted using the first key, obtains the 3rd key;
Information receiving module, for receiving the solicited message that the network amplifier is sent, the solicited message includes institute
State the 3rd key and the data packet sent to the network amplifier;
Configuration information encrypting module, for, to encrypted configuration information is needed to be encrypted, being obtained according to the solicited message
To encrypted configuration information;
Configuration information sending module, for sending the encrypted configuration information to the network amplifier.
A kind of computer equipment including memory, processor and is stored in the memory and can be in the processing
The step of computer program run on device, the processor realizes method as described above when performing the computer program.
A kind of computer readable storage medium, the computer-readable recording medium storage have computer program, the meter
The step of calculation machine program realizes method as described above when being executed by processor.
Above- mentioned information authentication method, device, computer equipment and storage medium, by obtaining identical with WIFI equipment the
One key receives the data packet that WIFI equipment is sent, and generates the second key, and the second key is added using first key
It is close, the 3rd key is obtained, the 3rd key and data packet is sent to WIFI equipment, receives encrypted the matching somebody with somebody of WIFI equipment transmission
Confidence ceases, and configuration information is that WIFI equipment is encrypted to obtain using the second key, and the second key is WIFI equipment to the 3rd
What secret key decryption obtained, encrypted configuration information is decrypted, the configuration information after being decrypted.Due to WIFI equipment with
Network amplifier possesses the second identical key, therefore, after network amplifier receives the encryption information of WIFI equipment transmission,
It can be decrypted using the second cipher key pair information.Since first key encrypts the second key, it ensure that information passes
Defeated security, the information decryption sent to WIFI equipment by exchanging key and WIFI equipment successful match, so as to reduce
The configuration step of connection relation between network amplifier and WIFI equipment, and then improve the efficiency that wireless network establishes connection.
Description of the drawings
Fig. 1 is the applied environment figure of information authentication method in one embodiment;
Fig. 2 is the cut-away view of one embodiment Computer equipment;
Fig. 3 is the flow chart of message authentication method in one embodiment;
Fig. 4 is the method flow diagram that solicited message is sent in one embodiment;
Fig. 5 is the flow chart of message authentication method in another embodiment;
Fig. 6 is the method flow diagram verified in one embodiment to information;
Fig. 7 is the structure diagram of information authenticating apparatus in one embodiment;
Fig. 8 is the structure diagram of information authenticating apparatus in another embodiment.
Specific embodiment
To enable objects, features and advantages of the present invention more obvious understandable, below in conjunction with the accompanying drawings to the tool of the present invention
Body embodiment is described in detail.Many details are elaborated in the following description in order to fully understand the present invention.
But the invention can be embodied in many other ways as described herein, those skilled in the art can without prejudice to
Similar improvement is done in the case of intension of the present invention, therefore the present invention is not limited to the specific embodiments disclosed below.
Fig. 1 is the applied environment figure of information authentication method in one embodiment.As shown in Figure 1, the application environment includes net
Network amplifier 110 and WIFI equipment 120, wherein, it is carried out between network amplifier 110 and WIFI equipment 120 by ethernet line
Communication.
Network amplifier 110 has the function of to amplify network signal, and WIFI equipment can be router, network amplifier
110 can obtain the first key identical with WIFI equipment 120.Network amplifier 110 is receiving the transmission of WIFI equipment 120
After data packet, the information in data packet can be extracted and generate the second key.First key pair may be employed in network amplifier 110
Second key is encrypted, and obtains the 3rd key, and network amplifier 110 can send out obtained the 3rd key and solicited message
Give WIFI equipment 120.WIFI equipment 120 can test information after the information of the transmission of network amplifier 110 is received
Card, and the 3rd key is decrypted using first key, obtain the second key.WIFI equipment 120 can use the second key
Configuration information is encrypted, then encrypted configuration information is sent to network amplifier 110, network amplifier 110 receives
After the encrypted configuration information sent to WIFI equipment, the configuration information after the second key pair encryption can be used to be solved
It is close, finally obtain configuration information.Network amplifier 110 can preserve the configuration information obtained after decryption.
In one embodiment, a kind of computer equipment is provided, which can be network amplifier 110,
It can also be WIFI equipment 120.The internal structure of computer equipment is as shown in Fig. 2, the computer equipment is total including passing through system
Processor, storage medium, memory and the network interface of line connection.Wherein, the storage medium of computer equipment is stored with operation
System, database further include the computer program for being used to implement information authentication method and device.The processor is used to provide calculating
And control ability, support the operation of entire computer equipment.The computer program be processed execution when, may be such that processor realize
Information authentication method.The operation for inside saving as the computer program that information authentication method and device are realized in storage medium provides ring
Border, network interface is used to carry out network communication with external with computer equipment, for example, network amplifier 120 passes through network interface
Obtain the first key identical with WIFI equipment.Structure shown in Figure 2, only with the relevant part-structure of application scheme
Block diagram, do not form the restriction for the terminal being applied thereon to application scheme, specific terminal can include than in figure
Shown more or fewer components either combine some components or are arranged with different components.
