WO2016187850A1 - 无线通信网络中设备配置的方法、装置及系统 - Google Patents

无线通信网络中设备配置的方法、装置及系统 Download PDF

Info

Publication number
WO2016187850A1
WO2016187850A1 PCT/CN2015/079965 CN2015079965W WO2016187850A1 WO 2016187850 A1 WO2016187850 A1 WO 2016187850A1 CN 2015079965 W CN2015079965 W CN 2015079965W WO 2016187850 A1 WO2016187850 A1 WO 2016187850A1
Authority
WO
WIPO (PCT)
Prior art keywords
signature
public key
authentication information
configurator
information
Prior art date
Application number
PCT/CN2015/079965
Other languages
English (en)
French (fr)
Inventor
庞高昆
方平
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2015/079965 priority Critical patent/WO2016187850A1/zh
Priority to CN201580039873.6A priority patent/CN106664559B/zh
Publication of WO2016187850A1 publication Critical patent/WO2016187850A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords

Definitions

  • the embodiments of the present invention relate to communication technologies, and in particular, to a method, an apparatus, and a system for configuring a device in a wireless communication network.
  • the WLAN may include a configurator through which the device to be configured is configured such that the device to be configured can join the network.
  • the configurator configures the device to be configured such that the device to be configured to join the network (for example, a Basic Service Set (BSS) network) mainly includes: a configurator of the BSS network (wherein the BSS network)
  • the configurator may be an access point (AP, Access Point) or a station (STA, station) to generate a first share according to the first public key of the device (the device to be configured of the BSS network may be a STA) and the first private key of the first public key.
  • BSS Basic Service Set
  • the first private key and the first public key are corresponding public and private keys.
  • the first shared password is also generated, and the configurator establishes a secure connection with the to-be-configured device based on the first shared key; after establishing the secure connection, the configuration
  • the device performs a digital signature on the second public key of the device to be configured based on the second private key (ie, the signature private key) and the second public key of the device to be configured, and obtains the second public key of the device to be configured.
  • the embodiments of the present invention provide a method, a device, and a system for configuring a device in a wireless communication network, which are used to solve the problem that when a plurality of devices to be configured in a network need to be configured in a network, the configuration efficiency is low.
  • the present invention provides a method for configuring a device in a wireless communication network, where the network includes a first device, a second device, and a fourth device, where the first device is a configurator;
  • the device configured by the first device; the method includes:
  • the first device sends the signature information of the second device to the second device, so that the second device becomes a configurator capable of configuring the device to be configured, and the device to be configured includes a third device;
  • the signature information of the second device is determined by the first device according to the signature private key of the first device and the signature public key of the second device, and the signature information of the second device includes the The signature of the signature public key of the second device, and/or the encrypted public key of the second device after encryption.
  • the first device when the network is a proximity aware network NAN, the first device sends a signature public key of the second device to the first Four devices, including:
  • the first device sends the signature public key of the second device to the fourth device in a discovery window DW, or a paging paging window, or a management window.
  • the method further includes:
  • the first device Sending, by the first device, the signature public key of the first device to the second device, so that the second device sends the signature public key of the first device to the third device, so that The third device authenticates the fourth device according to the signature public key of the first device.
  • the present invention provides a method for configuring a device in a wireless communication network, where the network includes a first device, a second device, and a fourth device; wherein the first device is a configurator, and the fourth device is a device configured for the first device; the method includes:
  • the first message is used by the first device to send a signature public key of the second device to the a fourth device, wherein the second device is configured as a configurator capable of configuring the device to be configured, the device to be configured includes a third device; or the first message is used by the first device to Sending the signature information of the second device to the second device, so that the second device becomes a configurator capable of configuring the device to be configured, where the device to be configured includes a third device;
  • the signature information of the second device includes a signature of the signature public key of the second device, and/or an encrypted public key of the second device, and the signature information of the second device is the A device is determined according to the signature private key of the first device and the signature public key of the second device.
  • the method further includes:
  • the first authentication information includes a public key of the third device and a signature of the public key of the third device, so that the fourth device performs the third device according to the first authentication information. Certification.
  • the method further includes:
  • the second device sends the configurator authentication information to the fourth device, where the configurator authentication information includes signature information of the second device and a signature public key of the second device.
  • the method further includes:
  • the second device sends the signature public key of the first device to the third device, so that the third device authenticates the fourth device according to the signature public key of the first device.
  • the present invention provides a method for configuring a device in a wireless communication network, where the network includes a first device, a second device, and a fourth device, where the first device is a configurator, and the fourth device is a device configured for the first device; the second device is a manner in which the first device sends the signature public key of the second device to the fourth device, so that the second device becomes A configurator capable of configuring a configuration device, the device to be configured includes a third device; the method includes:
  • the fourth device Receiving, by the fourth device, the first authentication information that is sent by the network device, where the second device configures the third device to be configured by the second device, where the first authentication information includes a public key of the third device a signature of the public key of the third device, where the signature of the public key of the third device is a signature private key corresponding to the second public device's signature public key and the third device
  • the public key is determined and sent to the third device
  • the fourth device performs the third device according to the public key of the third device, the signature of the public key of the third device, and the signature public key of the second device sent by the first device. Certification
  • the fourth device sends the second authentication information to the third device, so that the third device authenticates the fourth device according to the second authentication information, where the second authentication information includes a public key of the fourth device and a signature of a public key of the fourth device;
  • the network device is the second device or the third device.
  • the present invention provides a method for configuring a device in a wireless communication network, where the wireless communication network includes a first device, a second device, and a fourth device; wherein the first device is a configurator, and the fourth device The device is a device configured by the first device; the second device is configured to enable the first device to send the signature public key of the second device to the fourth device
  • a configurator capable of configuring a device to be configured, the device to be configured includes a third device; the method includes:
  • the third device obtains first authentication information, where the first authentication information includes a public key of the third device and a public device of the third device a signature of the key; wherein the signature of the public key of the third device is determined by the second device according to the signature private key corresponding to the signature public key of the second device and the public key of the third device Giving the third device;
  • the third device sends the first authentication information to the fourth device, so that the fourth device authenticates the third device according to the first authentication information;
  • Second authentication information that is sent by the fourth device, where the second authentication information includes a public key of the fourth device and a signature of a public key of the fourth device;
  • the third device authenticates the fourth device according to the public key of the fourth device, the signature of the public key of the fourth device, and the signature public key of the first device.
  • the third device is configured according to a public key of the fourth device, a signature of a public key of the fourth device, and the first device Before signing the fourth device, the signature public key further includes:
  • the third device receives a signature public key of the first device that is sent by the second device.
  • the present invention provides a method for configuring a device in a wireless communication network, where the wireless communication network includes a first device, a second device, and a fourth device; wherein the first device is a configurator, and the fourth device
  • the device is a device configured by the first device; the second device is configured to send, by the first device, signature information of the second device to the second device, so that the second device becomes a configurator capable of configuring a configuration device, where the device to be configured includes a third device, wherein the signature information of the second device is a signature private key of the first device according to the first device, and the Determined by the signature public key of the second device; the signature information of the second device includes a signature of the signature public key of the second device, and/or the encrypted signature public key of the second device; include:
  • the fourth device receives first authentication information that is sent by the first network device, where the first authentication information includes a public key of the third device. a signature of the public key of the third device, where the signature of the public key of the third device is a signature private key corresponding to the second public device's signature public key and the third device The public key is determined and sent to the third device;
  • the fourth device receives the configurator authentication information sent by the second network device, where the configurator authentication information includes signature information of the second device and a signature public key of the second device;
  • the fourth device sends the second authentication information to the third device, so that the third device authenticates the fourth device according to the second authentication information; wherein the second authentication information And including a signature of the public key of the fourth device and a public key of the fourth device;
  • the first network device is the second device or the third device
  • the second network device is the second device or the third device.
  • the first device is a manner in which the fifth device sends the signature information of the first device to the first device
  • the first device becomes a configurator capable of configuring the device to be configured, and the fifth device is a configurator;
  • the configurator authentication information further includes: signature information of the first device and the first device Signature public key;
  • the signature information of the first device is determined by the fifth device according to the signature public key of the first device and the signature private key of the fifth device; the signature information of the first device includes the The signature of the signature public key of the first device, and/or the encrypted signature public key of the first device;
  • the fourth device before determining whether the signature public key of the second device is correct, according to the signature information of the second device and the signature public key of the first device, further includes:
  • the configurator authentication information further includes: a sequence identifier, where the sequence identifier is used to indicate the fourth The device first determines whether the signature public key of the first device is correct, and determines whether the signature public key of the second device is correct.
  • the sequence of the signature public key of the first device and the signature public key of the second device in the configurator authentication information indicates that the fourth device first determines whether the signature public key of the first device is correct. And determining whether the signature public key of the second device is correct.
  • the present invention provides a method for configuring a device in a wireless communication network, where the wireless communication network includes a first device, a second device, and a fourth device; wherein the first device is a configurator, and the fourth device
  • the device is a device configured by the first device; the second device is configured to send, by the first device, signature information of the second device to the second device, so that the second device becomes a configurator that is configured to configure the device, where the device to be configured includes a third device, where the signature information of the second device is a signature of the first device according to the first device Determining, by the private key and the signature public key of the second device; the signature information of the second device includes a signature of the signature public key of the second device, and/or the encrypted second device Signing a public key; the method includes:
  • the third device obtains first authentication information, where the first authentication information includes a public key of the third device and a public device of the third device a signature of the key; wherein the signature of the public key of the third device is determined by the second device according to the signature private key corresponding to the signature public key of the second device and the public key of the third device Giving the third device;
  • the third device sends the first authentication information to the fourth device, so that the fourth device authenticates the third device according to the first authentication information;
  • Second authentication information that is sent by the fourth device, where the second authentication information includes a public key of the fourth device and a signature of a public key of the fourth device;
  • the third device authenticates the fourth device according to the public key of the fourth device, the signature of the public key of the fourth device, and the signature public key of the first device.
  • the method further includes:
  • the third device sends the configurator authentication information to the fourth device, where the configurator authentication information includes signature information of the second device and a signature public key of the second device.
  • the signature information of the first device is sent to the The first device is configured to enable the first device to be a configurator configured to be configured, the fifth device is a configurator, and the configurator authentication information further includes: the first device Signature information and a signature public key of the first device;
  • the signature information of the first device is determined by the fifth device according to the signature public key of the first device and the signature private key of the fifth device; the signature information of the first device includes the The signature of the signature public key of the first device, and/or the encrypted signature public key of the first device.
  • the configurator authentication information further includes: a sequence identifier, where the sequence identifier is used to indicate the fourth The device first determines whether the signature public key of the first device is correct, and determines whether the signature public key of the second device is correct.
  • the sequence of the signature public key of the first device and the signature public key of the second device in the configurator authentication information indicates that the fourth device first determines whether the signature public key of the first device is correct. And determining whether the signature public key of the second device is correct.
  • the third device is configured according to the fourth device
  • the public key, the signature of the public key of the fourth device, and the signature public key of the first device, before the fourth device is authenticated further includes:
  • the third device receives a signature public key of the first device that is sent by the second device.
