CN108650676A - A kind of key updating method in bluetooth ad hoc network and device - Google Patents

A kind of key updating method in bluetooth ad hoc network and device Download PDF

Info

Publication number
CN108650676A
CN108650676A CN201810917773.4A CN201810917773A CN108650676A CN 108650676 A CN108650676 A CN 108650676A CN 201810917773 A CN201810917773 A CN 201810917773A CN 108650676 A CN108650676 A CN 108650676A
Authority
CN
China
Prior art keywords
node
new key
key
message
administration apparatus
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810917773.4A
Other languages
Chinese (zh)
Inventor
杨斐
孙昭全
周全
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qingdao Hisense Electronics Co Ltd
Original Assignee
Qingdao Hisense Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qingdao Hisense Electronics Co Ltd filed Critical Qingdao Hisense Electronics Co Ltd
Priority to CN201810917773.4A priority Critical patent/CN108650676A/en
Publication of CN108650676A publication Critical patent/CN108650676A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The present invention relates to bluetooth ad-hoc network field in Internet of Things more particularly to the key updating method in a kind of bluetooth ad hoc network and devices.For smoothly more new key, the safety of network communication is promoted, this method is:Network administration apparatus sends new key to each node, triggers each node and gradually carries out key updating according to three phases.In this way, it can ensure the node of different disposal rate, new key can be used in time, smoothly from using old key to switch seamlessly to, in addition, in the case where certain nodes break down, it is possible to prevente effectively from Network Intrusions of the BLE Mash by illegal node, therefore, being smoothed out for key updating flow has been effectively ensured, has promoted the safety of network communication.