In one embodiment, a kind of information authentication method is provided, is put with being applied to the network in above application environment
Big device comes for example, as shown in figure 3, including the following steps:
Step S302 obtains the first key identical with WIFI equipment.
Wherein, WIFI equipment is connected with network, can provide the interface for accessing network for each terminal as gateway, here
WIFI equipment can be router.Key is a kind of parameter, is to be converted into ciphertext in plain text or be converted into ciphertext in plain text
The parameter inputted in algorithm.
After network amplifier and WIFI equipment, which are powered, to be worked normally, the network specified is inserted by using ethernet line
When network amplifier is connected by interface with WIFI equipment, network amplifier can be immediately obtained by the ethernet line connected
To the first key identical with WIFI equipment.
Step S304 receives the data packet that WIFI equipment is sent, and generates the second key.
WIFI equipment can send data packet by the ethernet line connected.It can be root that WIFI equipment, which sends data packet,
According to customized Ethernet proprietary protocol, data are carried out by way of Linux Raw socket (Linux raw sockets)
Bag sends and receives.What customized Ethernet proprietary protocol can define data packet sends and receives interval time.
WIFI equipment can send data packet according to self-defined Ethernet proprietary protocol certain interval of time, for example, every 3
Second just send a data packet.Network amplifier, can be in data packet after the data packet of WIFI equipment transmission is received
Information extract, according in the data packet of extraction information generate the second key.
Step S306 is encrypted the second key using first key, obtains the 3rd key.
When detecting ethernet line insertion, WIFI equipment has just consulted common first key with network amplifier.It is raw
Into after the second key, network amplifier can be encrypted the second key using first key, and it is close to obtain the encrypted 3rd
Key.
Step S308 sends the 3rd key and data packet to WIFI equipment.
The 3rd obtained key can be sent to WIFI equipment by network amplifier.Network amplifier is to the letter in data packet
After breath extracts, while generating and sending three keys, data packet can also be then forwarded to WIFI equipment.
Step S310, receives the encrypted configuration information that WIFI equipment is sent, and configuration information is WIFI equipment using the
What two keys were encrypted, the second key is that WIFI equipment obtains the 3rd secret key decryption.
WIFI equipment receive network amplifier transmission the 3rd key and data packet after, can to receive the 3rd
Key is decrypted, the second key after being decrypted.This when, it is close that network amplifier with WIFI equipment has been owned by second
Key, WIFI equipment can use the second key that can obtain encrypted configuration to encrypted configuration information is needed to be encrypted
Information.Obtained encrypted configuration information can be sent to network amplifier by WIFI equipment, i.e. network amplifier can connect
Receive the encrypted configuration information that WIFI equipment is sent.
Encrypted configuration information is decrypted in step S312, the configuration information after being decrypted.
Network amplifier and WIFI equipment have been owned by the second key, network amplifier receive it is encrypted with confidence
After breath, the configuration information after the second key pair encryption can be used to be decrypted.Configuration information is that WIFI equipment is close using second
Network amplifier is sent to after key encryption, the encrypting and decrypting based on key can only all use the principle of same key, and network is put
Big device can only just use the configuration information after the second key pair encryption to be decrypted.Network amplifier can be decrypted after match somebody with somebody
Confidence ceases.
By obtaining the first key identical with WIFI equipment, the data packet that WIFI equipment is sent is received, and generates second
Key is encrypted the second key using first key, obtains the 3rd key, sends the 3rd key and data packet to WIFI
Equipment receives the encrypted configuration information that WIFI equipment is sent, and configuration information is that WIFI equipment is added using the second key
Close to obtain, the second key is that WIFI equipment obtains the 3rd secret key decryption, encrypted configuration information is decrypted, is obtained
Configuration information after to decryption.Since WIFI equipment and network amplifier possess the second identical key, when network amplifies
After device receives the encryption information of WIFI equipment transmission, it can be decrypted using the second cipher key pair information.Due to first key
Second key is encrypted, ensure that the security of information transmission, the information sent by exchanging key to WIFI equipment
Decryption and WIFI equipment successful match, so as to reduce the configuration step of connection relation between network amplifier and WIFI equipment,
And then improve the efficiency that wireless network establishes connection.
In one embodiment, as described in Figure 4, a kind of information authentication method provided further includes the mistake for sending solicited message
Journey, specific steps include:
Step S402 extracts first time stamp, challenge field and random number in data packet.
Wherein, first time stamp is specific time point when WIFI equipment sends data packet to network amplifier.
It is one section of parameter to challenge field, for being transmitted after password Hybrid Encryption, ensureing password not plaintext transmission, can be random a string
Character string, in units of byte, for example, byte be 20 challenge field.Random number is according to first time stamp, WIFI equipment
MAC (Media Access Control) address generated as random number seed.Network amplifier can extract data
First time stamp, challenge field and random number in bag.
According to first key, informative abstract meter is carried out to first time stamp, challenge field and random number by step S404
It calculates, obtains result of calculation.
Informative abstract, which calculates, SHA-256 (Secure Hash Algorithm) to be used to calculate.Network amplifier can use first
Timestamp, first key, challenge field and nonce count calculate informative abstract, and the result calculated can be a string of characters
String.
