WO2015061992A1 - 一种密钥配置方法、系统和装置 - Google Patents

一种密钥配置方法、系统和装置 Download PDF

Info

Publication number
WO2015061992A1
WO2015061992A1 PCT/CN2013/086247 CN2013086247W WO2015061992A1 WO 2015061992 A1 WO2015061992 A1 WO 2015061992A1 CN 2013086247 W CN2013086247 W CN 2013086247W WO 2015061992 A1 WO2015061992 A1 WO 2015061992A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
shared
shared key
information
configuration
Prior art date
Application number
PCT/CN2013/086247
Other languages
English (en)
French (fr)
Inventor
庞高昆
丁志明
Original Assignee
华为终端有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为终端有限公司 filed Critical 华为终端有限公司
Priority to EP13896341.8A priority Critical patent/EP3065334A4/en
Priority to PCT/CN2013/086247 priority patent/WO2015061992A1/zh
Priority to AU2013404506A priority patent/AU2013404506A1/en
Priority to JP2016550902A priority patent/JP2016540462A/ja
Priority to KR1020167014319A priority patent/KR20160078475A/ko
Priority to CA2929173A priority patent/CA2929173A1/en
Priority to CN201380080528.8A priority patent/CN105723648B/zh
Publication of WO2015061992A1 publication Critical patent/WO2015061992A1/zh
Priority to US15/143,204 priority patent/US20160269176A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/50Secure pairing of devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/77Graphical identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Definitions

