CN108650676A - A kind of key updating method in bluetooth ad hoc network and device - Google Patents
A kind of key updating method in bluetooth ad hoc network and device Download PDFInfo
- Publication number
- CN108650676A CN108650676A CN201810917773.4A CN201810917773A CN108650676A CN 108650676 A CN108650676 A CN 108650676A CN 201810917773 A CN201810917773 A CN 201810917773A CN 108650676 A CN108650676 A CN 108650676A
- Authority
- CN
- China
- Prior art keywords
- node
- new key
- key
- message
- administration apparatus
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Abstract
The present invention relates to bluetooth ad-hoc network field in Internet of Things more particularly to the key updating method in a kind of bluetooth ad hoc network and devices.For smoothly more new key, the safety of network communication is promoted, this method is:Network administration apparatus sends new key to each node, triggers each node and gradually carries out key updating according to three phases.In this way, it can ensure the node of different disposal rate, new key can be used in time, smoothly from using old key to switch seamlessly to, in addition, in the case where certain nodes break down, it is possible to prevente effectively from Network Intrusions of the BLE Mash by illegal node, therefore, being smoothed out for key updating flow has been effectively ensured, has promoted the safety of network communication.
Description
Technical field
The present invention relates to the key updating methods and device in technology of Internet of things more particularly to a kind of bluetooth ad hoc network.
Background technology
Internet of Things (Internet of things, IoT) refers to acquiring any need in real time by various information sensing devices
It monitors, connect, the information of the various needs such as interactive object or process, the huge network to be formed is combined with internet.
The purpose is to realize that object and object, object and people, the connection of all articles and network facilitate identification, management and control.In short
It, Internet of Things is exactly the connected internet of object object.
Low-power consumption bluetooth (Bluetooth Low Energy, BLE) be a kind of intelligence, low-power consumption blue tooth wireless technology,
The short haul connection between smart machine is realized, there is the advantages such as low complex degree, low-power consumption, low cost, extensive use
In the fields IoT.Communication mode in BLE technologies is point-to-point (Point-to-Point, PTP), and which limit Bluetooth technologies
Application field.
For this defect, low-power consumption bluetooth ad-hoc network (Bluetooth Low Energy Mesh, BLE Mesh) is answered
It transports and gives birth to (abbreviation bluetooth ad hoc network).The network topology structure that BLE Mesh are communicated using " multi-to-multi ", each node and its phase
Neighbors is communicated and is forwarded data, to promote bluetooth group ability, has wide coverage, efficient, low-power consumption, peace
Entirely, the features such as scalability.
In BLE Mesh, each Centroid can be established with multiple terminal nodes and be connected, and terminal node is in
The control of heart node, and with Centroid interaction data.For example, a mobile phone terminal can detect the shape of multiple smart homes
State, and the use of smart home is controlled.
Under the prior art, in BLE Mesh, all message of interaction have to pass through key encryption just between each node
It can be transmitted, therefore preserve currently used key on each node.So, when some nodes for some reason
(e.g., break down, be under attack, replacing use environment etc.) and when leaving BLE Mesh, still carry key on these nodes.
And after key is by illegal crack, the node of other networks can obtain the related data of above-mentioned BLE Mesh, so as to cause network
The leakage of data, and influence the operational administrative of node.
For example, in BLE Mesh, when a certain smart home of a mobile phone terminal control breaks down, if the intelligence
The key preserved in household is cracked by the node in other networks, then the node in other networks can carry out the smart home
Control, to influence the network security of above-mentioned BLE Mesh and the normal use of above-mentioned mobile phone terminal.
Therefore, in BLE Mesh, the key to being used on each node is needed to regularly update, and need to realize
The seamless switching of old key and new key realizes smooth excessiveness, however, under prior art, is designed not yet for BLE Mesh
Go out corresponding key updating mode.
Invention content
The object of the present invention is to provide the key updating methods and device in a kind of bluetooth ad hoc network, for ensureing BLE
In Mash, the key on each node can in time, successfully update.
Specific technical solution provided in an embodiment of the present invention is as follows:
A kind of key updating method in bluetooth ad hoc network, including:
Network administration apparatus sends new key to each node, triggers each node and is receiving the new key
Afterwards, it sends message using old key pair to be encrypted, and is carried out using the old key or the new key to receiving message
Decryption;
After network administration apparatus determines that each node receives new key, sends and carried newly to each node
First notification message of key identification is triggered each node and is encrypted using the new key to sending message, and
It is decrypted using the old key or the new key to receiving message;
Network administration apparatus determines that each node is all made of the new key to sending after message is encrypted, to institute
It states each node and sends the second notification message for carrying new key mark, trigger old key described in each knot removal, and
It is decrypted using the new key to receiving message.
Optionally, network administration apparatus sends new key to each node, further comprises:
Network administration apparatus determines the node administration list being locally located, and the net is contained in the node administration list
Network managing device has permission the mark of each node of management;
Network administration apparatus determines the blacklist being locally located, and is contained in the blacklist and has determined that there are security risks
Each node mark;
Network administration apparatus will be located at the node of the blacklist positioned at the node administration list and not, be determined as current
Legal node;
Network administration apparatus sends new key to each node.
Optionally, network administration apparatus determines that each node receives new key, including:
When network administration apparatus judges that each node returns the response message of characterization acquisition new key, institute is determined
It states each network node and receives new key;
Network administration apparatus determines that each node is all made of the new key and is encrypted to sending message, including:
Network administration apparatus sends status inquiry message respectively to each node, and according to each network node
The status information of feedback determines that each node is all made of the new key and is encrypted to sending message.
Optionally, network administration apparatus sends the first notification message for carrying new key and identifying, packet to each node
It includes:
Network administration apparatus uses broadcast mode, is sent to each node and carries new key mark and the first mark
The first notification message of position RefreshFlag=1;
Network administration apparatus sends the second notification message for carrying new key and identifying to each node, including:
Network administration apparatus uses broadcast mode, is sent to each node and carries key updating mark and the second mark
The second notification message of will position RefreshFlag=0.