Step S406, obtains the second current timestamp, and the second timestamp and result of calculation are sent to WIFI equipment.
Network amplifier can get the second timestamp by the current time, then by the second timestamp and calculate
Informative abstract result by Request ask in a manner of be sent to WIFI equipment.
First time stamp, challenge field and the random number in data packet are extracted, according to first key, at the first time
Stamp, challenge field and random number carry out informative abstract calculating, obtain result of calculation, obtain the second current timestamp, by the
Two timestamps and result of calculation are sent to WIFI equipment.Informative abstract is calculated using first key, and uses Request request hairs
Result of calculation is sent, improves the security of information transmission.
In one embodiment, a kind of information authentication method provided further includes the process that the second key is encrypted,
It specifically includes:According to first key by the Parameter Switch of the second key be ciphertext;The ciphertext of conversion is obtained, obtains encrypted the
Three keys.
The effect of key is exactly to encrypted information is needed to be encrypted.The process that cipher key pair information is encrypted is exactly will
Cleartext information is converted into the process of cipher-text information.Network amplifier can use first key to turn the plaintext parameter of the second key
Change ciphertext parameter into.The ciphertext parameter for the conversion that network amplifier is got is exactly encrypted 3rd key.
By the Parameter Switch of the second key it is ciphertext according to first key, obtains the ciphertext of conversion, obtains encrypted the
Three keys.By the way that the second key is encrypted to obtain the 3rd key, the security in message transmitting procedure is improved.
In one embodiment, a kind of information authentication method provided further includes the process that configuration information is decrypted,
Specific steps include:Extract the ciphertext parameter of the second key.Encrypted configuration information is decrypted according to ciphertext parameter, is obtained
Configuration information after to decryption, configuration information include service set, authentication mode and channel information.
Configuration information is encrypted using the second key, equally, decryption when be also required to using the second key into
Row decryption.Network amplifier can extract the ciphertext parameter of the second key, using the ciphertext parameter of the second key to encrypted
Configuration information is decrypted.Configuration information can include service set, authentication mode and channel information.Network amplifier makes
It can be obtained by the configuration information after decryption after configuration information is decrypted with the ciphertext parameter of the second key, that is, service
Set identifier, authentication mode and channel information etc..
By extracting the ciphertext parameter of the second key, encrypted configuration information is decrypted according to ciphertext parameter, is obtained
Configuration information after to decryption, configuration information include service set, authentication mode and channel information.Due to the use of second
Configuration information is decrypted in key, therefore obtained configuration information is more accurate, while also ensures the safety of configuration information
Property.
Another embodiment provides a kind of information authentication method, to be applied to the WIFI equipment in application environment
Come for example, as shown in figure 5, including the following steps:
Step S502 obtains the first key identical with network amplifier.
Wherein, the effect of network amplifier is extended network signal, and the mesh of access network is reached by connecting WIFI equipment
's.After network amplifier and WIFI equipment, which are powered, to be worked normally, the network interface specified is inserted by using ethernet line
When network amplifier is connected with WIFI equipment, WIFI equipment can be immediately obtained and net by the ethernet line connected
The identical first key of network amplifier.
Step S504 sends data packet to network amplifier, and data packet is used to indicate network amplifier using first key
Second key of generation is encrypted, obtains the 3rd key.
When WIFI equipment detects ethernet line access, it can start to send data packet to network amplifier.WIFI equipment
It can be sent out according to customized Ethernet proprietary protocol by way of Linux Raw socket (Linux raw sockets)
Send data packet.Containing stamp at the first time, the challenge information such as field and random number in data packet, network amplifier can basis
The data packet that WIFI equipment is sent is encrypted the second key of generation using first key, and obtains the 3rd key.
Step S506, receives the solicited message that network amplifier is sent, and solicited message includes the 3rd key and data packet.
WIFI equipment can also receive the Request solicited messages of network amplifier transmission.It wherein, can be in solicited message
The 3rd key of network amplifier generation is included, the data packet by network amplifier processing can also be included.
Step S508 is encrypted configuration information according to solicited message, obtains encrypted configuration information.
Network amplifier send solicited message in can include summary info result of calculation and the second key is added
The 3rd key obtained after close.Wherein, calculating summary info is calculated using SHA-256 (Secure Hash Algorithm).WIFI equipment
The 3rd key can be decrypted using first key, the second key after being decrypted.WIFI equipment can also use solution
Configuration information is encrypted in the second key after close, obtains encrypted configuration information.
Step S510 sends encrypted configuration information to network amplifier.
WIFI equipment can equally use Linux Raw socket (the original sets of Linux by self-defined Ethernet protocol
Connect word) mode, encrypted configuration information is sent to network amplifier.
By obtaining the first key identical with network amplifier, data packet is sent to network amplifier, data packet is used for
Instruction network amplifier is encrypted the second key of generation using first key, obtains the 3rd key, receives network amplification
The solicited message that device is sent, solicited message include the 3rd key and data packet, configuration information are added according to solicited message
It is close, encrypted configuration information is obtained, sends encrypted configuration information to network amplifier.Since first key is close to second
Key is encrypted, and ensure that the security of information transmission, the information decryption that is sent to WIFI equipment by exchanging key and
WIFI equipment successful match, so as to reduce the configuration step of connection relation between network amplifier and WIFI equipment, Jin Erti
High wireless network establishes the efficiency of connection.