  • the present invention relates to the field of network communication technologies, and in particular, to a key configuration method, system, and apparatus.
  • WiFi Wireless Fidelity, wireless fidelity technology has been promoted by the WiFi alliance formed by many industry-leading companies since the release of the IEEE 802.11 wireless LAN standard in 1997. At the same time, it has rapid deployment, convenient use and high transmission rate. Advantages, rapid development. WiFi technology is now widely used in various industries, now laptops, PDAs (Personal Digital WiFi technology is supported by Assistant, Pocket PC and mobile phones. The access points of WiFi networks are spread throughout hotels, cafes, schools and hospitals. It can be said that WiFi technology is ubiquitous in life.
  • WPA Wi-Fi Protected Access
  • WiFi security access is a security technology used in WiFi, it requires the user to set Credential (trust, Including the account name, password) and other parameters related to WPA, such as encryption algorithms, etc., but when the user does not understand the meaning of these parameters, so they do not know how to set these parameters, thus hindering the application of WPA security technology, which Users will choose to use the network without security protection because they do not know how to set WPA parameters.
  • WPS WiFi Protected Setup, Wifi security is built to help users set the trust technology. WPS mainly emphasizes two points: security and simplicity, that is, the configuration process is simple, and the configured network should be secure.
  • the existing WPS is mainly based on a key exchange algorithm to prevent certain attacks such as eavesdropping and dictionary attacks.
  • the WPS application scenarios mainly include the following two types: the first one is an enrollee (registered party) terminal and the WiFi network as a registrar (register) (AP)
  • the second is P2P (Peer to Peer, point-to-point authentication configuration process in the scene, P2P in WiFi technology is researched to enable end-to-end direct discovery via WiFi function between terminal devices without infrastructure such as cellular or hotspots.
  • one terminal acts as the client (client) and the other terminal acts as the GO (Group) Owner, the device of the leader), the key is configured between the client and the GO, so that the subsequent client and the GO can perform data interaction based on the configured key.
  • client client
  • GO Group Owner
  • WiFi technology is gradually being applied to new fields such as smart grid, sensor network, medical network, etc.
  • a large number of WiFi devices are headless devices (Headless) Devices), the so-called headless devices are devices that do not have a display screen, no keyboard, no human-machine interface such as near-field communication, and the connection between these headless devices requires a third-party configuration device, for example, by configuring the device. Connect the AP to the set-top box, or connect the sensor to the sensor by configuring the device, and so on.
  • the key configuration between the two devices is as follows:
  • the configuration device scans the two-dimensional code on the first device, acquires the password information of the first device included in the two-dimensional code, and scans the two-dimensional code on the second device to obtain the two-dimensional code.
  • the password information of the second device the configuration device performs a WPS interaction process with the first device based on the password information of the first device, generates a key key1, encrypts the key1 by using the password information of the first device, and sends the key1 to the first device;
  • the configuration device performs a WPS interaction process with the second device based on the password information of the second device, generates a key key2, encrypts the key2 by using the password information of the second device, and sends the key2 to the second device.
  • the first device and the second device perform a secure connection based on key1 and key2, that is, based on key1 and key2.
  • the password information of the first device and the second device are in an open state, and are easily obtained by illegally, that is, any third-party device can obtain and generate a key, and then send the key to the first device and the second device. In this way, it is easy to eavesdrop on the interaction between the first device and the second device, and the security is poor.
  • the embodiment of the present invention provides a key configuration method, system, and device based on a third-party configuration device, so as to improve the security of interaction between the first device and the second device.
  • an embodiment of the present invention provides a key configuration method, where the key configuration method includes:
  • the second device generates the first shared key by using its own private key and the information for obtaining the first shared key, the first shared key being used for the first device and the A secure connection between the second device.
  • the first device by using a public key of the second device, to send information for obtaining the first shared key to the second device, includes: the first device Generating a password, using the password as a first shared key, encrypting the password by using a public key of the second device to obtain an encryption result, and transmitting the encryption result to the second device;
  • the generating, by the second device, the first shared key by using its own private key and information for obtaining the first shared key includes: the second device decrypting the encrypted result by using its own private key Obtaining the password, using the password as a first shared key; or
  • the first device generates a first shared key, and the information about the first shared key is sent to the second device by using the public key of the second device, where the first device generates a password, and the second device is used.
  • the public key of the device encrypts the password to obtain an encryption result, and sends the encryption result to the second device, and generates a derivative key for the password by using a key derivation algorithm, and uses the derived key as the first share.
  • the generating, by the second device, the first shared key by using its own private key and information for obtaining the first shared key includes: the second device decrypting the encrypted result by using its own private key Obtaining the password, generating a derivative key for the password by using the key derivation algorithm, and using the derived key as the first shared key.
  • the first device generates a first shared key, and sends, by using a public key of the second device, information for obtaining the first shared key to the second device.
  • the method includes: generating, by the first device, a random value, using the information agreed by the first device and the second device, and generating the first shared key by using the random value, and encrypting the random value by using the public key of the second device, and encrypting The result is sent to the second device;
  • the generating, by the second device, the first shared key by using its own private key and information for obtaining the first shared key includes: the second device decrypting the encrypted result by using its own private key Obtaining the random value, and generating the first shared key by using information agreed by the first device and the second device and the random value.
  • the sending, by using the public key of the second device, information for obtaining the first shared key to the second device includes: the first After the device encrypts the public key of the first device by using the public key of the second device, the device sends the encrypted result to the second device.
  • the generating, by the second device, the first shared key by using the private key of the second device and the information for obtaining the first shared key comprises: the second device using the private key of the second device to encrypt the result After the decryption is performed, the public key of the first device is obtained, and a password is generated, and the password is used as the first shared key;
  • the method further includes: receiving, by the first device, the encryption result after the second device encrypts the password by using the public key of the first device, and decrypting the received encryption result by using the private key of the first device, The password is used as the first shared key.
  • the method further includes: the first device and the second device are configured to perform a key exchange algorithm;
  • the first device generates a first shared key by using the public key of the second device, and the information for obtaining the first shared key is sent to the second device, where the first device uses the public key of the second device and The private key of the first device generates a first shared key according to the key exchange algorithm, and sends the public key of the first device to the second device;
  • the generating, by the second device, the first shared key by using the private key of the second device and the information for obtaining the first shared key includes: the second device uses the private key of the second device and the first device The public key generates a first shared key in accordance with the key exchange algorithm.
  • the first device and the second device predetermined key exchange algorithm include:
  • the first device and the second device are pre-configured with parameters used by the key exchange algorithm; or
  • the first possible implementation of the first aspect, the second possible implementation of the first aspect, the third possible implementation of the first aspect, the fourth possible aspect of the first aspect The implementation manner or the fifth possible implementation manner of the first aspect, in a sixth possible implementation, the first shared key is used for a secure connection between the first device and the second device include:
  • the first device After obtaining the first shared key, the first device generates a credential, and encrypts the credential by using the first shared key or the derived key of the first shared key, and sends the encrypted result to the first a device for decrypting the encryption result by using the obtained first shared key or a derived key of the first shared key to obtain the credential, the credential being used by the first device and a secure connection between the second devices; or,
  • the first device decrypts the encrypted result of the credential sent by the second device by using the obtained first shared key or the derived key of the first shared key to obtain the credential, and the credential encryption
  • the result is that the second device generates a credential after obtaining the first shared key, and obtains the credential by using the first shared key or the derived key of the first shared key, and the trust is obtained. Formed for a secure connection between the first device and the second device.
  • the first device if the first device is a registrar Registrar, a central node, or a group leader device GO, the first device generates The credential and transmitting the encrypted result of the credential to the second device;
  • the second device if the second device is a Registrar, a central node, or a GO, the second device generates the credential and sends the encrypted result of the credential to the first device.
  • the public key of the second device sent by the first device receiving configuration device after acquiring the public key of the second device is specifically:
  • the method further includes: the first device decrypting the encryption result to obtain a public key of the second device.
  • the public key of the second device sent by the first device receiving configuration device after acquiring the public key of the second device is specifically:
  • the method also includes:
  • the public key of the second device is obtained.
  • the establishing, by the first device, the security connection to the configuration device to generate the second shared key includes:
  • the first device and the configuration device share a credential by establishing a WPS interaction mode by using a wireless fidelity security, and using the credential as the second shared key;
  • a shared key after the configuration device acquires the public key of the first device, and generates the second share according to a pre-agreed key exchange algorithm by using the public key of the first device and its own private key. Key.
  • the method further includes: A device generates a new public key and a new private key;
  • the public key of the first device sent by the first device to the second device is the new public key; the public key of the first device used by the second device when generating the first shared key And being the new public key; the private key of the first device utilized by the first device when generating the first shared key is the new private key.
  • the first device is a registered party enrollee
  • the second device is a registrar, or the first device is a client client, the second device is a GO, or the first device is a wireless terminal, the second device is an access point, or the A device is a central node and the second device is a sensor node.
  • the method further includes: the first device according to the first The channel information of the second device quickly discovers the second device to perform the step of transmitting the information used to obtain the first shared key to the second device, where the channel information of the second device is The second device acquires and sends the information to the first device.
  • any one of the first to thirteenth possible implementation manners of the first aspect in the fourteenth possible implementation manner, the configuring device scans the two-dimensional code and the universal string
  • the method of row bus USB or near field communication acquires information from the first device or the second device.
  • the method further includes: the first device utilization Generating a verification value for the public key of the second device, and sending the verification value to the second device;
  • the second device verifies the received verification value by using its own public key before generating the first shared key, and if the verification is passed, the step of generating the first shared key is performed.
  • an embodiment of the present invention provides a key configuration method, where the key configuration method includes:
  • the configuration device acquires a public key of the second device, and sends the public key of the second device to the first device;
  • the first device transmits information for obtaining the first shared key to the second device by using the public key of the second device; or for the first device to utilize the public key of the second device Generating a first shared key, and sending information for obtaining the first shared key to the second device;
  • the second device generates the first shared key by using its own private key and the information for obtaining the first shared key, the first shared key being used for the first device and the A secure connection between the second device.
  • the first device by using the public key of the second device, to send information for obtaining the first shared key to the second device, includes: A device generates a password, the password is used as a first shared key, and the password is encrypted by using the public key of the second device to obtain an encryption result, and the encryption result is sent to the second device;
  • the generating, by the second device, the first shared key by using its own private key and information for obtaining the first shared key includes: the second device decrypting the encrypted result by using its own private key Obtaining the password, using the password as a first shared key; or
  • the first device generates a first shared key, and the information for obtaining the first shared key is sent to the second device by using the public key of the second device, so that the first device generates a password, by using the The public key of the second device encrypts the password to obtain an encryption result, and sends the encryption result to the second device, and generates a derivative key for the password by using a key derivation algorithm, and the derivative key is used as the first a shared key;
  • the generating, by the second device, the first shared key by using its own private key and information for obtaining the first shared key includes: the second device decrypting the encrypted result by using its own private key Obtaining the password, generating a derivative key for the password by using the key derivation algorithm, and using the derived key as the first shared key.
  • the first device generates a first shared key, and uses the public key of the second device to send information for obtaining the first shared key to the second
  • the device includes: generating, by the first device, a random value, using the information agreed by the first device and the second device, and generating the first shared key by using the random value, and encrypting the random value by using the public key of the second device, Sending the encrypted result to the second device;
  • the generating, by the second device, the first shared key by using its own private key and information for obtaining the first shared key includes: the second device decrypting the encrypted result by using its own private key Obtaining the random value, and generating the first shared key by using information agreed by the first device and the second device and the random value.
  • the sending, by the first device, the information used to obtain the first shared key to the second device by using the public key of the second device includes: After the first device encrypts the public key of the first device by using the public key of the second device, and sends the encryption result to the second device;
  • the generating, by the second device, the first shared key by using the private key of the second device and the information for obtaining the first shared key comprises: the second device using the private key of the second device to encrypt the result After decrypting, obtaining the public key of the first device, and generating a password, and encrypting the password, and transmitting the encryption result to the first device;
  • the first device After the first device decrypts the received encryption result by using its own private key, the obtained password is used as the first shared key.
  • the method further includes: the first device and the second device are configured to perform a key exchange algorithm;
  • the first device generates the first shared key by using the public key of the second device, and the information for obtaining the first shared key is sent to the second device, so that the first device uses the public device of the second device.
  • the key and the private key of the first key are generated according to the key exchange algorithm, and the public key of the first device is sent to the second device;
  • the generating, by the second device, the first shared key by using the private key of the second device and the information for obtaining the first shared key includes: the second device uses the private key of the second device and the first device The public key generates a first shared key in accordance with the key exchange algorithm.
  • the first device and the second device, the predetermined shared key exchange algorithm include:
  • the first device and the second device are pre-configured with parameters used by the key exchange algorithm; or
  • the configuration device sends parameters used by the key exchange algorithm to the first device and the second device.
  • the configuration device acquires a public key of the first device
  • the sending, by the configuration device, the public key of the second device to the first device includes: the configuration device encrypting a public key of the second device by using a public key of the first device, and sending the encryption result to the a first device; wherein the first device decrypts the encryption result to obtain a public key of the second device.
  • the method further includes: the configuring device and the first The device establishes a secure connection to generate a second shared key;
  • Sending the public key of the second device to the first device includes: after the configuration device encrypts the public key of the second device by using the second shared key, sending the encryption result to the first And obtaining, by the first device, the public key of the second device after decrypting the received encryption result by using the second shared key.
  • the establishing, by the configuration device, the secure connection with the first device to generate the second shared key includes:
  • the configuration device shares a credential with the first device in a WPS interaction manner, and uses the credential as the second shared key;
  • the configuration device sends its own public key to the first device, and the configuration device and the first device respectively generate the first according to a pre-agreed key exchange algorithm by using a public key of the opposite party and a private key thereof. Two shared keys.
  • the first device is a registered party enrollee, the first The second device is a registrar, or the first device is a client client, the second device is a GO, or the first device is a wireless terminal, the second device is an access point, or the first device Is the central node, and the second device is a sensor node.
  • the method further includes: the configuring device acquiring the second device And the channel information is sent to the first device, so that the first device quickly discovers the second device according to the channel information of the second device, to send the information that is used to obtain the first shared key to the first device.
  • the configuring device acquiring the second device And the channel information is sent to the first device, so that the first device quickly discovers the second device according to the channel information of the second device, to send the information that is used to obtain the first shared key to the first device.
  • any one of the first to the tenth possible implementation manners of the second aspect in the eleventh possible implementation manner, the configuring device scans the two-dimensional code, the universal serial The manner of bus USB or near field communication acquires information from the first device or the second device.
  • an embodiment of the present invention provides a key configuration method, where the method includes:
  • the second device provides the public key of the second device to the configuration device, so that the configuration device sends the public key of the second device to the first device;
  • the second device generates the first shared key by using its own private key and the information for obtaining a first shared key, where the first shared key is used by the first device and the first A secure connection between the two devices.
  • the receiving, by the second device, the information that is sent by the first device by using the public key of the second device to obtain the first shared key includes: Receiving, by the second device, an encryption result sent by the first device, where the encryption result is that the first device generates a password, using the password as a first shared key, and using the public key of the second device to The password is encrypted;
  • the generating, by the second device, the first shared key by using the private key of the second device and the information for obtaining the first shared key includes: the second device decrypting the encrypted result by using the private key of the second device The password, the password is used as the first shared key; or
  • the receiving, by the second device, the information that is sent by the first device by using the public key of the second device, for obtaining the first shared key includes: the second device receiving the encryption result sent by the first device, where The result of the encryption is that after the first device generates a password, the password is encrypted by using the public key of the second device;
  • the generating, by the second device, the first shared key by using the private key of the second device and the information for obtaining the first shared key includes: the second device decrypting the encrypted result by using the private key of the second device Decoding a password, using the key derivation algorithm to generate a derived key for the password, and using the derived key as the first shared key.
  • the receiving, by the second device, the information that is sent by the first device by using the public key of the second device, for obtaining the first shared key includes: The second device receives the encryption result sent by the first device, where the encryption result is that the first device generates a random value, and the random value is obtained by using a public key of the second device, where the first device is obtained. Generating a first shared key by using the information agreed by the first device and the second device and the random value;
  • the generating, by the second device, the first shared key by using the private key of the second device and the information for obtaining the first shared key includes: the second device decrypting the encrypted result by using the private key of the second device
  • the random value is generated by using the information agreed by the first device and the second device and the random value to generate the first shared key.
  • the receiving, by the second device, the information that is sent by the first device by using the public key of the second device to obtain the first shared key includes: Receiving, by the second device, an encryption result obtained by encrypting, by using the public key of the second device, the public key of the first device;
  • the generating, by the second device, the first shared key by using the private key of the second device and the information for obtaining the first shared key includes: the second device decrypting the encrypted result by using a private key of the second device After obtaining the public key of the first device, generating a password, using the password as the first shared key, encrypting the password by using the public key of the first device, and transmitting the encryption result to the first a device
  • the first device After the first device decrypts the received encryption result by using its own private key, the obtained password is used as the first shared key.
  • the method further includes: the second device and the first device, a predetermined key exchange algorithm
  • the sent information for obtaining the first shared key includes: the second device receiving the first device to use The public key of the first device sent by the public key of the second device and the private key of the second device after the first shared key is generated according to the key exchange algorithm;
  • the generating, by the second device, the first shared key by using its own private key and information for obtaining the first shared key includes: the second device uses its own private key and the public key of the first device A first shared key is generated in accordance with the key exchange algorithm.
  • the second device and the first device predetermined key exchange algorithm include:
  • the second device and the first device are pre-configured with parameters used by the key exchange algorithm;
  • the second device and the first device receive parameters used by the key exchange algorithm sent by the configuration device.
  • the first shared key is used by the first device
  • the secure connection with the second device includes:
  • the second device receives the encryption result sent by the first device, where the encryption result is that the first device generates a credential after obtaining the first shared key, and uses the first shared key or the first shared key. And obtaining, by the second device, the encryption result by using the obtained first shared key or the derived key of the first shared key to obtain the credential, the credential Used for a secure connection between the first device and the second device; or
  • the second device After obtaining the first shared key, the second device generates a credential, and encrypts the credential by using the first shared key or the derived key of the first shared key, and sends the encrypted result to the first a device for decrypting the encryption result by using the obtained first shared key or a derived key of the first shared key to obtain the credential, the credential being used for the first device and A secure connection between the second devices.
  • a seventh possible implementation if the first device is a registrar Registrar, a central node, or a group leader device GO, generated by the first device The credential and transmitting the encrypted result of the credential to the second device;
  • the second device if the second device is a Registrar, a central node, or a GO, the second device generates the credential and sends the encrypted result of the credential to the first device.
  • any one of the first to the seventh possible implementation manners of the third aspect, in the eighth possible implementation manner, the method further includes:
  • the second device provides its own channel information to the configuration device, so that the configuration device sends channel information of the second device to the first device; so that the first device is configured according to channel information of the second device. Quickly discovering the second device to perform the step of transmitting information for obtaining the first shared key to the second device.
  • any one of the first to the eighth possible implementation manners of the third aspect, in the ninth possible implementation manner, the second device or the first device The method of code, USB or near field communication is for the configuration device to obtain information.
  • any one of the first to the ninth possible implementation manners of the third aspect in the tenth possible implementation manner, the method further includes:
  • the second device receives the verification value generated by the first device by using the public key of the second device, and the second device uses the public key of the second device to verify the received verification value, and if the verification passes, the execution is performed.
  • the step of generating the first shared key is performed.
  • the key configuration apparatus includes:
  • a receiving unit configured to receive a public key of the second device that is sent by the configuration device after acquiring the public key of the second device
  • a key processing unit configured to send information for obtaining the first shared key to the second device by using a public key of the second device; or generate a first shared secret by using a public key of the second device And transmitting, by the key, information for obtaining the first shared key to the second device; so that the second device generates, by using the private key of the second device and the information for obtaining the first shared key a first shared key, the first shared key being used for a secure connection between the first device and the second device.
  • the key processing unit is specifically configured to generate a password, use the password as a first shared key, and use the public key of the second device to Encrypting the password to obtain an encryption result, and transmitting the encryption result to the second device, so that the second device decrypts the encryption result by using its own private key to obtain the password, and the password is used as the first a shared key; or,
  • the key processing unit is configured to generate a password, encrypt the password by using a public key of the second device to obtain an encryption result, and send the encryption result to the second device, using a key derivation algorithm.
  • the algorithm generates a derived key for the password, and uses the derived key as the first shared key.
  • the key processing unit is specifically configured to generate a random value, and generate a first shared key by using information agreed by the first device and the second device and the random value. After encrypting the random value by using the public key of the second device, sending the encrypted result to the second device, so that the second device decrypts the encrypted result by using its own private key to obtain the random value, and utilizes The information agreed by the first device and the second device and the random value generate the first shared key.
  • the key processing unit is specifically configured to: after the public key of the second device is encrypted by using the public key of the second device, send the encrypted result to the second
  • the device receives the encryption result sent by the second device, and the encryption result is that the second device decrypts the received encryption result by using its own private key, obtains the public key of the first device, and generates a password.
  • the password is used as the first shared key, using the public key of the first device to encrypt the password; and using the private key of the user to decrypt the received encryption result, the obtained password is obtained.
  • the first shared key As the first shared key.
  • the key processing unit is specifically configured to use the public key of the second device and the private key of the second device to be scheduled according to the first device and the second device.
  • Key exchange algorithm generates a first shared key, and sends the public key of the first device to the second device, so that the second device uses its own private key and the public key of the first device according to the
  • the key exchange algorithm generates a first shared key.
  • the key processing unit is pre-configured with parameters used by the key exchange algorithm
  • the configuration receiving unit is further configured to receive a parameter used by the key exchange algorithm sent by the configuration device, and provide the parameter to the key processing unit.
  • the key configuration apparatus further includes:
  • a secure connection unit configured to generate a credential after the first shared key is obtained by the key processing unit, and encrypt the credential by using the first shared key or the derived key of the first shared key, and then Sending the encrypted result to the second device; so that the second device decrypts the encrypted result by using the obtained first shared key or the derived key of the first shared key to obtain the credential, and the credential is used by the credential a secure connection between the first device and the second device; or a credential sent to the second device by using the obtained first shared key or a derived key of the first shared key
  • the encryption result is decrypted to obtain the credential, and the encryption result of the credential is that the second device generates a credential after obtaining the first shared key, and uses the first shared key or the first shared key.
  • the derived key is obtained by encrypting the credential, and the credential is used for a secure connection between the first device and the second device.
  • the configuration receiving unit is specifically configured to receive the configuration device An encryption result sent after the public key of the second device and the public key of the first device, the encryption result being that the configuration device encrypts the second device by using the public key of the first device Public key
  • the key processing unit is further configured to decrypt the encryption result to obtain a public key of the second device.
  • the configuration receiving unit is specifically configured to be used with the configuration device Establishing a secure connection to generate a second shared key; receiving an encryption result sent by the configuration device after acquiring the public key of the second device, where the encryption result is encrypted by the configuration device by using the second shared key a public key of the second device;
  • the key processing unit is further configured to: after decrypting the received encryption result by using the second shared key, obtain a public key of the second device.
  • the configuration receiving unit when the configuration receiving unit establishes a secure connection with the configuration device to generate a second shared key, specifically The configuration device establishes a WPS interaction mode to share the credential by using the wireless fidelity security, and uses the credential as the second shared key; or, specifically, receives the public key of the configuration device sent by the configuration device, where the A device generates the second shared key according to a pre-agreed key exchange algorithm using the public key of the configuration device and its own private key.
  • the key processing unit is further configured to generate a new public key and New private key;
  • the public key of the first device sent by the first device to the second device is the new public key; the public key of the first device used by the second device when generating the first shared key And being the new public key; the private key of the first device utilized by the first device when generating the first shared key is the new private key.
  • the first device is a registered party enrollee
  • the second device is a registrar, or the first device is a client client, the second device is a GO, or the first device is a wireless terminal, the second device is an access point, or the first device
  • the device is a central node and the second device is a sensor node.
  • the configuration receiving unit is further configured to receive the Configuring, by the device, the channel information of the second device that is sent after being acquired by the second device;
  • the key processing unit quickly discovers the second device according to the channel information of the second device to perform the operation of transmitting the information for obtaining the first shared key to the second device.
  • the key processing unit is further used to utilize the Generating a verification value of the second device, sending the verification value to the second device; so that the second device uses the public key pair of the second device before generating the first shared key The verification value is verified, and in the case where the verification is passed, the operation of generating the first shared key is performed.
  • the key configuration apparatus includes:
  • An information acquiring unit configured to acquire a public key of the second device
  • An information sending unit configured to send the public key of the second device to the first device
  • the first device transmits information for obtaining the first shared key to the second device by using the public key of the second device; or for the first device to utilize the public key of the second device Generating a first shared key, and sending information for obtaining the first shared key to the second device;
  • the second device generates the first shared key by using its own private key and the information for obtaining the first shared key, the first shared key being used for the first device and the A secure connection between the second device.
  • the information sending unit is further configured to send a parameter used by a key exchange algorithm to the first device and the second device, the secret
  • the key exchange algorithm is used by the first device and the second device to generate a first shared key according to the key exchange algorithm using its own private key and the public key of the counterpart.
  • the information acquiring unit is further configured to acquire a public key of the first device
  • the information sending unit is configured to encrypt the public key of the second device by using a public key of the first device, and send the encryption result to the first device, so that the first device performs the encryption result. Decrypting is performed to obtain the public key of the second device.
  • the information sending unit is further configured to establish a secure connection with the first device to generate a second share. a key; when the public key of the second device is sent to the first device, the public key of the second device is specifically encrypted by using the second shared key, and the encryption result is sent to the first a device, such that the first device decrypts the received encryption result by using the second shared key, and obtains a public key of the second device.
  • the information sending unit is specifically used when establishing a secure connection with the first device to generate a second shared key. Sharing the credential with the first device in a WPS interaction manner, using the credential as the second shared key; or transmitting its own public key to the first device, using the public key of the first device And generating the second shared key according to a pre-agreed key exchange algorithm with its own private key.
  • the information acquiring unit is further configured to acquire the second device Channel information
  • the information sending unit is further configured to send the channel information of the second device to the first device, so that the first device quickly discovers the second device according to channel information of the second device, to execute the An operation of transmitting information for obtaining the first shared key to the second device.
  • the information acquiring unit is specifically configured to scan the two-dimensional code
  • the method of universal serial bus USB or near field communication acquires information from the first device or the second device.
  • the key configuration apparatus includes:
  • An information providing unit configured to provide a public key of the second device to the configuration device, so that the configuration device sends the public key of the second device to the first device;
  • An information receiving unit configured to receive information used by the first device to obtain a first shared key by using a public key of the second device, or receive information that the first device uses the second device After the key generates the first shared key, the information sent to obtain the first shared key is sent;
  • a key processing unit configured to generate the first shared key by using a private key thereof and the information used to obtain the first shared key, where the first shared key is used by the first device and the A secure connection between the second devices.
  • the information receiving unit is configured to receive an encryption result sent by the first device, where the encryption result is that the first device generates a password, The password is used as the first shared key, and the password is encrypted by using the public key of the second device;
  • the key processing unit is specifically configured to decrypt the encryption result by using a private key of the user to obtain the password, and use the password as the first shared key; or
  • the information receiving unit is configured to receive an encryption result sent by the first device, where the encryption result is that after the first device generates a password, the password is encrypted by using a public key of the second device. of;
  • the key processing unit is specifically configured to decrypt the encryption result by using a private key of the user to obtain the password, and generate a derivative key for the password by using the key derivation algorithm, and use the derived key as a The first shared key is described.
  • the information receiving unit is specifically configured to receive an encryption result sent by the first device, where the encryption result is that the first device generates a random value, and the The public key of the second device is obtained by encrypting the random value, and the first device generates the first shared key by using the information agreed by the first device and the second device and the random value;
  • the key processing unit is configured to decrypt the encryption result by using a private key of the first device to obtain the random value, and generate the first information by using information agreed by the first device and the second device and the random value.
  • a shared key is configured to decrypt the encryption result by using a private key of the first device to obtain the random value, and generate the first information by using information agreed by the first device and the second device and the random value.
  • the information receiving unit is specifically configured to receive the encryption obtained by the first device encrypting the public key of the first device by using the public key of the second device result;
  • the key processing unit is configured to: after decrypting the encryption result by using a private key of the user, obtain a public key of the first device, and generate a password, where the password is used as the first shared key. After encrypting the password by using the public key of the first device, sending the encryption result to the first device, so that the first device decrypts the received encryption result by using the private key of the first device, and then obtains the obtained password. As the first shared key.
  • the information receiving unit is configured to receive, by using the public key of the second device and the private key of the second device, the first device to generate the first according to the key exchange algorithm. After the key is shared, the public key of the first device that is sent; the key exchange algorithm is predetermined by the first device and the second device;
  • the key processing unit is configured to generate a first shared key according to the key exchange algorithm by using a private key of the first device and a public key of the first device.
  • the key processing unit is pre-configured with parameters used by the key exchange algorithm.
  • the information receiving unit is further configured to receive a parameter used by the key exchange algorithm sent by the configuration device, and provide the parameter to the key processing unit.
  • the key configuration apparatus further includes:
  • a secure connection unit configured to receive an encryption result sent by the first device, where the encryption result is that the first device generates a credential after obtaining the first shared key, and uses the first shared key or the first shared key
  • the derived key is obtained by encrypting the credential; decrypting the encrypted result by using the obtained first shared key or the derived key of the first shared key to obtain the credential, the credential being used for the a secure connection between the first device and the second device; or
  • the key processing unit obtains the first shared key, generates a credential, and encrypts the credential by using the first shared key or the derived key of the first shared key, and sends the encrypted result to the Determining, by the first device, the encryption result by using the obtained first shared key or a derived key of the first shared key to obtain the credential, wherein the credential is used for the first A secure connection between a device and the second device.
  • the information providing unit is further configured to use the second device Channel information is provided to the configuration device, so that the configuration device sends channel information of the second device to the first device; so that the first device quickly discovers the second device according to channel information of the second device, The operation of transmitting the information for obtaining the first shared key to the second device is performed.
  • the information providing unit is specifically configured to pass the two-dimensional code,
  • the manner of USB or near field communication provides information to the configuration device.
  • the information receiving unit is further configured to receive the first The verification value generated by the device using the public key of the second device;
  • the key processing unit is further configured to verify the received verification value by using its own public key, and if the verification passes, perform an operation of generating the first shared key.
  • the seventh aspect the key configuration system, comprising: the key configuration device according to the fourth aspect, the key configuration device according to the fifth aspect, and the key configuration device according to the sixth aspect; or
  • the key configuration apparatus according to the seventh possible implementation of the fourth aspect, the key configuration apparatus according to the second possible implementation of the fifth aspect, and the sixth aspect, the sixth aspect a key configuration apparatus according to any one of the sixth possible implementations; or
  • a key configuration apparatus according to the eighth possible implementation of the fourth aspect, the key configuration apparatus according to the third possible implementation of the fifth aspect, and the sixth aspect, the sixth aspect a key configuration apparatus according to any one of the sixth possible implementations; or
  • a key configuration apparatus according to the ninth possible implementation of the fourth aspect, the key configuration apparatus according to the fourth possible implementation of the fifth aspect, and the sixth aspect, the sixth aspect a key configuration apparatus according to any one of the sixth possible implementations; or
  • the key configuration apparatus according to the eleventh possible implementation manner of the fourth aspect, the density of any one of the first to fourth possible implementation manners of the fifth aspect, the fifth aspect Key configuration apparatus, and the key configuration apparatus according to any one of the first to sixth possible implementations of the sixth aspect, the sixth aspect; or
  • Key configuration apparatus according to a twelfth possible implementation of the fourth aspect, a key configuration apparatus as described in a fifth possible implementation of the fifth aspect, and a seventh possibility as in the sixth aspect The key configuration device described in the implementation manner; or
  • the key configuration apparatus according to the thirteenth possible implementation manner of the fourth aspect, the secret of any one of the first to fifth possible implementation manners of the fifth aspect, the fifth aspect Key configuration apparatus and key configuration apparatus as described in the ninth possible implementation of the sixth aspect; or
  • the key configuration apparatus according to any one of the first to the thirteenth possible implementation manners of the fourth aspect, the sixth preferred implementation manner of the fifth aspect, Key configuration apparatus and key configuration apparatus as described in the eighth possible implementation of the sixth aspect.
  • the configuration device of the third party is used only for the transmission of the public key and the device information between the first device and the second device, and is used for security between the first device and the second device.
  • the first shared key of the connection is generated by the first device and the second device respectively, and the first shared key is not directly transmitted between the first device and the second device, but is used to obtain the first
  • the information of the shared key is transmitted to the second device, and the first shared key must be generated by the private key of the second device. Therefore, even if the attacker steals the public key transmitted between the configuration device, the first device, and the second device, the first shared key cannot be obtained, thereby improving the security of the interaction between the first device and the second device.
  • FIG. 1 is a schematic flowchart of a key configuration method of a third-party-based configuration device in the prior art
  • FIG. 2 is a schematic flowchart of a key configuration method according to Embodiment 1 of the present invention.
  • FIG. 3 is a schematic flowchart of a key configuration method according to Embodiment 2 of the present invention.
  • FIG. 4 is a schematic flowchart of a key configuration method according to Embodiment 3 of the present invention.
  • FIG. 5 is a schematic flowchart of a key configuration method according to Embodiment 4 of the present invention.
  • FIG. 6 is a schematic flowchart diagram of a key configuration method according to Embodiment 5 of the present invention.
  • FIG. 7 is a schematic flowchart diagram of a key configuration method according to Embodiment 6 of the present invention.
  • FIG. 8 is a schematic structural diagram of a system according to an embodiment of the present invention.
  • FIG. 9 is a schematic structural diagram of a key configuration apparatus installed in a first device according to an embodiment of the present disclosure.
  • FIG. 10 is a schematic structural diagram of a key configuration apparatus installed in a configuration device according to an embodiment of the present disclosure
  • FIG. 11 is a schematic structural diagram of a key configuration apparatus installed in a second device according to an embodiment of the present disclosure.
  • FIG. 12 is a schematic structural diagram of hardware of a configuration device according to an embodiment of the present disclosure.
  • FIG. 13 is a schematic structural diagram of hardware of a first device according to an embodiment of the present disclosure.
  • FIG. 14 is a schematic structural diagram of hardware of a second device according to an embodiment of the present disclosure.
  • the core idea of the present invention is that the third-party configuration device acquires the public key of the second device; the public key of the second device is sent to the first device; the first device generates a shared key, and uses the public key of the second device to The information for obtaining the first shared key is sent to the second device, or the first device generates the first shared key by using the public key of the second device, and sends the information for obtaining the first shared key to the second
  • the device sends the public key of the first device to the second device according to the device information of the second device; the second device generates a shared key by using its own private key and information for obtaining the first shared key, the shared key Used for a secure connection between the first device and the second device.
  • the present invention can perform the configuration of the shared key by means of key exchange, or the configuration of the shared key without using the key exchange.
  • the methods provided by the present invention are described in detail below by several specific embodiments.
  • the key exchange is used to perform the configuration of the shared key
  • the first device and the second device reserve a key exchange algorithm
  • the key exchange algorithm is that the subsequent first device and the second device generate the share.
  • the algorithm used in the key may be, but not limited to, a DH algorithm, an RSA algorithm, or an EIGam algorithm. According to different key exchange algorithms, pre-shared parameters are different.
  • the core of the key exchange algorithm is that the device exposes its own public key, retains its own private key, uses the public key of the other party and its private key to generate a shared key, and uses the shared key to ensure the security of messages traversing the unsecured network. Sex.
  • the manner of the parameters used by the shared key exchange algorithm may include, but is not limited to, the following two types: the first mode: configuring the parameters used by the key exchange algorithm on the first device and the second device in advance; the second manner: The parameters used by the key exchange algorithm are sent to the first device and the second device by a third-party configuration device.
  • the DH algorithm is taken as an example.
  • the first device and the second device share the parameters g and P in advance, and the parameters g and P are shared in the first device and the second device in advance, where P is a prime number. g is the original root of P.
  • both the first device and the second device have their own public and private keys, the public and private keys on the first device are PkeyA and keyA, respectively, and the public and private keys on the second device are PkeyB and keyB.
  • FIG. 2 is a schematic flowchart of a key configuration method according to Embodiment 1 of the present invention. As shown in FIG. 2, the process may include the following steps:
  • Step 201 Configure the device to obtain the public key PkeyA and device information of the first device.
  • the device information includes at least address information of the first device.
  • This step is an optional step in this embodiment.
  • Step 202 Configure the device to obtain the public key PkeyB and device information of the second device.
  • the device information includes at least address information of the second device.
  • the present invention does not limit the order of the above two steps, and may be performed sequentially in any order, or may be performed simultaneously.
  • the device information is mainly address information, and may include but is not limited to the following device information: UUID (Universally Unique Identifier, universal unique identifier, manufacturer, serial number, device capability, etc.
