WO2016053184A1 - Key generation method and device - Google Patents

Key generation method and device Download PDF

Info

Publication number
WO2016053184A1
WO2016053184A1 PCT/SG2015/050330 SG2015050330W WO2016053184A1 WO 2016053184 A1 WO2016053184 A1 WO 2016053184A1 SG 2015050330 W SG2015050330 W SG 2015050330W WO 2016053184 A1 WO2016053184 A1 WO 2016053184A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
identity
random number
module
key generation
Prior art date
Application number
PCT/SG2015/050330
Other languages
French (fr)
Inventor
Tieyan Li
Qinqin YANG
Original Assignee
Huawei International Pte. Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei International Pte. Ltd. filed Critical Huawei International Pte. Ltd.
Publication of WO2016053184A1 publication Critical patent/WO2016053184A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these

Definitions

  • the present invention relates to the field of communication security, and in particular, to a key generation method and device.
  • An existing smart system includes multiple functions such as remote control, and secure interconnection and secure communication between devices, and provides a more convenient living environment for the user.
  • a digital certificate is installed in an access device, so that access control is performed on a device to be accessed.
  • the access device may agree upon a session key with the device to be accessed, and encrypt communication data according to the session key that is obtained by means of agreement.
  • Embodiments of the present invention provide a key generation method and device, which are used to solve a problem that a cost of generating a key by using a digital certificate is too high when access control is performed on a smart device and secure communication is performed between devices.
  • the present invention provides a key generation device, where the device includes a Read Only Memory (ROM) module, a data communication module, a cache module, and a key storage module, where the ROM module is configured to store a device identity of the device; the data communication module is configured to read, from a ROM module of a second device, a second device identity of the second device, receive a second random number sent by the second device, and send a first random number generated by the device to the second device; the cache module is configured to cache the second device identity read by the data communication module and the received second random number; and the key storage module is configured to store a correspondence between a shared key generated by the device and the second device identity of the second device; and the device further includes a key negotiation module and a key generation module, where:
  • the key negotiation module is configured to generate the first random number, and provide a key generation mode for the key generation module
  • the device further includes an encryption/decryption module, where:
  • the data communication module is further configured to receive communication information sent by a target device connected to the device, and receive communication information sent by the second device;
  • the encryption/decryption module is configured to encrypt, by using the stored shared key corresponding to the second device identity of the second device, the received communication information sent by the target device connected to the device, and send the encrypted communication information to the second device; and decrypt, by using the stored shared key corresponding to the second device identity of the second device, the received communication information sent by the second device, and transmit the decrypted communication information to the target device connected to the device.
  • the data communication module is further configured to send the generated random number to the second device by using an electrical path formed when housings of the device and the second device are in contact with each other and by using a single-wire protocol.
  • the key storage module is further configured to query, according to the read second device identity, a key table for the shared key corresponding to the read second device identity, and delete the shared key corresponding to the read second device identity from the key table.
  • first device and the second device when housings of a first device and a second device are in contact with each other, reading, by the first device, a second device identity of the second device, and generating a first random number; and reading, by the second device, a device identity of the first device, and generating a second random number, where the first device and the second device are key generation devices that have same functions except for different device identities;
  • the sending, by the first device, the generated first random number to the second device includes:
  • the method further includes:
  • the present invention provides a key revocation method for the foregoing key generation method, the method is applied to a key generation device, where the key generation device has a housing capable of performing data transmission with an internal component, and is configured with a unique device identity; and the method includes:
  • key generation is completed by using a method, where: based on the key generation device that has a housing capable of performing data transmission with an internal component and is configured with a unique device identity, when housings of two key generation devices are in contact with each other, each key generation device generates a random number, and exchanges the generated random number, then generates a same shared key according to an agreed key generation method and random numbers generated by the two key generation devices, and then identifies and stores the shared key of the two key generation devices according to the device identities of the key generation devices. Therefore, data exchange can be performed between the key generation devices in a housing contact manner.
  • FIG. 2 is a schematic diagram of an apparatus of another key generation device according to an embodiment of the present invention.
  • FIG. 4 is a schematic structural diagram of a key generation device according to an embodiment of the present invention.
  • FIG. 5 is a flowchart of a method for sending and receiving communication information by a key generation device according to an embodiment of the present invention.
  • FIG. 6 is a flowchart of a method for deleting and updating a shared key by a key generation device according to an embodiment of the present invention.
  • the device includes a ROM module 11, a data communication module 12, a cache module 13, and a key storage module 14, where the ROM module 11 is configured to store a device identity of the device; the data communication module 12 is configured to read, from a ROM module of a second device, a second device identity of the second device, receive a second random number sent by the second device, and send a first random number generated by the device to the second device; the cache module 13 is configured to cache the second device identity read by the data communication module and the received second random number; the key storage module 14 is configured to store a correspondence between a shared key generated by the device and the second device identity of the second device; and the device further includes a key negotiation module 15 and a key generation module 16.
  • the key negotiation module 15 is configured to generate the first random number, and provide a key generation mode for the key generation module 16.
  • the key generation module 16 is configured to generate the shared key by using the key generation mode provided by the key negotiation module 15 and according to the first random number generated by the key negotiation module 15 and the second random number cached in the cache module 13, and store the correspondence between the shared key and the second device identity of the second device into the key storage module 14.
  • the device further includes an encryption/decryption module 17.
  • the data communication module 12 is further configured to receive communication information sent by a target device connected to the device, and receive communication information sent by the second device.
  • the encryption/decryption module 17 is configured to encrypt, by using the stored shared key corresponding to the second device identity of the second device, the received communication information sent by the target device connected to the device, and send the encrypted communication information to the second device; and decrypt, by using the stored shared key corresponding to the second device identity of the second device, the received communication information sent by the second device, and transmit the decrypted communication information to the target device connected to the device.
  • the data communication module 12 is further configured to send the generated random number to the second device by using an electrical path formed when housings of the device and the second device are in contact with each other and by using a single- wire protocol.
  • the key storage module 14 is further configured to query, according to the read second device identity, a key table for the shared key corresponding to the read second device identity, and delete the shared key corresponding to the read second device identity from the key table.
  • key generation is completed by using a method, where: based on the key generation device that has a housing capable of performing data transmission with an internal component and is configured with a unique device identity, when housings of two key generation devices are in contact with each other, each key generation device generates a random number, and exchanges a device identity thereof and the generated random number, then generates a same shared key according to an agreed key generation method and random numbers generated by the two key generation devices, and then stores the shared key according to the device identities of the key generation devices. Therefore, data exchange can be performed between the key generation devices in a housing contact manner.
  • An embodiment of the present invention provides a key generation method, where the method is applied to a key generation device, and the key generation device has a housing capable of performing data transmission with an internal component, and is configured with a unique device identity.
  • a process of the method is shown in FIG. 3 and specifically includes:
  • the first device When housings of a first device and a second device are in contact with each other, the first device reads a device identity of the second device, and generates a first random number; and the second device reads a device identity of the first device, and generates a second random number.
