CN108449754A - The method that smart machine is surfed the Internet by wireless routing - Google Patents
The method that smart machine is surfed the Internet by wireless routing Download PDFInfo
- Publication number
- CN108449754A CN108449754A CN201810220759.9A CN201810220759A CN108449754A CN 108449754 A CN108449754 A CN 108449754A CN 201810220759 A CN201810220759 A CN 201810220759A CN 108449754 A CN108449754 A CN 108449754A
- Authority
- CN
- China
- Prior art keywords
- wireless routing
- smart machine
- password
- wireless
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
- H04L63/205—Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of methods that smart machine is surfed the Internet by wireless routing, include the following steps:(1) setting smart machine connects the password of wireless routing;(2) smart machine sends the information with password to wireless routing;(3) wireless routing obtains password and smart machine is surfed the Internet by wireless routing, wherein, one set of selection sequentially from two or more set, each of two or more set set is with authorization method and encryption method, and one be sequentially selected in Connection Step gathers sequentially to attempt connection of the smart machine to wireless routing.The present invention has the advantages that normal user operation can be facilitated.
Description
Technical field
The present invention relates to method for connecting network, logical more particularly, to a kind of smart machine that can facilitate normal user operation
The method for crossing wireless routing online.
Background technology
With the tremendous development of wireless communication technique and router technology, wireless communication technique is more and more extensive to be applied to respectively
A field.Present wireless router is all the technology for being integrated with WiMAX, and net is carried out by the WiFi technology of WLAN
Network is shared, extends the application field of WiMAX, reduces the threshold of wireless access, meets the need that people surf the Internet whenever and wherever possible
It wants.When smart machine is connected with wireless routing, it is desirable that wireless routing has mounted predetermined wireless setting.If passed through
Authorize and/or encrypt the setting for then requiring wireless routing to have to mounted mandate/encryption method to protect wireless network.
It is in the wireless network extremely complex and reluctant with encrypted be arranged for ordinary user to authorizing.
Invention content
To solve the above problems, present invention aims at a kind of smart machines that can facilitate normal user operation of offer to pass through
The method of wireless routing online.
The present invention realized by following technical measures, a kind of method that smart machine is surfed the Internet by wireless routing, including
Following steps:
(1) setting smart machine connects the password of wireless routing;
(2) smart machine sends the information with password to wireless routing;
(3) wireless routing obtains password and smart machine is surfed the Internet by wireless routing, wherein sequentially from two or more
One set of selection in two set, each of two or more set set have authorization method and encryption side
Method, and one be sequentially selected in Connection Step gathers sequentially to attempt connection of the smart machine to wireless routing,
The shared key creation method of wherein password includes the following steps:
(1) smart machine and wireless routing both sides choose the braid group B that index is n >=11n, and defined in following presentation
Group Bn:
Bn=<σ1,σ2,…,σn-1|σiσj=σjσi,|i-j|≥2,σiσi+1σi=σi+1σiσi+1, 1≤i≤n-2 >
The group BnElement with set { σ1,σ2,…,σn-1On represent the normal form with uniqueness of the element
Word indicate;
(2) smart machine and wireless routing both sides both sides choose B respectivelynIn two groups of element a1,a2,…,akAnd b1,b2,…,
bm;a1,a2,…,akAnd b1,b2,…,bmB is generated respectivelynTwo subgroups A and B;
(3) smart machine chooses an element x=x (a1,a2,…,ak) ∈ A are as the first private key, and by x-1b1x,x- 1b2x,…,x-1bmX is sent to wireless routing;
(4) wireless routing chooses an element y=y (b1,b2,…,bm) ∈ B are as the second private key, and by y-1a1y,y- 1a2y,…,y-1akY is sent to smart machine;
(5) smart machine receives all a in x after the element that wireless routing is sentiReplace with y-1aiY (i=1,
2 ..., k) it obtains
KA=x-1x(y-1a1y,y-1a2y,…,y-1akY)=x-1y-1xy;
(6) wireless routing receives all b in y after the element that smart machine is sentjReplace with x-1bjX (j=1,
2 ..., m) it obtains
y-1y(x-1b1x,x-1b2x,…,x-1bkX)=y-1x-1yx,
And it is calculated
KB=(y-1x-1yx)-1=x-1y-1xy;
Due to KA=KB, therefore protocol-intelligent equipment and wireless routing both sides reach shared key K=KA=KB。
Described two as a preferred method, or more than two set includes:First set, the first set have
First authorization method and the first encryption method;And second set, the second set have first authorization method and the
The security level of two encryption methods, second encryption method is lower than the security level of first encryption method;And it is described
Wireless routing selects the first set prior to the second set.