  • the device capability refers to the algorithm, authentication method, device role information, and device type information supported by the device.
  • the device role information refers to the role that the device plays when registering, and may be enrollee, registrar, client, or GO.
  • the device type information may be a WiFi wireless terminal (such as a mobile phone, a computer, a sensor, etc.), an access point (an AP in a wifi network), a sensor node, a central node, and the like.
  • the device information acquired by the configuration device in this embodiment is mainly address information.
  • the public key PkeyA of the first device, the device information of the first device, the public key PkeyB of the second device, and the device information of the second device may be obtained in various manners, for example, by using a security medium such as NFC or USB, in particular,
  • the headless device is configured to scan the identification code by encoding the public key PkeyA of the first device and the device information of the first device to the scan identification code of the first device, and the configuration device can obtain the scan identification code by scanning the scan identification code.
  • the public key PkeyA of the first device and the device information of the first device are the same for the second device.
  • the scan identification code may be, for example, a two-dimensional code, a barcode, or the like.
  • Step 203 The configuration device sends the public key PkeyB and the device information of the second device to the first device according to the device information of the first device.
  • the configuration device may encrypt the public key PkeyB and the device information of the second device by using the public key PkeyA of the first device, and then send the encryption result to the first device.
  • the first encryption method If the public key is a public key for asymmetric encryption, it can be directly used for encryption, and the corresponding private key needs to be used for decryption.
  • the second encryption method if the public key is a public key used for key exchange, the partial information of the public key is used for encryption, or the information derived from the public key is used for encryption, and the decryption needs to use a symmetric key to decrypt, and It is not decrypted with the corresponding private key.
  • the subsequent encryption and decryption process may adopt one of the above encryption methods according to specific conditions.
  • the encryption uses the second encryption method.
  • Step 204 The first device generates a verification value by using the public key PkeyB of the second device, and sends the generated verification value to the second device.
  • the first device first decrypts the encryption result to obtain the public key PkeyB and the device information of the second device.
  • the verification value generated by using the public key PkeyB of the second device in this step may be, but not limited to, a hash value of PkeyB, or may be a verification value generated by using other preset algorithms.
  • Step 205 The first device sends the public key PkeyA of the first device to the second device by using the device information of the second device.
  • the first device After acquiring the address information of the second device, the first device sends the verification value and the PkeyA to the second device.
  • the information used to obtain the shared key sent by the first device to the second device in this embodiment is the public key PkeyA of the first device.
  • steps 204 and 205 are also not limited in sequence, and may be executed sequentially in any order, or may be performed simultaneously.
  • Step 206 The second device uses the public key PkeyB of its own to verify the received verification value. If the verification succeeds, the public key PkeyA of the first device is recorded.
  • step 204 and the verification of the verification value by the second device in this step are operations performed to further improve security and reliability, and are not essential steps of the present invention. If there is no step 204, the second device directly records the received PkeyA.
  • the second public device may use its own public key PkeyB to generate a verification value by using the same method as the first device to generate a verification value, and compare the generated verification value with the received verification value. If they are consistent, the verification is performed. Pass, otherwise the verification fails. If the authentication fails, the received public key PkeyA of the first device may be discarded, the subsequent process is not performed, and the user may be further prompted to fail to configure, for example, by using an indicator light, or by displaying on the screen, or by voice. Ways and so on.
  • Step 207 The first device and the second device respectively generate a shared key by using the public key of the other party and the private key of the other party.
  • the first device may generate a shared key at any time after step 203, that is, after obtaining the public key of the second device, the shared key may be generated, which is not necessarily in this step.
  • the first device and the second device use a pre-shared key exchange algorithm to generate a shared key.
  • the private key of the device is a random number.
  • PkeyB (g ⁇ keyB)mod(P) in the second device, and keyB is the private key of the second device, which is also a random number.
  • is the operator of the power
  • X ⁇ Y represents the Y power of X
  • mod is the operator of modulo
  • XmodY represents the modulo of X to Y.
  • the first device generates a shared key DHkeyA by using PkeyB and keyA, namely:
  • the second device generates a shared key DHkeyB by using PkeyA and keyB, namely:
  • DHkeyA DHkeyB.
  • Step 208 The first device and the second device perform a secure connection based on the shared key.
  • the first device and the second device may perform subsequent interactions based on the shared key, and the subsequent interactions may include, but are not limited to, an authentication process, an association process, a data interaction process, and the like.
  • the prior art can be used, and details are not described herein again.
  • the first device and the second device may generate a derived key for the shared key based on the shared key derivation algorithm, and use the derived key for subsequent secure connection.
  • the present invention does not limit the key derivation algorithm as long as the first device and the second device pre-agreed a consistent key derivation algorithm.
  • the first device after generating the shared key, the first device generates a credential, and encrypts the credential by using the shared key or the derived key of the shared key, and then passes the encrypted result to the first
  • the second device uses the generated shared key or the derived key of the shared key to decrypt the encrypted result to obtain a credential.
  • the second device generates a credential after generating the shared key, and encrypts the credential by using the shared key or the derived key of the shared key, and then transmits the encrypted result to the first device; the first device utilizes the generated The shared key or the derived key of the shared key decrypts the encrypted result to obtain a credential.
  • the first device sends a credential to the second device, or the second device sends a credential to the first device, which may be determined according to the device type. If the first device is a registrar, a central node, or a GO, the first device may be generated by the first device. The credentials are sent to the second device.
  • FIG. 3 is a schematic flowchart of the key configuration method according to the second embodiment of the present invention. In this embodiment, the same steps as in the first embodiment are not implemented. For further details, refer to the description in the first embodiment. As shown in Figure 3, the process includes the following steps:
  • Step 301 is the same as step 201.
  • Step 302 is the same as step 302.
  • Step 303 The configuration device establishes a secure connection with the first device to generate shared keys DHkeyC' and DHkeyA'.
  • the first way the configuration device shares the credential with the first device through the existing WPS interaction mode (ie, key1 generated in the description of FIG. 1 in the background art), and uses the credential as the shared key DHkey'.
  • the existing WPS interaction mode ie, key1 generated in the description of FIG. 1 in the background art
  • the second method is: the configuration device sends the public key PkeyC to the first device, and the configuration device uses the public key PkeyA of the first device and the private key keyC of the configuration device to perform a key exchange algorithm to generate a shared key DHkeyC'.
  • a device performs a key exchange algorithm by using the public key PkeyC of the configuration device and the private key keyA of the first device to generate a shared key DHkeyA'.
  • the configuration device needs to pre-share the parameters used by the key exchange algorithm with the first device.
  • the configuration device also obtains the shared parameters g and P in advance.
  • DHkeyC’ DHkeyA’.
  • Step 304 The configuration device encrypts the public key PkeyB of the second device and the device information by using the shared key DHkeyC', and then sends the encryption result to the first device.
  • Step 305 After decrypting the received encryption result by using the shared key DHkeyA', the first device acquires the public key PkeyB and the device information of the second device.
  • the configuration device may also use the shared key DHkeyC' to generate a derivation key, and then use the derived key to encrypt the public key PkeyB of the second device and the device information, and then send the information to the first device.
  • the method of generating the key is not shown here, as long as the configuration device and the first device are pre-agreed.
  • the first device uses the shared key DHkeyA' to derive the key, and then uses the derived key to decrypt the received encryption result.
  • Step 306 The first device generates a new private key keyA' and a new public key PkeyA'.
  • This step is a step performed to further enhance the security of the interaction.
  • the first device generates a new random number as the private key keyA', and then generates a new public key PkeyA' by using the new private key.
  • PkeyA' (g ⁇ keyA’)mod(P).
  • the subsequent steps 307 to 311 are the same as steps 204 to 208 in the first embodiment, except that the public key and the private key of the first device involved are replaced with the new public keys PkeyA' and keyA' in step 306, respectively.
  • FIG. 4 is a schematic flowchart of the key configuration method according to the third embodiment of the present invention. Similarly, in the embodiment, the same as the first embodiment. The steps are not described again, see the description in the first embodiment. As shown in Figure 4, the process includes the following steps:
  • Step 401 is the same as step 201.
  • the device information of the first device acquired by the device includes at least address information of the first device and device role information or device type information of the first device, where the device The role information refers to the role that the device plays when registering, such as enrollee, registrar, client, or GO.
  • the device type information may be a wireless terminal, an access point, a sensor node, a central node, or the like.
  • Step 402 is the same as step 202.
  • the device information of the second device acquired by the device includes at least address information of the second device and device role information or device type information of the second device.
  • the public key PkeyA of the first device, the device information, and the public key PkeyB and device information of the second device can be obtained in various manners, for example, by using a security medium such as NFC or USB, in particular,
  • a security medium such as NFC or USB
  • the public key PkeyA and device information of a device are the same for the second device.
  • the scan identification code may be, for example, a two-dimensional code, a barcode, or the like.
  • Step 403 The configuration device determines, according to the device role information or the device type information of the first device and the second device, that the public key and the device information of the first device are sent to the second device, or the public key and the device of the second device are The information is sent to the first device.
  • the first device is an enrollee, the second device is a registrar, or the first device is a client, the second device is a GO, or the first device is a wireless terminal, and the second device is an access point, then it is determined that The public key and device information of the second device are sent to the first device, so that the first device can quickly scan and discover the second device to improve efficiency. If the first device is a central node and the second device is a sensor node, it is determined that the public key and device information of the second device are sent to the first device, so that the central node can quickly discover the sensor node.
  • the roles or types of the first device and the second device are equal, for example, are sensor nodes, or both are clients, etc., whether the public key and device information of the second device are determined to be sent to the first device, or the first device The public key and device information of the device can be sent to the second device. This step is optional.
  • step 403 determines that the public key and device information of the second device are sent to the first device, and step 404 is the same as step 203.
  • Steps 405 to 409 are the same as steps 204 to 208.
  • the first device may first determine, according to the device role information or the device type information of the second device, the manner in which the first device establishes a connection with the second device, thereby determining in step 405.
  • the message type is used to send the verification value and the public key PkeyA of the first device. For example, if the first device is an enrollee, the second device is a registrar, or the first device is a wireless terminal, and the second device is an access point, the first device may use the probe message to verify the value and the public key PkeyA of the first device. Send to the second device.
  • the first device may send the verification value and the public key PkeyA of the first device to the first device by using a broadcast message.
  • Second device If the first device is a GO and the second device is a client, the first device may send the verification value and the public key PkeyA of the first device to the second device by using an invitation message. If the first device is a client and the second device is a GO, the first device may send the verification value and the public key PkeyA of the first device to the second device by using a probe message.
  • the first device may send the verification value and the public key PkeyA of the first device to the second device by using a request message. If the first device is a central node and the second device is a sensor node, the first device may send the verification value and the public key PkeyA of the first device to the second device by using an invitation message or a broadcast message.
  • the device information of the first device and the second device that are configured by the device may further include channel information.
  • the first device may quickly discover the second device according to the channel information of the second device, and perform steps. 405 and step 406, the verification value and the public key PkeyA of the first device are sent to the second device.
  • the embodiment may start from step 405 and start from step 306 in the second embodiment until the first device and the second device perform a secure connection based on the shared key.
  • FIG. 5 is a schematic flowchart of a key configuration method according to Embodiment 4 of the present invention, which is different from Embodiment 1 in this embodiment. The steps in the same manner as in the first embodiment will not be described again. As shown in Figure 5, the process includes the following steps:
  • Step 501 is the same as step 201.
  • Step 502 is the same as step 202.
  • Step 503 is the same as step 203.
  • Step 504 is the same as step 204.
  • Step 505 The first device generates a password, encrypts the password by using the public key PkeyB of the second device, and sends the encrypted result to the second device.
  • the encryption used here is the first encryption method described in the first embodiment.
  • the first device obtains the encryption result encrypted by the authentication value and the password to the second device. That is, the information used by the first device to obtain the shared key that is sent by the first device to the second device in the embodiment is the above-mentioned password generated by the first device.
  • the manner in which the first device generates the password may be arbitrary, for example, a method of generating a random number as a password, or a method of generating a password by using a preset algorithm, and the like.
  • Step 506 The second device uses its own public key PkeyB to verify the received verification value. If the verification succeeds, the received encryption result is decrypted by using the private key keyB to obtain a password.
  • the public-private key pair (PkeyB, keyB) of the second device through a certain encryption and decryption algorithm, enables the encryption result encrypted by PkeyB to be decrypted by the keyB, and the encryption and decryption algorithm can adopt the existing Various ways are not repeated here.
  • Step 507 The first device and the second device generate a shared key by using the password.
  • the first device and the second device may directly use the password as a shared key, or may generate a derived key for the password by using a pre-agreed key derivation algorithm, and use the derived key as a shared key.
  • the operation of generating the shared key by the first device may be performed at any time after the generation of the password, and is not limited to being performed in this step.
  • Step 508 is the same as step 208.
  • step 303 to step 306 in the second embodiment and the technical content described in step 403 in the third embodiment are also applicable to the fourth embodiment, and details are not described herein again.
  • the process shown in this embodiment includes the following steps:
  • Step 601 is the same as step 201.
  • Step 602 is the same as step 202.
  • Step 603 is the same as step 203.
  • Step 604 is the same as step 204.
  • Step 605 The first device generates a random value Nonce, and generates a shared key DHkey by using the public key PkeyB of the second device and the random value Nonce.
  • the shared key DHkey may be generated by using the information agreed by the other first device and the second device and the random value, for example, may be adopted.
  • MAC of the second device Media Access Control, media access control value, the hash value of the second device's public key Pkey, and so on.
  • Step 606 The first device encrypts the random value Nonce by using the public key PkeyB of the second device, and then sends the encryption result to the second device.
  • the information used to obtain the shared key in this embodiment is the random value Nonce.
  • the encryption method here may be the first encryption method described in Embodiment 1.
  • the second device After receiving the encryption result, the second device decrypts the encryption result to obtain the random value Nonce.
  • Step 607 is the same as step 206. After the verification is passed, the random value Nonce is recorded.
  • Step 608 The second device generates the shared key DHkey by using its own public key PkeyB and a random value Nonce.
  • the algorithm for generating the shared key is not specifically limited herein.
  • Step 609 is the same as step 208.
  • FIG. 7 is a schematic flowchart of a key configuration method according to Embodiment 6 of the present invention. As shown in FIG. 7, the method includes:
  • Step 701 is the same as step 201.
  • Step 702 is the same as step 202.
  • Step 703 is the same as step 203.
  • Step 704 The first device sends its own public key PkeyA to the second device.
  • the first device may encrypt the PkeyA by using the public key PkeyB of the second device, and then send the PkeyA to the second device, and the second device decrypts the PkeyA by using the private key keyB of the second device.
  • the encryption used here is the first encryption method described in the first embodiment.
  • Step 705 The second device encrypts a password by using the public key PkeyA of the first device, and sends the encryption result to the first device.
  • the password may be a credential or a session key, and may be randomly generated or generated according to an algorithm, and is not limited herein.
  • the second device may generate a verification value by using the public key PkeyA of the first device, for example, generating a hash value of the PkeyA and sending the hash value to the first device.
  • the first device After receiving the verification value, the first device first generates a verification value by using the public key PkeyA. The generated verification value is compared with the received verification value. If they are consistent, it is determined that the verification is passed, and step 706 is continued.
  • Step 706 The first device decrypts the encryption result by using its own private key keyA to obtain a password.
  • Step 707 The first device and the second device perform subsequent secure connection by using the above-mentioned password or password derived key.
  • the information used to obtain the shared key in the seventh embodiment is the public key of the first device.
  • FIG. 8 is a schematic structural diagram of a system according to an embodiment of the present invention. As shown in FIG. 8, the system includes a first device, a second device, and a configuration device of a third party.
  • the device is configured to obtain the public key of the second device, and send the public key of the second device to the first device.
  • the first device is mainly responsible for generating a first shared key and providing information for obtaining the first shared key to the second device, where the second device generates the first shared key.
  • the first device can implement the function in the following two manners:
  • the first device In the first mode, the first device generates a first shared key, and sends information for obtaining the first shared key to the second device by using the public key of the second device according to the device information of the second device. This way corresponds to the manner described in the above embodiment four.
  • the second method is to generate a first shared key by using the public key of the second device, and send information for obtaining the first shared key to the second device according to the device information of the second device. This manner corresponds to the manner described in the above embodiments 1 to 3.
  • a second device configured to generate a first shared key by using a private key thereof and information for obtaining the first shared key, where the first shared key is used for a secure connection between the first device and the second device .
  • the name of the first shared key is distinguished from the second shared key shared between the configuration device and the first device in the subsequent preferred embodiment.
  • the first device For the first mode, the first device generates a password, uses the password as the first shared key, or generates a derivative key for the password by using a key derivation algorithm, and uses the derived key as the first shared key; Then, the password is encrypted by using the public key of the second device, and the encrypted result is sent to the second device. In this manner, the information used to obtain the first shared key is password.
  • the manner in which the first device generates the password may be arbitrary, for example, a method of generating a random number as a password, or a method of generating a password by using a preset algorithm, and the like.
  • the second device decrypts the encryption result by using its own private key to obtain a password, uses the password as the first shared key, or generates a derivative key for the password by using a key derivation algorithm, and uses the derived key as the first shared key.
  • the public-private key pair (PkeyB, keyB) of the second device through a certain encryption and decryption algorithm, enables the encryption result encrypted by the public key PkeyB to be decrypted by the private key keyB.
  • This encryption and decryption algorithm has It is a very mature way, and will not be repeated here.
  • the first device In the first mode, there is also an implementation that the first device generates a random value, and the first shared key is generated by using the information agreed by the first device and the second device, and the public key of the second device is used. After encrypting the random value, the encrypted result is sent to the second device. The second device encrypts the encrypted result by using its own private key to obtain the random value, and then generates the first shared key by using the information agreed by the first device and the second device and the random value.
  • the information agreed by the first device and the second device may be information such as a public key of the second device, a hash value of the second device public key, a MAC address of the second device, and the like.
  • the three-party configuration device is obtained from the second device and then sent to the first device, and may even be some specific values pre-configured by the first device and the second device.
  • the first device and the second device need to perform a predetermined key exchange algorithm.
  • the key exchange algorithm that can be used herein may be, but not limited to, a DH algorithm, an RSA algorithm, or an EIGal algorithm, according to different secrets.
  • the key exchange algorithm has different parameters for pre-sharing. Taking the D-H algorithm as an example, the first device and the second device share the parameters g and P in advance, and the parameters g and P are shared in advance on the first device and the second device, where P is a prime number and g is the original root of P.
  • the manner in which the first device and the second device share the parameters used by the key exchange algorithm may include, but is not limited to, the following two types: first, configuring parameters used by the key exchange algorithm on the first device and the second device in advance; Second, the parameters used by the key exchange algorithm are sent to the first device and the second device by using a third-party configuration device.
  • the first device is specifically configured to generate a first shared key according to a key exchange algorithm by using a public key of the second device and a private key thereof, and send the public key of the first device to the second device. .
  • the information used to obtain the first shared key is the public key of the first device.
  • the second device is specifically configured to generate the first shared key according to the key exchange algorithm by using the public key of the first device and the private key of the first device.
  • the first device and the second device share the parameters used by the key exchange algorithm in the following two manners:
  • the parameters used by the key exchange algorithm are pre-configured on the first device and the second device, that is, in a static configuration manner.
  • the configuration device sends the parameters used by the key exchange algorithm to the first device and the second device, that is, the parameter configuration used by the key exchange algorithm on the first device and the second device is completed by the configuration device of the third party.
  • the configuration device is further configured to acquire device information of the second device and the first device.
  • the device information involved in the embodiment of the present invention may include, but is not limited to, address information, device capability, manufacturer, serial number, UUID, etc., where the device capability refers to an algorithm, an authentication method, a device role information, and a device supported by the device.
  • Type information, etc. where the device role information refers to the role that the device plays when registering, and may be enrollee, registrar, client, or GO.
  • the device type information may be a wireless terminal, an access point, a sensor node, a central node, or the like.
  • the device information referred to herein includes at least address information; such that the configuration device can perform an operation of transmitting the public key and device information of the second device to the first device according to the address information of the first device; and acquiring the address of the second device And transmitting the address information of the second device to the first device; and enabling the first device to send the information for obtaining the first shared key according to the address information of the second device.
  • the configuration device is further configured to acquire a public key of the first device; when the public key and device information of the second device are sent to the first device, Specifically, the public key of the first device is used to encrypt the public key and the device information of the second device.
  • the encryption may be performed by using the second encryption method described in the first embodiment to send the encryption result to the first device.
  • the first device decrypts the encryption result to obtain the public key and device information of the second device.
  • This preferred embodiment corresponds to what is described in the first embodiment.
  • the configuration device acquires information from the first device or the second device
  • the public key and the device information are included, specifically by scanning the two-dimensional code, USB or near field.
  • the manner of communication acquires information from the first device or the second device.
  • the first device may further generate a verification value by using a public key of the second device, where the verification value may be, but not limited to, a hash value of the public key of the second device, or a verification value generated by using another preset algorithm. And then transmitting the verification value to the second device according to the device information of the second device.
  • the second device Before generating the first shared key, the second device uses the public key of the second device to verify the received verification value. If the verification succeeds, the operation of generating the first shared key is continued; otherwise, the public device of the first device is discarded.
  • the key does not perform subsequent operations, and can further prompt the user to configure the failure, such as the way of using the indicator light, or the way of displaying on the screen, or the manner of voice, and the like. This preferred embodiment corresponds to what is described in the first embodiment.
  • the configuration device and the first device may also be used to establish a secure connection to generate a second shared key.
  • the following two types can be used: first, the configuration device and the first device share the credential through the existing WPS interaction manner, and the credential is used as the second shared key; second, the configuration device will be its own
  • the public key is sent to the first device, and the configuration device performs a key exchange algorithm by using the public key of the first device and the private key of the configuration device to generate a second shared key.
  • the first device uses the public key of the configuration device and the first device.
  • the private key performs a key exchange algorithm to generate a second shared key.
  • the public key and the device information of the second device are sent to the first device
  • the public key and the device information of the second device are encrypted by using the second shared key, and the encryption result is sent to the first device.
  • the first device After decrypting the received encryption result by using the second shared key, the first device obtains the public key and device information of the second device.
  • This preferred embodiment corresponds to what is described in the second embodiment.
  • the first device may further generate a new public key and a new private key.
  • the public key of the first device sent by the first device to the second device is a new public key;
  • the public key of the first device used by the second device when generating the first shared key is a new public key;
  • the private key of the first device utilized by the first device when generating the first shared key is a new private key.
  • the device role information or the device type information included in the device information may be further utilized on the basis of the foregoing first mode or the second mode, that is, the configuration device may also be used according to the first device and the second device.
  • Device role information or device type information determining whether to send the public key and device information of the second device to the first device, or to send the public key and device information of the first device to the second device.
  • the configuration device determines that the public key and the device information of the second device are sent to the first device, so that the first device can quickly scan and discover the second device, thereby improving efficiency.
  • the configuration device determines to send the public key and device information of the second device to the first device, so that the central node can quickly discover the sensor node.
  • the roles or types of the first device and the second device are equal, for example, are sensor nodes, or both are clients, etc., whether the public key and device information of the second device are determined to be sent to the first device, or the first device The public key and device information of the device can be sent to the second device.
  • the device information may be included in the device information, that is, the first device is further configured to quickly discover the second device according to the channel information of the second device, to Executing information for obtaining the first shared key is sent to the second device.
  • first device and the second device may generate a derived key for the first shared key based on the shared key derivation algorithm, in addition to directly using the first shared key for secure connection, and use the derived key for secure connection.
  • Subsequent secure connections may include, but are not limited to, an authentication process, an association process, a data interaction process, and the like.
  • an authentication process an association process
  • a data interaction process and the like.
  • the above configuration device may include one or more servers, or include one or more computers, and the first device and the second device may be, for example, a personal computer, a notebook computer, a wireless phone, a personal digital assistant (PDA), Sensor nodes, APs, etc.
  • PDA personal digital assistant
  • the manner and system provided by the present invention are not limited to a WiFi network, and may be applied to any wireless network such as Bluetooth, Zigbee, etc., and may even be applied to key configuration in a wired network.
  • FIG. 9 is a schematic structural diagram of a key configuration apparatus installed in a first device according to an embodiment of the present invention.
  • the key configuration apparatus includes: a configuration receiving unit 90 and a key processing unit 91.
  • the configuration receiving unit 90 is responsible for receiving the public key of the second device that is sent by the configuration device after acquiring the public key of the second device.
  • the key processing unit 91 is responsible for transmitting the information for obtaining the first shared key to the second device by using the public key of the second device; or the first device generates the first shared key by using the public key of the second device, and the first shared key is used. Transmitting the information of the first shared key to the second device; so that the second device generates the first shared key by using its own private key and information for obtaining the first shared key, where the first shared key is used for A secure connection between a device and a second device.
  • the way to get the first shared key can be as follows:
  • the first mode the key processing unit 91 generates a password, uses the password as the first shared key, encrypts the password with the public key of the second device to obtain an encryption result, and transmits the encryption result to the second device, so that the second device
  • the encryption result is decrypted by using its own private key to obtain a password, and the password is used as the first shared key.
  • the second mode the key processing unit 91 generates a password, encrypts the password by using the public key of the second device to obtain an encryption result, and sends the encryption result to the second device, and generates a derivative key for the password by using the key derivation algorithm.
  • the derived key is used as the first shared key, so that the second device decrypts the encrypted result by using its own private key to obtain a password, and generates a derived key for the password by using a key derivation algorithm, and uses the derived key as the first shared secret. key.
  • the third mode the key processing unit 91 generates a random value, generates the first shared key by using the information agreed by the first device and the second device, and encrypts the random value by using the public key of the second device. And sending the encryption result to the second device, so that the second device decrypts the encryption result by using the private key of the second device to obtain a random value, and generates the first shared key by using the information agreed by the first device and the second device and the random value.
  • the fourth mode the key processing unit 91 encrypts the public key of the first device by using the public key of the second device, and sends the encryption result to the second device; and receives the encryption result sent by the second device, where the encryption result is After decrypting the received encryption result by using the private key of the second device, the second device obtains the public key of the first device, generates a password, uses the password as a shared key, and encrypts the password by using the public key of the first device. After obtaining the decrypted result by using its own private key, the obtained password is used as the first shared key.
  • the fifth mode the key processing unit 91 generates the first shared key according to the key exchange algorithm predetermined by the first device and the second device by using the public key of the second device and the private key of the second device, and the public device of the first device The key is sent to the second device, so that the second device generates the first shared key according to the key exchange algorithm using its own private key and the public key of the first device.
  • the key processing unit 91 may be configured with parameters used by the key exchange algorithm in advance; or the configuration receiving unit 91 receives the parameters used by the key exchange algorithm sent by the configuration device, and provides the parameters to the key processing unit 91.
  • the key configuration apparatus may further include: a secure connection unit 92.
  • the secure connection unit 92 After the key processing unit 91 obtains the first shared key, the secure connection unit 92 generates a credential, and encrypts the credential by using the first shared key or the derived key of the first shared key, and then sends the encrypted result. Giving the second device; so that the second device decrypts the encryption result by using the obtained first shared key or the derived key of the first shared key to obtain a credential, and the credential is used between the first device and the second device Secure connection (this is shown in the figure). Alternatively, the encrypted result of the credential sent by the second device is decrypted by using the obtained first shared key or the derived key of the first shared key to obtain a credential, and the encrypted result of the credential is obtained by the second device. After the first shared key, a credential is generated, and the credential is encrypted by using the first shared key or the derived key of the first shared key, and the credential is used between the first device and the second device. Secure connection.
  • the configuration receiving unit 90 may receive an encryption result sent by the configuration device after acquiring the public key of the second device and the public key of the first device, and the encryption result is configured by the configuration device to encrypt the public key of the first device.
  • the public key of the second device The public key of the second device.
  • the key processing unit 91 can also be used to decrypt the encryption result to obtain the public key of the second device.
  • the configuration receiving unit 90 establishes a secure connection with the configuration device to generate a second shared key, and receives an encryption result sent by the configuration device after acquiring the public key of the second device, and the encryption result is that the configuration device utilizes the second share.
  • the public key of the second device encrypted by the key.
  • the key processing unit 91 decrypts the received encryption result using the second shared key, and obtains the public key of the second device.
  • the configuration receiving unit 90 when establishing a secure connection with the configuration device to generate the second shared key, specifically shares the credential with the configuration device through the WPS interaction mode, and uses the credential as the second shared key; or, the specific receiving configuration device
  • the public key of the configured configuration device the first device generates a second shared key according to a pre-agreed key exchange algorithm by using the public key of the configuration device and its own private key.
  • the key processing unit 91 may also generate a new public key and a new private key after obtaining the public key of the second device; thus, the first device sends the first device to the second device.
  • the public key is the new public key; the public key of the first device utilized by the second device when generating the first shared key is a new public key; the first device utilizes itself when generating the first shared key
  • the private key is the new private key.
  • the configuration receiving unit 90 may further receive channel information of the second device that is sent after the configuration device acquires the second device.
  • the key processing unit 91 can quickly discover the second device according to the channel information of the second device to perform an operation of transmitting information for obtaining the first shared key to the second device.
  • the key processing unit 91 may also generate a verification value by using the public key of the second device, and send the verification value to the second device; so that the second device utilizes its own public key before generating the first shared key.
  • the received verification value is verified, and in the case where the verification is passed, the operation of generating the first shared key is performed.
  • FIG. 10 is a schematic structural diagram of a key configuration apparatus installed in a configuration device according to an embodiment of the present invention. As shown in FIG. 10, the key configuration apparatus includes: an information acquisition unit 11 and an information transmission unit 12.
  • the information acquiring unit 11 is responsible for acquiring the public key of the second device.
  • the information transmitting unit 12 is responsible for transmitting the public key of the second device to the first device.
  • the first device can send the information for obtaining the first shared key to the second device by using the public key of the second device; or the first device can generate the first shared key by using the public key of the second device, Sending information for obtaining the first shared key to the second device.
  • the second device then generates a first shared key using its own private key and information for obtaining the first shared key, the first shared key being used for a secure connection between the first device and the second device.
  • the information sending unit 12 may further send the parameters used by the key exchange algorithm to the first device and the second device.
  • the key exchange algorithm is used by the first device and the second device to generate the first shared key according to the key exchange algorithm using its own private key and the public key of the other party.
  • the information acquisition unit 11 may acquire the public key of the first device.
  • the public key of the second device is encrypted by the information transmitting unit 12 by using the public key of the first device, and the encryption result is sent to the first device, so that the first device decrypts the encryption result to obtain the public key of the second device.
  • the information sending unit 12 establishes a secure connection with the first device to generate a second shared key; when the public key of the second device is sent to the first device, specifically using the second shared key After the public key of the second device is encrypted, the encryption result is sent to the first device, so that the first device decrypts the received encryption result by using the second shared key, and obtains the public key of the second device.
  • the information sending unit 12 shares the credential with the first device through WPS interaction, and uses the credential as the second shared key; or,
  • the public key is sent to the first device, and the second shared key is generated according to a pre-agreed key exchange algorithm by using the public key of the first device and the private key of the first device.
  • the information acquiring unit 11 may also acquire channel information of the second device.
  • the information transmitting unit 12 transmits the channel information of the second device to the first device, so that the first device quickly discovers the second device according to the channel information of the second device to perform information for obtaining the first shared key. The operation sent to the second device.
  • the information acquisition unit 11 acquires information from the first device or the second device by scanning a two-dimensional code, a universal serial bus USB, or a near field communication.
  • FIG. 11 is a schematic structural diagram of a key configuration apparatus provided in a second device according to an embodiment of the present invention.
  • the key configuration apparatus may include: an information providing unit 21, an information receiving unit 22, and a key. Processing unit 23.
  • the information providing unit 21 is responsible for providing the configuration device with the public key of the second device, so that the configuration device transmits the public key of the second device to the first device.
  • the information receiving unit 22 is responsible for receiving information used by the first device to obtain the first shared key by using the public key of the second device; or after receiving the first shared key by using the public key of the second device by the first device, The transmitted information for obtaining the first shared key.
  • the key processing unit 23 is responsible for generating a first shared key using its own private key and information for obtaining the first shared key, the first shared key being used for a secure connection between the first device and the second device.
  • the way to get the first shared key can be as follows:
  • the first mode the information receiving unit 22 receives the encryption result sent by the first device, and the encryption result is that the first device generates a password, and the password is used as the first shared key, and the password is encrypted by using the public key of the second device.
  • the key processing unit 23 decrypts the encryption result using its own private key to obtain a password, and uses the password as the first shared key.
  • the second mode the information receiving unit 22 receives the encryption result sent by the first device, and the encryption result is obtained by encrypting the password by using the public key of the second device after the first device generates the password.
  • the key processing unit 23 decrypts the encryption result by using its own private key to obtain a password, and generates a derivative key for the password by using a key derivation algorithm, and uses the derived key as the first shared key.
  • the third mode the information receiving unit 22 receives the encryption result sent by the first device, and the encryption result is that the first device generates a random value, and the first shared key is generated by using the information agreed by the first device and the second device and the random value. Obtaining the random value by using the public key of the second device.
  • the key processing unit 23 decrypts the encryption result by using its own private key to obtain a random value, and generates the first shared key by using the information agreed by the first device and the second device and the random value.
  • the fourth mode the information receiving unit 22 receives the encryption result obtained by the first device encrypting the public key of the first device by using the public key of the second device.
  • the key processing unit 23 decrypts the encryption result by using its own private key, obtains the public key of the first device, and generates a password, which is used as the first shared key, and is used by the public key of the first device. After the password is encrypted, the encrypted result is sent to the first device, so that the first device decrypts the received encryption result by using its own private key, and uses the obtained password as the first shared key.
  • the fifth mode the information receiving unit 22 receives the public key of the first device sent by the first device after the first device uses the public key of the second device and the private key of the second device to generate the first shared key according to the key exchange algorithm;
  • the switching algorithm is predetermined by the first device and the second device.
  • the key processing unit 23 generates the first shared key in accordance with the key exchange algorithm using its own private key and the public key of the first device.
  • the key processing unit 23 can be pre-configured with parameters used by the key exchange algorithm.
  • the information receiving unit 22 receives the parameters used by the key exchange algorithm transmitted by the configuration device, and supplies them to the key processing unit 23.
  • the key configuration apparatus may further include: a secure connection unit 24.
  • the security connection unit 24 receives the encryption result sent by the first device, and the encryption result is that the first device generates a credential after obtaining the first shared key, and uses the first shared key or the derived key of the first shared key. Obtaining the credential by using the obtained first shared key or the derived key of the first shared key to decrypt the encrypted result, and the credential is used between the first device and the second device. Secure connection (this is shown in the figure). Alternatively, after the key processing unit 23 obtains the first shared key, generates a credential, and encrypts the credential by using the first shared key or the derived key of the first shared key, and then sends the encrypted result. Giving the first device; so that the first device decrypts the encryption result by using the obtained first shared key or the derived key of the first shared key to obtain a credential, and the credential is used between the first device and the second device Secure connection.
  • the information providing unit 21 may further provide the channel information of the second device to the configuration device, so that the configuration device sends the channel information of the second device to the first device.
  • a device quickly discovers the second device according to the channel information of the second device to perform an operation of transmitting information for obtaining the first shared key to the second device.
  • the information providing unit 21 can provide information to the configuration device by means of two-dimensional code, USB or near field communication.
  • the information receiving unit 22 may further receive a verification value generated by the first device using the public key of the second device.
  • the key processing unit 23 verifies the received verification value using its own public key, and if the verification passes, performs an operation of generating the first shared key.
  • the configuration device includes a processor, a memory, and a communication bus.
  • the processor is connected to the memory through a communication bus, and the memory stores instructions for implementing a key configuration method.
  • the configuration device further includes a communication interface that is communicatively coupled to other devices through the communication interface.
  • the first device transmits information for obtaining the first shared key to the second device by using the public key of the second device; or for the first device to utilize the public key of the second device Generating a first shared key, and sending information for obtaining the first shared key to the second device;
  • the second device generates the first shared key by using its own private key and the information for obtaining the first shared key, the first shared key being used for the first device and the A secure connection between the second device.
  • the first device as shown in FIG. 13 includes a processor, a memory, and a communication bus.
  • the processor is connected to the memory through a communication bus, and the memory stores instructions for implementing a key configuration method. Further, the The first device also includes a communication interface communicatively coupled to other devices via the communication interface.
  • the first device generates a first shared key by using the public key of the second device, and sends information for obtaining the first shared key to the second device;
  • the second device generates the first shared key by using its own private key and the information for obtaining the first shared key, the first shared key being used for the first device and the A secure connection between the second device.
  • the foregoing second device includes a processor, a memory, and a communication bus, wherein the processor is connected to the memory through a communication bus, and the memory stores instructions for implementing a key configuration method, and further, the The second device also includes a communication interface communicatively coupled to other devices via the communication interface.
  • the device described in the present invention architecturally includes some basic components such as a bus, a processing system, a storage system, one or more input/output systems, and a communication interface.
  • the bus can include one or more wires to enable communication between components in the device.
  • a processing system includes various types of processors or microprocessors for executing instructions, processing processes, or threads.
  • the storage system may include a dynamic memory such as a random access memory (RAM) that stores dynamic information, and a static memory such as a read only memory (ROM) that stores static information, and a large-capacity memory including a magnetic or optical recording medium and a corresponding drive.
  • RAM random access memory
  • ROM read only memory
  • the input system is for the user to input information to the server or the terminal device, such as a keyboard, a mouse, a stylus, a voice recognition system, or a biometric system. If it is a headless device, the input system of the human-computer interaction function may not be included.
  • the output system includes a display for outputting information, a printer, a speaker, an indicator light, and the like.
  • Communication interfaces are used to enable a server or terminal device to communicate with other systems or systems. The communication interfaces can be connected to the network through a wired connection, a wireless connection, or an optical connection.
  • Each device contains operating system software for managing system resources, controlling the operation of other programs, and application software for implementing specific functions.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明提供了一种密钥配置方法、系统和装置,其中方法包括:所述配置设备获取第二设备的公钥,将所述第二设备的公钥发送给第一设备;所述第一设备生成第一共享密钥,利用第二设备的公钥将用于得到第一共享密钥的信息发送给第二设备;或者所述第一设备利用第二设备的公钥生成第一共享密钥,将用于得到第一共享密钥的信息发送给第二设备;所述第二设备利用自身的私钥以及用于得到第一共享密钥的信息生成所述第一共享密钥,所述第一共享密钥用于所述第一设备和所述第二设备之间的安全连接。通过本发明能够提高第一设备和第二设备之间交互的安全性。