As shown in fig. 6, in one embodiment, a kind of information authentication method provided further includes what information was verified
Process specifically includes:
Step S602 obtains the second timestamp when network amplifier sends solicited message.
Second timestamp is the specific time point that network amplifier sends solicited message.WIFI equipment can be according to network
The time that amplifier sends solicited message gets the second timestamp.
Step S604 extracts the challenge field in data packet, and using challenge field and first key to solicited message
And second timestamp verified.
WIFI equipment, which is sent in the data packet in network amplifier, to be included challenge field and stabs at the first time.WIFI
Equipment can extract the challenge field in data packet and stab at the first time.WIFI equipment first can be according to the first time of extraction
It stabs and the second timestamp verifies the time, it can also be by the challenge field of extraction and the challenge for being sent to network amplifier
Field is verified.
Step S606 after being proved to be successful, extracts the 3rd key in solicited message, and using first key to the 3rd key
It is decrypted, obtains the second key.
After WIFI equipment is proved to be successful challenge field and timestamp, the 3rd key in solicited message can be extracted.
WIFI equipment has identical first key with network amplifier, it is possible to the 3rd key is decrypted using first key,
3rd key is encrypted to obtain to the second key.It is close that WIFI equipment can obtain second after the 3rd key is decrypted
Key.
The second timestamp when sending solicited message by obtaining network amplifier, extracts the challenge field in data packet,
And solicited message and the second timestamp are verified using challenge field and first key, after being proved to be successful, extraction please
The 3rd key in information is sought, and the 3rd key is decrypted using first key, obtains the second key.Information is tested
The second key can be just obtained after demonstrate,proving and decrypting, ensure that the security of information transmission.
In one embodiment, a kind of information authentication method is provided, realizes that this method is as follows:
First, when WIFI equipment and network amplifier detect ethernet line insertion, WIFI equipment can with network amplifier
To reciprocally negotiate shared key, shared key here can be first key.After negotiating about cipher key shared, WIFI equipment and network
Amplifier can get identical first key.WIFI equipment can send data packet to network amplifier.WIFI equipment
It can be sent out according to customized Ethernet proprietary protocol by way of Linux Raw socket (Linux raw sockets)
Send data packet.
Secondly, network amplifier can receive the data packet of WIFI equipment transmission, and generate the second key.WIFI equipment can
To send data packet according to self-defined Ethernet proprietary protocol certain interval of time, for example, just sending a data every 3 seconds
Bag.Network amplifier can extract the information in data packet after the data packet of WIFI equipment transmission is received, according to
Information in the data packet of extraction generates the second key.
Then, network amplifier can extract first time stamp, challenge field and the random number in data packet.Wherein,
Stamp is specific time point when WIFI equipment sends data packet to network amplifier at the first time.It is one section to challenge field
Parameter, for being transmitted after password Hybrid Encryption, ensureing password not plaintext transmission, can be a string of random character strings, with word
It saves as unit, for example, byte is 20 challenge field.Random number is the MAC (Media according to first time stamp, WIFI equipment
Access Control) address generates as random number seed.When network amplifier can extract first in data packet
Between stamp, challenge field and random number.Further according to first key, letter is carried out to first time stamp, challenge field and random number
Digest calculations are ceased, obtain result of calculation.Informative abstract, which calculates, SHA-256 (Secure Hash Algorithm) to be used to calculate, and calculate
The result come can be a string of character strings.Network amplifier can obtain the second current timestamp, by the second timestamp and meter
It calculates result and is sent to WIFI equipment.Network amplifier can get the second timestamp by the current time, then during by second
Between the informative abstract result stabbing and calculate be sent to WIFI equipment in a manner that Request is asked.
Then, network amplifier may be employed first key and the second key be encrypted, and obtain the 3rd key.It is detecting
When being inserted into ethernet line, WIFI equipment has just consulted common first key with network amplifier.After generating the second key, net
Network amplifier can be encrypted the second key using first key, obtain encrypted 3rd key.Network amplifier can
Using according to first key by the Parameter Switch of the second key as ciphertext.The effect of key is exactly to encrypted information is needed to add
It is close.The process that cipher key pair information is encrypted is exactly that cleartext information is converted into the process of cipher-text information.Network amplifier can be with
Using first key by the plaintext Parameter Switch of the second key into ciphertext parameter.Network amplifier can also obtain the close of conversion
Text obtains encrypted 3rd key.The ciphertext parameter for the conversion that network amplifier is got is exactly encrypted 3rd key.