Description

A kind of key updating method in bluetooth ad hoc network and device
Technical field
The present invention relates to the key updating methods and device in technology of Internet of things more particularly to a kind of bluetooth ad hoc network.
Background technology
Internet of Things (Internet of things, IoT) refers to acquiring any need in real time by various information sensing devices It monitors, connect, the information of the various needs such as interactive object or process, the huge network to be formed is combined with internet. The purpose is to realize that object and object, object and people, the connection of all articles and network facilitate identification, management and control.In short It, Internet of Things is exactly the connected internet of object object.
Low-power consumption bluetooth (Bluetooth Low Energy, BLE) be a kind of intelligence, low-power consumption blue tooth wireless technology, The short haul connection between smart machine is realized, there is the advantages such as low complex degree, low-power consumption, low cost, extensive use In the fields IoT.Communication mode in BLE technologies is point-to-point (Point-to-Point, PTP), and which limit Bluetooth technologies Application field.
For this defect, low-power consumption bluetooth ad-hoc network (Bluetooth Low Energy Mesh, BLE Mesh) is answered It transports and gives birth to (abbreviation bluetooth ad hoc network).The network topology structure that BLE Mesh are communicated using " multi-to-multi ", each node and its phase Neighbors is communicated and is forwarded data, to promote bluetooth group ability, has wide coverage, efficient, low-power consumption, peace Entirely, the features such as scalability.
In BLE Mesh, each Centroid can be established with multiple terminal nodes and be connected, and terminal node is in The control of heart node, and with Centroid interaction data.For example, a mobile phone terminal can detect the shape of multiple smart homes State, and the use of smart home is controlled.
Under the prior art, in BLE Mesh, all message of interaction have to pass through key encryption just between each node It can be transmitted, therefore preserve currently used key on each node.So, when some nodes for some reason (e.g., break down, be under attack, replacing use environment etc.) and when leaving BLE Mesh, still carry key on these nodes. And after key is by illegal crack, the node of other networks can obtain the related data of above-mentioned BLE Mesh, so as to cause network The leakage of data, and influence the operational administrative of node.
For example, in BLE Mesh, when a certain smart home of a mobile phone terminal control breaks down, if the intelligence The key preserved in household is cracked by the node in other networks, then the node in other networks can carry out the smart home Control, to influence the network security of above-mentioned BLE Mesh and the normal use of above-mentioned mobile phone terminal.
Therefore, in BLE Mesh, the key to being used on each node is needed to regularly update, and need to realize The seamless switching of old key and new key realizes smooth excessiveness, however, under prior art, is designed not yet for BLE Mesh Go out corresponding key updating mode.
Invention content
The object of the present invention is to provide the key updating methods and device in a kind of bluetooth ad hoc network, for ensureing BLE In Mash, the key on each node can in time, successfully update.
Specific technical solution provided in an embodiment of the present invention is as follows:
A kind of key updating method in bluetooth ad hoc network, including:
Network administration apparatus sends new key to each node, triggers each node and is receiving the new key Afterwards, it sends message using old key pair to be encrypted, and is carried out using the old key or the new key to receiving message Decryption;
After network administration apparatus determines that each node receives new key, sends and carried newly to each node First notification message of key identification is triggered each node and is encrypted using the new key to sending message, and It is decrypted using the old key or the new key to receiving message;
Network administration apparatus determines that each node is all made of the new key to sending after message is encrypted, to institute It states each node and sends the second notification message for carrying new key mark, trigger old key described in each knot removal, and It is decrypted using the new key to receiving message.
Optionally, network administration apparatus sends new key to each node, further comprises:
Network administration apparatus determines the node administration list being locally located, and the net is contained in the node administration list Network managing device has permission the mark of each node of management;
Network administration apparatus determines the blacklist being locally located, and is contained in the blacklist and has determined that there are security risks Each node mark;
Network administration apparatus will be located at the node of the blacklist positioned at the node administration list and not, be determined as current Legal node;
Network administration apparatus sends new key to each node.
Optionally, network administration apparatus determines that each node receives new key, including:
When network administration apparatus judges that each node returns the response message of characterization acquisition new key, institute is determined It states each network node and receives new key;
Network administration apparatus determines that each node is all made of the new key and is encrypted to sending message, including:
Network administration apparatus sends status inquiry message respectively to each node, and according to each network node The status information of feedback determines that each node is all made of the new key and is encrypted to sending message.
Optionally, network administration apparatus sends the first notification message for carrying new key and identifying, packet to each node It includes:
Network administration apparatus uses broadcast mode, is sent to each node and carries new key mark and the first mark The first notification message of position RefreshFlag=1;
Network administration apparatus sends the second notification message for carrying new key and identifying to each node, including:
Network administration apparatus uses broadcast mode, is sent to each node and carries key updating mark and the second mark The second notification message of will position RefreshFlag=0.
A kind of key updating method in bluetooth ad hoc network, optionally, including:
When node receives the new key of network administration apparatus transmission, to network administration apparatus returning response message, and adopt Message is sent with old key pair to be encrypted, and is decrypted using the old key or the new key to receiving message;
When node receives the first notification message of the carrying new key mark that the network administration apparatus is sent, using institute It states new key and is encrypted to sending message, and be decrypted using the old key or the new key to receiving message;
When node receives the second notification message for the carrying new key mark that the network administration apparatus is sent, institute is deleted Old key is stated, is encrypted using the new key to sending message, and solved using the new key to receiving message It is close.
A kind of key update device in bluetooth ad hoc network, optionally, including:
First processing units, for sending new key to each node, trigger each node receive it is described new After key, message is sent using old key pair and is encrypted, and using the old key or the new key to receiving message It is decrypted;
Second processing unit is sent after determining that each node receives new key to each node The first notification message of new key mark is carried, each node is triggered and is added to sending message using the new key It is close, and be decrypted using the old key or the new key to receiving message;