  • the first device and the second device are two key generation devices that have same functions except for the configured different device identities.
  • a structure of the key generation device may be preferably as follows: A cylindrical housing made of a stainless steel material is used for packaging; a lateral surface of the housing is used as a ground wire; and two bottom surfaces of the housing are used as a data wire.
  • the housing includes an electronic component with a corresponding function, and the internal electronic component of the housing uses the two bottom surface housings of the housing as a data communication interface. Each bottom surface of the housing has a data contact, and the lateral surface of the housing has an earth contact.
  • the housing may be preferably made of a stainless steel material.
  • the device identity configured for each device may preferably use a mode selected by iButton, that is, use a 64-bit serial number.
  • a sequence is: first 8-bit family code, middle 48-bit serial number, last 8-bit CRC (cyclic redundancy check) check code.
  • the 64 bits are optically lithographed by a manufacturer in a ROM area in a memory of each device, and can only be read but cannot be modified, so that absolute uniqueness and traceability of each device are ensured.
  • each of the two devices reads a device identity of the other device and performs checking. The two devices can perform a subsequent action of generating a shared key only when the checking is passed, otherwise, stop generating a shared key.
  • operations such as data reading and writing and information transmission may be performed by using existing read and write commands and information transmission technologies. Because the housing of the device is connected to an internal corresponding module of the device, corresponding operations may be triggered by touching the housings of the two key generation devices, so as to instantaneously complete data or information exchange.
  • the first device sends the generated first random number to the second device, and the second device sends the generated second random number to the first device.
  • the first device may send the first random number to the second device by using an electrical path formed when single data contacts of the housings of the first device and the second device are in contact with each other and by preferably using a single-wire protocol, or receive the second random number sent by the second device.
  • an electrical path may also be formed between the first device and the second device by simultaneously enabling multiple data contacts to touch with each other, or communication interfaces, such as a USB and a micro USB, are used as communication interfaces for performing information reading, transmission, and data communication, which is not limited herein.
  • the first device and the second device separately generate a shared key between the first device and the second device according to the first random number and the second random number, and algorithms used by the two devices are the same. Therefore, the keys generated by the two devices may be exactly the same.
  • An actual generation mode may be a key generation mode selected by the key generation devices by joint agreement from key generation modes supported by the key generation devices, for generating a shared key, which is not limited by the embodiment of the present invention.
  • the first device stores a correspondence between the generated shared key and the device identity of the second device into a key table of the first device
  • the second device stores a correspondence between the generated shared key and the device identity of the first device into a key table of the second device.
  • the device identity of the key generation device is stored in a correspondence with the generated shared key, so that shared keys of the key generation device and other key generation devices can be distinguished.
  • centralized monitoring may be performed on multiple smart devices by means of downloading an APP in the smart phone for centralized control, for example, control on smart home devices, for example, functions such as turning on an air conditioner, turning off a TV set, and closing a curtain by pressing a button.
  • key generation is completed by using a method, where: based on a key generation device that has a housing capable of performing data transmission with an internal component and is configured with a unique device identity, when housings of two key generation devices are in contact with each other, each key generation device generates a random number, and exchanges the generated random number, then generates a same shared key according to an agreed key generation method and random numbers generated by the two key generation devices, and then stores the shared key according to the device identities of the key generation devices. Therefore, data exchange can be performed between the key generation devices in a housing contact manner.
  • the first device receives communication information sent by a target device connected to the first device.
  • the data path may be implemented by using technologies such as Wi-Fi, Bluetooth, Zigbee, and NFC, or may also be formed by directly connecting data wires such as a USB and micro USB to the data interface of the target device, which is not limited in the embodiment of the present invention.
  • the first device encrypts the received communication information by using a stored shared key corresponding to a device identity of a second device, and sends the encrypted communication information to the second device.
  • the second device receives the communication information sent by the first device, and decrypts the received communication information by using a stored shared key corresponding to a device identity of the first device.
  • the first device receives communication information sent by the target device in which the first device is located, encrypts the received communication information by using the shared key shared with the second device, and then sends the communication information to another key generation device by means of wireless transmission; then after decrypting the communication information by using the shared key generated with the first device, the second device sends the communication information to the target device in which the key generation device is located, thereby completing a process of encrypting communication information to be transmitted by the target device and sending the communication information to a key generation device of another target device, so that the target device can complete a task of encrypting the communication information and sending the communication information by using the key generation device, which provides feasibility for the target device to send communication information to other target devices, and access control is performed on different devices by using different shared keys.
  • an embodiment of the present invention further provides a method for deleting and updating a shared key between key generation devices.
  • a process of the method is shown in FIG. 6, and specifically includes:
  • a first device and a second device separately query, according to a read device identity, a respective key table for a shared key corresponding to the read device identity. If a shared key exists, step 603 is performed; or if no shared key exists, step 602 is performed.
  • the key table is used to store a correspondence between shared keys generated by the first device and other key generation devices, and device identities of the other key generation devices. Before a key is generated every time, the key generation device needs to check, by performing this step, whether the key generation device has generated a shared key between the key generation device and a key generation device that is in contact with the key generation device, and performs a different operation according to a different query result.
  • this step if no shared key is found, it indicates that no shared key exists between the first device and the second device. It may be set that when this result occurs, a shared key needs to be generated by default, and therefore the step of generating a shared key is performed.
  • a shared key If a shared key is found, it indicates that a shared key already exists between the first device and the second device. It may be set that when this result occurs, the shared key between the first device and the second device needs to be cleared by default, and therefore an operation of deleting the shared key is performed.
  • the shared key between the first device and the second device needs to be updated, by means of two contacts, the shared key is deleted by a first contact and a shared key is generated by a second contact, thereby completing the update of the shared key.
  • each of the two key generation devices when housings of two key generation devices are in contact with each other, each of the two key generation devices reads a device identity of the other device and search a key table for a corresponding shared key according to the device identity.
  • a step of generating a shared key is performed; otherwise, the shared key is deleted.
  • the operation can be completed in a re-contact manner. Therefore, a manner of revoking and updating the shared key is simpler and more convenient, which avoids that when a digital certificate is used, the digital certificate needs to be updated by a corresponding organization, thereby improving user experience.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention discloses a key generation method and device, relating to the field of communication security, and used to solve a problem that a cost of generating a key by using a digital certificate is too high when access control is performed on a smart device and secure communication is performed between devices. The method provided by the present invention specifically includes: based on a key generation device that has a housing capable of performing data transmission with an internal component and is configured with a unique device identity, when housings of two key generation devices are in contact with each other, reading, by each of the two key generation devices, a device identity of the other device, generating a random number for exchange, generating a same shared key according to a received random number, and then storing the shared key in a correspondence with the device identity of the other device. Embodiments of the present invention are mainly used in a key generation process.