  • the present invention provides a method for configuring a device in a wireless communication network, where the network includes a first device, a second device, and a fourth device, where the first device, the second device, and the fourth device belong to the same group.
  • the first device is a configurator; the fourth device is a device configured by the first device; the method includes:
  • the second device encrypts the signature public key of the second device according to the group key
  • the second device sends the encrypted signature of the second device to the fourth device, so that the second device becomes a configurator capable of configuring the device to be configured, where the device to be configured includes Third device.
  • the method further includes:
  • the first authentication information includes a public key of the third device and a signature of the public key of the third device, so that the fourth device performs the third device according to the first authentication information. Certification.
  • the method further includes:
  • the present invention provides an apparatus for configuring a device in a wireless communication network, where the network includes a first device, a second device, and a fourth device, where the first device is a configurator;
  • a receiving module configured to receive a first message sent by the second device, where the first message includes a signature public key of the second device;
  • a sending module configured to send the signature public key of the second device to the fourth device, so that the second device becomes a configurator capable of configuring a device to be configured, where the device to be configured includes a third device ;or,
  • the signature information of the second device is determined by the first device according to the signature private key of the first device and the signature public key of the second device, and the signature information of the second device includes the second device The signature of the signature public key, and/or the encrypted public key of the second device.
  • the sending module sends the signature public key of the second device to the fourth Equipment, including:
  • the sending module is further configured to send the signature public key of the first device To the second device, to enable the second device to send the signature public key of the first device to the third device, so that the third device is configured according to the signature public key of the first device
  • the fourth device is authenticated.
  • the present invention provides an apparatus for configuring a device in a wireless communication network, where the network includes a first device, a second device, and a fourth device, where the first device is a configurator, and the fourth device is a device configured for the first device; the device is the second device, and the device includes:
  • a sending module configured to send the first message to the first device, where the first message includes a signature public key of the second device;
  • the first message is used by the first device to send a signature public key of the second device to the fourth device, so that the second device becomes a configurator capable of configuring a device to be configured,
  • the device to be configured includes a third device; or the first message is used by the first device to send signature information of the second device to the second device, so that the second device becomes capable of being configured a configurator configured by the device, where the device to be configured includes a third device;
  • the device When the first message is used by the first device to send the signature information of the second device to the second device, the device further includes:
  • a first receiving module configured to receive signature information of the second device that is sent by the first device
  • the signature information of the second device includes a signature of the signature public key of the second device, and/or an encrypted public key of the second device, and the signature information of the second device is the A device is determined according to the signature private key of the first device and the signature public key of the second device.
  • the device further includes: a processing module, configured to determine, according to the signature private key of the second device and the public key of the third device The signature of the public key of the third device;
  • the sending module is further configured to send a signature of the public key of the third device to the third device, so that the third device sends the first authentication information to the fourth device, and/or Transmitting the first authentication information to the fourth device;
  • the first authentication information includes a public key of the third device and a signature of the public key of the third device, so that the fourth device performs the third device according to the first authentication information. Certification.
  • the sending module is further configured to:
  • the configurator authentication information is sent to the fourth device, where the configurator authentication information includes signature information of the second device and a signature public key of the second device.
  • the device further includes:
  • a second receiving module configured to receive a signature public key of the first device that is sent by the first device
  • the sending module is further configured to send the signature public key of the first device to the third device, so that the third device performs the fourth device according to the signature public key of the first device. Certification.
  • the present invention provides an apparatus for configuring a device in a wireless communication network, where the network includes a first device, a second device, and a fourth device; wherein the first device is a configurator, and the fourth device is a device configured for the first device; the second device is a manner in which the first device sends the signature public key of the second device to the fourth device, so that the second device becomes A configurator capable of configuring a configuration device, the device to be configured includes a third device; the device is the fourth device, and the device includes:
  • a receiving module configured to receive first authentication information that is sent by the network device, where the first authentication information includes a public key of the third device, where the third device configures the third device to be configured a signature of the public key of the third device, where the signature of the public key of the third device is a signature private key corresponding to the second public device's signature public key and the third device The public key is determined and sent to the third device;
  • a processing module configured to perform, on the third device, according to a public key of the third device, a signature of a public key of the third device, and a signature public key of the second device sent by the first device Certification
  • a sending module configured to send the second authentication information to the third device, to enable the third device to authenticate the fourth device according to the second authentication information, where the second authentication information includes a public key of the fourth device and a signature of a public key of the fourth device;
  • the network device is the second device or the third device.
  • the present invention provides an apparatus for configuring a device in a wireless communication network, where the wireless communication network includes a first device, a second device, and a fourth device; wherein the first device is a configurator, and the And the second device is a device configured by the first device by sending the signature public key of the second device to the fourth device, so that the second device is
  • the device is a configurator capable of configuring the device to be configured, the device to be configured includes a third device; the device is the third device, and the device includes:
  • a processing module configured to obtain first authentication information after the second device configures the third device, where the first authentication information includes a public key of the third device and a public device of the third device a signature of the key; wherein the signature of the public key of the third device is determined by the second device according to the signature private key corresponding to the signature public key of the second device and the public key of the third device Giving the third device;
  • a sending module configured to send the first authentication information to the fourth device, so that the fourth device authenticates the third device according to the first authentication information
  • a receiving module configured to receive second authentication information that is sent by the fourth device, where the second authentication information includes a public key of the fourth device and a signature of a public key of the fourth device;
  • the processing module is further configured to perform authentication on the fourth device according to the public key of the fourth device, the signature of the public key of the fourth device, and the signature public key of the first device.
  • the receiving module is further configured to receive a signature public key of the first device that is sent by the second device.
  • the present invention provides a method for configuring a device in a wireless communication network, where the wireless communication network includes a first device, a second device, and a fourth device; wherein the first device is a configurator, and the The fourth device is a device configured by the first device; the second device is configured to enable the first device to send signature information of the second device to the second device a configurator capable of configuring a device to be configured, the device to be configured includes a third device, wherein the signature information of the second device is a signature private key of the first device according to the first device, Determining, by the signature public key of the second device; the signature information of the second device includes a signature of the signature public key of the second device, and/or the encrypted signature public key of the second device; The device is the fourth device, and the device includes:
  • a receiving module configured to receive, after the second device configures the third device, first authentication information that is sent by the first network device, where the first authentication information includes a public key of the third device a signature of the public key of the third device, where the signature of the public key of the third device is a signature private key corresponding to the second public device's signature public key and the third device The public key is determined and sent to the third device;
  • the receiving module is further configured to receive configurator authentication information sent by the second network device, where the configurator authentication information includes signature information of the second device and a signature public key of the second device;
  • a processing module configured to determine, according to the signature information of the second device, the signature public key of the first device, and the signature public key of the second device, whether the signature public key of the second device is correct; if yes, And authenticating the third device according to the public key of the third device, the signature of the public key of the third device, and the signature public key of the second device;
  • a sending module configured to send the second authentication information to the third device, to enable the third device to authenticate the fourth device according to the second authentication information, where the second authentication information includes a public key of the fourth device and a signature of a public key of the fourth device;
  • the first network device is the second device or the third device, and the second network is configured. Prepared as the second device or the third device.
  • the first device is a way for the fifth device to send the signature information of the first device to the first device
  • the first device is configured as a configurator capable of configuring the device to be configured, and the fifth device is a configurator;
  • the configurator authentication information further includes: signature information of the first device and the first The signature public key of a device;
  • the signature information of the first device is determined by the fifth device according to the signature public key of the first device and the signature private key of the fifth device; the signature information of the first device includes the The signature of the signature public key of the first device, and/or the encrypted signature public key of the first device;
  • the processing module determines whether the signature public key of the second device is correct according to the signature information of the second device, the signature public key of the first device, and the signature public key of the second device. Specifically include:
  • the signature information, the signature public key of the first device, and the signature public key of the second device determine whether the signature public key of the second device is correct.
  • the configurator authentication information further includes: a sequence identifier, where the sequence identifier is used to indicate the The fourth device first determines whether the signature public key of the first device is correct, and determines whether the signature public key of the second device is correct.
  • the sequence of the signature public key of the first device and the signature public key of the second device in the configurator authentication information indicates that the fourth device first determines whether the signature public key of the first device is correct. And determining whether the signature public key of the second device is correct.
  • the present invention provides a device for configuring a device in a wireless communication network, where the wireless communication network includes a first device, a second device, and a fourth device; wherein the first device is a configurator, and the The fourth device is a device configured by the first device; the second device is configured to enable the first device to send signature information of the second device to the second device a configurator capable of configuring a device to be configured, the device to be configured includes a third device, wherein the signature information of the second device is a signature private key of the first device according to the first device, The signature of the second device is determined by the signature public key of the second device; The signature of the signature public key of the second device, and/or the encrypted signature of the second device; the device is the third device, and the device includes:
  • a processing module configured to obtain first authentication information after the second device configures the third device, where the first authentication information includes a public key of the third device and a public device of the third device a signature of the key; wherein the signature of the public key of the third device is determined by the second device according to the signature private key corresponding to the signature public key of the second device and the public key of the third device Giving the third device;
  • a sending module configured to send the first authentication information to the fourth device, so that the fourth device authenticates the third device according to the first authentication information
  • a receiving module configured to receive second authentication information that is sent by the fourth device, where the second authentication information includes a public key of the fourth device and a signature of a public key of the fourth device;
  • the processing module is configured to perform authentication on the fourth device according to the public key of the fourth device, the signature of the public key of the fourth device, and the signature public key of the first device.
  • the sending module is further configured to:
  • the configurator authentication information is sent to the fourth device, where the configurator authentication information includes signature information of the second device and a signature public key of the second device.
  • the first device is a fifth device, by sending the signature information of the first device
  • the first device is configured as a configurator capable of configuring the device to be configured, and the fifth device is a configurator;
  • the configurator authentication information further includes: the first The signature information of the device and the signature public key of the first device;
  • the signature information of the first device is determined by the fifth device according to the signature public key of the first device and the signature private key of the fifth device; the signature information of the first device includes the The signature of the signature public key of the first device, and/or the encrypted signature public key of the first device.
  • the configurator authentication information further includes: a sequence identifier, where the sequence identifier is used to indicate the The fourth device first determines whether the signature public key of the first device is correct, and determines whether the signature public key of the second device is correct.
  • the sequence of the signature public key indicates that the fourth device first determines whether the signature public key of the first device is correct, and then determines whether the signature public key of the second device is correct.
  • the receiving module is further configured to receive The signature public key of the first device sent by the second device.
  • the present invention provides an apparatus for configuring a device in a wireless communication network, where the network includes a first device, a second device, and a fourth device, where the first device, the second device, and the fourth device belong to the same
  • the first device is a configurator
  • the fourth device is a device configured by the first device
  • the device is the second device
  • the device includes:
  • a receiving module configured to receive a group key of the group to which the second device belongs, sent by the first device
  • a processing module configured to encrypt a signature public key of the second device according to the group key
  • a sending module configured to send the encrypted signature of the second device to the fourth device, so that the second device becomes a configurator capable of configuring the device to be configured, where the device to be configured includes Third device.
