CN110266474A - Key sending method, apparatus and system - Google Patents
Key sending method, apparatus and system Download PDFInfo
- Publication number
- CN110266474A CN110266474A CN201910403815.7A CN201910403815A CN110266474A CN 110266474 A CN110266474 A CN 110266474A CN 201910403815 A CN201910403815 A CN 201910403815A CN 110266474 A CN110266474 A CN 110266474A
- Authority
- CN
- China
- Prior art keywords
- terminal
- key
- data
- public key
- smart card
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
Abstract
This application provides a kind of key sending methods, apparatus and system, are related to internet of things field, for preventing the other equipment except Internet of things system from obtaining the key of the Internet of things system, improve the safety and credibility of public key.This method comprises: first terminal encrypted public key and verifying mark, obtain the first data;Wherein, verifying mark is for determining whether first terminal is legal terminal, and public key is for decrypting encryption data;First terminal sends the first data to second terminal by the bluetooth connection between first terminal and second terminal.It can be improved the safety of exchange of public keys process.
Description
Technical field
This application involves internet of things field more particularly to a kind of key sending methods, apparatus and system.
Background technique
In current Internet of things system (the especially Internet of things system of personal use, for example, smart home etc.), in order to
Guarantee between first terminal (controlling terminal in Internet of things system) and second terminal (internet-of-things terminal in Internet of things system)
The safety of data communication, and guarantee that the information that second terminal receives is from first terminal.It would generally be generated by key
Platform is that Internet of things system distributes a public key and a private key.Public key is issued second eventually by network by key generating platform
End, issues first terminal for private key.First terminal sends the data according to private key encryption to second terminal, and second terminal, which receives, to be added
Close data simultaneously decrypt it using public key to obtain the data.
But during first terminal of the key generating platform into Internet of things system and second terminal send key,
The key is possible to be obtained by other equipment, and other equipment can be solved by the information in the key pair internet of things equipment
It is close, cause information leakage.The other equipment can also be encrypted using the data key simultaneously, and disguise oneself as first terminal pair
Second terminal is controlled.
Summary of the invention
The embodiment of the present application provides a kind of key sending method, apparatus and system, for preventing except Internet of things system
Other equipment obtain the key of the Internet of things system, improve the safety and credibility of public key.
In order to achieve the above objectives, the application adopts the following technical scheme that
In a first aspect, the embodiment of the present application provides a kind of key sending method, this method comprises: first terminal encryption is public
Key and verifying mark, obtain the first data;Wherein, verifying mark for determining whether first terminal is legal terminal, use by public key
In decryption encryption data;First terminal sends first to second terminal by the bluetooth connection between first terminal and second terminal
Data.
The embodiment of the present application provides a kind of key sending method, and first terminal encrypted public key and verifying mark obtain first
Data, by strengthening public key and verifying the safety during identification transmission to key and verifying mark encryption, by the
Two terminals send verifying mark, and second terminal is made to identify the legitimacy for determining first terminal according to verifying.First terminal passes through the
Bluetooth connection between one terminal and second terminal sends the first data to second terminal, and first terminal and second terminal pass through line
Under bluetooth connection exchange public key, improve the safety in public key transmission process.
Second aspect, the embodiment of the present application provide a kind of key sending method, this method comprises: second terminal receives the
The first data that one terminal is sent by the bluetooth connection between second terminal and first terminal;Second terminal decrypts the first data
Public key and verifying mark are obtained, verifying mark is for determining whether first terminal is legal terminal;Second terminal is marked according to verifying
Know and determine that first terminal is legal terminal, public key is stored in the second smart card by second terminal.
The embodiment of the present application provides a kind of key sending method, second terminal receive first terminal by second terminal and
The first data that bluetooth connection between first terminal is sent.By using the bluetooth connection mode under line in Internet of things system
Exchange of public keys is carried out between equipment, makes the exchange of public key from network attack.Improve the safety of exchange of public keys.Second terminal
It decrypts the first data and obtains public key and verifying mark.Second terminal is identified according to verifying determines that first terminal is legal terminal, the
Public key is stored in the second smart card by two terminals.Second terminal first verifies the legitimacy of first terminal, in determination
When first terminal after legal terminal, the public key of first terminal transmission is saved in the second smart card.Ensure that second terminal is protected
The public key deposited is that legal terminal is sent.Ensure the credibility of the public key.
The third aspect, the embodiment of the present application provide a kind of key sending device, which includes: processing unit, are used for
Encrypted public key and verifying mark, obtain the first data;Wherein, verifying is identified for determining whether first terminal is legal terminal,
Public key is for decrypting encryption data;Transmission unit, for passing through the bluetooth connection between first terminal and second terminal to second
Terminal sends the first data.
Fourth aspect, the embodiment of the present application provide a kind of key sending device, which includes: receiving unit, are used for
Receive the first data that first terminal is sent by the bluetooth connection between second terminal and first terminal;Processing unit is used for
It decrypts the first data and obtains public key and verifying mark, verifying mark is for determining whether first terminal is legal terminal;Processing is single
Member, being also used to identify determining first terminal according to verifying is legal terminal, and public key is stored in the second smart card by second terminal.
5th aspect, the embodiment of the present application provide a kind of key transmission system, which includes: first terminal and second
Terminal, first terminal and second terminal bluetooth connection;Wherein, first terminal is used to execute above-mentioned first aspect and first aspect
Key sending method described in any possible implementation;Second terminal is for executing above-mentioned first aspect and the
Key sending method described in any possible implementation of one side.
6th aspect, the embodiment of the present application provide a kind of key sending device, which includes: that processor and communication connect
Mouthful;Communication interface and processor coupling, processor is for running computer program or instruction, to realize such as first aspect and first
Key sending method described in any possible implementation of aspect.
7th aspect, the embodiment of the present application provide a kind of key sending device, which includes: that processor and communication connect
Mouthful;Communication interface and processor coupling, processor is for running computer program or instruction, to realize such as second aspect and second
Key sending method described in any possible implementation of aspect.
Eighth aspect, the embodiment of the present application provide a kind of computer readable storage medium, computer readable storage medium
In be stored with instruction, when instruction run on first terminal when so that first terminal execute such as first aspect and first aspect
Key sending method described in any possible implementation.
9th aspect, the embodiment of the present application provide a kind of computer readable storage medium, computer readable storage medium
In be stored with instruction, when instruction run in second terminal when so that second terminal execute such as second aspect and second aspect
Key sending method described in any possible implementation.
Tenth aspect, the embodiment of the present application provide a kind of computer program product comprising instruction, when computer program produces
Product on key sending device when running, so that key sending device executes any possibility such as first aspect and first aspect
Implementation described in key sending method.
Tenth on the one hand, and the embodiment of the present application provides a kind of computer program product comprising instruction, works as computer program
For product when running on key sending device, so that key sending device executes such as, second aspect and any of second aspect can
Key sending method described in the implementation of energy.
