WO2014071886A1 - 一种信息配置方法、设备及系统 - Google Patents

一种信息配置方法、设备及系统 Download PDF

Info

Publication number
WO2014071886A1
WO2014071886A1 PCT/CN2013/086879 CN2013086879W WO2014071886A1 WO 2014071886 A1 WO2014071886 A1 WO 2014071886A1 CN 2013086879 W CN2013086879 W CN 2013086879W WO 2014071886 A1 WO2014071886 A1 WO 2014071886A1
Authority
WO
WIPO (PCT)
Prior art keywords
authentication information
key
access
uplink
key authentication
Prior art date
Application number
PCT/CN2013/086879
Other languages
English (en)
French (fr)
Inventor
庞高昆
丁志明
方平
Original Assignee
华为终端有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为终端有限公司 filed Critical 华为终端有限公司
Publication of WO2014071886A1 publication Critical patent/WO2014071886A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/37Managing security policies for mobile devices or for controlling mobile applications

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to an information configuration method, device, and system.
  • the main operations of the existing WiFi protected setup include: 1. Establishing an initial wireless network; 2. Adding new devices to the wireless network.
  • the WPS architecture consists of three components: the application terminal (called enrollee in WPS), the registrar (registrar), and the access point (AP, Access Point); the AP is the infrastructure of the WLAN, ie: 802.11-enabled. Access point;
  • the registrar is a device that manages network establishment, adds/deletes application terminals, and the registrar can be integrated with an access point or by an external device such as a mobile phone or a computer.
  • a personal identifier number (PIN) identification method can be used to connect to a wireless network.
  • PIN personal identifier number
  • a scenario is assumed: The user has a mobile phone (integrated with the role of an external registrar and an application terminal) ), an AP, want to build a wireless LAN. After the AP is powered on, the mobile phone can automatically detect the AP and ask the user whether to install the AP. After the user confirms the installation, the mobile phone prompts the user to input the AP's PIN (labeled on a label on the AP), the user inputs After the PIN, the default configuration process starts between the AP and the mobile phone. After the configuration is completed, the mobile phone display configuration is successful.
  • the user After the initial wireless network is established, the user needs to add a wireless printer to the network, after the wireless printer is powered on, the mobile phone A new wireless device is detected, prompting the user to add it to the network. After the user confirms the addition, the user needs to input the PIN of the wireless printer in the mobile phone, and the AP, the mobile phone and the wireless printer start the default configuration process, and finally the mobile phone and The wireless printer is prompted to join successfully.
  • the inventors of the present invention have found that in the prior art, the network information is configured by inputting a PIN, which complicates the user operation.
  • the embodiments of the present invention provide an information configuration method, which can reduce user operation difficulty and improve user experience.
  • a first aspect of the embodiments of the present invention provides an information configuration method, which is applied to an access device that is connected to an access device and a terminal to be configured.
  • the method includes:
  • the uplink first key authentication information that is forwarded by the accessing device, verifying the uplink first key authentication information, and transmitting, after the verification is passed, to the to-be-configured terminal
  • the configuration information of the first key is encrypted, so that the terminal to be configured establishes a secure connection with the access device by using the configuration information, and the uplink first key authentication information is calculated by using the first key.
  • Certification information or,
  • the access device is configured to validate the configuration information, so that the to-be-configured terminal establishes a secure connection with the access device by using the configuration information;
  • the access accessory device sends the configuration information to the to-be-configured terminal, so that the to-be-configured terminal establishes a secure connection with the access device by using the configuration information.
  • the access device shares a second key with the access accessory device
  • the sending the downlink first key authentication information to the access accessory device includes: sending the downlink first key authentication information encrypted by using the second key to the access accessory device.
  • the verifying, by the access accessory device, the uplink first key authentication information sent by the to-be-configured terminal Specifically, including:
  • the access accessory device Sending the expected uplink first key authentication information to the access accessory device, and causing the access accessory device to receive the received uplink first key authentication information and the expected uplink first key authentication information. If the uplink first key authentication information is the expected uplink first key authentication information, the access accessory device verifies that the uplink first key authentication information passes.
  • the configuration information is sent to the standby device by using the access accessory device After configuring the terminal, it also includes:
  • the access device and the access accessory device are wired
  • the communication between the to-be-configured terminal and the access accessory device is communicated in a short-range manner or in a wired manner.
  • the second aspect of the embodiments of the present invention provides an information configuration method, which is applied to a terminal to be configured that communicates with an access device and an access accessory device, where the method includes:
  • the key authentication information is the authentication information calculated by using the first key; or receiving configuration information encrypted by using the first key and sent by the access device, and sending the uplink to the access accessory device And the first key authentication information, and the uplink first key authentication information is forwarded to the access device by the access accessory device, so that the access device verifies the uplink first key authentication information And validating the configuration information after the verification is passed; or
  • the determining, by the accessing device, the uplink first key authentication information specifically includes:
  • the access accessory device matches the uplink first key authentication information with the expected uplink first key authentication information, if the uplink first key authentication information is the expected uplink first secret In the case of the key authentication information, the access accessory device verifies that the uplink first key authentication information passes; the expected uplink first key authentication information is sent to the access accessory device in advance by the access device. of.
  • the access device and the access accessory device communicate by wire, and the to-be-configured terminal and the access accessory device communicate in a short-distance manner or in a wired manner.
  • a third aspect of the embodiments of the present invention provides an information configuration method, which is applied to an access accessory device that communicates with an access device and a terminal to be configured, and the access device and the to-be-configured terminal are negotiated to generate a key exchange algorithm.
  • the first key the method includes:
  • the The to-be-configured terminal sends the configuration information that is encrypted by using the first key, so that the to-be-configured terminal establishes a secure connection with the access device by using the configuration information, where the uplink first key authentication information is used. Defining the authentication information calculated by the first key; or
  • the verifying the uplink first key authentication information that is sent by the to-be-configured terminal includes: Receiving the expected uplink first key authentication information sent by the access device, and matching the received uplink first key authentication information with the expected uplink first key authentication information, if When the uplink first key authentication information is the expected uplink first key authentication information, the uplink first key authentication information is verified to pass.
  • the access device and the access accessory device communicate by wire, and the terminal to be configured Communicating in a short-range manner or in a wired manner with the access accessory device.
  • a fourth aspect of the embodiments of the present invention provides an access device, which is in communication with an access accessory device and a to-be-configured terminal, where the access device includes:
  • a first key generating unit configured to negotiate with the to-be-configured terminal to generate a first key by using a key exchange algorithm
  • a first sending unit configured to send downlink first key authentication information to the access accessory device, and forward the downlink first key authentication information to the to-be-configured terminal by using the access accessory device, thereby enabling And the downlink first key authentication information is the authentication information calculated by using the first key generated by the first key generating unit;
  • a first processing unit configured to: after the first sending unit sends the downlink first key authentication information, receive the uplink first key authentication information that is forwarded by the terminal to be configured by using the access accessory device, where And verifying the uplink first key authentication information, and sending the configuration information encrypted by using the first key to the to-be-configured terminal after the verification is passed, so that the to-be-configured terminal uses the configuration information and the
  • the access device establishes a secure connection, and the uplink first key authentication information is the authentication information calculated by using the first key; or
  • the first processing unit is configured to: after the first sending unit sends the downlink first key authentication information, send configuration information encrypted by using the first key to the to-be-configured terminal, and verify the location Determining, by the configuration terminal, the uplink first key authentication information that is forwarded by the access terminal device, if the verification is successful, the configuration information is validated, so that the to-be-configured terminal uses the configuration information and the connection Enter a secure connection to the device; or,
  • a second processing unit configured to send the downlink first key authentication in the first sending unit After the information is sent, the configuration information encrypted by using the first key is sent to the to-be-configured terminal, and the uplink first key authentication information sent by the to-be-configured terminal is verified by the access accessory device. And the configuration information is validated by the accessing device, so that the to-be-configured terminal establishes a secure connection with the access device by using the configuration information; or, the second processing unit is used to After the first sending unit sends the downlink first key authentication information, send configuration information encrypted by using the first key to the access accessory device, and verify the to-be-configured by using the access accessory device.
  • the uplink first key authentication information sent by the terminal if the verification is passed, the configuration information is sent to the to-be-configured terminal by the access accessory device, so that the to-be-configured terminal uses the configuration information and the The access device establishes a secure connection.
  • the second processing unit includes a first sub processing unit
  • the first sub-processing unit is configured to send the expected uplink first key authentication information to the access accessory device, so that the access accessory device receives the received uplink first key authentication information and The expected uplink first key authentication information is matched, and if the uplink first key authentication information is the expected uplink first key authentication information, the access accessory device verifies the uplink A key authentication message is passed.
  • the second processing unit is further configured to verify, by the access accessory device, the uplink A key authentication information is validated if the verification is passed.
  • the access device and the access accessory device communicate by using a wired manner
  • the short-range communication or the wired communication is performed between the configuration terminal and the access accessory device.
  • a fifth aspect of the embodiments of the present invention provides a terminal to be configured, which is in communication with an access device and an access accessory device, where the terminal to be configured includes:
  • a second key generating unit configured to negotiate with the access device to generate a first key by using a key exchange algorithm
  • a first receiving unit configured to receive the access device by using the access device And performing the first key authentication information, where the downlink first key authentication information is the authentication information calculated by using the first key generated by the second key generating unit;
  • a first verification unit configured to verify downlink first key authentication information received by the first receiving unit
  • a third processing unit configured to send uplink first key authentication information to the access accessory device after the first verification unit verifies the downlink first key authentication information, and pass the access accessory device Forwarding the uplink first key authentication information to the access device, so that the access device verifies the uplink first key authentication information, and receiving the access device to verify the uplink first secret
  • the configuration information that is encrypted by the first key is sent by the key authentication information, and the uplink first key authentication information is the authentication information calculated by using the first key; or
  • the third processing unit is configured to: after the first verification unit verifies the downlink first key authentication information, receive configuration information that is sent by the access device and is encrypted by using the first key, and Sending the uplink first key authentication information to the access accessory device, and forwarding the uplink first key authentication information to the access device by using the access accessory device, so that the access device is verified Upgoing the first key authentication information, and validating the configuration information after the verification is passed; or
  • a fourth processing unit configured to: after the first verification unit verifies the downlink first key authentication information, receive configuration information that is sent by the access device and encrypted by using the first key, and The access accessory device sends the uplink first key authentication information, so that the access accessory device verifies the uplink first key authentication information, and validates the configuration information after the verification is passed; or
  • the fourth processing unit is configured to: after the first verification unit verifies the downlink first key authentication information, send uplink first key authentication information to the access accessory device, so that the access The accessory device verifies the uplink first key authentication information, and receives configuration information that is encrypted by using the first key after the uplink accessory first authentication information is verified by the access accessory device, where the The configuration information of the first key encryption is sent to the access accessory device in advance by the access device;
  • a first connection establishing unit configured to use the third processing unit or the fourth processing order
  • the configuration information sent by the element establishes a secure connection with the access device.
  • the fourth processing unit includes a second sub processing unit
  • the second sub-processing unit is configured to send the uplink first key authentication information to the access accessory device, so that the access accessory device sends the uplink first key authentication information and the expected uplink The key authentication information is matched. If the uplink first key authentication information is the expected uplink first key authentication information, the access accessory device verifies that the uplink first key authentication information is passed. And the expected uplink first key authentication information is sent to the access accessory device in advance by the access device.
  • the access device and the access accessory device communicate by wire, and the terminal to be configured Communicating in a short-range manner or in a wired manner with the access accessory device.
  • a sixth aspect of the embodiments of the present invention provides an access accessory device, which is in communication with an access device and a to-be-configured terminal, and the access device and the to-be-configured terminal negotiate a key exchange algorithm to generate a first key.
  • the access accessory devices include:
  • a second receiving unit configured to receive downlink first key authentication information that is sent by the access device to the to-be-configured terminal, where the downlink first key authentication information is an authentication calculated by using the first key Information
  • a second sending unit configured to forward the downlink first key authentication information that is received by the second receiving unit, to enable the terminal to be configured to verify the downlink first key authentication information
  • a fifth processing unit configured to: after the second sending unit forwards the downlink first key authentication information, receive and forward the uplink first key authentication information that is sent by the terminal to be sent to the access device, where In order to enable the access device to verify the uplink first key authentication information, and send the configuration information encrypted by using the first key to the to-be-configured terminal after the verification is passed, so that the to-be-configured terminal uses The configuration information is established with the access device, and the uplink first key authentication information is the authentication information calculated by using the first key; or the fifth processing unit is used for After the second sending unit forwards the downlink first key authentication information, it receives and forwards the uplink sent by the to-be-configured terminal to the access device.
  • the access device verifies the uplink first key authentication information after transmitting the configuration information encrypted by using the first key to the to-be-configured terminal, and after the verification is passed,
  • the configuration information is valid, so that the to-be-configured terminal establishes a secure connection with the access device by using the configuration information;
  • a sixth processing unit configured to: after the second sending unit forwards the downlink first key authentication information, receive and verify the uplink first key authentication information sent by the to-be-configured terminal, after the verification is passed, The configuration information of the first key encryption is valid, so that after the configuration information sent by the access device is received and the configuration information is valid, the configuration terminal uses the configuration information and the connection Enter a secure connection to the device; or,
  • the sixth processing unit is configured to: after the second sending unit forwards the downlink first key authentication information, receive configuration information that is sent by the access device and is encrypted by using the first key, and receive And verifying the uplink first key authentication information sent by the terminal to be configured, and sending the configuration information to the to-be-configured terminal after the verification is passed, so that the to-be-configured terminal uses the configuration information and the connection Enter a secure connection to the device.
  • the sixth processing unit includes a third sub processing unit,
  • the third sub-processing unit is configured to receive the expected uplink first key authentication information sent by the access device, and send the received uplink first key authentication information and the expected uplink The first key authentication information is matched. If the uplink first key authentication information is the expected uplink first key authentication information, the uplink first key authentication information is verified to pass.
  • the access device and the access accessory device communicate by using a wired manner, where the terminal to be configured is configured Communicating in a short-range manner or in a wired manner with the access accessory device.
  • a seventh aspect of the embodiments of the present invention provides an information configuration system, including: an access device, an access accessory device, and a to-be-configured terminal, and a communication connection between the access device, the access accessory device, and the terminal to be configured.
  • the access device is the access device described in the foregoing technical solution, where the terminal to be configured is The terminal to be configured as described in the technical solution, the access accessory device is the access accessory device described in the above technical solution.
  • the access device and the access accessory device communicate by wire.
  • the access accessory device communicates with the to-be-configured terminal in a short-range wireless manner or a wired manner.
  • the information configuration method provided by the embodiment of the present invention, after the access device negotiates with the to-be-configured terminal to generate the first key, after the downlink authentication of the terminal to be configured, the uplink authentication of the access device or the accessory device, the terminal to be configured
  • the configuration information encrypted with the first key is used to establish a connection with the access device.
  • the solution for completely establishing the connection between the devices is compared with the manual input of the PIN in the prior art, and the user does not need to manually input the user, thereby reducing the operation difficulty of the user. Improve the user experience.
  • FIG. 1 is a schematic diagram of an embodiment of an information configuration method according to an embodiment of the present invention
  • FIG. 2 is a schematic diagram of another embodiment of an information configuration method according to an embodiment of the present invention
  • FIG. 4 is a schematic diagram of an embodiment of an application scenario according to an embodiment of the present invention
  • FIG. 5 is a schematic diagram of another application scenario in the embodiment of the present invention.
  • FIG. 6 is a schematic diagram of another application scenario in the embodiment of the present invention.
  • FIG. 7 is a schematic diagram of another application scenario in the embodiment of the present invention.
  • FIG. 8 is a schematic diagram of an embodiment of an access device according to an embodiment of the present invention.
  • FIG. 9 is a schematic diagram of another embodiment of an access device according to an embodiment of the present invention.
  • FIG. 10 is a schematic diagram of an embodiment of a terminal to be configured in an embodiment of the present invention.
  • FIG. 11 is a schematic diagram of another embodiment of a terminal to be configured in an embodiment of the present invention.
  • FIG. 12 is a schematic diagram of an embodiment of an access accessory device according to an embodiment of the present invention.
  • FIG. 13 is a schematic diagram of another embodiment of an access accessory device according to an embodiment of the present invention.
  • FIG. 14 is a schematic diagram of another embodiment of an access device according to an embodiment of the present invention.
  • FIG. 15 is a schematic diagram of another embodiment of a terminal to be configured in an embodiment of the present invention.
  • 16 is a schematic diagram of another embodiment of an access accessory device according to an embodiment of the present invention.
  • FIG. 17 is a schematic diagram of an embodiment of an information configuration system in an embodiment of the present invention.
  • the embodiment of the present invention provides an information configuration method, which can reduce user operation difficulty and improve network security. The details are described below separately.
  • the access device in the embodiment of the present invention may be a router, a modem, and the terminal to be configured may be a mobile phone, a computer, a wireless printer, etc., and the access accessory device may be a smart card having a communication function, and the terminal to be configured in the present invention may also be configured. With the function of the access device, the access device may also have the function of the terminal to be configured.
  • the access device, the access accessory device, and the to-be-configured terminal communication connection in the following embodiments of the present invention the access device and the access accessory device may communicate by wire, and the access accessory device and the device
  • the configuration terminal can communicate by short-range wireless or wired mode, and the access device and the to-be-configured terminal can communicate by wireless;
  • the wired communication can be through a universal serial bus (USB, Universal Serial BUS)
  • the mode communication, the near-major wireless communication may be a near field communication (NFC) communication, and the wireless communication may be a wireless fidelity (WiFi) communication.
  • NFC near field communication
  • WiFi wireless fidelity
  • the access device and the access accessory device communicate by wire, which can prevent an intermediary from attacking, and prevent the transmission data of the access device and the access accessory device from being eavesdropped by the attacker, and preventing the attacker from accessing the accessory device.
  • the access accessory device and the to-be-configured terminal may communicate in a short-range wireless manner such as NFC communication, or reduce the power so that the WiFi communication mode can only communicate in a very close range, such as 1 meter, because two One It is difficult for a device to exchange messages within a very close distance and it is difficult to be attacked by a middleman, which can improve security.
  • an embodiment of an information configuration method provided by an embodiment of the present invention is applied to an access device that is configured to communicate with an access device and a terminal to be configured.
  • the access device and the to-be-configured terminal negotiate to generate a first key by using a key exchange algorithm.
  • the access device and the to-be-configured terminal may pass a key exchange algorithm, such as:
  • Diffie-Hellman Diffie-Hellman, DH key exchange protocol, public key encryption algorithm (such as: Ron Rivest, Adi Shamirh, LenAdleman, RSA) protocol or elliptic curve encryption EIGamal protocol, etc. negotiate the first key.
  • public key encryption algorithm such as: Ron Rivest, Adi Shamirh, LenAdleman, RSA
  • elliptic curve encryption EIGamal protocol etc. negotiate the first key.
  • the first key generated by the negotiation of the above algorithms is known only to the access device and the terminal to be configured, and the other devices do not know the first key.
  • the access device sends the downlink first key authentication information to the access accessory device, and the downlink first key authentication information is forwarded to the to-be-configured terminal by the access accessory device, so that the The terminal to be configured is configured to verify the downlink first key authentication information, where the downlink first key authentication information is the authentication information calculated by using the first key; after performing step 102, steps 103, 104, and 105 are performed respectively. 106.
  • the key authentication information can have various generation methods, and one key can be used to encrypt a data, or a key can be used to perform a digest operation on a data.
  • the access device When the verification of the downlink first key authentication information is correct, the access device holds the same first key as the terminal to be configured, so as to confirm that the device identity of the other party is authentic.
  • the access device receives the uplink first key authentication information that is forwarded by the terminal to be configured by the access device, and verifies the uplink first key authentication information, and after the verification is passed, the to-be-configured Transmitting, by the terminal, the configuration information that is encrypted by using the first key, so that the to-be-configured terminal establishes a secure connection with the access device by using the configuration information, where the uplink first key authentication information is The authentication information calculated by a key.
  • the process of the step 103 is to send the uplink first key authentication information to the access accessory device after the terminal to be configured to verify the downlink first key authentication information, and after the access device verifies the uplink first key authentication information, If the uplink first key authentication information is verified, the access device sends the configuration information encrypted by using the first key to the to-be-configured terminal, so that the to-be-configured terminal uses the configuration information. Establishing a secure connection with the access device. The access device sends the configuration information that is encrypted by using the first key to the to-be-configured terminal, and verifies the uplink first key authentication information that is sent by the terminal to be configured by the access device. After the verification is passed, the configuration information is validated, so that the to-be-configured terminal establishes a secure connection with the access device by using the configuration information.
  • the process of the step 104 is that the access device can send the configuration information encrypted by using the first key to the terminal to be configured when the uplink first key authentication information is not received, and then receive the uplink first key authentication information. After the authentication of the first key authentication information is performed, the configuration information is validated after the authentication of the uplink first key authentication information is valid, and the configuration information is used by the terminal to be configured. The device establishes a secure connection.
  • the access device sends the configuration information encrypted by using the first key to the to-be-configured terminal, and the uplink first key authentication information sent by the terminal to be configured is verified by the access accessory device, if the verification is performed. And the configuration information is validated by the access accessory device, so that the to-be-configured terminal establishes a secure connection with the access device by using the configuration information.
  • step 105 After the terminal to be configured to verify that the downlink first key authentication information is passed, the access device directly sends configuration information encrypted by using the first key to the terminal to be configured, and the access device does not verify in step 105. Uplinking the first key authentication information, but verifying the uplink first key authentication information by the access accessory device, and after the verification is passed, the configuration information is validated by the access accessory device, so that the terminal to be configured uses the configuration. The information establishes a secure connection with the access device.
  • the embodiment of the present invention may further, after the terminal to be configured, verifies that the downlink first key authentication information is passed, the access device sends configuration information encrypted by using the first key to the access accessory device.
  • the configuration information is forwarded to the terminal to be configured by the access device, and the other processes are the same as those in step 105, and details are not described herein again.
  • the access device sends, to the access accessory device, configuration information that is encrypted by using the first key, and authenticates, by using the access accessory device, the uplink first key authentication information sent by the to-be-configured terminal, if After the verification is passed, the configuration information is sent to the to-be-configured terminal by the access accessory device, so that the to-be-configured terminal establishes a secure connection with the access device by using the configuration information.
  • step 106 After the terminal to be configured verifies that the downlink first key authentication information is passed, the access device sends configuration information encrypted by using the first key to the access accessory device, and the access device attaches After receiving the uplink first key authentication information sent by the terminal to be configured, the device verifies the uplink first key authentication information, and after the verification is passed, the configuration information is validated, and the effective configuration information is sent to The terminal to be configured.
  • the embodiment of the present invention is applied to an access device that communicates with an access device and a terminal to be configured, and the method includes: performing a first key exchange with the to-be-configured terminal through a key exchange algorithm;
  • the inbound device sends the downlink first key authentication information, and the downlink first key authentication information is forwarded to the to-be-configured terminal by the access accessory device, so that the to-be-configured terminal verifies the downlink first.
  • the downlink first key authentication information is authentication information calculated by using the first key, and receiving an uplink first key authentication that is forwarded by the terminal to be configured by the access accessory device And the information about the uplink first key authentication information is verified, and after the verification is passed, the configuration information encrypted by using the first key is sent to the to-be-configured terminal, so that the to-be-configured terminal uses the configuration information and
  • the access device establishes a secure connection, and the uplink first key authentication information is authentication information calculated by using the first key; or
  • the terminal sends the configuration information encrypted by using the first key, and verifies the uplink first key authentication information that is forwarded by the terminal to be configured by the access accessory device, and if the verification succeeds, the configuration information is obtained.
  • the to-be-configured terminal establishes a secure connection with the access device by using the configuration information; or sends configuration information encrypted by using the first key to the to-be-configured terminal, and passes the connection
  • the in-appliance device verifies the uplink first key authentication information sent by the to-be-configured terminal, and if the verification succeeds, the configuration information is validated by the access accessory device, so that the to-be-configured terminal uses the configuration information.
  • Establishing a secure connection with the access device or transmitting configuration information encrypted by using the first key to the access accessory device, and verifying, by using the access accessory device, the uplink sent by the to-be-configured terminal a key authentication information, if the verification is passed, sending the configuration information to the to-be-configured terminal by using the access accessory device,
  • the terminal to be configured using the configuration information and the access device establishes a secure connection.
  • the information configuration method provided by the embodiment of the present invention after the access device negotiates with the to-be-configured terminal to generate the first key, after the downlink authentication of the terminal to be configured, the uplink authentication of the access device or the accessory device, the terminal to be configured
  • the configuration information encrypted with the first key is used to establish a connection with the access device.
  • the network provided by the embodiment of the present invention completely completes the network access by the mutual interaction between the devices. Compared with the configuration of the network access information, the user does not need to manually input, which reduces the user's operation difficulty and improves the user experience. In the prior art, since the PIN is short, it consists of only 8 digits, which is easily attacked by brute force attacks, so the network The security is low. After the two-way uplink and downlink verification, the configuration information takes effect, which further improves the security of the network.
  • step 101 may be specifically performed after the access device receives the configuration request of the to-be-configured terminal.
  • the access device before the first key is generated, the access device may be connected to the The accessory device shares the second key;
  • the sending the downlink first key authentication information to the access accessory device may include: sending the downlink first key authentication information encrypted by using the second key to the access accessory device.
  • the verifying, by the accessing device, the uplink first key authentication information that is sent by the to-be-configured terminal which may include:
