CN108449754A - The method that smart machine is surfed the Internet by wireless routing - Google Patents

The method that smart machine is surfed the Internet by wireless routing Download PDF

Info

Publication number
CN108449754A
CN108449754A CN201810220759.9A CN201810220759A CN108449754A CN 108449754 A CN108449754 A CN 108449754A CN 201810220759 A CN201810220759 A CN 201810220759A CN 108449754 A CN108449754 A CN 108449754A
Authority
CN
China
Prior art keywords
wireless routing
smart machine
password
wireless
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810220759.9A
Other languages
Chinese (zh)
Inventor
丘佳珏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201810220759.9A priority Critical patent/CN108449754A/en
Publication of CN108449754A publication Critical patent/CN108449754A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of methods that smart machine is surfed the Internet by wireless routing, include the following steps:(1) setting smart machine connects the password of wireless routing;(2) smart machine sends the information with password to wireless routing;(3) wireless routing obtains password and smart machine is surfed the Internet by wireless routing, wherein, one set of selection sequentially from two or more set, each of two or more set set is with authorization method and encryption method, and one be sequentially selected in Connection Step gathers sequentially to attempt connection of the smart machine to wireless routing.The present invention has the advantages that normal user operation can be facilitated.

Description

The method that smart machine is surfed the Internet by wireless routing
Technical field
The present invention relates to method for connecting network, logical more particularly, to a kind of smart machine that can facilitate normal user operation The method for crossing wireless routing online.
Background technology
With the tremendous development of wireless communication technique and router technology, wireless communication technique is more and more extensive to be applied to respectively A field.Present wireless router is all the technology for being integrated with WiMAX, and net is carried out by the WiFi technology of WLAN Network is shared, extends the application field of WiMAX, reduces the threshold of wireless access, meets the need that people surf the Internet whenever and wherever possible It wants.When smart machine is connected with wireless routing, it is desirable that wireless routing has mounted predetermined wireless setting.If passed through Authorize and/or encrypt the setting for then requiring wireless routing to have to mounted mandate/encryption method to protect wireless network. It is in the wireless network extremely complex and reluctant with encrypted be arranged for ordinary user to authorizing.
Invention content
To solve the above problems, present invention aims at a kind of smart machines that can facilitate normal user operation of offer to pass through The method of wireless routing online.
The present invention realized by following technical measures, a kind of method that smart machine is surfed the Internet by wireless routing, including Following steps:
(1) setting smart machine connects the password of wireless routing;
(2) smart machine sends the information with password to wireless routing;
(3) wireless routing obtains password and smart machine is surfed the Internet by wireless routing, wherein sequentially from two or more One set of selection in two set, each of two or more set set have authorization method and encryption side Method, and one be sequentially selected in Connection Step gathers sequentially to attempt connection of the smart machine to wireless routing, The shared key creation method of wherein password includes the following steps:
(1) smart machine and wireless routing both sides choose the braid group B that index is n >=11n, and defined in following presentation Group Bn:
Bn=<σ12,…,σn-1iσjjσi,|i-j|≥2,σiσi+1σii+1σiσi+1, 1≤i≤n-2 >
The group BnElement with set { σ12,…,σn-1On represent the normal form with uniqueness of the element Word indicate;
(2) smart machine and wireless routing both sides both sides choose B respectivelynIn two groups of element a1,a2,…,akAnd b1,b2,…, bm;a1,a2,…,akAnd b1,b2,…,bmB is generated respectivelynTwo subgroups A and B;
(3) smart machine chooses an element x=x (a1,a2,…,ak) ∈ A are as the first private key, and by x-1b1x,x- 1b2x,…,x-1bmX is sent to wireless routing;
(4) wireless routing chooses an element y=y (b1,b2,…,bm) ∈ B are as the second private key, and by y-1a1y,y- 1a2y,…,y-1akY is sent to smart machine;
(5) smart machine receives all a in x after the element that wireless routing is sentiReplace with y-1aiY (i=1, 2 ..., k) it obtains
KA=x-1x(y-1a1y,y-1a2y,…,y-1akY)=x-1y-1xy;
(6) wireless routing receives all b in y after the element that smart machine is sentjReplace with x-1bjX (j=1, 2 ..., m) it obtains
y-1y(x-1b1x,x-1b2x,…,x-1bkX)=y-1x-1yx,
And it is calculated
KB=(y-1x-1yx)-1=x-1y-1xy;
Due to KA=KB, therefore protocol-intelligent equipment and wireless routing both sides reach shared key K=KA=KB
