CN110266474A - Key sending method, apparatus and system - Google Patents

Key sending method, apparatus and system Download PDF

Info

Publication number
CN110266474A
CN110266474A CN201910403815.7A CN201910403815A CN110266474A CN 110266474 A CN110266474 A CN 110266474A CN 201910403815 A CN201910403815 A CN 201910403815A CN 110266474 A CN110266474 A CN 110266474A
Authority
CN
China
Prior art keywords
terminal
key
data
public key
smart card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910403815.7A
Other languages
Chinese (zh)
Inventor
徐斐
汤磊
谈科华
梁锦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yaxin Technology (chengdu) Co Ltd
Original Assignee
Yaxin Technology (chengdu) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yaxin Technology (chengdu) Co Ltd filed Critical Yaxin Technology (chengdu) Co Ltd
Priority to CN201910403815.7A priority Critical patent/CN110266474A/en
Publication of CN110266474A publication Critical patent/CN110266474A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Abstract

This application provides a kind of key sending methods, apparatus and system, are related to internet of things field, for preventing the other equipment except Internet of things system from obtaining the key of the Internet of things system, improve the safety and credibility of public key.This method comprises: first terminal encrypted public key and verifying mark, obtain the first data;Wherein, verifying mark is for determining whether first terminal is legal terminal, and public key is for decrypting encryption data;First terminal sends the first data to second terminal by the bluetooth connection between first terminal and second terminal.It can be improved the safety of exchange of public keys process.