Then, network amplifier can send the 3rd key and data packet to WIFI equipment.Network amplifier can incite somebody to action
The 3rd obtained key is sent to WIFI equipment.After network amplifier extracts the information in data packet, generation is concurrent
While sending three keys, data packet can also be then forwarded to WIFI equipment.Network amplifier can also receive WIFI equipment
The encrypted configuration information sent, configuration information is that WIFI equipment is encrypted to obtain using the second key, the second key
It is that WIFI equipment obtains the 3rd secret key decryption.Encrypted configuration information can be decrypted in network amplifier, obtain
Configuration information after decryption.Network amplifier has been owned by the second key with WIFI equipment, and network amplifier is receiving encryption
After configuration information afterwards, the configuration information after the second key pair encryption can be used to be decrypted.Configuration information is WIFI equipment
Network amplifier is sent to after being encrypted using the second key, the encrypting and decrypting based on key can only all use the original of same key
Reason, network amplifier can only just use the configuration information after the second key pair encryption to be decrypted.Network amplifier can obtain
Configuration information after decryption.
Then, WIFI equipment can receive network amplifier transmission solicited message, solicited message include the 3rd key with
And data packet.WIFI equipment can also receive the Request solicited messages of network amplifier transmission.It wherein, can in solicited message
With the 3rd key generated comprising network amplifier, the data packet by network amplifier processing can also be included.
Then, WIFI equipment obtains the second timestamp when network amplifier sends solicited message.Second timestamp is net
Network amplifier sends the specific time point of solicited message.WIFI equipment can according to network amplifier send solicited message when
Between get the second timestamp.WIFI equipment can extract the challenge field in data packet, and use challenge field and first
Key verifies solicited message and the second timestamp.After being proved to be successful, WIFI equipment can be extracted in solicited message
3rd key, and the 3rd key is decrypted using first key, obtain the second key.After WIFI equipment can send encryption
Configuration information to network amplifier.
Then, network amplifier receives the encrypted configuration information that WIFI equipment is sent, and configuration information is WIFI equipment
It is encrypted using the second key, the second key is that WIFI equipment obtains the 3rd secret key decryption.WIFI equipment exists
After the 3rd key and the data packet that receive network amplifier transmission, the 3rd key received can be decrypted, obtained
The second key after decryption.This when, network amplifier have been owned by the second key with WIFI equipment, and WIFI equipment can make
With the second key to encrypted configuration information is needed to be encrypted, encrypted configuration information can be obtained.WIFI equipment can be with
Obtained encrypted configuration information is sent to network amplifier, i.e. network amplifier can receive adding for WIFI equipment transmission
Configuration information after close.
Finally, encrypted configuration information is decrypted in network amplifier, the configuration information after being decrypted.Network is put
Big device can also extract the ciphertext parameter of the second key, and encrypted configuration information is decrypted according to ciphertext parameter, is obtained
Configuration information after decryption, configuration information include service set, authentication mode and channel information.
As shown in fig. 7, in one embodiment, a kind of information authenticating apparatus is provided, including:
First acquisition module 710, for obtaining the first key identical with WIFI equipment.
Packet-receiving module 720 for receiving the data packet of WIFI equipment transmission, and generates the second key.
Cipher key encryption block 730 for the second key to be encrypted using first key, obtains the 3rd key.
Information sending module 740, for sending the 3rd key and data packet to WIFI equipment.
Configuration information receiving module 750, for receiving the encrypted configuration information of WIFI equipment transmission, configuration information is
What WIFI equipment was encrypted using the second key, the second key is that WIFI equipment obtains the 3rd secret key decryption.
Configuration information deciphering module 760 for encrypted configuration information to be decrypted, matches somebody with somebody confidence after being decrypted
Breath.
In one embodiment, data packet includes stamp, challenge field and random number at the first time.Information sending module
740 can be also used for first time stamp, challenge field and random number in extraction data packet, according to first key, to first
Timestamp, challenge field and random number carry out informative abstract calculating, obtain result of calculation, obtain the second current timestamp,
Second timestamp and result of calculation are sent to WIFI equipment.
In one embodiment, cipher key encryption block 730 can be also used for the parameter of the second key according to first key
Ciphertext is converted to, obtains the ciphertext of conversion, obtains encrypted 3rd key.
In one embodiment, configuration information deciphering module 760 can be also used for the ciphertext parameter of the second key of extraction, root
Encrypted configuration information is decrypted according to ciphertext parameter, the configuration information after being decrypted, configuration information includes services set
Mark, authentication mode and channel information.
As shown in figure 8, another embodiment provides a kind of information authenticating apparatus, including:
Second acquisition module 810, for obtaining the first key identical with network amplifier.
Packet sending module 820, for sending data packet to network amplifier, data packet generates for network amplifier
Second key is simultaneously encrypted the second key using first key, obtains the 3rd key.
Information receiving module 830, for receiving the solicited message of network amplifier transmission, solicited message includes the 3rd key
And the data packet to network amplifier transmission.
Configuration information encrypting module 840, for, to encrypted configuration information is needed to be encrypted, being obtained according to solicited message
Encrypted configuration information.
Configuration information sending module 850, for sending encrypted configuration information to network amplifier.
In one embodiment, when information receiving module 830 can be also used for obtaining network amplifier transmission solicited message
The second timestamp, extract the challenge field in data packet, and using challenge field and first key to solicited message and
Second timestamp is verified, after being proved to be successful, extracts the 3rd key in solicited message, and close to the 3rd using first key
Key is decrypted, and obtains the second key.