  • the access accessory device Sending the expected uplink first key authentication information to the access accessory device, and causing the access accessory device to receive the received uplink first key authentication information and the expected uplink first key authentication information. If the uplink first key authentication information is the expected uplink first key authentication information, the access accessory device verifies that the uplink first key authentication information passes.
  • the expected uplink first key authentication information may be sent to the access accessory device along with configuration information encrypted using the first key.
  • the configuration information is sent to the access accessory device by using the access accessory device.
  • the method further includes:
  • the access accessory device After the access accessory device verifies the uplink first key authentication information, the access device re-verifies the first key authentication information, thereby making the network more secure.
  • FIG. 2 another embodiment of the information configuration method provided by the embodiment of the present invention is applied to a to-be-configured terminal that is configured to communicate with an access device and an access accessory device, including:
  • the terminal to be configured and the access device negotiate to generate a first key by using a key exchange algorithm.
  • the access device and the to-be-configured terminal may pass a key exchange algorithm, such as: Diffie-Hellman, that is, DH key exchange protocol, public key encryption algorithm (eg, Ron Rivest, Adi Shamirh, LenAdleman, RSA) protocol or elliptic curve
  • a key exchange algorithm such as: Diffie-Hellman, that is, DH key exchange protocol, public key encryption algorithm (eg, Ron Rivest, Adi Shamirh, LenAdleman, RSA) protocol or elliptic curve
  • the first key is generated by negotiation such as encryption EIGalm protocol.
  • the first key generated by the negotiation of the above algorithms is known only to the access device and the terminal to be configured, and the other devices do not know the first key.
  • the terminal to be configured receives the downlink first key authentication information that is forwarded by the access device by using the access device, where the downlink first key authentication information is the authentication information calculated by using the first key.
  • the terminal to be configured verifies the downlink first key authentication information. After step 203, steps 204, 205, 206, or 207 are respectively performed, and after performing steps 204, 205, 206, or 207, respectively, 208 is performed.
  • the terminal to be configured sends the uplink first key authentication information to the access accessory device, and forwards the uplink first key authentication information to the access device by using the access accessory device, thereby
  • the access device verifies the uplink first key authentication information, and receives, by the access device, configuration information that is encrypted by using the first key after verifying that the uplink first key authentication information is passed.
  • the uplink first key authentication information is authentication information calculated using the first key.
  • the process of the step 204 is: after the terminal is configured to verify the downlink first key authentication information, the device sends the uplink first key authentication information to the access accessory device, and the access accessory device forwards the uplink first key authentication information to the access device. After the access device verifies the uplink first key authentication information, the access device receives the configuration information encrypted by the access device and encrypted by using the first key.
  • the terminal to be configured receives the first key encryption sent by the access device.
  • the configuration information is sent, and the uplink first key authentication information is sent to the access accessory device, and the uplink first key authentication information is forwarded to the access device by using the access accessory device, thereby
  • the access device verifies the uplink first key authentication information, and validates the configuration information after the verification is passed.
  • the process of the step 205 is: after the downlink terminal first authenticates the information, the terminal to be configured receives the configuration information encrypted by using the first key and then sends the uplink information to the access device.
  • the key authentication information is forwarded by the access accessory device to the access device, and the access device verifies the uplink first key authentication information, and after the verification is passed, the access device Make the configuration information take effect.
  • the terminal to be configured receives the configuration information that is sent by the access device and is encrypted by using the first key, and sends the uplink first key authentication information to the access accessory device, so that the access accessory is The device verifies the uplink first key authentication information, and validates the configuration information after the verification is passed.
  • the process of the step 206 is: after the downlink terminal first authenticates the downlink key authentication information, the terminal to be configured receives the configuration information encrypted by using the first key and then sends the uplink information to the access accessory device.
  • the key authentication information is verified by the access accessory device, and after the verification is passed, the configuration information is validated by the access accessory device.
  • the terminal to be configured may first receive the configuration information encrypted by using the first key sent by the access accessory device, and then access the accessory device.
  • the uplink first key authentication information is sent, and the uplink first key authentication information is verified by the access accessory device.
  • the configuration information is validated by the access accessory device.
  • the terminal to be configured sends the uplink first key authentication information to the access accessory device, so that the access accessory device verifies the uplink first key authentication information, and receives the access accessory device at the verification office.
  • the configuration information encrypted by using the first key sent after the uplink first key authentication information is sent, and the configuration information encrypted by using the first key is sent to the access device in advance by the access device.
  • step 207 the access device sends the configuration information encrypted by using the first key to the access accessory device in advance, and the terminal to be configured after attaching the downlink first key authentication information to the access terminal.
  • the device sends the uplink first key authentication information, and the access accessory device verifies the uplink first key authentication information. After the verification is passed, the configuration information is validated by the access accessory device.
  • the terminal to be configured establishes a secure connection with the access device by using the configuration information.
  • the method is applied to the to-be-configured terminal that communicates with the access device and the access accessory device, the method includes: performing, by using the key exchange algorithm, the first key to be negotiated with the access device; The downlink first key authentication information that is forwarded by the access device by using the access device, where the downlink first key authentication information is the authentication information calculated by using the first key; and verifying the downlink first key The authentication information is sent to the access accessory device, and the uplink first key authentication information is forwarded to the access device by using the access accessory device, so that the connection is performed.
  • the ingress device verifies the uplink first key authentication information, and receives the configuration information that is encrypted by using the first key, and the uplink information that is sent by the access device after verifying that the uplink first key authentication information is passed.
  • the first key authentication information is the authentication information calculated by using the first key; or receiving the configuration information sent by the access device and encrypted by using the first key And sending the uplink first key authentication information to the access accessory device, and forwarding the uplink first key authentication information to the access device by using the access accessory device, thereby enabling the access
  • the device verifies the uplink first key authentication information, and validates the configuration information after the verification is passed; or receives configuration information encrypted by using the first key and sent by the access device, and
  • the access accessory device sends the uplink first key authentication information, so that the access accessory device verifies the uplink first key authentication information, and validates the configuration information after the verification is passed; or
  • the access accessory device sends the uplink first key authentication information, so that the access accessory device verifies the uplink first key authentication information,
  • the information configuration method provided by the embodiment of the present invention after the access device negotiates with the to-be-configured terminal to generate the first key, after the downlink authentication of the terminal to be configured, the uplink authentication of the access device or the accessory device, the terminal to be configured
  • the configuration information encrypted with the first key is used to establish a connection with the access device.
  • the network provided by the embodiment of the present invention completely completes the network access by the mutual interaction between the devices. Compared with the configuration of the network access information, the user does not need to manually input, which reduces the user's operation difficulty and improves the user experience. In the prior art, since the PIN is short, it consists of only 8 digits, which is easily attacked by brute force attacks, so the network The security is low. After the two-way uplink and downlink verification, the configuration information takes effect, which further improves the security of the network.
  • the step 201 may specifically send a configuration request to the access device after the terminal to be configured, and the access device occurs after receiving the configuration request of the terminal to be configured.
  • the method for the access device to verify the uplink first key authentication information may specifically include:
  • the access accessory device matches the uplink first key authentication information with the expected uplink first key authentication information, if the uplink first key authentication information is the expected uplink first secret In the case of the key authentication information, the access accessory device verifies that the uplink first key authentication information passes; the expected uplink first key authentication information is sent to the access accessory device in advance by the access device. of.
  • the expected uplink first key authentication information may be sent by the access device to the access accessory device simultaneously with the to-be-configured information.
  • the access device is applied to the access device and the access device to be configured, and the access device and the to-be-configured terminal negotiate a key exchange algorithm to generate a first key, which is provided by the embodiment of the present invention.
  • Another embodiment of the information configuration method includes:
  • the access accessory device receives and forwards the downlink first key authentication information that is sent by the access device to the to-be-configured terminal, so that the to-be-configured terminal verifies the downlink first key authentication information key,
  • the downlink first key authentication information is authentication information calculated using the first key.
  • the access accessory device receives and forwards the uplink first key authentication information that is sent by the terminal to be sent to the access device, so that the access device verifies the uplink first key authentication information, and After the verification is performed, the configuration information that is encrypted by using the first key is sent to the to-be-configured terminal, so that the to-be-configured terminal establishes security with the access device by using the configuration information.
  • the uplink first key authentication information is the authentication information calculated by using the first key.
  • step 302 The process of step 302 is: the access accessory device receives the uplink first key authentication information sent by the to-be-configured terminal, and then forwards the uplink first key authentication information to the access device, where the access device verifies the Upgoing the first key authentication information, and after the verification is passed, the access device sends the configuration information encrypted by using the first key to the to-be-configured terminal, so that the to-be-configured terminal uses the configuration information and The access device establishes a secure connection, and the uplink first key authentication information is authentication information calculated by using the first key.
  • the access accessory device receives and forwards the uplink first key authentication information that is sent by the terminal to be sent to the access device, so that the access device sends the first use to the to-be-configured terminal.
  • the uplink first key authentication information is verified, and the configuration information is validated after the verification is passed, so that the to-be-configured terminal establishes security with the access device by using the configuration information. connection.
  • step 303 the access accessory device receives the uplink first key authentication information sent by the to-be-configured terminal, and then forwards the uplink first key authentication information to the access device, where the access device is After the configuration of the configuration information that is encrypted by using the first key, the terminal is configured to verify the uplink first key authentication information, and after the verification is passed, the configuration information is validated by the access device, so that the configuration is to be configured.
  • the terminal establishes a secure connection with the access device by using the configuration information.
  • the access accessory device receives and verifies the uplink first key authentication information sent by the terminal to be configured, and after the verification is passed, the configuration information of the first key encryption is valid, so that the terminal to be configured is in the After the configuration information sent by the access device is received and the configuration information is valid, the configuration information is used to establish a secure connection with the access device.
  • step 304 is: after the access accessory device receives the uplink first key authentication information sent by the to-be-configured terminal, the uplink first key authentication information is verified, and after the verification is passed, the first secret is obtained.
  • the configuration information of the key encryption is valid, so that the terminal to be configured establishes a secure connection with the access device by using the configuration information after receiving the configuration information sent by the access device and the configuration information is valid. .
  • the access accessory device before the access accessory device receives the uplink first key authentication information sent by the to-be-configured terminal, it first receives the encrypted by using the first key sent by the access device.
  • Configuring the information, and first, the terminal to be configured forwards the configuration information of the first key encryption, and then receives and verifies the uplink first key authentication information, and after the verification is passed, the first key is
  • the encrypted configuration information is valid, so that the to-be-configured terminal establishes a secure connection with the access device by using the configuration information after receiving the configuration information sent by the access device and the configuration information is valid.
  • the access accessory device receives the configuration information that is encrypted by using the first key, and receives and verifies the uplink first key authentication information sent by the terminal to be configured. After the verification is passed, The configuration information is validated, and the configuration information is sent to the to-be-configured terminal, so that the to-be-configured terminal establishes a secure connection with the access device by using the configuration information.
  • the process of the step 305 is: the access accessory device first receives the configuration information that is sent by the access device and is encrypted by using the first key, and then receives and verifies the uplink first key authentication sent by the to-be-configured terminal. After the verification is passed, the configuration information is validated, and the configuration information is sent to the to-be-configured terminal, so that the to-be-configured terminal establishes a secure connection with the access device by using the configuration information.
  • the method is applied to the access device that is connected to the access device and the terminal to be configured, and the method includes: receiving and forwarding the downlink first key authentication sent by the access device to the to-be-configured terminal And the information about the to-be-configured terminal is used to verify the downlink first key authentication information key, where the downlink first key authentication information is the authentication information calculated by using the first key; The uplink first key authentication information sent by the terminal to the access device, so that the access device verifies the uplink first key authentication information, and sends the used to the to-be-configured terminal after the verification is passed.
  • the configuration information of the first key is encrypted, so that the terminal to be configured establishes a secure connection with the access device by using the configuration information, and the uplink first key authentication information is calculated by using the first key.
  • the authentication information is received; or the uplink first key authentication information sent by the to-be-configured terminal to the access device is received and forwarded, so that the access device is in the end to be configured.
  • the uplink first key authentication information is verified, and the configuration information is validated after the verification is passed, so that the to-be-configured terminal uses the configuration information and
  • the access device establishes a secure connection; or, receives and verifies the uplink first key authentication information sent by the to-be-configured terminal, and performs verification
  • the configuration terminal uses the configuration information after receiving the configuration information sent by the access device and the configuration information is valid.
  • the access device establishes a secure connection; or receives configuration information encrypted by using the first key sent by the access device, and receives and verifies the uplink first key authentication information sent by the to-be-configured terminal, After the verification is passed, the configuration information is validated, and the configuration information is sent to the to-be-configured terminal, so that the to-be-configured terminal establishes a secure connection with the access device by using the configuration information.
  • the information configuration method provided by the embodiment of the present invention after the access device negotiates with the to-be-configured terminal to generate the first key, after the downlink authentication of the terminal to be configured, the uplink authentication of the access device or the accessory device, the terminal to be configured
  • the configuration information encrypted with the first key is used to establish a connection with the access device.
  • the solution for configuring the network information and establishing the connection completely by the mutual interaction between the devices provided by the embodiment of the present invention does not require the user to perform the network information configuration in the manual manual input PIN manner in the prior art. Manual input, which reduces the user's operation difficulty and improves the user experience. In the prior art, since the PIN is short and consists of only 8 digits, it is easily attacked by violent attacks, so the network security is low. After the two-way authentication is performed, the configuration information takes effect, which further improves the security of the network.
  • the verifying the uplink first key authentication information sent by the terminal to be configured may include:
  • the access device Receiving the expected uplink first key authentication information sent by the access device, and matching the received uplink first key authentication information with the expected uplink first key authentication information, if When the uplink first key authentication information is the expected uplink first key authentication information, the uplink first key authentication information is verified to pass.
  • the expected uplink first key authentication information may be received simultaneously with the configuration information encrypted by using the first key.
  • the access device negotiates with the to-be-configured terminal to generate a first key by using a key exchange algorithm.
  • the access device and the to-be-configured terminal may pass a key exchange algorithm, such as:
  • Diffie-Hellman Diffie-Hellman, DH key exchange protocol, public key encryption algorithm (such as: Ron Rivest, Adi Shamirh, LenAdleman, RSA) protocol or elliptic curve encryption EIGamal protocol, etc. negotiate the first key.
  • public key encryption algorithm such as: Ron Rivest, Adi Shamirh, LenAdleman, RSA
  • elliptic curve encryption EIGamal protocol etc. negotiate the first key.
  • the above algorithms are common key exchange algorithms.
  • the first key generated by negotiation is only known to the access device and the terminal to be configured, even if the message of the exchange process is detected by other devices, other It is also difficult for the device to know the first key.
  • the access device and the access accessory device may also share the second key, and the second key may be shared by the factory.
  • the key stored in the access device and the access accessory device is stored.
  • the second key at this time is statically set.
  • the access accessory device and the access device are always paired, that is, one access accessory device corresponds to one access device.
  • the process of transferring the second key to the access device by the access device may not be required. If the second key is not stored in the access accessory device at the factory, it can also be transmitted to the access accessory device by the access device through a universal serial bus (USB) or the like, and the second key at this time.
  • USB universal serial bus
  • the key may be dynamically set, and the updated second key is always delivered by the access device when the access accessory device is plugged into the USB or other wired mode of the access device. This step of updating the second key does not necessarily occur when the configuration process of the terminal to be configured is initiated, and may be performed at the time when the access accessory device is plugged back into the access device.
  • the access device can also be connected to the access device through a wired connection such as USB.
  • a wired connection such as USB.
  • the access device When the access device is inserted into the access device, it is understood that the access device is in a state where the configuration of the new device is prohibited, and the accessory device is accessed.
  • the access device disconnects the wired connection, that is, when the access accessory device is not inserted in the access device, it is understood that the access device is in a configurable new device state.
  • the access device sends the downlink first key authentication information to the access accessory device, where the downlink first key authentication information is the authentication information calculated by using the first key.
  • the key authentication information may have various generation methods, and may encrypt one data with a key, or perform a digest operation on a data with a key, and the like. Those skilled in the art understand the calculation method of the authentication information, which is not specifically exemplified herein.
  • the access accessory device can transmit the downlink first key authentication information to the access accessory device by using a wired manner.
  • the wired communication method can be communication by USB.
  • the authentication information calculated using the first key can be "Today is a good day!”. Then the downlink first key authentication information is "Today is a good day!”.
  • the second key may be used to encrypt the downlink first. Key authentication information.
  • the access accessory device sends the downlink first key authentication information to the to-be-configured terminal.
  • the access accessory device and the terminal to be configured can communicate in a short-range wireless manner or in a wired manner, and communicate in a short-range wireless manner, such as: NFC communication. Wired communication, such as: USB communication.
  • the terminal to be configured verifies the downlink first key authentication information.
  • the terminal to be configured can read the downlink first key authentication information, for example: You can read the "first day is a good day! If the terminal to be configured does not hold the first key, the terminal to be configured cannot read the "first day is a good day!” this downlink first key authentication information.
  • the configuration process should be terminated.
  • the terminal to be configured verifies that the downlink first key authentication information is successful, it may be determined that the access device is a real access device.
  • the terminal to be configured sends the uplink first key authentication information to the access accessory device, where the uplink first key authentication information is the authentication information calculated by using the first key.
  • the access accessory device forwards the uplink first key authentication information to the access device.
  • the access device verifies the uplink first key authentication information.
  • the access device may learn that the terminal to be configured is a real terminal to be configured, and may send configuration information to the access device to enable the terminal to be configured. End access to the network.
  • the access device sends configuration information that is encrypted by using the first key to the terminal to be configured, that is, the access device uses the first key to transmit configuration information to the to-be-configured terminal, so that the to-be-configured terminal uses the configuration information and the location.
  • the access device establishes a secure connection.
  • An optional step of requesting the terminal to request configuration information from the access device may also be included before the step S135.
  • the terminal to be configured establishes a secure connection with the access device by using the configuration information.
  • the access device sends configuration information to the terminal to be configured.
  • the configuration information of the scenario to be configured can be directly used by the terminal.
  • the access device can send configuration information encrypted by using the first key to the terminal to be configured.
  • the access device negotiates with the to-be-configured terminal to generate a first key by using a key exchange algorithm.
  • the access device and the access accessory device may also share the second key.
  • the specific process is the same as that in the embodiment of the scenario corresponding to FIG. 7, and details are not described herein again.
  • the access device sends the downlink first key authentication information to the access accessory device, where the downlink first key authentication information is the authentication information calculated by using the first key.
  • the access accessory device sends the downlink first key authentication information to the to-be-configured terminal.
  • the terminal to be configured verifies the downlink first key authentication information.
  • the access device sends configuration information that is encrypted by using the first key to the to-be-configured terminal, so that the to-be-configured terminal establishes a secure connection with the access device by using the configuration information.
  • step S220 an optional step of requesting the terminal to request configuration information from the access device may also be included.
  • the terminal to be configured sends the uplink first key authentication information to the access accessory device, where the uplink first key authentication information is the authentication information calculated by using the first key.
  • the access accessory device forwards the uplink first key authentication information to the access device.
  • S235. The access device verifies the uplink first key authentication information, and after the first key authentication information is verified, the configuration information is validated.
  • the terminal to be configured establishes a secure connection with the access device by using the configuration information.
  • the information configuration process of the scenario corresponding to FIG. 5 and the information configuration process of the scenario corresponding to FIG. 4 are basically After the first terminal authentication information is verified by the terminal to be configured, the configuration information is requested from the access device. After the configuration information sent by the access device is encrypted, the device sends the configuration information to the access device. The first key authentication information is uplinked, but the configuration terminal and the access device can use the configuration information after the access device validates the configuration of the first key authentication information. Establish a secure connection. If the uplink first key authentication information is not verified by the access device, the configuration information will not take effect, and the terminal to be configured cannot establish a secure connection. In the application scenario corresponding to Figure 5, the terminal to be configured is received. After the configuration information encrypted by the first key is used, it cannot be used directly. It cannot be used until the access device makes the configuration information take effect.
  • the access device negotiates with the to-be-configured terminal to generate a first key by using a key exchange algorithm.
  • the access device and the access accessory device may also share the second key.
  • the specific process is the same as the scenario embodiment corresponding to FIG. 7, and details are not described herein.
  • the access device sends the downlink first key authentication information and the expected uplink first key authentication information to the access accessory device.
  • the access accessory device sends the downlink first key authentication information to the to-be-configured terminal.
  • the terminal to be configured verifies the downlink first key authentication information.
  • the access device sends, to the to-be-configured terminal, configuration information that is encrypted by using the first key.
  • the access device may send configuration information encrypted by using the first key to the access accessory device, and forward, by using the access accessory device, the encryption using the first key. Configuration information.
  • the configuration information encrypted by using the first key is sent simultaneously with the downlink first key authentication information and the expected uplink first key authentication information, and then the use is forwarded by accessing the accessory device.
  • the first key encrypted configuration information is sent simultaneously with the downlink first key authentication information and the expected uplink first key authentication information, and then the use is forwarded by accessing the accessory device.
  • the access accessory device receives the uplink first key authentication information sent by the terminal to be configured. S330. The access accessory device matches the uplink first key authentication information with the expected uplink first key authentication information, and matches the uplink first key authentication information to the expectation. When the first key authentication information is uplinked, if the verification is passed, the configuration information is validated.
  • the terminal to be configured establishes a secure connection with the access device by using the configuration information.
  • the terminal to be configured cannot be directly used after receiving the configuration information encrypted by using the first key, and can be used after the accessory device is enabled to make the configuration information take effect.
  • the access device negotiates with the to-be-configured terminal to generate a first key by using a key exchange algorithm.
  • the access device and the access accessory device may also share the second key.
  • the specific process is the same as the scenario embodiment corresponding to FIG. 7, and details are not described herein.
  • the access device sends the downlink first key authentication information, the expected uplink first key authentication information, and the configuration information encrypted by using the first key to the access accessory device.
  • the S305 may be split into two or three sending processes, that is, the downlink first key authentication information, the expected uplink first key authentication information, and the configuration information encrypted by using the first key are divided into multiple times. Sent to the access accessory device, but the final purpose is the same, in order to send the downlink first key authentication information, the expected uplink first key authentication information, and the configuration information encrypted by using the first key. .
  • the access accessory device sends downlink first key authentication information to the to-be-configured terminal.
  • the terminal to be configured verifies the downlink first key authentication information.
  • the terminal to be configured sends the uplink first key authentication information to the access accessory device.
  • the access accessory device matches the uplink first key authentication information with the expected uplink first key authentication information, and if the uplink first key authentication information is matched, the uplink first key authentication is expected. If the information is not followed, the subsequent steps are not performed.
  • the access accessory device sends the configuration information encrypted by using the first key to the to-be-configured terminal.
  • the terminal to be configured establishes a secure connection with the access device by using the configuration information.
  • step S430 the two steps S440 and S445 may be further included.
  • S440. The access accessory device sends the uplink first key authentication information to the access device.
  • the access device verifies the uplink first key authentication information, and if the verification succeeds, the configuration information is validated.
  • the terminal to be configured cannot be directly used after receiving the configuration information encrypted by the first key, and can be used after the access device makes the configuration information take effect.
  • the two optional steps S440 and S445 after the access accessory device verifies the uplink first key authentication information, the access device re-verifies the first key authentication information, thereby making the network more secure.
  • an access device provided by an embodiment of the present invention is in communication with an access accessory device and a terminal to be configured.
  • An embodiment of the access device provided by the embodiment of the present invention includes:
  • a first key generating unit 701 configured to negotiate with the to-be-configured terminal to generate a first key by using a key exchange algorithm
  • the first sending unit 702 is configured to send the downlink first key authentication information to the access accessory device, and forward the downlink first key authentication information to the to-be-configured terminal by using the access accessory device, thereby And causing the terminal to be configured to verify the downlink first key authentication information, where the downlink first key authentication information is the authentication information calculated by using the first key generated by the first key generating unit 701 ;
  • the first processing unit 703 is configured to: after the first sending unit 702 sends the downlink first key authentication information, receive an uplink first key authentication that is forwarded by the to-be-configured terminal by using the access accessory device And the information about the uplink first key authentication information is verified, and after the verification is passed, the configuration information encrypted by using the first key is sent to the to-be-configured terminal, so that the to-be-configured terminal uses the configuration information and
  • the access device establishes a secure connection, and the uplink first key authentication information is the authentication information calculated by using the first key; or
  • the first processing unit 703 is configured to send configuration information encrypted by using the first key to the to-be-configured terminal after the first sending unit 702 sends the downlink first key authentication information, and Verifying the uplink first key authentication information that is forwarded by the terminal to be configured by the access device, and if the verification is successful, the configuration information is validated, so that the to-be-configured terminal uses the configuration information and the The access device establishes a secure connection; or