Description

Key sending method, apparatus and system
Technical field
This application involves internet of things field more particularly to a kind of key sending methods, apparatus and system.
Background technique
In current Internet of things system (the especially Internet of things system of personal use, for example, smart home etc.), in order to Guarantee between first terminal (controlling terminal in Internet of things system) and second terminal (internet-of-things terminal in Internet of things system) The safety of data communication, and guarantee that the information that second terminal receives is from first terminal.It would generally be generated by key Platform is that Internet of things system distributes a public key and a private key.Public key is issued second eventually by network by key generating platform End, issues first terminal for private key.First terminal sends the data according to private key encryption to second terminal, and second terminal, which receives, to be added Close data simultaneously decrypt it using public key to obtain the data.
But during first terminal of the key generating platform into Internet of things system and second terminal send key, The key is possible to be obtained by other equipment, and other equipment can be solved by the information in the key pair internet of things equipment It is close, cause information leakage.The other equipment can also be encrypted using the data key simultaneously, and disguise oneself as first terminal pair Second terminal is controlled.
Summary of the invention
The embodiment of the present application provides a kind of key sending method, apparatus and system, for preventing except Internet of things system Other equipment obtain the key of the Internet of things system, improve the safety and credibility of public key.
In order to achieve the above objectives, the application adopts the following technical scheme that
In a first aspect, the embodiment of the present application provides a kind of key sending method, this method comprises: first terminal encryption is public Key and verifying mark, obtain the first data;Wherein, verifying mark for determining whether first terminal is legal terminal, use by public key In decryption encryption data;First terminal sends first to second terminal by the bluetooth connection between first terminal and second terminal Data.
The embodiment of the present application provides a kind of key sending method, and first terminal encrypted public key and verifying mark obtain first Data, by strengthening public key and verifying the safety during identification transmission to key and verifying mark encryption, by the Two terminals send verifying mark, and second terminal is made to identify the legitimacy for determining first terminal according to verifying.First terminal passes through the Bluetooth connection between one terminal and second terminal sends the first data to second terminal, and first terminal and second terminal pass through line Under bluetooth connection exchange public key, improve the safety in public key transmission process.
Second aspect, the embodiment of the present application provide a kind of key sending method, this method comprises: second terminal receives the The first data that one terminal is sent by the bluetooth connection between second terminal and first terminal;Second terminal decrypts the first data Public key and verifying mark are obtained, verifying mark is for determining whether first terminal is legal terminal;Second terminal is marked according to verifying Know and determine that first terminal is legal terminal, public key is stored in the second smart card by second terminal.
The embodiment of the present application provides a kind of key sending method, second terminal receive first terminal by second terminal and The first data that bluetooth connection between first terminal is sent.By using the bluetooth connection mode under line in Internet of things system Exchange of public keys is carried out between equipment, makes the exchange of public key from network attack.Improve the safety of exchange of public keys.Second terminal It decrypts the first data and obtains public key and verifying mark.Second terminal is identified according to verifying determines that first terminal is legal terminal, the Public key is stored in the second smart card by two terminals.Second terminal first verifies the legitimacy of first terminal, in determination When first terminal after legal terminal, the public key of first terminal transmission is saved in the second smart card.Ensure that second terminal is protected The public key deposited is that legal terminal is sent.Ensure the credibility of the public key.
The third aspect, the embodiment of the present application provide a kind of key sending device, which includes: processing unit, are used for Encrypted public key and verifying mark, obtain the first data;Wherein, verifying is identified for determining whether first terminal is legal terminal, Public key is for decrypting encryption data;Transmission unit, for passing through the bluetooth connection between first terminal and second terminal to second Terminal sends the first data.
Fourth aspect, the embodiment of the present application provide a kind of key sending device, which includes: receiving unit, are used for Receive the first data that first terminal is sent by the bluetooth connection between second terminal and first terminal;Processing unit is used for It decrypts the first data and obtains public key and verifying mark, verifying mark is for determining whether first terminal is legal terminal;Processing is single Member, being also used to identify determining first terminal according to verifying is legal terminal, and public key is stored in the second smart card by second terminal.
5th aspect, the embodiment of the present application provide a kind of key transmission system, which includes: first terminal and second Terminal, first terminal and second terminal bluetooth connection;Wherein, first terminal is used to execute above-mentioned first aspect and first aspect Key sending method described in any possible implementation;Second terminal is for executing above-mentioned first aspect and the Key sending method described in any possible implementation of one side.
6th aspect, the embodiment of the present application provide a kind of key sending device, which includes: that processor and communication connect Mouthful;Communication interface and processor coupling, processor is for running computer program or instruction, to realize such as first aspect and first Key sending method described in any possible implementation of aspect.
7th aspect, the embodiment of the present application provide a kind of key sending device, which includes: that processor and communication connect Mouthful;Communication interface and processor coupling, processor is for running computer program or instruction, to realize such as second aspect and second Key sending method described in any possible implementation of aspect.
Eighth aspect, the embodiment of the present application provide a kind of computer readable storage medium, computer readable storage medium In be stored with instruction, when instruction run on first terminal when so that first terminal execute such as first aspect and first aspect Key sending method described in any possible implementation.
9th aspect, the embodiment of the present application provide a kind of computer readable storage medium, computer readable storage medium In be stored with instruction, when instruction run in second terminal when so that second terminal execute such as second aspect and second aspect Key sending method described in any possible implementation.
Tenth aspect, the embodiment of the present application provide a kind of computer program product comprising instruction, when computer program produces Product on key sending device when running, so that key sending device executes any possibility such as first aspect and first aspect Implementation described in key sending method.
Tenth on the one hand, and the embodiment of the present application provides a kind of computer program product comprising instruction, works as computer program For product when running on key sending device, so that key sending device executes such as, second aspect and any of second aspect can Key sending method described in the implementation of energy.
Tenth on the one hand, and the embodiment of the present application provides a kind of chip, and chip includes processor and communication interface, communication interface It is coupled with processor, processor is for running computer program or instruction, to realize any such as first aspect and first aspect Key sending method described in the possible implementation of kind.
12nd aspect, the embodiment of the present application provide a kind of chip, and chip includes processor and communication interface, communication interface It is coupled with processor, processor is for running computer program or instruction, to realize any such as second aspect and second aspect Key sending method described in the possible implementation of kind.
Specifically, the chip provided in the embodiment of the present application further includes memory, for storing computer program or instruction.
Detailed description of the invention
Fig. 1 is a kind of system architecture diagram of Internet of things system provided by the embodiments of the present application;
Fig. 2 is the system architecture diagram of another Internet of things system provided by the embodiments of the present application;
Fig. 3 is a kind of flow diagram one of key sending method provided by the embodiments of the present application;
Fig. 4 is a kind of flow diagram two of key sending method provided by the embodiments of the present application;
Fig. 5 is a kind of flow diagram three of key sending method provided by the embodiments of the present application;
Fig. 6 is a kind of flow diagram four of key sending method provided by the embodiments of the present application;
Fig. 7 is a kind of structural schematic diagram one of key sending device provided by the embodiments of the present application;
Fig. 8 is a kind of structural schematic diagram two of key sending device provided by the embodiments of the present application;
Fig. 9 is a kind of structural schematic diagram three of key sending device provided by the embodiments of the present application;
Figure 10 is a kind of structural schematic diagram four of key sending device provided by the embodiments of the present application.
Specific embodiment
Key sending method provided by the present application, apparatus and system are described in detail below in conjunction with attached drawing.
Term " first " and " second " in the description of the present application and attached drawing etc. be for distinguishing different objects, and It is not intended to the particular order of description object.
In addition, the term " includes " being previously mentioned in the description of the present application and " having " and their any deformation, it is intended that It is to cover and non-exclusive includes.Such as the process, method, system, product or equipment for containing a series of steps or units do not have It is defined in listed step or unit, but optionally further comprising the step of other are not listed or unit, or optionally It further include other step or units intrinsic for these process, methods, product or equipment.