  • the processing module is further configured to determine, according to the signature private key of the second device and the public key of the third device, a signature of the public key of the third device;
  • the sending module is further configured to send a signature of the public key of the third device to the third device, so that the third device sends the first authentication information to the fourth device;
  • the first authentication information includes a public key of the third device and a signature of the public key of the third device, so that the fourth device performs the third device according to the first authentication information. Certification.
  • the receiving module is further configured to receive the sending by the first device a signature public key of the first device;
  • the sending module is further configured to send the signature public key of the first device to the third device, so that the third device performs the fourth device according to the signature public key of the first device. Certification.
  • the present invention provides a system for configuring a device in a wireless communication network, comprising: the first device and the ninth according to any one of the first to second aspects of the eighth aspect or the eighth aspect Aspect or the second device of any one of the first to third aspects of the ninth aspect.
  • the system further includes: the fourth device of the tenth aspect, and the first aspect of the eleventh or eleventh aspect The third device.
  • the system further includes: the twelfth aspect or the first to the second aspect of the twelfth aspect
  • the fourth device and the third device according to any one of the first to fourth aspects of the thirteenth aspect or the thirteenth aspect.
  • the present invention provides a system for configuring a device in a wireless communication network, comprising: the first device, the fourteenth aspect, or the second to any one of the first to second aspects of the fourteenth aspect device.
  • the present invention provides a method, an apparatus, and a system for configuring a device in a wireless communication network, where the first device receives a first message sent by the second device, where the first message includes a signature of the second device.
  • the first device sends the signature public key of the second device to the fourth device, so that the second device becomes a configurator capable of configuring the device to be configured, where the device to be configured includes And the first device sends the signature information of the second device to the second device, so that the second device becomes a configurator capable of configuring the device to be configured, where the device to be configured
  • the third device includes: the signature information of the second device is determined by the first device according to the signature private key of the first device and the signature public key of the second device, where the second device is The signature information includes a signature of the signature public key of the second device, and/or an encrypted signature public key of the second device; enabling a device (eg, a second device) in the wireless communication network to become capable A configurator that configures
  • Embodiment 1 is a flowchart of Embodiment 1 of a method for configuring a device in a wireless communication network according to the present invention
  • Embodiment 2 is a flowchart of Embodiment 2 of a method for configuring a device in a wireless communication network according to the present invention
  • Embodiment 3 is a flowchart of Embodiment 3 of a method for configuring a device in a wireless communication network according to the present invention
  • Embodiment 4 is a flowchart of Embodiment 4 of a method for configuring a device in a wireless communication network according to the present invention
  • Embodiment 5 is a flowchart of Embodiment 5 of a method for configuring a device in a wireless communication network according to the present invention
  • Embodiment 6 is a flowchart of Embodiment 6 of a method for configuring a device in a wireless communication network according to the present invention
  • Embodiment 7 is a flowchart of Embodiment 7 of a method for configuring a device in a wireless communication network according to the present invention
  • Embodiment 8 is a flowchart of Embodiment 8 of a method for configuring a device in a wireless communication network according to the present invention
  • Embodiment 9 is a flowchart of Embodiment 9 of a method for configuring a device in a wireless communication network according to the present invention.
  • Embodiment 10 is a flowchart of Embodiment 10 of a method for configuring a device in a wireless communication network according to the present invention
  • Embodiment 11 is a flowchart of Embodiment 11 of a method for configuring a device in a wireless communication network according to the present invention
  • Embodiment 12 is a flowchart of Embodiment 12 of a method for configuring a device in a wireless communication network according to the present invention
  • Embodiment 13 is a flowchart of Embodiment 13 of a method for configuring a device in a wireless communication network according to the present invention
  • FIG. 14 is a schematic structural diagram of Embodiment 1 of an apparatus for configuring a device in a wireless communication network according to the present invention
  • Embodiment 15 is a schematic structural diagram of Embodiment 2 of an apparatus for configuring a device in a wireless communication network according to the present invention
  • Embodiment 3 is a schematic structural diagram of Embodiment 3 of an apparatus for configuring a device in a wireless communication network according to the present invention
  • Embodiment 8 is a schematic structural diagram of Embodiment 8 of an apparatus for configuring a device in a wireless communication network according to the present invention.
  • FIG. 18 is a schematic structural diagram of Embodiment 9 of an apparatus for configuring a device in a wireless communication network according to the present invention.
  • the wireless communication network in the present invention may specifically be a network based on Wireless Fidelity (Wi-Fi) technology.
  • Wi-Fi Wireless Fidelity
  • it may be: Basic Service Set (BSS) network, Neighbor aware network (NAN), peer-to-peer (P2P, Peer to Peer) network, etc., independent basic service set (IBSS, Independent Basic Service Set) ) Network, etc.
  • BSS Basic Service Set
  • NAN Neighbor aware network
  • P2P peer-to-peer
  • IBSS Independent Basic Service Set
  • the device eg, the first device, the second device, etc.
  • the device may be an AP or an STA.
  • the device for example, the first device, the second device, etc.
  • the device may be a group owner (GO, group owner) device or a client.
  • the device eg, the first device, the second device, etc.
  • the device may be: a master state device, an anchor master state device, a non-master but a synchronization (Non-Master Sync) status device, or non-Master Non-Sync State device.
  • Embodiment 1 is a flowchart of Embodiment 1 of a method for configuring a device in a wireless communication network according to the present invention
  • the wireless communication network includes a first device, a second device, and a fourth device; wherein the first device is a configurator,
  • the fourth device is a device configured by the first device (that is, the first device configures the fourth device, so that the fourth device can join the wireless communication network); as shown in FIG.
  • the methods can include:
  • Step 101 The second device sends a first message to the first device, where the first message includes a signature public key of the second device.
  • the first message is used by the first device to send the signature public key of the second device to the fourth device, so that the second device becomes a configurator capable of configuring the device to be configured.
  • the device to be configured includes a third device;
  • the signature public key refers to a public key (that is, a signature public key) corresponding to a private key (that is, a signature private key) used when encrypting a hash value in a digital signature process. .
  • the digital signature means that the sender performs a hash operation on the specified message content to obtain a hash value, and then encrypts the hash value signature private key, and the encrypted result is called a signature.
  • the receiving end of the digital signature can verify the correctness of the signature. Specifically, the receiving end decrypts the signature by using the signature public key corresponding to the signature private key used by the transmitting end for digital signature.
  • Hash value hashes the specified message content to get another hash value, compares the two hash values; if they are the same, it determines that the signature is correct.
  • the signature public key belongs to the public key in the asymmetric encryption algorithm.
  • the asymmetric encryption algorithm requires two keys: a public key (public key) and a private key (private key); for the public key (that is, the public key) encrypted information, the corresponding private key is required. (ie, the private key) is decrypted.
  • the private key is decrypted.
  • Commonly used asymmetric encryption algorithms include the RSA (Ron Rivest, Adi Shamirh, and LenAdleman) algorithms.
  • Step 102 The first device sends the signature public key of the second device to the fourth device, so that the second device becomes a configurator capable of configuring the device to be configured, where the device to be configured includes Third device.
  • the signature public key of the second device is used by the fourth device to authenticate the third device configured by the second device.
  • the configurator (corresponding English may be a configurator or an introducer) refers to a device in the wireless communication network configured to configure the device to be configured to join the wireless communication network; the configurator may also The utility model has a function of establishing a secure connection between devices in the wireless communication network; the configurator may further have a camera, a user interface (UI), and a human machine interface.
  • the configurator is a mobile phone, a tablet (PAD), or the like.
  • the message for transmitting information between two devices may be an Extensible Authentication Protocol (EAP) message, an action message, and an existing electrical and electronic message.
  • EAP Extensible Authentication Protocol
  • the wireless communication network includes only one configurator, and the configurator configures the device to be configured to enable the device to be configured to join the network; when there are multiple devices to be configured in the wireless communication network that need to be configured, The configurator needs to configure the plurality of devices to be configured; therefore, there is a problem that the configuration efficiency is low.
  • the first message is sent to the first device by using the second device, where the first message includes a signature public key of the second device, and the first device sends the signature of the second device Sending a key to the fourth device, so that the second device becomes a configurator capable of configuring a device to be configured, the device to be configured includes a third device; enabling a device in the wireless communication network to be configured to be configured The configured configurator; therefore, when there are multiple devices to be configured in the wireless communication network that need to be configured, multiple configurators can configure multiple to-be-configured devices; The problem.
  • the wireless communication network includes a first device, a second device, and a fourth device; wherein the first device is a configurator,
  • the fourth device is a device configured by the first device; as shown in FIG. 2, the method in this embodiment may include:
  • Step 201 The second device sends a first message to the first device, where the first message includes a signature public key of the second device.
  • step 201 is similar to step 101, and details are not described herein again.
  • Step 202 The first device sends the signature information of the second device to the second device, so that the second device becomes a configurator capable of configuring the device to be configured, where the device to be configured includes Three devices;
  • the signature information of the second device is determined by the first device according to the signature private key of the first device and the signature public key of the second device, and the signature information of the second device includes the The signature of the signature public key of the second device, and/or the encrypted public key of the second device after encryption.
  • the signature information of the second device is used by the fourth device to determine whether the received signature public key of the second device is correct, and after determining that the received signature public key of the second device is correct. And authenticating the third device configured by the second device according to the received signature public key of the second device.
  • the first message is sent to the first device by using the second device, where the first message includes a signature public key of the second device, and the first device sends the signature information of the second device.
  • the wireless communication network includes a first device and a fourth device; wherein the first device is a configurator, and the fourth device is The device configured for the first device; as shown in FIG. 3, the method in this embodiment may include:
  • Step 301 The first device obtains a first public key of the second device.
  • the second device is a device to be configured.
  • the step 301 is specifically: the first device obtains the first public key of the second device by scanning the two-dimensional code of the second device, where the two-dimensional code includes the The first public key of the second device.
  • step 301 may be specifically: the first device is in close proximity to the second device.
  • Field Communication NFC obtains the first public key of the second device.
  • Step 302 The first device sends the public key of the first device to the second device.
  • Step 303 The first device generates a first shared key according to the private key of the first device and the first public key of the second device.
  • step 303 is not limited, and there may be no order.
  • the first device generates a first shared key by using a key exchange algorithm according to the private key of the first device and the first public key of the second device.
  • the key exchange algorithm may be a DH (Diffie-Hellman) algorithm or an Elliptic Curve Cryptosystems Diffie-Hellman (ECDH) algorithm.
  • DH Dynamic Hossion-Hellman
  • ECDH Elliptic Curve Cryptosystems Diffie-Hellman
  • the public key of the first device and the private key of the first device are corresponding public and private keys.
  • Step 304 The second device generates the first shared key according to the public key of the first device and the first private key of the second device.
  • step 304 and step 303 are not limited, and there may be no order.
  • first public key of the second device and the first private key of the second device are corresponding public and private keys.
  • Step 305 The first device and the second device establish a secure connection based on the first shared key or the derived key of the first shared key.
  • the derived key of the first shared key may be a key generated according to the first shared key, or may be a key generated according to the first shared key and specific information.
  • step 301 to step 305 can be considered as a process of establishing a secure connection between the first device and the second device.
  • Step 306 The first device sends the signature public key of the first device to the second device.