  • the second processing unit 704 is configured to send, by the first sending unit 702, the downlink first secret After the key authentication information, the configuration information encrypted by using the first key is sent to the to-be-configured terminal, and the uplink first key authentication information sent by the to-be-configured terminal is verified by the access accessory device, if the verification is performed.
  • the configuration information is validated by the access accessory device, so that the to-be-configured terminal establishes a secure connection with the access device by using the configuration information; or, the second processing unit 704 uses After the first sending unit 702 sends the downlink first key authentication information, the configuration information encrypted by using the first key is sent to the access accessory device, and is verified by the access accessory device. And sending, by the access accessory device, the configuration information to the to-be-configured terminal, so that the to-be-configured terminal uses the The configuration information establishes a secure connection with the access device.
  • the first key generating unit 701 and the to-be-configured terminal negotiate a key exchange algorithm to generate a first key; the first sending unit 702 sends a downlink first key authentication to the access accessory device. Transmitting, by the access accessory device, the downlink first key authentication information to the to-be-configured terminal, so that the to-be-configured terminal verifies the downlink first key authentication information, where the downlink first
  • the key authentication information is the authentication information calculated by using the first key generated by the first key generating unit 701.
  • the first processing unit 703 is configured to send the downlink first in the first sending unit 702.
  • the uplink first key authentication information that is forwarded by the terminal to be configured by the access device is verified, and the uplink first key authentication information is verified, and is sent to the
  • the configuration terminal sends the configuration information that is encrypted by using the first key, so that the to-be-configured terminal establishes a secure connection with the access device by using the configuration information, where the uplink is first.
  • the key authentication information is the authentication information that is calculated by using the first key.
  • the first processing unit 703 sends the downlink first key authentication information to the first sending unit 702.
  • the configuration terminal sends the configuration information encrypted by using the first key, and verifies the uplink first key authentication information that is forwarded by the terminal to be configured by using the access accessory device, and if the verification is passed, the configuration information is obtained.
  • the terminal to be configured establishes a secure connection with the access device by using the configuration information; or, the second processing unit 704, after the first sending unit 702 sends the downlink first key authentication information, And transmitting, to the to-be-configured terminal, the configuration information that is encrypted by using the first key, and verifying the uplink first key authentication information that is sent by the to-be-configured terminal by using the accessing device, and if the verification succeeds, And the configuration information is validated by the accessing device, so that the to-be-configured terminal establishes a secure connection with the access device by using the configuration information; or, the second processing unit 704 is in the foregoing After the sending unit 702 sends the downlink first key authentication information, the configuration information that is encrypted by using the first key is sent to the access accessory device, and the terminal to be configured is verified by the access accessory device.
  • the access device sends the uplink first key authentication information, if the verification is passed, sending the configuration information to the to-be-configured terminal by using the access accessory device, so that the to-be-configured terminal uses the configuration information and the The access device establishes a secure connection.
  • the access device provided by the embodiment of the present invention reduces the user operation difficulty of the network information configuration, and the configuration information takes effect only after the uplink and downlink two-way authentication, thereby further improving the security of the network.
  • the second processing unit 704 includes a first sub-processing unit 7041, where the a sub-processing unit 7041, configured to send the expected uplink first key authentication information to the access accessory device, so that the access accessory device receives the received uplink first key authentication information and the The uplink first key authentication information is matched, and if the uplink first key authentication information is the expected uplink first key authentication information, the access accessory device verifies the uplink first secret.
  • the key authentication information is passed.
  • the second processing unit 704 is further configured to verify the uplink first key authentication information that is forwarded by the access accessory device, and if the verification succeeds, the configuration information is validated.
  • an embodiment of the to-be-configured terminal provided by the embodiment of the present invention is in communication with the access device and the access accessory device.
  • a second key generating unit 801 configured to negotiate with the access device to generate a first key by using a key exchange algorithm
  • the first receiving unit 802 is configured to receive the downlink first key authentication information that is forwarded by the access device by using the access device, where the downlink first key authentication information is that the second key generating unit 801 is used.
  • the generated authentication information calculated by the first key
  • a first verification unit 803, configured to verify that the first receiving unit 802 receives the downlink first Key authentication information
  • the third processing unit 804 is configured to: after the first verification unit 803 verifies the downlink first key authentication information, send the uplink first key authentication information to the access accessory device, and pass the access The accessory device forwards the uplink first key authentication information to the access device, so that the access device verifies the uplink first key authentication information, and receives the access device to verify the uplink a configuration information that is encrypted by using the first key, and the uplink first key authentication information is authentication information calculated by using the first key; or
  • the third processing unit 804 is configured to: after the first verification unit 803 verifies the downlink first key authentication information, receive configuration information that is sent by the access device and encrypted by using the first key. And sending the uplink first key authentication information to the access accessory device, and forwarding the uplink first key authentication information to the access device by using the access accessory device, thereby enabling the access.
  • the device verifies the uplink first key authentication information, and validates the configuration information after the verification is passed; or
  • the fourth processing unit 805 is configured to: after the first verification unit 803 verifies the downlink first key authentication information, receive configuration information that is sent by the access device and is encrypted by using the first key, and Sending the uplink first key authentication information to the access accessory device, so that the access accessory device verifies the uplink first key authentication information, and validating the configuration information after the verification is passed; or
  • the fourth processing unit 805 is configured to send the uplink first key authentication information to the access accessory device after the first verification unit 803 verifies the downlink first key authentication information, so that the The access accessory device verifies the uplink first key authentication information, and receives configuration information that is encrypted by using the first key after the uplink accessory first authentication information is verified by the access accessory device.
  • the configuration information encrypted by using the first key is sent to the access accessory device in advance by the access device;
  • the first connection establishing unit 806 is configured to establish a secure connection with the access device by using configuration information sent by the third processing unit 804 or the fourth processing unit 805.
  • the second key generating unit 801 and the access device negotiate a key exchange algorithm to generate a first key; the first receiving unit 802 receives the access device by accessing the accessory.
  • the downlink first key authentication information forwarded by the device, where the downlink first key authentication information is the authentication information calculated by using the first key generated by the second key generating unit 801; 803.
  • the downlink first key authentication information received by the first receiving unit 802 is verified.
  • the third processing unit 804 sends the downlink first key authentication information to the access after the first verification unit 803 verifies the downlink first key authentication information.
  • the accessory device sends the uplink first key authentication information, and the uplink first key authentication information is forwarded to the access device by using the access accessory device, so that the access device verifies the uplink first
  • the key authentication information is received by the access device after the verification of the uplink first key authentication information, and the configuration information encrypted by using the first key is used, and the uplink first key authentication information is used.
  • the third processing unit 804 receives the access after the first verification unit 803 verifies the downlink first key authentication information.
  • the verification unit 803 After verifying the downlink first key authentication information, the verification unit 803 receives configuration information encrypted by using the first key and sent by the access device, and sends an uplink first secret to the access accessory device. Key authentication information, so that the access accessory device verifies the uplink first key authentication information, and validates the configuration information after the verification is passed; or the fourth processing unit 805 is in the first verification.
  • the uplink first key authentication information is sent to the access accessory device, so that the access accessory device verifies the uplink first.
  • the key authentication information is received by the access accessory device after the verification of the uplink first key authentication information, and the configuration information encrypted by using the first key, where the first key is used for encryption.
  • the configuration information is sent to the access device in advance by the access device; the first connection establishing unit 806 uses the configuration information sent by the third processing unit 804 or the fourth processing unit 805 and the access The device establishes a secure connection.
  • the to-be-configured terminal provided by the embodiment of the present invention reduces the difficulty of user operation of the network information configuration and improves network security.
  • the fourth processing unit 805 includes a second sub-processing unit. 8051,
  • the second sub-processing unit 8051 is configured to send the uplink first key authentication information to the access accessory device, so that the access accessory device sends the uplink first key authentication information and the expected uplink.
  • the first key authentication information is matched, and if the uplink first key authentication information is the expected uplink first key authentication information, the access accessory device verifies the uplink first key authentication information. Passing; the expected uplink first key authentication information is sent to the access accessory device in advance by the access device.
  • an embodiment of the access accessory device and the access device and the to-be-configured terminal are provided in the embodiment of the present invention.
  • An embodiment of the access accessory device provided by the embodiment of the present invention includes:
  • the second receiving unit 901 is configured to receive downlink first key authentication information that is sent by the access device to the to-be-configured terminal, where the downlink first key authentication information is calculated by using the first key. Certification Information;
  • the second sending unit 902 is configured to forward the downlink first key authentication information that is received by the second receiving unit 901, and enable the terminal to be configured to verify the downlink first key authentication information; 903. After the second sending unit 902 forwards the downlink first key authentication information, receive and forward the uplink first key authentication information that is sent by the terminal to be sent to the access device, so that The access device verifies the uplink first key authentication information, and sends configuration information encrypted by using the first key to the to-be-configured terminal after the verification is passed, so that the to-be-configured terminal uses the Establishing a secure connection with the access device, where the uplink first key authentication information is the authentication information calculated by using the first key; or
  • the fifth processing unit 903 is configured to: after the second sending unit 902 forwards the downlink first key authentication information, receive and forward the uplink first secret sent by the to-be-configured terminal to the access device.
  • the key authentication information so that the access device verifies the uplink first key authentication information after transmitting the configuration information encrypted by using the first key to the to-be-configured terminal, and after the verification is passed,
  • the configuration information is valid, so that the to-be-configured terminal establishes a secure connection with the access device by using the configuration information; or
  • the sixth processing unit 904 is configured to: after the second sending unit 902 forwards the downlink first key authentication information, receive and verify an uplink first key authentication signal sent by the to-be-configured terminal After the verification is passed, the configuration information of the first key is validated, so that the to-be-configured terminal uses the configuration information sent by the access device after the configuration information is valid.
  • the configuration information establishes a secure connection with the access device; or
  • the sixth processing unit 904 is configured to: after the second sending unit 902 forwards the downlink first key authentication information, receive configuration information that is sent by the access device and encrypted by using the first key. Receiving and verifying the uplink first key authentication information sent by the terminal to be configured, and sending the configuration information to the to-be-configured terminal after the verification is passed, so that the to-be-configured terminal uses the configuration information and the The access device establishes a secure connection.
  • the second receiving unit 901 receives the downlink first key authentication information that is sent by the access device to the to-be-configured terminal, and the downlink first key authentication information is that the first key is used.
  • the second sending unit 902 forwards the downlink first key authentication information received by the second receiving unit 901, and causes the terminal to be configured to verify the downlink first key authentication information.
  • the processing unit 903 receives and forwards the uplink first key authentication information that is sent by the terminal to be sent to the access device, so that The access device verifies the uplink first key authentication information, and sends configuration information encrypted by using the first key to the to-be-configured terminal after the verification is passed, so that the to-be-configured terminal uses the Establishing a secure connection with the access device, where the uplink first key authentication information is the authentication information calculated by using the first key; or, the fifth processing unit
  • the second sending unit 902 forwards the downlink first key authentication information
  • the second sending unit 902 receives and forwards the uplink first key authentication information that is sent by the terminal to be sent to the access device, so that the After the device sends the configuration information encrypted by using the first key to the to-be-configured terminal, the initiating the first key authentication information is validated, and after the verification is passed, the configuration information is validated, so that the The configuration terminal establishes a secure connection with the access
  • Element 902 forwards the downlink Receiving, by the access device, the configuration information encrypted by using the first key, and receiving and verifying the uplink first key authentication information sent by the to-be-configured terminal, after the first key authentication information is received, And sending the configuration information to the to-be-configured terminal, so that the to-be-configured terminal establishes a secure connection with the access device by using the configuration information.
  • the access device of the embodiment of the present invention can reduce the user operation difficulty of the network information configuration and improve the network security.
  • the sixth processing unit 904 includes a third sub-processing unit 9041.
  • the third sub-processing unit 9041 is configured to receive the expected uplink first key authentication information sent by the access device, and the received uplink first key authentication information and the expected The uplink first key authentication information is matched, and if the uplink first key authentication information is the expected uplink first key authentication information, the uplink first key authentication information is verified to pass.
  • an access device provided by an embodiment of the present invention is in communication with an access accessory device and a terminal to be configured.
  • An embodiment of the access device provided by the embodiment of the present invention includes: a first input device 700, and a first output device. 710, the first memory 720 and the first processor 730 (the first processor 730 can be one or more, FIG. 14 is an example);
  • the first input device 700, the first output device 710, the first memory 720, and the first processor 730 may be connected by a bus or other means;
  • the first processor 730 is configured to generate a first key by using a key exchange algorithm with the to-be-configured terminal.
  • the first output device 710 is configured to send the downlink first key authentication information to the access accessory device, and forward the downlink first key authentication information to the to-be-configured terminal by using the access accessory device, And the terminal to be configured to verify the downlink first key authentication information, where the downlink first key authentication information is the authentication information calculated by using the first key;
  • the first input device 700 is configured to receive the uplink first key authentication information that is forwarded by the terminal to be configured by using the access accessory device, where the first processor 730 is configured to verify the uplink first key authentication information.
  • the first output device 710 is configured to send the terminal to be configured after the verification is passed Transmitting the configuration information that is encrypted by using the first key, so that the to-be-configured terminal establishes a secure connection with the access device by using the configuration information, where the uplink first key authentication information is using the first The authentication information calculated by the key; or,
  • the first output device 710 is configured to send, to the to-be-configured terminal, configuration information that is encrypted by using the first key, where the first processor 730 is configured to verify that the to-be-configured terminal passes the access accessory device. Forwarding the first key authentication information, if the verification is passed, the configuration information is validated, so that the to-be-configured terminal establishes a secure connection with the access device by using the configuration information; or
  • the first output device 710 is configured to send, to the to-be-configured terminal, configuration information that is encrypted by using the first key, and verify, by using the access accessory device, an uplink first key authentication sent by the to-be-configured terminal.
  • the information is validated by the access accessory device, so that the to-be-configured terminal establishes a secure connection with the access device by using the configuration information;
  • the first output device 710 is configured to send configuration information encrypted by using the first key to the access accessory device, and verify, by using the access accessory device, an uplink first key sent by the to-be-configured terminal. And the authentication information is sent to the to-be-configured terminal by the access accessory device, so that the to-be-configured terminal establishes a secure connection with the access device by using the configuration information.
  • the access device shares a second key with the access accessory device
  • the first output device 710 is configured to send, to the access accessory device, downlink first key authentication information encrypted using the second key.
  • the first output device 710 is specifically configured to send the expected uplink first key authentication information to the access accessory device, so that the access accessory device will receive the received And the uplink first key authentication information is matched with the expected uplink first key authentication information, and if the uplink first key authentication information is the expected uplink first key authentication information, The incoming device verifies that the uplink first key authentication information passes.
  • the first processor 730 is further configured to verify the uplink first key authentication information forwarded by the access accessory device, and if the verification is passed, enable the configuration The information is in effect.
  • the first processor 730 is specifically configured to generate, by using the key exchange protocol Diffie-Hellman or the public key encryption algorithm RSA protocol or the elliptic curve encryption EIGam protocol to negotiate with the to-be-configured terminal. Key.
  • an embodiment of the to-be-configured terminal is connected to an access device and an access accessory device, and an embodiment of the terminal to be configured according to the embodiment of the present invention includes: a second input device 800 and a second output device. 810, the second memory 820 and the second processor 830 (the second processor 830 can be one or more, FIG. 15 is an example);
  • the second input device 800, the second output device 810, the second memory 820, and the second processor 830 may be connected by a bus or other means;
  • the second processor 830 is configured to negotiate with the access device to generate a first key by using a key exchange algorithm.
  • the second input device 800 is configured to receive downlink first key authentication information that is forwarded by the access device by using an access device, where the downlink first key authentication information is calculated by using the first key. Certification information;
  • the second processor 830 is configured to verify the downlink first key authentication information
  • the second output device 810 is configured to send the uplink first key authentication information to the access accessory device, and forward the uplink first key authentication information to the access device by using the access accessory device So that the access device verifies the uplink first key authentication information
  • the second input device 800 is configured to receive, after the access device verifies that the uplink first key authentication information is passed, Using the configuration information encrypted by the first key, the uplink first key authentication information is the authentication information calculated by using the first key; or
  • the second input device 800 is configured to receive configuration information that is sent by the access device and that is encrypted by using the first key, where the second output device 810 is configured to send an uplink first to the access accessory device.
  • Key authentication information and forwarding, by the access accessory device, the uplink first key authentication information to the access device, so that the access device verifies the uplink first key authentication information, and
  • the configuration information is validated after the verification is passed; or
  • the second input device 800 is configured to receive configuration information that is sent by the access device and that is encrypted by using the first key, where the second output device 810 is configured to send the information to the access device. Upgoing the first key authentication information, so that the access accessory device verifies the uplink first key authentication information, and validates the configuration information after the verification is passed; or
  • the second output device 810 is configured to send uplink first key authentication information to the access accessory device, so that the access accessory device verifies the uplink first key authentication information
  • the second input device 800 is configured to receive configuration information that is encrypted by using the first key that is sent by the access accessory device after verifying that the uplink first key authentication information is passed, and the configuration information that is encrypted by using the first key.
  • sending, by the access device, the access device to the access accessory device; the second processor 830 is configured to establish a secure connection with the access device by using the configuration information.
  • the second output device 810 is configured to send uplink first key authentication information to the access accessory device, so that the access accessory device sends the uplink first key.
  • the authentication information is matched with the expected uplink first key authentication information. If the uplink first key authentication information is the expected uplink first key authentication information, the access accessory device verifies the uplink. The first key authentication information is passed; the expected uplink first key authentication information is sent to the access accessory device in advance by the access device.
  • the access accessory device is connected to the access device and the to-be-configured terminal, and the access device and the to-be-configured terminal negotiate a key exchange algorithm to generate a first key.
  • An embodiment of the access accessory device provided by the embodiment includes: a third input device 900, a third output device 910, a third memory 920, and a third processor 930 (the third processor 930 may be one or more, Figure 16 taking one as an example);
  • the third input device 900, the third output device 910, the third memory 920, and the third processor 930 may be connected by a bus or other means;
  • the third input device 900 receives and the third output device 910 forwards the downlink first key authentication information that is sent by the access device to the to-be-configured terminal, so that the to-be-configured terminal verifies the downlink first.
  • a key authentication information key where the downlink first key authentication information is authentication information calculated by using the first key;
  • the third output device 910 Receiving, by the third input device 900, the third output device 910, the uplink first key authentication information that is sent by the terminal to be sent to the access device, so that the access device verifies the uplink a key authentication information, and sent to the terminal to be configured after the verification is passed
  • the configuration information of the first key is encrypted, so that the terminal to be configured establishes a secure connection with the access device by using the configuration information, and the uplink first key authentication information is that the first key is used. Calculated authentication information; or,
  • the third input device 900 receives and forwards the uplink first key authentication information sent by the terminal to be configured to the access device, so that the access device is in the office After the configuration terminal sends the configuration information encrypted by using the first key, the uplink first key authentication information is verified, and the configuration information is validated after the verification is passed, so that the to-be-configured terminal uses the The configuration information is used to establish a secure connection with the access device.
  • the third input device 900 receives the uplink first key authentication information sent by the terminal to be configured, and the third processor 930 verifies the terminal to be configured.
  • the third input device 900 receives the configuration information that is encrypted by using the first key, and the third input device 900 receives the uplink first key authentication information that is sent by the terminal to be configured. And the third processor 930 is configured to verify the uplink first key authentication information sent by the terminal to be configured, and after the verification is passed, the configuration information is valid, and the third output device 910 is configured to the terminal to be configured. Sending the configuration information, so that the to-be-configured terminal establishes a secure connection with the access device by using the configuration information.
  • the third input device 900 is configured to receive the expected uplink first key authentication information sent by the access device, where the third processor 930 is configured to receive the received The uplink first key authentication information is matched with the expected uplink first key authentication information, and if the uplink first key authentication information is the expected uplink first key authentication information, the verification is performed. The uplink first key authentication information is passed.
  • an embodiment of an information configuration system includes: an access device 70, an access accessory device 90, and a to-be-configured terminal 80, the access device 70, an access accessory device 90, and a to-be-configured device. Communication connection between terminals 80,
  • the access device 70 is configured to: negotiate with the to-be-configured terminal to generate a first key by using a key exchange algorithm; and send downlink first key authentication information to the access accessory device, by using the The ingress device forwards the downlink first key authentication information to the to-be-configured terminal, so that the to-be-configured terminal verifies the downlink first key authentication information, and the downlink first key authentication information is used.
  • the authentication information is the authentication information calculated by using the first key; or the configuration information encrypted by using the first key is sent to the to-be-configured terminal, and the terminal to be configured is verified to pass the access attachment.
  • the uplink first key authentication information forwarded by the device if the verification is passed, the configuration information is validated, so that the to-be-configured terminal uses the configuration information and the The device is configured to establish a secure connection; or, the configuration information that is encrypted by using the first key is sent to the to-be-configured terminal, and the uplink first key authentication information sent by the terminal to be configured is verified by the access accessory device.
  • the configuration information is validated by the access accessory device, so that the to-be-configured terminal establishes a secure connection with the access device by using the configuration information; or, the access accessory is The device sends the configuration information encrypted by using the first key, and the uplink first key authentication information sent by the terminal to be configured is verified by the access accessory device, and if the verification is passed, the access accessory device is passed. Sending the configuration information to the to-be-configured terminal, so that the to-be-configured terminal establishes a secure connection with the access device by using the configuration information.
  • the to-be-configured terminal 80 is configured to generate a first key by using the key exchange algorithm to negotiate with the access device, and receive the downlink first key authentication information that is forwarded by the access device by using the accessory device. Determining the downlink first key authentication information as the authentication information calculated by using the first key; verifying the downlink first key authentication information; and sending the uplink first key authentication information to the access accessory device, and Forwarding, by the access accessory device, the uplink first key authentication information to the access device, so that the access device verifies the uplink first key authentication information, and receives the access device Verifying, by the uplink first key authentication information, the configuration information that is encrypted by using the first key, and the uplink first key authentication information is the authentication information that is calculated by using the first key; Or receiving configuration information that is encrypted by using the first key and sent by the access device, and sending an uplink first key authentication signal to the access accessory device.
  • the access accessory device Transmitting, by the access accessory device, the uplink first key authentication information to the access device, so that the access device verifies the uplink first key authentication information, and passes the verification
  • the configuration information encrypted by using the first key sent by the access device is received, and the uplink first key authentication information is sent to the access accessory device, so that The access accessory device verifies the uplink first key authentication information, and validates the configuration information after the verification is passed; or sends the uplink first key authentication information to the access accessory device, so as to enable the
  • the access accessory device verifies the uplink first key authentication information, and receives configuration information that is encrypted by using the first key after the access accessory device verifies that the uplink first key authentication information is passed,
  • the configuration information encrypted by using the first key is sent to the access accessory device in advance by the access device; establishing security with the access device by using the configuration information. Access.
  • the access accessory device 90 is configured to receive and forward the downlink first key authentication information that is sent by the access device to the to-be-configured terminal, so that the to-be-configured terminal verifies the downlink first key authentication information.
  • the downlink first key authentication information is the authentication information calculated by using the first key
  • the uplink first key authentication information sent by the terminal to be configured to the access device is received and forwarded, And causing the access device to verify the uplink first key authentication information, and send configuration information encrypted by using the first key to the to-be-configured terminal after the verification is passed, so that the to-be-configured terminal uses the Establishing a secure connection with the access device, where the uplink first key authentication information is the authentication information calculated by using the first key; or receiving and forwarding the to-be-configured terminal and sending the An uplink first key authentication information of the access device, so that the access device verifies the uplink first secret after sending the configuration information encrypted by using the first key to the to-be-configured terminal.
  • Authenticating information, and validating the configuration information after the verification is passed, so that the to-be-configured terminal establishes a secure connection with the access device by using the configuration information; or receives and verifies the uplink sent by the to-be-configured terminal.
  • the first key authentication information is validated after the verification is passed, so that the configuration information that is sent by the access device is received by the terminal to be configured and the configuration is configured.
  • the configuration information is used to establish a secure connection with the access device; or the configuration information encrypted by using the first key sent by the access device is received, and the terminal to be configured is received and verified.
  • the uplink first key authentication information that is sent is validated after the verification is passed.
  • the program can be stored in a computer readable storage medium.
  • the storage medium can include: ROM, RAM, disk or CD, etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明公开了一种信息配置方法,接入设备与待配置终端协商生成第一密钥后,在通过待配置终端的下行验证,接入设备或者接入附件设备的上行验证后,待配置终端才使用第一密钥加密的配置信息与接入设备建立连接。这种完全由设备之间的互相交互来完成建立连接的方案,与现有技术中的人工手动输入PIN的方式进行入网信息配置相比,不需要用户进行手动输入,降低了用户的操作难度,提高了用户体验。