Third processing unit is encrypted for determining that each node is all made of the new key to sending message Afterwards, the second notification message for carrying new key and identifying is sent to each node, is triggered old described in each knot removal Key, and be decrypted using the new key to receiving message.
Optionally, new key is sent to each node, the first processing units are further used for:
Determine the node administration list being locally located, containing the network administration apparatus in the node administration list has The mark of each node of rights management;
It determines the blacklist being locally located, is contained in the blacklist and have determined that each node there are security risk Mark;
The node of the blacklist will be located at positioned at the node administration list and not, is determined as the node of current Lawful;
New key is sent to each node.
Optionally, when determining that each node receives new key, the second processing unit is used for:
When judging that each node returns the response message of characterization acquisition new key, determine that each node is equal Receive new key;
Determine that each node is all made of the new key and is encrypted to sending message, the third processing unit is used In:
Status inquiry message is sent respectively to each node, and according to the status information of each node feeding back, Determine that each node is all made of the new key and is encrypted to sending message.
Optionally, when sending the first notification message for carrying new key mark to each node, the second processing Unit is used for:
Using broadcast mode, is sent to each node and carry new key mark and the first flag bit The first notification message of RefreshFlag=1;
The second notification message for carrying new key and identifying is sent to each node, the third processing unit is used for:
Using broadcast mode, is sent to each node and carry key updating mark and the second flag bit The second notification message of RefreshFlag=0.
A kind of key update device in bluetooth ad hoc network, optionally, including:
First processing units, for receive network administration apparatus transmission new key when, to network administration apparatus return Response message, and message is sent using old key pair and is encrypted, and using the old key or the new key to receiving Message is decrypted;
Second processing unit, the first notice for receiving the carrying new key mark that the network administration apparatus is sent When message, it is encrypted using the new key to sending message, and using the old key or the new key to receiving Message is decrypted;
Third processing unit, the second notice for receiving the carrying new key mark that the network administration apparatus is sent When message, the old key is deleted, is encrypted using the new key to sending message, and docked using the new key Message is received to be decrypted.
A kind of storage medium is optionally stored with the program of the method for realizing the key updating in bluetooth ad hoc network, When described program is run by processor, following steps are executed:
New key is sent to each node, each node is triggered after receiving the new key, using old key It is encrypted to sending message, and is decrypted using the old key or the new key to receiving message;
After determining that each node receives new key, carry that new key identifies the is sent to each node One notification message is triggered each node and is encrypted using the new key to sending message, and using described old close Key or the new key are decrypted to receiving message;
It determines that each node is all made of the new key to sending after message is encrypted, is sent out to each node The second notification message for carrying new key mark is sent, triggers old key described in each knot removal, and use described Xinmi City Key is decrypted to receiving message.
A kind of communication device, optionally, including one or more processors;And one or more computer-readable Jie Matter is stored with instruction on the readable medium, when described instruction is executed by one or more of processors so that described device Execute method as described in any one of the above embodiments.
A kind of storage medium is stored with the program of the method for realizing the key updating in bluetooth ad hoc network, the journey When sequence is run by processor, following steps are executed:
When receiving the new key of network administration apparatus transmission, to network administration apparatus returning response message, and using old Key pair sends message and is encrypted, and is decrypted using the old key or the new key to receiving message;
When receiving the first notification message of the carrying new key mark that the network administration apparatus is sent, using described new Key pair sends message and is encrypted, and is decrypted using the old key or the new key to receiving message;
When receiving the second notification message for the carrying new key mark that the network administration apparatus is sent, delete described old Key is encrypted to sending message using the new key, and is decrypted using the new key to receiving message.
A kind of communication device, including one or more processors;And one or more computer-readable mediums, it is described can It reads to be stored with instruction on medium, when described instruction is executed by one or more of processors so that described device executes as above State the method described in one.
In conclusion in the embodiment of the present invention, network administration apparatus triggers each node according to three phases, gradually From new key or old secret key decryption are encrypted and used using old key, transits to and new key is encrypted and used using new key Or old secret key decryption, it finally switches to and is encrypted and decrypted using new key, in such manner, it is possible to ensure that the section of different disposal rate Point smoothly can use new key from using old key to switch seamlessly to, and will not cause visual sense to user, realize The transparency of key updating process, to ensure that key updates in time, successfully.
Description of the drawings
Fig. 1 is bluetooth ad hoc network schematic diagram in the embodiment of the present invention;
Fig. 2 is key updating flow diagram in the embodiment of the present invention;
Fig. 3 is network administration apparatus schematic diagram in the embodiment of the present invention;
Fig. 4 is interior joint schematic diagram of the embodiment of the present invention.
Specific implementation mode
To improve the safety of BLE Mash communications, old key and the seamless switching of new key, the embodiment of the present invention are realized In, there will be each nodes of security risk, and blacklist, the current Lawful into node administration list is added for network administration apparatus Each node send new key, trigger each node and replacing for old key and new key be done step-by-step by three phases Change, avoid BLE Mash by illegal node Network Intrusion simultaneously, ensure that key updating process not is influencing network just Normal open is believed.
The preferred embodiment of the present invention is described in detail in following accompanying drawings.
It,, can between network administration apparatus and each node and each node in BLE Mash in the embodiment of the present invention To be communicated by BLE technologies and forward data.So-called network administration apparatus refers to the node that can be obtained in compass of competency Related data information, monitors the current state of the node, and to the equipment that the node carries out control management, for example, mobile phone, Ipad, laptop etc..
For example, as shown in fig.1, in BLE Mash, mobile phone can pass through BLE technical managements intelligent refrigerator and intelligence electricity Depending on that can be communicated by BLE technologies between intelligent refrigerator, intelligent air condition, smart television and intelligent washing machine, notebook electricity Brain can manage intelligent refrigerator, intelligent air condition and intelligent washing machine by BLE technologies.
In the embodiment of the present invention, key updating process is divided into three phases, individually below referred to as stage 1, stage 2 and stage 3。