A kind of key updating method in bluetooth ad hoc network, optionally, including:
When node receives the new key of network administration apparatus transmission, to network administration apparatus returning response message, and adopt
Message is sent with old key pair to be encrypted, and is decrypted using the old key or the new key to receiving message;
When node receives the first notification message of the carrying new key mark that the network administration apparatus is sent, using institute
It states new key and is encrypted to sending message, and be decrypted using the old key or the new key to receiving message;
When node receives the second notification message for the carrying new key mark that the network administration apparatus is sent, institute is deleted
Old key is stated, is encrypted using the new key to sending message, and solved using the new key to receiving message
It is close.
A kind of key update device in bluetooth ad hoc network, optionally, including:
First processing units, for sending new key to each node, trigger each node receive it is described new
After key, message is sent using old key pair and is encrypted, and using the old key or the new key to receiving message
It is decrypted;
Second processing unit is sent after determining that each node receives new key to each node
The first notification message of new key mark is carried, each node is triggered and is added to sending message using the new key
It is close, and be decrypted using the old key or the new key to receiving message;
Third processing unit is encrypted for determining that each node is all made of the new key to sending message
Afterwards, the second notification message for carrying new key and identifying is sent to each node, is triggered old described in each knot removal
Key, and be decrypted using the new key to receiving message.
Optionally, new key is sent to each node, the first processing units are further used for:
Determine the node administration list being locally located, containing the network administration apparatus in the node administration list has
The mark of each node of rights management;
It determines the blacklist being locally located, is contained in the blacklist and have determined that each node there are security risk
Mark;
The node of the blacklist will be located at positioned at the node administration list and not, is determined as the node of current Lawful;
New key is sent to each node.
Optionally, when determining that each node receives new key, the second processing unit is used for:
When judging that each node returns the response message of characterization acquisition new key, determine that each node is equal
Receive new key;
Determine that each node is all made of the new key and is encrypted to sending message, the third processing unit is used
In:
Status inquiry message is sent respectively to each node, and according to the status information of each node feeding back,
Determine that each node is all made of the new key and is encrypted to sending message.
Optionally, when sending the first notification message for carrying new key mark to each node, the second processing
Unit is used for:
Using broadcast mode, is sent to each node and carry new key mark and the first flag bit
The first notification message of RefreshFlag=1;
The second notification message for carrying new key and identifying is sent to each node, the third processing unit is used for:
Using broadcast mode, is sent to each node and carry key updating mark and the second flag bit
The second notification message of RefreshFlag=0.
A kind of key update device in bluetooth ad hoc network, optionally, including:
First processing units, for receive network administration apparatus transmission new key when, to network administration apparatus return
Response message, and message is sent using old key pair and is encrypted, and using the old key or the new key to receiving
Message is decrypted;
Second processing unit, the first notice for receiving the carrying new key mark that the network administration apparatus is sent
When message, it is encrypted using the new key to sending message, and using the old key or the new key to receiving
Message is decrypted;
Third processing unit, the second notice for receiving the carrying new key mark that the network administration apparatus is sent
When message, the old key is deleted, is encrypted using the new key to sending message, and docked using the new key
Message is received to be decrypted.
A kind of storage medium is optionally stored with the program of the method for realizing the key updating in bluetooth ad hoc network,
When described program is run by processor, following steps are executed:
New key is sent to each node, each node is triggered after receiving the new key, using old key
It is encrypted to sending message, and is decrypted using the old key or the new key to receiving message;
After determining that each node receives new key, carry that new key identifies the is sent to each node
One notification message is triggered each node and is encrypted using the new key to sending message, and using described old close
Key or the new key are decrypted to receiving message;
It determines that each node is all made of the new key to sending after message is encrypted, is sent out to each node
The second notification message for carrying new key mark is sent, triggers old key described in each knot removal, and use described Xinmi City
Key is decrypted to receiving message.
A kind of communication device, optionally, including one or more processors;And one or more computer-readable Jie
Matter is stored with instruction on the readable medium, when described instruction is executed by one or more of processors so that described device
Execute method as described in any one of the above embodiments.
A kind of storage medium is stored with the program of the method for realizing the key updating in bluetooth ad hoc network, the journey
When sequence is run by processor, following steps are executed:
When receiving the new key of network administration apparatus transmission, to network administration apparatus returning response message, and using old
Key pair sends message and is encrypted, and is decrypted using the old key or the new key to receiving message;
When receiving the first notification message of the carrying new key mark that the network administration apparatus is sent, using described new
Key pair sends message and is encrypted, and is decrypted using the old key or the new key to receiving message;
When receiving the second notification message for the carrying new key mark that the network administration apparatus is sent, delete described old
Key is encrypted to sending message using the new key, and is decrypted using the new key to receiving message.
A kind of communication device, including one or more processors;And one or more computer-readable mediums, it is described can
It reads to be stored with instruction on medium, when described instruction is executed by one or more of processors so that described device executes as above
State the method described in one.
In conclusion in the embodiment of the present invention, network administration apparatus triggers each node according to three phases, gradually
From new key or old secret key decryption are encrypted and used using old key, transits to and new key is encrypted and used using new key
Or old secret key decryption, it finally switches to and is encrypted and decrypted using new key, in such manner, it is possible to ensure that the section of different disposal rate
Point smoothly can use new key from using old key to switch seamlessly to, and will not cause visual sense to user, realize
The transparency of key updating process, to ensure that key updates in time, successfully.
Description of the drawings
Fig. 1 is bluetooth ad hoc network schematic diagram in the embodiment of the present invention;
Fig. 2 is key updating flow diagram in the embodiment of the present invention;
Fig. 3 is network administration apparatus schematic diagram in the embodiment of the present invention;
Fig. 4 is interior joint schematic diagram of the embodiment of the present invention.