  • the signature public key (and the corresponding signature private key) is used by the configurator to digitally sign the device; other public keys (and corresponding private keys) (for example, the public key of the first device)
  • the first private key corresponding to the public key of the first device, the first public key of the second device, the first private key corresponding to the first public key of the second device, and the like are used for the asymmetric encryption algorithm.
  • Establish a secure connection ie, used to generate a shared key).
  • Step 307 The second device sends the second public key of the second device to the first device.
  • step 306 there may be no sequence between step 306 and step 307.
  • Step 308 The first device determines a signature of the second public key of the second device according to the second public key of the second device and the signature private key of the first device.
  • the first device first performs a hash operation on the second public key of the second device (or may also include other specified content) to obtain a hash value; the first device is according to the The signature private key of the first device encrypts the hash value to obtain the signature of the second public key of the second device.
  • the signature private key of the first device and the signature public key of the first device are corresponding public and private keys.
  • Step 309 The first device sends a signature of the second public key of the second device to the second device.
  • the first device may send the signature of the second public key of the second device and the signature public key of the first device to the second device by using a message; or, the A device may send the signature of the second public key of the second device and the signature public key of the first device to the second device by using different messages.
  • the first device configures the second device as a device capable of accessing the wireless communication network.
  • steps 307 to 309 are optional steps.
  • the second device may determine, according to the signature public key of the second device and the second public key of the second device, the second public key of the second device. Signature; at this point the second device has been configured as a device capable of accessing the wireless network.
  • Step 310 The second device sends a first message to the first device, where the first message includes a signature public key of the second device.
  • step 310 there may be no sequence between step 310 and step 306.
  • Step 311 The first device sends the signature public key of the second device to the fourth device, so that the second device becomes a configurator capable of configuring the device to be configured, where the device to be configured includes Third device;
  • the network further includes The other device may also send the second device's signature public key to other devices.
  • the sending, by the first device, the signature public key of the second device to the fourth device may include:
  • the first device sends the signature public key of the second device to other devices in the network, and the other device forwards the same to the fourth device.
  • the first device encrypts the signature public key of the second device according to the signature private key of the first device, and sends the encrypted signature public key of the second device to the fourth device;
  • the first device encrypts the signature public key of the second device according to a group key in the wireless communication network, and sends the encrypted signature public key of the second device. To the fourth device.
  • the group key may be sent by the configurator to a device that can be joined to the network configured by the configurator.
  • the group key is sent by the first device to the second device.
  • the wireless communication network is a NAN
  • the device 1 when one device (for example, the device 1) needs to send information to another device (for example, the device 2), the device 1 needs to be in the discovery window DW or the paging paging window. Or send information to device 2 in the management window.
  • the device 2 can wake up (awake) state in the discovery window DW, the paging paging window or the management window, and can listen to the message.
  • Step 312 The fourth device obtains a signature public key of the second device.
  • the fourth device may be based on the signature public key (or group) of the first device. Key: decrypting the encrypted signature public key of the second device to obtain a signature public key of the second device.
  • Step 313 The second device obtains a first public key of the third device.
  • the third device is a device to be configured.
  • the method for the second device to obtain the first public key of the third device in step 313 is similar to the method for the first device to obtain the first public key of the second device in step 301, and is no longer Narration.
  • Step 314 The second device sends the third public key of the second device to the third device. Prepared
  • Step 315 The second device generates a second shared key according to the third private key of the second device and the first public key of the third device.
  • the third public key of the second device and the third private key of the second device are corresponding public and private keys.
  • Step 316 The third device generates the second shared key according to the third public key of the second device and the first private key of the third device.
  • first public key of the third device and the first private key of the third device are corresponding public and private keys.
  • steps 314 to 316 are similar to the steps 302 to 304, and are not described here.
  • Step 317 The second device and the third device establish a secure connection based on the second shared key or the derived key of the second shared key.
  • the derived key of the second shared key may be a key generated according to the second shared key, or may be a key generated according to the second shared key and specific information.
  • Step 318 The second device sends the signature public key of the first device to the third device.
  • the second device may further send the signature public key of the second device to the third device, so that the third device may be configured according to the signature public key of the second device.
  • Other devices configured by the second device are authenticated.
  • the wireless communication network further includes other configurators (ie, configurators other than the first device and the second device), the second device may also sign other configurators.
  • the public key is also sent to the third device such that the third device can establish a secure connection with any of the wireless communication networks.
  • Step 319 The third device sends the second public key of the third device to the second device.
  • step 318 there may be no order between step 318 and step 319.
  • Step 320 The second device determines a signature of the second public key of the third device according to the second public key of the third device and the signature private key of the second device.
  • signature private key of the second device and the signature public key of the second device are Corresponding public and private keys.
  • step 320 is similar to step 308, and details are not described herein again.
  • Step 321 The second device sends a signature of the second public key of the third device to the third device.
  • the second device may be configured to configure the third device as a device capable of accessing the wireless communication network.
  • Step 322 The third device sends the first authentication information to the fourth device, where the first authentication information includes a signature of the second public key of the third device, and a third device Two public keys;
  • Step 323 The fourth device performs the third device according to the second public key of the third device, the signature of the second public key of the third device, and the signature public key of the second device. Certification
  • step 323 can include:
  • the fourth device decrypts the signature of the second public key of the third device according to the signature public key of the second device, to obtain a first hash value
  • the fourth device obtains a second hash value by using a hash operation according to the second public key of the third device (or may also include other specified content);
  • the fourth device determines whether the first hash value is the same as the second hash value
  • step 324 is performed, otherwise it ends.
  • Step 324 The fourth device sends the second authentication information to the third device, where the second authentication information includes a signature of the public key of the fourth device and a public key of the fourth device.
  • the signature of the public key of the fourth device is determined by the first device according to the signature private key of the first device and the public key of the fourth device.
  • Step 325 The third device performs authentication on the fourth device according to the public key of the fourth device, the signature of the public key of the fourth device, and the signature public key of the first device.
  • the method for the third device to authenticate the fourth device is similar to the step 323 in the step 325, and details are not described herein again.
  • Step 326 is performed when the authentication is successful, otherwise it ends.
  • Step 326 The fourth device generates a third shared key according to the second public key of the third device and the private key of the fourth device.
  • the public key of the fourth device and the private key of the fourth device are corresponding public and private keys.
  • step 326 and step 324 and step 325 may have no sequence.
  • Step 327 The third device generates the third shared key according to the second private key of the third device and the public key of the fourth device.
  • the second private key of the third device and the second public key of the third device are corresponding public and private keys.
  • Step 328 The third device and the fourth device establish a secure connection based on the third shared key or the derived key of the third shared key.
  • the derivative key of the third shared key may be a key generated according to the third shared key, or may be a key generated according to the third shared key and specific information.
  • the first device may send the first authentication information to the fourth device in step 322; when the fourth device initiates the connection to the third device, In step 322, the second authentication information may be sent to the third device for the fourth device.
  • steps 323 to 325 also undergo corresponding changes.
  • the first device establishes a secure connection with the second device to be configured; the first device sends the signature public key of the second device to the fourth device to enable the second device to be treated.
  • Configuring a configurator configured by the device steps 307 to 309 are not performed), or configuring the second device as a device capable of joining the wireless communication network, and then sending the signature public key of the second device to the fourth device
  • steps 307 to 309 are performed; when there are multiple devices to be configured in the wireless communication network that need to be configured, multiple configurators may be treated Configure the device for configuration; solve the problem of low configuration efficiency existing in the prior art.
  • the second device is configured to be able to access the wireless communication network.
  • the device and the device that sends the signature public key of the second device to the fourth device, so that the second device becomes a configurator capable of configuring the device to be configured may be the same or different; the first device in this implementation It can be the first configurator in a wireless communication network, or it can be a configurator configured by other configurators.
  • the wireless communication network includes a first device, a second device, and a fourth device; wherein the first device is a configurator,
  • the fourth device is a device configured by the first device; as shown in FIG. 4, the method in this embodiment may include:
  • Step 401 The second device sends a first message to the first device, where the first message includes a signature public key of the second device.
  • Step 402 The first device sends the signature information of the second device to the second device, so that the second device becomes a configurator capable of configuring the device to be configured, where the device to be configured includes Three devices;
  • Step 403 The second device determines, according to the signature public key of the second device and the second public key of the third device, a signature of the second public key of the third device.
  • step 403 is similar to step 313 to step 320, and details are not described herein again.
  • Step 404 The second device sends the first authentication information to the fourth device, where the first authentication information includes a signature of the second public key of the third device, and a second public of the third device. key;
  • Step 405 The fourth device performs, according to the second public key of the third device, the signature of the second public key of the third device, and the signature public key of the second device, to the third device. Certification
  • step 405 is similar to step 323, and details are not described herein again.
  • Step 406 is performed when the authentication is successful, otherwise it ends.
  • step 405 may be triggered.
  • Step 406 The fourth device sends the second authentication information to the third device.
  • the second authentication information includes a signature of a public key of the fourth device and a public key of the fourth device;
  • Step 407 The third device establishes a secure connection with the fourth device.
  • step 407 is similar to step 325 to step 328, and details are not described herein again.
  • the first authentication information is sent to the fourth device by using the second device, where the first authentication information includes a signature of the second public key of the third device and a second public key of the third device.
  • the fourth device may directly authenticate the third device according to the first authentication information sent by the second device; so that the fourth device does not need to wait for receiving
  • the first authentication information sent by the third device is used to authenticate the third device; the authentication efficiency is improved.
  • the wireless communication network includes a first device, a second device, and a fourth device; wherein the first device is a configurator,
  • the fourth device is a device configured by the first device; as shown in FIG. 5, the method in this embodiment may include:
  • Step 501 The second device sends a first message to the first device, where the first message includes a signature public key of the second device.
  • Step 502 The first device determines signature information of the second device according to the signature public key of the second device and the signature private key of the first device.
  • the signature information of the second device includes a signature of a signature public key of the second device, and/or an encrypted public key of the second device;
  • the determining, by the first device, the signature of the signature public key of the second device according to the signature public key of the second device and the signature private key of the first device may include:
  • the first device first performs a hash operation on the signature public key of the second device (or may also include other specified content) to obtain a hash value; the first device is further configured according to the first device.
  • the signature private key encrypts the hash value to obtain the signature of the second public device's signature public key.
  • the determining, by the first device, the encrypted public key of the second device according to the signature public key of the second device and the signature private key of the first device which may include:
  • the first device encrypts the signature public key of the second device according to the signature private key of the first device, so as to determine the encrypted signature public key of the second device.
  • Step 503 The first device sends the signature information of the second device to the second device, so that the second device becomes a configurator capable of configuring the device to be configured, where the device to be configured includes Three devices;
  • Step 504 The second device establishes a secure connection with the third device.
  • step 504 is similar to step 313 to step 317, and details are not described herein again.
  • Step 505 The second device sends the signature public key of the first device and the signature information of the second device to the third device.
  • the signature public key of the first device is used by the third device to authenticate the fourth device.
  • the second device may further send the signature public key of the second device to the third device, so that the third device may use the signature public key of the second device to the device x.
  • Authentication is performed; wherein device x is a device configured by the second device to be able to join the network.