It should be noted that in the embodiment of the present application, " illustrative " or " such as " etc. words make example, example for indicating Card or explanation.Be described as in the embodiment of the present application " illustrative " or " such as " any embodiment or design scheme do not answer It is interpreted than other embodiments or design scheme more preferably or more advantage.Specifically, " illustrative " or " example are used Such as " word is intended to that related notion is presented in specific ways.
In the description of the present application, unless otherwise indicated, the meaning of " plurality " is refer to two or more.
Before introducing the embodiment of the present application, first to the invention relates to related terms do description below:
Internet of Things (Internet of things, IoT): the internet being made of object.Internet of Things is also known as Sensor Network, object Networking further extends internet from people to object, contains.Internet of Things by various information sensing devices, as rfid device, (equipment is set various devices such as infrared inductor, global positioning system, laser scanner and automobile, unmanned plane, smart machine Apply) combine with internet and a huge network being formed.The purpose is to allow all objects all with network connection one It rises, facilitates identification and management.
Public key cryptography: public key cryptography technology is used to solve the problems, such as two most scabrous in single key cryptosystem: key point Match and digital signature;In public-key cryptosystem, each user possesses a pair of secret keys: private key and public key, wherein private key is by user The problem of secret saves, and public key can publish, and is used by other people, does not have to concern about disclosure.Most notable also most popular public affairs Key cryptographic algorithm, which has, decomposes Peter Lonard Lee Vista of problem, A Di Shamir, Leonard A Deman based on big number It is (Ron Rivest, Adi Shamir, Leonard Adleman, RSA) and oval bent based on Elliptic Curve Discrete Logarithm problem Line encrypts (elliptic curve cryptography, ECC), both algorithms can be used for the decryption of public key encryption/private key and Private key signature/public key sign test;The close commercial cipher of state (shang mi, SM) 2 algorithms of our countries are also a kind of based on ECC differentiation The public key algorithm to come over.
Safety chip: safety chip, which refers to, realizes one or more cryptographic algorithms, directly or indirectly uses password skill Art protects the IC chip of key and sensitive information, and safety chip generally has independent central processing unit (central Processing unit, CPU), memory and storage unit, may be implemented to execute with intelligent terminal operation system, application software The physical isolation of environment, therefore safety with higher can resist the attack of hacker, realize the cores such as clean boot, storage The security function of the heart protects userspersonal information and applies data safety.Currently, safety chip is also with safe unit (secure Element, SE) form be embedded in all kinds of smart cards and intelligent terminal, further increase the safety of smart card and terminal.Peace In full chip public key and private key can be directly generated within a smart card with built-in key algorithm.
7816 agreements: the communications protocol between contact intelligent card and read-write equipment, that is, data bit transmission are defined Format, be similar to proposed standard (recommended standard, RS) 232, be only more suitable for low power-consumption intelligent card, silver Line integrated circuit (integrated circuit, IC) card, mobile phone user's identification card (subscriber Identification module, SIM) card etc. be all to be communicated by 7816 interfaces with reader device.Our mobile phone is whole End is communicated between SIM and by 7816.
Low-power consumption bluetooth (bluetooth low energy, BLE): be a kind of low cost, short distance, interoperable nothing Line transmission technology, work exempt from license 2.4GHz industrial scientific medical (Industrial Scientific Medical, ISM) radio frequency band, BLE have arrived BLE 5.0 from 4.0 starting development at present.It is designed as super low-power consumption from the beginning (ultra low power, ULP) wireless technology, uses variable Connection Time interval, this interval can be with according to concrete application Several milliseconds to several seconds are set as to differ.In addition, can usually locate because BLE technology uses very quick connection type In " disconnected " state (saving the energy), both link ends only know other side each other at this time, only just open chain if necessary Then link is closed on road in the shortest possible time.
In internet, a large amount of data can be all transmitted all the time.The safety for ensuring the transmission of these data is interconnection The most important thing of net.Public key cryptography technology is widely used in interconnection because of its powerful security performance.But in public-key technology Application process in find, although using the data safety with higher of public key encryption, the public affairs issued in a network It is attacked during the confidence level of key distribution platform is lower or public key is issued in a network by other equipment, then receiving the public affairs The equipment of key will be unable to the authenticity of confirmation public key after receiving public key.Receive the equipment utilization vacation public key encryption of the public key Data are transmitted, and above-mentioned other equipment can solve data using the private key corresponding with false public key of oneself storage It is close.Cause the security incidents such as information leakage.
It is for the public key cryptography technology that uses of safety, public key is associated with the identity information of user, and enable public key Its distribution platform is verified by user, confirm its credibility, occur certification authority (certificate authority, CA mechanism, trusted third party as).CA confirms the public key information of other public key publication platforms publication by certificate, has on certificate The signature of CA.If user results in loss because of trusted certificate, certificate can be used as effective evidence for investigating CA's Legal liabilities.There are Public Key Infrastructure (public key infrastructure, PKI) (i.e. public key publication platform) and CA total PKI/CA digital certificate system with composition can provide believable public key for user.But the Certification system of PKI/CA is more It is complicated.Therefore, and in succession occur public-key cryptosystem (identity based cryptograph, IBC) based on mark, From card public-key cryptosystem and without CertPubKey cipher system etc..
IBC is a kind of public key cryptography technology based on mark, that is, the public key of user is by relevant to user identity Bit String is constituted.Public key in IBC can pass through identity information (such as identity (Identity, ID) number, email address of user Or cell-phone number etc.) directly calculate and obtain, the private key of user is then generated by the authoritative institution that trusts.This system eliminate to The dependence of family certificate simplifies the management process of key, and the close SM9 standard description of our states is exactly a kind of public key based on mark Password.This private key is not uniquely controlled by user, and the mode that public key also determines that after ID is determined is in the presence of the limitation used 's.
Digital certificate is not all used from card public-key cryptosystem and without two kinds of public-key cryptosystems of CertPubKey cipher system. The private key of user is generated jointly by trusted party and user, and client public key has from card property, has both reduced PKI/CA public key cryptography Certificate management problem in system, and the key escrow in IBC public-key cryptosystem is eliminated, user key can cancel And replacement, the operational efficiency of system is improved, the complexity of system is reduced.From card public-key cryptosystem and without CertPubKey it is close Code system is between PKI/CA public-key cryptosystem and IBC public-key cryptosystem, the advantages of both having concurrently, but since key is It binds two parts, however it remains a possibility that attack.As long as key is needed to circulate in network environment, even It is only to circulate once, it is also inevitably under attack.
Since PKI/CA digital certificate system is not suitable for applying in Internet of things system.It is generally adopted in current Internet of things system It is IBC or without CertPubKey cryptographic technique.These technologies are suitably applied in the Internet of things system of large enterprise.For a The Internet of things system that people uses, since the public key of the Internet of things system of personal use needs special key generating platform to generate, And Internet of things system is sent to by network connection.If these key generating platforms can all be led with breaking through or starting a leak Public key is caused to be leaked, the instruction for causing Internet of things system to be subject to is not from the instruction of real user's publication.And individually Key generating platform higher cost, process is also complex, poor universality.
Public Key Crypto Scheme (certificate less authentication system, CLA) is demonstrate,proved certainly with no certificate For, the scheme for producing public key and private key is specific as follows:
Firstly, establishing one has dedicated CLA system:
CLA system generates system private key s1, s2 and system public key Ppub1, Ppub2.
CLA system discloses system public key Ppub1, Ppub2.
CLA system discloses a public key generating function f (x, y, z1, z2).
Then it is exactly the process that terminal generates key:
Terminal generates a pair of interim SM2 public private key pair (P1, d1) at random.Send public key P1 and terminal account number A to CLA (or Person sends user identifier to CLA, generates user account number A by CLA).
CLA executes following calculate:
It is random to generate a pair of of public private key pair (R, r), calculate P=P1+R.
It calculates d2=r+f (A, P, s1, s2) (mod n).
Q=P+f (A, P, Ppub1, Ppub2).
D2, P, Q and A are sent to terminal.
Terminal calculates d=d1+d2 (mod n), then d is exactly the practical private key of terminal, and Q is the actual public key of terminal, and P is eventually The part public key at end, A are the account numbers of terminal.
From above-mentioned process it is recognised that using CLA scheme, there is following hidden danger:
It needs to establish a set of platform, needs preset system public key and algorithmic function in terminal or smart card, the construction of platform Cost is required with operation, and the preset channel for being also required for a safety of system public key.Above-mentioned preset system public key and Algorithmic function is likely to because platform is attacked or interior ghost occurs and preset system public key and algorithmic function is caused to be replaced. To make the safety of the key generated be unable to get guarantee.
When terminal application key, if the channel of terminal end to CLA platform is unsafe, it is possible to serve Data be replaced in fact, that is, a possibility that cannot eliminate by man-in-the-middle attack.