Description

KEY GENERATION METHOD AND DEVICE
TECHNICAL FIELD
[0001] The present invention relates to the field of communication security, and in particular, to a key generation method and device. BACKGROUND
[0002] With emergence of concepts such as "smart home", "smart wearable device", and "Internet of Things", a user can implement remote control of various smart devices with the help of a smart phone or a network. An existing smart system includes multiple functions such as remote control, and secure interconnection and secure communication between devices, and provides a more convenient living environment for the user.
[0003] In consideration of security of device control, in the prior art, a digital certificate is installed in an access device, so that access control is performed on a device to be accessed. By using a key agreement protocol, the access device may agree upon a session key with the device to be accessed, and encrypt communication data according to the session key that is obtained by means of agreement.
[0004] However, a cost of application, update and the like of the digital certificate used in the prior art is relatively high, resulting in a high use cost for the user. Consequently, a total cost of a smart product is high, and the smart product cannot be used widely.
SUMMARY
[0005] Embodiments of the present invention provide a key generation method and device, which are used to solve a problem that a cost of generating a key by using a digital certificate is too high when access control is performed on a smart device and secure communication is performed between devices.
[0006] To achieve the foregoing objectives, the embodiments of the present invention adopt the following technical solutions:
[0007] According to a first aspect, the present invention provides a key generation device, where the device includes a Read Only Memory (ROM) module, a data communication module, a cache module, and a key storage module, where the ROM module is configured to store a device identity of the device; the data communication module is configured to read, from a ROM module of a second device, a second device identity of the second device, receive a second random number sent by the second device, and send a first random number generated by the device to the second device; the cache module is configured to cache the second device identity read by the data communication module and the received second random number; and the key storage module is configured to store a correspondence between a shared key generated by the device and the second device identity of the second device; and the device further includes a key negotiation module and a key generation module, where:
the key negotiation module is configured to generate the first random number, and provide a key generation mode for the key generation module; and
the key generation module is configured to generate the shared key by using the key generation mode provided by the key negotiation module and according to the first random number generated by the key negotiation module and the second random number cached in the cache module, and store the correspondence between the shared key and the second device identity of the second device into the key storage module.
[0008] With reference to the first aspect, in a first possible implementation manner of the first aspect, the device further includes an encryption/decryption module, where:
the data communication module is further configured to receive communication information sent by a target device connected to the device, and receive communication information sent by the second device; and
the encryption/decryption module is configured to encrypt, by using the stored shared key corresponding to the second device identity of the second device, the received communication information sent by the target device connected to the device, and send the encrypted communication information to the second device; and decrypt, by using the stored shared key corresponding to the second device identity of the second device, the received communication information sent by the second device, and transmit the decrypted communication information to the target device connected to the device.
[0009] With reference to the first possible implementation manner of the first aspect, in a second possible implementation manner, the data communication module is further configured to send the generated random number to the second device by using an electrical path formed when housings of the device and the second device are in contact with each other and by using a single-wire protocol.
[0010] With reference to the second possible implementation manner of the first aspect, in a third possible implementation manner, the key storage module is further configured to query, according to the read second device identity, a key table for the shared key corresponding to the read second device identity, and delete the shared key corresponding to the read second device identity from the key table.
[0011] According to a second aspect, the present invention provides a key generation method, where the method is applied to a key generation device, where the key generation device has a housing capable of performing data transmission with an internal component, and is configured with a unique device identity; and the method includes:
when housings of a first device and a second device are in contact with each other, reading, by the first device, a second device identity of the second device, and generating a first random number; and reading, by the second device, a device identity of the first device, and generating a second random number, where the first device and the second device are key generation devices that have same functions except for different device identities;
sending, by the first device, the generated first random number to the second device, and sending, by the second device, the generated second random number to the first device;
generating, by the first device, a shared key between the first device and the second device according to the first random number and the second random number, and generating, by the second device, the shared key between the second device and the first device according to the first random number and the second random number; and
storing, by the first device, a correspondence between the generated shared key and the second device identity of the second device into a key table of the first device, and storing, by the second device, a correspondence between the generated shared key and the device identity of the first device into a key table of the second device.
[0012] With reference to the second aspect, in a first possible implementation manner of the second aspect, after the storing, by the first device, a correspondence between the generated shared key and the second device identity of the second device, and storing, by the second device, a correspondence between the generated shared key and the device identity of the first device, the method further includes:
receiving, by the first device, communication information sent by a target device connected to the first device, where the target device refers to a smart home device, or a smart wearable device, or an Internet of Things device that is connected to the key generation device, and the communication information refers to information transmitted between target devices;
encrypting, by the first device, the received communication information by using the stored shared key corresponding to the second device identity of the second device, and sending the encrypted communication information to the second device;
receiving, by the second device, the communication information sent by the first device, and decrypting the received communication information by using the stored shared key corresponding to the device identity of the first device; and
sending, by the second device, the decrypted communication information to a target device connected to the second device.
[0013] With reference to the first possible implementation manner of the second aspect, in a second possible implementation manner, the sending, by the first device, the generated first random number to the second device includes:
sending, by the first device, the first random number to the second device by using an electrical path formed when the housings of the first device and the second device are in contact with each other and by using a single- wire protocol; and the sending, by the second device, the generated second random number to the first device includes:
sending, by the second device, the second random number to the first device by using the electrical path formed when the housings of the first device and the second device are in contact with each other and by using the single- wire protocol.
[0014] With reference to the second aspect or the first or second possible implementation manner of the second aspect, in a third possible implementation manner, after the reading the device identities, and before the sending, by the first device, the generated first random number to the second device, and sending, by the second device, the generated second random number to the first device, the method further includes:
querying, by the first device, the key table of the first device according to the read second device identity of the second device, where queried content is whether the shared key corresponding to the read second device identity of the second device exists in the key table of the first device; and if not, sending, by the first device, the generated first random number to the second device; and querying, by the second device, the key table of the second device according to the read device identity of the first device, where queried content is whether the shared key corresponding to the read device identity of the first device exists in the key table of the second device; and if not, sending, by the second device, the generated second random number to the first device.
[0015] According to a third aspect, the present invention provides a key revocation method for the foregoing key generation method, the method is applied to a key generation device, where the key generation device has a housing capable of performing data transmission with an internal component, and is configured with a unique device identity; and the method includes:
when housings of a first device and a second device are in contact with each other, reading, by the first device, a second device identity of the second device, and generating a first random number; and reading, by the second device, a device identity of the first device, and generating a second random number, where the first device and the second device are key generation devices that have same functions except for different device identities; and
querying, by the first device, a key table of the first device according to the read second device identity of the second device, where queried content is whether a shared key corresponding to the read second device identity of the second device exists in the key table of the first device; and if yes, deleting the shared key; and querying, by the second device, a key table of the second device according to the read device identity of the first device, where queried content is whether the shared key corresponding to the read device identity of the first device exists in the key table of the second device; and if yes, deleting the shared key.
[0016] According to a key generation method and device provided by embodiments of the present invention, key generation is completed by using a method, where: based on the key generation device that has a housing capable of performing data transmission with an internal component and is configured with a unique device identity, when housings of two key generation devices are in contact with each other, each key generation device generates a random number, and exchanges the generated random number, then generates a same shared key according to an agreed key generation method and random numbers generated by the two key generation devices, and then identifies and stores the shared key of the two key generation devices according to the device identities of the key generation devices. Therefore, data exchange can be performed between the key generation devices in a housing contact manner. Compared with a manner in which a digital certificate needs to be used to ensure secure communication and perform key agreement during wireless transmission when data exchange is performed by using a wireless transmission mode in the prior art, by means of direct toucht and data exchange, key agreement using the wireless transmission mode is avoided. Therefore, use of a digital certificate is avoided, and further, the problem that a cost of generating a key by using a digital certificate is too high when access control is performed on a smart device and secure communication is performed between devices is solved.
BRIEF DESCRIPTION OF DRAWINGS
[0017] To describe the technical solutions in the embodiments of the present invention or in the prior art more clearly, the following briefly introduces the accompanying drawings required for describing the embodiments or the prior art. Apparently, the accompanying drawings in the following description show merely some embodiments of the present invention, and a person of ordinary skill in the art may still derive other drawings from these accompanying drawings without creative efforts.
[0018] FIG. 1 is a schematic diagram of an apparatus of a key generation device according to an embodiment of the present invention;
[0019] FIG. 2 is a schematic diagram of an apparatus of another key generation device according to an embodiment of the present invention;
[0020] FIG. 3 is a flowchart of a key generation method according to an embodiment of the present invention;
[0021] FIG. 4 is a schematic structural diagram of a key generation device according to an embodiment of the present invention; [0022] FIG. 5 is a flowchart of a method for sending and receiving communication information by a key generation device according to an embodiment of the present invention; and
[0023] FIG. 6 is a flowchart of a method for deleting and updating a shared key by a key generation device according to an embodiment of the present invention.
DESCRIPTION OF EMBODIMENTS
[0024] The following clearly and completely describes the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Apparently, the described embodiments are merely a part rather than all of the embodiments of the present invention. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments of the present invention without creative efforts shall fall within the protection scope of the present invention.
[0025] Another embodiment of the present invention provides a key generation device. As shown in FIG. 1, the device includes a ROM module 11, a data communication module 12, a cache module 13, and a key storage module 14, where the ROM module 11 is configured to store a device identity of the device; the data communication module 12 is configured to read, from a ROM module of a second device, a second device identity of the second device, receive a second random number sent by the second device, and send a first random number generated by the device to the second device; the cache module 13 is configured to cache the second device identity read by the data communication module and the received second random number; the key storage module 14 is configured to store a correspondence between a shared key generated by the device and the second device identity of the second device; and the device further includes a key negotiation module 15 and a key generation module 16.
[0026] The key negotiation module 15 is configured to generate the first random number, and provide a key generation mode for the key generation module 16.
[0027] The key generation module 16 is configured to generate the shared key by using the key generation mode provided by the key negotiation module 15 and according to the first random number generated by the key negotiation module 15 and the second random number cached in the cache module 13, and store the correspondence between the shared key and the second device identity of the second device into the key storage module 14.
[0028] As shown in FIG. 2, optionally, the device further includes an encryption/decryption module 17.
[0029] The data communication module 12 is further configured to receive communication information sent by a target device connected to the device, and receive communication information sent by the second device.
[0030] The encryption/decryption module 17 is configured to encrypt, by using the stored shared key corresponding to the second device identity of the second device, the received communication information sent by the target device connected to the device, and send the encrypted communication information to the second device; and decrypt, by using the stored shared key corresponding to the second device identity of the second device, the received communication information sent by the second device, and transmit the decrypted communication information to the target device connected to the device.
[0031] Optionally, the data communication module 12 is further configured to send the generated random number to the second device by using an electrical path formed when housings of the device and the second device are in contact with each other and by using a single- wire protocol.
[0032] Optionally, the key storage module 14 is further configured to query, according to the read second device identity, a key table for the shared key corresponding to the read second device identity, and delete the shared key corresponding to the read second device identity from the key table.