In the stage 1, new key can be issued to each node by network administration apparatus, and each node is still using old close Key is encrypted to sending message, while old key or new key can be used to be decrypted to receiving message.
After network administration apparatus determines that each node receives new key, each node is notified to enter the stage 2.
In the stage 2, each node is encrypted using new key to sending message, while old key or new may be used Key pair receives message and is decrypted.
After network administration apparatus determines that each node enters the stage 2, each node is notified to enter the stage 3.
In the stage 3, each old key of knot removal is encrypted to sending message only with new key, and uses New key is decrypted to receiving message.
As shown in fig.2, in the embodiment of the present invention, it is as follows for the detailed process of the key updating in bluetooth ad hoc network:
Step 100:After network administration apparatus starts the dedicated programs for managing smart home, into corresponding management Operation interface.
Step 110:Network administration apparatus sends new key to each node.
In the embodiment of the present invention, the node in compass of competency can be the smart home controlled by network administration apparatus, For example, intelligent refrigerator, intelligent air condition, smart television, intelligent washing machine etc..
Step 110 is that network administration apparatus triggering key updating flow enters the stage 1.
Specifically, when executing step 110, network administration apparatus can execute following operation:
A, network administration apparatus determines the node administration list being locally located, and is contained in the node administration list described Network administration apparatus has permission the mark of each node of management.
Wherein, network administration apparatus has permission the node of management, can refer to network administration apparatus currently and network management Device is in the node of same bluetooth ad hoc network, and the node of same bluetooth ad hoc network was once in network administration apparatus.
For example, refering to shown in table 1, occur the node administration list being locally located in the operation interface of network administration apparatus, Identify 1 (A1), mark 2 (A2) ... identify 10 (A10) as the corresponding mark of each node.
Table 1
A1 A2 A3 A4 A5
A6 A7 A8 A9 A10
B, network administration apparatus determines the blacklist being locally located, and contains and is had determined that in the presence of safe hidden in the blacklist The mark for each node suffered from.
It is wherein, so-called that there are security risks to refer to:Have determined that the node attacked, and, it has been determined that it is filled from network management Set the node removed in the bluetooth ad hoc network of management.
For example, refering to shown in table 2, occur the blacklist being locally located, mark 1 in the operation interface of network administration apparatus (A1), identify 5 (A5) and identify 6 (A6) be interface on be set out there are the marks of each node of security risk.
Table 2
A1 A5 A6
C, network administration apparatus will be located at the node of the blacklist positioned at the node administration list and not, be determined as working as Preceding legal node.
That is, network administration apparatus is from the node identification deleted in the node administration list being locally located on blacklist, it will be remaining Under node be determined as the node of current Lawful.
For example, refering to shown in table 3,1 (A1) of node administration list display mark, mark 2 (A2) ... the marks that are locally located The node identification for knowing 10 (A10), 1 (A1) of blacklist display mark, 5 (A5) of mark and the node for identifying 6 (A6) being locally located It identifies, then network administration apparatus will identify 2 (A2), 3 (A3) of mark, 4 (A4) of mark, identify 7 (A7), 8 (A8) of mark, mark 9 (A9) and 10 (A10) of mark are determined as the node identification of current Lawful node.
Table 3
A2 A3 A4 A7
A8 A9 A10
D, network administration apparatus sends new key to each node.
That is, network administration apparatus to mark 2 (A2), mark 3 (A3), mark 4 (A4), mark 7 (A7), mark 8 (A8), mark Know 9 (A9) and the corresponding nodes of 10 (A10) of mark send new key.
Step 120:After each node receives the new key of network administration apparatus transmission, phase is returned to network administration apparatus The response message answered, and message is sent using old key pair and is encrypted, and use the old key or the new key pair Message is received to be decrypted.
Specifically, be introduced by taking node A1 as an example, after node A1 receives the new key of network administration apparatus transmission, Into the stage 1.In the stage 1, new key is stored in local by node A1, and still sending message using old key pair is encrypted, But old key or new key may be used and be decrypted to receiving message.
Still message is sent in the stage 1 using old key pair to be encrypted, this is because each node enters the stage 1 Speed is inconsistent, and in order to ensure the communication consistency of bluetooth ad hoc network, each node is after receiving new key, into the stage Before 2, still message is sent using old key pair and be encrypted, so that it is guaranteed that each node can be identified and be sent between each other Message.
Old key or new key may be used in the stage 1 and be decrypted to receiving message, this is because in follow-up process In, network administration apparatus can trigger each node and initially enter the stage 2, since the service speed of each node is inconsistent, Having been enter into the node in stage 2 can use new key to be encrypted to sending message, and not yet enter the stage 2 (i.e. still in the stage 1) node still can use old key pair to send message and be encrypted, still, due to having occurred disappearing to transmission using new key The node being encrypted is ceased, therefore, each node needs to be decrypted to receiving message using new key, to ensure bluetooth certainly It can be smoothed out communication between each node in networking.
Step 130:Network administration apparatus determines that each node receives new key.
Specifically, since each node is after receiving new key, corresponding response can be returned to network administration apparatus Message, thus, when network administration apparatus judges that each node returns the response message of characterization acquisition new key, determine Each node receives new key.
For example, 2 (A2) of mark, 3 (A3) of mark, 4 (A4) of mark, 7 (A7) of mark, 8 (A8) of mark, 9 (A9) of mark and mark After knowing the new key that the corresponding node receiving network managing devices of 10 (A10) are sent, actively one is returned to network administration apparatus A response message " receives new key ", indicate that the node has obtained new key, when network administration apparatus receives each section After the response message that point returns, determine that each node receives new key.
Step 140:Network administration apparatus sends the first notification message for carrying new key and identifying to each node.
Step 140 is that network administration apparatus triggering key updating flow enters the stage 2.
Specifically, when executing step 140, network administration apparatus uses broadcast mode, is taken to each node transmission The first notification message with new key mark and the first flag bit (RefreshFlag=1).
That is, network administration apparatus uses broadcast mode, to 2 (A2) of mark, 3 (A3) of mark, 4 (A4) of mark, mark 7 (A7), 8 (A8), 9 (A9) of mark are identified and the corresponding nodes of 10 (A10) of mark send the first notification message, the first notice respectively New key mark and RefreshFlag=1 are at least carried in message.
Wherein, why network administration apparatus using broadcast mode sends the first notification message, is because in this way can be In the case of the routed path that not specified first notification message is sent, the first notification message is smoothly sent to each node, because This stability is strong, and is not broken down and influenced by part of nodes.