Key sending method provided by the embodiments of the present application can be applied in Internet of things system as shown in Figure 1.Such as figure Shown in 1, which includes: first terminal 101 and second terminal 102, and first terminal 101 and second terminal 102 communicate Connection.
Wherein, first terminal 101 sends data or instruction to second terminal 102, to realize the data with second terminal 102 Interaction.It is instructed alternatively, first terminal 101 is sent to second terminal 102, to realize the control to second terminal 102.
Second terminal 102 receives the data from first terminal 101.Alternatively, second terminal 102, which receives, comes from first terminal 101 instructions, and corresponding data are returned according to the corresponding movement of the instruction execution or to first terminal 101.
Illustratively, using the Internet of things system as smart home system, which is mobile phone, the second terminal 102 is for air-conditionings.Mobile phone sends temperature adjustment instructions to air-conditioning, and air-conditioning receives after the temperature adjustment instructions from mobile phone Temperature adjusting is carried out according to the regulating command.
Illustratively, using the Internet of things system as smart home system, first terminal 101 is mobile phone, and second terminal is to take the photograph As for head.Mobile phone sends picture acquisition instruction to camera, after camera receives the picture acquisition instruction of mobile phone transmission, It acquires picture and collected picture is sent into a mobile phone.
In conjunction with Fig. 1, as shown in Fig. 2, the Internet of things system can also include third-party platform 103.First terminal 101, Connection is communicated with each other between two terminals 102 and third-party platform 103.
First terminal 101 and second terminal 102 complete registration in third-party platform 103, and establish first terminal 101 Mapping relations between second terminal 102.When first terminal 101 needs to send data to second terminal 102, first terminal 101 can send data to third-party platform 103 first.Third-party platform determines the second terminal 102 for needing to forward, and will The data are sent to second terminal 102.
Illustratively, which can be implemented as third-party network cloud platform etc..
Illustratively, when first terminal 101 and closer 102 position of second terminal, first terminal 101 and second terminal Bluetooth communication can be passed through between 102.When first terminal 101 and second terminal 102 are in the same Wireless Fidelity (wireless Fidelity, WiFi) in network when, first terminal 101 and second terminal 102 can be communicated by the WiFi network.When First terminal 101 and 102 position of second terminal are apart from each other, and when being not in the same WiFi network, 101 He of first terminal Second terminal 102 is communicated by third-party platform 103.
The embodiment of the present application provides a kind of key sending method, applied to Internet of things system as shown in Figure 1 or 2 In.For carrying out key exchange between the first terminal and second terminal of Internet of things system.As shown in figure 3, this method comprises:
Step 101, first terminal encrypted public key and verifying mark, obtain the first data.
Wherein, there is the first smart card in first terminal.First smart card is matched with the second smart card in second terminal, There is public key in first smart card.Verifying mark is for determining whether first terminal is legal terminal, and public key is for decrypting encryption Data.
A kind of example, verifying mark can be following any or a variety of combination: smartcard identification, terminal mark Know, card feature string.The card feature string is the identical random string that writer is written in the first smart card and the second smart card.
In a kind of specific implementation of step 101, in smart card (for example, the first smart card and second smart card) also With safety chip.There is key algorithm in the safety chip.The safety chip can obtain a pair of right according to the key algorithm The public key and private key of title.Safety chip saves the private key.Or safety chip sends the public key and private key to smart card.Smart card Save the private key.
In a kind of specific implementation of step 101, the smart card that the application mentions is user identity identification (subscriber identification module, SIM) card.There is the first SIM card in first terminal, have in second terminal There is the second SIM card.For the SIM card of the same Internet of things system during SIM card is matched, writer is in the first smart card and Identical symmetric key and card feature string are written in two smart cards.It is different from the public key and private that safety chip generates in smart card Key, the symmetric key are used to add public key and verifying mark when first terminal sends public key and verify mark to second terminal It is close, obtain the first data.
Illustratively, first terminal can realize network connecting function by first SIM card, and second terminal can pass through Second SIM card realizes network connecting function.First terminal and second terminal can also realize network connection by other means Function, for example, realizing network connecting function by WiFi, the application is not limited this.
In a kind of implementation of step 101, legal identification sets are stored in smart card.Include in the legal identification sets with Under any or a variety of combination: with the smart card complete matched smart card card mark, with terminal described in the smart card Complete the terminal iidentification and card feature string of matched terminal.
In a kind of implementation of step 101, first terminal obtains public key from the first smart card, and obtains verifying mark Know.Encrypted public key and verifying mark, obtain the first data.
In a kind of implementation of step 101, writer can also be by advance in the first smart card and the second intelligence Block and elliptic curve cryptosystem (elliptic curves diffie is written in (or first terminal and second terminal) Hellman, ECDH).Before first terminal sends the first data to second terminal.First terminal is handed over second terminal first Mutually, symmetric key is generated by ECDH.First terminal obtains the first data by the symmetric key encryption public key and verifying mark. Second terminal obtains public key and verifying mark by first data of symmetric key decryption.First terminal and second terminal may be used also By obtaining symmetric key in a manner of any other.The application does not limit this.
Step 102, first terminal send the to second terminal by bluetooth connection between first terminal and second terminal One data.
In a kind of implementation of step 102, which is that first terminal receives to second terminal and sends the After the instruction of one data, the bluetooth connection established between first terminal and second terminal.
Illustratively, using the first terminal as mobile phone, smart card is SIM card, second terminal be object vehicle (such as with The automobile of intelligent people-car interaction system) for, step 102 is specifically described:
After being installed SIM card in mobile phone, SIM card is initialized (including personal identification number (personal Identification number, PIN) initialization).The mobile phone that promising progress key sends exploitation is installed in advance in mobile phone Application program (Application, APP).After APP, which is detected, sends the instruction of the first data to object vehicle, APP is opened The Bluetooth function of mobile phone, and carry out bluetooth discovery and (limited since bluetooth connection has distance, mobile phone is needed in close to mesh at this time Mark the position of automobile).Handset-selected object vehicle matched (such as after mobile phone searching to the neighbouring equipment for opening bluetooth, Selection represents the bluetooth title of object vehicle, matches with object vehicle.Or mobile phone direct search indicates the bluetooth of object vehicle Title is matched after the bluetooth title for searching object vehicle with object vehicle).After pairing is completed, mobile phone and target Bluetooth connection is established between automobile, the first data can be sent by the bluetooth connection between mobile phone and object vehicle.In mobile phone Encrypted public key and verifying mark, after obtaining the first data, mobile phone passes through the bluetooth connection between mobile phone and object vehicle to mesh It marks automobile and sends the first data.
Step 103, second terminal receive first terminal and are sent by the bluetooth connection between second terminal and first terminal The first data.
Step 104, second terminal decrypt the first data and obtain public key and verifying mark.
Wherein, verifying mark is for determining whether first terminal is legal terminal.
In a kind of implementation of step 104, writer be written into the first smart card and the second smart card it is identical (or Symmetric key accordingly).First terminal is identified according to the symmetric key encryption public key and verifying, obtains the first data.Second eventually End obtains public key according to first data of symmetric key decryption and verifying identifies.
In one possible implementation, second terminal obtained from the second smart card writer write snap past journey write-in To the symmetric key of (or corresponding) identical in the first smart card.Second terminal is obtained according to first data of symmetric key decryption Public key and verifying mark.
In alternatively possible implementation, after second terminal receives the first data, into second terminal Two smart cards send the first data.Second smart card receive be invoked at after first data write card during writer write-in To the symmetric key of (or corresponding) identical in the first smart card, decrypt first data obtain public key and verifying mark.
Step 105, second terminal are identified according to verifying determines that first terminal is legal terminal, and second terminal stores public key In the second smart card.
Although should be understood that verifying mark may be matched there are many building form in first terminal and second terminal It is had determined in verifying mark before (or during writer is to the first smart card and the second writing smart card) Content.The content in verifying mark sent between first terminal and second terminal is in the above-mentioned verifying mark determined Content.Such as: the verifying is identified as the combination of card feature string and the first smartcard identification, then writer to the first smart card and Identical card feature string is written when second writing smart card and respectively the first smart card and the write-in of the second smart card are legal Identification sets.After second terminal determines verifying mark, judge to verify the smartcard identification in mark in above-mentioned legal identification sets, Then indicate that the terminal for sending the first data is legal terminal.