Tenth on the one hand, and the embodiment of the present application provides a kind of chip, and chip includes processor and communication interface, communication interface
It is coupled with processor, processor is for running computer program or instruction, to realize any such as first aspect and first aspect
Key sending method described in the possible implementation of kind.
12nd aspect, the embodiment of the present application provide a kind of chip, and chip includes processor and communication interface, communication interface
It is coupled with processor, processor is for running computer program or instruction, to realize any such as second aspect and second aspect
Key sending method described in the possible implementation of kind.
Specifically, the chip provided in the embodiment of the present application further includes memory, for storing computer program or instruction.
Detailed description of the invention
Fig. 1 is a kind of system architecture diagram of Internet of things system provided by the embodiments of the present application;
Fig. 2 is the system architecture diagram of another Internet of things system provided by the embodiments of the present application;
Fig. 3 is a kind of flow diagram one of key sending method provided by the embodiments of the present application;
Fig. 4 is a kind of flow diagram two of key sending method provided by the embodiments of the present application;
Fig. 5 is a kind of flow diagram three of key sending method provided by the embodiments of the present application;
Fig. 6 is a kind of flow diagram four of key sending method provided by the embodiments of the present application;
Fig. 7 is a kind of structural schematic diagram one of key sending device provided by the embodiments of the present application;
Fig. 8 is a kind of structural schematic diagram two of key sending device provided by the embodiments of the present application;
Fig. 9 is a kind of structural schematic diagram three of key sending device provided by the embodiments of the present application;
Figure 10 is a kind of structural schematic diagram four of key sending device provided by the embodiments of the present application.
Specific embodiment
Key sending method provided by the present application, apparatus and system are described in detail below in conjunction with attached drawing.
Term " first " and " second " in the description of the present application and attached drawing etc. be for distinguishing different objects, and
It is not intended to the particular order of description object.
In addition, the term " includes " being previously mentioned in the description of the present application and " having " and their any deformation, it is intended that
It is to cover and non-exclusive includes.Such as the process, method, system, product or equipment for containing a series of steps or units do not have
It is defined in listed step or unit, but optionally further comprising the step of other are not listed or unit, or optionally
It further include other step or units intrinsic for these process, methods, product or equipment.
It should be noted that in the embodiment of the present application, " illustrative " or " such as " etc. words make example, example for indicating
Card or explanation.Be described as in the embodiment of the present application " illustrative " or " such as " any embodiment or design scheme do not answer
It is interpreted than other embodiments or design scheme more preferably or more advantage.Specifically, " illustrative " or " example are used
Such as " word is intended to that related notion is presented in specific ways.
In the description of the present application, unless otherwise indicated, the meaning of " plurality " is refer to two or more.
Before introducing the embodiment of the present application, first to the invention relates to related terms do description below:
Internet of Things (Internet of things, IoT): the internet being made of object.Internet of Things is also known as Sensor Network, object
Networking further extends internet from people to object, contains.Internet of Things by various information sensing devices, as rfid device,
(equipment is set various devices such as infrared inductor, global positioning system, laser scanner and automobile, unmanned plane, smart machine
Apply) combine with internet and a huge network being formed.The purpose is to allow all objects all with network connection one
It rises, facilitates identification and management.
Public key cryptography: public key cryptography technology is used to solve the problems, such as two most scabrous in single key cryptosystem: key point
Match and digital signature;In public-key cryptosystem, each user possesses a pair of secret keys: private key and public key, wherein private key is by user
The problem of secret saves, and public key can publish, and is used by other people, does not have to concern about disclosure.Most notable also most popular public affairs
Key cryptographic algorithm, which has, decomposes Peter Lonard Lee Vista of problem, A Di Shamir, Leonard A Deman based on big number
It is (Ron Rivest, Adi Shamir, Leonard Adleman, RSA) and oval bent based on Elliptic Curve Discrete Logarithm problem
Line encrypts (elliptic curve cryptography, ECC), both algorithms can be used for the decryption of public key encryption/private key and
Private key signature/public key sign test;The close commercial cipher of state (shang mi, SM) 2 algorithms of our countries are also a kind of based on ECC differentiation
The public key algorithm to come over.
Safety chip: safety chip, which refers to, realizes one or more cryptographic algorithms, directly or indirectly uses password skill
Art protects the IC chip of key and sensitive information, and safety chip generally has independent central processing unit (central
Processing unit, CPU), memory and storage unit, may be implemented to execute with intelligent terminal operation system, application software
The physical isolation of environment, therefore safety with higher can resist the attack of hacker, realize the cores such as clean boot, storage
The security function of the heart protects userspersonal information and applies data safety.Currently, safety chip is also with safe unit (secure
Element, SE) form be embedded in all kinds of smart cards and intelligent terminal, further increase the safety of smart card and terminal.Peace
In full chip public key and private key can be directly generated within a smart card with built-in key algorithm.
7816 agreements: the communications protocol between contact intelligent card and read-write equipment, that is, data bit transmission are defined
Format, be similar to proposed standard (recommended standard, RS) 232, be only more suitable for low power-consumption intelligent card, silver
Line integrated circuit (integrated circuit, IC) card, mobile phone user's identification card (subscriber
Identification module, SIM) card etc. be all to be communicated by 7816 interfaces with reader device.Our mobile phone is whole
End is communicated between SIM and by 7816.
Low-power consumption bluetooth (bluetooth low energy, BLE): be a kind of low cost, short distance, interoperable nothing
Line transmission technology, work exempt from license 2.4GHz industrial scientific medical (Industrial Scientific Medical,
ISM) radio frequency band, BLE have arrived BLE 5.0 from 4.0 starting development at present.It is designed as super low-power consumption from the beginning
(ultra low power, ULP) wireless technology, uses variable Connection Time interval, this interval can be with according to concrete application
Several milliseconds to several seconds are set as to differ.In addition, can usually locate because BLE technology uses very quick connection type
In " disconnected " state (saving the energy), both link ends only know other side each other at this time, only just open chain if necessary
Then link is closed on road in the shortest possible time.
In internet, a large amount of data can be all transmitted all the time.The safety for ensuring the transmission of these data is interconnection
The most important thing of net.Public key cryptography technology is widely used in interconnection because of its powerful security performance.But in public-key technology
Application process in find, although using the data safety with higher of public key encryption, the public affairs issued in a network
It is attacked during the confidence level of key distribution platform is lower or public key is issued in a network by other equipment, then receiving the public affairs
The equipment of key will be unable to the authenticity of confirmation public key after receiving public key.Receive the equipment utilization vacation public key encryption of the public key
Data are transmitted, and above-mentioned other equipment can solve data using the private key corresponding with false public key of oneself storage
It is close.Cause the security incidents such as information leakage.