Description

一种信息配置方法、 设备及系统
本申请要求于 2012年 11月 9日提交中国专利局、 申请号为 201210447087.8中国专利申请的优先权,其全部内容通过引用结合在本申请 中。
技术领域 本发明涉及通信技术领域, 具体涉及一种信息配置方法、 设备及系统。 背景技术 现有无线网络安全建立( WiFi protected setup , WPS )的主要操作包括: 1、 建立初始无线网络; 2、 在该无线网络中增添新的设备。 WPS的架构由 3 个组成部分: 应用终端 (在 WPS中称为 enrollee ) , 注册器(registrar ) , 接 入点 (AP, Access Point ) ; AP是无线局域网的基础设施, 即: 支持 802.11 协议的接入点; 注册器是管理网络建立、 添加 /删除应用终端的设备, 注册 器可以和接入点集成在一起, 也可以由手机、 计算机这样的外部设备来充 当。
现有技术中, 可以使用个人身份号 (personal identifier number, PIN ) 识别方法进行无线网络的连接, 在实际应用中, 假设这么一个场景: 用户 有一个手机(集成了外部注册器和应用终端的角色) , 一个 AP, 想建无线 局域网。在 AP通上电之后,手机可以自动检测到 AP,问用户是否要安装 AP; 在用户确认安装之后, 手机提示用户输入 AP的 PIN (贴在 AP上的一个标签 上印有 PIN ) , 用户输入 PIN以后, AP与手机之间开始默认配置过程, 配置 完成后, 手机显示配置成功; 在初始无线网络建立之后, 用户需要在该网 络中添加一个无线打印机, 则在该无线打印机上电之后, 手机检测到新的 无线设备, 提示用户是否将它加入到网络中, 在用户确认添加之后, 用户 需要在手机中输入该无线打印机的 PIN, AP、手机与无线打印机开始默认的 配置过程, 最后手机和无线打印机都提示加入成功。
本发明的发明人发现, 现有技术中通过输入 PIN的方式进行入网信息 配置, 使得用户操作复杂。 发明内容 本发明实施例提供一种信息配置方法, 可以降低用户操作难度, 提高 用户的体验。
本发明实施例第一方面提供一种信息配置方法, 应用于与接入附件设 备、 待配置终端通信的接入设备中, 所述方法包括:
与所述待配置终端通过密钥交换算法协商生成第一密钥;
向所述接入附件设备发送下行第一密钥认证信息, 通过所述接入附件 设备将所述下行第一密钥认证信息转发给所述待配置终端, 从而使所述待 配置终端验证所述下行第一密钥认证信息, 所述下行第一密钥认证信息为 使用所述第一密钥计算出的认证信息;
接收所述待配置终端通过所述接入附件设备转发来的上行第一密钥认 证信息, 验证所述上行第一密钥认证信息, 并在验证通过后向所述待配置 终端发送使用所述第一密钥加密的配置信息, 以使所述待配置终端使用所 述配置信息与所述接入设备建立安全连接, 所述上行第一密钥认证信息为 使用所述第一密钥计算出的认证信息; 或者,
向所述待配置终端发送使用所述第一密钥加密的配置信息, 并验证所 述待配置终端通过所述接入附件设备转发来的上行第一密钥认证信息, 若 验证通过, 则使所述配置信息生效, 以使所述待配置终端使用所述配置信 息与所述接入设备建立安全连接; 或者,
向所述待配置终端发送使用所述第一密钥加密的配置信息, 并通过所 述接入附件设备验证所述待配置终端发送的上行第一密钥认证信息, 若验 证通过, 则通过所述接入附件设备使所述配置信息生效, 以使所述待配置 终端使用所述配置信息与所述接入设备建立安全连接; 或者,
向所述接入附件设备发送使用所述第一密钥加密的配置信息, 并通过 所述接入附件设备验证所述待配置终端发送的上行第一密钥认证信息, 若 验证通过, 则通过所述接入附件设备将所述配置信息发送给所述待配置终 端, 以使所述待配置终端使用所述配置信息与所述接入设备建立安全连接。
结合第一方面, 在第一种可能的实现方式中, 所述接入设备与所述接 入附件设备共享第二密钥, 所述向接入附件设备发送下行第一密钥认证信息, 具体包括: 向接入附件设备发送使用第二密钥加密的下行第一密钥认证信息。 结合第一方面或者第一方面第一种可能的实现方式, 在第二种可能的 实现方式中, 所述通过所述接入附件设备验证所述待配置终端发送的上行 第一密钥认证信息, 具体包括:
向所述接入附件设备发送期待的上行第一密钥认证信息, 使所述接入 附件设备将接收到的所述上行第一密钥认证信息与所述期待的上行第一密 钥认证信息进行匹配, 若所述上行第一密钥认证信息为所述期待的上行第 一密钥认证信息时, 则所述接入附件设备验证所述上行第一密钥认证信息 通过。
结合第一方面、 第一方面第一种或者第二种可能的实现方式, 在第三 种可能的实现方式中, 在所述通过所述接入附件设备将所述配置信息发送 给所述待配置终端之后, 还包括:
验证所述接入附件设备转发来的所述上行第一密钥认证信息, 若验证 通过, 则使所述配置信息生效。
结合第一方面、 第一方面第一种、 第二种或者第三种可能的实现方式, 在第四种可能的实现方式中, 所述与所述待配置终端协商生成第一密钥, 具体包括:
与所述待配置终端通过密钥交换协议 Diffie-Hellman或公钥加密算法 RSA协议或椭圆曲线加密 EIGamal协议协商生成第一密钥。
结合第一方面或者第一方面第一种到第四种任意一种可能的实现方 式, 在第五种可能的实现方式中, 所述接入设备与所述接入附件设备之间 通过有线方式通信, 所述待配置终端与所述接入附件设备之间通过近距离 方式通信或者有线方式通信。
本发明实施例第二方面提供一种信息配置方法, 应用于与接入设备、 接入附件设备通信的待配置终端中, 所述方法包括:
与所述接入设备通过密钥交换算法协商生成第一密钥;
接收所述接入设备通过接入附件设备转发来的下行第一密钥认证信 息, 所述下行第一密钥认证信息为使用所述第一密钥计算出的认证信息; 验证所述下行第一密钥认证信息;
向所述接入附件设备发送上行第一密钥认证信息, 并通过所述接入附 件设备将所述上行第一密钥认证信息转发给所述接入设备, 从而使所述接 入设备验证所述上行第一密钥认证信息, 接收所述接入设备在验证所述上 行第一密钥认证信息通过后发送来的使用所述第一密钥加密的配置信息, 所述上行第一密钥认证信息为使用所述第一密钥计算出的认证信息; 或者, 接收所述接入设备发送来的使用所述第一密钥加密的配置信息, 并向 所述接入附件设备发送上行第一密钥认证信息, 并通过所述接入附件设备 将所述上行第一密钥认证信息转发给所述接入设备, 从而使所述接入设备 验证所述上行第一密钥认证信息, 并在验证通过后使所述配置信息生效; 或者,
接收所述接入设备发送来的使用所述第一密钥加密的配置信息, 并向 所述接入附件设备发送上行第一密钥认证信息, 以使所述接入附件设备验 证所述上行第一密钥认证信息, 并在验证通过后使所述配置信息生效; 或 者,
向所述接入附件设备发送上行第一密钥认证信息, 以使所述接入附件 设备验证所述上行第一密钥认证信息, 接收所述接入附件设备在验证所述 上行第一密钥认证信息通过后发送的使用所述第一密钥加密的配置信息, 所述使用所述第一密钥加密的配置信息为所述接入设备预先发送给所述接 入附件设备的;
使用所述配置信息与所述接入设备建立安全连接。
结合第二方面, 在第一种可能的实现方式中, 所述以使所述接入附件 设备验证所述上行第一密钥认证信息, 具体包括:
以使所述接入附件设备将所述上行第一密钥认证信息与期待的上行第 一密钥认证信息进行匹配, 若所述上行第一密钥认证信息为所述期待的上 行第一密钥认证信息时, 则所述接入附件设备验证所述上行第一密钥认证 信息通过; 所述期待的上行第一密钥认证信息为所述接入设备预先发送给 所述接入附件设备的。
结合第二方面或者第二方面第一种可能的实现方式, 在第二种可能的 实现方式中, 所述接入设备与所述接入附件设备之间通过有线方式通信, 所述待配置终端与所述接入附件设备之间通过近距离方式通信或者有线方 式通信。
本发明实施例第三方面提供一种信息配置方法, 应用于与接入设备、 待配置终端通信的接入附件设备中, 所述接入设备与所述待配置终端通过 密钥交换算法协商生成第一密钥, 所述方法包括:
接收并转发所述接入设备发送给所述待配置终端的下行第一密钥认证 信息, 使所述待配置终端验证所述下行第一密钥认证信息钥, 所述下行第 一密钥认证信息为使用所述第一密钥计算出的认证信息;
接收并转发所述待配置终端发送给所述接入设备的上行第一密钥认证 信息, 以使所述接入设备验证所述上行第一密钥认证信息, 并在验证通过 后向所述待配置终端发送使用所述第一密钥加密的配置信息, 从而使所述 待配置终端使用所述配置信息与所述接入设备建立安全连接, 所述上行第 一密钥认证信息为使用所述第一密钥计算出的认证信息; 或者,
接收并转发所述待配置终端发送给所述接入设备的上行第一密钥认证 信息, 以使所述接入设备在向所述待配置终端发送使用所述第一密钥加密 的配置信息后验证所述上行第一密钥认证信息, 并在验证通过后使所述配 置信息生效, 从而使所述待配置终端使用所述配置信息与所述接入设备建 立安全连接; 或者,
接收并验证所述待配置终端发送的上行第一密钥认证信息, 在验证通 过后, 使所述第一密钥加密的配置信息生效, 从而使所述待配置终端在接 收到所述接入设备发送的所述配置信息且所述配置信息生效后, 使用所述 配置信息与所述接入设备建立安全连接; 或者,
接收所述接入设备发送来的使用所述第一密钥加密的配置信息, 接收 并验证所述待配置终端发送的上行第一密钥认证信息, 在验证通过后, 使 所述配置信息生效, 并向所述待配置终端发送所述配置信息, 从而使所述 待配置终端使用所述配置信息与所述接入设备建立安全连接。
结合第三方面, 在第一种可能的实现方式中, 所述验证所述待配置终 端发送的上行第一密钥认证信息, 具体包括: 接收所述接入设备发送来的期待的上行第一密钥认证信息, 并将接收 到的所述上行第一密钥认证信息与所述期待的上行第一密钥认证信息进行 匹配, 若所述上行第一密钥认证信息为所述期待的上行第一密钥认证信息 时, 则验证所述上行第一密钥认证信息通过。
结合第三方面或者第三方面第一种可能的实现方式, 在第二种可能的 实现方式中, 所述接入设备与所述接入附件设备之间通过有线方式通信, 所述待配置终端与所述接入附件设备之间通过近距离方式通信或者有线方 式通信。
本发明实施例第四方面提供一种接入设备, 与接入附件设备和待配置 终端通信连接, 所述接入设备包括:
第一密钥生成单元, 用于与所述待配置终端通过密钥交换算法协商生 成第一密钥;
第一发送单元, 用于向所述接入附件设备发送下行第一密钥认证信息, 通过所述接入附件设备将所述下行第一密钥认证信息转发给所述待配置终 端, 从而使所述待配置终端验证所述下行第一密钥认证信息, 所述下行第 一密钥认证信息为使用所述第一密钥生成单元生成的所述第一密钥计算出 的认证信息;
第一处理单元, 用于在所述第一发送单元发送所述下行第一密钥认证 信息之后, 接收所述待配置终端通过所述接入附件设备转发来的上行第一 密钥认证信息, 验证所述上行第一密钥认证信息, 并在验证通过后向所述 待配置终端发送使用所述第一密钥加密的配置信息, 以使所述待配置终端 使用所述配置信息与所述接入设备建立安全连接, 所述上行第一密钥认证 信息为使用所述第一密钥计算出的认证信息; 或者,
所述第一处理单元, 用于在所述第一发送单元发送所述下行第一密钥 认证信息之后, 向所述待配置终端发送使用所述第一密钥加密的配置信息, 并验证所述待配置终端通过所述接入附件设备转发来的上行第一密钥认证 信息, 若验证通过, 则使所述配置信息生效, 以使所述待配置终端使用所 述配置信息与所述接入设备建立安全连接; 或者,
第二处理单元, 用于在所述第一发送单元发送所述下行第一密钥认证 信息之后, 向所述待配置终端发送使用所述第一密钥加密的配置信息, 并 通过所述接入附件设备验证所述待配置终端发送的上行第一密钥认证信 息, 若验证通过, 则通过所述接入附件设备使所述配置信息生效, 以使所 述待配置终端使用所述配置信息与所述接入设备建立安全连接; 或者, 所述第二处理单元, 用于在所述第一发送单元发送所述下行第一密钥 认证信息之后, 向所述接入附件设备发送使用所述第一密钥加密的配置信 息, 并通过所述接入附件设备验证所述待配置终端发送的上行第一密钥认 证信息, 若验证通过, 则通过所述接入附件设备将所述配置信息发送给所 述待配置终端, 以使所述待配置终端使用所述配置信息与所述接入设备建 立安全连接。
结合第四方面, 在第一种可能的实现方式中, 所述第二处理单元包括 第一子处理单元,
所述第一子处理单元, 具体用于向所述接入附件设备发送期待的上行 第一密钥认证信息, 使所述接入附件设备将接收到的所述上行第一密钥认 证信息与所述期待的上行第一密钥认证信息进行匹配, 若所述上行第一密 钥认证信息为所述期待的上行第一密钥认证信息时, 则所述接入附件设备 验证所述上行第一密钥认证信息通过。
结合第四方面或者第四方面第一种可能的实现方式, 在第二种可能的 实现方式中, 所述第二处理单元, 还用于验证所述接入附件设备转发来的 所述上行第一密钥认证信息, 若验证通过, 则使所述配置信息生效。
结合第四方面、 第四方面第一种或者第二种可能的实现方式, 在第三 种可能的实现方式中, 所述接入设备与所述接入附件设备之间通过有线方 式通信, 所述待配置终端与所述接入附件设备之间通过近距离方式通信或 者有线方式通信。
本发明实施例第五方面提供一种待配置终端, 与接入设备和接入附件 设备通信连接, 所述待配置终端包括:
第二密钥生成单元, 用于与所述接入设备通过密钥交换算法协商生成 第一密钥;
第一接收单元, 用于接收所述接入设备通过接入附件设备转发来的下 行第一密钥认证信息, 所述下行第一密钥认证信息为使用所述第二密钥生 成单元生成的所述第一密钥计算出的认证信息;
第一验证单元, 用于验证所述第一接收单元接收到的下行第一密钥认 证信息;
第三处理单元, 用于在所述第一验证单元验证所述下行第一密钥认证 信息之后, 向所述接入附件设备发送上行第一密钥认证信息, 并通过所述 接入附件设备将所述上行第一密钥认证信息转发给所述接入设备, 从而使 所述接入设备验证所述上行第一密钥认证信息, 接收所述接入设备在验证 所述上行第一密钥认证信息通过后发送来的使用所述第一密钥加密的配置 信息, 所述上行第一密钥认证信息为使用所述第一密钥计算出的认证信息; 或者,
所述第三处理单元, 用于在所述第一验证单元验证所述下行第一密钥 认证信息之后, 接收所述接入设备发送来的使用所述第一密钥加密的配置 信息, 并向所述接入附件设备发送上行第一密钥认证信息, 并通过所述接 入附件设备将所述上行第一密钥认证信息转发给所述接入设备, 从而使所 述接入设备验证所述上行第一密钥认证信息, 并在验证通过后使所述配置 信息生效; 或者,
第四处理单元, 用于在所述第一验证单元验证所述下行第一密钥认证 信息之后, 接收所述接入设备发送来的使用所述第一密钥加密的配置信息, 并向所述接入附件设备发送上行第一密钥认证信息, 以使所述接入附件设 备验证所述上行第一密钥认证信息, 并在验证通过后使所述配置信息生效; 或者,
所述第四处理单元, 用于在所述第一验证单元验证所述下行第一密钥 认证信息之后, 向所述接入附件设备发送上行第一密钥认证信息, 以使所 述接入附件设备验证所述上行第一密钥认证信息, 接收所述接入附件设备 在验证所述上行第一密钥认证信息通过后发送的使用所述第一密钥加密的 配置信息, 所述使用所述第一密钥加密的配置信息为所述接入设备预先发 送给所述接入附件设备的;
第一连接建立单元, 用于使用所述第三处理单元或者所述第四处理单 元发送的配置信息与所述接入设备建立安全连接。
结合第五方面, 在第一种可能的实现方式中, 所述第四处理单元包括 第二子处理单元,
所述第二子处理单元, 具体用于向所述接入附件设备发送上行第一密 钥认证信息, 以使所述接入附件设备将所述上行第一密钥认证信息与期待 的上行第一密钥认证信息进行匹配, 若所述上行第一密钥认证信息为所述 期待的上行第一密钥认证信息时, 则所述接入附件设备验证所述上行第一 密钥认证信息通过; 所述期待的上行第一密钥认证信息为所述接入设备预 先发送给所述接入附件设备的。
结合第五方面或者第五方面第一种可能的实现方式, 在第二种可能的 实现方式中, 所述接入设备与所述接入附件设备之间通过有线方式通信, 所述待配置终端与所述接入附件设备之间通过近距离方式通信或者有线方 式通信。
本发明实施例第六方面提供一种接入附件设备, 与接入设备和待配置 终端通信连接, 所述接入设备与所述待配置终端通过密钥交换算法协商生 成第一密钥, 所述接入附件设备包括:
第二接收单元, 用于接收所述接入设备发送给所述待配置终端的下行 第一密钥认证信息, 所述下行第一密钥认证信息为使用所述第一密钥计算 出的认证信息;
第二发送单元, 用于转发所述第二接收单元接收到的所述下行第一密 钥认证信息, 使所述待配置终端验证所述下行第一密钥认证信息;
第五处理单元, 用于在所述第二发送单元转发所述下行第一密钥认证 信息之后, 接收并转发所述待配置终端发送给所述接入设备的上行第一密 钥认证信息, 以使所述接入设备验证所述上行第一密钥认证信息, 并在验 证通过后向所述待配置终端发送使用所述第一密钥加密的配置信息, 从而 使所述待配置终端使用所述配置信息与所述接入设备建立安全连接, 所述 上行第一密钥认证信息为使用所述第一密钥计算出的认证信息; 或者, 所述第五处理单元, 用于在所述第二发送单元转发所述下行第一密钥 认证信息之后, 接收并转发所述待配置终端发送给所述接入设备的上行第 一密钥认证信息, 以使所述接入设备在向所述待配置终端发送使用所述第 一密钥加密的配置信息后验证所述上行第一密钥认证信息, 并在验证通过 后使所述配置信息生效, 从而使所述待配置终端使用所述配置信息与所述 接入设备建立安全连接; 或者,
第六处理单元, 用于在所述第二发送单元转发所述下行第一密钥认证 信息之后, 接收并验证所述待配置终端发送的上行第一密钥认证信息, 在 验证通过后, 使所述第一密钥加密的配置信息生效, 从而使所述待配置终 端在接收到所述接入设备发送的所述配置信息且所述配置信息生效后, 使 用所述配置信息与所述接入设备建立安全连接; 或者,
所述第六处理单元, 用于在所述第二发送单元转发所述下行第一密钥 认证信息之后, 接收所述接入设备发送来的使用所述第一密钥加密的配置 信息, 接收并验证所述待配置终端发送的上行第一密钥认证信息, 在验证 通过后, 向所述待配置终端发送所述配置信息, 从而使所述待配置终端使 用所述配置信息与所述接入设备建立安全连接。
结合第六方面, 在第一种可能的实现方式中, 所述第六处理单元包括 第三子处理单元,
所述第三子处理单元, 具体用于接收所述接入设备发送来的期待的上 行第一密钥认证信息, 并将接收到的所述上行第一密钥认证信息与所述期 待的上行第一密钥认证信息进行匹配, 若所述上行第一密钥认证信息为所 述期待的上行第一密钥认证信息时, 则验证所述上行第一密钥认证信息通 过。
结合第六方面或者第六方面第一种可能的实现方式, 在第二种可能的 实现方式中, 所述接入设备与所述接入附件设备之间通过有线方式通信, 所述待配置终端与所述接入附件设备之间通过近距离方式通信或者有线方 式通信。
本发明实施例第七方面提供一种信息配置系统, 包括: 接入设备、 接 入附件设备和待配置终端, 所述接入设备、 接入附件设备和待配置终端之 间通信连接,
所述接入设备为上述技术方案所述的接入设备, 所述待配置终端为上 述技术方案所述的待配置终端, 所述接入附件设备为上述技术方案所述的 接入附件设备。
结合第七方面, 在第一种可能的实现方式中, 所述接入设备与所述接 入附件设备通过有线方式通信。
结合第七方面或者第七方面第一种可能的实现方式, 在第二种可能的 实现方式中, 所述接入附件设备与所述待配置终端通过近距离无线方式或 有线方式通信。
本发明实施例提供的信息配置方法, 接入设备与待配置终端协商生成 第一密钥后, 在通过待配置终端的下行验证, 接入设备或者接入附件设备 的上行验证后, 待配置终端才使用第一密钥加密的配置信息与接入设备建 立连接。 这种完全由设备之间的互相交互来完成建立连接的方案, 与现有 技术中的人工手动输入 PIN的方式进行入网信息配置相比, 不需要用户进行 手动输入, 降低了用户的操作难度, 提高了用户体验。
附图说明 为了更清楚地说明本发明实施例中的技术方案, 下面将对实施例描述 中所需要使用的附图作筒单地介绍, 显而易见地, 下面描述中的附图仅仅 是本发明的一些实施例, 对于本领域技术人员来讲, 在不付出创造性劳动 的前提下, 还可以根据这些附图获得其他的附图。
图 1是本发明实施例提供的信息配置方法的一实施例示意图; 图 2是本发明实施例提供的信息配置方法的另一实施例示意图; 图 3是本发明实施例提供的信息配置方法的另一实施例示意图; 图 4是本发明实施例中一应用场景实施例示意图;
图 5是本发明实施例中另一应用场景实施例示意图;
图 6是本发明实施例中另一应用场景实施例示意图;
图 7是本发明实施例中另一应用场景实施例示意图;
图 8是本发明实施例中接入设备的一实施例示意图;
图 9是本发明实施例中接入设备的另一实施例示意图; 图 10是本发明实施例中待配置终端的一实施例示意图;
图 11是本发明实施例中待配置终端的另一实施例示意图;
图 12是本发明实施例中接入附件设备的一实施例示意图;
图 13是本发明实施例中接入附件设备的另一实施例示意图;
图 14是本发明实施例中接入设备的另一实施例示意图;
图 15是本发明实施例中待配置终端的另一实施例示意图;
图 16是本发明实施例中接入附件设备的另一实施例示意图;
图 17是本发明实施例中信息配置系统的一实施例示意图。