Second terminal determines that the card feature string in verifying mark is legal according to the legal identification sets in the second smart card Card feature string, the verifying mark in the first smartcard identification be the first legal smartcard identification.Then second terminal determines First terminal is legal terminal.Public key is stored in the second smart card by second terminal.
The embodiment of the present application provides a kind of key sending method, and first terminal encrypted public key and verifying mark obtain first Data, by strengthening public key and verifying the safety during identification transmission to key and verifying mark encryption, by the Two terminals send verifying mark, and second terminal is made to identify the legitimacy for determining first terminal according to verifying.First terminal passes through the Bluetooth connection between one terminal and second terminal sends the first data to second terminal, and first terminal and second terminal pass through line Under bluetooth connection exchange public key, improve the safety in public key transmission process.Second terminal receives first terminal by the The first data that bluetooth connection between two terminals and first terminal is sent.Second terminal decrypts the first data and obtains public key and test Card mark.Second terminal is identified according to verifying determines that first terminal is legal terminal, and public key is stored in the second intelligence by second terminal In capable of blocking.Second terminal first verifies the legitimacy of first terminal, when determining first terminal after legal terminal, protects The public key of first terminal transmission is deposited in the second smart card.Ensure that the public key that second terminal saves is that legal terminal is sent. Ensure the credibility of the public key.
In a kind of implementation of the embodiment of the present application, public key is stored in it in the second smart card in second terminal Afterwards, second terminal sends the first data receiver success message to first terminal.The bluetooth function of second terminal disabling and first terminal Can, to reduce the power consumption of second terminal.
In a kind of implementation of the embodiment of the present application, public key is stored in it in the second smart card in second terminal Afterwards, second terminal sends the first data receiver success message to first terminal.The Bluetooth function of second terminal disabling second terminal. It can guarantee the uniqueness of the terminal controlled second terminal.Other terminals cannot send public key to second terminal, Also control to second terminal and/or cannot carry out data transmission with second terminal.
In a kind of implementation of the embodiment of the present application, public key is stored in the second smart card and in second terminal After two terminals disable bluetooth connection, if third terminal (terminal other than first terminal and second terminal) is needed to second terminal Data are sent, then third terminal requests authentication firstly the need of to first terminal.First terminal is to third terminal authentication After success, third terminal obtains private key from first terminal.Data are sent to second terminal using the private key.Or first eventually After end is to the success of third terminal authentication, first terminal instruction second terminal reactivates Bluetooth function and makes second terminal Above-mentioned steps 101-105 is executed between third terminal.Make to store what third terminal generated in the second smart card of second terminal Public key.Second terminal and third terminal are according to public key progress data encryption.
In a kind of implementation of the embodiment of the present application, in conjunction with Fig. 3, as shown in figure 4, after step 105, this method Further include:
Step 106, first terminal obtain encryption data according to private key encryption target data.
Wherein, private key can be generated by the safety chip in first terminal in the first smart card, the private key and above-mentioned first Terminal is a pair of of symmetric key by the public key that bluetooth connection is sent to second terminal.Private key is stored in first terminal.When When one terminal needs to send target data to second terminal, first terminal uses the private key encryption target data, obtains encryption number According to.
Optionally, which is stored in first terminal in the safety chip of the first smart card.
Step 107, first terminal send encryption data to second terminal.
It should be understood that first terminal can be any by bluetooth connection, network connection etc. to second terminal transmission encryption data Communication connection mode is sent.The application does not limit this.
Illustratively, the step is described in detail so that first terminal is mobile phone, second terminal is air-conditioning as an example.
Mobile phone and air-conditioning are attached by third-party platform, which is used for transmission between mobile phone and air-conditioning Communication data.
Since mobile phone needs to send data to air-conditioning by the third-party platform.In order to avoid third-party platform or network In other equipment get the data information between mobile phone and air-conditioning, mobile phone encrypts target data, obtain encryption number According to.After mobile phone encrypts target data, encryption data is sent to third-party platform.Third-party platform is received from mobile phone Encryption data.Inquiry needs the air-conditioning forwarded, sends the encryption data to air-conditioning.
Step 108, second terminal obtain target data according to public key decryptions encryption data.
After second terminal receives the encryption data from first terminal.It needs that encryption data is decrypted to obtain target Data.Second terminal is stored in the public key in the second smart card from acquisition in the second smart card in above-mentioned steps 105.Second eventually End obtains target data according to the public key decryptions encryption data.
It illustratively, is air-conditioning using first terminal as mobile phone, second terminal, encryption data is to open air-conditioning and set temperature The step is described in detail for being set to 26 DEG C.
Air-conditioning receives mobile phone and opens air-conditioning by what third-party platform was sent and be 26 DEG C of number of targets by temperature setting According to later, air-conditioning obtains the public key of the second smart cards for storage from the second smart card.Air-conditioning according to the public key decryptions encryption data, Obtain target data.Air-conditioning identifies the target data, opens and is 26 DEG C of start-up operations by temperature setting.
In conjunction with Fig. 3, as shown in figure 5, after step 103, this method further include:
Step 109, second terminal decrypt the first data, the failed decryption number of second terminal record not successfully.
It should be understood that in order to avoid illegal terminal and second terminal carry out malice pairing.If second terminal receives the first number According to later, fail normally to decrypt the first data using the symmetric key, then second terminal thinks to be likely to be illegal end End is that second terminal carries out malice pairing, at this time the failed decryption number of second terminal record.
Illustratively, second terminal is primary per the first data of failed decryption, then the failed decryption number of record adds 1.
Step 110, when not successfully decryption number be greater than or equal to first threshold when, second terminal disable second terminal indigo plant Tooth function.
Illustratively, which is 10.Namely when the number that second terminal decrypts the first data not successfully reaches 10 After secondary, second terminal disables the Bluetooth function of second terminal, prevents illegal terminal from establishing connection with second terminal and further controls Make the second terminal.
In a kind of implementation of step 110, after second terminal disables the Bluetooth function of second terminal, second terminal Bluetooth function can just be reactivated later by needing to meet preset condition.Such as second terminal needs are online lower by root key weight It is new to enable or need to be reactivated by professional with permission.
In a kind of implementation of step 110, second terminal disables the Bluetooth function of the second terminal of preset time period. Within the preset time period, the Bluetooth function of second terminal is unavailable.Second terminal opens again except the preset time period Use Bluetooth function.The problem that Bluetooth function unlocks trouble later can be disabled to avoid the second terminal as caused by maloperation.
In conjunction with Fig. 3, as shown in fig. 6, after step 104, this method further include:
Step 111, second terminal are identified according to verifying determines that first terminal is illegal terminal.
Specifically, legal verifying is identified write-in by writer when writer carries out writing card to the second smart card Into the second smart card.Second terminal identifies that the verifying in the first data identifies whether the legal verifying being previously written for writer Mark.If the verifying mark in the first data is not the legal verifying mark that writer is previously written, second terminal determines the One terminal is illegal terminal.
Illustratively, step 111 is carried out in detail so that legal verifying is identified as card feature string and the first smartcard identification as an example It describes in detail bright:
When writer is to the first smart card and the second writing smart card.Phase is written for the first smart card and the second smart card With the card feature string of (or corresponding).Legal smartcard identification namely the first smart card is written in writer in the second smart card Mark.Legal smartcard identification namely the second smartcard identification is written in first intelligent card type by writer.
Second terminal judges the card feature string and second in verifying mark after decrypting the first data and being verified mark Whether the card feature string being written into smart card identical (or corresponding), then judge verifying identify in smartcard identification whether be Legal mark in above-mentioned legal logo collection.As the Ka Te being written into the card feature string and the second smart card in verifying mark Sign string is identical (or corresponding), and verifying the smartcard identification in mark is the legal mark in above-mentioned legal logo collection.Second Terminal determines that first terminal is legal terminal.Other any case, second terminal determine that first terminal is illegal terminal.
Step 112, when second terminal determine illegal terminal access number be greater than or equal to second threshold when, second terminal Disable the Bluetooth function of second terminal.
The implementation of the step is similar to step 110.It is not repeating herein.
In a kind of implementation of the embodiment of the present application, the first data are encrypted with above-mentioned symmetric key, It include public key and verifying mark in first data.And the legal mark Shi Caihui that verifying is identified as in above-mentioned legal logo collection recognizes It is legal terminal for first terminal.If the first data are unsatisfactory for above-mentioned condition, then it is assumed that first terminal is illegal terminal.