Description

一种密钥配置方法、系统和装置
【技术领域】
本发明涉及网络通信技术领域,特别涉及一种密钥配置方法、系统和装置。
【背景技术】
WiFi(Wireless Fidelity,无线保真)技术从1997年无线局域网标准IEEE802.11发布以来,在拥有众多在业界领先的公司组成的WiFi联盟的大力推动下,同时以其具有的部署快速、使用便利和传输速率高等优势,发展迅猛。WiFi技术现在已经被广泛应用于各个行业,现在的笔记本电脑、PDA(Personal Digital Assistant,掌上电脑)和手机等都支持WiFi技术,WiFi网络的接入点遍布于酒店、咖啡厅、学校和医院等场所,可以说WiFi技术在生活中无所不在。
随着WiFi技术的发展和广泛应用,与之相关的安全技术需求也随之产生,WPA(Wi-Fi Protected Access,WiFi安全接入)是WiFi中使用的安全技术,它需要用户设置Credential(信任状, 包括帐号名、密码)以及WPA相关的其它参数,例如加密算法等等,但当用户不理解这些参数的含义时,因此就不懂如何设置这些参数,从而阻碍了WPA安全技术的应用,这就会导致用户因为不懂如何设置WPA参数而选择在没有安全机制保护的情况下使用网络。WPS(WiFi Protected Setup, Wifi安全建立)就是为了帮助用户设置信任状的技术。WPS主要强调两点:安全和简单,即配置过程要简单,配置后的网络要安全。现有的WPS主要基于密钥交换算法防止偷听、字典攻击等某些攻击行为。
目前WPS应用的场景,主要包括以下两种:第一种是作为enrollee(被注册方)的终端与作为registrar(注册器)的WiFi网络的AP(Access Point,接入点)之间进行信任状的配置,以便后续终端与AP之间能够基于信任状进行认证以建立安全的连接。第二种是P2P(Peer to Peer,点到点)场景中的认证配置过程,WiFi技术中P2P的研究是为了在没有诸如蜂窝网或热点等基础设施的情况下,终端设备之间也能够通过WiFi功能实现端到端的直接发现,在该场景下,一个终端作为client(客户端),另一个终端作为GO(Group Owner,组长设备),在client和GO之间进行密钥的配置,以便后续client和GO之间能够基于配置的密钥进行数据交互。
WiFi技术逐步应用于诸如智能电网、传感器网络、医疗网络等新领域,大量WiFi设备属于无头设备(Headless Devices),所谓无头设备就是没有显示屏幕、没有键盘、没有近场通信等人机接口的设备,对于这些无头设备之间的连接就需要一个第三方的配置设备来实现,例如通过配置设备将AP和机顶盒连接起来,或者通过配置设备将传感器和传感器连接起来等等。对于这种基于第三方的配置设备的帮助在两个设备之间进行的密钥配置现有技术中采用如下方式:
如图1中所示,配置设备扫描第一设备上的二维码,获取二维码中包含的第一设备的密码信息,并且扫描第二设备上的二维码,获取二维码中包含的第二设备的密码信息;配置设备基于第一设备的密码信息与第一设备执行WPS交互过程,并生成密钥key1,利用第一设备的密码信息对key1进行加密后发送给第一设备;以及配置设备基于第二设备的密码信息与第二设备执行WPS交互过程,并生成密钥key2,利用第二设备的密码信息对key2进行加密后发送给第二设备。之后,第一设备和第二设备就基于key1和key2进行安全连接,即基于key1和key2进行交互。
然而,上述方式中由于第一设备和第二设备的密码信息处于公开状态,易于被非法获取,即任何第三方的设备都能够获取到并生成密钥后发送给第一设备和第二设备,这样就很容易对第一设备和第二设备之间的交互进行偷听,安全性较差。
【发明内容】
有鉴于此,本发明实施例提供了一种基于第三方配置设备的密钥配置方法、系统和装置,以便于提高第一设备和第二设备之间交互的安全性。
第一方面,本发明实施例提供了一种密钥配置方法,所述密钥配置方法包括:
第一设备接收配置设备在获取到第二设备的公钥后发送的第二设备的公钥;利用所述第二设备的公钥将用于得到第一共享密钥的信息发送给所述第二设备,或者所述第一设备利用所述第二设备的公钥生成第一共享密钥,将用于得到所述第一共享密钥的信息发送给所述第二设备;
以便所述第二设备利用自身的私钥以及所述用于得到第一共享密钥的信息生成所述第一共享密钥,所述第一共享密钥用于所述第一设备和所述第二设备之间的安全连接。
结合第一方面,在第一种可能的实现方式中,所述第一设备利用第二设备的公钥将用于得到第一共享密钥的信息发送给第二设备包括:所述第一设备生成密码,将所述密码作为第一共享密钥,利用所述第二设备的公钥将所述密码进行加密得到加密结果,将所述加密结果发送给所述第二设备;
以便所述第二设备利用自身的私钥以及用于得到第一共享密钥的信息生成所述第一共享密钥包括:以便所述第二设备利用自身的私钥对所述加密结果进行解密得到所述密码,将所述密码作为第一共享密钥;或者,
所述第一设备生成第一共享密钥,利用第二设备的公钥将用于得到第一共享密钥的信息发送给第二设备包括:所述第一设备生成密码,利用所述第二设备的公钥将所述密码进行加密得到加密结果,将所述加密结果发送给所述第二设备,利用密钥衍生算法对所述密码生成衍生密钥,将该衍生密钥作为第一共享密钥;
以便所述第二设备利用自身的私钥以及用于得到第一共享密钥的信息生成所述第一共享密钥包括:以便所述第二设备利用自身的私钥对所述加密结果进行解密得到所述密码,利用所述密钥衍生算法对所述密码生成衍生密钥,将该衍生密钥作为所述第一共享密钥。
结合第一方面,在第二种可能的实现方式中,所述第一设备生成第一共享密钥,利用第二设备的公钥将用于得到第一共享密钥的信息发送给第二设备包括:所述第一设备生成随机值,利用第一设备与第二设备约定的信息和该随机值生成第一共享密钥,利用第二设备的公钥对该随机值进行加密后,将加密结果发送给第二设备;
以便所述第二设备利用自身的私钥以及用于得到第一共享密钥的信息生成所述第一共享密钥包括:以便所述第二设备利用自身的私钥对所述加密结果进行解密得到所述随机值,利用所述第一设备与第二设备约定的信息和所述随机值生成所述第一共享密钥。
结合第一方面,在第三种可能的实现方式中,利用所述第二设备的公钥将用于得到所述第一共享密钥的信息发送给所述第二设备包括:所述第一设备利用第二设备的公钥将第一设备的公钥进行加密后,将加密结果发送给第二设备;
以便所述第二设备利用自身的私钥以及所述用于得到第一共享密钥的信息生成所述第一共享密钥包括:以便所述第二设备利用自身的私钥对所述加密结果进行解密后,得到所述第一设备的公钥,并且生成密码,将该密码作为所述第一共享密钥;
该方法还包括:第一设备接收所述第二设备利用所述第一设备的公钥将该密码进行加密后的加密结果,利用自身的私钥对接收到的加密结果进行解密后,将得到的密码作为所述第一共享密钥。
结合第一方面,在第四种可能的实现方式中,该方法还包括:所述第一设备和所述第二设备预定密钥交换算法;
所述第一设备利用第二设备的公钥生成第一共享密钥,将用于得到第一共享密钥的信息发送给第二设备包括:所述第一设备利用第二设备的公钥和自身的私钥按照所述密钥交换算法生成第一共享密钥,并将第一设备的公钥发送给所述第二设备;
以便所述第二设备利用自身的私钥以及用于得到第一共享密钥的信息生成所述第一共享密钥包括:以便所述第二设备利用自身的私钥以及所述第一设备的公钥按照所述密钥交换算法生成第一共享密钥。
结合第一方面的第四种可能的实现方式,在第五种可能的实现方式中,所述第一设备和所述第二设备预定密钥交换算法包括:
所述第一设备和所述第二设备上预先配置有所述密钥交换算法所使用的参数;或者,
通过所述配置设备将所述密钥交换算法所使用的参数发送给所述第一设备和所述第二设备。
结合第一方面、第一方面的第一种可能的实现方式、第一方面的第二种可能的实现方式、第一方面的第三种可能的实现方式、第一方面的第四种可能的实现方式或者第一方面的第五种可能的实现方式,在第六种可能的实现方式中,所述第一共享密钥用于所述第一设备和所述第二设备之间的安全连接包括:
所述第一设备在得到第一共享密钥后,生成信任状,并利用第一共享密钥或第一共享密钥的衍生密钥对信任状进行加密后,将加密结果发送给所述第二设备;以便所述第二设备利用得到的第一共享密钥或者第一共享密钥的衍生密钥对加密结果进行解密得到所述信任状,所述信任状用于所述第一设备和所述第二设备之间的安全连接;或者,
所述第一设备利用得到的第一共享密钥或者第一共享密钥的衍生密钥对所述第二设备发送的信任状的加密结果进行解密得到所述信任状,所述信任状的加密结果为所述第二设备在得到第一共享密钥后,生成信任状,并利用第一共享密钥或第一共享密钥的衍生密钥对所述信任状进行加密后得到,所述信任状用于所述第一设备和所述第二设备之间的安全连接。
结合第一方面的第六种可能的实现方式,在第七种可能的实现方式中,若所述第一设备是注册器Registrar、中心节点或者组长设备GO,则由所述第一设备生成所述信任状并将所述信任状的加密结果发送给所述第二设备;
若所述第二设备是Registrar、中心节点或GO,则由所述第二设备生成所述信任状并将所述信任状的加密结果发送给所述第一设备。
结合第一方面、第一方面的第一种可能的实现方式、第一方面的第二种可能的实现方式、第一方面的第三种可能的实现方式、第一方面的第四种可能的实现方式、第一方面的第五种可能的实现方式、第一方面的第六种可能的实现方式或者第一方面的第七种可能的实现方式,在第八种可能的实现方式中,所述第一设备接收配置设备在获取到第二设备的公钥后发送的第二设备的公钥具体为:
所述第一设备接收配置设备在获取到所述第二设备的公钥和所述第一设备的公钥后发送的加密结果,所述加密结果为所述配置设备利用所述第一设备的公钥加密的所述第二设备的公钥;
该方法还包括:所述第一设备对所述加密结果进行解密,得到所述第二设备的公钥。
结合第一方面、第一方面的第一种可能的实现方式、第一方面的第二种可能的实现方式、第一方面的第三种可能的实现方式、第一方面的第四种可能的实现方式、第一方面的第五种可能的实现方式、第一方面的第六种可能的实现方式或者第一方面的第七种可能的实现方式,在第九种可能的实现方式中,所述第一设备接收配置设备在获取到第二设备的公钥后发送的第二设备的公钥具体为:
所述第一设备与所述配置设备建立安全连接以生成第二共享密钥;
所述第一设备接收所述配置设备在获取到第二设备的公钥后发送的加密结果,所述加密结果为所述配置设备利用所述第二共享密钥加密的所述第二设备的公钥;
该方法还包括:
所述第一设备利用所述第二共享密钥对接收到的所述加密结果进行解密后,得到所述第二设备的公钥。
结合第一方面的第九种可能的实现方式,在第十种可能的实现方式中,所述第一设备与所述配置设备建立安全连接以生成第二共享密钥包括:
所述第一设备与所述配置设备通过无线保真安全建立WPS交互方式共享信任状,将所述信任状作为所述第二共享密钥;或者,
所述第一设备接收所述配置设备发送的所述配置设备的公钥,所述第一设备利用所述配置设备的公钥和自身的私钥按照预先约定的密钥交换算法生成所述第二共享密钥,以便所述配置设备获取到所述第一设备的公钥后,利用所述第一设备的公钥和自身的私钥按照预先约定的密钥交换算法生成所述第二共享密钥。
结合第一方面的第四种可能的实现方式,在第十一种可能的实现方式中,在所述第一设备得到所述第二设备的公钥之后,所述方法还包括:所述第一设备生成新的公钥和新的私钥;
所述第一设备发送给所述第二设备的第一设备的公钥为所述新的公钥;所述第二设备在生成所述第一共享密钥时利用的第一设备的公钥为所述新的公钥;所述第一设备在生成所述第一共享密钥时利用的自身的私钥为所述新的私钥。
结合第一方面、第一方面的第一种至第十一种可能的实现方式中的任一种,在第十二种可能的实现方式中,所述第一设备是被注册方enrollee,所述第二设备是registrar,或者所述第一设备是客户端client,所述第二设备是GO,或者所述第一设备是无线终端,所述第二设备是接入点,或者所述第一设备是中心节点,所述第二设备是传感器节点。
结合第一方面、第一方面的第一种至第十二种可能的实现方式中的任一种,在第十三种可能的实现方式中,该方法还包括:所述第一设备根据第二设备的信道信息快速发现所述第二设备,以执行所述将用于得到第一共享密钥的信息发送给第二设备的步骤,所述第二设备的信道信息为所述配置设备从所述第二设备获取后发送给所述第一设备的。
结合第一方面、第一方面的第一种至第十三种可能的实现方式中的任一种,在第十四种可能的实现方式中,所述配置设备通过扫描二维码、通用串行总线USB或者近场通信的方式从所述第一设备或者第二设备获取信息。
结合第一方面、第一方面的第一种至第十四种可能的实现方式中的任一种,在第十五种可能的实现方式中,该方法还包括:所述第一设备利用所述第二设备的公钥生成验证值,将所述验证值发送给所述第二设备;
以便所述第二设备在生成所述第一共享密钥之前,利用自身的公钥对接收到的验证值进行验证,在验证通过的情况下,执行生成所述第一共享密钥的步骤。
第二方面,本发明实施例提供了一种密钥配置方法,所述密钥配置方法包括:
所述配置设备获取第二设备的公钥,将所述第二设备的公钥发送给第一设备;
以便所述第一设备利用所述第二设备的公钥将用于得到第一共享密钥的信息发送给所述第二设备;或者以便所述第一设备利用所述第二设备的公钥生成第一共享密钥,将用于得到第一共享密钥的信息发送给所述第二设备;
以便所述第二设备利用自身的私钥以及所述用于得到第一共享密钥的信息生成所述第一共享密钥,所述第一共享密钥用于所述第一设备和所述第二设备之间的安全连接。
结合第二方面,在第一种可能的实现方式中,以便所述第一设备利用第二设备的公钥将用于得到第一共享密钥的信息发送给第二设备包括:以便所述第一设备生成密码,将所述密码作为第一共享密钥,利用所述第二设备的公钥将所述密码进行加密得到加密结果,将所述加密结果发送给所述第二设备;
以便所述第二设备利用自身的私钥以及用于得到第一共享密钥的信息生成所述第一共享密钥包括:以便所述第二设备利用自身的私钥对所述加密结果进行解密得到所述密码,将所述密码作为第一共享密钥;或者,
以便所述第一设备生成第一共享密钥,利用第二设备的公钥将用于得到第一共享密钥的信息发送给第二设备包括:以便所述第一设备生成密码,利用所述第二设备的公钥将所述密码进行加密得到加密结果,将所述加密结果发送给所述第二设备,利用密钥衍生算法对所述密码生成衍生密钥,将该衍生密钥作为第一共享密钥;
以便所述第二设备利用自身的私钥以及用于得到第一共享密钥的信息生成所述第一共享密钥包括:以便所述第二设备利用自身的私钥对所述加密结果进行解密得到所述密码,利用所述密钥衍生算法对所述密码生成衍生密钥,将该衍生密钥作为所述第一共享密钥。
结合第二方面,在第二种可能的实现方式中,以便所述第一设备生成第一共享密钥,利用第二设备的公钥将用于得到第一共享密钥的信息发送给第二设备包括:以便所述第一设备生成随机值,利用第一设备与第二设备约定的信息和该随机值生成第一共享密钥,利用第二设备的公钥对该随机值进行加密后,将加密结果发送给第二设备;
以便所述第二设备利用自身的私钥以及用于得到第一共享密钥的信息生成所述第一共享密钥包括:以便所述第二设备利用自身的私钥对所述加密结果进行解密得到所述随机值,利用所述第一设备与第二设备约定的信息和所述随机值生成所述第一共享密钥。
结合第二方面,在第三种可能的实现方式中,以便所述第一设备利用所述第二设备的公钥将用于得到第一共享密钥的信息发送给所述第二设备包括:以便所述第一设备利用第二设备的公钥将第一设备的公钥进行加密后,将加密结果发送给第二设备;
以便所述第二设备利用自身的私钥以及所述用于得到第一共享密钥的信息生成所述第一共享密钥包括:以便所述第二设备利用自身的私钥对所述加密结果进行解密后,得到所述第一设备的公钥,并且生成密码,将该密码进行加密后,将加密结果发送给所述第一设备;
以便所述第一设备利用自身的私钥对接收到的加密结果进行解密后,将得到的密码作为第一共享密钥。
结合第二方面,在第四种可能的实现方式中,所述方法还包括:所述第一设备和所述第二设备预定密钥交换算法;
以便所述第一设备利用第二设备的公钥生成第一共享密钥,将用于得到第一共享密钥的信息发送给第二设备包括:以便所述第一设备利用第二设备的公钥和自身的私钥按照所述密钥交换算法生成第一共享密钥,并将第一设备的公钥发送给所述第二设备;
以便所述第二设备利用自身的私钥以及用于得到第一共享密钥的信息生成所述第一共享密钥包括:以便所述第二设备利用自身的私钥以及所述第一设备的公钥按照所述密钥交换算法生成第一共享密钥。
结合第二方面的第四种可能的实现方式,在第五种可能的实现方式中,所述第一设备和所述第二设备预定共享密钥交换算法包括:
所述第一设备和所述第二设备上预先配置有所述密钥交换算法所使用的参数;或者,
所述配置设备将所述密钥交换算法所使用的参数发送给所述第一设备和所述第二设备。
结合第二方面、第二方面的第一种至第五种可能的实现方式中的任一种,在第六种可能的实现方式中,所述配置设备获取第一设备的公钥;
所述配置设备将所述第二设备的公钥发送给第一设备包括:所述配置设备利用所述第一设备的公钥加密所述第二设备的公钥,将加密结果发送给所述第一设备;以便所述第一设备对所述加密结果进行解密,得到所述第二设备的公钥。
结合第二方面、第二方面的第一种至第五种可能的实现方式中的任一种,在第七种可能的实现方式中,该方法还包括:所述配置设备与所述第一设备建立安全连接以生成第二共享密钥;
将所述第二设备的公钥发送给第一设备包括:所述配置设备利用所述第二共享密钥将所述第二设备的公钥进行加密后,将加密结果发送给所述第一设备;以便所述第一设备利用所述第二共享密钥对接收到的加密结果进行解密后,得到所述第二设备的公钥。
结合第二方面的第七种可能的实现方式,在第八种可能的实现方式中,所述配置设备与所述第一设备建立安全连接以生成第二共享密钥包括:
所述配置设备与所述第一设备通过WPS交互方式共享信任状,将所述信任状作为所述第二共享密钥;或者,
所述配置设备将自身的公钥发送给所述第一设备,所述配置设备和所述第一设备分别利用对方的公钥和自身的私钥按照预先约定的密钥交换算法生成所述第二共享密钥。
结合第二方面、第二方面的第一种至第八种可能的实现方式中的任一种,在第九种可能的实现方式中,所述第一设备是被注册方enrollee,所述第二设备是registrar,或者所述第一设备是客户端client,所述第二设备是GO,或者所述第一设备是无线终端,所述第二设备是接入点,或者所述第一设备是中心节点,所述第二设备是传感器节点。
结合第二方面、第二方面的第一种至第九种可能的实现方式中的任一种,在第十种可能的实现方式中,该方法还包括:所述配置设备获取第二设备的信道信息并发送给所述第一设备;以便所述第一设备根据第二设备的信道信息快速发现所述第二设备,以执行所述将用于得到第一共享密钥的信息发送给第二设备的步骤。
结合第二方面、第二方面的第一种至第十种可能的实现方式中的任一种,在第十一种可能的实现方式中,所述配置设备通过扫描二维码、通用串行总线USB或者近场通信的方式从所述第一设备或者第二设备获取信息。
第三方面,本发明实施例提供了一种密钥配置方法,该方法包括:
第二设备向配置设备提供第二设备的公钥,以便所述配置设备将所述第二设备的公钥发送给第一设备;
所述第二设备接收所述第一设备利用所述第二设备的公钥发送来的用于得到第一共享密钥的信息;或者接收所述第一设备利用所述第二设备的公钥生成第一共享密钥后,发送来的用于得到第一共享密钥的信息;
所述第二设备利用自身的私钥以及所述用于得到第一共享密钥的信息生成所述第一共享密钥,所述第一共享密钥用于所述第一设备和所述第二设备之间的安全连接。
结合第三方面,在第一种可能的实现方式中,所述第二设备接收所述第一设备利用第二设备的公钥发送来的用于得到第一共享密钥的信息包括:所述第二设备接收所述第一设备发送的加密结果,所述加密结果是所述第一设备生成密码,将所述密码作为第一共享密钥,利用所述第二设备的公钥将所述密码进行加密得到的;
所述第二设备利用自身的私钥以及用于得到第一共享密钥的信息生成所述第一共享密钥包括:所述第二设备利用自身的私钥对所述加密结果进行解密得到所述密码,将所述密码作为第一共享密钥;或者,
所述第二设备接收所述第一设备利用第二设备的公钥发送来的用于得到第一共享密钥的信息包括:所述第二设备接收所述第一设备发送的加密结果,所述加密结果是所述第一设备生成密码后,利用所述第二设备的公钥将所述密码进行加密得到的;
所述第二设备利用自身的私钥以及用于得到第一共享密钥的信息生成所述第一共享密钥包括:所述第二设备利用自身的私钥对所述加密结果进行解密得到所述密码,利用所述密钥衍生算法对所述密码生成衍生密钥,将该衍生密钥作为所述第一共享密钥。
结合第三方面,在第二种可能的实现方式中,所述第二设备接收所述第一设备利用第二设备的公钥发送来的用于得到第一共享密钥的信息包括:所述第二设备接收所述第一设备发送的加密结果,所述加密结果是所述第一设备生成随机值,利用第二设备的公钥对该随机值进行加密后得到的,所述第一设备利用第一设备与第二设备约定的信息和该随机值生成第一共享密钥;
所述第二设备利用自身的私钥以及用于得到第一共享密钥的信息生成所述第一共享密钥包括:所述第二设备利用自身的私钥对所述加密结果进行解密得到所述随机值,利用所述第一设备与第二设备约定的信息和所述随机值生成所述第一共享密钥。
结合第三方面,在第三种可能的实现方式中,所述第二设备接收所述第一设备利用所述第二设备的公钥发送来的用于得到第一共享密钥的信息包括:所述第二设备接收所述第一设备利用第二设备的公钥将第一设备的公钥进行加密后得到的加密结果;
所述第二设备利用自身的私钥以及所述用于得到第一共享密钥的信息生成所述第一共享密钥包括:所述第二设备利用自身的私钥对所述加密结果进行解密后,得到所述第一设备的公钥,并生成密码,将该密码作为所述第一共享密钥,利用所述第一设备的公钥将该密码进行加密后,将加密结果发送给第一设备;
以便所述第一设备利用自身的私钥对接收到的加密结果进行解密后,将得到的密码作为所述第一共享密钥。
结合第三方面,在第四种可能的实现方式中,所述方法还包括:所述第二设备和所述第一设备预定密钥交换算法;
接收所述第一设备利用所述第二设备的公钥生成第一共享密钥后,发送来的用于得到第一共享密钥的信息包括:所述第二设备接收所述第一设备利用第二设备的公钥和自身的私钥按照所述密钥交换算法生成第一共享密钥后,发送来的第一设备的公钥;
所述第二设备利用自身的私钥以及用于得到第一共享密钥的信息生成所述第一共享密钥包括:所述第二设备利用自身的私钥以及所述第一设备的公钥按照所述密钥交换算法生成第一共享密钥。
结合第三方面的第四种可能的实现方式,在第五种可能的实现方式中,所述第二设备和所述第一设备预定密钥交换算法包括:
所述第二设备和所述第一设备上预先配置有所述密钥交换算法所使用的参数;或者,
所述第二设备和所述第一设备接收所述配置设备发送的所述密钥交换算法所使用的参数。
结合第三方面,第三方面的第一种至第五种可能的实现方式中的任一种,在第六种可能的实现方式中,所述第一共享密钥用于所述第一设备和所述第二设备之间的安全连接包括:
所述第二设备接收第一设备发送的加密结果,该加密结果是所述第一设备在得到第一共享密钥后,生成信任状,并利用第一共享密钥或第一共享密钥的衍生密钥对信任状进行加密后得到的;所述第二设备利用得到的第一共享密钥或者第一共享密钥的衍生密钥对加密结果进行解密得到所述信任状,所述信任状用于所述第一设备和所述第二设备之间的安全连接;或者,
所述第二设备在得到第一共享密钥后,生成信任状,并利用第一共享密钥或第一共享密钥的衍生密钥对信任状进行加密后,将加密结果发送给所述第一设备;以便所述第一设备利用得到的第一共享密钥或者第一共享密钥的衍生密钥对加密结果进行解密得到所述信任状,所述信任状用于所述第一设备和所述第二设备之间的安全连接。
结合第三方面的第六种可能的实现方式,在第七种可能的实现方式中,若所述第一设备是注册器Registrar、中心节点或者组长设备GO,则由所述第一设备生成所述信任状并将所述信任状的加密结果发送给所述第二设备;
若所述第二设备是Registrar、中心节点或GO,则由所述第二设备生成所述信任状并将所述信任状的加密结果发送给所述第一设备。
结合第三方面,第三方面的第一种至第七种可能的实现方式中的任一种,在第八种可能的实现方式中,该方法还包括:
所述第二设备将自身的信道信息提供给所述配置设备,以便所述配置设备将第二设备的信道信息发送给所述第一设备;以便所述第一设备根据第二设备的信道信息快速发现所述第二设备,以执行所述将用于得到第一共享密钥的信息发送给第二设备的步骤。
结合第三方面,第三方面的第一种至第八种可能的实现方式中的任一种,在第九种可能的实现方式中,所述第二设备或者所述第一设备通过二维码、USB或近场通信的方式供所述配置设备获取信息。
结合第三方面,第三方面的第一种至第九种可能的实现方式中的任一种,在第十种可能的实现方式中,该方法还包括:
所述第二设备接收所述第一设备利用第二设备的公钥生成的验证值,所述第二设备利用自身的公钥对接收到的验证值进行验证,在验证通过的情况下,执行生成所述第一共享密钥的步骤。
第四方面,该密钥配置装置包括:
配置接收单元,用于接收配置设备在获取到第二设备的公钥后发送的第二设备的公钥;
密钥处理单元,用于利用所述第二设备的公钥将用于得到第一共享密钥的信息发送给所述第二设备;或者利用所述第二设备的公钥生成第一共享密钥,将用于得到所述第一共享密钥的信息发送给所述第二设备;以便所述第二设备利用自身的私钥以及所述用于得到第一共享密钥的信息生成所述第一共享密钥,所述第一共享密钥用于所述第一设备和所述第二设备之间的安全连接。
结合第四方面,在第一种可能的实现方式中,所述密钥处理单元,具体用于生成密码,将所述密码作为第一共享密钥,利用所述第二设备的公钥将所述密码进行加密得到加密结果,将所述加密结果发送给所述第二设备,以便所述第二设备利用自身的私钥对所述加密结果进行解密得到所述密码,将所述密码作为第一共享密钥;或者,
所述密钥处理单元,具体用于生成密码,利用所述第二设备的公钥将所述密码进行加密得到加密结果,将所述加密结果发送给所述第二设备,利用密钥衍生算法对所述密码生成衍生密钥,将该衍生密钥作为第一共享密钥,以便所述第二设备利用自身的私钥对所述加密结果进行解密得到所述密码,利用所述密钥衍生算法对所述密码生成衍生密钥,将该衍生密钥作为所述第一共享密钥。
结合第四方面,在第二种可能的实现方式中,所述密钥处理单元,具体用于生成随机值,利用第一设备与第二设备约定的信息和该随机值生成第一共享密钥,利用第二设备的公钥对该随机值进行加密后,将加密结果发送给第二设备,以便所述第二设备利用自身的私钥对所述加密结果进行解密得到所述随机值,利用所述第一设备与第二设备约定的信息和所述随机值生成所述第一共享密钥。
结合第四方面,在第三种可能的实现方式中,所述密钥处理单元,具体用于利用第二设备的公钥将第一设备的公钥进行加密后,将加密结果发送给第二设备;接收所述第二设备发送的加密结果,该加密结果是所述第二设备利用自身的私钥对接收到的加密结果进行解密后,得到所述第一设备的公钥,并且生成密码,将该密码作为所述第一共享密钥,利用所述第一设备的公钥将该密码进行加密后得到的;利用自身的私钥对接收到的加密结果进行解密后,将得到的密码作为所述第一共享密钥。
结合第四方面,在第四种可能的实现方式中,所述密钥处理单元,具体用于利用第二设备的公钥和自身的私钥按照所述第一设备和所述第二设备预定的密钥交换算法生成第一共享密钥,并将第一设备的公钥发送给所述第二设备,以便所述第二设备利用自身的私钥以及所述第一设备的公钥按照所述密钥交换算法生成第一共享密钥。
结合第四方面的第四种可能的实现方式,在第五种可能的实现方式中,所述密钥处理单元预先配置有所述密钥交换算法所使用的参数;
或者,所述配置接收单元,还用于接收所述配置设备发送的所述密钥交换算法所使用的参数,并提供给所述密钥处理单元。
结合第四方面、第四方面的第一种至第五种可能的实现方式中的任一种,在第六种可能的实现方式中,该密钥配置装置还包括:
安全连接单元,用于在所述密钥处理单元得到第一共享密钥后,生成信任状,并利用第一共享密钥或第一共享密钥的衍生密钥对信任状进行加密后,将加密结果发送给所述第二设备;以便所述第二设备利用得到的第一共享密钥或者第一共享密钥的衍生密钥对加密结果进行解密得到所述信任状,所述信任状用于所述第一设备和所述第二设备之间的安全连接;或者,用于利用得到的第一共享密钥或者第一共享密钥的衍生密钥对所述第二设备发送的信任状的加密结果进行解密得到所述信任状,所述信任状的加密结果为所述第二设备在得到第一共享密钥后,生成信任状,并利用第一共享密钥或第一共享密钥的衍生密钥对所述信任状进行加密后得到,所述信任状用于所述第一设备和所述第二设备之间的安全连接。
结合第四方面、第四方面的第一种至第六种可能的实现方式中的任一种,在第七种可能的实现方式中,所述配置接收单元,具体用于接收配置设备在获取到所述第二设备的公钥和所述第一设备的公钥后发送的加密结果,所述加密结果为所述配置设备利用所述第一设备的公钥加密的所述第二设备的公钥;
所述密钥处理单元,还用于对所述加密结果进行解密,得到所述第二设备的公钥。
结合第四方面、第四方面的第一种至第六种可能的实现方式中的任一种,在第八种可能的实现方式中,所述配置接收单元,具体用于与所述配置设备建立安全连接以生成第二共享密钥;接收所述配置设备在获取到第二设备的公钥后发送的加密结果,所述加密结果为所述配置设备利用所述第二共享密钥加密的所述第二设备的公钥;