具体实肺式 本发明实施例提供一种信息配置方法, 可以降低用户操作难度, 提高 网络安全性。 以下分别进行详细说明。
下面将结合本发明实施例中的附图, 对本发明实施例中的技术方案进 行清楚、 完整地描述, 显然, 所描述的实施例仅仅是本发明一部分实施例, 而不是全部的实施例。 基于本发明中的实施例, 本领域技术人员在没有作 出创造性劳动前提下所获得的所有其他实施例, 都属于本发明保护的范围。
本发明实施例中的接入设备可以为路由器、 调制解调器、 待配置终端 可以为手机、 电脑、 无线打印机等终端, 接入附件设备可以为具有通信功 能的智能卡, 本发明中的待配置终端也可以具有接入设备的功能, 接入设 备也可以具有待配置终端的功能。
以下本发明多个实施例中的接入设备、 接入附件设备和待配置终端通 信连接, 所述接入设备与所述接入附件设备可以通过有线方式通信, 所述 接入附件设备与所述待配置终端可以通过近距离无线方式或有线方式通 信, 所述接入设备与所述待配置终端可以通过无线方式通信; 所述有线方 式通信可以为通过通用串行总线( USB , Universal Serial BUS )方式通信, 所述近巨离无线方式通信可以为近场通信 ( NFC , Near field communication ) 方式通信,所述无线方式通信可以为通过无线保真(WirelessFidelity, WiFi ) 方式通信。 所述接入设备与所述接入附件设备通过有线方式通信, 可以防 止中间人攻击, 同时防止接入设备和接入附件设备的传输数据被攻击者偷 听, 并防止攻击者向接入附件设备写入墓改信息。 所述接入附件设备与所 述待配置终端可以采用近距离无线方式通信如 NFC通信, 或降低了功率使 得只能在很近距离如 1米范围内通信的 WiFi通信方式来进行通信, 由于两个 设备在很近的距离内交换消息难以被中间人攻击, 可以提高安全性。
参阅图 1 , 应用于与接入附件设备、 待配置终端通信的接入设备中, 本 发明实施例提供的信息配置方法的一实施例包括:
101、 接入设备与所述待配置终端通过密钥交换算法协商生成第一密 钥。
接入设备与所述待配置终端可以通过密钥交换算法, 如:
Diffie-Hellman, 即 DH密钥交换协议, 公钥加密算法(如: Ron Rivest、 Adi Shamirh、 LenAdleman, RSA )协议或椭圆曲线加密 EIGamal协议等协商生 成第一密钥。
以上几种算法协商生成的第一密钥只有接入设备和待配置终端知道, 其他设备都不知道该第一密钥。
102、 接入设备向所述接入附件设备发送下行第一密钥认证信息, 通过 所述接入附件设备将所述下行第一密钥认证信息转发给所述待配置终端, 从而使所述待配置终端验证所述下行第一密钥认证信息, 所述下行第一密 钥认证信息为使用所述第一密钥计算出的认证信息; 执行步骤 102后分别执 行步骤 103、 104、 105或者 106。
密钥认证信息可以有各种产生方法, 可以用密钥加密一个数据, 也可 以用密钥对一个数据作摘要运算等等。
当所述下行第一密钥认证信息验证正确时, 说明接入设备与待配置终 端持有相同的第一密钥, 从而确认对方的设备身份是真实的。
103、 接入设备接收所述待配置终端通过所述接入附件设备转发来的上 行第一密钥认证信息, 验证所述上行第一密钥认证信息, 并在验证通过后 向所述待配置终端发送使用所述第一密钥加密的配置信息, 以使所述待配 置终端使用所述配置信息与所述接入设备建立安全连接, 所述上行第一密 钥认证信息为使用所述第一密钥计算出的认证信息。
步骤 103的过程是当待配置终端验证下行第一密钥认证信息后, 向接入 附件设备发送上行第一密钥认证信息, 待接入设备验证完所述上行第一密 钥认证信息后, 若所述上行第一密钥认证信息通过验证, 则所述接入设备 向所述待配置终端发送使用所述第一密钥加密的配置信息, 以使所述待配 置终端使用所述配置信息与所述接入设备建立安全连接。 104、 接入设备向所述待配置终端发送使用所述第一密钥加密的配置信 息, 并验证所述待配置终端通过所述接入附件设备转发来的上行第一密钥 认证信息, 若验证通过, 则使所述配置信息生效, 以使所述待配置终端使 用所述配置信息与所述接入设备建立安全连接。
步骤 104的过程是接入设备可以在未接收到上行第一密钥认证信息时 向待配置终端发送使用第一密钥加密的配置信息, 然后接收到上行第一密 钥认证信息后再进行对上行第一密钥认证信息的验证, 当所述上行第一密 钥认证信息通过验证后, 使所述配置信息生效, 配置信息生效后, 待配置 终端才能使用所述配置信息与所述接入设备建立安全连接。
105、 接入设备向所述待配置终端发送使用所述第一密钥加密的配置信 息, 并通过所述接入附件设备验证所述待配置终端发送的上行第一密钥认 证信息, 若验证通过, 则通过所述接入附件设备使所述配置信息生效, 以 使所述待配置终端使用所述配置信息与所述接入设备建立安全连接。
步骤 105的过程是, 接入设备在待配置终端验证所述下行第一密钥认证 信息通过后, 直接向待配置终端发送使用第一密钥加密的配置信息, 步骤 105中接入设备不验证上行第一密钥认证信息, 而是由接入附件设备验证所 述上行第一密钥认证信息, 当验证通过后, 由接入附件设备使配置信息生 效, 从而使待配置终端使用所述配置信息与所述接入设备建立安全连接。
实际上, 作为 105的变形, 本发明实施例还可以为接入设备在待配置终 端验证所述下行第一密钥认证信息通过后, 向接入附件设备发送使用第一 密钥加密的配置信息, 再由接入附件设备将所述配置信息转发给所述待配 置终端, 其他的过程与步骤 105相同, 在此不再赘述。
106、 接入设备向所述接入附件设备发送使用所述第一密钥加密的配置 信息, 并通过所述接入附件设备验证所述待配置终端发送的上行第一密钥 认证信息, 若验证通过, 则通过所述接入附件设备将所述配置信息发送给 所述待配置终端, 以使所述待配置终端使用所述配置信息与所述接入设备 建立安全连接。
步骤 106的过程是, 接入设备在待配置终端验证所述下行第一密钥认证 信息通过后, 向接入附件设备发送使用第一密钥加密的配置信息, 接入附 件设备接收到待配置终端发送的上行第一密钥认证信息后, 验证所述上行 第一密钥认证信息, 并在验证通过后, 使所述配置信息生效, 并将生效的 配置信息发送给所述待配置终端。
本发明实施例, 应用于与接入附件设备、 待配置终端通信的接入设备 中, 所述方法包括: 与所述待配置终端通过密钥交换算法协商生成第一密 钥; 向所述接入附件设备发送下行第一密钥认证信息, 通过所述接入附件 设备将所述下行第一密钥认证信息转发给所述待配置终端, 从而使所述待 配置终端验证所述下行第一密钥认证信息, 所述下行第一密钥认证信息为 使用所述第一密钥计算出的认证信息; 接收所述待配置终端通过所述接入 附件设备转发来的上行第一密钥认证信息, 验证所述上行第一密钥认证信 息, 并在验证通过后向所述待配置终端发送使用所述第一密钥加密的配置 信息, 以使所述待配置终端使用所述配置信息与所述接入设备建立安全连 接, 所述上行第一密钥认证信息为使用所述第一密钥计算出的认证信息; 或者, 向所述待配置终端发送使用所述第一密钥加密的配置信息, 并验证 所述待配置终端通过所述接入附件设备转发来的上行第一密钥认证信息, 若验证通过, 则使所述配置信息生效, 以使所述待配置终端使用所述配置 信息与所述接入设备建立安全连接; 或者, 向所述待配置终端发送使用所 述第一密钥加密的配置信息, 并通过所述接入附件设备验证所述待配置终 端发送的上行第一密钥认证信息, 若验证通过, 则通过所述接入附件设备 使所述配置信息生效, 以使所述待配置终端使用所述配置信息与所述接入 设备建立安全连接; 或者, 向所述接入附件设备发送使用所述第一密钥加 密的配置信息, 并通过所述接入附件设备验证所述待配置终端发送的上行 第一密钥认证信息, 若验证通过, 则通过所述接入附件设备将所述配置信 息发送给所述待配置终端, 以使所述待配置终端使用所述配置信息与所述 接入设备建立安全连接。
本发明实施例提供的信息配置方法, 接入设备与待配置终端协商生成 第一密钥后, 在通过待配置终端的下行验证, 接入设备或者接入附件设备 的上行验证后, 待配置终端才使用第一密钥加密的配置信息与接入设备建 立连接。 本发明实施例提供的这种完全由设备之间的互相交互来完成入网 入网信息配置相比, 不需要用户进行手动输入, 降低了用户的操作难度, 提高了用户体验; 现有技术中由于 PIN很短, 仅由 8位数字组成, 很容易被 暴力攻击破解, 所以网络安全性低, 本发明实施例通过上下行双向验证后, 才使配置信息生效, 进一步提高了网络的安全性。
进一步地, 所述步骤 101具体可以在所述接入设备接收到所述待配置终 端的配置请求后发生。
可选地, 在上述图 1对应的实施例的基础上, 本发明实施例提供的信息 配置方法的另一实施例中, 在生成第一密钥之前, 所述接入设备可以与所 述接入附件设备共享第二密钥;
所述向接入附件设备发送下行第一密钥认证信息, 具体可以包括: 向接入附件设备发送使用所述第二密钥加密的下行第一密钥认证信 息。
可选地, 在上述图 1及图 1对应的可选实施例的基础上, 本发明实施例 提供的信息配置方法的另一实施例中,
所述通过所述接入附件设备验证所述待配置终端发送的上行第一密钥 认证信息, 具体可以包括:
向所述接入附件设备发送期待的上行第一密钥认证信息, 使所述接入 附件设备将接收到的所述上行第一密钥认证信息与所述期待的上行第一密 钥认证信息进行匹配, 若所述上行第一密钥认证信息为所述期待的上行第 一密钥认证信息时, 则所述接入附件设备验证所述上行第一密钥认证信息 通过。
作为该实施例的变形, 所述期待的上行第一密钥认证信息可以是和使 用第一密钥加密的配置信息一起发送给所述接入附件设备的。
在上述图 1及图 1对应的可选实施例的基础上, 本发明实施例提供的信 息配置方法的另一实施例中, 在所述通过所述接入附件设备将所述配置信 息发送给所述待配置终端之后, 还包括:
验证所述接入附件设备转发来的所述上行第一密钥认证信息, 若验证 通过, 则使所述配置信息生效。 本发明实施例是在接入附件设备验证所述上行第一密钥认证信息后, 再由接入设备再验证一次所述第一密钥认证信息, 从而使网络更安全。
参阅图 2, 应用于与接入设备、 接入附件设备通信的待配置终端中, 本 发明实施例提供的信息配置方法的另一实施例包括:
201、 待配置终端与所述接入设备通过密钥交换算法协商生成第一密 钥。
接入设备与所述待配置终端可以通过密钥交换算法, 如: Diffie-Hellman, 即 DH密钥交换协议, 公钥加密算法(如: Ron Rivest、 Adi Shamirh、 LenAdleman, RSA )协议或椭圆曲线加密 EIGamal协议等协商生 成第一密钥。
以上几种算法协商生成的第一密钥只有接入设备和待配置终端知道, 其他设备都不知道该第一密钥。
202、 待配置终端接收所述接入设备通过接入附件设备转发来的下行第 一密钥认证信息, 所述下行第一密钥认证信息为使用所述第一密钥计算出 的认证信息。
203、 待配置终端验证所述下行第一密钥认证信息; 步骤 203之后分别 执行步骤 204、 205、 206或者 207 , 分别执行完 204、 205、 206或者 207这几 个步骤后, 再执行 208。
204、 待配置终端向所述接入附件设备发送上行第一密钥认证信息, 并 通过所述接入附件设备将所述上行第一密钥认证信息转发给所述接入设 备, 从而使所述接入设备验证所述上行第一密钥认证信息, 接收所述接入 设备在验证所述上行第一密钥认证信息通过后发送来的使用所述第一密钥 加密的配置信息, 所述上行第一密钥认证信息为使用所述第一密钥计算出 的认证信息。
步骤 204的过程为: 待配置终端验证下行第一密钥认证信息后, 向接入 附件设备发送上行第一密钥认证信息, 由接入附件设备将所述上行第一密 钥认证信息转发给所述接入设备, 待接入设备验证上行第一密钥认证信息 后, 再接收接入设备发送来的使用第一密钥加密的配置信息。
205、 待配置终端接收所述接入设备发送来的使用所述第一密钥加密 的配置信息, 并向所述接入附件设备发送上行第一密钥认证信息, 并通过 所述接入附件设备将所述上行第一密钥认证信息转发给所述接入设备, 从 而使所述接入设备验证所述上行第一密钥认证信息, 并在验证通过后使所 述配置信息生效。
步骤 205的过程是: 待配置终端在验证完下行第一密钥认证信息后, 先 接收接入设备发送来的使用第一密钥加密的配置信息, 然后再向接入附件 设备发送上行第一密钥认证信息, 由接入附件设备将所述上行第一密钥认 证信息转发给所述接入设备, 由接入设备验证所述上行第一密钥认证信息, 验证通过后, 接入设备使所述配置信息生效。
206、 待配置终端接收所述接入设备发送来的使用所述第一密钥加密的 配置信息, 并向所述接入附件设备发送上行第一密钥认证信息, 以使所述 接入附件设备验证所述上行第一密钥认证信息, 并在验证通过后使所述配 置信息生效。
步骤 206的过程是: 待配置终端在验证完下行第一密钥认证信息后, 先 接收接入设备发送来的使用第一密钥加密的配置信息, 然后再向接入附件 设备发送上行第一密钥认证信息, 由接入附件设备验证所述上行第一密钥 认证信息, 验证通过后, 由所述接入附件设备使所述配置信息生效。
作为步骤 206的变形, 待配置终端在验证完下行第一密钥认证信息后, 也可以先接收接入附件设备发送来的使用第一密钥加密的配置信息, 然后, 再向接入附件设备发送上行第一密钥认证信息, 由接入附件设备验证所述 上行第一密钥认证信息, 验证通过后, 由所述接入附件设备使所述配置信 息生效。
207、 待配置终端向所述接入附件设备发送上行第一密钥认证信息, 以 使所述接入附件设备验证所述上行第一密钥认证信息, 接收所述接入附件 设备在验证所述上行第一密钥认证信息通过后发送的使用所述第一密钥加 密的配置信息, 所述使用所述第一密钥加密的配置信息为所述接入设备预 先发送给所述接入附件设备的。
步骤 207的过程是: 接入设备预先发送使用第一密钥加密的配置信息给 接入附件设备, 待配置终端在验证完下行第一密钥认证信息后, 向接入附 件设备发送上行第一密钥认证信息, 由接入附件设备验证所述上行第一密 钥认证信息, 验证通过后, 由接入附件设备使配置信息生效。
208、 待配置终端使用所述配置信息与所述接入设备建立安全连接。 本发明实施例中, 应用于与接入设备、 接入附件设备通信的待配置终 端中, 所述方法包括: 与所述接入设备通过密钥交换算法协商生成第一密 钥; 接收所述接入设备通过接入附件设备转发来的下行第一密钥认证信息, 所述下行第一密钥认证信息为使用所述第一密钥计算出的认证信息; 验证 所述下行第一密钥认证信息; 向所述接入附件设备发送上行第一密钥认证 信息, 并通过所述接入附件设备将所述上行第一密钥认证信息转发给所述 接入设备, 从而使所述接入设备验证所述上行第一密钥认证信息, 接收所 述接入设备在验证所述上行第一密钥认证信息通过后发送来的使用所述第 一密钥加密的配置信息, 所述上行第一密钥认证信息为使用所述第一密钥 计算出的认证信息; 或者, 接收所述接入设备发送来的使用所述第一密钥 加密的配置信息, 并向所述接入附件设备发送上行第一密钥认证信息, 并 通过所述接入附件设备将所述上行第一密钥认证信息转发给所述接入设 备, 从而使所述接入设备验证所述上行第一密钥认证信息, 并在验证通过 后使所述配置信息生效; 或者, 接收所述接入设备发送来的使用所述第一 密钥加密的配置信息, 并向所述接入附件设备发送上行第一密钥认证信息, 以使所述接入附件设备验证所述上行第一密钥认证信息, 并在验证通过后 使所述配置信息生效; 或者, 向所述接入附件设备发送上行第一密钥认证 信息, 以使所述接入附件设备验证所述上行第一密钥认证信息, 接收所述 接入附件设备在验证所述上行第一密钥认证信息通过后发送的使用所述第 一密钥加密的配置信息, 所述使用所述第一密钥加密的配置信息为所述接 入设备预先发送给所述接入附件设备的; 使用所述配置信息与所述接入设 备建立安全连接。
本发明实施例提供的信息配置方法, 接入设备与待配置终端协商生成 第一密钥后, 在通过待配置终端的下行验证, 接入设备或者接入附件设备 的上行验证后, 待配置终端才使用第一密钥加密的配置信息与接入设备建 立连接。 本发明实施例提供的这种完全由设备之间的互相交互来完成入网 入网信息配置相比, 不需要用户进行手动输入, 降低了用户的操作难度, 提高了用户体验; 现有技术中由于 PIN很短, 仅由 8位数字组成, 很容易被 暴力攻击破解, 所以网络安全性低, 本发明实施例通过上下行双向验证后, 才使配置信息生效, 进一步提高了网络的安全性。
进一步地, 所述步骤 201具体可以在所述待配置终端向所述接入设备发 送配置请求, 并且所述接入设备接收到所述待配置终端的配置请求后发生。
可选地, 在上述图 2对应的实施例的基础上, 本发明提供的信息配置方 法的另一实施例中,
所述以使所述接入附件设备验证所述上行第一密钥认证信息, 具体可 以包括:
以使所述接入附件设备将所述上行第一密钥认证信息与期待的上行第 一密钥认证信息进行匹配, 若所述上行第一密钥认证信息为所述期待的上 行第一密钥认证信息时, 则所述接入附件设备验证所述上行第一密钥认证 信息通过; 所述期待的上行第一密钥认证信息为所述接入设备预先发送给 所述接入附件设备的。
作为本实施例的变形, 所述期待的上行第一密钥认证信息可以与待配 置信息同时由接入设备发送给所述接入附件设备。
参阅图 3 , 应用于与接入设备、 待配置终端通信的接入附件设备中, 所 述接入设备与所述待配置终端通过密钥交换算法协商生成第一密钥, 本发 明实施例提供的信息配置方法的另一实施例包括:
301、 接入附件设备接收并转发所述接入设备发送给所述待配置终端的 下行第一密钥认证信息, 使所述待配置终端验证所述下行第一密钥认证信 息钥, 所述下行第一密钥认证信息为使用所述第一密钥计算出的认证信息。 执行完步骤 301之后, 分别执行步骤 302、 303、 304或者 305。
302、 接入附件设备接收并转发所述待配置终端发送给所述接入设备的 上行第一密钥认证信息, 以使所述接入设备验证所述上行第一密钥认证信 息, 并在验证通过后向所述待配置终端发送使用所述第一密钥加密的配置 信息, 从而使所述待配置终端使用所述配置信息与所述接入设备建立安全 连接, 所述上行第一密钥认证信息为使用所述第一密钥计算出的认证信息。 步骤 302的过程是: 接入附件设备接收所述待配置终端发送来的上行第 一密钥认证信息, 然后再向接入设备转发该上行第一密钥认证信息, 由接 入设备验证所述上行第一密钥认证信息, 并在验证通过后, 由接入设备向 所述待配置终端发送使用所述第一密钥加密的配置信息, 从而使所述待配 置终端使用所述配置信息与所述接入设备建立安全连接, 所述上行第一密 钥认证信息为使用所述第一密钥计算出的认证信息。
303、 接入附件设备接收并转发所述待配置终端发送给所述接入设备的 上行第一密钥认证信息, 以使所述接入设备在向所述待配置终端发送使用 所述第一密钥加密的配置信息后验证所述上行第一密钥认证信息, 并在验 证通过后使所述配置信息生效, 从而使所述待配置终端使用所述配置信息 与所述接入设备建立安全连接。
步骤 303的过程是: 接入附件设备接收所述待配置终端发送来的上行第 一密钥认证信息, 然后再向接入设备转发该上行第一密钥认证信息, 接入 设备在向所述待配置终端发送使用所述第一密钥加密的配置信息后验证所 述上行第一密钥认证信息, 验证通过后, 由所述接入设备使所述配置信息 生效, 从而使所述待配置终端使用所述配置信息与所述接入设备建立安全 连接。
304、 接入附件设备接收并验证所述待配置终端发送的上行第一密钥认 证信息, 在验证通过后, 使所述第一密钥加密的配置信息生效, 从而使所 述待配置终端在接收到所述接入设备发送的所述配置信息且所述配置信息 生效后, 使用所述配置信息与所述接入设备建立安全连接。
步骤 304的过程是: 接入附件设备接收所述待配置终端发送的上行第一 密钥认证信息后, 验证所述上行第一密钥认证信息, 并在验证通过后, 使 所述第一密钥加密的配置信息生效, 从而使所述待配置终端在接收到所述 接入设备发送的所述配置信息且所述配置信息生效后, 使用所述配置信息 与所述接入设备建立安全连接。
作为步骤 304的变形, 接入附件设备接收所述待配置终端发送的上行第 一密钥认证信息之前, 先接收接入设备发送来的使用所述第一密钥加密的 配置信息, 并先所述待配置终端转发所述第一密钥加密的配置信息, 然后 再接收并验证所述上行第一密钥认证信息, 并在验证通过后, 使所述第一 密钥加密的配置信息生效, 从而使所述待配置终端在接收到所述接入设备 发送的所述配置信息且所述配置信息生效后, 使用所述配置信息与所述接 入设备建立安全连接。
305、 接入附件设备接收所述接入设备发送来的使用所述第一密钥加密 的配置信息, 接收并验证所述待配置终端发送的上行第一密钥认证信息, 在验证通过后, 使所述配置信息生效, 并向所述待配置终端发送所述配置 信息, 从而使所述待配置终端使用所述配置信息与所述接入设备建立安全 连接。
步骤 305的过程为: 接入附件设备先接收所述接入设备发送来的使用所 述第一密钥加密的配置信息, 然后再接收并验证所述待配置终端发送的上 行第一密钥认证信息, 在验证通过后, 使所述配置信息生效, 并向所述待 配置终端发送所述配置信息, 从而使所述待配置终端使用所述配置信息与 所述接入设备建立安全连接。