[0033] According to a key generation device provided by the embodiment of the present invention, key generation is completed by using a method, where: based on the key generation device that has a housing capable of performing data transmission with an internal component and is configured with a unique device identity, when housings of two key generation devices are in contact with each other, each key generation device generates a random number, and exchanges a device identity thereof and the generated random number, then generates a same shared key according to an agreed key generation method and random numbers generated by the two key generation devices, and then stores the shared key according to the device identities of the key generation devices. Therefore, data exchange can be performed between the key generation devices in a housing contact manner. Compared with a manner in which a digital certificate needs to be used to ensure secure communication and perform key agreement during wireless transmission when data exchange is performed by using a wireless transmission mode in the prior art, by means of direct contact and data exchange, key agreement using the wireless transmission mode is avoided. Therefore, use of a digital certificate is avoided, and further, the problem that a cost of generating a key by using a digital certificate is too high when access control is performed for a smart device and secure communication is performed between devices is solved.
[0034] An embodiment of the present invention provides a key generation method, where the method is applied to a key generation device, and the key generation device has a housing capable of performing data transmission with an internal component, and is configured with a unique device identity. A process of the method is shown in FIG. 3 and specifically includes:
[0035] 301. When housings of a first device and a second device are in contact with each other, the first device reads a device identity of the second device, and generates a first random number; and the second device reads a device identity of the first device, and generates a second random number.
[0036] The first device and the second device are two key generation devices that have same functions except for the configured different device identities. A structure of the key generation device may be preferably as follows: A cylindrical housing made of a stainless steel material is used for packaging; a lateral surface of the housing is used as a ground wire; and two bottom surfaces of the housing are used as a data wire. The housing includes an electronic component with a corresponding function, and the internal electronic component of the housing uses the two bottom surface housings of the housing as a data communication interface. Each bottom surface of the housing has a data contact, and the lateral surface of the housing has an earth contact. The three contacts may be preferably separated by using polypropylene clasps, and are separately connected to the internal component, and when data is read or written or transmitted, a corresponding reading or writing or transmission action is triggered by touching the data contacts on the housing. The specific structure is shown in FIG. 4. An interior of the key generation device may be divided into different functional modules to implement corresponding functions, where the functional modules include a key generation module dedicated to generating a key, a key storage module responsible for storing the key, a key negotiation module responsible for generating a random number and including different key generation methods, a communication module responsible for performing communication with the second device, a cache module responsible for caching communication data or received other information, and a ROM module that is dedicated to storing a device identity, is read-only, and cannot support writing. In addition, a separate power supply may be configured for each key generation device, or the key generation device may also be powered directly by a target device through a path connected to the housing of the key generation device.
[0037] The housing may be preferably made of a stainless steel material. The device identity configured for each device may preferably use a mode selected by iButton, that is, use a 64-bit serial number. A sequence is: first 8-bit family code, middle 48-bit serial number, last 8-bit CRC (cyclic redundancy check) check code. The 64 bits are optically lithographed by a manufacturer in a ROM area in a memory of each device, and can only be read but cannot be modified, so that absolute uniqueness and traceability of each device are ensured. However, when data contacts of two devices are in contact with each other, each of the two devices reads a device identity of the other device and performs checking. The two devices can perform a subsequent action of generating a shared key only when the checking is passed, otherwise, stop generating a shared key.
[0038] In addition, in the embodiment of the present invention, operations such as data reading and writing and information transmission may be performed by using existing read and write commands and information transmission technologies. Because the housing of the device is connected to an internal corresponding module of the device, corresponding operations may be triggered by touching the housings of the two key generation devices, so as to instantaneously complete data or information exchange.
[0039] 302. The first device sends the generated first random number to the second device, and the second device sends the generated second random number to the first device.
[0040] The first device may send the first random number to the second device by using an electrical path formed when single data contacts of the housings of the first device and the second device are in contact with each other and by preferably using a single-wire protocol, or receive the second random number sent by the second device. Definitely, an electrical path may also be formed between the first device and the second device by simultaneously enabling multiple data contacts to touch with each other, or communication interfaces, such as a USB and a micro USB, are used as communication interfaces for performing information reading, transmission, and data communication, which is not limited herein.
[0041] 303. The first device generates a shared key between the first device and the second device according to the first random number and the second random number, and the second device generates the shared key between the second device and the first device according to the first random number and the second random number.
[0042] The first device and the second device separately generate a shared key between the first device and the second device according to the first random number and the second random number, and algorithms used by the two devices are the same. Therefore, the keys generated by the two devices may be exactly the same. There may be multiple key generation modes. A feasible mode is used as an example herein, which is specifically that: If the first device first sends a first random number rl to the second device, and then the second device sends a second random number r2 to the first device, an exactly same shared key K of the first device and second device is obtained by means of K=rl and r2, or a shared key K is obtained by means of K=rlllr2. Definitely, this is only a simple mode of generating a shared key, and is used to describe the key generation method. An actual generation mode may be a key generation mode selected by the key generation devices by joint agreement from key generation modes supported by the key generation devices, for generating a shared key, which is not limited by the embodiment of the present invention.
[0043] 304. The first device stores a correspondence between the generated shared key and the device identity of the second device into a key table of the first device, and the second device stores a correspondence between the generated shared key and the device identity of the first device into a key table of the second device.
[0044] When being stored, the device identity of the key generation device is stored in a correspondence with the generated shared key, so that shared keys of the key generation device and other key generation devices can be distinguished.
[0045] In addition, it should be noted that, further optionally, in the embodiment of the present invention, after a key generation device is connected to a data interface or an audio interface of a smart phone, centralized monitoring may be performed on multiple smart devices by means of downloading an APP in the smart phone for centralized control, for example, control on smart home devices, for example, functions such as turning on an air conditioner, turning off a TV set, and closing a curtain by pressing a button.