  • the second device may send the signature public key of the first device and the signature information of the second device to the third device by using one message or multiple messages.
  • Step 506 The second device signs the second public key of the third device.
  • step 506 is similar to step 319 to step 321 and will not be further described herein.
  • the signature of the second public key of the third device has been sent to the third device in step 406.
  • step 505 there may be no sequence between step 505 and step 506.
  • Step 507 The third device sends the first authentication information and the configurator authentication information to the fourth device.
  • the first authentication information includes a signature of a second public key of the third device and a second public key of the third device; the configurator authentication information includes signature information and a location of the second device The signature public key of the second device.
  • first authentication information and the configurator authentication information may be sent to the fourth device in one message, or may be sent to the fourth device in multiple messages.
  • step 507 may be triggered.
  • Step 508 The fourth device determines, according to the configurator authentication information and the signature public key of the first device, whether the signature public key of the second device in the configurator authentication information is correct.
  • the fourth device determines the signature of the second device according to the signature of the signature public key of the second device, the signature public key of the second device, and the signature public key of the first device. Whether the public key is correct can include:
  • the fourth device decrypts the signature of the signature public key of the second device according to the signature public key of the first device, and obtains a hash value a; the fourth device is configured according to the signature of the second device. Key (or, may also include other specified content), using a hash operation to obtain a hash value b; the fourth device determines whether the hash value a is the same as the hash value b; if the same, the The fourth device determines that the signature public key of the second device is correct; otherwise, determines that the signature public key of the second device is incorrect.
  • the fourth device determines, according to the encrypted signature public key of the second device, the signature public key of the second device, and the signature public key of the first device, Whether the signature public key is correct can include:
  • the fourth device decrypts the encrypted signature public key of the second device according to the signature public key of the first device, and obtains a decrypted result; the fourth device determines the decrypted The result is the same as the signature public key of the second device; if the same, the signature public key of the second device is determined to be correct; otherwise, the signature public key of the second device is determined to be incorrect.
  • the fourth device since the fourth device is configured by the first device to be able to join the device in the network, the fourth device may receive the signature public key of the first device by using the first device. Obtaining a signature public key of the first device.
  • Step 509 The fourth device performs authentication on the third device according to the first authentication information and the signature public key of the second device.
  • Step 510 is performed when the authentication is successful, otherwise it ends.
  • Step 510 The fourth device sends the second authentication information to the third device.
  • the second authentication information includes a signature of a public key of the fourth device and a public key of the fourth device;
  • Step 511 The third device establishes a secure connection with the fourth device.
  • step 511 is similar to step 407, and details are not described herein again.
  • the first device determines the signature information of the second device according to the signature public key of the second device and the signature private key of the first device; the first device Sending the signature information of the second device to the second device, so that the second device becomes a configurator capable of configuring the device to be configured; so that when multiple devices to be configured in the wireless communication network need to be configured, There are multiple configurators to configure the device to be configured; it solves the problem of low configuration efficiency existing in the prior art.
  • the third device sends the first authentication information and the configurator authentication information to the first a device, wherein the first authentication information includes a signature of a second public key of the third device and a second public key of the third device, and the configurator authentication information includes a signature of the second device Information and a signature public key of the second device;
  • the fourth device is configured according to a second public key of the third device, a signature of a second public key of the third device, and a signature of the second device Key, the third device is authenticated;
  • the third device is configured according to the public key of the fourth device, the signature of the public key of the fourth device, and the signature public key of the first device.
  • the fourth device performs authentication; enabling a secure connection between the fourth device configured by the first device and the third device configured by the second device.
  • FIG. 6 is a flowchart of Embodiment 6 of a method for configuring a device in a wireless communication network according to the present invention
  • the wireless communication network includes a first device, a second device, and a fourth device; wherein the first device is a configurator,
  • the fourth device is a device configured by the first device; as shown in FIG. 6, the method in this embodiment may include:
  • Step 601 The second device sends a first message to the first device, where the first message includes a signature public key of the second device.
  • Step 602 The first device determines signature information of the second device according to the signature public key of the second device and the signature private key of the first device.
  • step 602 is similar to step 502, and details are not described herein again.
  • Step 603 The first device sends the signature information of the second device to the second device, so that the second device becomes a configurator capable of configuring the device to be configured, where the device to be configured includes Three devices;
  • step 603 is similar to step 503, and details are not described herein again.
  • Step 604 The second device sends configurator authentication information to the fourth device.
  • the configurator authentication information includes signature information of the second device and a signature public key of the second device.
  • Step 605 The second device establishes a secure connection with the third device.
  • step 605 is similar to step 504, and details are not described herein again.
  • Step 606 The second device sends the signature public key of the first device to the third device.
  • the second device may further send the signature public key of the second device and the signature information of the second device to the third device.
  • Step 607 The second device signs the second public key of the third device.
  • step 607 is similar to step 506, and details are not described herein again.
  • Step 608 The third device sends the first authentication information to the fourth device.
  • the first authentication information includes a signature of a second public key of the third device and a second public key of the third device.
  • step 608 may be triggered.
  • Step 609 The fourth device determines, according to the configurator authentication information and the signature public key of the first device, whether the signature public key of the second device in the configurator authentication information is correct.
  • step 610 If yes, go to step 610, otherwise end.
  • step 609 is similar to step 508, and details are not described herein again.
  • Step 610 The fourth device performs authentication on the third device according to the first authentication information and the signature public key of the second device.
  • step 611 is performed, otherwise it ends.
  • step 610 is similar to step 509, and details are not described herein again.
  • Step 611 The fourth device sends the second authentication information to the third device.
  • the second authentication information includes a signature of a public key of the fourth device and a public key of the fourth device;
  • Step 612 The third device establishes a secure connection with the fourth device.
  • step 612 is similar to step 511, and details are not described herein again.
  • the second public key of the third device is signed by the second device, and the signature public key of the first device and the signature information of the second device are sent to the third device.
  • the second device sends the configurator authentication information to the fourth device, where the configurator authentication information includes signature information of the second device and a signature public key of the second device;
  • the information is sent to the fourth device, where the first authentication information includes a signature of the second public key of the third device and a second public key of the third device, and the fourth device is configured according to the third device
  • the fourth device is authenticated by the key, the signature of the public key of the fourth device, and the signature public key of the first device, and the fourth device configured by the first device and the third device configured by the second device A secure connection can be established between them.
  • the wireless communication network includes a first device, a second device, and a fourth device; wherein the first device is a configurator, and the fourth device is a device configured by the first device;
  • the method of an embodiment may include:
  • Step 701 The second device sends a first message to the first device, where the first message includes a signature public key of the second device.
  • Step 702 The first device determines signature information of the second device according to the signature public key of the second device and the signature private key of the first device.
  • step 702 is similar to step 502, and details are not described herein again.
  • Step 703 The first device sends the signature information of the second device to the second device, so that the second device becomes a configurator capable of configuring the device to be configured, where the device to be configured includes Three devices;
  • step 703 is similar to step 503, and details are not described herein again.
  • Step 704 The second device establishes a secure connection with the third device.
  • step 704 is similar to step 504, and details are not described herein again.
  • Step 705 The second device sends the signature public key of the first device and the signature information of the second device to the third device.
  • step 705 is similar to step 505, and details are not described herein again.
  • the second device may further send the signature public key of the second device to the third device.
  • Step 706 The second device signs the second public key of the third device.
  • step 706 is similar to step 506 and will not be described again.
  • Step 707 The second device sends the first authentication information to the fourth device.
  • the first authentication information includes a second public key of the third device and a second public key of the third device.
  • step 707 may be performed after the second device determines the signature of the second public key of the third device.
  • Step 708 The third device sends configurator authentication information to the fourth device.
  • the configurator authentication information includes signature information of the second device and a signature public key of the second device.
  • Step 708 when the third device initiates the connection to the fourth device, the execution step may be triggered.
  • Step 709 The fourth device determines, according to the configurator authentication information and the signature public key of the first device, whether the signature public key of the second device in the configurator authentication information is correct.
  • step 709 is similar to step 508, and details are not described herein again.
  • Step 710 The fourth device performs authentication on the third device according to the first authentication information and the signature public key of the second device.
  • step 711 is performed, otherwise it ends.
  • Step 711 The fourth device sends the second authentication information to the third device.
  • the second authentication information includes a signature of a public key of the fourth device and a public key of the fourth device;
  • Step 712 The third device establishes a secure connection with the fourth device.
  • step 712 is similar to step 511, and details are not described herein again.
  • the first authentication information is sent to the fourth device by using the second device, where the first authentication information includes a signature of the second public key of the third device and a second public key of the third device.
  • the third device sends the configurator authentication information to the fourth device, where the configurator authentication information includes signature information of the second device and a signature public key of the second device, and the fourth device is configured according to the And authenticating, by the third device, the second public key of the third device, the signature of the second public key of the third device, and the signature public key of the second device;
  • the fourth device is authenticated by the public key of the device, the signature of the public key of the fourth device, and the signature public key of the first device, and the fourth device configured by the first device is configured with the second device.
  • a secure connection can be established between the third devices.
  • FIG. 8 is a flowchart of Embodiment 8 of a method for configuring a device in a wireless communication network according to the present invention
  • the wireless communication network includes a first device, a second device, and a fourth device; wherein the first device is a configurator,
  • the fourth device is a device configured by the first device; as shown in FIG. 8 , the method in this embodiment may include:
  • Step 801 The second device sends a first message to the first device, where the first message includes a signature public key of the second device.
  • Step 802 The first device determines signature information of the second device according to the signature public key of the second device and the signature private key of the first device.
  • step 802 is similar to step 502, and details are not described herein again.
  • Step 803 The first device sends the signature information of the second device to the second device, so that the second device becomes a configurator capable of configuring the device to be configured, where the device to be configured includes Three devices;
  • step 803 is similar to step 503, and details are not described herein again.
  • Step 804 The second device sends configurator authentication information to the fourth device.
  • the configurator authentication information includes signature information of the second device and a signature public key of the second device.
  • Step 805 The second device establishes a secure connection with the third device.
  • the third device is a device to be configured.
  • step 805 is similar to step 504, and details are not described herein again.
  • Step 806 The second device sends the signature public key of the first device to the third device.
  • the second device may further send the signature public key of the second device to the third device.
  • Step 807 The second device signs the second public key of the third device.
  • step 807 is similar to step 506, and details are not described herein again.
  • Step 808 The second device sends the first authentication information to the fourth device.
  • the first authentication information includes a signature of a second public key of the third device and a second public key of the third device.
  • Step 809 The fourth device determines, according to the configurator authentication information and the signature public key of the first device, whether the signature public key of the second device in the configurator authentication information is correct.
  • step 809 may be triggered.
  • Step 810 The fourth device performs authentication on the third device according to the first authentication information and a signature public key of the second device.
  • step 811 is performed, otherwise it ends.
  • Step 811 The fourth device sends the second authentication information to the third device.
  • the second authentication information includes a signature of a public key of the fourth device and a public key of the fourth device;
  • Step 812 The third device establishes a secure connection with the fourth device.
  • step 812 is similar to step 511, and details are not described herein again.