Wherein, RefreshFlag=1 indicates that node is in key updating process, and the node carries out old key to Xinmi City The conversion of key, that is, be converted to using new key encryption transmission message, but can be used old close from message is sent using the encryption of old key Key or new key are decrypted to receiving message.
Step 150:Each node receives the first notice of the carrying new key mark that the network administration apparatus is sent When message, it is encrypted using the new key to sending message, and using the old key or the new key to receiving Message is decrypted.
Specifically, being introduced by taking node A1 as an example, when node A1 receives carrying Xinmi City of network administration apparatus transmission After first notification message of key mark, into the stage 2.In the stage 2, node A1 carries out the converted of old key and new key Journey, that is, be encrypted using new key to sending message, but old key or new key still may be used and carried out to receiving message Decryption.
In the stage 2, each node may be used old key or new key and is decrypted to receiving message, this is because respectively The processing speed of a node is different, and the node for being in the stage 2 may be used new key and is encrypted to sending message, and still The node in stage 2 is not entered, that is, the node in the stage 1 still sends message using old key pair and is encrypted, when in rank Corresponding when the node of section 2 receives transmission message encrypted using old key, the node in stage 2 needs to use old key pair It receives message to be decrypted, to ensure the normal communication in network between each node.
Step 160:Network administration apparatus determines that each node is all made of the new key and adds to sending message It is close.
Specifically, after network administration apparatus sends above-mentioned first notification message, shape can be sent respectively to each node State inquires message, and according to the status information of each node feeding back, determines that each node is all made of the new key It is encrypted to sending message, i.e., after each node receives status inquiry message, can be fed back certainly to network administration apparatus The status information of body, notice network administration apparatus itself are in stage 1 or stage 2, and network administration apparatus is according to each of acquisition The status information of node determines that each node enters after the stage 2, can trigger each node and enter the stage 3.
For example, 2 (A2) of mark, 3 (A3) of mark, 4 (A4) of mark, 7 (A7) of mark, 8 (A8) of mark, 9 (A9) of mark and mark After knowing the corresponding node reception state inquiry message of 10 (A10), a state letter of itself can be returned to network administration apparatus Breath, that is, status information " sends message encryption " using old key pair, indicates that the node is in the stage 1, status information " uses New key is to sending message encryption ", it indicates that the node is in the stage 2, " is adopted when network administration apparatus receives each node return With new key to send message encryption " status information after, determine then each node triggers each node into the stage 2 Into the stage 3.
Step 170:Network administration apparatus sends the second notification message for carrying new key and identifying to each node.
Step 170 is that network administration apparatus triggering key updating flow enters the stage 3.
Specifically, when executing step 170, network administration apparatus uses broadcast mode, is taken to each node transmission Second notification message with key updating mark and the second flag bit RefreshFlag=0.
That is, network administration apparatus uses broadcast mode, to 2 (A2) of mark, 3 (A3) of mark, 4 (A4) of mark, mark 7 (A7), 8 (A8), 9 (A9) of mark are identified and the corresponding nodes of 10 (A10) of mark send second notification message, the second notice respectively New key mark and RefreshFlag=0 are at least carried in message.
Wherein, why network administration apparatus using broadcast mode sends second notification message, is because in this way can be In the case of the routed path that not specified second notification message is sent, second notification message is successfully transferred to each node, is protected The stability of network communication has been demonstrate,proved, and if certain nodes break down, has not interfered with the normal communication of network.
Wherein, RefreshFlag=0 indicates that node is in the normal condition without carrying out key updating, and the node is not Reuse old key, that is, the node under the state only preserves a new key, and node may be used the new key and disappear to transmission Breath is encrypted, it is also possible to be decrypted using the new key to receiving message.
Step 180:Each node receives the second notice of the carrying new key mark that the network administration apparatus is sent When message, the old key is deleted, is encrypted using the new key to sending message, and docked using the new key Message is received to be decrypted.
Specifically, being introduced by taking node A1 as an example, when node A1 receives carrying Xinmi City of network administration apparatus transmission After the second notification message of key mark, into the stage 3.In the stage 3, node A1 deletes local old key, using new key It is encrypted to sending message, and new key may be used and be decrypted to receiving message.
In the stage 3, each node only may be used new key and is encrypted to sending message, this is because being in The knot removal in the stage 3 old key of local reservation, current each node only preserves new key, thus can only use Xinmi City Key is encrypted to sending message, to realize that old key encrypts conversion of the message to new key encryption message.
So far, key updating flow all terminates.
Based in above-described embodiment, as shown in fig.3, in the embodiment of the present invention, network administration apparatus includes at least:First Processing unit 101, second processing unit 102 and third processing unit 103, wherein
First processing units 101 trigger each node described in receiving for sending new key to each node After new key, message is sent using old key pair and is encrypted, and is disappeared to reception using the old key or the new key Breath is decrypted;
Second processing unit 102 is sent out after determining that each node receives new key to each node The first notification message for carrying new key mark is sent, each node is triggered and is added to sending message using the new key It is close, and be decrypted using the old key or the new key to receiving message;
Third processing unit 103 adds for determining that each node is all made of the new key to sending message After close, the second notification message for carrying new key and identifying is sent to each node, is triggered described in each knot removal Old key, and be decrypted using the new key to receiving message.
Optionally, network administration apparatus sends new key to each node, and first processing units 101 are further used for:
Determine the node administration list being locally located, containing the network administration apparatus in the node administration list has The mark of each node of rights management;
It determines the blacklist being locally located, is contained in the blacklist and have determined that each node there are security risk Mark;
The node of the blacklist will be located at positioned at the node administration list and not, is determined as the node of current Lawful;
New key is sent to each node.
Optionally, when determining that each node receives new key, second processing unit 102 is used for:
When judging that each node returns the response message of characterization acquisition new key, determine that each node is equal Receive new key;
Determine that each node is all made of the new key and is encrypted to sending message, third processing unit 103 is used In:
Status inquiry message is sent respectively to each node, and according to the status information of each node feeding back, Determine that each node is all made of the new key and is encrypted to sending message.