Specific implementation mode
To improve the safety of BLE Mash communications, old key and the seamless switching of new key, the embodiment of the present invention are realized
In, there will be each nodes of security risk, and blacklist, the current Lawful into node administration list is added for network administration apparatus
Each node send new key, trigger each node and replacing for old key and new key be done step-by-step by three phases
Change, avoid BLE Mash by illegal node Network Intrusion simultaneously, ensure that key updating process not is influencing network just
Normal open is believed.
The preferred embodiment of the present invention is described in detail in following accompanying drawings.
It,, can between network administration apparatus and each node and each node in BLE Mash in the embodiment of the present invention
To be communicated by BLE technologies and forward data.So-called network administration apparatus refers to the node that can be obtained in compass of competency
Related data information, monitors the current state of the node, and to the equipment that the node carries out control management, for example, mobile phone,
Ipad, laptop etc..
For example, as shown in fig.1, in BLE Mash, mobile phone can pass through BLE technical managements intelligent refrigerator and intelligence electricity
Depending on that can be communicated by BLE technologies between intelligent refrigerator, intelligent air condition, smart television and intelligent washing machine, notebook electricity
Brain can manage intelligent refrigerator, intelligent air condition and intelligent washing machine by BLE technologies.
In the embodiment of the present invention, key updating process is divided into three phases, individually below referred to as stage 1, stage 2 and stage
3。
In the stage 1, new key can be issued to each node by network administration apparatus, and each node is still using old close
Key is encrypted to sending message, while old key or new key can be used to be decrypted to receiving message.
After network administration apparatus determines that each node receives new key, each node is notified to enter the stage 2.
In the stage 2, each node is encrypted using new key to sending message, while old key or new may be used
Key pair receives message and is decrypted.
After network administration apparatus determines that each node enters the stage 2, each node is notified to enter the stage 3.
In the stage 3, each old key of knot removal is encrypted to sending message only with new key, and uses
New key is decrypted to receiving message.
As shown in fig.2, in the embodiment of the present invention, it is as follows for the detailed process of the key updating in bluetooth ad hoc network:
Step 100:After network administration apparatus starts the dedicated programs for managing smart home, into corresponding management
Operation interface.
Step 110:Network administration apparatus sends new key to each node.
In the embodiment of the present invention, the node in compass of competency can be the smart home controlled by network administration apparatus,
For example, intelligent refrigerator, intelligent air condition, smart television, intelligent washing machine etc..
Step 110 is that network administration apparatus triggering key updating flow enters the stage 1.
Specifically, when executing step 110, network administration apparatus can execute following operation:
A, network administration apparatus determines the node administration list being locally located, and is contained in the node administration list described
Network administration apparatus has permission the mark of each node of management.
Wherein, network administration apparatus has permission the node of management, can refer to network administration apparatus currently and network management
Device is in the node of same bluetooth ad hoc network, and the node of same bluetooth ad hoc network was once in network administration apparatus.
For example, refering to shown in table 1, occur the node administration list being locally located in the operation interface of network administration apparatus,
Identify 1 (A1), mark 2 (A2) ... identify 10 (A10) as the corresponding mark of each node.
Table 1
A1 | A2 | A3 | A4 | A5 |
A6 | A7 | A8 | A9 | A10 |
B, network administration apparatus determines the blacklist being locally located, and contains and is had determined that in the presence of safe hidden in the blacklist
The mark for each node suffered from.
It is wherein, so-called that there are security risks to refer to:Have determined that the node attacked, and, it has been determined that it is filled from network management
Set the node removed in the bluetooth ad hoc network of management.
For example, refering to shown in table 2, occur the blacklist being locally located, mark 1 in the operation interface of network administration apparatus
(A1), identify 5 (A5) and identify 6 (A6) be interface on be set out there are the marks of each node of security risk.
Table 2
A1 | A5 | A6 |
C, network administration apparatus will be located at the node of the blacklist positioned at the node administration list and not, be determined as working as
Preceding legal node.
That is, network administration apparatus is from the node identification deleted in the node administration list being locally located on blacklist, it will be remaining
Under node be determined as the node of current Lawful.
For example, refering to shown in table 3,1 (A1) of node administration list display mark, mark 2 (A2) ... the marks that are locally located
The node identification for knowing 10 (A10), 1 (A1) of blacklist display mark, 5 (A5) of mark and the node for identifying 6 (A6) being locally located
It identifies, then network administration apparatus will identify 2 (A2), 3 (A3) of mark, 4 (A4) of mark, identify 7 (A7), 8 (A8) of mark, mark 9
(A9) and 10 (A10) of mark are determined as the node identification of current Lawful node.
Table 3
A2 | A3 | A4 | A7 |
A8 | A9 | A10 |
D, network administration apparatus sends new key to each node.
That is, network administration apparatus to mark 2 (A2), mark 3 (A3), mark 4 (A4), mark 7 (A7), mark 8 (A8), mark
Know 9 (A9) and the corresponding nodes of 10 (A10) of mark send new key.
Step 120:After each node receives the new key of network administration apparatus transmission, phase is returned to network administration apparatus
The response message answered, and message is sent using old key pair and is encrypted, and use the old key or the new key pair
Message is received to be decrypted.
Specifically, be introduced by taking node A1 as an example, after node A1 receives the new key of network administration apparatus transmission,
Into the stage 1.In the stage 1, new key is stored in local by node A1, and still sending message using old key pair is encrypted,
But old key or new key may be used and be decrypted to receiving message.
Still message is sent in the stage 1 using old key pair to be encrypted, this is because each node enters the stage 1
Speed is inconsistent, and in order to ensure the communication consistency of bluetooth ad hoc network, each node is after receiving new key, into the stage
Before 2, still message is sent using old key pair and be encrypted, so that it is guaranteed that each node can be identified and be sent between each other
Message.