本发明实施例中应用于与接入设备、 待配置终端通信的接入附件设备 中, 所述方法包括, 接收并转发所述接入设备发送给所述待配置终端的下 行第一密钥认证信息, 使所述待配置终端验证所述下行第一密钥认证信息 钥, 所述下行第一密钥认证信息为使用所述第一密钥计算出的认证信息; 接收并转发所述待配置终端发送给所述接入设备的上行第一密钥认证信 息, 以使所述接入设备验证所述上行第一密钥认证信息, 并在验证通过后 向所述待配置终端发送使用所述第一密钥加密的配置信息, 从而使所述待 配置终端使用所述配置信息与所述接入设备建立安全连接, 所述上行第一 密钥认证信息为使用所述第一密钥计算出的认证信息; 或者, 接收并转发 所述待配置终端发送给所述接入设备的上行第一密钥认证信息, 以使所述 接入设备在向所述待配置终端发送使用所述第一密钥加密的配置信息后验 证所述上行第一密钥认证信息, 并在验证通过后使所述配置信息生效, 从 而使所述待配置终端使用所述配置信息与所述接入设备建立安全连接; 或 者, 接收并验证所述待配置终端发送的上行第一密钥认证信息, 在验证通 过后, 使所述第一密钥加密的配置信息生效, 从而使所述待配置终端在接 收到所述接入设备发送的所述配置信息且所述配置信息生效后, 使用所述 配置信息与所述接入设备建立安全连接; 或者, 接收所述接入设备发送来 的使用所述第一密钥加密的配置信息, 接收并验证所述待配置终端发送的 上行第一密钥认证信息, 在验证通过后, 使所述配置信息生效, 并向所述 待配置终端发送所述配置信息, 从而使所述待配置终端使用所述配置信息 与所述接入设备建立安全连接。
本发明实施例提供的信息配置方法, 接入设备与待配置终端协商生成 第一密钥后, 在通过待配置终端的下行验证, 接入设备或者接入附件设备 的上行验证后, 待配置终端才使用第一密钥加密的配置信息与接入设备建 立连接。 本发明实施例提供的这种完全由设备之间的互相交互来完成入网 信息配置及建立连接的方案,与现有技术中的人工手动输入 PIN的方式进行 入网信息配置相比, 不需要用户进行手动输入, 降低了用户的操作难度, 提高了用户体验; 现有技术中由于 PIN很短, 仅由 8位数字组成, 很容易被 暴力攻击破解, 所以网络安全性低, 本发明实施例通过上下行双向验证后, 才使配置信息生效, 进一步提高了网络的安全性。
可选地, 在上述图 3对应的实施例的基础上, 本发明实施例提供的信息 配置方法的另一实施例中,
所述验证所述待配置终端发送的上行第一密钥认证信息, 具体可以包 括:
接收所述接入设备发送来的期待的上行第一密钥认证信息, 并将接收 到的所述上行第一密钥认证信息与所述期待的上行第一密钥认证信息进行 匹配, 若所述上行第一密钥认证信息为所述期待的上行第一密钥认证信息 时, 则验证所述上行第一密钥认证信息通过。
本发明实施例中, 所述期待的上行第一密钥认证信息可以与使用第一 密钥加密的配置信息同时接收。
为了便于理解, 下面以几个具体的应用场景为例, 详细说明本发明实 施例中信息配置方法的具体过程:
下面结合图 4详细描述本发明实施例中信息配置的具体过程: S100、 接入设备与待配置终端通过密钥交换算法协商生成第一密钥。 接入设备与所述待配置终端可以通过密钥交换算法, 如:
Diffie-Hellman, 即 DH密钥交换协议, 公钥加密算法(如: Ron Rivest、 Adi Shamirh、 LenAdleman, RSA )协议或椭圆曲线加密 EIGamal协议等协商生 成第一密钥。
以上几种算法是常见的密钥交换算法, 在没有中间人攻击的情况下, 协商生成的第一密钥只有接入设备和待配置终端知道, 即使交换过程的消 息被其它设备侦听到, 其它设备也难以知道该第一密钥。
实际上, 可选的, 在接入设备与待配置终端协商生成第一密钥之前, 接入设备与接入附件设备还可以共享第二密钥, 该第二密钥的共享方式可 以是出厂时就存储在接入设备与接入附件设备中的密钥。 此时的第二密钥 是静态设置的。 这种情况的接入附件设备和接入设备总是配对出现, 即一 个接入附件设备对应一个接入设备。 这种情况下可以不需要接入设备向接 入附件设备传递第二密钥的过程。 如果第二密钥不是出厂时存储在接入附 件设备中, 也可以由接入设备通过通用串行总线 (Universal Serial BUS , USB )等有线方式传递给接入附件设备, 此时的第二密钥可以是动态设置 的, 总是在接入附件设备插到接入设备的 USB或其它有线方式上时由接入 设备传递更新的第二密钥。 这种更新第二密钥的步骤不一定是在启动对待 配置终端的配置过程时发生的, 可以在接入附件设备插回接入设备的时刻 进行。
也可以将接入附件设备通过 USB等有线方式连接到接入设备, 亦即接 入附件设备插在接入设备上时, 理解为接入设备处于禁止配置新设备状态, 而接入附件设备与接入设备断开有线连接, 亦即接入附件设备未插在接入 设备上时, 理解为接入设备处于可配置新设备状态。
S105、 接入设备向所述接入附件设备发送下行第一密钥认证信息, 所 述下行第一密钥认证信息为使用所述第一密钥计算出的认证信息。
密钥认证信息可以有各种产生方法, 可以用密钥加密一个数据, 也可 以用密钥对一个数据作摘要运算等等。 本领域技术人员都理解认证信息的 计算方法, 这里不具体举例。 接入附件设备可以通过有线方式向接入附件设备传输下行第一密钥认 证信息。 该有线通信方式可以为通过 USB方式通信。
例如: 当一串数据为 "今天天气真好!", 使用第一密钥计算出的认证 信息可以为 "今天是个好日子!"。 那么下行第一密钥认证信息就为 "今天 是个好日子!"。
当接入附件设备与接入设备还共享第二密钥时, 接入设备向接入附件 设备发送下行第一密钥认证信息时, 也可以使用所述第二密钥加密所述下 行第一密钥认证信息。
S110、 接入附件设备向待配置终端发送所述下行第一密钥认证信息。 接入附件设备与待配置终端间可通过近距离无线方式通信或者有线方 式通信, 近距离无线方式通信, 如: NFC通信。 有线方式通信, 如: USB 方式通信。
S 115、 待配置终端验证所述下行第一密钥认证信息。
如果待配置终端也持有第一密钥, 那么待配置终端就可以读出下行第 一密钥认证信息, 如: 可以读出 "今天是个好日子!" 这条下行第一密钥认 证信息, 如果待配置终端没有持有第一密钥, 那么待配置终端就不能读出 "今天是个好日子!" 这条下行第一密钥认证信息。
如果待配置终端持有的第一密钥与接入设备的第一密钥不同, 则在相 同算法下降得到与收到的下行第一密钥认证信息不同的认证信息, 则可判 断出之前待配置终端与接入设备的密钥交换过程出错或者被中间人攻击, 配置过程应当终止。
当待配置终端验证所述下行第一密钥认证信息成功, 则可确定接入设 备为真实的接入设备。
S120、 待配置终端向接入附件设备发送上行第一密钥认证信息, 所述 上行第一密钥认证信息为使用所述第一密钥计算出的认证信息。
S125、接入附件设备向所述接入设备转发所述上行第一密钥认证信息。
S130、 接入设备验证所述上行第一密钥认证信息。
当接入设备验证出所述上行第一密钥认证信息, 则接入设备可以获知 待配置终端为真实的待配置终端, 可以向其发送配置信息, 使该待配置终 端接入网络。
S135、 接入设备向待配置终端发送使用第一密钥加密的配置信息, 即 接入设备使用第一密钥向待配置终端传递配置信息, 使所述待配置终端使 用所述配置信息与所述接入设备建立安全连接。
在 S135步骤之前还可以包括待配置终端向接入设备请求配置信息的可 选步骤。
S140、 待配置终端使用所述配置信息与接入设备建立安全连接。
图 4对应的应用场景中为上下行都验证成功后, 接入设备再向待配置终 端发送配置信息, 这种场景的配置信息待配置终端可以直接使用。 实际上, 信息配置过程还可以为下行验证成功后, 接入设备即可以向待配置终端发 送使用第一密钥加密的配置信息, 具体过程参阅图 5进行理解:
S200、 接入设备与待配置终端通过密钥交换算法协商生成第一密钥。 本实施例中接入设备与接入附件设备也可以共享第二密钥, 具体过程 与图 7对应的场景实施例相同, 这里不再赘述。
S205、 接入设备向所述接入附件设备发送下行第一密钥认证信息, 所 述下行第一密钥认证信息为使用所述第一密钥计算出的认证信息。
S210、 接入附件设备向待配置终端发送所述下行第一密钥认证信息。
S215、 待配置终端验证所述下行第一密钥认证信息。
S220、 接入设备向待配置终端发送使用第一密钥加密的配置信息, 使 所述待配置终端使用所述配置信息与所述接入设备建立安全连接。
在步骤 S220之前, 还可以包括待配置终端向接入设备请求配置信息的 可选步骤。
S225、 待配置终端向接入附件设备发送上行第一密钥认证信息, 所述 上行第一密钥认证信息为使用所述第一密钥计算出的认证信息。
S230、接入附件设备向所述接入设备转发所述上行第一密钥认证信息。 S235、 接入设备验证所述上行第一密钥认证信息, 并在验证所述第一 密钥认证信息通过后, 使所述配置信息生效。
S240、 待配置终端使用所述配置信息与接入设备建立安全连接。
图 5对应的场景的信息配置过程与图 4对应的场景的信息配置过程基本 相同, 只是在待配置终端验证下行第一密钥认证信息后, 先向接入设备请 求配置信息, 待接入设备发来使用第一密钥加密的配置信息后, 再向接入 附件设备发送上行第一密钥认证信息, 不过待配置终端要等到接入设备验 证所述第一密钥认证信息通过后, 接入设备使所述配置信息生效后, 才能 使用所述配置信息与接入设备建立安全连接。 如果所述上行第一密钥认证 信息没有通过接入设备的验证, 那么配置信息就不会生效, 待配置终端也 就无法建立安全连接, 图 5对应的应用场景中, 待配置终端在接收到使用第 一密钥加密的配置信息后不能直接使用, 要等到接入设备使该配置信息生 效后才能使用。
下面结合图 6详细描述本发明实施例中另一实施例的信息配置的具体 过程:
S300、 接入设备与待配置终端通过密钥交换算法协商生成第一密钥。 本实施例中接入设备与接入附件设备也可以共享第二密钥, 具体过程 与图 7对应的场景实施例相同, 这里不做详细赘述。
S305、 接入设备向接入附件设备发送下行第一密钥认证信息和期待的 上行第一密钥认证信息。
实际上, 也可以将 S305拆成两个过程分别发送。
S310、 接入附件设备向待配置终端发送下行第一密钥认证信息。
S315、 待配置终端验证所述下行第一密钥认证信息。
S320、接入设备向待配置终端发送使用所述第一密钥加密的配置信息。 作为 S320的变形, 也可以是接入设备向所述接入附件设备发送使用所 述第一密钥加密的配置信息, 通过所述接入附件设备转发所述使用所述第 一密钥加密的配置信息。
或者是, 在 S305中与下行第一密钥认证信息和期待的上行第一密钥认 证信息同时发送所述使用所述第一密钥加密的配置信息, 然后通过接入附 件设备转发所述使用所述第一密钥加密的配置信息。
S325、 接入附件设备接收待配置终端发送的上行第一密钥认证信息。 S330、 接入附件设备将所述上行第一密钥认证信息与期待的上行第一 密钥认证信息进行匹配, 当匹配到所述上行第一密钥认证信息为所述期待 的上行第一密钥认证信息时, 若验证通过, 则使所述配置信息生效。
S335、 待配置终端使用所述配置信息与所述接入设备建立安全连接。 图 6对应的应用场景中, 待配置终端接收到使用所述第一密钥加密的配 置信息后也不能直接使用, 要等到接入附件设备使该配置信息生效后才能 使用。
下面结合图 7详细描述本发明实施例中另一实施例的信息配置的具体 过程:
S400、 接入设备与待配置终端通过密钥交换算法协商生成第一密钥。 本实施例中接入设备与接入附件设备也可以共享第二密钥, 具体过程 与图 7对应的场景实施例相同, 这里不做详细赘述。
S405、 接入设备向接入附件设备发送下行第一密钥认证信息、 期待的 上行第一密钥认证信息和使用第一密钥加密的配置信息。
实际上, 也可以将 S305拆成两个或三个发送过程, 即将所述下行第一 密钥认证信息、 期待的上行第一密钥认证信息和使用第一密钥加密的配置 信息分多次发送给所述接入附件设备, 不过最终目的都相同, 都是为了发 送下行第一密钥认证信息、 期待的上行第一密钥认证信息和使用第一密钥 加密的配置信息这三个参数。
S410、 接入附件设备向待配置终端发送下行第一密钥认证信息。
S415、 待配置终端验证所述下行第一密钥认证信息。
S420、 待配置终端向接入附件设备发送上行第一密钥认证信息。
S425、 接入附件设备将所述上行第一密钥认证信息与期待的上行第一 密钥认证信息进行匹配, 若匹配上所述上行第一密钥认证信息为期待的上 行第一密钥认证信息, 则执行步骤后续步骤, 若匹配不上, 则不执行后续 步骤。
S430、 接入附件设备向所述待配置终端发送所述使用第一密钥加密的 配置信息。
S435、 待配置终端使用所述配置信息与接入设备建立安全连接。
实际上, 可选地, 在步骤 S430之后, 还可以进一步包括 S440和 S445两 个步骤, S440、 接入附件设备向接入设备发送上行第一密钥认证信息。
S445、 接入设备验证所述上行第一密钥认证信息, 若验证通过, 则使 所述配置信息生效。 此种情况下, 待配置终端接收到使用所述第一密钥加 密的配置信息后不能直接使用, 要等到接入设备使该配置信息生效后才能 使用。
S440和 S445这两个可选步骤, 在接入附件设备验证所述上行第一密钥 认证信息后, 再由接入设备再验证一次所述第一密钥认证信息, 从而使网 络更安全。
参阅图 8 , 本发明实施例提供的接入设备与接入附件设备和待配置终端 通信连接, 本发明实施例提供的接入设备的一实施例包括:
第一密钥生成单元 701 , 用于与所述待配置终端通过密钥交换算法协商 生成第一密钥;
第一发送单元 702 , 用于向所述接入附件设备发送下行第一密钥认证信 息, 通过所述接入附件设备将所述下行第一密钥认证信息转发给所述待配 置终端, 从而使所述待配置终端验证所述下行第一密钥认证信息, 所述下 行第一密钥认证信息为使用所述第一密钥生成单元 701生成的所述第一密 钥计算出的认证信息;
第一处理单元 703 , 用于在所述第一发送单元 702发送所述下行第一密 钥认证信息之后, 接收所述待配置终端通过所述接入附件设备转发来的上 行第一密钥认证信息, 验证所述上行第一密钥认证信息, 并在验证通过后 向所述待配置终端发送使用所述第一密钥加密的配置信息, 以使所述待配 置终端使用所述配置信息与所述接入设备建立安全连接, 所述上行第一密 钥认证信息为使用所述第一密钥计算出的认证信息; 或者,
所述第一处理单元 703 , 用于在所述第一发送单元 702发送所述下行第 一密钥认证信息之后, 向所述待配置终端发送使用所述第一密钥加密的配 置信息, 并验证所述待配置终端通过所述接入附件设备转发来的上行第一 密钥认证信息, 若验证通过, 则使所述配置信息生效, 以使所述待配置终 端使用所述配置信息与所述接入设备建立安全连接; 或者,
第二处理单元 704 , 用于在所述第一发送单元 702发送所述下行第一密 钥认证信息之后, 向所述待配置终端发送使用所述第一密钥加密的配置信 息, 并通过所述接入附件设备验证所述待配置终端发送的上行第一密钥认 证信息, 若验证通过, 则通过所述接入附件设备使所述配置信息生效, 以 使所述待配置终端使用所述配置信息与所述接入设备建立安全连接; 或者, 所述第二处理单元 704, 用于在所述第一发送单元 702发送所述下行第 一密钥认证信息之后, 向所述接入附件设备发送使用所述第一密钥加密的 配置信息, 并通过所述接入附件设备验证所述待配置终端发送的上行第一 密钥认证信息, 若验证通过, 则通过所述接入附件设备将所述配置信息发 送给所述待配置终端, 以使所述待配置终端使用所述配置信息与所述接入 设备建立安全连接。
本发明实施例中, 第一密钥生成单元 701与所述待配置终端通过密钥交 换算法协商生成第一密钥; 第一发送单元 702向所述接入附件设备发送下行 第一密钥认证信息, 通过所述接入附件设备将所述下行第一密钥认证信息 转发给所述待配置终端, 从而使所述待配置终端验证所述下行第一密钥认 证信息, 所述下行第一密钥认证信息为使用所述第一密钥生成单元 701生成 的所述第一密钥计算出的认证信息; 第一处理单元 703用于在所述第一发送 单元 702发送所述下行第一密钥认证信息之后, 接收所述待配置终端通过所 述接入附件设备转发来的上行第一密钥认证信息, 验证所述上行第一密钥 认证信息, 并在验证通过后向所述待配置终端发送使用所述第一密钥加密 的配置信息, 以使所述待配置终端使用所述配置信息与所述接入设备建立 安全连接, 所述上行第一密钥认证信息为使用所述第一密钥计算出的认证 信息; 或者, 所述第一处理单元 703在所述第一发送单元 702发送所述下行 第一密钥认证信息之后, 向所述待配置终端发送使用所述第一密钥加密的 配置信息, 并验证所述待配置终端通过所述接入附件设备转发来的上行第 一密钥认证信息, 若验证通过, 则使所述配置信息生效, 以使所述待配置 终端使用所述配置信息与所述接入设备建立安全连接; 或者, 第二处理单 元 704在所述第一发送单元 702发送所述下行第一密钥认证信息之后, 向所 述待配置终端发送使用所述第一密钥加密的配置信息, 并通过所述接入附 件设备验证所述待配置终端发送的上行第一密钥认证信息, 若验证通过, 则通过所述接入附件设备使所述配置信息生效, 以使所述待配置终端使用 所述配置信息与所述接入设备建立安全连接; 或者, 所述第二处理单元 704 在所述第一发送单元 702发送所述下行第一密钥认证信息之后, 向所述接入 附件设备发送使用所述第一密钥加密的配置信息, 并通过所述接入附件设 备验证所述待配置终端发送的上行第一密钥认证信息, 若验证通过, 则通 过所述接入附件设备将所述配置信息发送给所述待配置终端, 以使所述待 配置终端使用所述配置信息与所述接入设备建立安全连接。 与现有技术相 比, 本发明实施例提供的接入设备降低了入网信息配置的用户操作难度, 而且通过上下行双向验证后, 才使配置信息生效, 进一步提高了网络的安 全性。
在上述图 8对应的实施例的基础上, 参阅图 9 , 本发明实施例提供的接 入设备的另一实施例中, 所述第二处理单元 704包括第一子处理单元 7041 , 所述第一子处理单元 7041 , 具体用于向所述接入附件设备发送期待的 上行第一密钥认证信息, 使所述接入附件设备将接收到的所述上行第一密 钥认证信息与所述期待的上行第一密钥认证信息进行匹配, 若所述上行第 一密钥认证信息为所述期待的上行第一密钥认证信息时, 则所述接入附件 设备验证所述上行第一密钥认证信息通过。
在上述图 8或图 9对应的实施例的基础上, 本发明实施例提供的接入设 备的另一实施例中,
所述第二处理单元 704, 还用于验证所述接入附件设备转发来的所述上 行第一密钥认证信息, 若验证通过, 则使所述配置信息生效。
参阅图 10, 本发明实施例提供的待配置终端与接入设备和接入附件设 备通信连接, 本发明实施例提供的待配置终端的一实施例包括:
第二密钥生成单元 801 , 用于与所述接入设备通过密钥交换算法协商生 成第一密钥;
第一接收单元 802 , 用于接收所述接入设备通过接入附件设备转发来的 下行第一密钥认证信息, 所述下行第一密钥认证信息为使用所述第二密钥 生成单元 801生成的所述第一密钥计算出的认证信息;
第一验证单元 803 , 用于验证所述第一接收单元 802接收到的下行第一 密钥认证信息;
第三处理单元 804 , 用于在所述第一验证单元 803验证所述下行第一密 钥认证信息之后, 向所述接入附件设备发送上行第一密钥认证信息, 并通 过所述接入附件设备将所述上行第一密钥认证信息转发给所述接入设备, 从而使所述接入设备验证所述上行第一密钥认证信息, 接收所述接入设备 在验证所述上行第一密钥认证信息通过后发送来的使用所述第一密钥加密 的配置信息, 所述上行第一密钥认证信息为使用所述第一密钥计算出的认 证信息; 或者,
所述第三处理单元 804 , 用于在所述第一验证单元 803验证所述下行第 一密钥认证信息之后, 接收所述接入设备发送来的使用所述第一密钥加密 的配置信息, 并向所述接入附件设备发送上行第一密钥认证信息, 并通过 所述接入附件设备将所述上行第一密钥认证信息转发给所述接入设备, 从 而使所述接入设备验证所述上行第一密钥认证信息, 并在验证通过后使所 述配置信息生效; 或者,
第四处理单元 805 , 用于在所述第一验证单元 803验证所述下行第一密 钥认证信息之后, 接收所述接入设备发送来的使用所述第一密钥加密的配 置信息, 并向所述接入附件设备发送上行第一密钥认证信息, 以使所述接 入附件设备验证所述上行第一密钥认证信息, 并在验证通过后使所述配置 信息生效; 或者,
所述第四处理单元 805 , 用于在所述第一验证单元 803验证所述下行第 一密钥认证信息之后, 向所述接入附件设备发送上行第一密钥认证信息, 以使所述接入附件设备验证所述上行第一密钥认证信息, 接收所述接入附 件设备在验证所述上行第一密钥认证信息通过后发送的使用所述第一密钥 加密的配置信息, 所述使用所述第一密钥加密的配置信息为所述接入设备 预先发送给所述接入附件设备的;
第一连接建立单元 806 , 用于使用所述第三处理单元 804或者所述第四 处理单元 805发送的配置信息与所述接入设备建立安全连接。