所述密钥处理单元,还用于利用所述第二共享密钥对接收到的所述加密结果进行解密后,得到所述第二设备的公钥。
结合第四方面的第八种可能的实现方式,在第九种可能的实现方式中,所述配置接收单元在与所述配置设备建立安全连接以生成第二共享密钥时,具体与所述配置设备通过无线保真安全建立WPS交互方式共享信任状,将所述信任状作为所述第二共享密钥;或者,具体接收所述配置设备发送的所述配置设备的公钥,所述第一设备利用所述配置设备的公钥和自身的私钥按照预先约定的密钥交换算法生成所述第二共享密钥。
结合第四方面的第四种可能的实现方式,在第十种可能的实现方式中,所述密钥处理单元在得到所述第二设备的公钥之后,还用于生成新的公钥和新的私钥;
所述第一设备发送给所述第二设备的第一设备的公钥为所述新的公钥;所述第二设备在生成所述第一共享密钥时利用的第一设备的公钥为所述新的公钥;所述第一设备在生成所述第一共享密钥时利用的自身的私钥为所述新的私钥。
结合第四方面、第四方面的第一种至第十种可能的实现方式中的任一种,在第十一种可能的实现方式中,所述第一设备是被注册方enrollee,所述第二设备是registrar,或者所述第一设备是客户端client,所述第二设备是GO,或者所述第一设备是无线终端,所述第二设备是接入点,或者所述第一设备是中心节点,所述第二设备是传感器节点。
结合第四方面、第四方面的第一种至第十一种可能的实现方式中的任一种,在第十二种可能的实现方式中,所述配置接收单元,还用于接收所述配置设备从所述第二设备获取后发送来的第二设备的信道信息;
所述密钥处理单元根据第二设备的信道信息快速发现所述第二设备,以执行所述将用于得到第一共享密钥的信息发送给第二设备的操作。
结合第四方面、第四方面的第一种至第十二种可能的实现方式中的任一种,在第十三种可能的实现方式中,所述密钥处理单元,还用于利用所述第二设备的公钥生成验证值,将所述验证值发送给所述第二设备;以便所述第二设备在生成所述第一共享密钥之前,利用自身的公钥对接收到的验证值进行验证,在验证通过的情况下,执行生成所述第一共享密钥的操作。
第五方面,该密钥配置装置包括:
信息获取单元,用于获取第二设备的公钥;
信息发送单元,用于将所述第二设备的公钥发送给第一设备;
以便所述第一设备利用所述第二设备的公钥将用于得到第一共享密钥的信息发送给所述第二设备;或者以便所述第一设备利用所述第二设备的公钥生成第一共享密钥,将用于得到第一共享密钥的信息发送给所述第二设备;
以便所述第二设备利用自身的私钥以及所述用于得到第一共享密钥的信息生成所述第一共享密钥,所述第一共享密钥用于所述第一设备和所述第二设备之间的安全连接。
结合第五方面,在第一种可能的实现方式中,所述信息发送单元,还用于将密钥交换算法所使用的参数发送给所述第一设备和所述第二设备,所述密钥交换算法用于所述第一设备和所述第二设备利用自身的私钥和对方的公钥按照所述密钥交换算法生成第一共享密钥。
结合第五方面或者第五方面的第一种可能的实现方式,在第二种可能的实现方式中,所述信息获取单元,还用于获取第一设备的公钥;
所述信息发送单元,具体用于利用所述第一设备的公钥加密所述第二设备的公钥,将加密结果发送给所述第一设备,以便所述第一设备对所述加密结果进行解密,得到所述第二设备的公钥。
结合第五方面或者第五方面的第一种可能的实现方式,在第三种可能的实现方式中,所述信息发送单元,还用于与所述第一设备建立安全连接以生成第二共享密钥;在将所述第二设备的公钥发送给第一设备时,具体利用所述第二共享密钥将所述第二设备的公钥进行加密后,将加密结果发送给所述第一设备,以便所述第一设备利用所述第二共享密钥对接收到的加密结果进行解密后,得到所述第二设备的公钥。
结合第五方面的第三种可能的实现方式,在第四种可能的实现方式中,所述信息发送单元在与所述第一设备建立安全连接以生成第二共享密钥时,具体用于与所述第一设备通过WPS交互方式共享信任状,将所述信任状作为所述第二共享密钥;或者,将自身的公钥发送给所述第一设备,利用第一设备的公钥和自身的私钥按照预先约定的密钥交换算法生成所述第二共享密钥。
结合第五方面、第五方面的第一种至第四种可能的实现方式中的任一种,在第五种可能的实现方式中,所述信息获取单元,还用于获取第二设备的信道信息;
所述信息发送单元,还用于将所述第二设备的信道信息发送给所述第一设备,以便所述第一设备根据第二设备的信道信息快速发现所述第二设备,以执行所述将用于得到第一共享密钥的信息发送给第二设备的操作。
结合第五方面、第五方面的第一种至第五种可能的实现方式中的任一种,在第六种可能的实现方式中,所述信息获取单元,具体用于通过扫描二维码、通用串行总线USB或者近场通信的方式从所述第一设备或者第二设备获取信息。
第六方面,该密钥配置装置包括:
信息提供单元,用于向配置设备提供第二设备的公钥,以便所述配置设备将所述第二设备的公钥发送给第一设备;
信息接收单元,用于接收所述第一设备利用所述第二设备的公钥发送来的用于得到第一共享密钥的信息;或者接收所述第一设备利用所述第二设备的公钥生成第一共享密钥后,发送来的用于得到第一共享密钥的信息;
密钥处理单元,用于利用自身的私钥以及所述用于得到第一共享密钥的信息生成所述第一共享密钥,所述第一共享密钥用于所述第一设备和所述第二设备之间的安全连接。
结合第六方面,在第一种可能的实现方式中,所述信息接收单元,具体用于接收所述第一设备发送的加密结果,所述加密结果是所述第一设备生成密码,将所述密码作为第一共享密钥,利用所述第二设备的公钥将所述密码进行加密得到的;
所述密钥处理单元,具体用于利用自身的私钥对所述加密结果进行解密得到所述密码,将所述密码作为第一共享密钥;或者,
所述信息接收单元,具体用于接收所述第一设备发送的加密结果,所述加密结果是所述第一设备生成密码后,利用所述第二设备的公钥将所述密码进行加密得到的;
所述密钥处理单元,具体用于利用自身的私钥对所述加密结果进行解密得到所述密码,利用所述密钥衍生算法对所述密码生成衍生密钥,将该衍生密钥作为所述第一共享密钥。
结合第六方面,在第二种可能的实现方式中,所述信息接收单元,具体用于接收所述第一设备发送的加密结果,所述加密结果是所述第一设备生成随机值,利用第二设备的公钥对该随机值进行加密后得到的,所述第一设备利用第一设备与第二设备约定的信息和该随机值生成第一共享密钥;
所述密钥处理单元,具体用于利用自身的私钥对所述加密结果进行解密得到所述随机值,利用所述第一设备与第二设备约定的信息和所述随机值生成所述第一共享密钥。
结合第六方面,在第三种可能的实现方式中,所述信息接收单元,具体用于接收所述第一设备利用第二设备的公钥将第一设备的公钥进行加密后得到的加密结果;
所述密钥处理单元,具体用于利用自身的私钥对所述加密结果进行解密后,得到所述第一设备的公钥,并生成密码,将该密码作为所述第一共享密钥,利用所述第一设备的公钥将该密码进行加密后,将加密结果发送给第一设备,以便所述第一设备利用自身的私钥对接收到的加密结果进行解密后,将得到的密码作为所述第一共享密钥。
结合第六方面,在第四种可能的实现方式中,所述信息接收单元,具体用于接收所述第一设备利用第二设备的公钥和自身的私钥按照密钥交换算法生成第一共享密钥后,发送来的第一设备的公钥;所述密钥交换算法是所述第一设备和所述第二设备预定的;
所述密钥处理单元,具体用于利用自身的私钥以及所述第一设备的公钥按照所述密钥交换算法生成第一共享密钥。
结合第六方面的第四种可能的实现方式,在第五种可能的实现方式中,所述密钥处理单元预先配置有所述密钥交换算法所使用的参数;或者,
所述信息接收单元,还用于接收所述配置设备发送的所述密钥交换算法所使用的参数,并提供给所述密钥处理单元。
结合第六方面、第六方面的第一种至第五种可能的实现方式中的任一种,在第六种可能的实现方式中,该密钥配置装置还包括:
安全连接单元,用于接收第一设备发送的加密结果,该加密结果是所述第一设备在得到第一共享密钥后,生成信任状,并利用第一共享密钥或第一共享密钥的衍生密钥对信任状进行加密后得到的;利用得到的第一共享密钥或者第一共享密钥的衍生密钥对加密结果进行解密得到所述信任状,所述信任状用于所述第一设备和所述第二设备之间的安全连接;或者,
用于在所述密钥处理单元得到第一共享密钥后,生成信任状,并利用第一共享密钥或第一共享密钥的衍生密钥对信任状进行加密后,将加密结果发送给所述第一设备;以便所述第一设备利用得到的第一共享密钥或者第一共享密钥的衍生密钥对加密结果进行解密得到所述信任状,所述信任状用于所述第一设备和所述第二设备之间的安全连接。
结合第六方面、第六方面的第一种至第六种可能的实现方式中的任一种,在第七种可能的实现方式中,所述信息提供单元,还用于将第二设备的信道信息提供给所述配置设备,以便所述配置设备将第二设备的信道信息发送给所述第一设备;以便所述第一设备根据第二设备的信道信息快速发现所述第二设备,以执行所述将用于得到第一共享密钥的信息发送给第二设备的操作。
结合第六方面、第六方面的第一种至第七种可能的实现方式中的任一种,在第八种可能的实现方式中,所述信息提供单元,具体用于通过二维码、USB或近场通信的方式向所述配置设备提供信息。
结合第六方面、第六方面的第一种至第七种可能的实现方式中的任一种,在第九种可能的实现方式中,所述信息接收单元,还用于接收所述第一设备利用第二设备的公钥生成的验证值;
所述密钥处理单元,还用于利用自身的公钥对接收到的验证值进行验证,在验证通过的情况下,执行生成所述第一共享密钥的操作。
第七方面,该密钥配置系统包括:如第四方面所述的密钥配置装置、如第五方面所述的密钥配置装置以及如第六方面所述的密钥配置装置;或者,
如第四方面的第一种可能的实现方式所述的密钥配置装置、如第五方面所述的密钥配置装置以及如第六方面的第一种可能的实现方式所述的密钥配置装置;或者,
如第四方面的第二种可能的实现方式所述的密钥配置装置、如第五方面所述的密钥配置装置以及第六方面的第二种可能的实现方式所述的密钥配置装置;或者,
如第四方面的第三种可能的实现方式所述的密钥配置装置、如第五方面所述的密钥配置装置以及如第六方面的第三种可能的实现方式所述的密钥配置装置;或者,
如第四方面的第四种可能的实现方式所述的密钥配置装置、如第五方面所述的密钥配置装置以及如第六方面的第四种可能的实现方式所述的密钥配置装置;或者,
如第四方面的第五种可能的实现方式所述的密钥配置装置、如第五方面的第一种可能的实现方式所述的密钥配置装置以及如第六方面的第五种可能的实现方式所述的密钥配置装置;或者,
如第四方面的第六种可能的实现方式所述的密钥配置装置、如第五方面所述的密钥配置装置以及如第六方面的第六种可能的实现方式所述的密钥配置装置;或者,
如第四方面的第七种可能的实现方式所述的密钥配置装置、如第五方面的第二种可能的实现方式所述的密钥配置装置以及如第六方面、第六方面的第一种至第六种可能的实现方式中的任一种所述的密钥配置装置;或者,
如第四方面的第八种可能的实现方式所述的密钥配置装置、如第五方面的第三种可能的实现方式所述的密钥配置装置以及如第六方面、第六方面的第一种至第六种可能的实现方式中的任一种所述的密钥配置装置;或者,
如第四方面的第九种可能的实现方式所述的密钥配置装置、如第五方面的第四种可能的实现方式所述的密钥配置装置以及如第六方面、第六方面的第一种至第六种可能的实现方式中的任一种所述的密钥配置装置;或者,
如第四方面的第十种可能的实现方式所述的密钥配置装置、如第五方面所述的密钥配置装置以及如第六方面的第四种可能的实现方式所述的密钥配置装置;或者,
如第四方面的第十一种可能的实现方式所述的密钥配置装置、如第五方面、第五方面的第一种至第四种可能的实现方式中的任一种所述的密钥配置装置以及如第六方面、第六方面的第一种至第六种可能的实现方式中的任一种所述的密钥配置装置;或者,
如第四方面的第十二种可能的实现方式所述的密钥配置装置、如第五方面的第五种可能的实现方式所述的密钥配置装置以及如第六方面的第七种可能的实现方式所述的密钥配置装置;或者,
如第四方面的第十三种可能的实现方式所述的密钥配置装置、如第五方面、第五方面的第一种至第五种可能的实现方式中的任一种所述的密钥配置装置以及如第六方面的第九种可能的实现方式所述的密钥配置装置;或者,
如第四方面、第四方面的第一种至第十三种可能的实现方式中的任一种所述的密钥配置装置、如第五方面的第六种可能的实现方式所述的密钥配置装置以及如第六方面的第八种可能的实现方式所述的密钥配置装置。
由以上技术方案可以看出,第三方的配置设备在本发明仅用于进行第一设备和第二设备之间公钥和设备信息的传递,而用于第一设备和第二设备之间安全连接的第一共享密钥是在第一设备和第二设备分别生成的,并且第一设备和第二设备之间也不直接进行第一共享密钥的传递,而是将用于得到第一共享密钥的信息传递给第二设备,必须由第二设备的私钥才能生成第一共享密钥。因此,即便攻击者窃听到配置设备、第一设备和第二设备之间传递的公钥也无法得到第一共享密钥,从而提高了第一设备和第二设备之间交互的安全性。
【附图说明】
图1为现有技术中基于第三方的配置设备的密钥配置方法流程示意图;
图2为本发明实施例一提供的密钥配置方法的流程示意图;
图3为本发明实施例二提供的密钥配置方法的流程示意图;
图4为本发明实施例三提供的密钥配置方法的流程示意图;
图5为本发明实施例四提供的密钥配置方法的流程示意图;
图6为本发明实施例五提供的密钥配置方法的流程示意图;
图7为本发明实施例六提供的密钥配置方法的流程示意图;
图8为本发明实施例提供的系统组成示意图;
图9为本发明实施例提供的设置于第一设备中的密钥配置装置的结构示意图;
图10为本发明实施例提供的设置于配置设备中的密钥配置装置的结构示意图;
图11为本发明实施例提供的设置于第二设备中的密钥配置装置的结构示意图;
图12为本发明实施例提供的配置设备的硬件结构示意图;
图13为本发明实施例提供的第一设备的硬件结构示意图;
图14为本发明实施例提供的第二设备的硬件结构示意图。
【具体实施方式】
为了使本发明的目的、技术方案和优点更加清楚,下面结合附图和具体实施例对本发明进行详细描述。
本发明的核心思想在于:第三方的配置设备获取第二设备的公钥;将第二设备的公钥发送给第一设备;第一设备生成共享密钥,并利用第二设备的公钥将用于得到第一共享密钥的信息发送给第二设备,或者第一设备利用第二设备的公钥生成第一共享密钥,并将用于得到第一共享密钥的信息发送给第二设备;按照第二设备的设备信息将第一设备的公钥发送给第二设备;第二设备利用自身的私钥和用于得到第一共享密钥的信息生成共享密钥,该共享密钥用于第一设备和第二设备之间的安全连接。
在上述核心思想之下,本发明可以采用密钥交换的方式进行共享密钥的配置,也可以不采用密钥交换的方式进行共享密钥的配置。下面分别通过几个具体的实施例对本发明提供的方法进行详细描述。
实施例一、
在本实施例中,采用的是密钥交换的方式进行共享密钥的配置,第一设备和第二设备预定密钥交换算法,密钥交换算法是后续第一设备和第二设备在生成共享密钥时所采用的算法,可以采用但不限于:D-H算法、RSA算法或EIGamal算法等,根据不同的密钥交换算法,预先共享的参数有所不同。密钥交换算法的核心在于:设备公开自身的公钥,保留自己的私钥,利用对方的公钥和自己的私钥生成共享密钥,利用该共享密钥确保穿越不安全网络的消息的安全性。
共享密钥交换算法所使用的参数的方式可以包括但不限于以下两种:第一种方式:预先在第一设备和第二设备上配置密钥交换算法所使用的参数;第二种方式:通过第三方的配置设备将密钥交换算法所使用的参数发送给第一设备和第二设备。
在本发明的各实施例中均以D-H算法为例,第一设备和第二设备预先共享参数g和P,预先在第一设备和第二设备上共享参数g和P,其中P是素数,g是P的原根。另外,在第一设备和第二设备都具有各自的公钥和私钥,第一设备上的公钥和私钥分别为PkeyA和keyA,第二设备上的公钥和私钥分别为PkeyB和keyB。本发明后续实施例二和三中均存在上述配置,不再一一赘述。
图2为本发明实施例一提供的密钥配置方法的流程示意图,如图2所示,该流程可以包括以下步骤:
步骤201:配置设备获取第一设备的公钥PkeyA和设备信息
所述设备信息:至少包括第一设备的地址信息。
本步骤是本实施例中的可选步骤。
步骤202:配置设备获取第二设备的公钥PkeyB和设备信息。
所述设备信息:至少包括第二设备的地址信息。
本发明并不对上述两个步骤的先后顺序进行限制,可以以任意的顺序先后执行,也可以同时执行。
上述设备信息主要是地址信息,还可以包括但不限于以下设备信息:UUID(Universally Unique Identifier,通用唯一识别码)、制造商、序列号、设备能力等。设备能力指的是该设备支持的算法、认证方法、设备角色信息、设备类型信息等,其中设备角色信息是指该设备在注册时充当的角色,可以是enrollee、registrar、client或GO等。设备类型信息可以是WiFi无线终端(诸如手机、电脑、传感器等)、接入点(在wifi网络中是AP)、传感器节点、中心节点等。在本实施例中配置设备获取的设备信息主要是地址信息。
第一设备的公钥PkeyA、第一设备的设备信息以及第二设备的公钥PkeyB、第二设备的设备信息可以通过多种方式获取,例如通过NFC、USB等安全媒介获取,特别地,对于无头设备而言优选通过扫描识别码的方式,即将第一设备的公钥PkeyA和第一设备的设备信息编码到第一设备的扫描识别码,配置设备通过扫描该扫描识别码就能够获取到第一设备的公钥PkeyA和第一设备的设备信息,对于第二设备同样如此。其中扫描识别码可以是诸如二维码、条形码等。
步骤203:配置设备根据第一设备的设备信息将第二设备的公钥PkeyB和设备信息发送给第一设备。
在本步骤中,为了进一步提高安全性和可靠性,配置设备可以利用第一设备的公钥PkeyA加密第二设备的公钥PkeyB和设备信息,然后将加密结果发送给第一设备。
在此对利用公钥加密的方式进行说明,主要分为两种加密方式:
第一种加密方式:如果公钥是用于非对称加密的公钥,可以直接用于加密,需要使用对应的私钥进行解密。
第二种加密方式:如果公钥是用于密钥交换的公钥,则采用公钥的部分信息进行加密,或者基于公钥衍生的信息进行加密,解密时需要采用对称密钥来解密,而不是利用对应的私钥解密。
后续的加密、解密过程可以根据具体情况采用上述加密方式中的其中一种。
此处的加密采用的是第二种加密方式。
步骤204:第一设备利用第二设备的公钥PkeyB生成验证值,将生成的验证值发送给第二设备。
如果配置设备发送来的是加密结果,则第一设备首先对加密结果进行解密后得到第二设备的公钥PkeyB和设备信息。
本步骤中利用第二设备的公钥PkeyB生成的验证值可以是但不限于是PkeyB的hash(哈希)值,也可以是利用其它预设算法生成的验证值。
步骤205:第一设备利用第二设备的设备信息向第二设备发送第一设备的公钥PkeyA。
第一设备获取到第二设备的地址信息后,将上述验证值和PkeyA发送给第二设备。由于本实施例采用的是密钥交换的方式进行共享密钥的配置,因此本实施例中第一设备发送给第二设备的用于得到共享密钥的信息为第一设备的公钥PkeyA。
另外,需要说明的是,上述步骤204和步骤205同样没有先后顺序的限制,可以以任意的顺序先后执行,也可以同时执行。
步骤206:第二设备利用自身的公钥PkeyB对接收到的验证值进行验证,如果验证通过,则记录第一设备的公钥PkeyA。
需要说明的是,步骤204以及本步骤中第二设备对验证值进行的验证是为了进一步提高安全性和可靠性所执行的操作,并不是本发明所必须的步骤。如果没有步骤204,则第二设备直接记录接收到的PkeyA。
第二设备在进行验证时,可以利用自身的公钥PkeyB采用与第一设备相同的生成验证值的方法生成验证值,将生成的验证值与接收到的验证值进行对比,如果一致,则验证通过,否则验证失败。如果验证失败,则可以丢弃接收到的第一设备的公钥PkeyA,不再执行后续流程,并且可以进一步提示用户配置失败,例如采用指示灯的方式,或者在屏幕上显示的方式,或者语音的方式等等。
步骤207:第一设备和第二设备分别利用对方的公钥和自身的私钥产生共享密钥。
需要说明的是,第一设备可以在步骤203之后任意时刻产生共享密钥,即在获取到第二设备的公钥后就可以产生共享密钥,并不一定在此步骤中。
第一设备和第二设备采用预先共享的密钥交换算法来产生共享密钥,以D-H算法为例,第一设备的公钥PkeyA=(g^keyA)mod(P),其中keyA为第一设备的私钥,为随机数,第二设备中的PkeyB=(g^keyB)mod(P),keyB为第二设备的私钥,也是随机数。上述公式中,^为次幂的运算符,X^Y表示X的Y次幂,mod为取模的运算符,XmodY表示X对Y取模。第一设备利用PkeyB和keyA产生共享密钥DHkeyA,即:
DHkeyA=((PkeyB)^keyA)mod(P)
第二设备利用PkeyA和keyB产生共享密钥DHkeyB,即:
DHkeyB=((PkeyA)^keyB)mod(P)
由D-H算法可知,DHkeyA= DHkeyB。
步骤208:第一设备和第二设备基于共享密钥进行安全连接。
即第一设备和第二设备可以基于共享密钥进行后续的交互,后续的交互可以包括但不限于:认证过程、关联过程、数据交互过程等。至于如何利用共享密钥进行安全连接可以采用现有技术,在此不再赘述。
更进一步地,除了直接基于共享密钥进行安全连接之外,第一设备和第二设备可以基于共享的密钥衍生算法对共享密钥生成衍生密钥,利用衍生密钥进行后续的安全连接。本发明对于密钥衍生算法不加以限制,只要第一设备和第二设备预先约定了一致的密钥衍生算法即可。
或者进一步利用共享密钥传递信任状:第一设备在生成共享密钥后,生成信任状,并利用共享密钥或者共享密钥的衍生密钥对信任状进行加密后,将加密结果传递给第二设备;第二设备利用生成的共享密钥或者共享密钥的衍生密钥对加密结果进行解密得到信任状。或者,第二设备在生成共享密钥后生成信任状,并利用共享密钥或者共享密钥的衍生密钥对信任状进行加密后,将加密结果传递给第一设备;第一设备利用生成的共享密钥或者共享密钥的衍生密钥对加密结果进行解密得到信任状。
这里具体是第一设备向第二设备发送信任状还是第二设备向第一设备发送信任状,可以根据设备类型决定,如果第一设备是registrar、中心节点或者GO,则可以由第一设备生成信任状并发送给第二设备。
实施例二、
本实施例采用的也是密钥交换的方式进行共享密钥的配置,图3为本发明实施例二提供的密钥配置方法的流程示意图,在本实施例中对与实施例一相同的步骤不再赘述,参见实施例一中的描述。如图3所示,该流程包括以下步骤:
步骤301同步骤201。
步骤302同步骤302。
步骤303:配置设备与第一设备建立安全连接以生成共享密钥DHkeyC’和DHkeyA’。
本步骤的实现方式可以采用但不限于以下两种:
第一种方式:配置设备与第一设备之间通过现有的WPS交互方式共享信任状(即背景技术中关于图1的描述中生成的key1),以该信任状作为共享密钥DHkey’。
第二种方式:配置设备将自身的公钥PkeyC发送给第一设备,配置设备利用第一设备的公钥PkeyA和配置设备的私钥keyC执行密钥交换算法,生成共享密钥DHkeyC’,第一设备利用配置设备的公钥PkeyC和第一设备的私钥keyA执行密钥交换算法,生成共享密钥DHkeyA’。
这种方式下,需要预先在配置设备与第一设备预先共享密钥交换算法所使用的参数。以D-H算法为例的话,配置设备也预先获取到共享参数g和P。配置设备中的PkeyC=(g^keyC)mod(P),配置设备生成的共享密钥DHkeyC’=((PkeyA)^keyC)mod(P),第一设备生成的共享密钥DHkeyA’=((PkeyC)^keyA)mod(P)。由D-H算法可知,DHkeyC’= DHkeyA’。
步骤304:配置设备利用共享密钥DHkeyC’将第二设备的公钥PkeyB和设备信息进行加密后,将加密结果发送给第一设备。
步骤305:第一设备利用共享密钥DHkeyA’对接收到的加密结果进行解密后,获取第二设备的公钥PkeyB和设备信息。
或者,在步骤304中配置设备也可以利用共享密钥DHkeyC’先生成衍生密钥,再利用衍生密钥将第二设备的公钥PkeyB和设备信息进行加密后发送给第一设备,具体衍生密钥的生成方式在此不加以显示,只要配置设备和第一设备预先约定即可。相应地,在步骤305中,第一设备利用共享密钥DHkeyA’先生成衍生密钥,再利用衍生密钥对接收到的加密结果进行解密。
步骤306:第一设备生成新的私钥keyA’和新的公钥PkeyA’。
本步骤是为了进一步增强交互的安全性所执行的步骤,第一设备产生新的随机数作为私钥keyA’,然后利用该新的私钥生成新的公钥PkeyA’,以D-H算法为例,PkeyA’ =(g^keyA’)mod(P)。
后续步骤307至步骤311分别同实施例一中的步骤204至步骤208,只是其中涉及到的第一设备的公钥和私钥分别替换为步骤306中新的公钥PkeyA’和keyA’。
实施例三、
本实施例采用的也是密钥交换的方式进行共享密钥的配置,图4为本发明实施例三提供的密钥配置方法的流程示意图,同样,在本实施例中对与实施例一相同的步骤不再赘述,参见实施例一中的描述。如图4中所示,该流程包括以下步骤:
步骤401同步骤201,需要说明的是,在本步骤中配置设备获取到的第一设备的设备信息中至少包括第一设备的地址信息和第一设备的设备角色信息或设备类型信息,其中设备角色信息是指该设备在注册时充当的角色,例如可以是enrollee、registrar、client或GO等。设备类型信息可以是无线终端、接入点、传感器节点、中心节点等。
步骤402同步骤202,同样,配置设备获取到的第二设备的设备信息中至少包括第二设备的地址信息和第二设备的设备角色信息或设备类型信息。
与实施例一中的描述相同的,第一设备的公钥PkeyA、设备信息以及第二设备的公钥PkeyB、设备信息可以通过多种方式获取,例如通过NFC、USB等安全媒介获取,特别地,对于无头设备而言优选通过扫描识别码的方式,即将第一设备的公钥PkeyA和设备信息写入第一设备上的扫描识别码,配置设备通过扫描该扫描识别码就能够获取到第一设备的公钥PkeyA和设备信息,对于第二设备同样如此。其中扫描识别码可以是诸如二维码、条形码等。
步骤403:配置设备根据第一设备和第二设备的设备角色信息或设备类型信息,确定是将第一设备的公钥和设备信息发送给第二设备,或者将第二设备的公钥和设备信息发送给第一设备。
在本步骤中,如果第一设备是enrollee,第二设备是registrar,或者第一设备是client,第二设备是GO,或者第一设备是无线终端,第二设备是接入点,则确定将第二设备的公钥和设备信息发送给第一设备,目的是第一设备能够快速扫描发现第二设备,提高效率。如果第一设备是中心节点,第二设备是传感器节点,则确定将第二设备的公钥和设备信息发送给第一设备,目的是中心节点能够快速发现传感器节点。如果第一设备和第二设备的角色或类型对等,例如都是传感器节点,或者都是client等,那么无论确定将第二设备的公钥和设备信息发送给第一设备,还是将第一设备的公钥和设备信息发送给第二设备均可。本步骤为可选的。
假设步骤403确定将第二设备的公钥和设备信息发送给第一设备,步骤404同步骤203。
步骤405至步骤409同步骤204至步骤208。
但在本实施例中,执行步骤405之前,第一设备可以首先根据自己以及第二设备的设备角色信息或设备类型信息确定第一设备与第二设备建立连接的方式,从而决定在步骤405中采用什么消息类型发送验证值和第一设备的公钥PkeyA。例如,若第一设备为enrollee,第二设备是registrar,或者第一设备为无线终端,第二设备为接入点,则第一设备可以通过探测消息将验证值和第一设备的公钥PkeyA发送给第二设备。若第一设备为registrar,第二设备是enrollee,或者第一设备是接入点,第二设备是无线终端,则第一设备可以通过广播消息将验证值和第一设备的公钥PkeyA发送给第二设备。若第一设备是GO,第二设备是client,则第一设备可以通过邀请消息将验证值和第一设备的公钥PkeyA发送给第二设备。若第一设备是client,第二设备是GO,则第一设备可以通过探测消息将验证值和第一设备的公钥PkeyA发送给第二设备。若第一设备是传感器节点,第二设备是中心节点,则第一设备可以通过请求消息将验证值和第一设备的公钥PkeyA发送给第二设备。若第一设备是中心节点,第二设备是传感器节点,则第一设备可以通过邀请消息或广播消息将验证值和第一设备的公钥PkeyA发送给第二设备。
可选地,配置设备获取的第一设备和第二设备的设备信息中还可以包括信道信息,这种情况下,第一设备可以根据第二设备的信道信息快速发现第二设备,并执行步骤405和步骤406,即将验证值和第一设备的公钥PkeyA发送给第二设备。
除此之外,该实施例从步骤405开始也可以按照实施例二中从步骤306开始执行直至第一设备和第二设备基于共享密钥进行安全连接。
实施例四、
本实施例采用的并不是密钥交换的方式进行的共享密钥配置,图5为本发明实施例四提供的密钥配置方法的流程示意图,在本实施例中重点突出与实施例一不同的步骤,与实施例一中相同的步骤不再赘述。如图5中所示,该流程包括以下步骤:
步骤501同步骤201。
步骤502同步骤202。
步骤503同步骤203。
步骤504同步骤204。