[0046] According to a key generation method provided by the embodiment of the present invention, key generation is completed by using a method, where: based on a key generation device that has a housing capable of performing data transmission with an internal component and is configured with a unique device identity, when housings of two key generation devices are in contact with each other, each key generation device generates a random number, and exchanges the generated random number, then generates a same shared key according to an agreed key generation method and random numbers generated by the two key generation devices, and then stores the shared key according to the device identities of the key generation devices. Therefore, data exchange can be performed between the key generation devices in a housing contact manner. Compared with a manner in which a digital certificate needs to be used to ensure secure communication and perform key agreement during wireless transmission when data exchange is performed by using a wireless transmission mode in the prior art, by means of direct contact and data exchange, key agreement using the wireless transmission mode is avoided. Therefore, use of a digital certificate is avoided, and further, the problem that a cost of generating a key by using a digital certificate is too high when access control is performed for a smart device and secure communication is performed between devices, is solved.
[0047] An embodiment of the present invention provides a method for sending communication data to another key generation device by a key generation device. A process of the method is shown in FIG. 5, and specifically includes:
[0048] 501. The first device receives communication information sent by a target device connected to the first device.
[0049] The target device refers to a smart home device, or a smart wearable device, or an Internet of Things device in which the key generation device is located, the data path is a path formed when the key generation device and a data interface of the target device are connected, and the communication information is information transmitted between target devices.
[0050] The data path may be implemented by using technologies such as Wi-Fi, Bluetooth, Zigbee, and NFC, or may also be formed by directly connecting data wires such as a USB and micro USB to the data interface of the target device, which is not limited in the embodiment of the present invention.
[0051] 502. The first device encrypts the received communication information by using a stored shared key corresponding to a device identity of a second device, and sends the encrypted communication information to the second device.
[0052] During the encryption, a corresponding shared key may be found according to the device identity of the key generation device to which the communication information needs to be transmitted. Technologies such as wifi, Bluetooth, Zigbee, and 2G/3G may be selected as a wireless transmission mode to perform communication.
[0053] 503. The second device receives the communication information sent by the first device, and decrypts the received communication information by using a stored shared key corresponding to a device identity of the first device.
[0054] 504. The second device sends the decrypted communication information to a target device connected to the second device.
[0055] In the embodiment of the present invention, the first device receives communication information sent by the target device in which the first device is located, encrypts the received communication information by using the shared key shared with the second device, and then sends the communication information to another key generation device by means of wireless transmission; then after decrypting the communication information by using the shared key generated with the first device, the second device sends the communication information to the target device in which the key generation device is located, thereby completing a process of encrypting communication information to be transmitted by the target device and sending the communication information to a key generation device of another target device, so that the target device can complete a task of encrypting the communication information and sending the communication information by using the key generation device, which provides feasibility for the target device to send communication information to other target devices, and access control is performed on different devices by using different shared keys.
[0056] In addition, an embodiment of the present invention further provides a method for deleting and updating a shared key between key generation devices. A process of the method is shown in FIG. 6, and specifically includes:
[0057] 601. a first device and a second device separately query, according to a read device identity, a respective key table for a shared key corresponding to the read device identity. If a shared key exists, step 603 is performed; or if no shared key exists, step 602 is performed.
[0058] Different key generation devices are distinguished according to the device identities in this step.
[0059] The key table is used to store a correspondence between shared keys generated by the first device and other key generation devices, and device identities of the other key generation devices. Before a key is generated every time, the key generation device needs to check, by performing this step, whether the key generation device has generated a shared key between the key generation device and a key generation device that is in contact with the key generation device, and performs a different operation according to a different query result.
[0060] 603. Perform steps 301 to 303 to generate a shared key.
[0061] In this step, if no shared key is found, it indicates that no shared key exists between the first device and the second device. It may be set that when this result occurs, a shared key needs to be generated by default, and therefore the step of generating a shared key is performed.
[0062] 604. Separately delete the shared key corresponding to the read device identity from the key table, and end the key generation process.
[0063] If a shared key is found, it indicates that a shared key already exists between the first device and the second device. It may be set that when this result occurs, the shared key between the first device and the second device needs to be cleared by default, and therefore an operation of deleting the shared key is performed.
[0064] In addition, if the shared key between the first device and the second device needs to be updated, by means of two contacts, the shared key is deleted by a first contact and a shared key is generated by a second contact, thereby completing the update of the shared key.
[0065] In addition, it should be noted that processes of the methods shown in FIG. 3, FIG. 5, and FIG. 6 are further applicable to controlling all smart devices installed with key generation devices, by adding a key generation device to a control terminal and by means of installing a corresponding APR For example, a key generation device is added to a smart phone, tablet computer or a notebook computer, and then remote control is performed directly on the corresponding smart device by means of a wireless network. A manner such as a direct connection by using a USB wire may be selected to add a key generation device, which is not further limited by the embodiment of the present invention.
[0066] In the embodiment of the present invention, when housings of two key generation devices are in contact with each other, each of the two key generation devices reads a device identity of the other device and search a key table for a corresponding shared key according to the device identity. When the shared key does not exist, a step of generating a shared key is performed; otherwise, the shared key is deleted. In this way, when the shared key between two key generation devices needs to be revoked and updated, the operation can be completed in a re-contact manner. Therefore, a manner of revoking and updating the shared key is simpler and more convenient, which avoids that when a digital certificate is used, the digital certificate needs to be updated by a corresponding organization, thereby improving user experience.
[0067] Based on the foregoing descriptions of the implementation manners, a person skilled in the art may clearly understand that the present invention may be implemented by software in addition to necessary universal hardware or by hardware only. In most circumstances, the former is a preferred implementation manner. Based on such an understanding, the technical solutions of the present invention essentially or the part contributing to the prior art may be implemented in a form of a software product. The computer software product is stored in a readable storage medium, such as a floppy disk, a hard disk or an optical disc of a computer, and includes several instructions for instructing a computer device (which may be a personal computer, a server, a network device, or the like) to perform the methods described in the embodiments of the present invention.
[0068] The foregoing descriptions are merely specific implementation manners of the present invention, but are not intended to limit the protection scope of the present invention. Any variation or replacement readily figured out by a person skilled in the art within the technical scope disclosed in the present invention shall fall within the protection scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims

CLAIMS What is claimed is:
1. A key generation device, comprises a Read Only Memory (ROM) module, a data communication module, a cache module, and a key storage module;
wherein the ROM module is configured to store a device identity of the device; the data communication module is configured to read, from a ROM module of a second device, a second device identity of the second device, receive a second random number sent by the second device, and send a first random number generated by the device to the second device;
the cache module is configured to cache the second device identity read by the data communication module and the received second random number; and the key storage module is configured to store a correspondence between a shared key generated by the device and the second device identity of the second device; and the device further comprises a key negotiation module and a key generation module, wherein:
the key negotiation module is configured to generate the first random number, and provide a key generation mode for the key generation module; and
the key generation module is configured to generate the shared key by using the key generation mode provided by the key negotiation module and according to the first random number generated by the key negotiation module and the second random number cached in the cache module, and store the correspondence between the shared key and the second device identity of the second device into the key storage module.
2. The device according to claim 1, wherein the device further comprises an encryption/decryption module, wherein:
the data communication module is further configured to receive communication information sent by a target device connected to the device, and receive communication information sent by the second device; and
the encryption/decryption module is configured to encrypt, by using the stored shared key corresponding to the second device identity of the second device, the received communication information sent by the target device connected to the device, and send the encrypted communication information to the second device; and decrypt, by using the stored shared key corresponding to the second device identity of the second device, the received communication information sent by the second device, and transmit the decrypted communication information to the target device connected to the device.
3. The device according to claim 1, wherein the data communication module is further configured to send the generated random number to the second device by using an electrical path formed when housings of the device and the second device are in contact with each other and by using a single-wire protocol.
4. The device according to claim 1, wherein the key storage module is further configured to query, according to the read second device identity, a key table for the shared key corresponding to the read second device identity, and delete the shared key corresponding to the read second device identity from the key table.
5. A key generation method, wherein the method is applied to a key generation device, wherein the key generation device has a housing capable of performing data transmission with an internal component, and is configured with a unique device identity; and the method comprises:
when housings of a first device and a second device are in contact with each other, reading, by the first device, a second device identity of the second device, and generating a first random number; and reading, by the second device, a device identity of the first device, and generating a second random number, wherein the first device and the second device are key generation devices that have same functions except for different device identities;
sending, by the first device, the generated first random number to the second device, and sending, by the second device, the generated second random number to the first device;
generating, by the first device, a shared key between the first device and the second device according to the first random number and the second random number, and generating, by the second device, the shared key between the second device and the first device according to the first random number and the second random number; and
storing, by the first device, a correspondence between the generated shared key and the second device identity of the second device into a key table of the first device, and storing, by the second device, a correspondence between the generated shared key and the device identity of the first device into a key table of the second device.
6. The method according to claim 5, wherein after the storing, by the first device, a correspondence between the generated shared key and the second device identity of the second device, and storing, by the second device, a correspondence between the generated shared key and the device identity of the first device, the method further comprises:
receiving, by the first device, communication information sent by a target device connected to the first device, wherein the target device refers to a smart home device, a smart wearable device or an Internet of Things device that is connected to the key generation device, and the communication information refers to information transmitted between target devices;
encrypting, by the first device, the received communication information by using the stored shared key corresponding to the second device identity of the second device, and sending the encrypted communication information to the second device;
receiving, by the second device, the communication information sent by the first device, and decrypting the received communication information by using the stored shared key corresponding to the device identity of the first device; and
sending, by the second device, the decrypted communication information to a target device connected to the second device.
7. The method according to claim 5, wherein the sending, by the first device, the generated first random number to the second device comprises:
sending, by the first device, the first random number to the second device by using an electrical path formed when the housings of the first device and the second device are in contact with each other and by using a single- wire protocol; and
the sending, by the second device, the generated second random number to the first device comprises:
sending, by the second device, the second random number to the first device by using the electrical path formed when the housings of the first device and the second device are in contact with each other and by using the single- wire protocol.
8. The method according to any one of claims 5 to 7, wherein after the reading the device identities, and before the sending, by the first device, the generated first random number to the second device, and sending, by the second device, the generated second random number to the first device, the method further comprises: querying, by the first device, the key table of the first device according to the read second device identity of the second device, wherein queried content is whether the shared key corresponding to the read second device identity of the second device exists in the key table of the first device; and if not, sending, by the first device, the generated first random number to the second device; and querying, by the second device, the key table of the second device according to the read device identity of the first device, wherein queried content is whether the shared key corresponding to the read device identity of the first device exists in the key table of the second device; and if not, sending, by the second device, the generated second random number to the first device.
9. A key revocation method for the key generation method according to claim 5, wherein the method is applied to a key generation device, wherein the key generation device has a housing capable of performing data transmission with an internal component, and is configured with a unique device identity; and the method comprises:
when housings of a first device and a second device are in contact with each other, reading, by the first device, a second device identity of the second device, and generating a first random number; and reading, by the second device, a device identity of the first device, and generating a second random number, wherein the first device and the second device are key generation devices that have same functions except for different device identities; and
querying, by the first device, a key table of the first device according to the read second device identity of the second device, wherein queried content is whether a shared key corresponding to the read second device identity of the second device exists in the key table of the first device; and if yes, deleting the shared key; and querying, by the second device, a key table of the second device according to the read device identity of the first device, wherein queried content is whether the shared key corresponding to the read device identity of the first device exists in the key table of the second device; and if yes, deleting the shared key.
PCT/SG2015/050330 2014-10-02 2015-09-18 Key generation method and device WO2016053184A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
SG10201406291WA SG10201406291WA (en) 2014-10-02 2014-10-02 Key generation method and device
SG10201406291W 2014-10-02