  • the first authentication information and the configurator authentication information are sent to the fourth device by using the second device, where the first authentication information includes a signature of the second public key of the third device, and the a second public key of the third device; the configurator authentication information includes signature information of the second device and a signature public key of the second device; when the fourth device initiates a connection to the second device, the fourth device
  • the third device may be authenticated according to the first authentication information sent by the second device; the fourth device does not need to wait for receiving the first authentication information sent by the third device to authenticate the third device; Improve the efficiency of certification.
  • FIG. 9 is a flowchart of Embodiment 9 of a method for configuring a device in a wireless communication network according to the present invention.
  • the wireless communication network includes the first device, the second device, and the fourth device, where the first device is the fifth device, by sending the signature information of the first device to the first device.
  • the first device is a configurator capable of configuring the device to be configured
  • the fifth device is a configurator
  • the fourth device is a device configured by the first device.
  • the method in this embodiment may include:
  • Step 901 The second device sends a first message to the first device, where the first message includes a signature public key of the second device.
  • Step 902 The first device determines signature information of the second device according to the signature public key of the second device and the signature private key of the first device.
  • the signature information of the second device includes a signature of a signature public key of the second device, and/or an encrypted public key of the second device;
  • step 902 is similar to step 502, and details are not described herein again.
  • Step 903 The first device sends the signature information of the first device and the signature information of the second device to the second device, so that the second device becomes a configuration that can be configured by the device to be configured.
  • the device to be configured includes a third device;
  • the signature information of the first device includes a signature of a signature public key of the first device, and/or an encrypted signature public key of the first device.
  • the signature information of the first device is determined by the fifth device according to the signature public key of the first device and the signature private key of the fifth device; the specific determining method is determined by the first device in step 902.
  • the method of signing information of the two devices is similar, and details are not described herein again.
  • Step 904 The second device establishes a secure connection with the third device.
  • the third device is a device to be configured.
  • step 904 is similar to step 504, and details are not described herein again.
  • Step 905 The second device sends the signature information of the first device and the signature information of the second device to the third device.
  • the second device may further send, to the third device, the signature public key of the first device, the signature public key of the second device, and the signature public key of the fifth device.
  • the third device is capable of authenticating devices configured by the first device, the second device, and the fifth device to be able to join the network.
  • Step 906 The second device signs the second public key of the third device.
  • step 906 is similar to step 506, and details are not described herein again.
  • Step 907 The third device sends the first authentication information and the configurator authentication information to the fourth device.
  • the first authentication information includes a signature of a second public key of the third device and a second public key of the third device; the configurator authentication information includes signature information and a location of the first device The signature public key of the first device, the signature information of the second device, and the signature public key of the second device.
  • the configurator authentication information may further include: a sequence identifier, where the sequence identifier is used to indicate that the fourth device first determines whether the signature public key of the first device is correct, and then determines the second device. Whether the signature public key is correct or not, or the sequence of the signature public key of the first device and the signature public key of the second device in the configurator authentication information indicates that the fourth device first determines the first Whether the signature public key of the device is correct, and then determining whether the signature public key of the second device is correct.
  • Step 908 The fourth device determines the configurator according to the signature public key of the fifth device and the signature information of the first device and the signature public key of the first device in the configurator authentication information. Whether the signature public key of the first device is correct in the authentication information;
  • the method for determining whether the signature public key of the first device is correct in the step 908 is similar to the method for determining whether the signature public key of the second device is correct in the step 508, and details are not described herein again.
  • the fourth device since the fourth device is configured by the fifth device to be able to join the device in the network, the fourth device may receive the signature public key of the fifth device by using the fifth device. Obtaining a signature public key of the fifth device.
  • Step 909 The fourth device determines the configurator according to the signature public key of the first device, the signature information of the second device, and the signature public key of the second device in the configurator authentication message. Whether the signature public key of the second device in the authentication information is correct;
  • step 909 is similar to step 508, and details are not described herein again.
  • Step 910 The fourth device performs authentication on the third device according to the first authentication information and the signature public key of the second device.
  • Step 911 is executed when the authentication is successful, otherwise it ends.
  • Step 911 The fourth device sends the second authentication information to the third device.
  • the second authentication information includes a signature of a public key of the fourth device and a public key of the fourth device;
  • Step 912 The third device establishes a secure connection with the fourth device.
  • step 912 is similar to step 511, and details are not described herein again.
  • the second public device is configured to sign the second public key of the third device, and the second device uses the signature public key of the first device, the signature information of the first device, and The signature information of the second device is sent to the third device; the third device sends the first authentication information and the configurator authentication information to the fourth device; wherein the first authentication information includes the third device a signature of the second public key of the device and a second public key of the third device, where the configurator authentication information includes signature information of the second device, a signature public key of the second device, and the first Signature information of the device and the signature public key of the first device; enabling the fourth device to be based on the signature public key of the fifth device, the signature information of the first device, and the signature public key of the first device After determining that the signature public key of the first device is correct, determining the signature of the second device according to the signature public key of the first device, the signature information of the second device, and the signature public key of the second device. Whether the public key is correct; and indeed After the correct
  • the wireless communication network includes a first device, a second device, and a fourth device; wherein, the first device is configured
  • the second device is a manner in which the first device sends the signature public key of the second device to the fourth device or sends the signature information of the second device to the second device.
  • the second device becomes a configurator capable of configuring the device to be configured
  • the fourth device is a device configured by the first device.
  • the method in this embodiment may include:
  • Step 1001 The second device determines, according to the signature private key of the second device and the fourth public key of the second device, a signature of the fourth public key of the second device.
  • step 1001 the second device determines that the signature of the fourth public key of the second device is similar to the signature of the second public device in the second device in step 320, and details are not described herein.
  • Step 1002 The second device sends a fourth public key of the second device and a fourth public key of the second device to the fourth device.
  • Step 1003 The fourth device performs authentication on the second device according to the signature of the second device and the signature of the fourth public key of the second device.
  • step 1004 is performed, otherwise it ends.
  • the method for authenticating the second device by the fourth device in step 1003 is similar to the method for authenticating the third device in step 323, and details are not described herein again.
  • the fourth device may further include: the fourth device receives the signature public key of the second device that is sent by the first device.
  • the method may further include:
  • the fourth device receives the configurator authentication information sent by the second network device, where the configurator authentication information includes signature information of the second device and a signature public key of the second device;
  • the signature information of the second device, the signature public key of the first device, and the signature public key of the second device determine whether the signature public key of the second device is correct; if yes, step 1003 is performed.
  • Step 1004 The fourth device generates a fourth shared key according to the fourth public key of the second device and the private key of the fourth device.
  • Step 1005 The fourth device sends the signature of the public key of the fourth device and the public key of the fourth device to the second device.
  • the public key of the fourth device and the private key of the fourth device are corresponding public and private keys.
  • Step 1006 The second device is configured according to the signature public key of the first device and the fourth device The signature of the public key to authenticate the fourth device;
  • step 1007 is performed, otherwise it ends.
  • the method for the second device to authenticate the fourth device in the step 1005 is similar to the method for the fourth device to authenticate the second device in the step 1003, and details are not described herein again.
  • Step 1007 The second device generates the fourth shared key according to the public key of the fourth device and the fourth private key of the second device.
  • the fourth private key of the second device and the fourth public key of the second device are corresponding public and private keys.
  • Step 1008 The second device and the fourth device establish a secure connection based on the fourth shared key or the derived key of the fourth shared key.
  • the signature of the fourth public key of the second device is determined by the second device according to the signature private key of the second device and the fourth public key of the second device;
  • the device sends the signature of the fourth public key of the second device and the fourth public key of the second device to the fourth device;
  • the fourth device is configured according to the signature public key of the second device and the Signing the fourth device of the second device, and authenticating the second device; enabling the second device as the configurator to determine a digital signature for itself according to the signature public key of the device, and according to the digital signature and the fourth device Secure connection.
  • the wireless communication network includes a first device, a second device, and a fourth device; wherein the first device and the second device are And the fourth device belongs to the same group; the first device is a configurator, and the fourth device is a device configured by the first device; as shown in FIG. 11 , the method in this embodiment may include:
  • Step 1101 The first device sends a group key of the group to which the second device belongs to the second device.
  • Step 1102 The second device encrypts the signature public key of the second device according to the group key.
  • Step 1103 The second device sends the encrypted signature of the second device to the fourth device, so that the second device becomes a configurator capable of configuring the device to be configured.
  • the configuration device includes a third device.
  • the group key is sent to the second device by using the first device, and the second device encrypts the signature public key of the second device according to the group key, and the encrypted device is Second Sending a signature public key of the device to the fourth device, so that the second device becomes a configurator capable of configuring the device to be configured, the device to be configured includes a third device; enabling devices in the wireless communication network to become capable A configurator that configures the device to be configured; therefore, when multiple devices to be configured need to be configured in the wireless communication network, multiple configurators can configure multiple devices to be configured; The problem of low efficiency is configured.
  • Embodiment 12 is a flowchart of Embodiment 12 of a method for configuring a device in a wireless communication network according to the present invention
  • the wireless communication network includes a first device and a fourth device; wherein the first device and the fourth device belong to the same group;
  • the first device is a configurator, and the fourth device is a device configured by the first device.
  • the method in this embodiment may include:
  • Step 1201 The first device obtains a first public key of the second device.
  • the second device is a device to be configured.
  • Step 1202 The first device sends the public key of the first device to the second device.
  • Step 1203 The first device generates a first shared key according to the private key of the first device and the first public key of the second device.
  • Step 1204 The second device generates the first shared key according to the public key of the first device and the first private key of the second device.
  • Step 1205 The first device and the second device establish a secure connection based on the first shared key or the derived key of the first shared key.
  • steps 1201 to 1205 are similar to the steps 301 to 305, and are not described herein again.
  • Step 1206 The first device sends the group key of the group to which the first device belongs and the signature public key of the first device to the second device.
  • Step 1207 The second device encrypts the signature public key of the second device according to the group key, and obtains the encrypted signature public key of the second device.
  • Step 1208 The second device establishes a secure connection with the third device.
  • the third device is a device to be configured.
  • step 1208 is similar to step 504, and details are not described herein again.
  • Step 1209 The second device sends the signature public key of the first device and the encrypted signature public key of the second device to the third device.
  • Step 1210 The second device signs the second public key of the third device.
  • step 1210 is similar to step 506, and details are not described herein again.
  • Step 1211 The third device sends the first authentication information and the configurator authentication information to the fourth device.
  • the first authentication information includes a signature of a second public key of the third device and a second public key of the third device; the configurator authentication information includes the encrypted second device Signature public key.
  • Step 1212 The fourth device decrypts the encrypted signature of the second device included in the configurator authentication information according to the group key, and obtains a signature public key of the second device. And authenticating the third device according to the first authentication information and the signature public key of the second device;
  • step 1213 is performed, otherwise it ends.
  • Step 1213 The fourth device sends the second authentication information to the third device.
  • the second authentication information includes a signature of a public key of the fourth device and a public key of the fourth device;
  • Step 1214 The third device establishes a secure connection with the fourth device.
  • step 1214 is similar to step 511, and details are not described herein again.