Described two as a preferred method, or more than two set includes:First set, the first set have First authorization method and the first encryption method;And second set, the second set have first authorization method and the The security level of two encryption methods, second encryption method is lower than the security level of first encryption method;And it is described Wireless routing selects the first set prior to the second set.
Described two as a preferred method, or more than two set includes:First set, the first set have First authorization method and the first encryption method;And second set, the second set have the second authorization method and described the The security level of one encryption method, second authorization method is lower than the security level of first authorization method, described wireless Routing selects the first set prior to the second set.
The character count for the password that the wireless routing inspection is obtained as a preferred method,;And wherein, if The wireless routing determines that the character count of the password is scheduled number, then the wireless routing selects in multiple set Described two or more than two set, wherein described two or more than two set, which is not included in the multiple set, is wrapped The predetermined set included.
The character count for the password that the wireless routing inspection is obtained as a preferred method,;And if described Wireless routing determines that the character count of the password is not zero, then the wireless routing selects described two or more than two successively Set.
The character count for the password that the wireless routing inspection is obtained as a preferred method,;And if described Wireless routing determines that the character count of the password is zero, then the wireless routing selects that there is open mandate to be awarded as described in Power method and without specified set of the encryption as the encryption method, and using it is described it is specified gather attempt the intelligence Energy equipment is connected to the wireless network.
Network identifier acquisition device as a preferred method, the network identifier acquisition device are configured for obtaining The network identifier specified by user, the network identifier identify the wireless network, and the wireless routing is by the intelligence Equipment is connected to the wireless network identified by the network identifier.
The present invention includes the following steps:Obtain set by the user be used for smart machine (mobile phone, laptop etc.) It is connected to the password of wireless routing;And smart machine is connected to internet by wireless routing using the password obtained Network.One set of selection sequentially from two or more set, wherein every in described two or more than two set A set has authorization method and encryption method;And carry out sequence using the set that this is sequentially selected in Connection Step Attempt connection of the wireless communication device to wireless network in ground.According to above method, can automatically use in smart machine and nothing Circuit establishes the authorization method and encryption method of connection between.
Specific implementation mode
With reference to embodiment and invention is further described in detail.
The method that a kind of smart machine of the present embodiment is surfed the Internet by wireless routing, includes the following steps:
(1) setting smart machine connects the password of wireless routing;
(2) smart machine sends the information with password to wireless routing;
(3) wireless routing obtains password and smart machine is surfed the Internet by wireless routing, wherein sequentially from two or more One set of selection in two set, each of two or more set set have authorization method and encryption side Method, and one be sequentially selected in Connection Step gathers sequentially to attempt connection of the smart machine to wireless routing, The shared key creation method of wherein password includes the following steps:
(1) smart machine and wireless routing both sides choose the braid group B that index is n >=11n, and defined in following presentation Group Bn:
Bn=< σ12,…,σn-1iσjjσi,|i-j|≥2,σiσi+1σii+1σiσi+1, 1≤i≤n-2 >
The group BnElement with set { σ12,…,σn-1On represent the normal form with uniqueness of the element Word indicate;
(2) smart machine and wireless routing both sides both sides choose B respectivelynIn two groups of element a1,a2,…,akAnd b1,b2,…, bm;a1,a2,…,akAnd b1,b2,…,bmB is generated respectivelynTwo subgroups A and B;
(3) smart machine chooses an element x=x (a1,a2,…,ak) ∈ A are as the first private key, and by x-1b1x,x- 1b2x,…,x-1bmX is sent to wireless routing;
(4) wireless routing chooses an element y=y (b1,b2,…,bm) ∈ B are as the second private key, and by y-1a1y,y- 1a2y,…,y-1akY is sent to smart machine;
(5) smart machine receives all a in x after the element that wireless routing is sentiReplace with y-1aiY (i=1, 2 ..., k) it obtains
KA=x-1x(y-1a1y,y-1a2y,…,y-1akY)=x-1y-1xy;
(6) wireless routing receives all b in y after the element that smart machine is sentjReplace with x-1bjX (j=1, 2 ..., m) it obtains