本发明实施例中, 第二密钥生成单元 801与所述接入设备通过密钥交换 算法协商生成第一密钥; 第一接收单元 802接收所述接入设备通过接入附件 设备转发来的下行第一密钥认证信息, 所述下行第一密钥认证信息为使用 所述第二密钥生成单元 801生成的所述第一密钥计算出的认证信息; 第一验 证单元 803验证所述第一接收单元 802接收到的下行第一密钥认证信息; 第 三处理单元 804在所述第一验证单元 803验证所述下行第一密钥认证信息之 后, 向所述接入附件设备发送上行第一密钥认证信息, 并通过所述接入附 件设备将所述上行第一密钥认证信息转发给所述接入设备, 从而使所述接 入设备验证所述上行第一密钥认证信息, 接收所述接入设备在验证所述上 行第一密钥认证信息通过后发送来的使用所述第一密钥加密的配置信息, 所述上行第一密钥认证信息为使用所述第一密钥计算出的认证信息; 或者, 所述第三处理单元 804在所述第一验证单元 803验证所述下行第一密钥认证 信息之后, 接收所述接入设备发送来的使用所述第一密钥加密的配置信息, 并向所述接入附件设备发送上行第一密钥认证信息, 并通过所述接入附件 设备将所述上行第一密钥认证信息转发给所述接入设备, 从而使所述接入 设备验证所述上行第一密钥认证信息, 并在验证通过后使所述配置信息生 效; 或者, 第四处理单元 805在所述第一验证单元 803验证所述下行第一密 钥认证信息之后, 接收所述接入设备发送来的使用所述第一密钥加密的配 置信息, 并向所述接入附件设备发送上行第一密钥认证信息, 以使所述接 入附件设备验证所述上行第一密钥认证信息, 并在验证通过后使所述配置 信息生效; 或者, 所述第四处理单元 805在所述第一验证单元 803验证所述 下行第一密钥认证信息之后, 向所述接入附件设备发送上行第一密钥认证 信息, 以使所述接入附件设备验证所述上行第一密钥认证信息, 接收所述 接入附件设备在验证所述上行第一密钥认证信息通过后发送的使用所述第 一密钥加密的配置信息, 所述使用所述第一密钥加密的配置信息为所述接 入设备预先发送给所述接入附件设备的; 第一连接建立单元 806使用所述第 三处理单元 804或者所述第四处理单元 805发送的配置信息与所述接入设备 建立安全连接。 与现有技术相比, 本发明实施例提供的待配置终端降低了 入网信息配置的用户操作难度, 提高了网络安全性。
在上述图 10对应的实施例的基础上, 参阅图 11 , 本发明实施例提供的 待配置终端的另一实施例中, 所述第四处理单元 805包括第二子处理单元 8051 ,
所述第二子处理单元 8051 , 具体用于向所述接入附件设备发送上行第 一密钥认证信息, 以使所述接入附件设备将所述上行第一密钥认证信息与 期待的上行第一密钥认证信息进行匹配, 若所述上行第一密钥认证信息为 所述期待的上行第一密钥认证信息时, 则所述接入附件设备验证所述上行 第一密钥认证信息通过; 所述期待的上行第一密钥认证信息为所述接入设 备预先发送给所述接入附件设备的。
参阅图 12 , 本发明实施例提供的接入附件设备与接入设备和待配置终 端通信连接, 本发明实施例提供的接入附件设备的一实施例包括:
第二接收单元 901 , 用于接收所述接入设备发送给所述待配置终端的下 行第一密钥认证信息, 所述下行第一密钥认证信息为使用所述第一密钥计 算出的认证信息;
第二发送单元 902 , 用于转发所述第二接收单元 901接收到的所述下行 第一密钥认证信息, 使所述待配置终端验证所述下行第一密钥认证信息; 第五处理单元 903 , 用于在所述第二发送单元 902转发所述下行第一密 钥认证信息之后, 接收并转发所述待配置终端发送给所述接入设备的上行 第一密钥认证信息, 以使所述接入设备验证所述上行第一密钥认证信息, 并在验证通过后向所述待配置终端发送使用所述第一密钥加密的配置信 息, 从而使所述待配置终端使用所述配置信息与所述接入设备建立安全连 接, 所述上行第一密钥认证信息为使用所述第一密钥计算出的认证信息; 或者,
所述第五处理单元 903 , 用于在所述第二发送单元 902转发所述下行第 一密钥认证信息之后, 接收并转发所述待配置终端发送给所述接入设备的 上行第一密钥认证信息, 以使所述接入设备在向所述待配置终端发送使用 所述第一密钥加密的配置信息后验证所述上行第一密钥认证信息, 并在验 证通过后使所述配置信息生效, 从而使所述待配置终端使用所述配置信息 与所述接入设备建立安全连接; 或者,
第六处理单元 904, 用于在所述第二发送单元 902转发所述下行第一密 钥认证信息之后, 接收并验证所述待配置终端发送的上行第一密钥认证信 息, 在验证通过后, 使所述第一密钥加密的配置信息生效, 从而使所述待 配置终端在接收到所述接入设备发送的所述配置信息且所述配置信息生效 后, 使用所述配置信息与所述接入设备建立安全连接; 或者,
所述第六处理单元 904, 用于在所述第二发送单元 902转发所述下行第 一密钥认证信息之后, 接收所述接入设备发送来的使用所述第一密钥加密 的配置信息, 接收并验证所述待配置终端发送的上行第一密钥认证信息, 在验证通过后, 向所述待配置终端发送所述配置信息, 从而使所述待配置 终端使用所述配置信息与所述接入设备建立安全连接。
本发明实施例中, 第二接收单元 901接收所述接入设备发送给所述待配 置终端的下行第一密钥认证信息, 所述下行第一密钥认证信息为使用所述 第一密钥计算出的认证信息; 第二发送单元 902转发所述第二接收单元 901 接收到的所述下行第一密钥认证信息, 使所述待配置终端验证所述下行第 一密钥认证信息; 第五处理单元 903在所述第二发送单元 902转发所述下行 第一密钥认证信息之后, 接收并转发所述待配置终端发送给所述接入设备 的上行第一密钥认证信息, 以使所述接入设备验证所述上行第一密钥认证 信息, 并在验证通过后向所述待配置终端发送使用所述第一密钥加密的配 置信息, 从而使所述待配置终端使用所述配置信息与所述接入设备建立安 全连接, 所述上行第一密钥认证信息为使用所述第一密钥计算出的认证信 息; 或者, 所述第五处理单元 903在所述第二发送单元 902转发所述下行第 一密钥认证信息之后, 接收并转发所述待配置终端发送给所述接入设备的 上行第一密钥认证信息, 以使所述接入设备在向所述待配置终端发送使用 所述第一密钥加密的配置信息后验证所述上行第一密钥认证信息, 并在验 证通过后使所述配置信息生效, 从而使所述待配置终端使用所述配置信息 与所述接入设备建立安全连接; 或者, 第六处理单元 904在所述第二发送单 元 902转发所述下行第一密钥认证信息之后, 接收并验证所述待配置终端发 送的上行第一密钥认证信息, 在验证通过后, 使所述第一密钥加密的配置 信息生效, 从而使所述待配置终端在接收到所述接入设备发送的所述配置 信息且所述配置信息生效后, 使用所述配置信息与所述接入设备建立安全 连接; 或者, 所述第六处理单元 904在所述第二发送单元 902转发所述下行 第一密钥认证信息之后, 接收所述接入设备发送来的使用所述第一密钥加 密的配置信息, 接收并验证所述待配置终端发送的上行第一密钥认证信息, 在验证通过后, 向所述待配置终端发送所述配置信息, 从而使所述待配置 终端使用所述配置信息与所述接入设备建立安全连接。 与现有技术相比, 本发明实施例接入附件设备可以降低了入网信息配置的用户操作难度, 提 高了网络安全性。
在上述图 12对应的实施例的基础上, 参阅图 13 , 本发明实施例提供的 接入附件设备的另一实施例中, 所述第六处理单元 904包括第三子处理单元 9041 ,
所述第三子处理单元 9041 , 具体用于接收所述接入设备发送来的期待 的上行第一密钥认证信息, 并将接收到的所述上行第一密钥认证信息与所 述期待的上行第一密钥认证信息进行匹配, 若所述上行第一密钥认证信息 为所述期待的上行第一密钥认证信息时, 则验证所述上行第一密钥认证信 息通过。
参阅图 14, 本发明实施例提供的接入设备与接入附件设备和待配置终 端通信连接, 本发明实施例提供的接入设备的一实施例包括: 第一输入装 置 700、 第一输出装置 710、 第一存储器 720和第一处理器 730 (第一处理器 730可以为一个或多个, 图 14以一个为例);
第一输入装置 700、第一输出装置 710、第一存储器 720和第一处理器 730 可以通过总线或者其他方式连接;
其中, 所述第一处理器 730用于与所述待配置终端通过密钥交换算法协 商生成第一密钥;
所述第一输出装置 710用于向所述接入附件设备发送下行第一密钥认 证信息, 通过所述接入附件设备将所述下行第一密钥认证信息转发给所述 待配置终端, 从而使所述待配置终端验证所述下行第一密钥认证信息, 所 述下行第一密钥认证信息为使用所述第一密钥计算出的认证信息;
第一输入装置 700用于接收所述待配置终端通过所述接入附件设备转 发来的上行第一密钥认证信息, 所述第一处理器 730用于验证所述上行第一 密钥认证信息, 所述第一输出装置 710用于在验证通过后向所述待配置终端 发送使用所述第一密钥加密的配置信息, 以使所述待配置终端使用所述配 置信息与所述接入设备建立安全连接, 所述上行第一密钥认证信息为使用 所述第一密钥计算出的认证信息; 或者,
所述第一输出装置 710用于向所述待配置终端发送使用所述第一密钥 加密的配置信息, 所述第一处理器 730用于验证所述待配置终端通过所述接 入附件设备转发来的上行第一密钥认证信息, 若验证通过, 则使所述配置 信息生效, 以使所述待配置终端使用所述配置信息与所述接入设备建立安 全连接; 或者,
所述第一输出装置 710用于向所述待配置终端发送使用所述第一密钥 加密的配置信息, 并通过所述接入附件设备验证所述待配置终端发送的上 行第一密钥认证信息, 若验证通过, 则通过所述接入附件设备使所述配置 信息生效, 以使所述待配置终端使用所述配置信息与所述接入设备建立安 全连接; 或者,
所述第一输出装置 710用于向所述接入附件设备发送使用所述第一密 钥加密的配置信息, 并通过所述接入附件设备验证所述待配置终端发送的 上行第一密钥认证信息, 若验证通过, 则通过所述接入附件设备将所述配 置信息发送给所述待配置终端, 以使所述待配置终端使用所述配置信息与 所述接入设备建立安全连接。
在本发明的一些实施例中, 所述接入设备与所述接入附件设备共享第 二密钥,
所述第一输出装置 710用于向接入附件设备发送使用第二密钥加密的 下行第一密钥认证信息。
在本发明的一些实施例中, 所述第一输出装置 710具体用于向所述接入 附件设备发送期待的上行第一密钥认证信息, 使所述接入附件设备将接收 到的所述上行第一密钥认证信息与所述期待的上行第一密钥认证信息进行 匹配, 若所述上行第一密钥认证信息为所述期待的上行第一密钥认证信息 时, 则所述接入附件设备验证所述上行第一密钥认证信息通过。
在本发明的一些实施例中, 所述第一处理器 730还用于验证所述接入附 件设备转发来的所述上行第一密钥认证信息, 若验证通过, 则使所述配置 信息生效。
在本发明的一些实施例中, 所述第一处理器 730具体用于与所述待配置 终端通过密钥交换协议 Diffie-Hellman或公钥加密算法 RSA协议或椭圆曲线 加密 EIGamal协议协商生成第一密钥。
参阅图 15 , 本发明实施例提供的待配置终端与接入设备和接入附件设 备通信连接, 本发明实施例提供的待配置终端的一实施例包括: 第二输入 装置 800、 第二输出装置 810、 第二存储器 820和第二处理器 830 (第二处理 器 830可以为一个或多个, 图 15以一个为例);
第二输入装置 800、第二输出装置 810、第二存储器 820和第二处理器 830 可以通过总线或者其他方式连接;
所述第二处理器 830用于与所述接入设备通过密钥交换算法协商生成 第一密钥;
所述第二输入装置 800用于接收所述接入设备通过接入附件设备转发 来的下行第一密钥认证信息, 所述下行第一密钥认证信息为使用所述第一 密钥计算出的认证信息;
所述第二处理器 830用于验证所述下行第一密钥认证信息;
所述第二输出装置 810用于向所述接入附件设备发送上行第一密钥认 证信息, 并通过所述接入附件设备将所述上行第一密钥认证信息转发给所 述接入设备, 从而使所述接入设备验证所述上行第一密钥认证信息, 所述 第二输入装置 800用于接收所述接入设备在验证所述上行第一密钥认证信 息通过后发送来的使用所述第一密钥加密的配置信息, 所述上行第一密钥 认证信息为使用所述第一密钥计算出的认证信息; 或者,
所述第二输入装置 800用于接收所述接入设备发送来的使用所述第一 密钥加密的配置信息, 所述第二输出装置 810用于向所述接入附件设备发送 上行第一密钥认证信息, 并通过所述接入附件设备将所述上行第一密钥认 证信息转发给所述接入设备, 从而使所述接入设备验证所述上行第一密钥 认证信息, 并在验证通过后使所述配置信息生效; 或者,
所述第二输入装置 800用于接收所述接入设备发送来的使用所述第一 密钥加密的配置信息, 所述第二输出装置 810用于向所述接入附件设备发送 上行第一密钥认证信息, 以使所述接入附件设备验证所述上行第一密钥认 证信息, 并在验证通过后使所述配置信息生效; 或者,
所述第二输出装置 810用于向所述接入附件设备发送上行第一密钥认 证信息, 以使所述接入附件设备验证所述上行第一密钥认证信息, 所述第 二输入装置 800用于接收所述接入附件设备在验证所述上行第一密钥认证 信息通过后发送的使用所述第一密钥加密的配置信息, 所述使用所述第一 密钥加密的配置信息为所述接入设备预先发送给所述接入附件设备的; 所述第二处理器 830用于使用所述配置信息与所述接入设备建立安全 连接。
在本发明的一些实施例中, 所述第二输出装置 810用于向所述接入附件 设备发送上行第一密钥认证信息, 以使所述接入附件设备将所述上行第一 密钥认证信息与期待的上行第一密钥认证信息进行匹配, 若所述上行第一 密钥认证信息为所述期待的上行第一密钥认证信息时, 则所述接入附件设 备验证所述上行第一密钥认证信息通过; 所述期待的上行第一密钥认证信 息为所述接入设备预先发送给所述接入附件设备的。
参阅图 16, 本发明实施例提供的接入附件设备与接入设备和待配置终 端通信连接, 所述接入设备与所述待配置终端通过密钥交换算法协商生成 第一密钥, 本发明实施例提供的接入附件设备的一实施例包括: 第三输入 装置 900、 第三输出装置 910、 第三存储器 920和第三处理器 930 (第三处理 器 930可以为一个或多个, 图 16以一个为例);
第三输入装置 900、第三输出装置 910、第三存储器 920和第三处理器 930 可以通过总线或者其他方式连接;
所述第三输入装置 900接收且所述第三输出装置 910转发所述接入设备 发送给所述待配置终端的下行第一密钥认证信息, 使所述待配置终端验证 所述下行第一密钥认证信息钥, 所述下行第一密钥认证信息为使用所述第 一密钥计算出的认证信息;
所述第三输入装置 900接收且所述第三输出装置 910转发所述待配置终 端发送给所述接入设备的上行第一密钥认证信息, 以使所述接入设备验证 所述上行第一密钥认证信息, 并在验证通过后向所述待配置终端发送使用 所述第一密钥加密的配置信息, 从而使所述待配置终端使用所述配置信息 与所述接入设备建立安全连接, 所述上行第一密钥认证信息为使用所述第 一密钥计算出的认证信息; 或者,
所述第三输入装置 900接收且所述第三输出装置 910接收并转发所述待 配置终端发送给所述接入设备的上行第一密钥认证信息, 以使所述接入设 备在向所述待配置终端发送使用所述第一密钥加密的配置信息后验证所述 上行第一密钥认证信息, 并在验证通过后使所述配置信息生效, 从而使所 述待配置终端使用所述配置信息与所述接入设备建立安全连接; 或者, 所述第三输入装置 900接收所述待配置终端发送的上行第一密钥认证 信息, 所述第三处理器 930验证所述待配置终端发送的上行第一密钥认证信 息, 在验证通过后, 使所述第一密钥加密的配置信息生效, 从而使所述待 配置终端在接收到所述接入设备发送的所述配置信息且所述配置信息生效 后, 使用所述配置信息与所述接入设备建立安全连接; 或者,
所述第三输入装置 900接收所述接入设备发送来的使用所述第一密钥 加密的配置信息, 所述第三输入装置 900接收所述待配置终端发送的上行第 一密钥认证信息, 所述第三处理器 930并验证所述待配置终端发送的上行第 一密钥认证信息, 在验证通过后, 使所述配置信息生效, 所述第三输出装 置 910向所述待配置终端发送所述配置信息, 从而使所述待配置终端使用所 述配置信息与所述接入设备建立安全连接。
在本发明的一些实施例中, 所述第三输入装置 900用于接收所述接入设 备发送来的期待的上行第一密钥认证信息, 所述第三处理器 930用于将接收 到的所述上行第一密钥认证信息与所述期待的上行第一密钥认证信息进行 匹配, 若所述上行第一密钥认证信息为所述期待的上行第一密钥认证信息 时, 则验证所述上行第一密钥认证信息通过。
参阅图 17 , 本发明实施例提供的信息配置系统的一实施例包括: 接入 设备 70、 接入附件设备 90和待配置终端 80, 所述接入设备 70、 接入附件设 备 90和待配置终端 80之间通信连接,
所述接入设备 70, 用于与所述待配置终端通过密钥交换算法协商生成 第一密钥; 向所述接入附件设备发送下行第一密钥认证信息, 通过所述接 入附件设备将所述下行第一密钥认证信息转发给所述待配置终端, 从而使 所述待配置终端验证所述下行第一密钥认证信息, 所述下行第一密钥认证 信息为使用所述第一密钥计算出的认证信息; 接收所述待配置终端通过所 述接入附件设备转发来的上行第一密钥认证信息, 验证所述上行第一密钥 认证信息, 并在验证通过后向所述待配置终端发送使用所述第一密钥加密 的配置信息, 以使所述待配置终端使用所述配置信息与所述接入设备建立 安全连接, 所述上行第一密钥认证信息为使用所述第一密钥计算出的认证 信息; 或者, 向所述待配置终端发送使用所述第一密钥加密的配置信息, 并验证所述待配置终端通过所述接入附件设备转发来的上行第一密钥认证 信息, 若验证通过, 则使所述配置信息生效, 以使所述待配置终端使用所 述配置信息与所述接入设备建立安全连接; 或者, 向所述待配置终端发送 使用所述第一密钥加密的配置信息, 并通过所述接入附件设备验证所述待 配置终端发送的上行第一密钥认证信息, 若验证通过, 则通过所述接入附 件设备使所述配置信息生效, 以使所述待配置终端使用所述配置信息与所 述接入设备建立安全连接; 或者, 向所述接入附件设备发送使用所述第一 密钥加密的配置信息, 并通过所述接入附件设备验证所述待配置终端发送 的上行第一密钥认证信息, 若验证通过, 则通过所述接入附件设备将所述 配置信息发送给所述待配置终端, 以使所述待配置终端使用所述配置信息 与所述接入设备建立安全连接。
所述待配置终端 80 , 用于与所述接入设备通过密钥交换算法协商生成 第一密钥; 接收所述接入设备通过接入附件设备转发来的下行第一密钥认 证信息, 所述下行第一密钥认证信息为使用所述第一密钥计算出的认证信 息; 验证所述下行第一密钥认证信息; 向所述接入附件设备发送上行第一 密钥认证信息, 并通过所述接入附件设备将所述上行第一密钥认证信息转 发给所述接入设备, 从而使所述接入设备验证所述上行第一密钥认证信息, 接收所述接入设备在验证所述上行第一密钥认证信息通过后发送来的使用 所述第一密钥加密的配置信息, 所述上行第一密钥认证信息为使用所述第 一密钥计算出的认证信息; 或者, 接收所述接入设备发送来的使用所述第 一密钥加密的配置信息, 并向所述接入附件设备发送上行第一密钥认证信 息, 并通过所述接入附件设备将所述上行第一密钥认证信息转发给所述接 入设备, 从而使所述接入设备验证所述上行第一密钥认证信息, 并在验证 通过后使所述配置信息生效; 或者, 接收所述接入设备发送来的使用所述 第一密钥加密的配置信息, 并向所述接入附件设备发送上行第一密钥认证 信息, 以使所述接入附件设备验证所述上行第一密钥认证信息, 并在验证 通过后使所述配置信息生效; 或者, 向所述接入附件设备发送上行第一密 钥认证信息, 以使所述接入附件设备验证所述上行第一密钥认证信息, 接 收所述接入附件设备在验证所述上行第一密钥认证信息通过后发送的使用 所述第一密钥加密的配置信息, 所述使用所述第一密钥加密的配置信息为 所述接入设备预先发送给所述接入附件设备的; 使用所述配置信息与所述 接入设备建立安全连接。
所述接入附件设备 90, 用于接收并转发所述接入设备发送给所述待配 置终端的下行第一密钥认证信息, 使所述待配置终端验证所述下行第一密 钥认证信息钥, 所述下行第一密钥认证信息为使用所述第一密钥计算出的 认证信息; 接收并转发所述待配置终端发送给所述接入设备的上行第一密 钥认证信息, 以使所述接入设备验证所述上行第一密钥认证信息, 并在验 证通过后向所述待配置终端发送使用所述第一密钥加密的配置信息, 从而 使所述待配置终端使用所述配置信息与所述接入设备建立安全连接, 所述 上行第一密钥认证信息为使用所述第一密钥计算出的认证信息; 或者, 接 收并转发所述待配置终端发送给所述接入设备的上行第一密钥认证信息, 以使所述接入设备在向所述待配置终端发送使用所述第一密钥加密的配置 信息后验证所述上行第一密钥认证信息, 并在验证通过后使所述配置信息 生效, 从而使所述待配置终端使用所述配置信息与所述接入设备建立安全 连接; 或者, 接收并验证所述待配置终端发送的上行第一密钥认证信息, 在验证通过后, 使所述第一密钥加密的配置信息生效, 从而使所述待配置 终端在接收到所述接入设备发送的所述配置信息且所述配置信息生效后, 使用所述配置信息与所述接入设备建立安全连接; 或者, 接收所述接入设 备发送来的使用所述第一密钥加密的配置信息, 接收并验证所述待配置终 端发送的上行第一密钥认证信息, 在验证通过后, 使所述配置信息生效, 并向所述待配置终端发送所述配置信息, 从而使所述待配置终端使用所述 配置信息与所述接入设备建立安全连接。 本领域普通技术人员可以理解上述实施例的各种方法中的全部或部分 步骤是可以通过程序来指令相关的硬件来完成, 该程序可以存储于一计算 机可读存储介质中, 存储介质可以包括: ROM、 RAM, 磁盘或光盘等。
以上对本发明实施例所提供的信息配置方法、 设备以及系统进行了详
以上实施例的说明只是用于帮助理解本发明的方法及其核心思想; 同时, 对于本领域的一般技术人员, 依据本发明的思想, 在具体实施方式及应用 范围上均会有改变之处, 综上所述, 本说明书内容不应理解为对本发明的 限制。