  • the group key is sent to the second device by the first device, and the second device determines the encrypted signature public key of the second device according to the group key; the second The device signs the second public key of the third device, and sends the encrypted signature public key of the second device to the third device; the third device uses the first authentication information and The configurator authentication information is sent to the fourth device, where the first authentication information includes a signature of the second public key of the third device and a second public key of the third device, where the configurator authentication information includes And the encrypted public key of the second device; the fourth device decrypts the encrypted signature of the second device according to the group key to obtain a signature public key of the second device, and Determining, by the second public key of the third device, the signature of the second public key of the third device, and the signature public key of the second device, the third device is configured; A device can be established between the device and the third device configured by the second device Fully connected.
  • the wireless communication network includes a first device, a second device, and a fourth device; wherein the first device and the second device are And the fourth device belongs to the same group; the first device is a configurator, and the fourth device is The device configured by the first device; as shown in FIG. 13, the method in this embodiment may include:
  • Step 1301 The first device sends the group key of the group to which the first device belongs and the signature public key of the first device to the second device.
  • the group in the present invention may be a set including at least the first device
  • Step 1302 The second device encrypts the signature public key of the second device according to the group key, and obtains the encrypted signature public key of the second device.
  • Step 1303 The second device sends configurator authentication information to the fourth device.
  • the configurator authentication information includes the encrypted signature public key of the second device.
  • Step 1304 The fourth device decrypts the encrypted signature of the second device included in the configurator authentication information according to the group key, and obtains a signature public key of the second device.
  • Step 1305 The second device establishes a secure connection with the third device.
  • the third device is a device to be configured.
  • step 1305 is similar to step 504, and details are not described herein again.
  • Step 1306 The second device sends the signature public key of the first device to the third device.
  • the second device may further send the encrypted signature public key and the group key of the second device to the third device, so that the third device can obtain the second device. Signing the public key so that the third device authenticates other devices configured by the second device.
  • Step 1307 The second device signs the second public key of the third device.
  • step 1307 is similar to step 506, and details are not described herein again.
  • Step 1308 The third device sends the first authentication information to the fourth device.
  • the first authentication information includes a signature of a second public key of the third device and a second public key of the third device.
  • step 1308 may be triggered.
  • Step 1309 The fourth device performs authentication on the third device according to the first authentication information and the signature public key of the second device.
  • step 1310 is performed, otherwise it ends.
  • step 1309 is similar to step 509, and details are not described herein again.
  • Step 1310 The fourth device sends the second authentication information to the third device.
  • the second authentication information includes a signature of a public key of the fourth device and a public key of the fourth device;
  • Step 1311 The third device establishes a secure connection with the fourth device.
  • step 1310 is similar to step 511, and details are not described herein again.
  • the group key is sent to the second device by using the first device, and the second device encrypts the signature public key of the second device according to the group key;
  • the second public key of the third device is signed, and the signature public key of the first device is sent to the third device;
  • the second device sends the configurator authentication information to the fourth device, where the configuration
  • the device authentication information includes the encrypted signature public key of the second device;
  • the third device sends the first authentication information to the fourth device, where the first authentication information includes a signature of the second public key of the third device And the second public key of the third device;
  • the fourth device decrypts the encrypted signature of the second device according to the group key to obtain a signature public key of the second device, and the a second public device, a second public key of the third device, a signature of the second public key of the third device, and a signature public key of the second device, to authenticate the third device, and the fourth device configured by the first device Can be established between the third device configured with the second device Fully connected.
  • FIG. 14 is a schematic structural diagram of Embodiment 1 of a device for configuring a device in a wireless communication network according to the present invention; the network includes a first device, a second device, and a fourth device; wherein the first device is a configurator, and the The device is configured as the first device.
  • the device is the first device.
  • the device in this embodiment may include: a receiving module 1401 and a sending module 1402.
  • the receiving module 1401 is configured to receive a first message sent by the second device, where the first message includes a signature public key of the second device, and a sending module 1402, configured to sign the second device Transmitting a public key to the fourth device, so that the second device becomes a configurator capable of configuring the device to be configured, the device to be configured includes a third device; or, for signing the second device Sending information to the second device, so that the second device becomes a configurator capable of configuring the device to be configured, the device to be configured includes a third device; wherein the signature information of the second device is The first device is determined according to the signature private key of the first device and the signature public key of the second device, and the signature information of the second device includes a signature of the signature public key of the second device, and/or And the encrypted public key of the second device after the encryption.
  • the sending module 1402 sends the signature public key of the second device to the fourth device, specifically: in the discovery window DW, or searching Sending the signature public key of the second device to the fourth device in the paging window or the management window.
  • the sending module 1402 is further configured to send the signature public key of the first device to the second device, so that the second device sends the signature public key of the first device to the And a third device, so that the third device authenticates the fourth device according to the signature public key of the first device.
  • the device in this embodiment may be used to implement the technical solution on the first device side of the method embodiment shown in FIG. 1 to FIG. 10 , and the implementation principle and technical effects are similar, and details are not described herein again.
  • the network includes a first device, a second device, and a fourth device; wherein the first device is a configurator, and the The device is the device configured by the first device; the device is the second device, as shown in FIG. 15, the device in this embodiment may include: a sending module 1501, configured to send the first message to the device The first device, where the first message includes a signature public key of the second device;
  • the first message is used by the first device to send the signature public key of the second device to the fourth device, so that the second device becomes a configurator capable of configuring the device to be configured.
  • the device to be configured includes a third device; or the first message is used by the first device to send signature information of the second device to the second device, so that the second device is enabled a configurator configured to configure the device, where the device to be configured includes a third device;
  • the device When the first message is used by the first device to send the signature information of the second device to the second device, the device further includes:
  • the first receiving module 1502 is configured to receive signature information of the second device that is sent by the first device.
  • the signature information of the second device includes a signature of a signature public key of the second device, and/or an encrypted public key of the second device, and the signature information of the second device is The first device is determined according to the signature private key of the first device and the signature public key of the second device.
  • the device further includes: a processing module 1503, configured to determine, according to the signature private key of the second device and a public key of the third device, a signature of the public key of the third device;
  • the sending module 1501 is further configured to send a signature of the public key of the third device to the third device, so that the third device sends the first authentication information to the fourth device, and/or Sending the first authentication information to the fourth device;
  • the first authentication information includes a public key of the third device and a signature of the public key of the third device, so that the fourth device performs the third device according to the first authentication information. Certification.
  • the sending module 1501 is further configured to: send signature information of the second device to the third device; and/or send configurator authentication information to the fourth device, where the configurator The authentication information includes signature information of the second device and a signature public key of the second device.
  • the device further includes: a second receiving module 1504, configured to receive a signature public key of the first device that is sent by the first device;
  • the sending module 1501 is further configured to send the signature public key of the first device to the third device, so that the third device pairs the fourth device according to the signature public key of the first device. Certify.
  • the device in this embodiment may be used to implement the technical solution on the second device side of the method embodiment shown in FIG. 1 to FIG. 10 , and the implementation principle and technical effects are similar, and details are not described herein again.
  • FIG. 16 is a schematic structural diagram of Embodiment 3 of a device for configuring a device in a wireless communication network according to the present invention; the network includes a first device, a second device, and a fourth device; wherein the first device is a configurator, and the And the second device is a device configured by the first device by sending the signature public key of the second device to the fourth device, so that the second device is
  • the device is configured as a configurator capable of configuring the device to be configured, the device to be configured includes a third device, and the device is the fourth device.
  • the device in this embodiment may include: a receiving module 1601. The processing module 1602 and the sending module 1603.
  • the receiving module 1601 is configured to receive first authentication information that is sent by the network device after the third device that is configured to be configured by the second device is configured, where the first authentication information includes a publicity of the third device. a signature of the public key of the third device, where the signature of the public key of the third device is a signature private key corresponding to the signature public key of the second device by the second device, and the The public key of the third device is determined and sent to the third device; the processing module 1602 is configured to send, according to the public key of the third device, the signature of the public key of the third device, and the first device The third public device is authenticated by the signature public key of the second device, and the sending module 1603 is configured to send the second authentication information to the third device, so that the third device is configured according to the third device.
  • the second authentication information is used to authenticate the fourth device, where the second authentication information includes a public key of the fourth device and a signature of a public key of the fourth device;
  • the network device is the second device or the third device.
  • the device of this embodiment may be used to implement the technical solution of the fourth device side of the method embodiment shown in FIG. 3 and FIG. 4 , and the implementation principle and technical effects thereof are similar, and details are not described herein again.
  • the network includes a first device, a second device, and a fourth device, where the first device is a configurator, the fourth device is a device configured by the first device, and the second device is And causing, by the first device, a configurator that can configure the device to be configured by using a method of sending the signature public key of the second device to the fourth device, where the device to be configured includes a third device; the device is the third device.
  • the structure of the apparatus of this embodiment is the same as that of the structure shown in FIG. 16, and also includes a receiving module, a processing module, and a transmitting module.
  • the processing module is configured to obtain first authentication information after the second device configures the third device, where the first authentication information includes a public key of the third device and the third device a signature of the public key; wherein the signature of the public key of the third device is determined by the second device according to the signature private key corresponding to the signature public key of the second device and the public key of the third device And sending, to the third device, a sending module, configured to send the first authentication information to the fourth device, to enable the fourth device to use the third device according to the first authentication information
  • the receiving module is configured to receive the second authentication information that is sent by the fourth device, where the second authentication information includes a public key of the fourth device and a signature of a public key of the fourth device; And the fourth device is authenticated according to the public key of the fourth device, the signature of the public key of the fourth device, and the signature public
  • the receiving module is further configured to receive a signature public key of the first device that is sent by the second device.
  • the device of this embodiment may be used to implement the technical solution of the third device side of the method embodiment shown in FIG. 3 and FIG. 4 , and the implementation principle and technical effects thereof are similar, and details are not described herein again.
  • the network includes a first device, a second device, and a fourth device, where the first device is a configurator, the fourth device is a device configured by the first device, and the second device is And causing, by the first device, the second device to be a configurator capable of configuring the device to be configured, by sending the signature information of the second device to the second device, where the device to be configured includes a device, wherein the signature information of the second device is the first device according to the first device Determining, by the signature private key of the first device and the signature public key of the second device; the signature information of the second device includes a signature of the signature public key of the second device, and/or, after being encrypted The signature public key of the second device; the device is the fourth device.
  • the structure of the apparatus of this embodiment is the same as that of the structure shown in FIG. 16, and also includes a receiving module, a processing module, and a transmitting module.
  • the receiving module is configured to receive, after the second device configures the third device, first authentication information that is sent by the first network device, where the first authentication information includes a public key of the third device a signature of the public key of the third device, where the signature of the public key of the third device is a signature private key corresponding to the signature public key of the second device by the second device, and the third
  • the receiving module is further configured to receive the configurator authentication information sent by the second network device, where the configurator authentication information includes the signature information of the second device, and a signature public key of the second device; the processing module, configured to determine the second according to signature information of the second device, a signature public key of the first device, and a signature public key of the second device Whether the signature public key of the device is correct; if yes, authenticating the third device according to the public key of the third device,
  • the first network device is the second device or the third device
  • the second network device is the second device or the third device.