It is for the public key cryptography technology that uses of safety, public key is associated with the identity information of user, and enable public key
Its distribution platform is verified by user, confirm its credibility, occur certification authority (certificate authority,
CA mechanism, trusted third party as).CA confirms the public key information of other public key publication platforms publication by certificate, has on certificate
The signature of CA.If user results in loss because of trusted certificate, certificate can be used as effective evidence for investigating CA's
Legal liabilities.There are Public Key Infrastructure (public key infrastructure, PKI) (i.e. public key publication platform) and CA total
PKI/CA digital certificate system with composition can provide believable public key for user.But the Certification system of PKI/CA is more
It is complicated.Therefore, and in succession occur public-key cryptosystem (identity based cryptograph, IBC) based on mark,
From card public-key cryptosystem and without CertPubKey cipher system etc..
IBC is a kind of public key cryptography technology based on mark, that is, the public key of user is by relevant to user identity
Bit String is constituted.Public key in IBC can pass through identity information (such as identity (Identity, ID) number, email address of user
Or cell-phone number etc.) directly calculate and obtain, the private key of user is then generated by the authoritative institution that trusts.This system eliminate to
The dependence of family certificate simplifies the management process of key, and the close SM9 standard description of our states is exactly a kind of public key based on mark
Password.This private key is not uniquely controlled by user, and the mode that public key also determines that after ID is determined is in the presence of the limitation used
's.
Digital certificate is not all used from card public-key cryptosystem and without two kinds of public-key cryptosystems of CertPubKey cipher system.
The private key of user is generated jointly by trusted party and user, and client public key has from card property, has both reduced PKI/CA public key cryptography
Certificate management problem in system, and the key escrow in IBC public-key cryptosystem is eliminated, user key can cancel
And replacement, the operational efficiency of system is improved, the complexity of system is reduced.From card public-key cryptosystem and without CertPubKey it is close
Code system is between PKI/CA public-key cryptosystem and IBC public-key cryptosystem, the advantages of both having concurrently, but since key is
It binds two parts, however it remains a possibility that attack.As long as key is needed to circulate in network environment, even
It is only to circulate once, it is also inevitably under attack.
Since PKI/CA digital certificate system is not suitable for applying in Internet of things system.It is generally adopted in current Internet of things system
It is IBC or without CertPubKey cryptographic technique.These technologies are suitably applied in the Internet of things system of large enterprise.For a
The Internet of things system that people uses, since the public key of the Internet of things system of personal use needs special key generating platform to generate,
And Internet of things system is sent to by network connection.If these key generating platforms can all be led with breaking through or starting a leak
Public key is caused to be leaked, the instruction for causing Internet of things system to be subject to is not from the instruction of real user's publication.And individually
Key generating platform higher cost, process is also complex, poor universality.
Public Key Crypto Scheme (certificate less authentication system, CLA) is demonstrate,proved certainly with no certificate
For, the scheme for producing public key and private key is specific as follows:
Firstly, establishing one has dedicated CLA system:
CLA system generates system private key s1, s2 and system public key Ppub1, Ppub2.
CLA system discloses system public key Ppub1, Ppub2.
CLA system discloses a public key generating function f (x, y, z1, z2).
Then it is exactly the process that terminal generates key:
Terminal generates a pair of interim SM2 public private key pair (P1, d1) at random.Send public key P1 and terminal account number A to CLA (or
Person sends user identifier to CLA, generates user account number A by CLA).
CLA executes following calculate:
It is random to generate a pair of of public private key pair (R, r), calculate P=P1+R.
It calculates d2=r+f (A, P, s1, s2) (mod n).
Q=P+f (A, P, Ppub1, Ppub2).
D2, P, Q and A are sent to terminal.
Terminal calculates d=d1+d2 (mod n), then d is exactly the practical private key of terminal, and Q is the actual public key of terminal, and P is eventually
The part public key at end, A are the account numbers of terminal.
From above-mentioned process it is recognised that using CLA scheme, there is following hidden danger:
It needs to establish a set of platform, needs preset system public key and algorithmic function in terminal or smart card, the construction of platform
Cost is required with operation, and the preset channel for being also required for a safety of system public key.Above-mentioned preset system public key and
Algorithmic function is likely to because platform is attacked or interior ghost occurs and preset system public key and algorithmic function is caused to be replaced.
To make the safety of the key generated be unable to get guarantee.
When terminal application key, if the channel of terminal end to CLA platform is unsafe, it is possible to serve
Data be replaced in fact, that is, a possibility that cannot eliminate by man-in-the-middle attack.
Key sending method provided by the embodiments of the present application can be applied in Internet of things system as shown in Figure 1.Such as figure
Shown in 1, which includes: first terminal 101 and second terminal 102, and first terminal 101 and second terminal 102 communicate
Connection.
Wherein, first terminal 101 sends data or instruction to second terminal 102, to realize the data with second terminal 102
Interaction.It is instructed alternatively, first terminal 101 is sent to second terminal 102, to realize the control to second terminal 102.
Second terminal 102 receives the data from first terminal 101.Alternatively, second terminal 102, which receives, comes from first terminal
101 instructions, and corresponding data are returned according to the corresponding movement of the instruction execution or to first terminal 101.
Illustratively, using the Internet of things system as smart home system, which is mobile phone, the second terminal
102 is for air-conditionings.Mobile phone sends temperature adjustment instructions to air-conditioning, and air-conditioning receives after the temperature adjustment instructions from mobile phone
Temperature adjusting is carried out according to the regulating command.
Illustratively, using the Internet of things system as smart home system, first terminal 101 is mobile phone, and second terminal is to take the photograph
As for head.Mobile phone sends picture acquisition instruction to camera, after camera receives the picture acquisition instruction of mobile phone transmission,
It acquires picture and collected picture is sent into a mobile phone.
In conjunction with Fig. 1, as shown in Fig. 2, the Internet of things system can also include third-party platform 103.First terminal 101,
Connection is communicated with each other between two terminals 102 and third-party platform 103.
First terminal 101 and second terminal 102 complete registration in third-party platform 103, and establish first terminal 101
Mapping relations between second terminal 102.When first terminal 101 needs to send data to second terminal 102, first terminal
101 can send data to third-party platform 103 first.Third-party platform determines the second terminal 102 for needing to forward, and will
The data are sent to second terminal 102.
Illustratively, which can be implemented as third-party network cloud platform etc..
Illustratively, when first terminal 101 and closer 102 position of second terminal, first terminal 101 and second terminal
Bluetooth communication can be passed through between 102.When first terminal 101 and second terminal 102 are in the same Wireless Fidelity (wireless
Fidelity, WiFi) in network when, first terminal 101 and second terminal 102 can be communicated by the WiFi network.When
First terminal 101 and 102 position of second terminal are apart from each other, and when being not in the same WiFi network, 101 He of first terminal
Second terminal 102 is communicated by third-party platform 103.
The embodiment of the present application provides a kind of key sending method, applied to Internet of things system as shown in Figure 1 or 2
In.For carrying out key exchange between the first terminal and second terminal of Internet of things system.As shown in figure 3, this method comprises:
Step 101, first terminal encrypted public key and verifying mark, obtain the first data.