The embodiment of the present application can carry out functional module or function list to key sending device according to above method example The division of member, for example, each functional module of each function division or functional unit can be corresponded to, it can also be by two or two Above function is integrated in a processing module.Above-mentioned integrated module both can take the form of hardware realization, can also be with It is realized in the form of software function module or functional unit.Wherein, module or unit are drawn in the embodiment of the present application It is schematical for dividing, and only a kind of logical function partition, there may be another division manner in actual implementation.
As shown in fig. 7, this application provides a kind of key sending devices, the first terminal applied to above-mentioned Internet of things system In, there is the first smart card, first smart card is matched with the second smart card in second terminal, institute in the first terminal Stating has public key in the first smart card, described device includes:
Processing unit 701 obtains the first data for encrypting the public key and verifying mark;Wherein, the verifying mark For determining whether the first terminal is legal terminal, the public key is for decrypting encryption data.
Transmission unit 702, for whole to described second by the bluetooth connection between the first terminal and second terminal End sends first data.
Optionally, also there is private key in first smart card.The device further include:
Processing unit 701 is also used to obtain the encryption data according to the private key encryption target data.
Transmission unit 702 is also used to send the encryption data to the second terminal.
As shown in figure 8, this application provides a kind of key sending devices, the second terminal applied to above-mentioned Internet of things system In, there is the second smart card, second smart card is matched with the first smart card in first terminal in the second terminal.Institute Stating device includes:
Receiving unit 801 passes through between the second terminal and the first terminal for receiving the first terminal The first data that bluetooth connection is sent.
Processing unit 802 obtains public key and verifying mark for decrypting first data, and the verifying mark is for true Whether the fixed first terminal is legal terminal.
The processing unit 802, being also used to identify the determining first terminal according to the verifying is legal terminal, described The public key is stored in second smart card by second terminal.
Optionally, described device further include:
The processing unit 802 is also used to decrypt first data not successfully, then the failed decryption number of record.
The processing unit 802 is also used to disable institute when the failed decryption number is greater than or equal to first threshold State the Bluetooth function of second terminal.
Optionally, described device further include:
The processing unit 802, being also used to identify the determining first terminal according to the verifying is illegal terminal.
The processing unit 802, be also used to determine the access number for the illegal terminal for accessing the second terminal be greater than or When equal to second threshold, the Bluetooth function of the second terminal is disabled.
Optionally, described device further include:
Receiving unit 801 is also used to receive the encryption data from the first terminal, and the encryption data is by described One terminal is obtained according to private key encryption target data.
The processing unit 802 is also used to the encryption data according to the public key decryptions and obtains the target data.
Fig. 9 is shown involved in above-described embodiment applied to the key hair in the first terminal of above-mentioned Internet of things system Send another possible structural schematic diagram of device.The key sending device includes: processor 902 and communication interface 903.Processing Device 902 is for carrying out control management to the movement of key sending device, for example, the step of above-mentioned processing unit 701 executes is executed, And/or other processes for executing techniques described herein.Communication interface 903 is for supporting key sending device and other The communication of network entity.For example, executing the step of above-mentioned transmission unit 702 executes, and/or for executing skill described herein Other processes of art.Key sending device can also include memory 901 and bus 904, and memory 901 is for storing key hair Send the program code and data of device.
Wherein, memory 901 can be the memory etc. in key sending device, which may include that volatibility is deposited Reservoir, such as random access memory;The memory also may include nonvolatile memory, such as read-only memory, quick flashing Memory, hard disk or solid state hard disk;The memory can also include the combination of the memory of mentioned kind.
Above-mentioned processor 902 can be realization or execute to combine and various illustratively patrols described in present disclosure Collect box, module and circuit.The processor can be central processing unit, general processor, digital signal processor, dedicated integrated Circuit, field programmable gate array or other programmable logic device, transistor logic, hardware component or it is any Combination.It, which may be implemented or executes, combines various illustrative logic blocks, module and electricity described in present disclosure Road.The processor be also possible to realize computing function combination, such as comprising one or more microprocessors combine, DSP and The combination etc. of microprocessor.
Bus 904 can be expanding the industrial standard structure (Extended Industry Standard Architecture, EISA) bus etc..Bus 904 can be divided into address bus, data/address bus, control bus etc..For convenient for table Show, only indicated with a thick line in Fig. 9, it is not intended that an only bus or a type of bus.
Figure 10 is shown involved in above-described embodiment applied to the key in the first terminal of above-mentioned Internet of things system The possible structural schematic diagram of another of sending device.The key sending device includes: processor 1002 and communication interface 1003. Processor 1002 is for carrying out control management to the movement of key sending device, for example, executing what above-mentioned processing unit 802 executed Step, and/or other processes for executing techniques described herein.Communication interface 1003 is for supporting key sending device With the communication of other network entities.For example, executing the step of above-mentioned receiving unit 801 executes, and/or retouched herein for executing The other processes for the technology stated.Key sending device can also include memory 1001 and bus 1004, and memory 1001 is used for Store the program code and data of key sending device.
Wherein, memory 1001 can be the memory etc. in key sending device, which may include volatibility Memory, such as random access memory;The memory also may include nonvolatile memory, such as read-only memory, fastly Flash memory, hard disk or solid state hard disk;The memory can also include the combination of the memory of mentioned kind.
Above-mentioned processor 1002 can be realization or execute various illustrative in conjunction with described in present disclosure Logic block, module and circuit.The processor can be central processing unit, general processor, digital signal processor, dedicated collection At circuit, field programmable gate array or other programmable logic device, transistor logic, hardware component or its Meaning combination.Its may be implemented or execute combine present disclosure described in various illustrative logic blocks, module and Circuit.The processor is also possible to realize the combination of computing function, such as combines comprising one or more microprocessors, DSP With the combination of microprocessor etc..
Bus 1004 can be expanding the industrial standard structure (Extended Industry Standard Architecture, EISA) bus etc..Bus 1004 can be divided into address bus, data/address bus, control bus etc..For convenient for It indicates, is only indicated with a thick line in Figure 10, it is not intended that an only bus or a type of bus.
Through the above description of the embodiments, it is apparent to those skilled in the art that, for description It is convenienct and succinct, only the example of the division of the above functional modules, in practical application, can according to need and will be upper It states function distribution to be completed by different functional modules, i.e., the internal structure of device is divided into different functional modules, to complete All or part of function described above.The specific work process of the system, apparatus, and unit of foregoing description, before can referring to The corresponding process in embodiment of the method is stated, details are not described herein.
The embodiment of the present application provides a kind of computer program product comprising instruction, when the computer program product is being counted When being run on calculation machine, so that the computer executes key sending method described in above method embodiment.
The embodiment of the present application also provides a kind of computer readable storage medium, and finger is stored in computer readable storage medium It enables, when described instruction is run on computers, so that the computer executes method flow shown in above method embodiment In key sending method.
Wherein, computer readable storage medium, such as electricity, magnetic, optical, electromagnetic, infrared ray can be but not limited to or partly led System, device or the device of body, or any above combination.The more specific example of computer readable storage medium is (non-poor The list of act) it include: the electrical connection with one or more conducting wires, portable computer diskette, hard disk, random access memory (Random Access Memory, RAM), read-only memory (Read-Only Memory, ROM), erasable type may be programmed read-only It is memory (Erasable Programmable Read Only Memory, EPROM), register, hard disk, optical fiber, portable Compact disc read-only memory (Compact Disc Read-Only Memory, CD-ROM), light storage device, magnetic memory The computer readable storage medium of part or above-mentioned any appropriate combination or any other form well known in the art. A kind of illustrative storage medium is coupled to processor, to enable a processor to from the read information, and can be to Information is written in the storage medium.Certainly, storage medium is also possible to the component part of processor.Pocessor and storage media can be with In application-specific IC (Application Specific Integrated Circuit, ASIC).In the application In embodiment, computer readable storage medium can be any tangible medium for including or store program, which can be referred to Enable execution system, device or device use or in connection.
The above, the only specific embodiment of the application, but the protection scope of the application is not limited thereto, it is any Change or replacement within the technical scope of the present application should all be covered within the scope of protection of this application.Therefore, this Shen Protection scope please should be subject to the protection scope in claims.