y-1y(x-1b1x,x-1b2x,…,x-1bkX)=y-1x-1yx,
And it is calculated
KB=(y-1x-1yx)-1=x-1y-1xy;
Due to KA=KB, therefore protocol-intelligent equipment and wireless routing both sides reach shared key K=KA=KB
This method includes the following steps:Obtain set by the user be used for smart machine (mobile phone, laptop etc.) It is connected to the password of wireless routing;And smart machine is connected to internet by wireless routing using the password obtained Network.One set of selection sequentially from two or more set, wherein every in described two or more than two set A set has authorization method and encryption method;And carry out sequence using the set that this is sequentially selected in Connection Step Attempt connection of the wireless communication device to wireless network in ground.According to above method, can automatically use in smart machine and nothing Circuit establishes the authorization method and encryption method of connection between, since password is by introducing the subgroups Mihailova of braid group It is close that the unsoluability of subgroup member's problem and the conjugate property art of the element of group establish the public key that one can resist various attacks Code, to improve the safety of smart machine (mobile phone, laptop etc.) data.
The method that the smart machine of the present embodiment is surfed the Internet by wireless routing is specifically gone back on the basis of technical solution in front Can be that described two or more than two set includes:First set, the first set have the first authorization method and first Encryption method;And second set, the second set have first authorization method and the second encryption method, described second The security level of encryption method is lower than the security level of first encryption method;And the wireless routing is prior to described second First set described in Resource selection.
The method that the smart machine of the present embodiment is surfed the Internet by wireless routing is specifically gone back on the basis of technical solution in front Can be that described two or more than two set includes:First set, the first set have the first authorization method and first Encryption method;And second set, the second set have the second authorization method and first encryption method, described second The security level of authorization method is lower than the security level of first authorization method, and the wireless routing is prior to the second set Select the first set.
The method that the smart machine of the present embodiment is surfed the Internet by wireless routing is specifically gone back on the basis of technical solution in front It can be the character count for the password that the wireless routing inspection is obtained;And wherein, if the wireless routing determines institute The character count for stating password is scheduled number, then the wireless routing selects described two or more than two in multiple set Set, wherein described two or more than two set is not included in predetermined set included in the multiple set.
The method that the smart machine of the present embodiment is surfed the Internet by wireless routing is specifically gone back on the basis of technical solution in front It can be the character count for the password that the wireless routing inspection is obtained;And if the wireless routing determine it is described close The character count of code is not zero, then the wireless routing selects described two or more than two set successively.
The method that the smart machine of the present embodiment is surfed the Internet by wireless routing is specifically gone back on the basis of technical solution in front It can be the character count for the password that the wireless routing inspection is obtained;And if the wireless routing determine it is described close The character count of code is zero, then the wireless routing selects that there is open mandate to make as the authorization method and without encryption For the specified set of the encryption method, and attempt the smart machine being connected to the nothing using the specified set Gauze network.
The method that the smart machine of the present embodiment is surfed the Internet by wireless routing is specifically gone back on the basis of technical solution in front Can be network identifier acquisition device, the network identifier acquisition device is configured for obtaining the network mark specified by user Know symbol, the network identifier identifies the wireless network, and the smart machine is connected to by the net by the wireless routing The wireless network of network identifier mark.
It is to be expounded by the method that wireless routing is surfed the Internet to smart machine of the present invention above, is used to help understand this Invention, but embodiment of the present invention are not limited by the above embodiments, any without departing from changing made by under the principle of the invention Become, modification, substitute, combination, simplify, should be equivalent substitute mode, be included in the interior of protection scope of the present invention.