Wherein, there is the first smart card in first terminal.First smart card is matched with the second smart card in second terminal,
There is public key in first smart card.Verifying mark is for determining whether first terminal is legal terminal, and public key is for decrypting encryption
Data.
A kind of example, verifying mark can be following any or a variety of combination: smartcard identification, terminal mark
Know, card feature string.The card feature string is the identical random string that writer is written in the first smart card and the second smart card.
In a kind of specific implementation of step 101, in smart card (for example, the first smart card and second smart card) also
With safety chip.There is key algorithm in the safety chip.The safety chip can obtain a pair of right according to the key algorithm
The public key and private key of title.Safety chip saves the private key.Or safety chip sends the public key and private key to smart card.Smart card
Save the private key.
In a kind of specific implementation of step 101, the smart card that the application mentions is user identity identification
(subscriber identification module, SIM) card.There is the first SIM card in first terminal, have in second terminal
There is the second SIM card.For the SIM card of the same Internet of things system during SIM card is matched, writer is in the first smart card and
Identical symmetric key and card feature string are written in two smart cards.It is different from the public key and private that safety chip generates in smart card
Key, the symmetric key are used to add public key and verifying mark when first terminal sends public key and verify mark to second terminal
It is close, obtain the first data.
Illustratively, first terminal can realize network connecting function by first SIM card, and second terminal can pass through
Second SIM card realizes network connecting function.First terminal and second terminal can also realize network connection by other means
Function, for example, realizing network connecting function by WiFi, the application is not limited this.
In a kind of implementation of step 101, legal identification sets are stored in smart card.Include in the legal identification sets with
Under any or a variety of combination: with the smart card complete matched smart card card mark, with terminal described in the smart card
Complete the terminal iidentification and card feature string of matched terminal.
In a kind of implementation of step 101, first terminal obtains public key from the first smart card, and obtains verifying mark
Know.Encrypted public key and verifying mark, obtain the first data.
In a kind of implementation of step 101, writer can also be by advance in the first smart card and the second intelligence
Block and elliptic curve cryptosystem (elliptic curves diffie is written in (or first terminal and second terminal)
Hellman, ECDH).Before first terminal sends the first data to second terminal.First terminal is handed over second terminal first
Mutually, symmetric key is generated by ECDH.First terminal obtains the first data by the symmetric key encryption public key and verifying mark.
Second terminal obtains public key and verifying mark by first data of symmetric key decryption.First terminal and second terminal may be used also
By obtaining symmetric key in a manner of any other.The application does not limit this.
Step 102, first terminal send the to second terminal by bluetooth connection between first terminal and second terminal
One data.
In a kind of implementation of step 102, which is that first terminal receives to second terminal and sends the
After the instruction of one data, the bluetooth connection established between first terminal and second terminal.
Illustratively, using the first terminal as mobile phone, smart card is SIM card, second terminal be object vehicle (such as with
The automobile of intelligent people-car interaction system) for, step 102 is specifically described:
After being installed SIM card in mobile phone, SIM card is initialized (including personal identification number (personal
Identification number, PIN) initialization).The mobile phone that promising progress key sends exploitation is installed in advance in mobile phone
Application program (Application, APP).After APP, which is detected, sends the instruction of the first data to object vehicle, APP is opened
The Bluetooth function of mobile phone, and carry out bluetooth discovery and (limited since bluetooth connection has distance, mobile phone is needed in close to mesh at this time
Mark the position of automobile).Handset-selected object vehicle matched (such as after mobile phone searching to the neighbouring equipment for opening bluetooth,
Selection represents the bluetooth title of object vehicle, matches with object vehicle.Or mobile phone direct search indicates the bluetooth of object vehicle
Title is matched after the bluetooth title for searching object vehicle with object vehicle).After pairing is completed, mobile phone and target
Bluetooth connection is established between automobile, the first data can be sent by the bluetooth connection between mobile phone and object vehicle.In mobile phone
Encrypted public key and verifying mark, after obtaining the first data, mobile phone passes through the bluetooth connection between mobile phone and object vehicle to mesh
It marks automobile and sends the first data.
Step 103, second terminal receive first terminal and are sent by the bluetooth connection between second terminal and first terminal
The first data.
Step 104, second terminal decrypt the first data and obtain public key and verifying mark.
Wherein, verifying mark is for determining whether first terminal is legal terminal.
In a kind of implementation of step 104, writer be written into the first smart card and the second smart card it is identical (or
Symmetric key accordingly).First terminal is identified according to the symmetric key encryption public key and verifying, obtains the first data.Second eventually
End obtains public key according to first data of symmetric key decryption and verifying identifies.
In one possible implementation, second terminal obtained from the second smart card writer write snap past journey write-in
To the symmetric key of (or corresponding) identical in the first smart card.Second terminal is obtained according to first data of symmetric key decryption
Public key and verifying mark.
In alternatively possible implementation, after second terminal receives the first data, into second terminal
Two smart cards send the first data.Second smart card receive be invoked at after first data write card during writer write-in
To the symmetric key of (or corresponding) identical in the first smart card, decrypt first data obtain public key and verifying mark.
Step 105, second terminal are identified according to verifying determines that first terminal is legal terminal, and second terminal stores public key
In the second smart card.
Although should be understood that verifying mark may be matched there are many building form in first terminal and second terminal
It is had determined in verifying mark before (or during writer is to the first smart card and the second writing smart card)
Content.The content in verifying mark sent between first terminal and second terminal is in the above-mentioned verifying mark determined
Content.Such as: the verifying is identified as the combination of card feature string and the first smartcard identification, then writer to the first smart card and
Identical card feature string is written when second writing smart card and respectively the first smart card and the write-in of the second smart card are legal
Identification sets.After second terminal determines verifying mark, judge to verify the smartcard identification in mark in above-mentioned legal identification sets,
Then indicate that the terminal for sending the first data is legal terminal.
Second terminal determines that the card feature string in verifying mark is legal according to the legal identification sets in the second smart card
Card feature string, the verifying mark in the first smartcard identification be the first legal smartcard identification.Then second terminal determines
First terminal is legal terminal.Public key is stored in the second smart card by second terminal.
The embodiment of the present application provides a kind of key sending method, and first terminal encrypted public key and verifying mark obtain first
Data, by strengthening public key and verifying the safety during identification transmission to key and verifying mark encryption, by the
Two terminals send verifying mark, and second terminal is made to identify the legitimacy for determining first terminal according to verifying.First terminal passes through the
Bluetooth connection between one terminal and second terminal sends the first data to second terminal, and first terminal and second terminal pass through line
Under bluetooth connection exchange public key, improve the safety in public key transmission process.Second terminal receives first terminal by the
The first data that bluetooth connection between two terminals and first terminal is sent.Second terminal decrypts the first data and obtains public key and test
Card mark.Second terminal is identified according to verifying determines that first terminal is legal terminal, and public key is stored in the second intelligence by second terminal
In capable of blocking.Second terminal first verifies the legitimacy of first terminal, when determining first terminal after legal terminal, protects
The public key of first terminal transmission is deposited in the second smart card.Ensure that the public key that second terminal saves is that legal terminal is sent.