Optionally, when sending the first notification message for carrying new key mark to each node, second processing unit 102 are used for:
Using broadcast mode, is sent to each node and carry new key mark and the first flag bit The first notification message of RefreshFlag=1;
The second notification message for carrying new key and identifying is sent to each node, third processing unit 103 is used for:
Using broadcast mode, is sent to each node and carry key updating mark and the second flag bit The second notification message of RefreshFlag=0.
Based on same inventive concept, the embodiment of the present invention provides a kind of storage medium, is stored with for realizing bluetooth from group The program of the method for key updating in net when described program is run by processor, executes following steps:
New key is sent to each node, each node is triggered after receiving the new key, using old key It is encrypted to sending message, and is decrypted using the old key or the new key to receiving message;
After determining that each node receives new key, carry that new key identifies the is sent to each node One notification message is triggered each node and is encrypted using the new key to sending message, and using described old close Key or the new key are decrypted to receiving message;
It determines that each node is all made of the new key to sending after message is encrypted, is sent out to each node The second notification message for carrying new key mark is sent, triggers old key described in each knot removal, and use described Xinmi City Key is decrypted to receiving message.
Based on same inventive concept, the embodiment of the present invention provides a kind of communication device, including one or more processors;With And one or more computer-readable mediums, instruction is stored on the readable medium, and described instruction is one or more of When processor executes so that described device executes method described in any one of the above embodiments.
As shown in fig.4, in the embodiment of the present invention, node includes at least:First processing units 104, second processing unit 105 and third processing unit 106, wherein
First processing units 104, for receive network administration apparatus transmission new key when, returned to network administration apparatus Response message is returned, and message is sent using old key pair and is encrypted, and is docked using the old key or the new key Message is received to be decrypted;
Second processing unit 105, first for receiving the carrying new key mark that the network administration apparatus is sent When notification message, it is encrypted using the new key to sending message, and use the old key or the new key pair Message is received to be decrypted;
Third processing unit 106, second for receiving the carrying new key mark that the network administration apparatus is sent When notification message, the old key is deleted, is encrypted using the new key to sending message, and use the new key It is decrypted to receiving message.
Based on same inventive concept, the embodiment of the present invention provides a kind of storage medium, is stored with for realizing bluetooth from group The program of the method for key updating in net when described program is run by processor, executes following steps:
When receiving the new key of network administration apparatus transmission, to network administration apparatus returning response message, and using old Key pair sends message and is encrypted, and is decrypted using the old key or the new key to receiving message;
When receiving the first notification message of the carrying new key mark that the network administration apparatus is sent, using described new Key pair sends message and is encrypted, and is decrypted using the old key or the new key to receiving message;
When receiving the second notification message for the carrying new key mark that the network administration apparatus is sent, delete described old Key is encrypted to sending message using the new key, and is decrypted using the new key to receiving message.
Based on same inventive concept, the embodiment of the present invention provides a kind of communication device, including one or more processors;With And one or more computer-readable mediums, instruction is stored on the readable medium, and described instruction is one or more of When processor executes so that described device executes the method described in above-mentioned one.
In conclusion in the embodiment of the present invention, each node of network administration apparatus sends new key, triggers each section Point, gradually from new key or old secret key decryption are encrypted and used using old key, is transitted to using Xinmi City according to three phases New key or old secret key decryption are encrypted and used to key, finally switches to and is encrypted and decrypted using new key, in such manner, it is possible to ensure The node of different disposal rate smoothly can use new key from using the old key to switch seamlessly to, and will not give and use Visual sense is caused at family, realizes the transparency of key updating process, to ensure that key updates in time, successfully.
On the other hand, in the case where certain nodes break down, network administration apparatus will not be influenced and notify each section Point starts key updating flow and being smoothed out for key updating flow therefore has been effectively ensured.
In this way, it is possible to prevente effectively from BLE Mash are promoted the safety of network communication by the Network Intrusion of illegal node, Ensure that the key updating process of each node does not influence the normal communication of network.
It should be understood by those skilled in the art that, the embodiment of the present invention can be provided as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention Apply the form of example.Moreover, the present invention can be used in one or more wherein include computer usable program code computer The computer program production implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of product.
The present invention be with reference to according to the method for the embodiment of the present invention, the flow of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that can be realized by computer program instructions every first-class in flowchart and/or the block diagram The combination of flow and/or box in journey and/or box and flowchart and/or the block diagram.These computer programs can be provided Instruct the processor of all-purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine so that the instruction executed by computer or the processor of other programmable data processing devices is generated for real The device for the function of being specified in present one flow of flow chart or one box of multiple flows and/or block diagram or multiple boxes.
These computer program instructions, which may also be stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that instruction generation stored in the computer readable memory includes referring to Enable the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one box of block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device so that count Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, in computer or The instruction executed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in a box or multiple boxes.
Although preferred embodiments of the present invention have been described, it is created once a person skilled in the art knows basic Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as It selects embodiment and falls into all change and modification of the scope of the invention.
Obviously, those skilled in the art can carry out the embodiment of the present invention various modification and variations without departing from this hair The spirit and scope of bright embodiment.In this way, if these modifications and variations of the embodiment of the present invention belong to the claims in the present invention And its within the scope of equivalent technologies, then the present invention is also intended to include these modifications and variations.