Described two as a preferred method, or more than two set includes:First set, the first set have
First authorization method and the first encryption method;And second set, the second set have the second authorization method and described the
The security level of one encryption method, second authorization method is lower than the security level of first authorization method, described wireless
Routing selects the first set prior to the second set.
The character count for the password that the wireless routing inspection is obtained as a preferred method,;And wherein, if
The wireless routing determines that the character count of the password is scheduled number, then the wireless routing selects in multiple set
Described two or more than two set, wherein described two or more than two set, which is not included in the multiple set, is wrapped
The predetermined set included.
The character count for the password that the wireless routing inspection is obtained as a preferred method,;And if described
Wireless routing determines that the character count of the password is not zero, then the wireless routing selects described two or more than two successively
Set.
The character count for the password that the wireless routing inspection is obtained as a preferred method,;And if described
Wireless routing determines that the character count of the password is zero, then the wireless routing selects that there is open mandate to be awarded as described in
Power method and without specified set of the encryption as the encryption method, and using it is described it is specified gather attempt the intelligence
Energy equipment is connected to the wireless network.
Network identifier acquisition device as a preferred method, the network identifier acquisition device are configured for obtaining
The network identifier specified by user, the network identifier identify the wireless network, and the wireless routing is by the intelligence
Equipment is connected to the wireless network identified by the network identifier.
The present invention includes the following steps:Obtain set by the user be used for smart machine (mobile phone, laptop etc.)
It is connected to the password of wireless routing;And smart machine is connected to internet by wireless routing using the password obtained
Network.One set of selection sequentially from two or more set, wherein every in described two or more than two set
A set has authorization method and encryption method;And carry out sequence using the set that this is sequentially selected in Connection Step
Attempt connection of the wireless communication device to wireless network in ground.According to above method, can automatically use in smart machine and nothing
Circuit establishes the authorization method and encryption method of connection between.
Specific implementation mode
With reference to embodiment and invention is further described in detail.
The method that a kind of smart machine of the present embodiment is surfed the Internet by wireless routing, includes the following steps:
(1) setting smart machine connects the password of wireless routing;
(2) smart machine sends the information with password to wireless routing;
(3) wireless routing obtains password and smart machine is surfed the Internet by wireless routing, wherein sequentially from two or more
One set of selection in two set, each of two or more set set have authorization method and encryption side
Method, and one be sequentially selected in Connection Step gathers sequentially to attempt connection of the smart machine to wireless routing,
The shared key creation method of wherein password includes the following steps:
(1) smart machine and wireless routing both sides choose the braid group B that index is n >=11n, and defined in following presentation
Group Bn:
Bn=< σ1,σ2,…,σn-1|σiσj=σjσi,|i-j|≥2,σiσi+1σi=σi+1σiσi+1, 1≤i≤n-2 >
The group BnElement with set { σ1,σ2,…,σn-1On represent the normal form with uniqueness of the element
Word indicate;
(2) smart machine and wireless routing both sides both sides choose B respectivelynIn two groups of element a1,a2,…,akAnd b1,b2,…,
bm;a1,a2,…,akAnd b1,b2,…,bmB is generated respectivelynTwo subgroups A and B;
(3) smart machine chooses an element x=x (a1,a2,…,ak) ∈ A are as the first private key, and by x-1b1x,x- 1b2x,…,x-1bmX is sent to wireless routing;
(4) wireless routing chooses an element y=y (b1,b2,…,bm) ∈ B are as the second private key, and by y-1a1y,y- 1a2y,…,y-1akY is sent to smart machine;
(5) smart machine receives all a in x after the element that wireless routing is sentiReplace with y-1aiY (i=1,
2 ..., k) it obtains
KA=x-1x(y-1a1y,y-1a2y,…,y-1akY)=x-1y-1xy;
(6) wireless routing receives all b in y after the element that smart machine is sentjReplace with x-1bjX (j=1,
2 ..., m) it obtains
y-1y(x-1b1x,x-1b2x,…,x-1bkX)=y-1x-1yx,
And it is calculated
KB=(y-1x-1yx)-1=x-1y-1xy;
Due to KA=KB, therefore protocol-intelligent equipment and wireless routing both sides reach shared key K=KA=KB。
This method includes the following steps:Obtain set by the user be used for smart machine (mobile phone, laptop etc.)