Ensure the credibility of the public key.
In a kind of implementation of the embodiment of the present application, public key is stored in it in the second smart card in second terminal
Afterwards, second terminal sends the first data receiver success message to first terminal.The bluetooth function of second terminal disabling and first terminal
Can, to reduce the power consumption of second terminal.
In a kind of implementation of the embodiment of the present application, public key is stored in it in the second smart card in second terminal
Afterwards, second terminal sends the first data receiver success message to first terminal.The Bluetooth function of second terminal disabling second terminal.
It can guarantee the uniqueness of the terminal controlled second terminal.Other terminals cannot send public key to second terminal,
Also control to second terminal and/or cannot carry out data transmission with second terminal.
In a kind of implementation of the embodiment of the present application, public key is stored in the second smart card and in second terminal
After two terminals disable bluetooth connection, if third terminal (terminal other than first terminal and second terminal) is needed to second terminal
Data are sent, then third terminal requests authentication firstly the need of to first terminal.First terminal is to third terminal authentication
After success, third terminal obtains private key from first terminal.Data are sent to second terminal using the private key.Or first eventually
After end is to the success of third terminal authentication, first terminal instruction second terminal reactivates Bluetooth function and makes second terminal
Above-mentioned steps 101-105 is executed between third terminal.Make to store what third terminal generated in the second smart card of second terminal
Public key.Second terminal and third terminal are according to public key progress data encryption.
In a kind of implementation of the embodiment of the present application, in conjunction with Fig. 3, as shown in figure 4, after step 105, this method
Further include:
Step 106, first terminal obtain encryption data according to private key encryption target data.
Wherein, private key can be generated by the safety chip in first terminal in the first smart card, the private key and above-mentioned first
Terminal is a pair of of symmetric key by the public key that bluetooth connection is sent to second terminal.Private key is stored in first terminal.When
When one terminal needs to send target data to second terminal, first terminal uses the private key encryption target data, obtains encryption number
According to.
Optionally, which is stored in first terminal in the safety chip of the first smart card.
Step 107, first terminal send encryption data to second terminal.
It should be understood that first terminal can be any by bluetooth connection, network connection etc. to second terminal transmission encryption data
Communication connection mode is sent.The application does not limit this.
Illustratively, the step is described in detail so that first terminal is mobile phone, second terminal is air-conditioning as an example.
Mobile phone and air-conditioning are attached by third-party platform, which is used for transmission between mobile phone and air-conditioning
Communication data.
Since mobile phone needs to send data to air-conditioning by the third-party platform.In order to avoid third-party platform or network
In other equipment get the data information between mobile phone and air-conditioning, mobile phone encrypts target data, obtain encryption number
According to.After mobile phone encrypts target data, encryption data is sent to third-party platform.Third-party platform is received from mobile phone
Encryption data.Inquiry needs the air-conditioning forwarded, sends the encryption data to air-conditioning.
Step 108, second terminal obtain target data according to public key decryptions encryption data.
After second terminal receives the encryption data from first terminal.It needs that encryption data is decrypted to obtain target
Data.Second terminal is stored in the public key in the second smart card from acquisition in the second smart card in above-mentioned steps 105.Second eventually
End obtains target data according to the public key decryptions encryption data.
It illustratively, is air-conditioning using first terminal as mobile phone, second terminal, encryption data is to open air-conditioning and set temperature
The step is described in detail for being set to 26 DEG C.
Air-conditioning receives mobile phone and opens air-conditioning by what third-party platform was sent and be 26 DEG C of number of targets by temperature setting
According to later, air-conditioning obtains the public key of the second smart cards for storage from the second smart card.Air-conditioning according to the public key decryptions encryption data,
Obtain target data.Air-conditioning identifies the target data, opens and is 26 DEG C of start-up operations by temperature setting.
In conjunction with Fig. 3, as shown in figure 5, after step 103, this method further include:
Step 109, second terminal decrypt the first data, the failed decryption number of second terminal record not successfully.
It should be understood that in order to avoid illegal terminal and second terminal carry out malice pairing.If second terminal receives the first number
According to later, fail normally to decrypt the first data using the symmetric key, then second terminal thinks to be likely to be illegal end
End is that second terminal carries out malice pairing, at this time the failed decryption number of second terminal record.
Illustratively, second terminal is primary per the first data of failed decryption, then the failed decryption number of record adds 1.
Step 110, when not successfully decryption number be greater than or equal to first threshold when, second terminal disable second terminal indigo plant
Tooth function.
Illustratively, which is 10.Namely when the number that second terminal decrypts the first data not successfully reaches 10
After secondary, second terminal disables the Bluetooth function of second terminal, prevents illegal terminal from establishing connection with second terminal and further controls
Make the second terminal.
In a kind of implementation of step 110, after second terminal disables the Bluetooth function of second terminal, second terminal
Bluetooth function can just be reactivated later by needing to meet preset condition.Such as second terminal needs are online lower by root key weight
It is new to enable or need to be reactivated by professional with permission.
In a kind of implementation of step 110, second terminal disables the Bluetooth function of the second terminal of preset time period.
Within the preset time period, the Bluetooth function of second terminal is unavailable.Second terminal opens again except the preset time period
Use Bluetooth function.The problem that Bluetooth function unlocks trouble later can be disabled to avoid the second terminal as caused by maloperation.
In conjunction with Fig. 3, as shown in fig. 6, after step 104, this method further include:
Step 111, second terminal are identified according to verifying determines that first terminal is illegal terminal.
Specifically, legal verifying is identified write-in by writer when writer carries out writing card to the second smart card
Into the second smart card.Second terminal identifies that the verifying in the first data identifies whether the legal verifying being previously written for writer
Mark.If the verifying mark in the first data is not the legal verifying mark that writer is previously written, second terminal determines the
One terminal is illegal terminal.
Illustratively, step 111 is carried out in detail so that legal verifying is identified as card feature string and the first smartcard identification as an example
It describes in detail bright:
When writer is to the first smart card and the second writing smart card.Phase is written for the first smart card and the second smart card
With the card feature string of (or corresponding).Legal smartcard identification namely the first smart card is written in writer in the second smart card
Mark.Legal smartcard identification namely the second smartcard identification is written in first intelligent card type by writer.
Second terminal judges the card feature string and second in verifying mark after decrypting the first data and being verified mark
Whether the card feature string being written into smart card identical (or corresponding), then judge verifying identify in smartcard identification whether be
Legal mark in above-mentioned legal logo collection.As the Ka Te being written into the card feature string and the second smart card in verifying mark
Sign string is identical (or corresponding), and verifying the smartcard identification in mark is the legal mark in above-mentioned legal logo collection.Second
Terminal determines that first terminal is legal terminal.Other any case, second terminal determine that first terminal is illegal terminal.
Step 112, when second terminal determine illegal terminal access number be greater than or equal to second threshold when, second terminal
Disable the Bluetooth function of second terminal.