Claims (13)

1. a kind of key sending method, which is characterized in that be applied in first terminal, there is the first intelligence in the first terminal Card, first smart card are matched with the second smart card in second terminal, have public key, the side in first smart card Method includes:
The first terminal encrypts the public key and verifying mark, obtains the first data;Wherein, the verifying mark is for determining Whether the first terminal is legal terminal, and the public key is for decrypting encryption data;
The first terminal sends institute to the second terminal by the bluetooth connection between the first terminal and second terminal State the first data.
2. the method according to claim 1, wherein also having private key in first smart card;Described One terminal sends first data to the second terminal by the bluetooth connection between the first terminal and second terminal Later, the method also includes:
The first terminal obtains the encryption data according to the private key encryption target data;
The first terminal sends the encryption data to the second terminal.
3. a kind of key sending method, which is characterized in that be applied in second terminal, there is the second intelligence in the second terminal Card, second smart card are matched with the first smart card in first terminal;The described method includes:
The second terminal receives the first terminal and passes through the bluetooth connection between the second terminal and the first terminal The first data sent;
The second terminal decrypts first data and obtains public key and verifying mark, and the verifying is identified for determining described the Whether one terminal is legal terminal;
The second terminal determines that the first terminal is legal terminal according to verifying mark, and the second terminal will be described Public key is stored in second smart card.
4. according to the method described in claim 3, it is characterized in that, receiving the first terminal in the second terminal passes through institute After the first data for stating the bluetooth connection transmission between second terminal and the first terminal, further includes:
The second terminal decrypts first data, the failed decryption number of second terminal record not successfully;
When the failed decryption number is greater than or equal to first threshold, the second terminal disables the indigo plant of the second terminal Tooth function.
5. according to the method described in claim 3, it is characterized in that, decrypting first data in the second terminal obtains public affairs After key and verifying mark, further includes:
The second terminal determines that the first terminal is illegal terminal according to verifying mark;
When the second terminal determines that the access number for accessing the illegal terminal of the second terminal is greater than or equal to second threshold When, the second terminal disables the Bluetooth function of the second terminal.
6. according to the described in any item methods of claim 3-5, which is characterized in that store the public key in the second terminal After in second smart card, further includes:
The second terminal receives the encryption data from the first terminal, the encryption data by the first terminal according to Private key encryption target data obtains;
Second terminal encryption data according to the public key decryptions obtains the target data.
7. a kind of key sending device, which is characterized in that be applied in first terminal, there is the first intelligence in the first terminal Card, first smart card are matched with the second smart card in second terminal, have public key, the dress in first smart card It sets and includes:
Processing unit obtains the first data for encrypting the public key and verifying mark;Wherein, the verifying mark is for true Whether the fixed first terminal is legal terminal, and the public key is for decrypting encryption data;
Transmission unit, for sending institute to the second terminal by the bluetooth connection between the first terminal and second terminal State the first data.
8. a kind of key sending device, which is characterized in that be applied in second terminal, there is the second intelligence in the second terminal Card, second smart card are matched with the first smart card in first terminal;Described device includes:
Receiving unit passes through the bluetooth connection between the second terminal and the first terminal for receiving the first terminal The first data sent;
Processing unit obtains public key and verifying mark for decrypting first data, and verifying mark is for described in determining Whether first terminal is legal terminal;
The processing unit, being also used to identify the determining first terminal according to the verifying is legal terminal, and described second eventually The public key is stored in second smart card by end.
9. device according to claim 8, which is characterized in that described device further include:
The processing unit is also used to decrypt first data not successfully, records failed decryption number;
The processing unit is also used to when the failed decryption number is greater than or equal to first threshold, disabling described second The Bluetooth function of terminal.
10. device according to claim 8, which is characterized in that described device further include:
The processing unit, being also used to identify the determining first terminal according to the verifying is illegal terminal;
The processing unit is also used to determine that the access number for the illegal terminal for accessing the second terminal is greater than or equal to second When threshold value, the Bluetooth function of the second terminal is disabled.
11. a kind of key sends system characterized by comprising first terminal and second terminal, the first terminal and second There is bluetooth connection between terminal;Wherein, the first terminal requires the described in any item keys of 1-2 to send for perform claim Method;The second terminal requires the described in any item key sending methods of 3-6 for perform claim.
12. a kind of key sending device characterized by comprising processor and communication interface;The communication interface and the place Device coupling is managed, the processor is for running computer program or instruction, to realize as claim 1-2 is described in any item close Key sending method;Or realize such as the described in any item key sending methods of claim 3-6.
13. a kind of computer readable storage medium, instruction is stored in the computer readable storage medium, which is characterized in that When described instruction is run at the terminal, so that the terminal executes such as the described in any item key senders of claim 1-2 Method;Or execute such as the described in any item key sending methods of claim 3-6.
CN201910403815.7A 2019-05-15 2019-05-15 Key sending method, apparatus and system Pending CN110266474A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910403815.7A CN110266474A (en) 2019-05-15 2019-05-15 Key sending method, apparatus and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910403815.7A CN110266474A (en) 2019-05-15 2019-05-15 Key sending method, apparatus and system