In one embodiment, a kind of computer readable storage medium is also provided, the computer-readable recording medium storage
There is computer program, which realizes following steps when being executed by processor:Obtain first identical with WIFI equipment
Key receives the data packet that WIFI equipment is sent, and generates the second key, and the second key is encrypted using first key,
The 3rd key is obtained, the 3rd key and data packet is sent to WIFI equipment, receives the encrypted configuration that WIFI equipment is sent
Information, configuration information are that WIFI equipment is encrypted to obtain using the second key, and the second key is that WIFI equipment is close to the 3rd
What key was decrypted, encrypted configuration information is decrypted, the configuration information after being decrypted.
In one embodiment, computer program is executed by processor transmission solicited message, including:It extracts in data packet
Stamp, challenge field and random number at the first time, according to first key, to first time stamp, challenge field and random number into
Row information digest calculations, obtain result of calculation, obtain the second current timestamp, the second timestamp and result of calculation are sent to
WIFI equipment.
In one embodiment, computer program, which is executed by processor, is encrypted the second key, including:According to first
The Parameter Switch of second key is ciphertext by key, is obtained the ciphertext of conversion, is obtained encrypted 3rd key.
In one embodiment, computer program, which is executed by processor, is decrypted configuration information, including:Extraction second
The ciphertext parameter of key is decrypted encrypted configuration information according to ciphertext parameter, and the configuration information after being decrypted is matched somebody with somebody
Confidence breath includes service set, authentication mode and channel information.
In another embodiment, a kind of computer readable storage medium is also provided, which deposits
Computer program is contained, which realizes following steps when being executed by processor:It obtains identical with network amplifier
First key sends data packet to network amplifier, and data packet is used to indicate network amplifier using first key to generation
Second key is encrypted, and obtains the 3rd key, receives the solicited message that network amplifier is sent, it is close that solicited message includes the 3rd
Key and data packet are encrypted configuration information according to solicited message, obtain encrypted configuration information, send encrypted
Configuration information is to network amplifier.
In one embodiment, computer program, which is executed by processor, verifies information, including:Obtain network amplification
Device sends the second timestamp during solicited message, extracts the challenge field in data packet, and close using challenge field and first
Key verifies solicited message and the second timestamp, after being proved to be successful, extracts the 3rd key in solicited message, and uses
The 3rd key is decrypted in first key, obtains the second key.
One of ordinary skill in the art will appreciate that realizing all or part of flow in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, it is non-volatile computer-readable that the program can be stored in one
It takes in storage medium, in the embodiment of the present invention, which can be stored in the non-volatile memory medium of computer system, and
It is performed by least one processor in the computer system, to realize the flow for including the embodiment such as above-mentioned each method.This
Non-volatile and/or volatibility may include to any reference of memory, storage, database or other media used in application
Memory.Suitable nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), electrically programmable ROM
(EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include random access memory
(RAM), it is used as external cache.By way of illustration and not limitation, RAM is available in many forms, such as static state RAM
(SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDR SDRAM), enhanced SDRAM
(ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) directly RAM (RDRAM), straight
Connect memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM).
Each technical characteristic of embodiment described above can be combined arbitrarily, to make description succinct, not to above-mentioned reality
It applies all possible combination of each technical characteristic in example to be all described, as long as however, the combination of these technical characteristics is not deposited
In contradiction, the scope that this specification is recorded all is considered to be.
Embodiment described above only expresses the several embodiments of the present invention, and description is more specific and detailed, but simultaneously
It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that come for those of ordinary skill in the art
It says, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to the protection of the present invention
Scope.Therefore, the protection domain of patent of the present invention should be determined by the appended claims.
Claims (10)
1. a kind of information authentication method, which is characterized in that the described method includes:
Obtain the first key identical with WIFI equipment;
The data packet that the WIFI equipment is sent is received, and generates the second key;
Second key is encrypted using the first key, obtains the 3rd key;
The 3rd key and the data packet are sent to the WIFI equipment;
The encrypted configuration information that the WIFI equipment is sent is received, the configuration information is described in the WIFI equipment uses
What the second key was encrypted, second key is that the WIFI equipment obtains the 3rd secret key decryption;
The encrypted configuration information is decrypted, the configuration information after being decrypted.
2. according to the method described in claim 1, it is characterized in that, the data packet include at the first time stamp, challenge field with
And random number;After the data packet for receiving the WIFI equipment and sending, the method further includes:
Extract first time stamp, challenge field and the random number in the data packet;
According to the first key, informative abstract calculating is carried out to first time stamp, challenge field and random number, is obtained
Result of calculation;
The second current timestamp is obtained, second timestamp and the result of calculation are sent to the WIFI equipment.
3. according to the method described in claim 1, which is characterized in that described close to described second using the first key
Key is encrypted, and obtains the 3rd key, including:
According to the first key by the Parameter Switch of second key be ciphertext;
The ciphertext of the conversion is obtained, obtains encrypted 3rd key.