步骤505:第一设备生成一个password(密码),利用第二设备的公钥PkeyB将该password进行加密后,将加密结果发送给第二设备。
此处的加密采用的是实施例一中所述的第一种加密方法。
也就是说,第一设备获取到第二设备的地址信息后,将验证值和password进行加密后的加密结果发送给第二设备。也就是说,本实施例中第一设备发送给第二设备的用于得到共享密钥的信息为第一设备生成的上述password。
第一设备生成password的方式可以是任意的,比如采用产生随机数作为password的方式,或者采用预设算法生成password的方式等等。
步骤506:第二设备利用自身的公钥PkeyB对接收到的验证值进行验证,如果验证通过,则采用自身的私钥keyB对接收到的加密结果进行解密,得到password。
在本实施例中,第二设备的公私钥对(PkeyB,keyB),通过一定的加解密算法,使得利用PkeyB进行加密的加密结果能够通过keyB进行解密,这种加解密算法可以采用现有的各种方式,在此不再一一赘述。
步骤507:第一设备和第二设备利用上述password生成共享密钥。
在本步骤中,第一设备和第二设备可以直接将password作为共享密钥,也可以利用预先约定的密钥衍生算法对所述password生成衍生密钥后,将该衍生密钥作为共享密钥。
同样第一设备生成共享密钥的操作可以在生成password之后的任意时刻执行,并不限于在本步骤中执行。
步骤508同步骤208。
需要说明的是,实施例二中步骤303至步骤306所描述的技术内容以及实施例三中步骤403所描述的技术内容对于实施例四同样适用,在此不再赘述。
实施例五、
除了实施例一中所述的生成共享密钥的方式之外,还存在另一种生成共享密钥的方式,参见图6,本实施例所示的流程包括以下步骤:
步骤601同步骤201。
步骤602同步骤202。
步骤603同步骤203。
步骤604同步骤204。
步骤605:第一设备生成随机值Nonce,利用第二设备的公钥PkeyB和该随机值Nonce生成共享密钥DHkey。
在此,除了利用第二设备的公钥PkeyB和随机值Nonce生成共享密钥DHkey之外,还可以采用其他第一设备和第二设备约定的信息和随机值生成共享密钥DHkey,例如可以采用第二设备的MAC(Media Access Control,媒体访问控制)值、第二设备的公钥Pkey的hash值等等。
步骤606:第一设备利用第二设备的公钥PkeyB对该随机值Nonce进行加密后,将加密结果发送给第二设备。
本实施例中用于得到共享密钥的信息为该随机值Nonce。这里的加密方式可以为实施例一中所述的第一种加密方法。
第二设备接收到该加密结果后,对加密结果进行解密,得到该随机值Nonce。
步骤607同步骤206,只是验证通过后,记录的是随机值Nonce。
步骤608:第二设备利用自身的公钥PkeyB和随机值Nonce生成共享密钥DHkey。
在此只要第一设备和第二设备预先约定生成共享密钥的算法即可,在此不具体限制生成共享密钥的算法。
步骤609同步骤208。
实施例六、
图7为本发明实施例六提供的密钥配置方法的流程示意图,如图7所示,该方法包括:
步骤701同步骤201。
步骤702同步骤202。
步骤703同步骤203。
步骤704:第一设备向第二设备发送自身的公钥PkeyA。
在此,为了提高安全性,第一设备可以利用第二设备的公钥PkeyB加密PkeyA后发送给第二设备,第二设备利用自身的私钥keyB进行解密后得到PkeyA。
此处的加密采用的是实施例一中所述的第一种加密方式。
步骤705:第二设备利用第一设备的公钥PkeyA加密一个密码,将加密结果发送给第一设备。其中该密码可以是信任状或者会话密钥等,可以是随机生成的,也可以是按照某个算法生成的,在此不加以限制。
在此第二设备可以利用第一设备的公钥PkeyA生成一个验证值,例如生成PkeyA的hash值发送给第一设备,第一设备接收到验证值后首先利用自身的公钥PkeyA生成验证值,将生成的验证值与接收到的验证值进行比对,如果一致,则确定验证通过,继续执行步骤706。
步骤706:第一设备利用自己的私钥keyA对加密结果进行解密,得到密码。
步骤707:第一设备和第二设备利用上述的密码或者密码的衍生密钥进行后续的安全连接。
实施例七中用于得到共享密钥的信息就是第一设备的公钥。
以上是对本发明所提供的方法进行的描述,下面对对应的系统进行详细描述。图8为本发明实施例提供的系统组成示意图,如图8所示,该系统包括第一设备、第二设备和第三方的配置设备。
其中配置设备,用于获取第二设备的公钥,将第二设备的公钥发送给第一设备。
第一设备主要负责生成第一共享密钥并将用于得到第一共享密钥的信息提供给第二设备,供第二设备生成第一共享密钥。具体地,第一设备可以采用以下两种方式实现该功能:
第一种方式:第一设备生成第一共享密钥,根据第二设备的设备信息,利用第二设备的公钥将用于得到第一共享密钥的信息发送给第二设备。这种方式对应于上述实施例四中所描述的方式
第二种方式:利用第二设备的公钥生成第一共享密钥,并根据第二设备的设备信息,将用于得到第一共享密钥的信息发送给第二设备。这种方式对应于上述实施例一至三中所描述的方式。
第二设备,用于利用自身的私钥以及用于得到第一共享密钥的信息生成第一共享密钥,上述的第一共享密钥用于第一设备和第二设备之间的安全连接。
需要说明的是,在此第一共享密钥的名称是为了与后续优选实施方式中配置设备和第一设备之间共享的第二共享密钥相区别。
下面对第一设备的两种实现方式分别进行详细描述。对于第一种方式而言,第一设备生成password,将该password作为第一共享密钥,或者利用密钥衍生算法对该password生成衍生密钥,将该衍生密钥作为第一共享密钥;然后利用第二设备的公钥将密码进行加密后,将加密结果发送给第二设备。这种方式下,用于得到第一共享密钥的信息为password。其中第一设备生成password的方式可以是任意的,比如采用产生随机数作为password的方式,或者采用预设算法生成password的方式等等。
第二设备利用自身的私钥对加密结果进行解密得到密码,将密码作为第一共享密钥,或者利用密钥衍生算法对密码生成衍生密钥,将该衍生密钥作为第一共享密钥。在这种方式下,第二设备的公私钥对(PkeyB,keyB),通过一定的加解密算法,使得利用公钥PkeyB进行加密的加密结果能够通过私钥keyB进行解密,这种加解密算法已经是现有十分成熟的方式,在此不再一一赘述。
在第一种方式中,还存在一种实现,即第一设备生成随机值,利用第一设备与第二设备约定的信息和该随机值生成第一共享密钥,利用第二设备的公钥对该随机值进行加密后,将加密结果发送给第二设备。第二设备利用自身的私钥对该加密结果进行加密得到该随机值,然后利用第一设备与第二设备约定的信息和该随机值生成第一共享密钥。在这种实现中,所述第一设备和第二设备约定的信息可以是第二设备的公钥、第二设备公钥的hash值、第二设备的MAC地址等信息,这些信息可以由第三方的配置设备从第二设备获取后发送给第一设备,甚至还可以是第一设备和第二设备预先配置好的一些特定值。
对于第二种方式而言,第一设备和第二设备需要预定密钥交换算法,这里可以采用的密钥交换算法可以是但不限于是D-H算法、RSA算法或EIGamal算法等,根据不同的密钥交换算法,预先共享的参数有所不同。以D-H算法为例,第一设备和第二设备预先共享参数g和P,预先在第一设备和第二设备上共享参数g和P,其中P是素数,g是P的原根。
第一设备和第二设备共享密钥交换算法所使用的参数的方式可以包括但不限于以下两种:其一、预先在第一设备和第二设备上配置密钥交换算法所使用的参数;其二、通过第三方的配置设备将密钥交换算法所使用的参数发送给第一设备和第二设备。
在第二种方式下,第一设备具体用于利用第二设备的公钥和自身的私钥按照密钥交换算法生成第一共享密钥,并将第一设备的公钥发送给第二设备。这种方式下,用于得到第一共享密钥的信息为第一设备的公钥。
以D-H算法为例,第一设备的公钥PkeyA为:PkeyA=(g^keyA)mod(P),其中keyA为第一设备的私钥,为随机数,生成的第一共享密钥DHkeyA为:DHkeyA=((PkeyB)^keyA)mod(P)。
第二设备具体用于利用第一设备的公钥以及自身的私钥按照密钥交换算法生成第一共享密钥。第二设备的公钥PkeyB为:PkeyB=(g^keyB)mod(P),keyB为第二设备的私钥,也是随机数。生成的第一共享密钥DHkeyB为:DHkeyB=((PkeyA)^keyB)mod(P)。由D-H算法可知,DHkeyA= DHkeyB。
在上述第二种方式下,第一设备和第二设备可以采用以下两种方式共享密钥交换算法所使用的参数:
1)第一设备和第二设备上预先配置有密钥交换算法所使用的参数,即采用静态配置的方式。
2)配置设备将密钥交换算法所使用的参数发送给第一设备和第二设备,即由第三方的配置设备完成第一设备和第二设备上密钥交换算法所使用的参数配置。
在以上第一种方式或第二种方式的基础上,配置设备还用于获取第二设备和第一设备的设备信息。本发明实施例中涉及的设备信息可以包括但不限于:地址信息、设备能力、制造商、序列号、UUID等,其中设备能力指的是该设备支持的算法、认证方法、设备角色信息、设备类型信息等,其中设备角色信息是指该设备在注册时充当的角色,可以是enrollee、registrar、client或GO等。设备类型信息可以是无线终端、接入点、传感器节点、中心节点等。
在此涉及到的设备信息至少包含地址信息;这样配置设备能够根据第一设备的地址信息,执行将第二设备的公钥和设备信息发送给第一设备的操作;以及获取第二设备的地址信息,并将第二设备的地址信息发送给第一设备;使第一设备能够依据第二设备的地址信息发送用于得到第一共享密钥的信息。
更进一步地,在上述第一种方式或第二种方式的基础上,配置设备还用于获取第一设备的公钥;在将第二设备的公钥和设备信息发送给第一设备时,具体利用第一设备的公钥加密第二设备的公钥和设备信息,这里的加密可以采用实施例一中所述的第二种加密方式,将加密结果发送给第一设备。
此时的第一设备对加密结果进行解密,得到第二设备的公钥和设备信息。该种优选实施方式对应实施例一中所描述内容。
具体地,在上述第一种方式或第二种方式的基础上,配置设备从第一设备或第二设备获取信息时,包括公钥和设备信息,具体通过扫描二维码、USB或者近场通信的方式从第一设备或者第二设备获取信息。
可选的,第一设备还可以利用第二设备的公钥生成验证值,该验证值可以是但不限于是第二设备的公钥的hash值,或者是利用其它预设算法生成的验证值,然后根据第二设备的设备信息将该验证值发送给第二设备。
第二设备在生成第一共享密钥之前,利用自身的公钥对接收到的验证值进行验证,如果验证通过,则继续执行生成第一共享密钥的操作;否则,丢弃第一设备的公钥,不再执行后续操作,并且可以进一步提示用户配置失败,例如采用指示灯的方式,或者在屏幕上显示的方式,或者语音的方式等等。该优选的实施方式对应于实施例一中所描述内容。
可选的,配置设备与第一设备,还可以用于建立安全连接以生成第二共享密钥。在此具体可以采用以下两种:其一、配置设备与第一设备之间通过现有的WPS交互方式共享信任状,以该信任状作为第二共享密钥;其二、配置设备将自身的公钥发送给第一设备,配置设备利用第一设备的公钥和配置设备的私钥执行密钥交换算法,生成第二共享密钥,第一设备利用配置设备的公钥和第一设备的私钥执行密钥交换算法,生成第二共享密钥。
配置设备在将第二设备的公钥和设备信息发送给第一设备时,具体利用第二共享密钥将第二设备的公钥和设备信息进行加密后,将加密结果发送给第一设备。第一设备利用第二共享密钥对接收到的加密结果进行解密后,得到第二设备的公钥和设备信息。这种优选的实施方式对应于实施例二所描述的内容。
可选的,在上述第一种方式或第二种方式的基础上,第一设备在得到第二设备的公钥和设备信息之后,还可以生成新的公钥和新的私钥。此时,上述第一设备发送给第二设备的第一设备的公钥为新的公钥;第二设备在生成第一共享密钥时利用的第一设备的公钥为新的公钥;第一设备在生成第一共享密钥时利用的自身的私钥为新的私钥。这种实施方式能够进一步增强交互的安全性,对应于实施例二中所描述的内容。
可选的,在上述第一种方式或第二种方式的基础上,可以进一步利用设备信息中包含的设备角色信息或设备类型信息,即配置设备还可以用于根据第一设备和第二设备的设备角色信息或设备类型信息,确定是将第二设备的公钥和设备信息发送给第一设备,还是将第一设备的公钥和设备信息发送给第二设备。
如果第一设备是被注册方enrollee,第二设备是注册器registrar,或者第一设备是客户端client,第二设备是组长设备GO,或者第一设备是无线终端,第二设备是接入点,则配置设备确定将第二设备的公钥和设备信息发送给第一设备,这样能够便于第一设备快速扫描发现第二设备,提高效率。或者如果第一设备是中心节点,第二设备是传感器节点,则配置设备确定将第二设备的公钥和设备信息发送给第一设备,目的是中心节点能够快速发现传感器节点。这种优选的实施方式对应于实施例三中所描述的内容。
如果第一设备和第二设备的角色或类型对等,例如都是传感器节点,或者都是client等,那么无论确定将第二设备的公钥和设备信息发送给第一设备,还是将第一设备的公钥和设备信息发送给第二设备均可。
优选地,在上述第一种方式或第二种方式的基础上,还可以利用设备信息中包括信道信息的,即第一设备还用于根据第二设备的信道信息快速发现第二设备,以执行将用于得到第一共享密钥的信息发送给第二设备。
另外,第一设备和第二设备除了直接利用第一共享密钥进行安全连接之外,还可以基于共享的密钥衍生算法对第一共享密钥生成衍生密钥,利用衍生密钥进行安全连接。后续的安全连接可以包括但不限于:认证过程、关联过程、数据交互过程等。至于如何利用共享密钥进行安全连接可以采用现有技术,在此不再赘述。
上述的配置设备可以包括一台或多台服务器,或者包括一台或多台计算机,上述的第一设备和第二设备可以是诸如个人计算机、笔记本电脑、无线电话、个人数字助理(PDA)、传感器节点、AP等。需要说明的是,本发明所提供的方式和系统并不限于WiFi网络,可以用于任意的诸如蓝牙、Zigbee等无线网络,甚至可以应用于有线网络中的密钥配置。
图9为本发明实施例提供的设置于第一设备中的密钥配置装置的结构示意图,如图9中所示,该密钥配置装置包括:配置接收单元90和密钥处理单元91。
配置接收单元90负责接收配置设备在获取到第二设备的公钥后发送的第二设备的公钥。
密钥处理单元91负责利用第二设备的公钥将用于得到第一共享密钥的信息发送给第二设备;或者第一设备利用第二设备的公钥生成第一共享密钥,将用于得到第一共享密钥的信息发送给第二设备;以便第二设备利用自身的私钥以及用于得到第一共享密钥的信息生成第一共享密钥,第一共享密钥用于第一设备和第二设备之间的安全连接。
得到第一共享密钥的方式可以采用以下几种:
第一种方式:密钥处理单元91生成密码,将密码作为第一共享密钥,利用第二设备的公钥将密码进行加密得到加密结果,将加密结果发送给第二设备,以便第二设备利用自身的私钥对加密结果进行解密得到密码,将密码作为第一共享密钥。
第二种方式:密钥处理单元91生成密码,利用第二设备的公钥将密码进行加密得到加密结果,将加密结果发送给第二设备,利用密钥衍生算法对密码生成衍生密钥,将该衍生密钥作为第一共享密钥,以便第二设备利用自身的私钥对加密结果进行解密得到密码,利用密钥衍生算法对密码生成衍生密钥,将该衍生密钥作为第一共享密钥。
第三种方式:密钥处理单元91生成随机值,利用第一设备与第二设备约定的信息和该随机值生成第一共享密钥,利用第二设备的公钥对该随机值进行加密后,将加密结果发送给第二设备,以便第二设备利用自身的私钥对加密结果进行解密得到随机值,利用第一设备与第二设备约定的信息和随机值生成第一共享密钥。
第四种方式:密钥处理单元91利用第二设备的公钥将第一设备的公钥进行加密后,将加密结果发送给第二设备;接收第二设备发送的加密结果,该加密结果是第二设备利用自身的私钥对接收到的加密结果进行解密后,得到第一设备的公钥,并且生成密码,将该密码作为共享密钥,利用第一设备的公钥将该密码进行加密后得到的;利用自身的私钥对接收到的加密结果进行解密后,将得到的密码作为第一共享密钥。
第五种方式:密钥处理单元91利用第二设备的公钥和自身的私钥按照第一设备和第二设备预定的密钥交换算法生成第一共享密钥,并将第一设备的公钥发送给第二设备,以便第二设备利用自身的私钥以及第一设备的公钥按照密钥交换算法生成第一共享密钥。
其中,密钥处理单元91可以预先配置有密钥交换算法所使用的参数;或者,配置接收单元91接收配置设备发送的密钥交换算法所使用的参数,并提供给密钥处理单元91。
更进一步地,该密钥配置装置还可以包括:安全连接单元92。
安全连接单元92在密钥处理单元91得到第一共享密钥后,生成信任状,并利用第一共享密钥或第一共享密钥的衍生密钥对信任状进行加密后,将加密结果发送给第二设备;以便第二设备利用得到的第一共享密钥或者第一共享密钥的衍生密钥对加密结果进行解密得到信任状,信任状用于第一设备和第二设备之间的安全连接(图中所示为该种实现)。或者,用于利用得到的第一共享密钥或者第一共享密钥的衍生密钥对第二设备发送的信任状的加密结果进行解密得到信任状,信任状的加密结果为第二设备在得到第一共享密钥后,生成信任状,并利用第一共享密钥或第一共享密钥的衍生密钥对信任状进行加密后得到,信任状用于第一设备和第二设备之间的安全连接。
为了增强安全性,配置接收单元90可以接收配置设备在获取到第二设备的公钥和第一设备的公钥后发送的加密结果,加密结果为配置设备利用第一设备的公钥加密的第二设备的公钥。此时,密钥处理单元91,还可以用于对加密结果进行解密,得到第二设备的公钥。
还有一种实现:配置接收单元90与配置设备建立安全连接以生成第二共享密钥;接收配置设备在获取到第二设备的公钥后发送的加密结果,加密结果为配置设备利用第二共享密钥加密的第二设备的公钥。此时,密钥处理单元91利用第二共享密钥对接收到的加密结果进行解密后,得到第二设备的公钥。
其中,配置接收单元90在与配置设备建立安全连接以生成第二共享密钥时,具体与配置设备通过WPS交互方式共享信任状,将信任状作为第二共享密钥;或者,具体接收配置设备发送的配置设备的公钥,第一设备利用配置设备的公钥和自身的私钥按照预先约定的密钥交换算法生成第二共享密钥。
为了更进一步地提高安全性,密钥处理单元91在得到第二设备的公钥之后,还可以生成新的公钥和新的私钥;这样,第一设备发送给第二设备的第一设备的公钥就为该新的公钥;第二设备在生成第一共享密钥时利用的第一设备的公钥为新的公钥;第一设备在生成第一共享密钥时利用的自身的私钥为新的私钥。
优选地,配置接收单元90还可以接收配置设备从第二设备获取后发送来的第二设备的信道信息。这样,密钥处理单元91根据第二设备的信道信息就能够快速发现第二设备,以执行将用于得到第一共享密钥的信息发送给第二设备的操作。
除此之外,密钥处理单元91还可以利用第二设备的公钥生成验证值,将验证值发送给第二设备;以便第二设备在生成第一共享密钥之前,利用自身的公钥对接收到的验证值进行验证,在验证通过的情况下,执行生成第一共享密钥的操作。
图10为本发明实施例提供的设置于配置设备中的密钥配置装置的结构示意图,如图10所示,该密钥配置装置包括:信息获取单元11和信息发送单元12。
其中,信息获取单元11负责获取第二设备的公钥。
信息发送单元12负责将第二设备的公钥发送给第一设备。
这样第一设备就能够利用第二设备的公钥将用于得到第一共享密钥的信息发送给第二设备;或者第一设备就能够利用第二设备的公钥生成第一共享密钥,将用于得到第一共享密钥的信息发送给第二设备。
然后第二设备利用自身的私钥以及用于得到第一共享密钥的信息生成第一共享密钥,第一共享密钥用于第一设备和第二设备之间的安全连接。
如果第一设备和第二设备基于预定的密钥交换算法实现第一共享密钥的生成,则信息发送单元12,还可以将密钥交换算法所使用的参数发送给第一设备和第二设备,该密钥交换算法用于第一设备和第二设备利用自身的私钥和对方的公钥按照密钥交换算法生成第一共享密钥。
为了提高信息传递的安全性,信息获取单元11可以获取第一设备的公钥。由信息发送单元12利用第一设备的公钥加密第二设备的公钥,将加密结果发送给第一设备,以便第一设备对加密结果进行解密,得到第二设备的公钥。
还存在另外一种方式:信息发送单元12与第一设备建立安全连接以生成第二共享密钥;在将第二设备的公钥发送给第一设备时,具体利用第二共享密钥将第二设备的公钥进行加密后,将加密结果发送给第一设备,以便第一设备利用第二共享密钥对接收到的加密结果进行解密后,得到第二设备的公钥。
具体地,信息发送单元12在与第一设备建立安全连接以生成第二共享密钥时,与第一设备通过WPS交互方式共享信任状,将信任状作为第二共享密钥;或者,将自身的公钥发送给第一设备,利用第一设备的公钥和自身的私钥按照预先约定的密钥交换算法生成第二共享密钥。
为了提高第一设备发现第二设备的效率,信息获取单元11还可以获取第二设备的信道信息。此时,信息发送单元12将第二设备的信道信息发送给第一设备,以便第一设备根据第二设备的信道信息快速发现第二设备,以执行将用于得到第一共享密钥的信息发送给第二设备的操作。
具体地,信息获取单元11通过扫描二维码、通用串行总线USB或者近场通信的方式从第一设备或者第二设备获取信息。
图11为本发明实施例提供的设置于第二设备中的密钥配置装置的结构示意图,如图11所示,该密钥配置装置可以包括:信息提供单元21、信息接收单元22和密钥处理单元23。
信息提供单元21负责向配置设备提供第二设备的公钥,以便配置设备将第二设备的公钥发送给第一设备。
信息接收单元22负责接收第一设备利用第二设备的公钥发送来的用于得到第一共享密钥的信息;或者接收第一设备利用第二设备的公钥生成第一共享密钥后,发送来的用于得到第一共享密钥的信息。
密钥处理单元23负责利用自身的私钥以及用于得到第一共享密钥的信息生成第一共享密钥,第一共享密钥用于第一设备和第二设备之间的安全连接。
得到第一共享密钥的方式可以采用以下几种:
第一种方式:信息接收单元22接收第一设备发送的加密结果,加密结果是第一设备生成密码,将密码作为第一共享密钥,利用第二设备的公钥将密码进行加密得到的。
此时,密钥处理单元23利用自身的私钥对加密结果进行解密得到密码,将密码作为第一共享密钥。
第二种方式:信息接收单元22接收第一设备发送的加密结果,加密结果是第一设备生成密码后,利用第二设备的公钥将密码进行加密得到的。
此时的密钥处理单元23利用自身的私钥对加密结果进行解密得到密码,利用密钥衍生算法对密码生成衍生密钥,将该衍生密钥作为第一共享密钥。
第三种方式:信息接收单元22接收第一设备发送的加密结果,加密结果是第一设备生成随机值,利用第一设备与第二设备约定的信息和该随机值生成第一共享密钥,利用第二设备的公钥对该随机值进行加密后得到的。
此时的密钥处理单元23利用自身的私钥对加密结果进行解密得到随机值,利用第一设备与第二设备约定的信息和随机值生成第一共享密钥。
第四种方式:信息接收单元22接收第一设备利用第二设备的公钥将第一设备的公钥进行加密后得到的加密结果。
此时密钥处理单元23利用自身的私钥对加密结果进行解密后,得到第一设备的公钥,并生成密码,将该密码作为第一共享密钥,利用第一设备的公钥将该密码进行加密后,将加密结果发送给第一设备,以便第一设备利用自身的私钥对接收到的加密结果进行解密后,将得到的密码作为第一共享密钥。
第五种方式:信息接收单元22接收第一设备利用第二设备的公钥和自身的私钥按照密钥交换算法生成第一共享密钥后,发送来的第一设备的公钥;密钥交换算法是第一设备和第二设备预定的。
此时,密钥处理单元23利用自身的私钥以及第一设备的公钥按照密钥交换算法生成第一共享密钥。
这种方式下,密钥处理单元23可以预先配置有密钥交换算法所使用的参数。或者,信息接收单元22接收配置设备发送的密钥交换算法所使用的参数,并提供给密钥处理单元23。
更进一步地,该密钥配置装置还可以包括:安全连接单元24。
安全连接单元24接收第一设备发送的加密结果,该加密结果是第一设备在得到第一共享密钥后,生成信任状,并利用第一共享密钥或第一共享密钥的衍生密钥对信任状进行加密后得到的;利用得到的第一共享密钥或者第一共享密钥的衍生密钥对加密结果进行解密得到信任状,信任状用于第一设备和第二设备之间的安全连接(图中示出的为该种实现)。或者,用于在密钥处理单元23得到第一共享密钥后,生成信任状,并利用第一共享密钥或第一共享密钥的衍生密钥对信任状进行加密后,将加密结果发送给第一设备;以便第一设备利用得到的第一共享密钥或者第一共享密钥的衍生密钥对加密结果进行解密得到信任状,信任状用于第一设备和第二设备之间的安全连接。
为了提高第一设备发现第二设备的效率,上述的信息提供单元21还可以将第二设备的信道信息提供给配置设备,以便配置设备将第二设备的信道信息发送给第一设备;以便第一设备根据第二设备的信道信息快速发现第二设备,以执行将用于得到第一共享密钥的信息发送给第二设备的操作。
具体地,信息提供单元21可以通过二维码、USB或近场通信的方式向配置设备提供信息。
另外,为了进一步提高安全性,信息接收单元22还可以接收第一设备利用第二设备的公钥生成的验证值。
此时密钥处理单元23利用自身的公钥对接收到的验证值进行验证,在验证通过的情况下,执行生成第一共享密钥的操作。
从硬件结构上考虑,上述的配置设备如图12所示,包括处理器、存储器和通信总线,所述处理器通过通信总线与存储器连接,所述存储器中保存有实现密钥配置方法的指令,进一步地,所述配置设备还包括通信接口,通过通信接口与其他设备通信连接。
当处理器调取存储器中实现密钥配置方法的指令时,可以执行如下步骤:
获取第二设备的公钥,将所述第二设备的公钥发送给第一设备;
以便所述第一设备利用所述第二设备的公钥将用于得到第一共享密钥的信息发送给所述第二设备;或者以便所述第一设备利用所述第二设备的公钥生成第一共享密钥,将用于得到第一共享密钥的信息发送给所述第二设备;
以便所述第二设备利用自身的私钥以及所述用于得到第一共享密钥的信息生成所述第一共享密钥,所述第一共享密钥用于所述第一设备和所述第二设备之间的安全连接。
当处理器调取存储器中实现密钥配置方法的指令时,可以执行前述方法实施例中配置设备所执行的步骤,具体可参考前述方法实施例,在此不再赘述。
上述的第一设备如图13所示,包括处理器、存储器和通信总线,所述处理器通过通信总线与存储器连接,所述存储器中保存有实现密钥配置方法的指令,进一步地,所述第一设备还包括通信接口,通过通信接口与其他设备通信连接。
当处理器调取存储器中实现密钥配置方法的指令时,可以执行如下步骤:
接收配置设备在获取到第二设备的公钥后发送的第二设备的公钥,利用所述第二设备的公钥将用于得到所述第一共享密钥的信息发送给所述第二设备;或者所述第一设备利用所述第二设备的公钥生成第一共享密钥,将用于得到所述第一共享密钥的信息发送给所述第二设备;
以便所述第二设备利用自身的私钥以及所述用于得到第一共享密钥的信息生成所述第一共享密钥,所述第一共享密钥用于所述第一设备和所述第二设备之间的安全连接。
当处理器调取存储器中实现密钥配置方法的指令时,可以执行前述方法实施例中第一设备所执行的步骤,具体可参考前述方法实施例,在此不再赘述。
上述的第二设备如图14所示,包括处理器、存储器和通信总线,所述处理器通过通信总线与存储器连接,所述存储器中保存有实现密钥配置方法的指令,进一步地,所述第二设备还包括通信接口,通过通信接口与其他设备通信连接。
当处理器调取存储器中实现密钥配置方法的指令时,可以执行如下步骤:
向配置设备提供第二设备的公钥,以便所述配置设备将所述第二设备的公钥发送给第一设备;
接收所述第一设备利用所述第二设备的公钥发送来的用于得到第一共享密钥的信息;或者接收所述第一设备利用所述第二设备的公钥生成第一共享密钥后,发送来的用于得到第一共享密钥的信息;
利用自身的私钥以及所述用于得到第一共享密钥的信息生成所述第一共享密钥,所述第一共享密钥用于所述第一设备和所述第二设备之间的安全连接。
当处理器调取存储器中实现密钥配置方法的指令时,可以执行前述方法实施例中第二设备所执行的步骤,具体可参考前述方法实施例,在此不再赘述。
本发明所描述的设备在架构上都包含一些基本组件,如总线、处理系统、存储系统、一个或多个输入/输出系统、和通信接口等。总线可以包括一个或多个导线,用来实现设备中各组件之间的通信。处理系统包括各类型的用来执行指令、处理进程或线程的处理器或微处理器。存储系统可以包括存储动态信息的随机访问存储器(RAM)等动态存储器,和存储静态信息的只读存储器(ROM)等静态存储器,以及包括磁或光学记录介质与相应驱动的大容量存储器。输入系统供用户输入信息到服务器或终端设备,如键盘、鼠标、手写笔、声音识别系统、或生物测定系统等,如果是无头设备,则可以不包含人机交互功能的输入系统。输出系统包括用来输出信息的显示器、打印机、扬声器、指示灯等。通信接口用来使服务器或终端设备与其它系统或系统进行通信。通信接口之间可通过有线连接、无线连接、或光连接连接到网络中。
各设备上均包含有用来管理系统资源、控制其它程序运行的操作系统软件,以及用来实现特定功能的应用软件。
以上所述仅为本发明的较佳实施例而已,并不用以限制本发明,凡在本发明的精神和原则之内,所做的任何修改、等同替换、改进等,均应包含在本发明保护的范围之内。