The implementation of the step is similar to step 110.It is not repeating herein.
In a kind of implementation of the embodiment of the present application, the first data are encrypted with above-mentioned symmetric key,
It include public key and verifying mark in first data.And the legal mark Shi Caihui that verifying is identified as in above-mentioned legal logo collection recognizes
It is legal terminal for first terminal.If the first data are unsatisfactory for above-mentioned condition, then it is assumed that first terminal is illegal terminal.
The embodiment of the present application can carry out functional module or function list to key sending device according to above method example
The division of member, for example, each functional module of each function division or functional unit can be corresponded to, it can also be by two or two
Above function is integrated in a processing module.Above-mentioned integrated module both can take the form of hardware realization, can also be with
It is realized in the form of software function module or functional unit.Wherein, module or unit are drawn in the embodiment of the present application
It is schematical for dividing, and only a kind of logical function partition, there may be another division manner in actual implementation.
As shown in fig. 7, this application provides a kind of key sending devices, the first terminal applied to above-mentioned Internet of things system
In, there is the first smart card, first smart card is matched with the second smart card in second terminal, institute in the first terminal
Stating has public key in the first smart card, described device includes:
Processing unit 701 obtains the first data for encrypting the public key and verifying mark;Wherein, the verifying mark
For determining whether the first terminal is legal terminal, the public key is for decrypting encryption data.
Transmission unit 702, for whole to described second by the bluetooth connection between the first terminal and second terminal
End sends first data.
Optionally, also there is private key in first smart card.The device further include:
Processing unit 701 is also used to obtain the encryption data according to the private key encryption target data.
Transmission unit 702 is also used to send the encryption data to the second terminal.
As shown in figure 8, this application provides a kind of key sending devices, the second terminal applied to above-mentioned Internet of things system
In, there is the second smart card, second smart card is matched with the first smart card in first terminal in the second terminal.Institute
Stating device includes:
Receiving unit 801 passes through between the second terminal and the first terminal for receiving the first terminal
The first data that bluetooth connection is sent.
Processing unit 802 obtains public key and verifying mark for decrypting first data, and the verifying mark is for true
Whether the fixed first terminal is legal terminal.
The processing unit 802, being also used to identify the determining first terminal according to the verifying is legal terminal, described
The public key is stored in second smart card by second terminal.
Optionally, described device further include:
The processing unit 802 is also used to decrypt first data not successfully, then the failed decryption number of record.
The processing unit 802 is also used to disable institute when the failed decryption number is greater than or equal to first threshold
State the Bluetooth function of second terminal.
Optionally, described device further include:
The processing unit 802, being also used to identify the determining first terminal according to the verifying is illegal terminal.
The processing unit 802, be also used to determine the access number for the illegal terminal for accessing the second terminal be greater than or
When equal to second threshold, the Bluetooth function of the second terminal is disabled.
Optionally, described device further include:
Receiving unit 801 is also used to receive the encryption data from the first terminal, and the encryption data is by described
One terminal is obtained according to private key encryption target data.
The processing unit 802 is also used to the encryption data according to the public key decryptions and obtains the target data.
Fig. 9 is shown involved in above-described embodiment applied to the key hair in the first terminal of above-mentioned Internet of things system
Send another possible structural schematic diagram of device.The key sending device includes: processor 902 and communication interface 903.Processing
Device 902 is for carrying out control management to the movement of key sending device, for example, the step of above-mentioned processing unit 701 executes is executed,
And/or other processes for executing techniques described herein.Communication interface 903 is for supporting key sending device and other
The communication of network entity.For example, executing the step of above-mentioned transmission unit 702 executes, and/or for executing skill described herein
Other processes of art.Key sending device can also include memory 901 and bus 904, and memory 901 is for storing key hair
Send the program code and data of device.
Wherein, memory 901 can be the memory etc. in key sending device, which may include that volatibility is deposited
Reservoir, such as random access memory;The memory also may include nonvolatile memory, such as read-only memory, quick flashing
Memory, hard disk or solid state hard disk;The memory can also include the combination of the memory of mentioned kind.
Above-mentioned processor 902 can be realization or execute to combine and various illustratively patrols described in present disclosure
Collect box, module and circuit.The processor can be central processing unit, general processor, digital signal processor, dedicated integrated
Circuit, field programmable gate array or other programmable logic device, transistor logic, hardware component or it is any
Combination.It, which may be implemented or executes, combines various illustrative logic blocks, module and electricity described in present disclosure
Road.The processor be also possible to realize computing function combination, such as comprising one or more microprocessors combine, DSP and
The combination etc. of microprocessor.
Bus 904 can be expanding the industrial standard structure (Extended Industry Standard
Architecture, EISA) bus etc..Bus 904 can be divided into address bus, data/address bus, control bus etc..For convenient for table
Show, only indicated with a thick line in Fig. 9, it is not intended that an only bus or a type of bus.
Figure 10 is shown involved in above-described embodiment applied to the key in the first terminal of above-mentioned Internet of things system
The possible structural schematic diagram of another of sending device.The key sending device includes: processor 1002 and communication interface 1003.
Processor 1002 is for carrying out control management to the movement of key sending device, for example, executing what above-mentioned processing unit 802 executed
Step, and/or other processes for executing techniques described herein.Communication interface 1003 is for supporting key sending device
With the communication of other network entities.For example, executing the step of above-mentioned receiving unit 801 executes, and/or retouched herein for executing
The other processes for the technology stated.Key sending device can also include memory 1001 and bus 1004, and memory 1001 is used for
Store the program code and data of key sending device.
Wherein, memory 1001 can be the memory etc. in key sending device, which may include volatibility
Memory, such as random access memory;The memory also may include nonvolatile memory, such as read-only memory, fastly
Flash memory, hard disk or solid state hard disk;The memory can also include the combination of the memory of mentioned kind.
Above-mentioned processor 1002 can be realization or execute various illustrative in conjunction with described in present disclosure
Logic block, module and circuit.The processor can be central processing unit, general processor, digital signal processor, dedicated collection
At circuit, field programmable gate array or other programmable logic device, transistor logic, hardware component or its
Meaning combination.Its may be implemented or execute combine present disclosure described in various illustrative logic blocks, module and
Circuit.The processor is also possible to realize the combination of computing function, such as combines comprising one or more microprocessors, DSP
With the combination of microprocessor etc..
Bus 1004 can be expanding the industrial standard structure (Extended Industry Standard
Architecture, EISA) bus etc..Bus 1004 can be divided into address bus, data/address bus, control bus etc..For convenient for
It indicates, is only indicated with a thick line in Figure 10, it is not intended that an only bus or a type of bus.
Through the above description of the embodiments, it is apparent to those skilled in the art that, for description
It is convenienct and succinct, only the example of the division of the above functional modules, in practical application, can according to need and will be upper
It states function distribution to be completed by different functional modules, i.e., the internal structure of device is divided into different functional modules, to complete
All or part of function described above.The specific work process of the system, apparatus, and unit of foregoing description, before can referring to
The corresponding process in embodiment of the method is stated, details are not described herein.