4. method according to claim 1, which is characterized in that it is described that the encrypted configuration information is decrypted, it obtains
Configuration information after to decryption, including:
Extract the ciphertext parameter of second key;
The encrypted configuration information is decrypted according to the ciphertext parameter, the configuration information after being decrypted is described
Configuration information includes service set, authentication mode and channel information.
5. a kind of information authentication method, which is characterized in that the described method includes:
Obtain the first key identical with network amplifier;
Data packet is sent to the network amplifier, it is close using described first that the data packet is used to indicate the network amplifier
The second key of generation is encrypted in key, obtains the 3rd key;
The solicited message that the network amplifier is sent is received, the solicited message includes the 3rd key and the data
Bag;
Configuration information is encrypted according to the solicited message, obtains encrypted configuration information;
The encrypted configuration information is sent to the network amplifier.
6. according to the method described in claim 5, it is characterized in that, the data packet include challenge field, at the first time stamp with
And random number;After the solicited message for receiving the network amplifier and sending, the method further includes:
Obtain the second timestamp when the network amplifier sends the solicited message;
The challenge field in the data packet is extracted, and the request is believed using the challenge field and the first key
Breath and second timestamp are verified;
After being proved to be successful, the 3rd key in the solicited message is extracted, and using the first key to the 3rd key
It is decrypted, obtains second key.
7. a kind of information authenticating apparatus, which is characterized in that described device includes:
First acquisition module, for obtaining the first key identical with WIFI equipment;
Packet-receiving module for receiving the data packet that the WIFI equipment is sent, and generates the second key;
Cipher key encryption block for second key to be encrypted using the first key, obtains the 3rd key;
Information sending module, for sending the 3rd key and the data packet to the WIFI equipment;
Configuration information receiving module, for receiving the encrypted configuration information that the WIFI equipment is sent, the configuration information
The WIFI equipment is encrypted to obtain using second key, and second key is the WIFI equipment to described
What the 3rd secret key decryption obtained;
Configuration information deciphering module, for the encrypted configuration information to be decrypted, the configuration information after being decrypted.
8. a kind of information authenticating apparatus, which is characterized in that described device includes:
Second acquisition module, for obtaining the first key identical with network amplifier;
Packet sending module, for sending data packet to the network amplifier, the data packet is amplified for the network
Device is generated the second key and second key is encrypted using the first key, obtains the 3rd key;
Information receiving module, for receiving the solicited message that the network amplifier is sent, the solicited message includes described the
Three keys and the data packet sent to the network amplifier;
Configuration information encrypting module, for, to encrypted configuration information is needed to be encrypted, being added according to the solicited message
Configuration information after close;
Configuration information sending module, for sending the encrypted configuration information to the network amplifier.
9. a kind of computer equipment, including memory, processor and it is stored in the memory and can be in the processor
The computer program of upper operation, which is characterized in that the processor realized when performing the computer program as claim 1 to
The step of any one of 6 the method.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists
In when the computer program is executed by processor the step of realization such as any one of claim 1 to 6 the method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711268194.3A CN108092958B (en) | 2017-12-05 | 2017-12-05 | Information authentication method and device, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711268194.3A CN108092958B (en) | 2017-12-05 | 2017-12-05 | Information authentication method and device, computer equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108092958A true CN108092958A (en) | 2018-05-29 |
CN108092958B CN108092958B (en) | 2021-05-28 |
Family
ID=62173718
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711268194.3A Active CN108092958B (en) | 2017-12-05 | 2017-12-05 | Information authentication method and device, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108092958B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110310392A (en) * | 2019-05-22 | 2019-10-08 | 平安科技(深圳)有限公司 | Unlocking method of vehicle, device, computer equipment and storage medium |
WO2020000428A1 (en) * | 2018-06-29 | 2020-01-02 | Nokia Shanghai Bell Co., Ltd. | Methods, devices and computer readable medium for key management |
CN113411283A (en) * | 2020-03-16 | 2021-09-17 | 中国电信股份有限公司 | Bidirectional authentication method, device and system |
CN114520730A (en) * | 2020-11-20 | 2022-05-20 | 腾讯科技(深圳)有限公司 | Data transmission method, device, system, computer equipment and storage medium |
CN114697000A (en) * | 2020-12-28 | 2022-07-01 | 深圳Tcl新技术有限公司 | Network distribution method, device, terminal and computer readable storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101621796A (en) * | 2009-07-22 | 2010-01-06 | 中兴通讯股份有限公司 | Method and device for access point automatic alignment in wireless distribution system |