Publications (1)

Publication Number Publication Date
CN110266474A true CN110266474A (en) 2019-09-20

Family

ID=67914697

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910403815.7A Pending CN110266474A (en) 2019-05-15 2019-05-15 Key sending method, apparatus and system

Country Status (1)

Country Link
CN (1) CN110266474A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109412810A (en) * 2019-01-03 2019-03-01 李维刚 A kind of key generation method based on mark
CN111092884A (en) * 2019-12-16 2020-05-01 中国南方电网有限责任公司 Method and device for publishing and subscribing service data and computer equipment
CN112258699A (en) * 2020-10-10 2021-01-22 上海擎感智能科技有限公司 Vehicle key and control method
CN112887948A (en) * 2021-01-15 2021-06-01 英华达(上海)科技有限公司 Method and system for binding Bluetooth device
CN112989370A (en) * 2021-02-09 2021-06-18 腾讯科技(深圳)有限公司 Secret key filling method, system, device, equipment and storage medium
CN113329386A (en) * 2021-06-11 2021-08-31 北京智芯微电子科技有限公司 Bluetooth pairing method supporting identity authentication, security chip and Bluetooth module
WO2023039900A1 (en) * 2021-09-18 2023-03-23 华为技术有限公司 Key transmission method and apparatus

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102571702A (en) * 2010-12-22 2012-07-11 中兴通讯股份有限公司 Key generation method, system and equipment in Internet of things
CN106603485A (en) * 2016-10-31 2017-04-26 美的智慧家居科技有限公司 Secret key negotiation method and device
CN106656481A (en) * 2016-10-28 2017-05-10 美的智慧家居科技有限公司 Identity authentication method, apparatus and system
US20170208049A1 (en) * 2014-05-30 2017-07-20 Beijing Qihoo Technology Company Limited Key agreement method and device for verification information
CN108809914A (en) * 2017-05-05 2018-11-13 国民技术股份有限公司 Access control method, device, terminal and Internet of Things house system
CN108847930A (en) * 2018-06-05 2018-11-20 深圳市中电数通智慧安全科技股份有限公司 A kind of data transmission method, device and fire-fighting system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102571702A (en) * 2010-12-22 2012-07-11 中兴通讯股份有限公司 Key generation method, system and equipment in Internet of things
US20170208049A1 (en) * 2014-05-30 2017-07-20 Beijing Qihoo Technology Company Limited Key agreement method and device for verification information
CN106656481A (en) * 2016-10-28 2017-05-10 美的智慧家居科技有限公司 Identity authentication method, apparatus and system
CN106603485A (en) * 2016-10-31 2017-04-26 美的智慧家居科技有限公司 Secret key negotiation method and device
CN108809914A (en) * 2017-05-05 2018-11-13 国民技术股份有限公司 Access control method, device, terminal and Internet of Things house system
CN108847930A (en) * 2018-06-05 2018-11-20 深圳市中电数通智慧安全科技股份有限公司 A kind of data transmission method, device and fire-fighting system

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109412810A (en) * 2019-01-03 2019-03-01 李维刚 A kind of key generation method based on mark
CN111092884A (en) * 2019-12-16 2020-05-01 中国南方电网有限责任公司 Method and device for publishing and subscribing service data and computer equipment
CN112258699A (en) * 2020-10-10 2021-01-22 上海擎感智能科技有限公司 Vehicle key and control method
CN112887948A (en) * 2021-01-15 2021-06-01 英华达(上海)科技有限公司 Method and system for binding Bluetooth device
CN112887948B (en) * 2021-01-15 2023-04-18 英华达(上海)科技有限公司 Method and system for binding Bluetooth device
CN112989370A (en) * 2021-02-09 2021-06-18 腾讯科技(深圳)有限公司 Secret key filling method, system, device, equipment and storage medium
CN112989370B (en) * 2021-02-09 2023-06-30 腾讯科技(深圳)有限公司 Key filling method, system, device, equipment and storage medium
CN113329386A (en) * 2021-06-11 2021-08-31 北京智芯微电子科技有限公司 Bluetooth pairing method supporting identity authentication, security chip and Bluetooth module
CN113329386B (en) * 2021-06-11 2023-03-31 北京智芯微电子科技有限公司 Bluetooth pairing method supporting identity authentication, security chip and Bluetooth module
WO2023039900A1 (en) * 2021-09-18 2023-03-23 华为技术有限公司 Key transmission method and apparatus

Similar Documents

Publication Publication Date Title
CN110266474A (en) Key sending method, apparatus and system
KR101510784B1 (en) Method of secure personalization of a nfc chipset
CN106161359B (en) It authenticates the method and device of user, register the method and device of wearable device
CN1708942B (en) Secure implementation and utilization of device-specific security data
US20210004454A1 (en) Proof of affinity to a secure event for frictionless credential management
CN109327314A (en) Access method, device, electronic equipment and the system of business datum
CN107959686B (en) A kind of Internet of Things security certification system and authentication method
US9253167B2 (en) Device and system for facilitating communication and networking within a secure mobile environment
US11277444B2 (en) System-on-chip for performing virtual private network function and system including the same
CN109067528A (en) Crypto-operation, method, cryptographic service platform and the equipment for creating working key
CN101300808A (en) Method and arrangement for secure autentication
CN109816383A (en) A kind of block chain endorsement method, block chain wallet and block chain
CN105282179A (en) Family Internet of things security control method based on CPK
CN107017997A (en) A kind of auth method, reader and label
CN110290134A (en) A kind of identity identifying method, device, storage medium and processor
CN106465104A (en) Key sharing method and device
CN101944216A (en) Two-factor online transaction safety authentication method and system
CN109903052A (en) A kind of block chain endorsement method and mobile device
Park et al. Secure profile provisioning architecture for embedded UICC
WO2021007472A1 (en) Methods and systems for securing and utilizing a personal data store on a mobile device
CN101587458A (en) Operation method and device for intelligent storing card
US9154481B1 (en) Decryption of a protected resource on a cryptographic device using wireless communication
CN110100411B (en) Cryptographic system management
CN112862481A (en) Block chain digital asset key management method and system based on SIM card
Bolhuis Using an NFC-equipped mobile phone as a token in physical access control

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190920

RJ01 Rejection of invention patent application after publication