Old key or new key may be used in the stage 1 and be decrypted to receiving message, this is because in follow-up process
In, network administration apparatus can trigger each node and initially enter the stage 2, since the service speed of each node is inconsistent,
Having been enter into the node in stage 2 can use new key to be encrypted to sending message, and not yet enter the stage 2 (i.e. still in the stage
1) node still can use old key pair to send message and be encrypted, still, due to having occurred disappearing to transmission using new key
The node being encrypted is ceased, therefore, each node needs to be decrypted to receiving message using new key, to ensure bluetooth certainly
It can be smoothed out communication between each node in networking.
Step 130:Network administration apparatus determines that each node receives new key.
Specifically, since each node is after receiving new key, corresponding response can be returned to network administration apparatus
Message, thus, when network administration apparatus judges that each node returns the response message of characterization acquisition new key, determine
Each node receives new key.
For example, 2 (A2) of mark, 3 (A3) of mark, 4 (A4) of mark, 7 (A7) of mark, 8 (A8) of mark, 9 (A9) of mark and mark
After knowing the new key that the corresponding node receiving network managing devices of 10 (A10) are sent, actively one is returned to network administration apparatus
A response message " receives new key ", indicate that the node has obtained new key, when network administration apparatus receives each section
After the response message that point returns, determine that each node receives new key.
Step 140:Network administration apparatus sends the first notification message for carrying new key and identifying to each node.
Step 140 is that network administration apparatus triggering key updating flow enters the stage 2.
Specifically, when executing step 140, network administration apparatus uses broadcast mode, is taken to each node transmission
The first notification message with new key mark and the first flag bit (RefreshFlag=1).
That is, network administration apparatus uses broadcast mode, to 2 (A2) of mark, 3 (A3) of mark, 4 (A4) of mark, mark 7
(A7), 8 (A8), 9 (A9) of mark are identified and the corresponding nodes of 10 (A10) of mark send the first notification message, the first notice respectively
New key mark and RefreshFlag=1 are at least carried in message.
Wherein, why network administration apparatus using broadcast mode sends the first notification message, is because in this way can be
In the case of the routed path that not specified first notification message is sent, the first notification message is smoothly sent to each node, because
This stability is strong, and is not broken down and influenced by part of nodes.
Wherein, RefreshFlag=1 indicates that node is in key updating process, and the node carries out old key to Xinmi City
The conversion of key, that is, be converted to using new key encryption transmission message, but can be used old close from message is sent using the encryption of old key
Key or new key are decrypted to receiving message.
Step 150:Each node receives the first notice of the carrying new key mark that the network administration apparatus is sent
When message, it is encrypted using the new key to sending message, and using the old key or the new key to receiving
Message is decrypted.
Specifically, being introduced by taking node A1 as an example, when node A1 receives carrying Xinmi City of network administration apparatus transmission
After first notification message of key mark, into the stage 2.In the stage 2, node A1 carries out the converted of old key and new key
Journey, that is, be encrypted using new key to sending message, but old key or new key still may be used and carried out to receiving message
Decryption.
In the stage 2, each node may be used old key or new key and is decrypted to receiving message, this is because respectively
The processing speed of a node is different, and the node for being in the stage 2 may be used new key and is encrypted to sending message, and still
The node in stage 2 is not entered, that is, the node in the stage 1 still sends message using old key pair and is encrypted, when in rank
Corresponding when the node of section 2 receives transmission message encrypted using old key, the node in stage 2 needs to use old key pair
It receives message to be decrypted, to ensure the normal communication in network between each node.
Step 160:Network administration apparatus determines that each node is all made of the new key and adds to sending message
It is close.
Specifically, after network administration apparatus sends above-mentioned first notification message, shape can be sent respectively to each node
State inquires message, and according to the status information of each node feeding back, determines that each node is all made of the new key
It is encrypted to sending message, i.e., after each node receives status inquiry message, can be fed back certainly to network administration apparatus
The status information of body, notice network administration apparatus itself are in stage 1 or stage 2, and network administration apparatus is according to each of acquisition
The status information of node determines that each node enters after the stage 2, can trigger each node and enter the stage 3.
For example, 2 (A2) of mark, 3 (A3) of mark, 4 (A4) of mark, 7 (A7) of mark, 8 (A8) of mark, 9 (A9) of mark and mark
After knowing the corresponding node reception state inquiry message of 10 (A10), a state letter of itself can be returned to network administration apparatus
Breath, that is, status information " sends message encryption " using old key pair, indicates that the node is in the stage 1, status information " uses
New key is to sending message encryption ", it indicates that the node is in the stage 2, " is adopted when network administration apparatus receives each node return
With new key to send message encryption " status information after, determine then each node triggers each node into the stage 2
Into the stage 3.
Step 170:Network administration apparatus sends the second notification message for carrying new key and identifying to each node.
Step 170 is that network administration apparatus triggering key updating flow enters the stage 3.
Specifically, when executing step 170, network administration apparatus uses broadcast mode, is taken to each node transmission
Second notification message with key updating mark and the second flag bit RefreshFlag=0.
That is, network administration apparatus uses broadcast mode, to 2 (A2) of mark, 3 (A3) of mark, 4 (A4) of mark, mark 7
(A7), 8 (A8), 9 (A9) of mark are identified and the corresponding nodes of 10 (A10) of mark send second notification message, the second notice respectively
New key mark and RefreshFlag=0 are at least carried in message.
Wherein, why network administration apparatus using broadcast mode sends second notification message, is because in this way can be
In the case of the routed path that not specified second notification message is sent, second notification message is successfully transferred to each node, is protected
The stability of network communication has been demonstrate,proved, and if certain nodes break down, has not interfered with the normal communication of network.
Wherein, RefreshFlag=0 indicates that node is in the normal condition without carrying out key updating, and the node is not
Reuse old key, that is, the node under the state only preserves a new key, and node may be used the new key and disappear to transmission
Breath is encrypted, it is also possible to be decrypted using the new key to receiving message.