It is connected to the password of wireless routing;And smart machine is connected to internet by wireless routing using the password obtained
Network.One set of selection sequentially from two or more set, wherein every in described two or more than two set
A set has authorization method and encryption method;And carry out sequence using the set that this is sequentially selected in Connection Step
Attempt connection of the wireless communication device to wireless network in ground.According to above method, can automatically use in smart machine and nothing
Circuit establishes the authorization method and encryption method of connection between, since password is by introducing the subgroups Mihailova of braid group
It is close that the unsoluability of subgroup member's problem and the conjugate property art of the element of group establish the public key that one can resist various attacks
Code, to improve the safety of smart machine (mobile phone, laptop etc.) data.
The method that the smart machine of the present embodiment is surfed the Internet by wireless routing is specifically gone back on the basis of technical solution in front
Can be that described two or more than two set includes:First set, the first set have the first authorization method and first
Encryption method;And second set, the second set have first authorization method and the second encryption method, described second
The security level of encryption method is lower than the security level of first encryption method;And the wireless routing is prior to described second
First set described in Resource selection.
The method that the smart machine of the present embodiment is surfed the Internet by wireless routing is specifically gone back on the basis of technical solution in front
Can be that described two or more than two set includes:First set, the first set have the first authorization method and first
Encryption method;And second set, the second set have the second authorization method and first encryption method, described second
The security level of authorization method is lower than the security level of first authorization method, and the wireless routing is prior to the second set
Select the first set.
The method that the smart machine of the present embodiment is surfed the Internet by wireless routing is specifically gone back on the basis of technical solution in front
It can be the character count for the password that the wireless routing inspection is obtained;And wherein, if the wireless routing determines institute
The character count for stating password is scheduled number, then the wireless routing selects described two or more than two in multiple set
Set, wherein described two or more than two set is not included in predetermined set included in the multiple set.
The method that the smart machine of the present embodiment is surfed the Internet by wireless routing is specifically gone back on the basis of technical solution in front
It can be the character count for the password that the wireless routing inspection is obtained;And if the wireless routing determine it is described close
The character count of code is not zero, then the wireless routing selects described two or more than two set successively.
The method that the smart machine of the present embodiment is surfed the Internet by wireless routing is specifically gone back on the basis of technical solution in front
It can be the character count for the password that the wireless routing inspection is obtained;And if the wireless routing determine it is described close
The character count of code is zero, then the wireless routing selects that there is open mandate to make as the authorization method and without encryption
For the specified set of the encryption method, and attempt the smart machine being connected to the nothing using the specified set
Gauze network.
The method that the smart machine of the present embodiment is surfed the Internet by wireless routing is specifically gone back on the basis of technical solution in front
Can be network identifier acquisition device, the network identifier acquisition device is configured for obtaining the network mark specified by user
Know symbol, the network identifier identifies the wireless network, and the smart machine is connected to by the net by the wireless routing
The wireless network of network identifier mark.
It is to be expounded by the method that wireless routing is surfed the Internet to smart machine of the present invention above, is used to help understand this
Invention, but embodiment of the present invention are not limited by the above embodiments, any without departing from changing made by under the principle of the invention
Become, modification, substitute, combination, simplify, should be equivalent substitute mode, be included in the interior of protection scope of the present invention.