Claims

权利要求
1、 一种信息配置方法, 其特征在于, 应用于与接入附件设备、 待配置 终端通信的接入设备中, 所述方法包括:
与所述待配置终端通过密钥交换算法协商生成第一密钥;
向所述接入附件设备发送下行第一密钥认证信息, 通过所述接入附件 设备将所述下行第一密钥认证信息转发给所述待配置终端, 从而使所述待 配置终端验证所述下行第一密钥认证信息, 所述下行第一密钥认证信息为 使用所述第一密钥计算出的认证信息;
接收所述待配置终端通过所述接入附件设备转发来的上行第一密钥认 证信息, 验证所述上行第一密钥认证信息, 并在验证通过后向所述待配置 终端发送使用所述第一密钥加密的配置信息, 以使所述待配置终端使用所 述配置信息与所述接入设备建立安全连接, 所述上行第一密钥认证信息为 使用所述第一密钥计算出的认证信息; 或者,
向所述待配置终端发送使用所述第一密钥加密的配置信息, 并验证所 述待配置终端通过所述接入附件设备转发来的上行第一密钥认证信息, 若 验证通过, 则使所述配置信息生效, 以使所述待配置终端使用所述配置信 息与所述接入设备建立安全连接; 或者,
向所述待配置终端发送使用所述第一密钥加密的配置信息, 并通过所 述接入附件设备验证所述待配置终端发送的上行第一密钥认证信息, 若验 证通过, 则通过所述接入附件设备使所述配置信息生效, 以使所述待配置 终端使用所述配置信息与所述接入设备建立安全连接; 或者,
向所述接入附件设备发送使用所述第一密钥加密的配置信息, 并通过 所述接入附件设备验证所述待配置终端发送的上行第一密钥认证信息, 若 验证通过, 则通过所述接入附件设备将所述配置信息发送给所述待配置终 端, 以使所述待配置终端使用所述配置信息与所述接入设备建立安全连接。
2、 根据权利要求 1所述的信息配置方法, 其特征在于, 所述接入设备 与所述接入附件设备共享第二密钥,
所述向接入附件设备发送下行第一密钥认证信息, 具体包括: 向接入附件设备发送使用第二密钥加密的下行第一密钥认证信息。
3、 根据权利要求 1或 2所述的信息配置方法, 其特征在于, 所述通过所 述接入附件设备验证所述待配置终端发送的上行第一密钥认证信息, 具体 包括:
向所述接入附件设备发送期待的上行第一密钥认证信息, 使所述接入 附件设备将接收到的所述上行第一密钥认证信息与所述期待的上行第一密 钥认证信息进行匹配, 若所述上行第一密钥认证信息为所述期待的上行第 一密钥认证信息时, 则所述接入附件设备验证所述上行第一密钥认证信息 通过。
4、 根据权利要求 1或 2或 3任一所述的信息配置方法, 其特征在于, 在 所述通过所述接入附件设备将所述配置信息发送给所述待配置终端之后, 还包括:
验证所述接入附件设备转发来的所述上行第一密钥认证信息, 若验证 通过, 则使所述配置信息生效。
5、 根据权利要求 1~4任一所述的信息配置方法, 其特征在于, 所述与 所述待配置终端协商生成第一密钥, 具体包括:
与所述待配置终端通过密钥交换协议 Diffie-Hellman或公钥加密算法 RSA协议或椭圆曲线加密 EIGamal协议协商生成第一密钥。
6、 根据权利要求 1~5任意一项所述的信息配置方法, 其特征在于, 所 述接入设备与所述接入附件设备之间通过有线方式通信, 所述待配置终端 与所述接入附件设备之间通过近距离方式通信或者有线方式通信。
7、 一种信息配置方法, 其特征在于, 应用于与接入设备、 接入附件设 备通信的待配置终端中, 所述方法包括:
与所述接入设备通过密钥交换算法协商生成第一密钥;
接收所述接入设备通过接入附件设备转发来的下行第一密钥认证信 息, 所述下行第一密钥认证信息为使用所述第一密钥计算出的认证信息; 验证所述下行第一密钥认证信息;
向所述接入附件设备发送上行第一密钥认证信息, 并通过所述接入附 件设备将所述上行第一密钥认证信息转发给所述接入设备, 从而使所述接 入设备验证所述上行第一密钥认证信息, 接收所述接入设备在验证所述上 行第一密钥认证信息通过后发送来的使用所述第一密钥加密的配置信息, 所述上行第一密钥认证信息为使用所述第一密钥计算出的认证信息; 或者, 接收所述接入设备发送来的使用所述第一密钥加密的配置信息, 并向 所述接入附件设备发送上行第一密钥认证信息, 并通过所述接入附件设备 将所述上行第一密钥认证信息转发给所述接入设备, 从而使所述接入设备 验证所述上行第一密钥认证信息, 并在验证通过后使所述配置信息生效; 或者,
接收所述接入设备发送来的使用所述第一密钥加密的配置信息, 并向 所述接入附件设备发送上行第一密钥认证信息, 以使所述接入附件设备验 证所述上行第一密钥认证信息, 并在验证通过后使所述配置信息生效; 或 者,
向所述接入附件设备发送上行第一密钥认证信息, 以使所述接入附件 设备验证所述上行第一密钥认证信息, 接收所述接入附件设备在验证所述 上行第一密钥认证信息通过后发送的使用所述第一密钥加密的配置信息, 所述使用所述第一密钥加密的配置信息为所述接入设备预先发送给所述接 入附件设备的;
使用所述配置信息与所述接入设备建立安全连接。
8、 根据权利要求 7所述的信息配置方法, 其特征在于, 所述以使所述 接入附件设备验证所述上行第一密钥认证信息, 具体包括:
以使所述接入附件设备将所述上行第一密钥认证信息与期待的上行第 一密钥认证信息进行匹配, 若所述上行第一密钥认证信息为所述期待的上 行第一密钥认证信息时, 则所述接入附件设备验证所述上行第一密钥认证 信息通过; 所述期待的上行第一密钥认证信息为所述接入设备预先发送给 所述接入附件设备的。
9、 根据权利要求 7或 8所述的信息配置方法, 其特征在于, 所述接入设 备与所述接入附件设备之间通过有线方式通信, 所述待配置终端与所述接 入附件设备之间通过近距离方式通信或者有线方式通信。
10、 一种信息配置方法, 其特征在于, 应用于与接入设备、 待配置终 端通信的接入附件设备中, 所述接入设备与所述待配置终端通过密钥交换 算法协商生成第一密钥, 所述方法包括:
接收并转发所述接入设备发送给所述待配置终端的下行第一密钥认证 信息, 使所述待配置终端验证所述下行第一密钥认证信息钥, 所述下行第 一密钥认证信息为使用所述第一密钥计算出的认证信息;
接收并转发所述待配置终端发送给所述接入设备的上行第一密钥认证 信息, 以使所述接入设备验证所述上行第一密钥认证信息, 并在验证通过 后向所述待配置终端发送使用所述第一密钥加密的配置信息, 从而使所述 待配置终端使用所述配置信息与所述接入设备建立安全连接, 所述上行第 一密钥认证信息为使用所述第一密钥计算出的认证信息; 或者,
接收并转发所述待配置终端发送给所述接入设备的上行第一密钥认证 信息, 以使所述接入设备在向所述待配置终端发送使用所述第一密钥加密 的配置信息后验证所述上行第一密钥认证信息, 并在验证通过后使所述配 置信息生效, 从而使所述待配置终端使用所述配置信息与所述接入设备建 立安全连接; 或者,
接收并验证所述待配置终端发送的上行第一密钥认证信息, 在验证通 过后, 使所述第一密钥加密的配置信息生效, 从而使所述待配置终端在接 收到所述接入设备发送的所述配置信息且所述配置信息生效后, 使用所述 配置信息与所述接入设备建立安全连接; 或者,
接收所述接入设备发送来的使用所述第一密钥加密的配置信息, 接收 并验证所述待配置终端发送的上行第一密钥认证信息, 在验证通过后, 使 所述配置信息生效, 并向所述待配置终端发送所述配置信息, 从而使所述 待配置终端使用所述配置信息与所述接入设备建立安全连接。
11、 根据权利要求 10所述的信息配置方法, 其特征在于, 所述验证所 述待配置终端发送的上行第一密钥认证信息, 具体包括:
接收所述接入设备发送来的期待的上行第一密钥认证信息, 并将接收 到的所述上行第一密钥认证信息与所述期待的上行第一密钥认证信息进行 匹配, 若所述上行第一密钥认证信息为所述期待的上行第一密钥认证信息 时, 则验证所述上行第一密钥认证信息通过。
12、 根据权利要求 10或 11所述的信息配置方法, 其特征在于, 所述接 入设备与所述接入附件设备之间通过有线方式通信, 所述待配置终端与所 述接入附件设备之间通过近距离方式通信或者有线方式通信。
13、 一种接入设备, 其特征在于, 与接入附件设备和待配置终端通信 连接, 所述接入设备包括:
第一密钥生成单元, 用于与所述待配置终端通过密钥交换算法协商生 成第一密钥;
第一发送单元, 用于向所述接入附件设备发送下行第一密钥认证信息, 通过所述接入附件设备将所述下行第一密钥认证信息转发给所述待配置终 端, 从而使所述待配置终端验证所述下行第一密钥认证信息, 所述下行第 一密钥认证信息为使用所述第一密钥生成单元生成的所述第一密钥计算出 的认证信息;
第一处理单元, 用于在所述第一发送单元发送所述下行第一密钥认证 信息之后, 接收所述待配置终端通过所述接入附件设备转发来的上行第一 密钥认证信息, 验证所述上行第一密钥认证信息, 并在验证通过后向所述 待配置终端发送使用所述第一密钥加密的配置信息, 以使所述待配置终端 使用所述配置信息与所述接入设备建立安全连接, 所述上行第一密钥认证 信息为使用所述第一密钥计算出的认证信息; 或者,
所述第一处理单元, 用于在所述第一发送单元发送所述下行第一密钥 认证信息之后, 向所述待配置终端发送使用所述第一密钥加密的配置信息, 并验证所述待配置终端通过所述接入附件设备转发来的上行第一密钥认证 信息, 若验证通过, 则使所述配置信息生效, 以使所述待配置终端使用所 述配置信息与所述接入设备建立安全连接; 或者,
第二处理单元, 用于在所述第一发送单元发送所述下行第一密钥认证 信息之后, 向所述待配置终端发送使用所述第一密钥加密的配置信息, 并 通过所述接入附件设备验证所述待配置终端发送的上行第一密钥认证信 息, 若验证通过, 则通过所述接入附件设备使所述配置信息生效, 以使所 述待配置终端使用所述配置信息与所述接入设备建立安全连接; 或者, 所述第二处理单元, 用于在所述第一发送单元发送所述下行第一密钥 认证信息之后, 向所述接入附件设备发送使用所述第一密钥加密的配置信 息, 并通过所述接入附件设备验证所述待配置终端发送的上行第一密钥认 证信息, 若验证通过, 则通过所述接入附件设备将所述配置信息发送给所 述待配置终端, 以使所述待配置终端使用所述配置信息与所述接入设备建 立安全连接。
14、 根据权利要求 13所述的接入设备, 其特征在于, 所述第二处理单 元包括第一子处理单元,
所述第一子处理单元, 具体用于向所述接入附件设备发送期待的上行 第一密钥认证信息, 使所述接入附件设备将接收到的所述上行第一密钥认 证信息与所述期待的上行第一密钥认证信息进行匹配, 若所述上行第一密 钥认证信息为所述期待的上行第一密钥认证信息时, 则所述接入附件设备 验证所述上行第一密钥认证信息通过。
15、 根据权利要求 13或 14所述的接入设备, 其特征在于,
所述第二处理单元, 还用于验证所述接入附件设备转发来的所述上行 第一密钥认证信息, 若验证通过, 则使所述配置信息生效。
16、 根据权利要求 13~15任意一项所述的接入设备, 其特征在于, 所述 接入设备与所述接入附件设备之间通过有线方式通信, 所述待配置终端与 所述接入附件设备之间通过近距离方式通信或者有线方式通信。
17、 一种待配置终端, 其特征在于, 与接入设备和接入附件设备通信 连接, 所述待配置终端包括:
第二密钥生成单元, 用于与所述接入设备通过密钥交换算法协商生成 第一密钥;
第一接收单元, 用于接收所述接入设备通过接入附件设备转发来的下 行第一密钥认证信息, 所述下行第一密钥认证信息为使用所述第二密钥生 成单元生成的所述第一密钥计算出的认证信息;
第一验证单元, 用于验证所述第一接收单元接收到的下行第一密钥认 证信息;
第三处理单元, 用于在所述第一验证单元验证所述下行第一密钥认证 信息之后, 向所述接入附件设备发送上行第一密钥认证信息, 并通过所述 接入附件设备将所述上行第一密钥认证信息转发给所述接入设备, 从而使 所述接入设备验证所述上行第一密钥认证信息, 接收所述接入设备在验证 所述上行第一密钥认证信息通过后发送来的使用所述第一密钥加密的配置 信息, 所述上行第一密钥认证信息为使用所述第一密钥计算出的认证信息; 或者,
所述第三处理单元, 用于在所述第一验证单元验证所述下行第一密钥 认证信息之后, 接收所述接入设备发送来的使用所述第一密钥加密的配置 信息, 并向所述接入附件设备发送上行第一密钥认证信息, 并通过所述接 入附件设备将所述上行第一密钥认证信息转发给所述接入设备, 从而使所 述接入设备验证所述上行第一密钥认证信息, 并在验证通过后使所述配置 信息生效; 或者,
第四处理单元, 用于在所述第一验证单元验证所述下行第一密钥认证 信息之后, 接收所述接入设备发送来的使用所述第一密钥加密的配置信息, 并向所述接入附件设备发送上行第一密钥认证信息, 以使所述接入附件设 备验证所述上行第一密钥认证信息, 并在验证通过后使所述配置信息生效; 或者,
所述第四处理单元, 用于在所述第一验证单元验证所述下行第一密钥 认证信息之后, 向所述接入附件设备发送上行第一密钥认证信息, 以使所 述接入附件设备验证所述上行第一密钥认证信息, 接收所述接入附件设备 在验证所述上行第一密钥认证信息通过后发送的使用所述第一密钥加密的 配置信息, 所述使用所述第一密钥加密的配置信息为所述接入设备预先发 送给所述接入附件设备的;
第一连接建立单元, 用于使用所述第三处理单元或者所述第四处理单 元发送的配置信息与所述接入设备建立安全连接。
18、 根据权利要求 17所述的待配置终端, 其特征在于, 所述第四处理 单元包括第二子处理单元,
所述第二子处理单元, 具体用于向所述接入附件设备发送上行第一密 钥认证信息, 以使所述接入附件设备将所述上行第一密钥认证信息与期待 的上行第一密钥认证信息进行匹配, 若所述上行第一密钥认证信息为所述 期待的上行第一密钥认证信息时, 则所述接入附件设备验证所述上行第一 密钥认证信息通过; 所述期待的上行第一密钥认证信息为所述接入设备预 先发送给所述接入附件设备的。
19、 根据权利要求 17或 18所述的待配置终端, 其特征在于, 所述接入 设备与所述接入附件设备之间通过有线方式通信, 所述待配置终端与所述 接入附件设备之间通过近距离方式通信或者有线方式通信。
20、 一种接入附件设备, 其特征在于, 与接入设备和待配置终端通信 连接, 所述接入设备与所述待配置终端通过密钥交换算法协商生成第一密 钥, 所述接入附件设备包括:
第二接收单元, 用于接收所述接入设备发送给所述待配置终端的下行 第一密钥认证信息, 所述下行第一密钥认证信息为使用所述第一密钥计算 出的认证信息;
第二发送单元, 用于转发所述第二接收单元接收到的所述下行第一密 钥认证信息, 使所述待配置终端验证所述下行第一密钥认证信息;
第五处理单元, 用于在所述第二发送单元转发所述下行第一密钥认证 信息之后, 接收并转发所述待配置终端发送给所述接入设备的上行第一密 钥认证信息, 以使所述接入设备验证所述上行第一密钥认证信息, 并在验 证通过后向所述待配置终端发送使用所述第一密钥加密的配置信息, 从而 使所述待配置终端使用所述配置信息与所述接入设备建立安全连接, 所述 上行第一密钥认证信息为使用所述第一密钥计算出的认证信息; 或者, 所述第五处理单元, 用于在所述第二发送单元转发所述下行第一密钥 认证信息之后, 接收并转发所述待配置终端发送给所述接入设备的上行第 一密钥认证信息, 以使所述接入设备在向所述待配置终端发送使用所述第 一密钥加密的配置信息后验证所述上行第一密钥认证信息, 并在验证通过 后使所述配置信息生效, 从而使所述待配置终端使用所述配置信息与所述 接入设备建立安全连接; 或者,
第六处理单元, 用于在所述第二发送单元转发所述下行第一密钥认证 信息之后, 接收并验证所述待配置终端发送的上行第一密钥认证信息, 在 验证通过后, 使所述第一密钥加密的配置信息生效, 从而使所述待配置终 端在接收到所述接入设备发送的所述配置信息且所述配置信息生效后, 使 用所述配置信息与所述接入设备建立安全连接; 或者,
所述第六处理单元, 用于在所述第二发送单元转发所述下行第一密钥 认证信息之后, 接收所述接入设备发送来的使用所述第一密钥加密的配置 信息, 接收并验证所述待配置终端发送的上行第一密钥认证信息, 在验证 通过后, 向所述待配置终端发送所述配置信息, 从而使所述待配置终端使 用所述配置信息与所述接入设备建立安全连接。
21、 根据权利要求 20所述的接入附件设备, 其特征在于, 所述第六处 理单元包括第三子处理单元,
所述第三子处理单元, 具体用于接收所述接入设备发送来的期待的上 行第一密钥认证信息, 并将接收到的所述上行第一密钥认证信息与所述期 待的上行第一密钥认证信息进行匹配, 若所述上行第一密钥认证信息为所 述期待的上行第一密钥认证信息时, 则验证所述上行第一密钥认证信息通 过。
22、 根据权利要求 20或 21所述的接入附件设备, 其特征在于, 所述接 入设备与所述接入附件设备之间通过有线方式通信, 所述待配置终端与所 述接入附件设备之间通过近距离方式通信或者有线方式通信。
23、 一种信息配置系统, 其特征在于, 包括: 接入设备、 接入附件设 备和待配置终端, 所述接入设备、 接入附件设备和待配置终端之间通信连 接,
所述接入设备为上述权利要求 13~16任意一项所述的接入设备, 所述待 配置终端为上述权利要求 17~19任意一项所述的待配置终端, 所述接入附件 设备为上述权利要求 20~22任意一项所述的接入附件设备。
24、 根据权利要求 23所述的信息配置系统, 其特征在于, 所述接入设 备与所述接入附件设备通过有线方式通信。
25、 根据权利要求 23或 24所述的信息配置系统, 其特征在于, 所述接 入附件设备与所述待配置终端通过近距离无线方式或有线方式通信。
PCT/CN2013/086879 2012-11-09 2013-11-11 一种信息配置方法、设备及系统 WO2014071886A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201210447087.8A CN103813318B (zh) 2012-11-09 2012-11-09 一种信息配置方法、设备及系统
CN201210447087.8 2012-11-09

Publications (1)

Publication Number Publication Date
WO2014071886A1 true WO2014071886A1 (zh) 2014-05-15

Family

ID=50684079

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/086879 WO2014071886A1 (zh) 2012-11-09 2013-11-11 一种信息配置方法、设备及系统

Country Status (2)

Country Link
CN (1) CN103813318B (zh)
WO (1) WO2014071886A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016049895A1 (zh) * 2014-09-30 2016-04-07 华为技术有限公司 配置的方法、配置的装置及设备
CN114501452A (zh) * 2022-03-31 2022-05-13 深圳博纳移动信息技术有限公司 一种多类型硬件设备的接入管理方法和系统

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6438550B1 (en) * 1998-12-10 2002-08-20 International Business Machines Corporation Method and apparatus for client authentication and application configuration via smart cards
CN1925396A (zh) * 2006-09-15 2007-03-07 北京飞天诚信科技有限公司 一种提高网络信息产品使用安全性的方法及系统
CN102685741A (zh) * 2011-03-09 2012-09-19 华为终端有限公司 接入认证处理方法及系统、终端和网络设备

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007272868A (ja) * 2006-03-07 2007-10-18 Sony Corp 情報処理装置、情報通信システム、および情報処理方法、並びにコンピュータ・プログラム
CN101351019B (zh) * 2007-07-20 2011-06-01 华为技术有限公司 接入网关、终端及建立数据连接的方法和系统

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6438550B1 (en) * 1998-12-10 2002-08-20 International Business Machines Corporation Method and apparatus for client authentication and application configuration via smart cards
CN1925396A (zh) * 2006-09-15 2007-03-07 北京飞天诚信科技有限公司 一种提高网络信息产品使用安全性的方法及系统
CN102685741A (zh) * 2011-03-09 2012-09-19 华为终端有限公司 接入认证处理方法及系统、终端和网络设备

Also Published As

Publication number Publication date
CN103813318A (zh) 2014-05-21
CN103813318B (zh) 2017-04-05

Similar Documents

Publication Publication Date Title
US10812969B2 (en) System and method for configuring a wireless device for wireless network access
US9628585B2 (en) Systems and methods for cross-layer secure connection set up
US8375207B2 (en) Method and apparatus for authenticating a network device
JP4506856B2 (ja) 通信装置、及び通信方法
KR20160121546A (ko) 네트워크에서의 지원된 디바이스 프로비져닝
JP5120417B2 (ja) 通信装置、通信方法、及び通信システム
US11736304B2 (en) Secure authentication of remote equipment
WO2014180296A1 (zh) 一种设备之间建立连接的方法、配置设备和无线设备
US8572698B1 (en) Connecting a legacy wireless device to a WPS-enabled access point
WO2019007252A1 (zh) 一种控制方法及装置
US20070165582A1 (en) System and method for authenticating a wireless computing device
WO2007028328A1 (fr) Procede, systeme et dispositif de negociation a propos d'une cle de chiffrement partagee par equipement utilisateur et equipement externe
JP2018525939A (ja) セキュリティ認証方法、構成方法、および関連デバイス
BR112021003460A2 (pt) dispositivo sem identidade de assinante, dispositivo de identidade do assinante, método para uso em um dispositivo sem identidade de assinante, método para uso em um dispositivo com identidade de assinante e produto de programa de computador
BR112021003448A2 (pt) dispositivo sem identidade de assinante, dispositivo de identidade do assinante, método para uso em um dispositivo sem identidade de assinante, método para uso em um dispositivo com identidade de assinante e produto de programa de computador transferível por download
WO2018099407A1 (zh) 账户认证登录方法及装置
JP5091963B2 (ja) 通信局、認証局及び認証方法
KR20090002328A (ko) 무선 센서 네트워크에서의 새로운 장치 참여 방법
WO2014071886A1 (zh) 一种信息配置方法、设备及系统
KR101172876B1 (ko) 사용자 단말기와 서버 간의 상호 인증 방법 및 시스템
WO2014071885A1 (zh) 一种信息配置方法、设备及系统
WO2016003310A1 (en) Bootstrapping a device to a wireless network
WO2016165429A1 (zh) 业务处理方法及装置、终端
WO2016112860A1 (zh) 无线设备的通讯方法、无线设备和服务器
WO2016176902A1 (zh) 一种终端认证方法、管理终端及申请终端

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13853539

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13853539

Country of ref document: EP

Kind code of ref document: A1