Step 180:Each node receives the second notice of the carrying new key mark that the network administration apparatus is sent
When message, the old key is deleted, is encrypted using the new key to sending message, and docked using the new key
Message is received to be decrypted.
Specifically, being introduced by taking node A1 as an example, when node A1 receives carrying Xinmi City of network administration apparatus transmission
After the second notification message of key mark, into the stage 3.In the stage 3, node A1 deletes local old key, using new key
It is encrypted to sending message, and new key may be used and be decrypted to receiving message.
In the stage 3, each node only may be used new key and is encrypted to sending message, this is because being in
The knot removal in the stage 3 old key of local reservation, current each node only preserves new key, thus can only use Xinmi City
Key is encrypted to sending message, to realize that old key encrypts conversion of the message to new key encryption message.
So far, key updating flow all terminates.
Based in above-described embodiment, as shown in fig.3, in the embodiment of the present invention, network administration apparatus includes at least:First
Processing unit 101, second processing unit 102 and third processing unit 103, wherein
First processing units 101 trigger each node described in receiving for sending new key to each node
After new key, message is sent using old key pair and is encrypted, and is disappeared to reception using the old key or the new key
Breath is decrypted;
Second processing unit 102 is sent out after determining that each node receives new key to each node
The first notification message for carrying new key mark is sent, each node is triggered and is added to sending message using the new key
It is close, and be decrypted using the old key or the new key to receiving message;
Third processing unit 103 adds for determining that each node is all made of the new key to sending message
After close, the second notification message for carrying new key and identifying is sent to each node, is triggered described in each knot removal
Old key, and be decrypted using the new key to receiving message.
Optionally, network administration apparatus sends new key to each node, and first processing units 101 are further used for:
Determine the node administration list being locally located, containing the network administration apparatus in the node administration list has
The mark of each node of rights management;
It determines the blacklist being locally located, is contained in the blacklist and have determined that each node there are security risk
Mark;
The node of the blacklist will be located at positioned at the node administration list and not, is determined as the node of current Lawful;
New key is sent to each node.
Optionally, when determining that each node receives new key, second processing unit 102 is used for:
When judging that each node returns the response message of characterization acquisition new key, determine that each node is equal
Receive new key;
Determine that each node is all made of the new key and is encrypted to sending message, third processing unit 103 is used
In:
Status inquiry message is sent respectively to each node, and according to the status information of each node feeding back,
Determine that each node is all made of the new key and is encrypted to sending message.
Optionally, when sending the first notification message for carrying new key mark to each node, second processing unit
102 are used for:
Using broadcast mode, is sent to each node and carry new key mark and the first flag bit
The first notification message of RefreshFlag=1;
The second notification message for carrying new key and identifying is sent to each node, third processing unit 103 is used for:
Using broadcast mode, is sent to each node and carry key updating mark and the second flag bit
The second notification message of RefreshFlag=0.
Based on same inventive concept, the embodiment of the present invention provides a kind of storage medium, is stored with for realizing bluetooth from group
The program of the method for key updating in net when described program is run by processor, executes following steps:
New key is sent to each node, each node is triggered after receiving the new key, using old key
It is encrypted to sending message, and is decrypted using the old key or the new key to receiving message;
After determining that each node receives new key, carry that new key identifies the is sent to each node
One notification message is triggered each node and is encrypted using the new key to sending message, and using described old close
Key or the new key are decrypted to receiving message;
It determines that each node is all made of the new key to sending after message is encrypted, is sent out to each node
The second notification message for carrying new key mark is sent, triggers old key described in each knot removal, and use described Xinmi City
Key is decrypted to receiving message.
Based on same inventive concept, the embodiment of the present invention provides a kind of communication device, including one or more processors;With
And one or more computer-readable mediums, instruction is stored on the readable medium, and described instruction is one or more of
When processor executes so that described device executes method described in any one of the above embodiments.
As shown in fig.4, in the embodiment of the present invention, node includes at least:First processing units 104, second processing unit
105 and third processing unit 106, wherein
First processing units 104, for receive network administration apparatus transmission new key when, returned to network administration apparatus
Response message is returned, and message is sent using old key pair and is encrypted, and is docked using the old key or the new key
Message is received to be decrypted;
Second processing unit 105, first for receiving the carrying new key mark that the network administration apparatus is sent
When notification message, it is encrypted using the new key to sending message, and use the old key or the new key pair
Message is received to be decrypted;
Third processing unit 106, second for receiving the carrying new key mark that the network administration apparatus is sent
When notification message, the old key is deleted, is encrypted using the new key to sending message, and use the new key
It is decrypted to receiving message.
Based on same inventive concept, the embodiment of the present invention provides a kind of storage medium, is stored with for realizing bluetooth from group
The program of the method for key updating in net when described program is run by processor, executes following steps:
When receiving the new key of network administration apparatus transmission, to network administration apparatus returning response message, and using old
Key pair sends message and is encrypted, and is decrypted using the old key or the new key to receiving message;
When receiving the first notification message of the carrying new key mark that the network administration apparatus is sent, using described new
Key pair sends message and is encrypted, and is decrypted using the old key or the new key to receiving message;
When receiving the second notification message for the carrying new key mark that the network administration apparatus is sent, delete described old
Key is encrypted to sending message using the new key, and is decrypted using the new key to receiving message.
Based on same inventive concept, the embodiment of the present invention provides a kind of communication device, including one or more processors;With
And one or more computer-readable mediums, instruction is stored on the readable medium, and described instruction is one or more of
When processor executes so that described device executes the method described in above-mentioned one.