Claims (14)

1. the key updating method in a kind of bluetooth ad hoc network, which is characterized in that including:
Network administration apparatus sends new key to each node, triggers each node after receiving the new key, adopts Message is sent with old key pair to be encrypted, and is decrypted using the old key or the new key to receiving message;
After network administration apparatus determines that each node receives new key, is sent to each node and carry new key First notification message of mark is triggered each node and is encrypted using the new key to sending message, and used The old key or the new key are decrypted to receiving message;
Network administration apparatus determines that each node is all made of the new key to sending after message is encrypted, to described each A node sends the second notification message for carrying new key mark, triggers old key described in each knot removal, and use The new key is decrypted to receiving message.
2. the method as described in claim 1, which is characterized in that network administration apparatus sends new key to each node, into one Step includes:
Network administration apparatus determines the node administration list being locally located, and the network pipe is contained in the node administration list Reason device has permission the mark of each node of management;
Network administration apparatus determines the blacklist being locally located, and is contained in the blacklist and has determined that there are each of security risk The mark of a node;
Network administration apparatus will be located at the node of the blacklist positioned at the node administration list and not, be determined as current Lawful Node;
Network administration apparatus sends new key to each node.
3. method as claimed in claim 1 or 2, which is characterized in that network administration apparatus determines that each node receives To new key, including:
When network administration apparatus judges that each node returns the response message of characterization acquisition new key, determine described each A node receives new key;
Network administration apparatus determines that each node is all made of the new key and is encrypted to sending message, including:
Network administration apparatus sends status inquiry message respectively to each node, and according to the shape of each node feeding back State information determines that each node is all made of the new key and is encrypted to sending message.
4. method as claimed in claim 1 or 2, which is characterized in that network administration apparatus sends to each node and carries First notification message of new key mark, including:
Network administration apparatus uses broadcast mode, is sent to each node and carries new key mark and the first flag bit The first notification message of RefreshFlag=1;
Network administration apparatus sends the second notification message for carrying new key and identifying to each node, including:
Network administration apparatus uses broadcast mode, is sent to each node and carries key updating mark and the second flag bit The second notification message of RefreshFlag=0.
5. the key updating method in a kind of bluetooth ad hoc network, which is characterized in that including:
When node receives the new key of network administration apparatus transmission, to network administration apparatus returning response message, and using old Key pair sends message and is encrypted, and is decrypted using the old key or the new key to receiving message;
When node receives the first notification message of the carrying new key mark that the network administration apparatus is sent, using described new Key pair sends message and is encrypted, and is decrypted using the old key or the new key to receiving message;
When node receives the second notification message for the carrying new key mark that the network administration apparatus is sent, delete described old Key is encrypted to sending message using the new key, and is decrypted using the new key to receiving message.
6. the key update device in a kind of bluetooth ad hoc network, which is characterized in that including:
First processing units trigger each node and are receiving the new key for sending new key to each node Afterwards, it sends message using old key pair to be encrypted, and is carried out using the old key or the new key to receiving message Decryption;
Second processing unit sends to each node and carries after determining that each node receives new key First notification message of new key mark is triggered each node and is encrypted using the new key to sending message, with And it is decrypted using the old key or the new key to receiving message;
Third processing unit, for determining that each node is all made of the new key to sending after message is encrypted, to Each node sends the second notification message for carrying new key mark, triggers old key described in each knot removal, And it is decrypted using the new key to receiving message.
7. device as claimed in claim 6, which is characterized in that when sending new key to each node, first processing is single Member is further used for:
Determine the node administration list being locally located, containing the network administration apparatus in the node administration list has permission The mark of each node of management;
It determines the blacklist being locally located, the mark for having determined that each node there are security risk is contained in the blacklist Know;
The node of the blacklist will be located at positioned at the node administration list and not, is determined as the node of current Lawful;
New key is sent to each node.
8. device as claimed in claims 6 or 7, which is characterized in that when determining that each node receives new key, institute Second processing unit is stated to be used for:
When judging that each node returns the response message of characterization acquisition new key, determine that each node receives To new key;
Determine that each node is all made of the new key and is encrypted to sending message, the third processing unit is used for:
Status inquiry message is sent respectively to each node, and according to the status information of each node feeding back, is determined Each node is all made of the new key and is encrypted to sending message.
9. device as claimed in claims 6 or 7, which is characterized in that sent to each node and carry what new key identified When the first notification message, the second processing unit is used for:
Using broadcast mode, is sent to each node and carry new key mark and the first flag bit RefreshFlag=1 The first notification message;
The second notification message for carrying new key and identifying is sent to each node, the second processing unit is used for:
Using broadcast mode, is sent to each node and carry key updating mark and the second flag bit RefreshFlag =0 second notification message.
10. the key update device in a kind of bluetooth ad hoc network, which is characterized in that including:
First processing units, for receive network administration apparatus transmission new key when, to network administration apparatus returning response Message, and message is sent using old key pair and is encrypted, and using the old key or the new key to receiving message It is decrypted;
Second processing unit, the first notification message for receiving the carrying new key mark that the network administration apparatus is sent When, it is encrypted using the new key to sending message, and using the old key or the new key to receiving message It is decrypted;
Third processing unit, the second notification message for receiving the carrying new key mark that the network administration apparatus is sent When, the old key is deleted, is encrypted using the new key to sending message, and disappeared to reception using the new key Breath is decrypted.
11. a kind of storage medium, which is characterized in that be stored with the journey of the method for realizing the key updating in bluetooth ad hoc network Sequence when described program is run by processor, executes following steps:
New key is sent to each node, each node is triggered after receiving the new key, is sent out using old key pair It send message to be encrypted, and is decrypted using the old key or the new key to receiving message;
After determining that each node receives new key, carries the first of new key mark to each node transmission and lead to Know message, trigger each node and be encrypted using the new key to sending message, and using the old key or The new key is decrypted to receiving message;
It determines that each node is all made of the new key to sending after message is encrypted, is taken to each node transmission Second notification message with new key mark triggers old key described in each knot removal, and uses the new key pair Message is received to be decrypted.
12. a kind of communication device, which is characterized in that including one or more processors;And it is one or more computer-readable Medium is stored with instruction on the readable medium, when described instruction is executed by one or more of processors so that the dress It sets and executes method according to any one of claims 1 to 4.
13. a kind of storage medium, which is characterized in that be stored with the journey of the method for realizing the key updating in bluetooth ad hoc network Sequence when described program is run by processor, executes following steps:
When receiving the new key of network administration apparatus transmission, to network administration apparatus returning response message, and old key is used It is encrypted to sending message, and is decrypted using the old key or the new key to receiving message;
When receiving the first notification message of the carrying new key mark that the network administration apparatus is sent, using the new key It is encrypted to sending message, and is decrypted using the old key or the new key to receiving message;
When receiving the second notification message for the carrying new key mark that the network administration apparatus is sent, delete described old close Key is encrypted to sending message using the new key, and is decrypted using the new key to receiving message.
14. a kind of communication device, which is characterized in that including one or more processors;And it is one or more computer-readable Medium is stored with instruction on the readable medium, when described instruction is executed by one or more of processors so that the dress It sets and executes method as described in claim 5.
CN201810917773.4A 2018-08-13 2018-08-13 A kind of key updating method in bluetooth ad hoc network and device Pending CN108650676A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810917773.4A CN108650676A (en) 2018-08-13 2018-08-13 A kind of key updating method in bluetooth ad hoc network and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810917773.4A CN108650676A (en) 2018-08-13 2018-08-13 A kind of key updating method in bluetooth ad hoc network and device