Publications (1)

Publication Number Publication Date
WO2016053184A1 true WO2016053184A1 (en) 2016-04-07

Family

ID=54200034

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SG2015/050330 WO2016053184A1 (en) 2014-10-02 2015-09-18 Key generation method and device

Country Status (2)

Country Link
SG (1) SG10201406291WA (en)
WO (1) WO2016053184A1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107645471A (en) * 2016-07-20 2018-01-30 航天信息股份有限公司 A kind of method and system for mobile terminal user identity certification
CN107645726A (en) * 2016-07-20 2018-01-30 航天信息股份有限公司 A kind of method and system for mobile terminal user identity certification
CN109040149A (en) * 2018-11-02 2018-12-18 美的集团股份有限公司 Cryptographic key negotiation method, Cloud Server, equipment, storage medium and system
CN109257170A (en) * 2018-11-02 2019-01-22 美的集团股份有限公司 Cryptographic key negotiation method, equipment, terminal, storage medium and system
CN112260823A (en) * 2020-09-16 2021-01-22 浙江大华技术股份有限公司 Data transmission method, intelligent terminal and computer readable storage medium
CN113259096A (en) * 2021-04-27 2021-08-13 江南信安(北京)科技有限公司 Key online negotiation method and system suitable for communication environment of Internet of things
US20220207114A1 (en) * 2020-12-30 2022-06-30 Comcast Cable Communications, Llc Synchronization of digital rights management data

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110093712A1 (en) * 2009-10-21 2011-04-21 Samsung Electronics Co., Ltd. Communication device supporting pairing

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110093712A1 (en) * 2009-10-21 2011-04-21 Samsung Electronics Co., Ltd. Communication device supporting pairing

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
FRANK STAJANO ET AL: "The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks", 1 January 2000, SECURITY PROTOCOLS LECTURE NOTES IN COMPUTER SCIENCE;;LNCS, SPRINGER, BERLIN, DE, PAGE(S) 172 - 182, ISBN: 978-3-540-67381-1, XP019048733 *
LAKSHMINARAYANAN A ET AL: "Practical device association protocols for wireless enabled personal devices", WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, 2005 IEEE NEW ORLEANS, LA, USA 13-17 MARCH 2005, PISCATAWAY, NJ, USA,IEEE, vol. 4, 13 March 2005 (2005-03-13), pages 2484 - 2489, XP010791566, ISBN: 978-0-7803-8966-3, DOI: 10.1109/WCNC.2005.1424904 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107645471A (en) * 2016-07-20 2018-01-30 航天信息股份有限公司 A kind of method and system for mobile terminal user identity certification
CN107645726A (en) * 2016-07-20 2018-01-30 航天信息股份有限公司 A kind of method and system for mobile terminal user identity certification
CN109040149A (en) * 2018-11-02 2018-12-18 美的集团股份有限公司 Cryptographic key negotiation method, Cloud Server, equipment, storage medium and system
CN109257170A (en) * 2018-11-02 2019-01-22 美的集团股份有限公司 Cryptographic key negotiation method, equipment, terminal, storage medium and system
CN112260823A (en) * 2020-09-16 2021-01-22 浙江大华技术股份有限公司 Data transmission method, intelligent terminal and computer readable storage medium
CN112260823B (en) * 2020-09-16 2022-08-09 浙江大华技术股份有限公司 Data transmission method, intelligent terminal and computer readable storage medium
US20220207114A1 (en) * 2020-12-30 2022-06-30 Comcast Cable Communications, Llc Synchronization of digital rights management data
US11893090B2 (en) * 2020-12-30 2024-02-06 Comcast Cable Communications, Llc Synchronization of digital rights management data
CN113259096A (en) * 2021-04-27 2021-08-13 江南信安(北京)科技有限公司 Key online negotiation method and system suitable for communication environment of Internet of things
CN113259096B (en) * 2021-04-27 2021-11-12 江南信安(北京)科技有限公司 Key online negotiation method and system suitable for communication environment of Internet of things

Also Published As

Publication number Publication date
SG10201406291WA (en) 2016-05-30

Similar Documents

Publication Publication Date Title
WO2016053184A1 (en) Key generation method and device
KR101941049B1 (en) Method and system for encrypted communications
JP4816161B2 (en) Wireless communication apparatus, MAC address management system, wireless communication method, and wireless communication program
CN104094267B (en) Method, apparatus and system for secure sharing of media content from a source device
US11621832B2 (en) Configuration systems and methods for secure operation of networked transducers
CN108762791A (en) Firmware upgrade method and device
US11140547B2 (en) Method for securely controlling smart home, and terminal device
CN106385277B (en) Encryption device, method and system
WO2015180261A1 (en) Smart home access method, control centre device and wearable terminal
CN103546576A (en) Remote automatic updating method and system of embedded equipment
CN106411504B (en) Data encryption system, method and device
JP2021007233A (en) Device and related method for secure hearing device communication
EP4207673A1 (en) Network connection method, terminal, device to be connected to network, and storage medium
KR101876183B1 (en) Security-enhanced residential gateway device based on internet of things
CN109218291B (en) Data transfer method, system and related equipment based on block chain
US20160323100A1 (en) Key generation device, terminal device, and data signature and encryption method
KR20100071209A (en) Verification of device using device tag
CN105208028A (en) Data transmission method and related device and equipment
CN106452999B (en) Intelligent household appliance and method and device for safely accessing intelligent household appliance
JP6192495B2 (en) Semiconductor device, information terminal, semiconductor element control method, and information terminal control method
JP5054317B2 (en) Encryption key setting method, network system, management apparatus, information processing terminal, and encryption key setting program
CN112564901A (en) Key generation method and system, storage medium and electronic device
JP2017147507A (en) Identification information transfer system and identification information decryption method
CN117041956A (en) Communication authentication method, device, computer equipment and storage medium
KR101398033B1 (en) Remote control system and method using short message

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15771295

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 21.07.2017)

122 Ep: pct application non-entry in european phase

Ref document number: 15771295

Country of ref document: EP

Kind code of ref document: A1