Claims (7)

1. a kind of method that smart machine is surfed the Internet by wireless routing, it is characterised in that include the following steps:
(1) setting smart machine connects the password of wireless routing;
(2) smart machine sends the information with password to wireless routing;
(3) wireless routing obtains password and smart machine is surfed the Internet by wireless routing, wherein sequentially from two or more than two Select a set, each of two or more set set that there is authorization method and encryption method in a set, and And one be sequentially selected in Connection Step gathers sequentially to attempt connection of the smart machine to wireless routing, wherein close The shared key creation method of code includes the following steps:
(1) smart machine and wireless routing both sides choose the braid group B that index is n >=11n, and the group B defined in following presentationn:
Bn=<σ12,…,σn-1iσjjσi,|i-j|≥2,σiσi+1σii+1σiσi+1,1≤i≤n-2>
The group BnElement with set { σ12,…,σn-1On represent the element normal form with uniqueness word It indicates;
(2) smart machine and wireless routing both sides both sides choose B respectivelynIn two groups of element a1,a2,…,akAnd b1,b2,…,bm; a1,a2,…,akAnd b1,b2,…,bmB is generated respectivelynTwo subgroups A and B;
(3) smart machine chooses an element x=x (a1,a2,…,ak) ∈ A are as the first private key, and by x-1b1x,x- 1b2x,…,x-1bmX is sent to wireless routing;
(4) wireless routing chooses an element y=y (b1,b2,…,bm) ∈ B are as the second private key, and by y-1a1y,y- 1a2y,…,y-1akY is sent to smart machine;
(5) smart machine receives all a in x after the element that wireless routing is sentiReplace with y-1aiY (i=1,2 ..., k) It arrives
KA=x-1x(y-1a1y,y-1a2y,…,y-1akY)=x-1y-1xy;
(6) wireless routing receives all b in y after the element that smart machine is sentjReplace with x-1bjX (j=1,2 ..., m) It arrives
y-1y(x-1b1x,x-1b2x,…,x-1bkX)=y-1x-1yx,
And it is calculated
KB=(y-1x-1yx)-1=x-1y-1xy;
Due to KA=KB, therefore protocol-intelligent equipment and wireless routing both sides reach shared key K=KA=KB
2. according to the method described in claim 1, it is characterized in that:Described two or more than two set includes:First set, The first set has the first authorization method and the first encryption method;And second set, the second set have described First authorization method and the second encryption method, the safety of the security level of second encryption method than first encryption method Rank is low;And the wireless routing selects the first set prior to the second set.
3. according to the method described in claim 1, it is characterized in that:Described two or more than two set includes:First set, The first set has the first authorization method and the first encryption method;And second set, the second set have second Authorization method and first encryption method, the safety of the security level of second authorization method than first authorization method Rank is low, and the wireless routing selects the first set prior to the second set.
4. according to the method described in claim 1, it is characterized in that:The character meter for the password that the wireless routing inspection is obtained Number;And wherein, if the wireless routing determines that the character count of the password is scheduled number, the wireless routing Described two or more than two set is selected in multiple set, wherein described two or more than two set is not included in institute State predetermined set included in multiple set.
5. according to the method described in claim 1, it is characterized in that:The character meter for the password that the wireless routing inspection is obtained Number;And if the wireless routing determines that the character count of the password is not zero, the wireless routing selects institute successively State two or more set.
6. according to the method described in claim 1, it is characterized in that:The character meter for the password that the wireless routing inspection is obtained Number;And if the wireless routing determines that the character count of the password is zero, the wireless routing selection, which has, to be opened Specified set of the formula mandate as the authorization method and without encryption as the encryption method, and use the specified collection It closes to attempt the smart machine being connected to the wireless network.
7. according to the method described in claim 1, it is characterized in that:Network identifier acquisition device, the network identifier obtain Device is configured for obtaining the network identifier specified by user, and the network identifier identifies the wireless network, the nothing Circuit by the smart machine by being connected to the wireless network identified by the network identifier.
CN201810220759.9A 2018-03-16 2018-03-16 The method that smart machine is surfed the Internet by wireless routing Pending CN108449754A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810220759.9A CN108449754A (en) 2018-03-16 2018-03-16 The method that smart machine is surfed the Internet by wireless routing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810220759.9A CN108449754A (en) 2018-03-16 2018-03-16 The method that smart machine is surfed the Internet by wireless routing