Publications (1)

Publication Number Publication Date
CN108650676A true CN108650676A (en) 2018-10-12

Family

ID=63761048

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810917773.4A Pending CN108650676A (en) 2018-08-13 2018-08-13 A kind of key updating method in bluetooth ad hoc network and device

Country Status (1)

Country Link
CN (1) CN108650676A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110035396A (en) * 2019-04-15 2019-07-19 湖南科大天河通信股份有限公司 Bluetooth broadcast key updating method, apparatus and system
CN110460977A (en) * 2019-07-23 2019-11-15 厦门阳光恩耐照明有限公司 A kind of Intelligent illumination device based on bluetooth MESH matches network method
CN112423277A (en) * 2019-08-05 2021-02-26 意法半导体国际有限公司 Security certificate recovery in bluetooth mesh networks
CN113115283A (en) * 2021-03-05 2021-07-13 深圳市南方硅谷半导体有限公司 Communication method, device, equipment and storage medium based on Bluetooth mesh network
CN114124352A (en) * 2021-11-19 2022-03-01 浪潮云信息技术股份公司 Key rotation method, device and computer medium
CN114125823A (en) * 2020-08-25 2022-03-01 云米互联科技(广东)有限公司 Networking communication encryption method, server, household appliance, system and storage medium
CN114614985A (en) * 2022-05-12 2022-06-10 施维智能计量系统服务(长沙)有限公司 Communication key updating method, key server and readable storage medium
CN116866899A (en) * 2023-09-04 2023-10-10 北京理工大学 Multi-node wireless ad hoc network communication method and device, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1946019A (en) * 2005-10-04 2007-04-11 株式会社日立制作所 Network device, network system and method for updating a key
US20070253554A1 (en) * 2002-03-08 2007-11-01 Atheros Communications, Inc. Reykey Operation With Multiplexing Capability
CN102104870A (en) * 2009-12-21 2011-06-22 英特尔公司 Wireless device and method for rekeying with reduced packet loss for high-throughput wireless communications
CN103595529A (en) * 2012-08-13 2014-02-19 西安西电捷通无线网络通信股份有限公司 A switching method for a unidirectional secret key and a realization apparatus
CN107041171A (en) * 2016-11-25 2017-08-11 深圳市汇顶科技股份有限公司 Low-power consumption bluetooth BLE equipment, data update system and method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070253554A1 (en) * 2002-03-08 2007-11-01 Atheros Communications, Inc. Reykey Operation With Multiplexing Capability
CN1946019A (en) * 2005-10-04 2007-04-11 株式会社日立制作所 Network device, network system and method for updating a key
CN102104870A (en) * 2009-12-21 2011-06-22 英特尔公司 Wireless device and method for rekeying with reduced packet loss for high-throughput wireless communications
CN103595529A (en) * 2012-08-13 2014-02-19 西安西电捷通无线网络通信股份有限公司 A switching method for a unidirectional secret key and a realization apparatus
CN107041171A (en) * 2016-11-25 2017-08-11 深圳市汇顶科技股份有限公司 Low-power consumption bluetooth BLE equipment, data update system and method

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110035396A (en) * 2019-04-15 2019-07-19 湖南科大天河通信股份有限公司 Bluetooth broadcast key updating method, apparatus and system
CN110460977A (en) * 2019-07-23 2019-11-15 厦门阳光恩耐照明有限公司 A kind of Intelligent illumination device based on bluetooth MESH matches network method
CN112423277A (en) * 2019-08-05 2021-02-26 意法半导体国际有限公司 Security certificate recovery in bluetooth mesh networks
CN112423277B (en) * 2019-08-05 2024-03-26 意法半导体国际有限公司 Security certificate recovery in bluetooth mesh networks
CN114125823A (en) * 2020-08-25 2022-03-01 云米互联科技(广东)有限公司 Networking communication encryption method, server, household appliance, system and storage medium
CN114125823B (en) * 2020-08-25 2024-02-06 云米互联科技(广东)有限公司 Networking communication encryption method, server, household appliance, system and storage medium
CN113115283A (en) * 2021-03-05 2021-07-13 深圳市南方硅谷半导体有限公司 Communication method, device, equipment and storage medium based on Bluetooth mesh network
CN113115283B (en) * 2021-03-05 2023-03-03 深圳市南方硅谷半导体股份有限公司 Communication method, device, equipment and storage medium based on Bluetooth mesh network
CN114124352A (en) * 2021-11-19 2022-03-01 浪潮云信息技术股份公司 Key rotation method, device and computer medium
CN114614985A (en) * 2022-05-12 2022-06-10 施维智能计量系统服务(长沙)有限公司 Communication key updating method, key server and readable storage medium
CN116866899A (en) * 2023-09-04 2023-10-10 北京理工大学 Multi-node wireless ad hoc network communication method and device, electronic equipment and storage medium
CN116866899B (en) * 2023-09-04 2023-11-28 北京理工大学 Multi-node wireless ad hoc network communication method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN108650676A (en) A kind of key updating method in bluetooth ad hoc network and device
EP2510713B1 (en) Preservation of user data privacy in a network
US8122505B2 (en) Method and apparatus for detection of malicious behavior in mobile ad-hoc networks
CN109922469A (en) For supporting the method, apparatus and system of radio roaming
KR101018435B1 (en) Apparatus and method for security management of user terminal
CN109391648A (en) It is a kind of to apply correlating method, device and the communication system being sliced with network
CN106712932A (en) Secret key management method, device and system
CN107005569A (en) Peer-to-peer services layer certification
US10470003B2 (en) Method for regrouping multiple groups and device
US10567172B2 (en) Method for updating a key, and master transmission point
CN108347420A (en) A kind of method, relevant device and the system of netkey processing
CN103905433A (en) Distributed network firewall and forwarding system based on stream
CN113316131A (en) Connection establishing method and device, electronic equipment and storage medium
CN104335198B (en) Server, method and the terminal for preventing accessing resource are accessed for management terminal
CN107948339A (en) A kind of network addressing method, equipment and device
US20220272511A1 (en) Subscription data management method and apparatus
CN110167080A (en) The method and device that subscription information updates
CN105100268A (en) Security control method and system of Internet-of-things device as well as application server
CN110536254A (en) Cell switching method and device, storage medium, base station
CN110324415B (en) Method, device, equipment and medium for realizing routing of peer-to-peer network
CN104038566B (en) A kind of method of virtual swap device address learning, apparatus and system
US10334513B2 (en) Neighbor awareness network discovery
US11553336B2 (en) System and method for processing of private beacons in a mesh network
EP3190856A2 (en) Communications method, device, and system
US20120179902A1 (en) Network key update system, a server, a network key update method and a recording medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 266555 Qingdao economic and Technological Development Zone, Shandong, Hong Kong Road, No. 218

Applicant after: Hisense Video Technology Co., Ltd

Address before: 266100 Zhuzhou Road, Laoshan District, Shandong, No. 151, No.

Applicant before: HISENSE ELECTRIC Co.,Ltd.

CB02 Change of applicant information
RJ01 Rejection of invention patent application after publication

Application publication date: 20181012

RJ01 Rejection of invention patent application after publication