In conclusion in the embodiment of the present invention, each node of network administration apparatus sends new key, triggers each section
Point, gradually from new key or old secret key decryption are encrypted and used using old key, is transitted to using Xinmi City according to three phases
New key or old secret key decryption are encrypted and used to key, finally switches to and is encrypted and decrypted using new key, in such manner, it is possible to ensure
The node of different disposal rate smoothly can use new key from using the old key to switch seamlessly to, and will not give and use
Visual sense is caused at family, realizes the transparency of key updating process, to ensure that key updates in time, successfully.
On the other hand, in the case where certain nodes break down, network administration apparatus will not be influenced and notify each section
Point starts key updating flow and being smoothed out for key updating flow therefore has been effectively ensured.
In this way, it is possible to prevente effectively from BLE Mash are promoted the safety of network communication by the Network Intrusion of illegal node,
Ensure that the key updating process of each node does not influence the normal communication of network.
It should be understood by those skilled in the art that, the embodiment of the present invention can be provided as method, system or computer program
Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention
Apply the form of example.Moreover, the present invention can be used in one or more wherein include computer usable program code computer
The computer program production implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)
The form of product.
The present invention be with reference to according to the method for the embodiment of the present invention, the flow of equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that can be realized by computer program instructions every first-class in flowchart and/or the block diagram
The combination of flow and/or box in journey and/or box and flowchart and/or the block diagram.These computer programs can be provided
Instruct the processor of all-purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce
A raw machine so that the instruction executed by computer or the processor of other programmable data processing devices is generated for real
The device for the function of being specified in present one flow of flow chart or one box of multiple flows and/or block diagram or multiple boxes.
These computer program instructions, which may also be stored in, can guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works so that instruction generation stored in the computer readable memory includes referring to
Enable the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one box of block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device so that count
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, in computer or
The instruction executed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one
The step of function of being specified in a box or multiple boxes.
Although preferred embodiments of the present invention have been described, it is created once a person skilled in the art knows basic
Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as
It selects embodiment and falls into all change and modification of the scope of the invention.
Obviously, those skilled in the art can carry out the embodiment of the present invention various modification and variations without departing from this hair
The spirit and scope of bright embodiment.In this way, if these modifications and variations of the embodiment of the present invention belong to the claims in the present invention
And its within the scope of equivalent technologies, then the present invention is also intended to include these modifications and variations.
Claims (14)
1. the key updating method in a kind of bluetooth ad hoc network, which is characterized in that including:
Network administration apparatus sends new key to each node, triggers each node after receiving the new key, adopts
Message is sent with old key pair to be encrypted, and is decrypted using the old key or the new key to receiving message;
After network administration apparatus determines that each node receives new key, is sent to each node and carry new key
First notification message of mark is triggered each node and is encrypted using the new key to sending message, and used
The old key or the new key are decrypted to receiving message;
Network administration apparatus determines that each node is all made of the new key to sending after message is encrypted, to described each
A node sends the second notification message for carrying new key mark, triggers old key described in each knot removal, and use
The new key is decrypted to receiving message.
2. the method as described in claim 1, which is characterized in that network administration apparatus sends new key to each node, into one
Step includes:
Network administration apparatus determines the node administration list being locally located, and the network pipe is contained in the node administration list
Reason device has permission the mark of each node of management;
Network administration apparatus determines the blacklist being locally located, and is contained in the blacklist and has determined that there are each of security risk
The mark of a node;
Network administration apparatus will be located at the node of the blacklist positioned at the node administration list and not, be determined as current Lawful
Node;
Network administration apparatus sends new key to each node.
3. method as claimed in claim 1 or 2, which is characterized in that network administration apparatus determines that each node receives
To new key, including:
When network administration apparatus judges that each node returns the response message of characterization acquisition new key, determine described each
A node receives new key;
Network administration apparatus determines that each node is all made of the new key and is encrypted to sending message, including:
Network administration apparatus sends status inquiry message respectively to each node, and according to the shape of each node feeding back
State information determines that each node is all made of the new key and is encrypted to sending message.
4. method as claimed in claim 1 or 2, which is characterized in that network administration apparatus sends to each node and carries
First notification message of new key mark, including:
Network administration apparatus uses broadcast mode, is sent to each node and carries new key mark and the first flag bit
The first notification message of RefreshFlag=1;
Network administration apparatus sends the second notification message for carrying new key and identifying to each node, including:
Network administration apparatus uses broadcast mode, is sent to each node and carries key updating mark and the second flag bit
The second notification message of RefreshFlag=0.
5. the key updating method in a kind of bluetooth ad hoc network, which is characterized in that including:
When node receives the new key of network administration apparatus transmission, to network administration apparatus returning response message, and using old
Key pair sends message and is encrypted, and is decrypted using the old key or the new key to receiving message;
When node receives the first notification message of the carrying new key mark that the network administration apparatus is sent, using described new
Key pair sends message and is encrypted, and is decrypted using the old key or the new key to receiving message;
When node receives the second notification message for the carrying new key mark that the network administration apparatus is sent, delete described old
Key is encrypted to sending message using the new key, and is decrypted using the new key to receiving message.
6. the key update device in a kind of bluetooth ad hoc network, which is characterized in that including:
First processing units trigger each node and are receiving the new key for sending new key to each node
Afterwards, it sends message using old key pair to be encrypted, and is carried out using the old key or the new key to receiving message
Decryption;
Second processing unit sends to each node and carries after determining that each node receives new key
First notification message of new key mark is triggered each node and is encrypted using the new key to sending message, with
And it is decrypted using the old key or the new key to receiving message;
Third processing unit, for determining that each node is all made of the new key to sending after message is encrypted, to
Each node sends the second notification message for carrying new key mark, triggers old key described in each knot removal,
And it is decrypted using the new key to receiving message.
7. device as claimed in claim 6, which is characterized in that when sending new key to each node, first processing is single
Member is further used for:
Determine the node administration list being locally located, containing the network administration apparatus in the node administration list has permission
The mark of each node of management;
It determines the blacklist being locally located, the mark for having determined that each node there are security risk is contained in the blacklist
Know;
The node of the blacklist will be located at positioned at the node administration list and not, is determined as the node of current Lawful;
New key is sent to each node.