Publications (1)

Publication Number Publication Date
CN108449754A true CN108449754A (en) 2018-08-24

Family

ID=63195666

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810220759.9A Pending CN108449754A (en) 2018-03-16 2018-03-16 The method that smart machine is surfed the Internet by wireless routing

Country Status (1)

Country Link
CN (1) CN108449754A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021223090A1 (en) * 2020-05-06 2021-11-11 深圳大学 Method and apparatus for establishing shared key

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101715184A (en) * 2008-09-30 2010-05-26 兄弟工业株式会社 Wireless communication device and method for wireless connection
CN103414569A (en) * 2013-08-21 2013-11-27 王威鉴 Method for establishing anti-attack public key cryptogram
US20140281570A1 (en) * 2013-03-13 2014-09-18 Kabushiki Kaisha Toshiba Method of performing an authentication process between data recording device and host device
CN106664199A (en) * 2015-10-12 2017-05-10 王晓峰 Method of establishing anti-attack security public key password

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101715184A (en) * 2008-09-30 2010-05-26 兄弟工业株式会社 Wireless communication device and method for wireless connection
US20140281570A1 (en) * 2013-03-13 2014-09-18 Kabushiki Kaisha Toshiba Method of performing an authentication process between data recording device and host device
CN103414569A (en) * 2013-08-21 2013-11-27 王威鉴 Method for establishing anti-attack public key cryptogram
CN106664199A (en) * 2015-10-12 2017-05-10 王晓峰 Method of establishing anti-attack security public key password

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
左黎明: "辫群上密钥协商协议的改进与安全性分析", 《计算机工程》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021223090A1 (en) * 2020-05-06 2021-11-11 深圳大学 Method and apparatus for establishing shared key
US11743036B2 (en) 2020-05-06 2023-08-29 Shenzhen University Method and apparatus for establishing shared key

Similar Documents

Publication Publication Date Title
CN111209334B (en) Power terminal data security management method based on block chain
CN102171969B (en) A method for operating a network, a system management device, a network and a computer program therefor
US8819769B1 (en) Managing user access with mobile device posture
US20180124600A1 (en) Anonymity authentication method for wireless sensor networks
Li et al. Providing privacy-aware incentives in mobile sensing systems
CN105933277A (en) Communication system and communication device
CN105071938B (en) A kind of group authentication method based on threshold secret sharing
CN106936570A (en) A kind of cipher key configuration method and KMC, network element
CN105553648A (en) Quantum key distribution, privacy amplification and data transmission methods, apparatuses, and system
CN106161405B (en) Privacy protectable information based on Homomorphic Encryption Scheme calculates safely implementation method
CN104010297B (en) Wireless terminal configuration method and device and wireless terminal
CN107005927A (en) Cut-in method, equipment and the system of user equipment (UE)
CN108282329A (en) A kind of Bidirectional identity authentication method and device
TWI522841B (en) Anonymity authentication method in multi-server environments
CN109413645A (en) The method and apparatus of access authentication
CN107846394A (en) For providing the system and method for accessing the different services of service provider
CN108347404A (en) A kind of identity identifying method and device
CN108288004A (en) A kind of encryption chip is in REE and TEE environmental coexistence system and methods
CN106878015A (en) Encryption satellite communication system and method
WO2016188053A1 (en) Wireless network access method, device, and computer storage medium
CN113872761B (en) Batch authentication method for intelligent household equipment, computing equipment and storable medium
CN108990062A (en) Intelligent and safe Wi-Fi management method and system
CN105897784A (en) Internet of things terminal equipment encryption communication method and device
CN110519052A (en) Data interactive method and device based on Internet of Things operating system
TWI568234B (en) Anonymity authentication method for global mobility networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180824