Claims (71)

  1. 一种密钥配置方法,其特征在于,所述密钥配置方法包括:
    第一设备接收配置设备在获取到第二设备的公钥后发送的第二设备的公钥;利用所述第二设备的公钥将用于得到第一共享密钥的信息发送给所述第二设备,或者,所述第一设备利用所述第二设备的公钥生成第一共享密钥,将用于得到所述第一共享密钥的信息发送给所述第二设备;
    以便所述第二设备利用自身的私钥以及所述用于得到第一共享密钥的信息生成所述第一共享密钥,所述第一共享密钥用于所述第一设备和所述第二设备之间的安全连接。
  2. 根据权利要求1所述的方法,其特征在于,所述第一设备利用第二设备的公钥将用于得到第一共享密钥的信息发送给第二设备包括:所述第一设备生成密码,将所述密码作为第一共享密钥,利用所述第二设备的公钥将所述密码进行加密得到加密结果,将所述加密结果发送给所述第二设备;
    以便所述第二设备利用自身的私钥以及用于得到第一共享密钥的信息生成所述第一共享密钥包括:以便所述第二设备利用自身的私钥对所述加密结果进行解密得到所述密码,将所述密码作为第一共享密钥;或者,
    所述第一设备生成第一共享密钥,利用第二设备的公钥将用于得到第一共享密钥的信息发送给第二设备包括:所述第一设备生成密码,利用所述第二设备的公钥将所述密码进行加密得到加密结果,将所述加密结果发送给所述第二设备,利用密钥衍生算法对所述密码生成衍生密钥,将该衍生密钥作为第一共享密钥;
    以便所述第二设备利用自身的私钥以及用于得到第一共享密钥的信息生成所述第一共享密钥包括:以便所述第二设备利用自身的私钥对所述加密结果进行解密得到所述密码,利用所述密钥衍生算法对所述密码生成衍生密钥,将该衍生密钥作为所述第一共享密钥。
  3. 根据权利要求1所述的方法,其特征在于,所述第一设备生成第一共享密钥,利用第二设备的公钥将用于得到第一共享密钥的信息发送给第二设备包括:所述第一设备生成随机值,利用第一设备与第二设备约定的信息和该随机值生成第一共享密钥,利用第二设备的公钥对该随机值进行加密后,将加密结果发送给第二设备;
    以便所述第二设备利用自身的私钥以及用于得到第一共享密钥的信息生成所述第一共享密钥包括:以便所述第二设备利用自身的私钥对所述加密结果进行解密得到所述随机值,利用所述第一设备与第二设备约定的信息和所述随机值生成所述第一共享密钥。
  4. 根据权利要求1所述的方法,其特征在于,所述利用所述第二设备的公钥将用于得到所述第一共享密钥的信息发送给所述第二设备包括:所述第一设备利用第二设备的公钥将第一设备的公钥进行加密后,将加密结果发送给第二设备;
    以便所述第二设备利用自身的私钥以及所述用于得到第一共享密钥的信息生成所述第一共享密钥包括:以便所述第二设备利用自身的私钥对所述加密结果进行解密后,得到所述第一设备的公钥,并且生成密码,将该密码作为所述第一共享密钥;
    该方法还包括:第一设备接收所述第二设备利用所述第一设备的公钥将该密码进行加密后的加密结果,利用自身的私钥对接收到的加密结果进行解密后,将得到的密码作为所述第一共享密钥。
  5. 根据权利要求1所述的方法,其特征在于,所述方法还包括:所述第一设备和所述第二设备预定密钥交换算法;
    所述第一设备利用第二设备的公钥生成第一共享密钥,将用于得到第一共享密钥的信息发送给第二设备包括:所述第一设备利用第二设备的公钥和自身的私钥按照所述密钥交换算法生成第一共享密钥,并将第一设备的公钥发送给所述第二设备;
    以便所述第二设备利用自身的私钥以及用于得到第一共享密钥的信息生成所述第一共享密钥包括:以便所述第二设备利用自身的私钥以及所述第一设备的公钥按照所述密钥交换算法生成第一共享密钥。
  6. 根据权利要求5所述的方法,其特征在于,所述第一设备和所述第二设备预定密钥交换算法包括:
    所述第一设备和所述第二设备上预先配置有所述密钥交换算法所使用的参数;或者,
    通过所述配置设备将所述密钥交换算法所使用的参数发送给所述第一设备和所述第二设备。
  7. 根据权利要求1-6任一所述的方法,其特征在于,所述第一共享密钥用于所述第一设备和所述第二设备之间的安全连接包括:
    所述第一设备在得到第一共享密钥后,生成信任状,并利用第一共享密钥或第一共享密钥的衍生密钥对信任状进行加密后,将加密结果发送给所述第二设备;以便所述第二设备利用得到的第一共享密钥或者第一共享密钥的衍生密钥对加密结果进行解密得到所述信任状,所述信任状用于所述第一设备和所述第二设备之间的安全连接;或者,
    所述第一设备利用得到的第一共享密钥或者第一共享密钥的衍生密钥对所述第二设备发送的信任状的加密结果进行解密得到所述信任状,所述信任状的加密结果为所述第二设备在得到第一共享密钥后,生成信任状,并利用第一共享密钥或第一共享密钥的衍生密钥对所述信任状进行加密后得到,所述信任状用于所述第一设备和所述第二设备之间的安全连接。
  8. 根据权利要求7所述的方法,其特征在于,若所述第一设备是注册器Registrar、中心节点或者组长设备GO,则由所述第一设备生成所述信任状并将所述信任状的加密结果发送给所述第二设备;
    若所述第二设备是Registrar、中心节点或GO,则由所述第二设备生成所述信任状并将所述信任状的加密结果发送给所述第一设备。
  9. 根据权利要求1至8任一权项所述的方法,其特征在于,
    所述第一设备接收配置设备在获取到第二设备的公钥后发送的第二设备的公钥具体为:
    所述第一设备接收配置设备在获取到所述第二设备的公钥和所述第一设备的公钥后发送的加密结果,所述加密结果为所述配置设备利用所述第一设备的公钥加密的所述第二设备的公钥;
    该方法还包括:所述第一设备对所述加密结果进行解密,得到所述第二设备的公钥。
  10. 根据权利要求1至8任一权项所述的方法,其特征在于,
    所述第一设备接收配置设备在获取到第二设备的公钥后发送的第二设备的公钥具体为:
    所述第一设备与所述配置设备建立安全连接以生成第二共享密钥;
    所述第一设备接收所述配置设备在获取到第二设备的公钥后发送的加密结果,所述加密结果为所述配置设备利用所述第二共享密钥加密的所述第二设备的公钥;
    该方法还包括:
    所述第一设备利用所述第二共享密钥对接收到的所述加密结果进行解密后,得到所述第二设备的公钥。
  11. 根据权利要求10所述的方法,其特征在于,所述第一设备与所述配置设备建立安全连接以生成第二共享密钥包括:
    所述第一设备与所述配置设备通过无线保真安全建立WPS交互方式共享信任状,将所述信任状作为所述第二共享密钥;或者,
    所述第一设备接收所述配置设备发送的所述配置设备的公钥,所述第一设备利用所述配置设备的公钥和自身的私钥按照预先约定的密钥交换算法生成所述第二共享密钥,以便所述配置设备获取到所述第一设备的公钥后,利用所述第一设备的公钥和自身的私钥按照预先约定的密钥交换算法生成所述第二共享密钥。
  12. 根据权利要求5所述的方法,其特征在于,在所述第一设备得到所述第二设备的公钥之后,所述方法还包括:所述第一设备生成新的公钥和新的私钥;
    所述第一设备发送给所述第二设备的第一设备的公钥为所述新的公钥;所述第二设备在生成所述第一共享密钥时利用的第一设备的公钥为所述新的公钥;所述第一设备在生成所述第一共享密钥时利用的自身的私钥为所述新的私钥。
  13. 根据权利要求1至12任一权项所述的方法,其特征在于,
    所述第一设备是被注册方enrollee,所述第二设备是registrar,或者所述第一设备是客户端client,所述第二设备是GO,或者所述第一设备是无线终端,所述第二设备是接入点,或者所述第一设备是中心节点,所述第二设备是传感器节点。
  14. 根据权利要求1至13任一权项所述的方法,其特征在于,
    该方法还包括:所述第一设备根据第二设备的信道信息快速发现所述第二设备,以执行所述将用于得到第一共享密钥的信息发送给第二设备的步骤,所述第二设备的信道信息为所述配置设备从所述第二设备获取后发送给所述第一设备的。
  15. 根据权利要求1至14任一权项所述的方法,其特征在于,所述配置设备通过扫描二维码、通用串行总线USB或者近场通信的方式从所述第一设备或者第二设备获取信息。
  16. 根据权利要求1至15任一权项所述的方法,其特征在于,该方法还包括:所述第一设备利用所述第二设备的公钥生成验证值,将所述验证值发送给所述第二设备;
    以便所述第二设备在生成所述第一共享密钥之前,利用自身的公钥对接收到的验证值进行验证,在验证通过的情况下,执行生成所述第一共享密钥的步骤。
  17. 一种密钥配置方法,其特征在于,所述密钥配置方法包括:
    所述配置设备获取第二设备的公钥,将所述第二设备的公钥发送给第一设备;
    以便所述第一设备利用所述第二设备的公钥将用于得到第一共享密钥的信息发送给所述第二设备;或者以便所述第一设备利用所述第二设备的公钥生成第一共享密钥,将用于得到第一共享密钥的信息发送给所述第二设备;
    以便所述第二设备利用自身的私钥以及所述用于得到第一共享密钥的信息生成所述第一共享密钥,所述第一共享密钥用于所述第一设备和所述第二设备之间的安全连接。
  18. 根据权利要求17所述的方法,其特征在于,以便所述第一设备利用第二设备的公钥将用于得到第一共享密钥的信息发送给第二设备包括:以便所述第一设备生成密码,将所述密码作为第一共享密钥,利用所述第二设备的公钥将所述密码进行加密得到加密结果,将所述加密结果发送给所述第二设备;
    以便所述第二设备利用自身的私钥以及用于得到第一共享密钥的信息生成所述第一共享密钥包括:以便所述第二设备利用自身的私钥对所述加密结果进行解密得到所述密码,将所述密码作为第一共享密钥;或者,
    以便所述第一设备生成第一共享密钥,利用第二设备的公钥将用于得到第一共享密钥的信息发送给第二设备包括:以便所述第一设备生成密码,利用所述第二设备的公钥将所述密码进行加密得到加密结果,将所述加密结果发送给所述第二设备,利用密钥衍生算法对所述密码生成衍生密钥,将该衍生密钥作为第一共享密钥;
    以便所述第二设备利用自身的私钥以及用于得到第一共享密钥的信息生成所述第一共享密钥包括:以便所述第二设备利用自身的私钥对所述加密结果进行解密得到所述密码,利用所述密钥衍生算法对所述密码生成衍生密钥,将该衍生密钥作为所述第一共享密钥。
  19. 根据权利要求17所述的方法,其特征在于,以便所述第一设备生成第一共享密钥,利用第二设备的公钥将用于得到第一共享密钥的信息发送给第二设备包括:以便所述第一设备生成随机值,利用第一设备与第二设备约定的信息和该随机值生成第一共享密钥,利用第二设备的公钥对该随机值进行加密后,将加密结果发送给第二设备;
    以便所述第二设备利用自身的私钥以及用于得到第一共享密钥的信息生成所述第一共享密钥包括:以便所述第二设备利用自身的私钥对所述加密结果进行解密得到所述随机值,利用所述第一设备与第二设备约定的信息和所述随机值生成所述第一共享密钥。
  20. 根据权利要求17所述的方法,其特征在于,以便所述第一设备利用所述第二设备的公钥将用于得到第一共享密钥的信息发送给所述第二设备包括:以便所述第一设备利用第二设备的公钥将第一设备的公钥进行加密后,将加密结果发送给第二设备;
    以便所述第二设备利用自身的私钥以及所述用于得到第一共享密钥的信息生成所述第一共享密钥包括:以便所述第二设备利用自身的私钥对所述加密结果进行解密后,得到所述第一设备的公钥,并且生成密码,将该密码进行加密后,将加密结果发送给所述第一设备;
    以便所述第一设备利用自身的私钥对接收到的加密结果进行解密后,将得到的密码作为第一共享密钥。
  21. 根据权利要求17所述的方法,其特征在于,所述方法还包括:所述第一设备和所述第二设备预定密钥交换算法;
    以便所述第一设备利用第二设备的公钥生成第一共享密钥,将用于得到第一共享密钥的信息发送给第二设备包括:以便所述第一设备利用第二设备的公钥和自身的私钥按照所述密钥交换算法生成第一共享密钥,并将第一设备的公钥发送给所述第二设备;
    以便所述第二设备利用自身的私钥以及用于得到第一共享密钥的信息生成所述第一共享密钥包括:以便所述第二设备利用自身的私钥以及所述第一设备的公钥按照所述密钥交换算法生成第一共享密钥。
  22. 根据权利要求21所述的方法,其特征在于,所述第一设备和所述第二设备预定共享密钥交换算法包括:
    所述第一设备和所述第二设备上预先配置有所述密钥交换算法所使用的参数;或者,
    所述配置设备将所述密钥交换算法所使用的参数发送给所述第一设备和所述第二设备。
  23. 根据权利要求17至22任一权项所述的方法,该方法还包括:所述配置设备获取第一设备的公钥;
    所述配置设备将所述第二设备的公钥发送给第一设备包括:所述配置设备利用所述第一设备的公钥加密所述第二设备的公钥,将加密结果发送给所述第一设备;以便所述第一设备对所述加密结果进行解密,得到所述第二设备的公钥。
  24. 根据权利要求17至22任一权项所述的方法,该方法还包括:所述配置设备与所述第一设备建立安全连接以生成第二共享密钥;
    将所述第二设备的公钥发送给第一设备包括:所述配置设备利用所述第二共享密钥将所述第二设备的公钥进行加密后,将加密结果发送给所述第一设备;以便所述第一设备利用所述第二共享密钥对接收到的加密结果进行解密后,得到所述第二设备的公钥。
  25. 根据权利要求24所述的方法,其特征在于,所述配置设备与所述第一设备建立安全连接以生成第二共享密钥包括:
    所述配置设备与所述第一设备通过WPS交互方式共享信任状,将所述信任状作为所述第二共享密钥;或者,
    所述配置设备将自身的公钥发送给所述第一设备,所述配置设备和所述第一设备分别利用对方的公钥和自身的私钥按照预先约定的密钥交换算法生成所述第二共享密钥。
  26. 根据权利要求17至25任一权项所述的方法,其特征在于,
    所述第一设备是被注册方enrollee,所述第二设备是registrar,或者所述第一设备是客户端client,所述第二设备是GO,或者所述第一设备是无线终端,所述第二设备是接入点,或者所述第一设备是中心节点,所述第二设备是传感器节点。
  27. 根据权利要求17至26任一权项所述的方法,其特征在于,该方法还包括:所述配置设备获取第二设备的信道信息并发送给所述第一设备;以便所述第一设备根据第二设备的信道信息快速发现所述第二设备,以执行所述将用于得到第一共享密钥的信息发送给第二设备的步骤。
  28. 根据权利要求17至27任一权项所述的方法,其特征在于,所述配置设备通过扫描二维码、通用串行总线USB或者近场通信的方式从所述第一设备或者第二设备获取信息。
  29. 一种密钥配置方法,其特征在于,该方法包括:
    第二设备向配置设备提供第二设备的公钥,以便所述配置设备将所述第二设备的公钥发送给第一设备;
    所述第二设备接收所述第一设备利用所述第二设备的公钥发送来的用于得到第一共享密钥的信息;或者接收所述第一设备利用所述第二设备的公钥生成第一共享密钥后,发送来的用于得到第一共享密钥的信息;
    所述第二设备利用自身的私钥以及所述用于得到第一共享密钥的信息生成所述第一共享密钥,所述第一共享密钥用于所述第一设备和所述第二设备之间的安全连接。
  30. 根据权利要求29所述的方法,其特征在于,所述第二设备接收所述第一设备利用第二设备的公钥发送来的用于得到第一共享密钥的信息包括:所述第二设备接收所述第一设备发送的加密结果,所述加密结果是所述第一设备生成密码,将所述密码作为第一共享密钥,利用所述第二设备的公钥将所述密码进行加密得到的;
    所述第二设备利用自身的私钥以及用于得到第一共享密钥的信息生成所述第一共享密钥包括:所述第二设备利用自身的私钥对所述加密结果进行解密得到所述密码,将所述密码作为第一共享密钥;或者,
    所述第二设备接收所述第一设备利用第二设备的公钥发送来的用于得到第一共享密钥的信息包括:所述第二设备接收所述第一设备发送的加密结果,所述加密结果是所述第一设备生成密码后,利用所述第二设备的公钥将所述密码进行加密得到的;
    所述第二设备利用自身的私钥以及用于得到第一共享密钥的信息生成所述第一共享密钥包括:所述第二设备利用自身的私钥对所述加密结果进行解密得到所述密码,利用所述密钥衍生算法对所述密码生成衍生密钥,将该衍生密钥作为所述第一共享密钥。
  31. 根据权利要求29所述的方法,其特征在于,所述第二设备接收所述第一设备利用第二设备的公钥发送来的用于得到第一共享密钥的信息包括:所述第二设备接收所述第一设备发送的加密结果,所述加密结果是所述第一设备生成随机值,利用第二设备的公钥对该随机值进行加密后得到的,所述第一设备利用第一设备与第二设备约定的信息和该随机值生成第一共享密钥;
    所述第二设备利用自身的私钥以及用于得到第一共享密钥的信息生成所述第一共享密钥包括:所述第二设备利用自身的私钥对所述加密结果进行解密得到所述随机值,利用所述第一设备与第二设备约定的信息和所述随机值生成所述第一共享密钥。
  32. 根据权利要求29所述的方法,其特征在于,所述第二设备接收所述第一设备利用所述第二设备的公钥发送来的用于得到第一共享密钥的信息包括:所述第二设备接收所述第一设备利用第二设备的公钥将第一设备的公钥进行加密后得到的加密结果;
    所述第二设备利用自身的私钥以及所述用于得到第一共享密钥的信息生成所述第一共享密钥包括:所述第二设备利用自身的私钥对所述加密结果进行解密后,得到所述第一设备的公钥,并生成密码,将该密码作为所述第一共享密钥,利用所述第一设备的公钥将该密码进行加密后,将加密结果发送给第一设备;
    以便所述第一设备利用自身的私钥对接收到的加密结果进行解密后,将得到的密码作为所述第一共享密钥。
  33. 根据权利要求29所述的方法,其特征在于,所述方法还包括:所述第二设备和所述第一设备预定密钥交换算法;
    接收所述第一设备利用所述第二设备的公钥生成第一共享密钥后,发送来的用于得到第一共享密钥的信息包括:所述第二设备接收所述第一设备利用第二设备的公钥和自身的私钥按照所述密钥交换算法生成第一共享密钥后,发送来的第一设备的公钥;
    所述第二设备利用自身的私钥以及用于得到第一共享密钥的信息生成所述第一共享密钥包括:所述第二设备利用自身的私钥以及所述第一设备的公钥按照所述密钥交换算法生成第一共享密钥。
  34. 根据权利要求33所述的方法,其特征在于,所述第二设备和所述第一设备预定密钥交换算法包括:
    所述第二设备和所述第一设备上预先配置有所述密钥交换算法所使用的参数;或者,
    所述第二设备和所述第一设备接收所述配置设备发送的所述密钥交换算法所使用的参数。
  35. 根据权利要求29-34任一所述的方法,其特征在于,所述第一共享密钥用于所述第一设备和所述第二设备之间的安全连接包括:
    所述第二设备接收第一设备发送的加密结果,该加密结果是所述第一设备在得到第一共享密钥后,生成信任状,并利用第一共享密钥或第一共享密钥的衍生密钥对信任状进行加密后得到的;所述第二设备利用得到的第一共享密钥或者第一共享密钥的衍生密钥对加密结果进行解密得到所述信任状,所述信任状用于所述第一设备和所述第二设备之间的安全连接;或者,
    所述第二设备在得到第一共享密钥后,生成信任状,并利用第一共享密钥或第一共享密钥的衍生密钥对信任状进行加密后,将加密结果发送给所述第一设备;以便所述第一设备利用得到的第一共享密钥或者第一共享密钥的衍生密钥对该加密结果进行解密得到所述信任状,所述信任状用于所述第一设备和所述第二设备之间的安全连接。
  36. 根据权利要求35所述的方法,其特征在于,若所述第一设备是注册器Registrar、中心节点或者组长设备GO,则由所述第一设备生成所述信任状并将所述信任状的加密结果发送给所述第二设备;
    若所述第二设备是Registrar、中心节点或GO,则由所述第二设备生成所述信任状并将所述信任状的加密结果发送给所述第一设备。
  37. 根据权利要求29至36任一权项所述的方法,其特征在于,该方法还包括:
    所述第二设备将自身的信道信息提供给所述配置设备,以便所述配置设备将第二设备的信道信息发送给所述第一设备;以便所述第一设备根据第二设备的信道信息快速发现所述第二设备,以执行所述将用于得到第一共享密钥的信息发送给第二设备的步骤。
  38. 根据权利要求29至37任一权项所述的方法,其特征在于,所述第二设备或者所述第一设备通过二维码、USB或近场通信的方式供所述配置设备获取信息。
  39. 根据权利要求29至38任一权项所述的方法,其特征在于,该方法还包括:
    所述第二设备接收所述第一设备利用第二设备的公钥生成的验证值,所述第二设备利用自身的公钥对接收到的验证值进行验证,在验证通过的情况下,执行生成所述第一共享密钥的步骤。
  40. 一种密钥配置装置,设置于第一设备中,其特征在于,该密钥配置装置包括:
    配置接收单元,用于接收配置设备在获取到第二设备的公钥后发送的第二设备的公钥;
    密钥处理单元,用于利用所述第二设备的公钥将用于得到第一共享密钥的信息发送给所述第二设备;或者利用所述第二设备的公钥生成第一共享密钥,将用于得到所述第一共享密钥的信息发送给所述第二设备;以便所述第二设备利用自身的私钥以及所述用于得到第一共享密钥的信息生成所述第一共享密钥,所述第一共享密钥用于所述第一设备和所述第二设备之间的安全连接。
  41. 根据权利要求40所述的密钥配置装置,其特征在于,所述密钥处理单元,具体用于生成密码,将所述密码作为第一共享密钥,利用所述第二设备的公钥将所述密码进行加密得到加密结果,将所述加密结果发送给所述第二设备,以便所述第二设备利用自身的私钥对所述加密结果进行解密得到所述密码,将所述密码作为第一共享密钥;或者,
    所述密钥处理单元,具体用于生成密码,利用所述第二设备的公钥将所述密码进行加密得到加密结果,将所述加密结果发送给所述第二设备,利用密钥衍生算法对所述密码生成衍生密钥,将该衍生密钥作为第一共享密钥,以便所述第二设备利用自身的私钥对所述加密结果进行解密得到所述密码,利用所述密钥衍生算法对所述密码生成衍生密钥,将该衍生密钥作为所述第一共享密钥。
  42. 根据权利要求40所述的密钥配置装置,其特征在于,所述密钥处理单元,具体用于生成随机值,利用第一设备与第二设备约定的信息和该随机值生成第一共享密钥,利用第二设备的公钥对该随机值进行加密后,将加密结果发送给第二设备,以便所述第二设备利用自身的私钥对所述加密结果进行解密得到所述随机值,利用所述第一设备与第二设备约定的信息和所述随机值生成所述第一共享密钥。
  43. 根据权利要求40所述的密钥配置装置,其特征在于,所述密钥处理单元,具体用于利用第二设备的公钥将第一设备的公钥进行加密后,将加密结果发送给第二设备;接收所述第二设备发送的加密结果,该加密结果是所述第二设备利用自身的私钥对接收到的加密结果进行解密后,得到所述第一设备的公钥,并且生成密码,将该密码作为所述第一共享密钥,利用所述第一设备的公钥将该密码进行加密后得到的;利用自身的私钥对接收到的加密结果进行解密后,将得到的密码作为所述第一共享密钥。
  44. 根据权利要求40所述的密钥配置装置,其特征在于,所述密钥处理单元,具体用于利用第二设备的公钥和自身的私钥按照所述第一设备和所述第二设备预定的密钥交换算法生成第一共享密钥,并将第一设备的公钥发送给所述第二设备,以便所述第二设备利用自身的私钥以及所述第一设备的公钥按照所述密钥交换算法生成第一共享密钥。
  45. 根据权利要求44所述的密钥配置装置,其特征在于,所述密钥处理单元预先配置有所述密钥交换算法所使用的参数;
    或者,所述配置接收单元,还用于接收所述配置设备发送的所述密钥交换算法所使用的参数,并提供给所述密钥处理单元。
  46. 根据权利要求40-45任一所述的密钥配置装置,其特征在于,该密钥配置装置还包括:
    安全连接单元,用于在所述密钥处理单元得到第一共享密钥后,生成信任状,并利用第一共享密钥或第一共享密钥的衍生密钥对信任状进行加密后,将加密结果发送给所述第二设备;以便所述第二设备利用得到的第一共享密钥或者第一共享密钥的衍生密钥对加密结果进行解密得到所述信任状,所述信任状用于所述第一设备和所述第二设备之间的安全连接;或者,用于利用得到的第一共享密钥或者第一共享密钥的衍生密钥对所述第二设备发送的信任状的加密结果进行解密得到所述信任状,所述信任状的加密结果为所述第二设备在得到第一共享密钥后,生成信任状,并利用第一共享密钥或第一共享密钥的衍生密钥对所述信任状进行加密后得到,所述信任状用于所述第一设备和所述第二设备之间的安全连接。
  47. 根据权利要求40-46任一所述的密钥配置装置,其特征在于,所述配置接收单元,具体用于接收配置设备在获取到所述第二设备的公钥和所述第一设备的公钥后发送的加密结果,所述加密结果为所述配置设备利用所述第一设备的公钥加密的所述第二设备的公钥;
    所述密钥处理单元,还用于对所述加密结果进行解密,得到所述第二设备的公钥。
  48. 根据权利要求40至46任一权项所述的密钥配置装置,其特征在于,所述配置接收单元,具体用于与所述配置设备建立安全连接以生成第二共享密钥;接收所述配置设备在获取到第二设备的公钥后发送的加密结果,所述加密结果为所述配置设备利用所述第二共享密钥加密的所述第二设备的公钥;
    所述密钥处理单元,还用于利用所述第二共享密钥对接收到的所述加密结果进行解密后,得到所述第二设备的公钥。
  49. 根据权利要求48所述的密钥配置装置,其特征在于,所述配置接收单元在与所述配置设备建立安全连接以生成第二共享密钥时,具体与所述配置设备通过无线保真安全建立WPS交互方式共享信任状,将所述信任状作为所述第二共享密钥;或者,具体接收所述配置设备发送的所述配置设备的公钥,所述第一设备利用所述配置设备的公钥和自身的私钥按照预先约定的密钥交换算法生成所述第二共享密钥。
  50. 根据权利要求44所述的密钥配置装置,其特征在于,所述密钥处理单元在得到所述第二设备的公钥之后,还用于生成新的公钥和新的私钥;
    所述第一设备发送给所述第二设备的第一设备的公钥为所述新的公钥;所述第二设备在生成所述第一共享密钥时利用的第一设备的公钥为所述新的公钥;所述第一设备在生成所述第一共享密钥时利用的自身的私钥为所述新的私钥。
  51. 根据权利要求40至50任一权项所述的密钥配置装置,其特征在于,所述第一设备是被注册方enrollee,所述第二设备是registrar,或者所述第一设备是客户端client,所述第二设备是GO,或者所述第一设备是无线终端,所述第二设备是接入点,或者所述第一设备是中心节点,所述第二设备是传感器节点。
  52. 根据权利要求40至51任一权项所述的密钥配置装置,其特征在于,所述配置接收单元,还用于接收所述配置设备从所述第二设备获取后发送来的第二设备的信道信息;
    所述密钥处理单元根据第二设备的信道信息快速发现所述第二设备,以执行所述将用于得到第一共享密钥的信息发送给第二设备的操作。
  53. 根据权利要求40至52任一权项所述的密钥配置装置,其特征在于,所述密钥处理单元,还用于利用所述第二设备的公钥生成验证值,将所述验证值发送给所述第二设备;以便所述第二设备在生成所述第一共享密钥之前,利用自身的公钥对接收到的验证值进行验证,在验证通过的情况下,执行生成所述第一共享密钥的操作。
  54. 一种密钥配置装置,设置于配置设备中,其特征在于,该密钥配置装置包括:
    信息获取单元,用于获取第二设备的公钥;
    信息发送单元,用于将所述第二设备的公钥发送给第一设备;
    以便所述第一设备利用所述第二设备的公钥将用于得到第一共享密钥的信息发送给所述第二设备;或者以便所述第一设备利用所述第二设备的公钥生成第一共享密钥,将用于得到第一共享密钥的信息发送给所述第二设备;
    以便所述第二设备利用自身的私钥以及所述用于得到第一共享密钥的信息生成所述第一共享密钥,所述第一共享密钥用于所述第一设备和所述第二设备之间的安全连接。
  55. 根据权利要求54所述的密钥配置装置,其特征在于,所述信息发送单元,还用于将密钥交换算法所使用的参数发送给所述第一设备和所述第二设备,所述密钥交换算法用于所述第一设备和所述第二设备利用自身的私钥和对方的公钥按照所述密钥交换算法生成第一共享密钥。
  56. 根据权利要求54或55所述的密钥配置装置,其特征在于,所述信息获取单元,还用于获取第一设备的公钥;
    所述信息发送单元,具体用于利用所述第一设备的公钥加密所述第二设备的公钥,将加密结果发送给所述第一设备,以便所述第一设备对所述加密结果进行解密,得到所述第二设备的公钥。
  57. 根据权利要求54或55所述的密钥配置装置,其特征在于,所述信息发送单元,还用于与所述第一设备建立安全连接以生成第二共享密钥;在将所述第二设备的公钥发送给第一设备时,具体利用所述第二共享密钥将所述第二设备的公钥进行加密后,将加密结果发送给所述第一设备,以便所述第一设备利用所述第二共享密钥对接收到的加密结果进行解密后,得到所述第二设备的公钥。
  58. 根据权利要求57所述的密钥配置装置,其特征在于,所述信息发送单元在与所述第一设备建立安全连接以生成第二共享密钥时,具体用于与所述第一设备通过WPS交互方式共享信任状,将所述信任状作为所述第二共享密钥;或者,将自身的公钥发送给所述第一设备,利用第一设备的公钥和自身的私钥按照预先约定的密钥交换算法生成所述第二共享密钥。
  59. 根据权利要求54至58任一权项所述的密钥配置装置,其特征在于,所述信息获取单元,还用于获取第二设备的信道信息;
    所述信息发送单元,还用于将所述第二设备的信道信息发送给所述第一设备,以便所述第一设备根据第二设备的信道信息快速发现所述第二设备,以执行所述将用于得到第一共享密钥的信息发送给第二设备的操作。
  60. 根据权利要求54至59任一权项所述的密钥配置装置,其特征在于,所述信息获取单元,具体用于通过扫描二维码、通用串行总线USB或者近场通信的方式从所述第一设备或者第二设备获取信息。
  61. 一种密钥配置装置,设置于第二设备中,其特征在于,该密钥配置装置包括:
    信息提供单元,用于向配置设备提供第二设备的公钥,以便所述配置设备将所述第二设备的公钥发送给第一设备;
    信息接收单元,用于接收所述第一设备利用所述第二设备的公钥发送来的用于得到第一共享密钥的信息;或者接收所述第一设备利用所述第二设备的公钥生成第一共享密钥后,发送来的用于得到第一共享密钥的信息;
    密钥处理单元,用于利用自身的私钥以及所述用于得到第一共享密钥的信息生成所述第一共享密钥,所述第一共享密钥用于所述第一设备和所述第二设备之间的安全连接。
  62. 根据权利要求61所述的密钥配置装置,其特征在于,所述信息接收单元,具体用于接收所述第一设备发送的加密结果,所述加密结果是所述第一设备生成密码,将所述密码作为第一共享密钥,利用所述第二设备的公钥将所述密码进行加密得到的;
    所述密钥处理单元,具体用于利用自身的私钥对所述加密结果进行解密得到所述密码,将所述密码作为第一共享密钥;或者,
    所述信息接收单元,具体用于接收所述第一设备发送的加密结果,所述加密结果是所述第一设备生成密码后,利用所述第二设备的公钥将所述密码进行加密得到的;
    所述密钥处理单元,具体用于利用自身的私钥对所述加密结果进行解密得到所述密码,利用所述密钥衍生算法对所述密码生成衍生密钥,将该衍生密钥作为所述第一共享密钥。
  63. 根据权利要求61所述的密钥配置装置,其特征在于,所述信息接收单元,具体用于接收所述第一设备发送的加密结果,所述加密结果是所述第一设备生成随机值,利用第二设备的公钥对该随机值进行加密后得到的,所述第一设备利用第一设备与第二设备约定的信息和该随机值生成第一共享密钥;
    所述密钥处理单元,具体用于利用自身的私钥对所述加密结果进行解密得到所述随机值,利用所述第一设备与第二设备约定的信息和所述随机值生成所述第一共享密钥。
  64. 根据权利要求61所述的密钥配置装置,其特征在于,所述信息接收单元,具体用于接收所述第一设备利用第二设备的公钥将第一设备的公钥进行加密后得到的加密结果;
    所述密钥处理单元,具体用于利用自身的私钥对所述加密结果进行解密后,得到所述第一设备的公钥,并生成密码,将该密码作为所述第一共享密钥,利用所述第一设备的公钥将该密码进行加密后,将加密结果发送给第一设备,以便所述第一设备利用自身的私钥对接收到的加密结果进行解密后,将得到的密码作为所述第一共享密钥。
  65. 根据权利要求61所述的密钥配置装置,其特征在于,所述信息接收单元,具体用于接收所述第一设备利用第二设备的公钥和自身的私钥按照密钥交换算法生成第一共享密钥后,发送来的第一设备的公钥;所述密钥交换算法是所述第一设备和所述第二设备预定的;
    所述密钥处理单元,具体用于利用自身的私钥以及所述第一设备的公钥按照所述密钥交换算法生成第一共享密钥。
  66. 根据权利要求65所述的密钥配置装置,其特征在于,所述密钥处理单元预先配置有所述密钥交换算法所使用的参数;或者,
    所述信息接收单元,还用于接收所述配置设备发送的所述密钥交换算法所使用的参数,并提供给所述密钥处理单元。
  67. 根据权利要求61-66任一所述的密钥配置装置,其特征在于,该密钥配置装置还包括:
    安全连接单元,用于接收第一设备发送的加密结果,该加密结果是所述第一设备在得到第一共享密钥后,生成信任状,并利用第一共享密钥或第一共享密钥的衍生密钥对信任状进行加密后得到的;利用得到的第一共享密钥或者第一共享密钥的衍生密钥对加密结果进行解密得到所述信任状,所述信任状用于所述第一设备和所述第二设备之间的安全连接;或者,
    用于在所述密钥处理单元得到第一共享密钥后,生成信任状,并利用第一共享密钥或第一共享密钥的衍生密钥对信任状进行加密后,将加密结果发送给所述第一设备;以便所述第一设备利用得到的第一共享密钥或者第一共享密钥的衍生密钥对加密结果进行解密得到所述信任状,所述信任状用于所述第一设备和所述第二设备之间的安全连接。
  68. 根据权利要求61至67任一权项所述的密钥配置装置,其特征在于,所述信息提供单元,还用于将第二设备的信道信息提供给所述配置设备,以便所述配置设备将第二设备的信道信息发送给所述第一设备;以便所述第一设备根据第二设备的信道信息快速发现所述第二设备,以执行所述将用于得到第一共享密钥的信息发送给第二设备的操作。
  69. 根据权利要求61至68任一权项所述的密钥配置装置,其特征在于,所述信息提供单元,具体用于通过二维码、USB或近场通信的方式向所述配置设备提供信息。
  70. 根据权利要求61至68任一权项所述的密钥配置装置,其特征在于,所述信息接收单元,还用于接收所述第一设备利用第二设备的公钥生成的验证值;
    所述密钥处理单元,还用于利用自身的公钥对接收到的验证值进行验证,在验证通过的情况下,执行生成所述第一共享密钥的操作。
  71. 一种密钥配置系统,其特征在于,该密钥配置系统包括:如权利要求40所述的密钥配置装置、如权利要求54所述的密钥配置装置以及如权利要求61所述的密钥配置装置;或者,
    如权利要求41所述的密钥配置装置、如权利要求54所述的密钥配置装置以及如权利要求62所述的密钥配置装置;或者,
    如权利要求42所述的密钥配置装置、如权利要求54所述的密钥配置装置以及如权利要求63所述的密钥配置装置;或者,
    如权利要求43所述的密钥配置装置、如权利要求54所述的密钥配置装置以及如权利要求64所述的密钥配置装置;或者,
    如权利要求44所述的密钥配置装置、如权利要求54所述的密钥配置装置以及如权利要求65所述的密钥配置装置;或者,
    如权利要求45所述的密钥配置装置、如权利要求55所述的密钥配置装置以及如权利要求66所述的密钥配置装置;或者,
    如权利要求46所述的密钥配置装置、如权利要求54所述的密钥配置装置以及如权利要求67所述的密钥配置装置;或者,
    如权利要求47所述的密钥配置装置、如权利要求56所述的密钥配置装置以及如权利要求61-67任一所述的密钥配置装置;或者,
    如权利要求48所述的密钥配置装置、如权利要求57所述的密钥配置装置以及如权利要求61至67任一权项所述的密钥配置装置;或者,
    如权利要求49所述的密钥配置装置、如权利要求58所述的密钥配置装置以及如权利要求61至67任一权项所述的密钥配置装置;或者,
    如权利要求50所述的密钥配置装置、如权利要求54所述的密钥配置装置以及如权利要求65所述的密钥配置装置;或者,
    如权利要求51所述的密钥配置装置、如权利要求54至58任一权项所述的密钥配置装置以及如权利要求61至67任一权项所述的密钥配置装置;或者,
    如权利要求52所述的密钥配置装置、如权利要求59所述的密钥配置装置以及如权利要求68所述的密钥配置装置;或者,
    如权利要求53所述的密钥配置装置、如权利要求54至59任一权项所述的密钥配置装置以及如权利要求70所述的密钥配置装置;或者,
    如权利要求40至53任一权项所述的密钥配置装置、如权利要求60所述的密钥配置装置以及如权利要求69所述的密钥配置装置。
PCT/CN2013/086247 2013-10-30 2013-10-30 一种密钥配置方法、系统和装置 WO2015061992A1 (zh)