8. device as claimed in claims 6 or 7, which is characterized in that when determining that each node receives new key, institute
Second processing unit is stated to be used for:
When judging that each node returns the response message of characterization acquisition new key, determine that each node receives
To new key;
Determine that each node is all made of the new key and is encrypted to sending message, the third processing unit is used for:
Status inquiry message is sent respectively to each node, and according to the status information of each node feeding back, is determined
Each node is all made of the new key and is encrypted to sending message.
9. device as claimed in claims 6 or 7, which is characterized in that sent to each node and carry what new key identified
When the first notification message, the second processing unit is used for:
Using broadcast mode, is sent to each node and carry new key mark and the first flag bit RefreshFlag=1
The first notification message;
The second notification message for carrying new key and identifying is sent to each node, the second processing unit is used for:
Using broadcast mode, is sent to each node and carry key updating mark and the second flag bit RefreshFlag
=0 second notification message.
10. the key update device in a kind of bluetooth ad hoc network, which is characterized in that including:
First processing units, for receive network administration apparatus transmission new key when, to network administration apparatus returning response
Message, and message is sent using old key pair and is encrypted, and using the old key or the new key to receiving message
It is decrypted;
Second processing unit, the first notification message for receiving the carrying new key mark that the network administration apparatus is sent
When, it is encrypted using the new key to sending message, and using the old key or the new key to receiving message
It is decrypted;
Third processing unit, the second notification message for receiving the carrying new key mark that the network administration apparatus is sent
When, the old key is deleted, is encrypted using the new key to sending message, and disappeared to reception using the new key
Breath is decrypted.
11. a kind of storage medium, which is characterized in that be stored with the journey of the method for realizing the key updating in bluetooth ad hoc network
Sequence when described program is run by processor, executes following steps:
New key is sent to each node, each node is triggered after receiving the new key, is sent out using old key pair
It send message to be encrypted, and is decrypted using the old key or the new key to receiving message;
After determining that each node receives new key, carries the first of new key mark to each node transmission and lead to
Know message, trigger each node and be encrypted using the new key to sending message, and using the old key or
The new key is decrypted to receiving message;
It determines that each node is all made of the new key to sending after message is encrypted, is taken to each node transmission
Second notification message with new key mark triggers old key described in each knot removal, and uses the new key pair
Message is received to be decrypted.
12. a kind of communication device, which is characterized in that including one or more processors;And it is one or more computer-readable
Medium is stored with instruction on the readable medium, when described instruction is executed by one or more of processors so that the dress
It sets and executes method according to any one of claims 1 to 4.
13. a kind of storage medium, which is characterized in that be stored with the journey of the method for realizing the key updating in bluetooth ad hoc network
Sequence when described program is run by processor, executes following steps:
When receiving the new key of network administration apparatus transmission, to network administration apparatus returning response message, and old key is used
It is encrypted to sending message, and is decrypted using the old key or the new key to receiving message;
When receiving the first notification message of the carrying new key mark that the network administration apparatus is sent, using the new key
It is encrypted to sending message, and is decrypted using the old key or the new key to receiving message;
When receiving the second notification message for the carrying new key mark that the network administration apparatus is sent, delete described old close
Key is encrypted to sending message using the new key, and is decrypted using the new key to receiving message.
14. a kind of communication device, which is characterized in that including one or more processors;And it is one or more computer-readable
Medium is stored with instruction on the readable medium, when described instruction is executed by one or more of processors so that the dress
It sets and executes method as described in claim 5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810917773.4A CN108650676A (en) | 2018-08-13 | 2018-08-13 | A kind of key updating method in bluetooth ad hoc network and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810917773.4A CN108650676A (en) | 2018-08-13 | 2018-08-13 | A kind of key updating method in bluetooth ad hoc network and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108650676A true CN108650676A (en) | 2018-10-12 |
Family
ID=63761048
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810917773.4A Pending CN108650676A (en) | 2018-08-13 | 2018-08-13 | A kind of key updating method in bluetooth ad hoc network and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108650676A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110035396A (en) * | 2019-04-15 | 2019-07-19 | 湖南科大天河通信股份有限公司 | Bluetooth broadcast key updating method, apparatus and system |
CN110460977A (en) * | 2019-07-23 | 2019-11-15 | 厦门阳光恩耐照明有限公司 | A kind of Intelligent illumination device based on bluetooth MESH matches network method |
CN112423277A (en) * | 2019-08-05 | 2021-02-26 | 意法半导体国际有限公司 | Security certificate recovery in bluetooth mesh networks |
CN113115283A (en) * | 2021-03-05 | 2021-07-13 | 深圳市南方硅谷半导体有限公司 | Communication method, device, equipment and storage medium based on Bluetooth mesh network |
CN114124352A (en) * | 2021-11-19 | 2022-03-01 | 浪潮云信息技术股份公司 | Key rotation method, device and computer medium |
CN114125823A (en) * | 2020-08-25 | 2022-03-01 | 云米互联科技(广东)有限公司 | Networking communication encryption method, server, household appliance, system and storage medium |