The embodiment of the present application provides a kind of computer program product comprising instruction, when the computer program product is being counted
When being run on calculation machine, so that the computer executes key sending method described in above method embodiment.
The embodiment of the present application also provides a kind of computer readable storage medium, and finger is stored in computer readable storage medium
It enables, when described instruction is run on computers, so that the computer executes method flow shown in above method embodiment
In key sending method.
Wherein, computer readable storage medium, such as electricity, magnetic, optical, electromagnetic, infrared ray can be but not limited to or partly led
System, device or the device of body, or any above combination.The more specific example of computer readable storage medium is (non-poor
The list of act) it include: the electrical connection with one or more conducting wires, portable computer diskette, hard disk, random access memory
(Random Access Memory, RAM), read-only memory (Read-Only Memory, ROM), erasable type may be programmed read-only
It is memory (Erasable Programmable Read Only Memory, EPROM), register, hard disk, optical fiber, portable
Compact disc read-only memory (Compact Disc Read-Only Memory, CD-ROM), light storage device, magnetic memory
The computer readable storage medium of part or above-mentioned any appropriate combination or any other form well known in the art.
A kind of illustrative storage medium is coupled to processor, to enable a processor to from the read information, and can be to
Information is written in the storage medium.Certainly, storage medium is also possible to the component part of processor.Pocessor and storage media can be with
In application-specific IC (Application Specific Integrated Circuit, ASIC).In the application
In embodiment, computer readable storage medium can be any tangible medium for including or store program, which can be referred to
Enable execution system, device or device use or in connection.
The above, the only specific embodiment of the application, but the protection scope of the application is not limited thereto, it is any
Change or replacement within the technical scope of the present application should all be covered within the scope of protection of this application.Therefore, this Shen
Protection scope please should be subject to the protection scope in claims.
Claims (13)
1. a kind of key sending method, which is characterized in that be applied in first terminal, there is the first intelligence in the first terminal
Card, first smart card are matched with the second smart card in second terminal, have public key, the side in first smart card
Method includes:
The first terminal encrypts the public key and verifying mark, obtains the first data;Wherein, the verifying mark is for determining
Whether the first terminal is legal terminal, and the public key is for decrypting encryption data;
The first terminal sends institute to the second terminal by the bluetooth connection between the first terminal and second terminal
State the first data.
2. the method according to claim 1, wherein also having private key in first smart card;Described
One terminal sends first data to the second terminal by the bluetooth connection between the first terminal and second terminal
Later, the method also includes:
The first terminal obtains the encryption data according to the private key encryption target data;
The first terminal sends the encryption data to the second terminal.
3. a kind of key sending method, which is characterized in that be applied in second terminal, there is the second intelligence in the second terminal
Card, second smart card are matched with the first smart card in first terminal;The described method includes:
The second terminal receives the first terminal and passes through the bluetooth connection between the second terminal and the first terminal
The first data sent;
The second terminal decrypts first data and obtains public key and verifying mark, and the verifying is identified for determining described the
Whether one terminal is legal terminal;
The second terminal determines that the first terminal is legal terminal according to verifying mark, and the second terminal will be described
Public key is stored in second smart card.
4. according to the method described in claim 3, it is characterized in that, receiving the first terminal in the second terminal passes through institute
After the first data for stating the bluetooth connection transmission between second terminal and the first terminal, further includes:
The second terminal decrypts first data, the failed decryption number of second terminal record not successfully;
When the failed decryption number is greater than or equal to first threshold, the second terminal disables the indigo plant of the second terminal
Tooth function.
5. according to the method described in claim 3, it is characterized in that, decrypting first data in the second terminal obtains public affairs
After key and verifying mark, further includes:
The second terminal determines that the first terminal is illegal terminal according to verifying mark;
When the second terminal determines that the access number for accessing the illegal terminal of the second terminal is greater than or equal to second threshold
When, the second terminal disables the Bluetooth function of the second terminal.
6. according to the described in any item methods of claim 3-5, which is characterized in that store the public key in the second terminal
After in second smart card, further includes:
The second terminal receives the encryption data from the first terminal, the encryption data by the first terminal according to
Private key encryption target data obtains;
Second terminal encryption data according to the public key decryptions obtains the target data.
7. a kind of key sending device, which is characterized in that be applied in first terminal, there is the first intelligence in the first terminal
Card, first smart card are matched with the second smart card in second terminal, have public key, the dress in first smart card
It sets and includes:
Processing unit obtains the first data for encrypting the public key and verifying mark;Wherein, the verifying mark is for true
Whether the fixed first terminal is legal terminal, and the public key is for decrypting encryption data;
Transmission unit, for sending institute to the second terminal by the bluetooth connection between the first terminal and second terminal
State the first data.
8. a kind of key sending device, which is characterized in that be applied in second terminal, there is the second intelligence in the second terminal
Card, second smart card are matched with the first smart card in first terminal;Described device includes:
Receiving unit passes through the bluetooth connection between the second terminal and the first terminal for receiving the first terminal
The first data sent;
Processing unit obtains public key and verifying mark for decrypting first data, and verifying mark is for described in determining
Whether first terminal is legal terminal;
The processing unit, being also used to identify the determining first terminal according to the verifying is legal terminal, and described second eventually
The public key is stored in second smart card by end.
9. device according to claim 8, which is characterized in that described device further include:
The processing unit is also used to decrypt first data not successfully, records failed decryption number;
The processing unit is also used to when the failed decryption number is greater than or equal to first threshold, disabling described second
The Bluetooth function of terminal.
10. device according to claim 8, which is characterized in that described device further include:
The processing unit, being also used to identify the determining first terminal according to the verifying is illegal terminal;
The processing unit is also used to determine that the access number for the illegal terminal for accessing the second terminal is greater than or equal to second
When threshold value, the Bluetooth function of the second terminal is disabled.
11. a kind of key sends system characterized by comprising first terminal and second terminal, the first terminal and second
There is bluetooth connection between terminal;Wherein, the first terminal requires the described in any item keys of 1-2 to send for perform claim
Method;The second terminal requires the described in any item key sending methods of 3-6 for perform claim.
12. a kind of key sending device characterized by comprising processor and communication interface;The communication interface and the place
Device coupling is managed, the processor is for running computer program or instruction, to realize as claim 1-2 is described in any item close
Key sending method;Or realize such as the described in any item key sending methods of claim 3-6.