Priority Applications (8)

Application Number Priority Date Filing Date Title
EP13896341.8A EP3065334A4 (en) 2013-10-30 2013-10-30 BUTTON CONFIGURATION METHOD, SYSTEM AND APPARATUS
PCT/CN2013/086247 WO2015061992A1 (zh) 2013-10-30 2013-10-30 一种密钥配置方法、系统和装置
AU2013404506A AU2013404506A1 (en) 2013-10-30 2013-10-30 Key configuration method, system and apparatus
JP2016550902A JP2016540462A (ja) 2013-10-30 2013-10-30 鍵コンフィギュレーション方法、システム、および装置
KR1020167014319A KR20160078475A (ko) 2013-10-30 2013-10-30 키 구성 방법, 시스템, 및 장치
CA2929173A CA2929173A1 (en) 2013-10-30 2013-10-30 Key configuration method, system, and apparatus
CN201380080528.8A CN105723648B (zh) 2013-10-30 2013-10-30 一种密钥配置方法、系统和装置
US15/143,204 US20160269176A1 (en) 2013-10-30 2016-04-29 Key Configuration Method, System, and Apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2013/086247 WO2015061992A1 (zh) 2013-10-30 2013-10-30 一种密钥配置方法、系统和装置

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US15/143,204 Continuation US20160269176A1 (en) 2013-10-30 2016-04-29 Key Configuration Method, System, and Apparatus

Publications (1)

Publication Number Publication Date
WO2015061992A1 true WO2015061992A1 (zh) 2015-05-07

Family

ID=53003122

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/086247 WO2015061992A1 (zh) 2013-10-30 2013-10-30 一种密钥配置方法、系统和装置

Country Status (8)

Country Link
US (1) US20160269176A1 (zh)
EP (1) EP3065334A4 (zh)
JP (1) JP2016540462A (zh)
KR (1) KR20160078475A (zh)
CN (1) CN105723648B (zh)
AU (1) AU2013404506A1 (zh)
CA (1) CA2929173A1 (zh)
WO (1) WO2015061992A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2018525939A (ja) * 2015-08-24 2018-09-06 華為技術有限公司Huawei Technologies Co.,Ltd. セキュリティ認証方法、構成方法、および関連デバイス
US20230198768A1 (en) * 2020-11-10 2023-06-22 Okta, Inc. Efficient transfer of authentication credentials between client devices

Families Citing this family (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012170446A2 (en) 2011-06-05 2012-12-13 Apple Inc. Systems and methods for displaying notifications received from multiple applications
WO2014143776A2 (en) 2013-03-15 2014-09-18 Bodhi Technology Ventures Llc Providing remote interactions with host device using a wireless device
US11343335B2 (en) 2014-05-29 2022-05-24 Apple Inc. Message processing by subscriber app prior to message forwarding
TWI647608B (zh) 2014-07-21 2019-01-11 美商蘋果公司 遠端使用者介面
US9547419B2 (en) 2014-09-02 2017-01-17 Apple Inc. Reduced size configuration interface
US10254911B2 (en) * 2015-03-08 2019-04-09 Apple Inc. Device configuration user interface
US9633659B1 (en) * 2016-01-20 2017-04-25 Motorola Mobility Llc Method and apparatus for voice enrolling an electronic computing device
JP6776023B2 (ja) * 2016-06-30 2020-10-28 キヤノン株式会社 通信装置、通信方法、及びプログラム
US10445109B2 (en) * 2016-06-30 2019-10-15 Digicert, Inc. Automated propagation of server configuration on a server cluster
FR3054056B1 (fr) * 2016-07-13 2018-06-29 Safran Identity & Security Procede de mise en relation securisee d'un premier dispositif avec un deuxieme dispositif
US10230700B2 (en) * 2016-08-09 2019-03-12 Lenovo (Singapore) Pte. Ltd. Transaction based message security
JP6746427B2 (ja) * 2016-08-10 2020-08-26 キヤノン株式会社 通信装置、通信方法、及びプログラム
SG10201609247YA (en) 2016-11-04 2018-06-28 Huawei Int Pte Ltd System and method for configuring a wireless device for wireless network access
US11200488B2 (en) * 2017-02-28 2021-12-14 Cisco Technology, Inc. Network endpoint profiling using a topical model and semantic analysis
US20180310176A1 (en) * 2017-04-24 2018-10-25 Osram Sylvania Inc. Methods and Systems For Authenticating a Device to a Wireless Network
CN109246581A (zh) * 2017-05-17 2019-01-18 北京京东尚科信息技术有限公司 一种通信的方法和装置
US11044771B2 (en) * 2018-01-19 2021-06-22 Telefonaktiebolaget Lm Ericsson (Publ) Method and device for sharing an established connection between a primary device and one of a plurality of secondary devices in a network
US10587400B2 (en) * 2018-02-12 2020-03-10 Afero, Inc. System and method for securely configuring a new device with network credentials
US10887193B2 (en) 2018-06-03 2021-01-05 Apple Inc. User interfaces for updating network connection settings of external devices
WO2019235802A1 (ko) * 2018-06-04 2019-12-12 엘지전자 주식회사 블루투스 기기를 통한 사용자 인증 방법 및 이를 위한 장치
KR102393717B1 (ko) 2019-05-06 2022-05-03 애플 인크. 전자 디바이스의 제한된 동작
TWI714100B (zh) * 2019-05-24 2020-12-21 魏文科 利用非對稱式加密演算法建立、驗證輸入值的方法及其應用方法
DK201970533A1 (en) 2019-05-31 2021-02-15 Apple Inc Methods and user interfaces for sharing audio
US11481094B2 (en) 2019-06-01 2022-10-25 Apple Inc. User interfaces for location-related communications
US11477609B2 (en) 2019-06-01 2022-10-18 Apple Inc. User interfaces for location-related communications
CN113099451A (zh) * 2020-01-07 2021-07-09 上海诺基亚贝尔股份有限公司 用于连接到网络的方法、设备、装置和计算机可读介质
CN111327605B (zh) * 2020-01-23 2022-09-13 北京无限光场科技有限公司 传输私密信息的方法、终端、服务器和系统
WO2021150082A1 (ko) * 2020-01-23 2021-07-29 주식회사 피에스디엘 보안 장치 및 보안 프로그램
CN111404950B (zh) * 2020-03-23 2021-12-10 腾讯科技(深圳)有限公司 一种基于区块链网络的信息共享方法、装置和相关设备
CN112073193B (zh) * 2020-09-07 2022-06-07 江苏徐工工程机械研究院有限公司 信息安全处理方法、装置和系统、工程车辆
US20220294610A1 (en) * 2021-03-10 2022-09-15 Epifi Technologies Private Limited Methods, systems and computer program products for secure encryption of data for transmission via an untrusted intermediary

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070118735A1 (en) * 2005-11-10 2007-05-24 Jeff Cherrington Systems and methods for trusted information exchange
CN101267301A (zh) * 2007-03-15 2008-09-17 上海贝尔阿尔卡特股份有限公司 通信网络中基于身份的认证和密钥协商方法及装置
CN101582906A (zh) * 2009-06-23 2009-11-18 中国人民解放军信息工程大学 密钥协商方法和装置

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001175467A (ja) * 1999-12-07 2001-06-29 Kizna.Com Inc コンピュータのセキュリティー確保方法及びそのプログラムを記録した媒体
JP3904011B2 (ja) * 2004-09-03 2007-04-11 大豊工業株式会社 半球状シューの製造方法
US7545932B2 (en) * 2004-10-29 2009-06-09 Thomson Licensing Secure authenticated channel
WO2007018476A1 (en) * 2005-08-11 2007-02-15 Nss Msc Sdn Bhd Hybrid cryptographic approach to mobile messaging
EP1963986A2 (en) * 2005-09-28 2008-09-03 Ontela Inc. Method and system for establishing a service- application execution environment in a hetergoneous, distributed computing system nad a user-friendly data-transfer service application executing within the service-application execution environment
CN101150849B (zh) * 2006-09-18 2010-09-08 华为技术有限公司 生成绑定管理密钥的方法、系统、移动节点及通信节点
KR100872817B1 (ko) * 2006-12-07 2008-12-09 인하대학교 산학협력단 변형 디피 헬만 기반 키교환 방법
US8478988B2 (en) * 2007-05-15 2013-07-02 At&T Intellectual Property I, L.P. System and method for authentication of a communication device
JP5159700B2 (ja) * 2009-05-19 2013-03-06 キヤノン株式会社 光学装置及び焦点検出方法
US8280408B2 (en) * 2009-07-17 2012-10-02 At&T Intellectual Property I, Lp Methods, systems and computer program products for tailoring advertisements to a user based on actions taken using a portable electronic device
EP2439238B1 (en) * 2010-10-06 2012-12-05 Borealis AG Polypropylene with living hinge properties

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070118735A1 (en) * 2005-11-10 2007-05-24 Jeff Cherrington Systems and methods for trusted information exchange
CN101267301A (zh) * 2007-03-15 2008-09-17 上海贝尔阿尔卡特股份有限公司 通信网络中基于身份的认证和密钥协商方法及装置
CN101582906A (zh) * 2009-06-23 2009-11-18 中国人民解放军信息工程大学 密钥协商方法和装置

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
"WiFi (Wireless Fidelity, wireless fidelity", 1997, WIRELESS LOCAL AREA NETWORK STANDARD IEEE802.11
See also references of EP3065334A4

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2018525939A (ja) * 2015-08-24 2018-09-06 華為技術有限公司Huawei Technologies Co.,Ltd. セキュリティ認証方法、構成方法、および関連デバイス
US11343104B2 (en) 2015-08-24 2022-05-24 Huawei Technologies Co., Ltd. Method for establishing secured connection, and related device
US20230198768A1 (en) * 2020-11-10 2023-06-22 Okta, Inc. Efficient transfer of authentication credentials between client devices
US11943366B2 (en) * 2020-11-10 2024-03-26 Okta, Inc. Efficient transfer of authentication credentials between client devices

Also Published As

Publication number Publication date
EP3065334A4 (en) 2016-11-09
JP2016540462A (ja) 2016-12-22
KR20160078475A (ko) 2016-07-04
CA2929173A1 (en) 2015-05-07
AU2013404506A1 (en) 2016-06-02
US20160269176A1 (en) 2016-09-15
EP3065334A1 (en) 2016-09-07
CN105723648A (zh) 2016-06-29
CN105723648B (zh) 2019-06-18

Similar Documents

Publication Publication Date Title
WO2015061992A1 (zh) 一种密钥配置方法、系统和装置
WO2015061941A1 (zh) 一种密钥配置方法和装置
WO2017039320A1 (ko) 통신 시스템에서 프로파일 다운로드 방법 및 장치
WO2016178548A1 (ko) 프로파일 제공 방법 및 장치
WO2020171672A1 (en) Method for interoperating between bundle download process and esim profile download process by ssp terminal
WO2016163796A1 (en) Method and apparatus for downloading a profile in a wireless communication system
WO2019050325A1 (en) METHOD AND APPARATUS FOR SUPPORTING PROFILE TRANSFER BETWEEN DEVICES IN A WIRELESS COMMUNICATION SYSTEM
WO2016167536A1 (en) Method and apparatus for managing a profile of a terminal in a wireless communication system
WO2018135919A1 (en) Apparatus and method for providing and managing security information in communication system
WO2021167399A1 (en) Apparatus and method of generating application specific keys using key derived from network access authentication
EP3284274A1 (en) Method and apparatus for managing a profile of a terminal in a wireless communication system
WO2015027485A1 (zh) 远程变更签约方法及其装置
WO2019216739A1 (en) Security protection method and apparatus in wireless communication system
EP3520363A1 (en) Apparatus and method for providing and managing security information in communication system
WO2020080909A1 (en) Method and apparatus for handling remote profile management exception
WO2019107876A1 (en) Method and apparatus for managing event in communication system
WO2022045789A1 (en) Method and apparatus for recovering profile in case of device change failure
WO2020184995A1 (ko) Euicc 단말을 변경하는 방법 및 장치
WO2022030960A1 (en) Apparatus and methods for linkage of or profile transfer between devices
WO2022149874A1 (en) Method and system of authentication and authorization in an msgin5g server
EP3854115A1 (en) Method and apparatus for handling remote profile management exception
WO2016048054A2 (ko) 데이터 통신 보안을 위한 방법, 장치 및 시스템
WO2019235802A1 (ko) 블루투스 기기를 통한 사용자 인증 방법 및 이를 위한 장치
WO2022158731A1 (ko) 데이터 패스를 셋업하는 전자 장치 및 그 동작 방법
WO2022065816A1 (en) Method and apparatus for moving profiles with different versions during device change

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13896341

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2929173

Country of ref document: CA

ENP Entry into the national phase

Ref document number: 2016550902

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

REEP Request for entry into the european phase

Ref document number: 2013896341

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2013896341

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 20167014319

Country of ref document: KR

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 2013404506

Country of ref document: AU

Date of ref document: 20131030

Kind code of ref document: A

REG Reference to national code

Ref country code: BR

Ref legal event code: B01A

Ref document number: 112016009744

Country of ref document: BR

ENP Entry into the national phase

Ref document number: 112016009744

Country of ref document: BR

Kind code of ref document: A2

Effective date: 20160429