Claims (7)
1. a kind of method that smart machine is surfed the Internet by wireless routing, it is characterised in that include the following steps:
(1) setting smart machine connects the password of wireless routing;
(2) smart machine sends the information with password to wireless routing;
(3) wireless routing obtains password and smart machine is surfed the Internet by wireless routing, wherein sequentially from two or more than two
Select a set, each of two or more set set that there is authorization method and encryption method in a set, and
And one be sequentially selected in Connection Step gathers sequentially to attempt connection of the smart machine to wireless routing, wherein close
The shared key creation method of code includes the following steps:
(1) smart machine and wireless routing both sides choose the braid group B that index is n >=11n, and the group B defined in following presentationn:
Bn=<σ1,σ2,…,σn-1|σiσj=σjσi,|i-j|≥2,σiσi+1σi=σi+1σiσi+1,1≤i≤n-2>
The group BnElement with set { σ1,σ2,…,σn-1On represent the element normal form with uniqueness word
It indicates;
(2) smart machine and wireless routing both sides both sides choose B respectivelynIn two groups of element a1,a2,…,akAnd b1,b2,…,bm;
a1,a2,…,akAnd b1,b2,…,bmB is generated respectivelynTwo subgroups A and B;
(3) smart machine chooses an element x=x (a1,a2,…,ak) ∈ A are as the first private key, and by x-1b1x,x- 1b2x,…,x-1bmX is sent to wireless routing;
(4) wireless routing chooses an element y=y (b1,b2,…,bm) ∈ B are as the second private key, and by y-1a1y,y- 1a2y,…,y-1akY is sent to smart machine;
(5) smart machine receives all a in x after the element that wireless routing is sentiReplace with y-1aiY (i=1,2 ..., k)
It arrives
KA=x-1x(y-1a1y,y-1a2y,…,y-1akY)=x-1y-1xy;
(6) wireless routing receives all b in y after the element that smart machine is sentjReplace with x-1bjX (j=1,2 ..., m)
It arrives
y-1y(x-1b1x,x-1b2x,…,x-1bkX)=y-1x-1yx,
And it is calculated
KB=(y-1x-1yx)-1=x-1y-1xy;
Due to KA=KB, therefore protocol-intelligent equipment and wireless routing both sides reach shared key K=KA=KB。
2. according to the method described in claim 1, it is characterized in that:Described two or more than two set includes:First set,
The first set has the first authorization method and the first encryption method;And second set, the second set have described
First authorization method and the second encryption method, the safety of the security level of second encryption method than first encryption method
Rank is low;And the wireless routing selects the first set prior to the second set.
3. according to the method described in claim 1, it is characterized in that:Described two or more than two set includes:First set,
The first set has the first authorization method and the first encryption method;And second set, the second set have second
Authorization method and first encryption method, the safety of the security level of second authorization method than first authorization method
Rank is low, and the wireless routing selects the first set prior to the second set.
4. according to the method described in claim 1, it is characterized in that:The character meter for the password that the wireless routing inspection is obtained
Number;And wherein, if the wireless routing determines that the character count of the password is scheduled number, the wireless routing
Described two or more than two set is selected in multiple set, wherein described two or more than two set is not included in institute
State predetermined set included in multiple set.
5. according to the method described in claim 1, it is characterized in that:The character meter for the password that the wireless routing inspection is obtained
Number;And if the wireless routing determines that the character count of the password is not zero, the wireless routing selects institute successively
State two or more set.
6. according to the method described in claim 1, it is characterized in that:The character meter for the password that the wireless routing inspection is obtained
Number;And if the wireless routing determines that the character count of the password is zero, the wireless routing selection, which has, to be opened
Specified set of the formula mandate as the authorization method and without encryption as the encryption method, and use the specified collection
It closes to attempt the smart machine being connected to the wireless network.