13. a kind of computer readable storage medium, instruction is stored in the computer readable storage medium, which is characterized in that
When described instruction is run at the terminal, so that the terminal executes such as the described in any item key senders of claim 1-2
Method;Or execute such as the described in any item key sending methods of claim 3-6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910403815.7A CN110266474A (en) | 2019-05-15 | 2019-05-15 | Key sending method, apparatus and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910403815.7A CN110266474A (en) | 2019-05-15 | 2019-05-15 | Key sending method, apparatus and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110266474A true CN110266474A (en) | 2019-09-20 |
Family
ID=67914697
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910403815.7A Pending CN110266474A (en) | 2019-05-15 | 2019-05-15 | Key sending method, apparatus and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110266474A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109412810A (en) * | 2019-01-03 | 2019-03-01 | 李维刚 | A kind of key generation method based on mark |
CN111092884A (en) * | 2019-12-16 | 2020-05-01 | 中国南方电网有限责任公司 | Method and device for publishing and subscribing service data and computer equipment |
CN112258699A (en) * | 2020-10-10 | 2021-01-22 | 上海擎感智能科技有限公司 | Vehicle key and control method |
CN112887948A (en) * | 2021-01-15 | 2021-06-01 | 英华达(上海)科技有限公司 | Method and system for binding Bluetooth device |
CN112989370A (en) * | 2021-02-09 | 2021-06-18 | 腾讯科技(深圳)有限公司 | Secret key filling method, system, device, equipment and storage medium |
CN113329386A (en) * | 2021-06-11 | 2021-08-31 | 北京智芯微电子科技有限公司 | Bluetooth pairing method supporting identity authentication, security chip and Bluetooth module |
WO2023039900A1 (en) * | 2021-09-18 | 2023-03-23 | 华为技术有限公司 | Key transmission method and apparatus |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102571702A (en) * | 2010-12-22 | 2012-07-11 | 中兴通讯股份有限公司 | Key generation method, system and equipment in Internet of things |
CN106603485A (en) * | 2016-10-31 | 2017-04-26 | 美的智慧家居科技有限公司 | Secret key negotiation method and device |
CN106656481A (en) * | 2016-10-28 | 2017-05-10 | 美的智慧家居科技有限公司 | Identity authentication method, apparatus and system |
US20170208049A1 (en) * | 2014-05-30 | 2017-07-20 | Beijing Qihoo Technology Company Limited | Key agreement method and device for verification information |
CN108809914A (en) * | 2017-05-05 | 2018-11-13 | 国民技术股份有限公司 | Access control method, device, terminal and Internet of Things house system |
CN108847930A (en) * | 2018-06-05 | 2018-11-20 | 深圳市中电数通智慧安全科技股份有限公司 | A kind of data transmission method, device and fire-fighting system |
-
2019
- 2019-05-15 CN CN201910403815.7A patent/CN110266474A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102571702A (en) * | 2010-12-22 | 2012-07-11 | 中兴通讯股份有限公司 | Key generation method, system and equipment in Internet of things |
US20170208049A1 (en) * | 2014-05-30 | 2017-07-20 | Beijing Qihoo Technology Company Limited | Key agreement method and device for verification information |
CN106656481A (en) * | 2016-10-28 | 2017-05-10 | 美的智慧家居科技有限公司 | Identity authentication method, apparatus and system |
CN106603485A (en) * | 2016-10-31 | 2017-04-26 | 美的智慧家居科技有限公司 | Secret key negotiation method and device |
CN108809914A (en) * | 2017-05-05 | 2018-11-13 | 国民技术股份有限公司 | Access control method, device, terminal and Internet of Things house system |
CN108847930A (en) * | 2018-06-05 | 2018-11-20 | 深圳市中电数通智慧安全科技股份有限公司 | A kind of data transmission method, device and fire-fighting system |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109412810A (en) * | 2019-01-03 | 2019-03-01 | 李维刚 | A kind of key generation method based on mark |
CN111092884A (en) * | 2019-12-16 | 2020-05-01 | 中国南方电网有限责任公司 | Method and device for publishing and subscribing service data and computer equipment |
CN112258699A (en) * | 2020-10-10 | 2021-01-22 | 上海擎感智能科技有限公司 | Vehicle key and control method |
CN112887948A (en) * | 2021-01-15 | 2021-06-01 | 英华达(上海)科技有限公司 | Method and system for binding Bluetooth device |
CN112887948B (en) * | 2021-01-15 | 2023-04-18 | 英华达(上海)科技有限公司 | Method and system for binding Bluetooth device |
CN112989370A (en) * | 2021-02-09 | 2021-06-18 | 腾讯科技(深圳)有限公司 | Secret key filling method, system, device, equipment and storage medium |
CN112989370B (en) * | 2021-02-09 | 2023-06-30 | 腾讯科技(深圳)有限公司 | Key filling method, system, device, equipment and storage medium |
CN113329386A (en) * | 2021-06-11 | 2021-08-31 | 北京智芯微电子科技有限公司 | Bluetooth pairing method supporting identity authentication, security chip and Bluetooth module |
CN113329386B (en) * | 2021-06-11 | 2023-03-31 | 北京智芯微电子科技有限公司 | Bluetooth pairing method supporting identity authentication, security chip and Bluetooth module |
WO2023039900A1 (en) * | 2021-09-18 | 2023-03-23 | 华为技术有限公司 | Key transmission method and apparatus |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110266474A (en) | Key sending method, apparatus and system | |
KR101510784B1 (en) | Method of secure personalization of a nfc chipset | |
CN106161359B (en) | It authenticates the method and device of user, register the method and device of wearable device | |
CN1708942B (en) | Secure implementation and utilization of device-specific security data | |
US20210004454A1 (en) | Proof of affinity to a secure event for frictionless credential management | |
CN109327314A (en) | Access method, device, electronic equipment and the system of business datum | |
CN107959686B (en) | A kind of Internet of Things security certification system and authentication method | |
US9253167B2 (en) | Device and system for facilitating communication and networking within a secure mobile environment | |
US11277444B2 (en) | System-on-chip for performing virtual private network function and system including the same | |
CN109067528A (en) | Crypto-operation, method, cryptographic service platform and the equipment for creating working key | |
CN101300808A (en) | Method and arrangement for secure autentication | |
CN109816383A (en) | A kind of block chain endorsement method, block chain wallet and block chain | |
CN105282179A (en) | Family Internet of things security control method based on CPK | |
CN107017997A (en) | A kind of auth method, reader and label | |
CN110290134A (en) | A kind of identity identifying method, device, storage medium and processor | |
CN106465104A (en) | Key sharing method and device | |
CN101944216A (en) | Two-factor online transaction safety authentication method and system | |
CN109903052A (en) | A kind of block chain endorsement method and mobile device | |
Park et al. | Secure profile provisioning architecture for embedded UICC | |
WO2021007472A1 (en) | Methods and systems for securing and utilizing a personal data store on a mobile device | |
CN101587458A (en) | Operation method and device for intelligent storing card | |
US9154481B1 (en) | Decryption of a protected resource on a cryptographic device using wireless communication | |
CN110100411B (en) | Cryptographic system management | |
CN112862481A (en) | Block chain digital asset key management method and system based on SIM card | |
Bolhuis | Using an NFC-equipped mobile phone as a token in physical access control |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190920 |
|
RJ01 | Rejection of invention patent application after publication |