CN102204391A (en) * | 2011-05-27 | 2011-09-28 | 华为终端有限公司 | Repeater wps connection method and device |
CN102685745A (en) * | 2012-04-23 | 2012-09-19 | 深圳市江波龙电子有限公司 | Wireless access point (AP) equipment authentication method and system |
CN104754565A (en) * | 2013-12-27 | 2015-07-01 | 中兴通讯股份有限公司 | Wireless parameter sending and receiving method and device |
CN106341867A (en) * | 2016-08-30 | 2017-01-18 | 合肥润东通信科技股份有限公司 | Wireless matching device and wireless matching method |
-
2017
- 2017-12-05 CN CN201711268194.3A patent/CN108092958B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101621796A (en) * | 2009-07-22 | 2010-01-06 | 中兴通讯股份有限公司 | Method and device for access point automatic alignment in wireless distribution system |
CN102204391A (en) * | 2011-05-27 | 2011-09-28 | 华为终端有限公司 | Repeater wps connection method and device |
CN102685745A (en) * | 2012-04-23 | 2012-09-19 | 深圳市江波龙电子有限公司 | Wireless access point (AP) equipment authentication method and system |
CN104754565A (en) * | 2013-12-27 | 2015-07-01 | 中兴通讯股份有限公司 | Wireless parameter sending and receiving method and device |
CN106341867A (en) * | 2016-08-30 | 2017-01-18 | 合肥润东通信科技股份有限公司 | Wireless matching device and wireless matching method |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020000428A1 (en) * | 2018-06-29 | 2020-01-02 | Nokia Shanghai Bell Co., Ltd. | Methods, devices and computer readable medium for key management |
CN112368989A (en) * | 2018-06-29 | 2021-02-12 | 上海诺基亚贝尔股份有限公司 | Method, apparatus and computer readable medium for key management |
CN112368989B (en) * | 2018-06-29 | 2023-02-03 | 上海诺基亚贝尔股份有限公司 | Method, apparatus and computer readable medium for key management |
CN110310392A (en) * | 2019-05-22 | 2019-10-08 | 平安科技(深圳)有限公司 | Unlocking method of vehicle, device, computer equipment and storage medium |
CN110310392B (en) * | 2019-05-22 | 2021-07-16 | 平安科技(深圳)有限公司 | Vehicle unlocking method and device, computer equipment and storage medium |
CN113411283A (en) * | 2020-03-16 | 2021-09-17 | 中国电信股份有限公司 | Bidirectional authentication method, device and system |
CN113411283B (en) * | 2020-03-16 | 2022-08-30 | 中国电信股份有限公司 | Bidirectional authentication method, device and system |
CN114520730A (en) * | 2020-11-20 | 2022-05-20 | 腾讯科技(深圳)有限公司 | Data transmission method, device, system, computer equipment and storage medium |
CN114520730B (en) * | 2020-11-20 | 2023-06-20 | 腾讯科技(深圳)有限公司 | Data transmission method, device, system, computer equipment and storage medium |
CN114697000A (en) * | 2020-12-28 | 2022-07-01 | 深圳Tcl新技术有限公司 | Network distribution method, device, terminal and computer readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN108092958B (en) | 2021-05-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108092958A (en) | Information authentication method, device, computer equipment and storage medium | |
CN1964258B (en) | Method for secure device discovery and introduction | |
CN108683510B (en) | User identity updating method for encrypted transmission | |
CN108683501B (en) | Multiple identity authentication system and method with timestamp as random number based on quantum communication network | |
US20070189528A1 (en) | Wireless LAN transmitting and receiving apparatus and key distribution method | |
Saxena et al. | Dynamic secrets and secret keys based scheme for securing last mile smart grid wireless communication | |
CN108400867A (en) | A kind of authentication method based on public encryption system | |
CN105871918A (en) | Household appliance, communication system and method between household appliance and cloud server as well as cloud server | |
JP6807153B2 (en) | Devices and related methods for secure hearing device communication | |
US11924911B2 (en) | Extreme-high-throughput fast initial link setup support in multi-link operation in wireless communications | |
EP3570487B1 (en) | Private key generation method, device and system | |
WO2011142353A1 (en) | Communication device and communication method | |
CN112672342B (en) | Data transmission method, device, equipment, system and storage medium | |
CN105407109A (en) | Data secure transmission method between Bluetooth devices | |
CN108964895B (en) | User-to-User identity authentication system and method based on group key pool and improved Kerberos | |
US9356931B2 (en) | Methods and apparatuses for secure end to end communication | |
Moscaritolo et al. | Silent circle instant messaging protocol protocol specification | |
CN106209756B (en) | Password update method, user equipment, subscriber location servers and domain router | |
CN102281303A (en) | Data exchange method | |
CN106209384B (en) | Use the client terminal of security mechanism and the communication authentication method of charging unit | |
Agosta et al. | Cyber-security analysis and evaluation for smart home management solutions | |
CN108965266B (en) | User-to-User identity authentication system and method based on group key pool and Kerberos | |
CN110784870A (en) | Wireless local area network secure communication method and system and authentication server | |
KR100599199B1 (en) | System and method for generating encryption key of wireless device in wireless local area network secure system | |
DE102021113263A1 (en) | Extreme-High-Throughput-Fast-Initial-Link-Setup-Support in a multi-link operation in radio communications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20231110 Address after: No.2, Danzi North Road, Kengzi street, Pingshan District, Shenzhen, Guangdong 518000 Patentee after: SHENZHEN GONGJIN ELECTRONICS Co.,Ltd. Address before: 610000 area B, 10th floor, building 1, No.168, Tianfu 5th Street, high tech Zone, Chengdu, Sichuan Province Patentee before: CHENGDU GONGWEI TECHNOLOGY CO.,LTD. |