7. according to the method described in claim 1, it is characterized in that:Network identifier acquisition device, the network identifier obtain
Device is configured for obtaining the network identifier specified by user, and the network identifier identifies the wireless network, the nothing
Circuit by the smart machine by being connected to the wireless network identified by the network identifier.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810220759.9A CN108449754A (en) | 2018-03-16 | 2018-03-16 | The method that smart machine is surfed the Internet by wireless routing |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810220759.9A CN108449754A (en) | 2018-03-16 | 2018-03-16 | The method that smart machine is surfed the Internet by wireless routing |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108449754A true CN108449754A (en) | 2018-08-24 |
Family
ID=63195666
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810220759.9A Pending CN108449754A (en) | 2018-03-16 | 2018-03-16 | The method that smart machine is surfed the Internet by wireless routing |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108449754A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021223090A1 (en) * | 2020-05-06 | 2021-11-11 | 深圳大学 | Method and apparatus for establishing shared key |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101715184A (en) * | 2008-09-30 | 2010-05-26 | 兄弟工业株式会社 | Wireless communication device and method for wireless connection |
CN103414569A (en) * | 2013-08-21 | 2013-11-27 | 王威鉴 | Method for establishing anti-attack public key cryptogram |
US20140281570A1 (en) * | 2013-03-13 | 2014-09-18 | Kabushiki Kaisha Toshiba | Method of performing an authentication process between data recording device and host device |
CN106664199A (en) * | 2015-10-12 | 2017-05-10 | 王晓峰 | Method of establishing anti-attack security public key password |
-
2018
- 2018-03-16 CN CN201810220759.9A patent/CN108449754A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101715184A (en) * | 2008-09-30 | 2010-05-26 | 兄弟工业株式会社 | Wireless communication device and method for wireless connection |
US20140281570A1 (en) * | 2013-03-13 | 2014-09-18 | Kabushiki Kaisha Toshiba | Method of performing an authentication process between data recording device and host device |
CN103414569A (en) * | 2013-08-21 | 2013-11-27 | 王威鉴 | Method for establishing anti-attack public key cryptogram |
CN106664199A (en) * | 2015-10-12 | 2017-05-10 | 王晓峰 | Method of establishing anti-attack security public key password |
Non-Patent Citations (1)
Title |
---|
左黎明: "辫群上密钥协商协议的改进与安全性分析", 《计算机工程》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021223090A1 (en) * | 2020-05-06 | 2021-11-11 | 深圳大学 | Method and apparatus for establishing shared key |
US11743036B2 (en) | 2020-05-06 | 2023-08-29 | Shenzhen University | Method and apparatus for establishing shared key |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111209334B (en) | Power terminal data security management method based on block chain | |
CN102171969B (en) | A method for operating a network, a system management device, a network and a computer program therefor | |
US8819769B1 (en) | Managing user access with mobile device posture | |
US20180124600A1 (en) | Anonymity authentication method for wireless sensor networks | |
Li et al. | Providing privacy-aware incentives in mobile sensing systems | |
CN105933277A (en) | Communication system and communication device | |
CN105071938B (en) | A kind of group authentication method based on threshold secret sharing | |
CN106936570A (en) | A kind of cipher key configuration method and KMC, network element | |
CN105553648A (en) | Quantum key distribution, privacy amplification and data transmission methods, apparatuses, and system | |
CN106161405B (en) | Privacy protectable information based on Homomorphic Encryption Scheme calculates safely implementation method | |
CN104010297B (en) | Wireless terminal configuration method and device and wireless terminal | |
CN107005927A (en) | Cut-in method, equipment and the system of user equipment (UE) | |
CN108282329A (en) | A kind of Bidirectional identity authentication method and device | |
TWI522841B (en) | Anonymity authentication method in multi-server environments | |
CN109413645A (en) | The method and apparatus of access authentication | |
CN107846394A (en) | For providing the system and method for accessing the different services of service provider | |
CN108347404A (en) | A kind of identity identifying method and device | |
CN108288004A (en) | A kind of encryption chip is in REE and TEE environmental coexistence system and methods | |
CN106878015A (en) | Encryption satellite communication system and method | |
WO2016188053A1 (en) | Wireless network access method, device, and computer storage medium | |
CN113872761B (en) | Batch authentication method for intelligent household equipment, computing equipment and storable medium | |
CN108990062A (en) | Intelligent and safe Wi-Fi management method and system | |
CN105897784A (en) | Internet of things terminal equipment encryption communication method and device | |
CN110519052A (en) | Data interactive method and device based on Internet of Things operating system | |
TWI568234B (en) | Anonymity authentication method for global mobility networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180824 |