CN114614985A (en) * | 2022-05-12 | 2022-06-10 | 施维智能计量系统服务(长沙)有限公司 | Communication key updating method, key server and readable storage medium |
CN116866899A (en) * | 2023-09-04 | 2023-10-10 | 北京理工大学 | Multi-node wireless ad hoc network communication method and device, electronic equipment and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1946019A (en) * | 2005-10-04 | 2007-04-11 | 株式会社日立制作所 | Network device, network system and method for updating a key |
US20070253554A1 (en) * | 2002-03-08 | 2007-11-01 | Atheros Communications, Inc. | Reykey Operation With Multiplexing Capability |
CN102104870A (en) * | 2009-12-21 | 2011-06-22 | 英特尔公司 | Wireless device and method for rekeying with reduced packet loss for high-throughput wireless communications |
CN103595529A (en) * | 2012-08-13 | 2014-02-19 | 西安西电捷通无线网络通信股份有限公司 | A switching method for a unidirectional secret key and a realization apparatus |
CN107041171A (en) * | 2016-11-25 | 2017-08-11 | 深圳市汇顶科技股份有限公司 | Low-power consumption bluetooth BLE equipment, data update system and method |
-
2018
- 2018-08-13 CN CN201810917773.4A patent/CN108650676A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070253554A1 (en) * | 2002-03-08 | 2007-11-01 | Atheros Communications, Inc. | Reykey Operation With Multiplexing Capability |
CN1946019A (en) * | 2005-10-04 | 2007-04-11 | 株式会社日立制作所 | Network device, network system and method for updating a key |
CN102104870A (en) * | 2009-12-21 | 2011-06-22 | 英特尔公司 | Wireless device and method for rekeying with reduced packet loss for high-throughput wireless communications |
CN103595529A (en) * | 2012-08-13 | 2014-02-19 | 西安西电捷通无线网络通信股份有限公司 | A switching method for a unidirectional secret key and a realization apparatus |
CN107041171A (en) * | 2016-11-25 | 2017-08-11 | 深圳市汇顶科技股份有限公司 | Low-power consumption bluetooth BLE equipment, data update system and method |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110035396A (en) * | 2019-04-15 | 2019-07-19 | 湖南科大天河通信股份有限公司 | Bluetooth broadcast key updating method, apparatus and system |
CN110460977A (en) * | 2019-07-23 | 2019-11-15 | 厦门阳光恩耐照明有限公司 | A kind of Intelligent illumination device based on bluetooth MESH matches network method |
CN112423277A (en) * | 2019-08-05 | 2021-02-26 | 意法半导体国际有限公司 | Security certificate recovery in bluetooth mesh networks |
CN112423277B (en) * | 2019-08-05 | 2024-03-26 | 意法半导体国际有限公司 | Security certificate recovery in bluetooth mesh networks |
CN114125823A (en) * | 2020-08-25 | 2022-03-01 | 云米互联科技(广东)有限公司 | Networking communication encryption method, server, household appliance, system and storage medium |
CN114125823B (en) * | 2020-08-25 | 2024-02-06 | 云米互联科技(广东)有限公司 | Networking communication encryption method, server, household appliance, system and storage medium |
CN113115283A (en) * | 2021-03-05 | 2021-07-13 | 深圳市南方硅谷半导体有限公司 | Communication method, device, equipment and storage medium based on Bluetooth mesh network |
CN113115283B (en) * | 2021-03-05 | 2023-03-03 | 深圳市南方硅谷半导体股份有限公司 | Communication method, device, equipment and storage medium based on Bluetooth mesh network |
CN114124352A (en) * | 2021-11-19 | 2022-03-01 | 浪潮云信息技术股份公司 | Key rotation method, device and computer medium |
CN114614985A (en) * | 2022-05-12 | 2022-06-10 | 施维智能计量系统服务(长沙)有限公司 | Communication key updating method, key server and readable storage medium |
CN116866899A (en) * | 2023-09-04 | 2023-10-10 | 北京理工大学 | Multi-node wireless ad hoc network communication method and device, electronic equipment and storage medium |
CN116866899B (en) * | 2023-09-04 | 2023-11-28 | 北京理工大学 | Multi-node wireless ad hoc network communication method and device, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108650676A (en) | A kind of key updating method in bluetooth ad hoc network and device | |
EP2510713B1 (en) | Preservation of user data privacy in a network | |
US8122505B2 (en) | Method and apparatus for detection of malicious behavior in mobile ad-hoc networks | |
CN109922469A (en) | For supporting the method, apparatus and system of radio roaming | |
KR101018435B1 (en) | Apparatus and method for security management of user terminal | |
CN109391648A (en) | It is a kind of to apply correlating method, device and the communication system being sliced with network | |
CN106712932A (en) | Secret key management method, device and system | |
CN107005569A (en) | Peer-to-peer services layer certification | |
US10470003B2 (en) | Method for regrouping multiple groups and device | |
US10567172B2 (en) | Method for updating a key, and master transmission point | |
CN108347420A (en) | A kind of method, relevant device and the system of netkey processing | |
CN103905433A (en) | Distributed network firewall and forwarding system based on stream | |
CN113316131A (en) | Connection establishing method and device, electronic equipment and storage medium | |
CN104335198B (en) | Server, method and the terminal for preventing accessing resource are accessed for management terminal | |
CN107948339A (en) | A kind of network addressing method, equipment and device | |
US20220272511A1 (en) | Subscription data management method and apparatus | |
CN110167080A (en) | The method and device that subscription information updates | |
CN105100268A (en) | Security control method and system of Internet-of-things device as well as application server | |
CN110536254A (en) | Cell switching method and device, storage medium, base station | |
CN110324415B (en) | Method, device, equipment and medium for realizing routing of peer-to-peer network | |
CN104038566B (en) | A kind of method of virtual swap device address learning, apparatus and system | |
US10334513B2 (en) | Neighbor awareness network discovery | |
US11553336B2 (en) | System and method for processing of private beacons in a mesh network | |
EP3190856A2 (en) | Communications method, device, and system | |
US20120179902A1 (en) | Network key update system, a server, a network key update method and a recording medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 266555 Qingdao economic and Technological Development Zone, Shandong, Hong Kong Road, No. 218 Applicant after: Hisense Video Technology Co., Ltd Address before: 266100 Zhuzhou Road, Laoshan District, Shandong, No. 151, No. Applicant before: HISENSE ELECTRIC Co.,Ltd. |
|
CB02 | Change of applicant information | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181012 |
|
RJ01 | Rejection of invention patent application after publication |