  • the first device becomes a configurator capable of configuring the device to be configured.
  • the fifth device is a configurator; the configurator authentication information further includes: signature information of the first device and a signature public key of the first device;
  • the signature information of the first device is determined by the fifth device according to the signature public key of the first device and the signature private key of the fifth device; the signature information of the first device includes the The signature of the signature public key of the first device, and/or the encrypted signature public key of the first device;
  • the processing module determines, according to the signature information of the second device, the signature public key of the first device, and the signature public key of the second device, whether the signature public key of the second device is correct, specifically including :
  • the signature public key determines whether the signature public key of the first device is correct; if yes, according to the signature information of the second device, the signature public key of the first device, and the signature public key of the second device, Determining whether the signature public key of the second device is correct.
  • the configurator authentication information further includes: a sequence identifier, where the sequence identifier is used to indicate that the fourth device first determines whether the signature public key of the first device is correct, and then determines the second device. Whether the signature public key is correct;
  • the sequence of the signature public key of the first device and the signature public key of the second device in the configurator authentication information indicates that the fourth device first determines whether the signature public key of the first device is correct. And determining whether the signature public key of the second device is correct.
  • the device in this embodiment may be used to implement the technical solution on the fourth device side of the method embodiment shown in FIG. 5 to FIG. 10 , and the implementation principle and technical effects are similar, and details are not described herein again.
  • the network includes a first device, a second device, and a fourth device, where the first device is a configurator, the fourth device is a device configured by the first device, and the second device is And causing, by the first device, the second device to be a configurator capable of configuring the device to be configured, by sending the signature information of the second device to the second device, where the device to be configured includes a device, wherein the signature information of the second device is determined by the first device according to the signature private key of the first device and the signature public key of the second device; and the signature information of the second device The signature of the signature public key of the second device, and/or the encrypted signature public key of the second device; the device is the fourth device.
  • the structure of the apparatus of this embodiment is the same as that of the structure shown in FIG. 16, and also includes a receiving module, a processing module, and a transmitting module.
  • the processing module is configured to obtain first authentication information after the second device configures the third device, where the first authentication information includes a public key of the third device and the third device a signature of the public key; wherein the signature of the public key of the third device is determined by the second device according to the signature private key corresponding to the signature public key of the second device and the public key of the third device And sending, to the third device, a sending module, configured to send the first authentication information to the fourth device, to enable the fourth device to use the third device according to the first authentication information
  • the receiving module is configured to receive the second authentication information that is sent by the fourth device, where the second authentication information includes a public key of the fourth device and a signature of a public key of the fourth device; And for signing according to the public key of the fourth device and the public key of the fourth device The name and the signature public key of the first device authentic
  • the sending module is further configured to: send configurator authentication information to the fourth device, where the configurator authentication information includes signature information of the second device and a signature public key of the second device .
  • the first device becomes a configurator capable of configuring the device to be configured.
  • the fifth device is a configurator; the configurator authentication information further includes: signature information of the first device and a signature public key of the first device;
  • the signature information of the first device is determined by the fifth device according to the signature public key of the first device and the signature private key of the fifth device; the signature information of the first device includes the The signature of the signature public key of the first device, and/or the encrypted signature public key of the first device.
  • the configurator authentication information further includes: a sequence identifier, where the sequence identifier is used to indicate that the fourth device first determines whether the signature public key of the first device is correct, and then determines the second device. Whether the signature public key is correct;
  • the sequence of the signature public key of the first device and the signature public key of the second device in the configurator authentication information indicates that the fourth device first determines whether the signature public key of the first device is correct. And determining whether the signature public key of the second device is correct.
  • the receiving module is further configured to receive a signature public key of the first device that is sent by the second device.
  • the device in this embodiment may be used to implement the technical solution on the third device side of the method embodiment shown in FIG. 5 to FIG. 10 , and the implementation principle and technical effects are similar, and details are not described herein again.
  • the network includes a first device, a second device, and a fourth device, where the first device, the second device, and the fourth device belong to the same group; the first device is a configurator; The device configured by the first device; the device is the second device.
  • the structure of the apparatus of this embodiment is the same as that of the structure shown in FIG. 16, and also includes a receiving module, a processing module, and a transmitting module.
  • the receiving module is configured to receive a group key of the group to which the second device belongs
  • the processing module is configured to encrypt the signature public key of the second device according to the group key
  • a sending module configured to send the encrypted signature public key of the second device to the fourth device, so that the second device becomes capable of being configured with the device to be configured a configurator, the device to be configured includes a third device.
  • the processing module is further configured to determine a signature of the public key of the third device according to the signature private key of the second device and the public key of the third device;
  • the sending module is further configured to send a signature of the public key of the third device to the third device, so that the third device sends the first authentication information to the fourth device;
  • the first authentication information includes a public key of the third device and a signature of the public key of the third device, so that the fourth device performs the third device according to the first authentication information. Certification.
  • the receiving module is further configured to receive a signature public key of the first device that is sent by the first device;
  • the sending module is further configured to send the signature public key of the first device to the third device, so that the third device performs the fourth device according to the signature public key of the first device. Certification.
  • the device in this embodiment may be used to implement the technical solution on the second device side of the method embodiment shown in FIG. 11 to FIG. 13 , and the implementation principle and technical effects are similar, and details are not described herein again.
  • the present invention also provides a system for configuring a device in a line communication network, the system includes: a first device according to the first embodiment of the device configuration in the wireless communication network, and a device configuration device in the wireless communication network. The second device described.
  • the system may further include: a fourth device, where the device is configured in the wireless communication network, and a third device, where the device is configured in the wireless communication network; or
  • the system may further include: a fourth device according to the fifth embodiment of the apparatus configured in the wireless communication network, and a third device according to the sixth embodiment of the device configured in the wireless communication network.
  • the system of the present embodiment can be used to implement the technical solution of the method embodiment shown in FIG. 1 to FIG. 10 , and the implementation principle and technical effects are similar, and details are not described herein again.
  • the present invention also provides a system for configuring a device in a line communication network, the system comprising: a first device and a second device according to Embodiment 7 of the device configured in the wireless communication network.
  • the system of the present embodiment can be used to implement the technical solution of the method embodiment shown in FIG. 11 to FIG. 13 , and the implementation principle and technical effects are similar, and details are not described herein again.
  • the device in this embodiment may include: a receiver 1701 and a transmitter 1702.
  • the receiver 1701 is configured to receive a first message sent by the second device, where the first message includes a signature public key of the second device, and a sender 1702, configured to sign the second device
  • the public key is sent to the fourth device, so that the second device becomes a configurator capable of configuring the device to be configured, and the device to be configured includes a third device.
  • the sender 1702 sends the signature public key of the second device to the fourth device, specifically: in the discovery window DW, or the paging paging window, Or sending the signature public key of the second device to the fourth device in the management window.
  • the sender 1702 is further configured to send the signature public key of the first device to the second device, so that the second device sends the signature public key of the first device to the And a third device, so that the third device authenticates the fourth device according to the signature public key of the first device.
  • the device in this embodiment may be used to implement the technical solution on the first device side of the method embodiment shown in FIG. 1 , FIG. 3 , FIG. 4 , and FIG. 10 , and the implementation principle and technical effects thereof are similar, and details are not described herein again.
  • FIG. 18 is a schematic structural diagram of Embodiment 9 of a device configured in a wireless communication network according to the present invention; the network includes a first device, a second device, and a fourth device; wherein the first device is a configurator, and the The device is the device configured by the first device; the device is the first device.
  • the device in this embodiment may include: a receiver 1801, a processor 1802, and a transmitter 1803.
  • the receiver 1801 is configured to receive the first message sent by the second device, where the first message includes a signature public key of the second device, and the processor 1802 is configured to use the signature of the first device.
  • the private key and the signature public key of the second device determine the signature information of the second device; the sender 1803 is configured to send the signature information of the second device to the second device, so that the first
  • the second device becomes a configurator capable of configuring the device to be configured, the device to be configured includes a third device, wherein the signature information of the second device includes a signature of a signature public key of the second device, and/or The encrypted signature key of the second device after encryption.
  • the sender 1803 sends the signature public key of the second device to the fourth device, specifically: in the discovery window DW, or the paging paging window, Or sending the signature public key of the second device to the fourth device in the management window.
  • the sender 1803 is further configured to send the signature public key of the first device to the second device, so that the second device sends the signature public key of the first device to the Third device,
  • the third device is configured to authenticate the fourth device according to the signature public key of the first device.
  • the device in this embodiment may be used to implement the technical solution on the first device side of the method embodiment shown in FIG. 2 and FIG. 5 to FIG. 10 , and the implementation principle and technical effects thereof are similar, and details are not described herein again.
  • the network includes a first device, a second device, and a fourth device, where the first device is a configurator, and the fourth device is a device configured by the first device; Said second device.
  • the structure of the apparatus of this embodiment is similar to that shown in FIG.
  • the sender is configured to send the first message to the first device, where the first message includes a signature public key of the second device, where the first message is used by the first device
  • the signature public key of the second device is sent to the fourth device, so that the second device becomes a configurator capable of configuring the device to be configured, and the device to be configured includes a third device.
  • the apparatus of this embodiment further includes: a processor, configured to determine, according to the signature private key of the second device and the public key of the third device, a signature of the public key of the third device;
  • the transmitter is further configured to send a signature of the public key of the third device to the third device, so that the third device sends the first authentication information to the fourth device, and/or Transmitting the first authentication information to the fourth device;
  • the first authentication information includes a public key of the third device and a signature of the public key of the third device, so that the fourth device performs the third device according to the first authentication information. Certification.
  • the apparatus of this embodiment further includes: a receiver, configured to receive a signature public key of the first device that is sent by the first device;
  • the sender is further configured to send the signature public key of the first device to the third device, so that the third device pairs the fourth device according to the signature public key of the first device The device is certified.
  • the device in this embodiment may be used to implement the technical solution on the second device side of the method embodiment shown in FIG. 1 , FIG. 3 , FIG. 4 , and FIG. 10 , and the implementation principle and technical effects are similar, and details are not described herein again.
  • the network includes a first device, a second device, and a fourth device, where the first device is a configurator, and the fourth device is a device configured by the first device; Said second device.
  • the structure of the apparatus of this embodiment is similar to that shown in FIG.
  • the sender is configured to send the first message to the first device, where the first message includes a signature public key of the second device, where the first message is used by the first device
  • the signature information of the second device is sent to the second device, so that the second device becomes a configurator capable of configuring the device to be configured, the device to be configured includes a third device, and the receiver is configured to receive The signature information of the second device sent by the first device;
  • the signature information of the second device includes a signature of a signature public key of the second device, and/or an encrypted public key of the second device, and the signature information of the second device is The first device is determined according to the signature private key of the first device and the signature public key of the second device.
  • the apparatus of this embodiment further includes: a processor, configured to determine, according to the signature private key of the second device and the public key of the third device, a signature of the public key of the third device;
  • the transmitter is further configured to send a signature of the public key of the third device to the third device, so that the third device sends the first authentication information to the fourth device, and/or Sending the first authentication information to the fourth device;
  • the first authentication information includes a public key of the third device and a signature of the public key of the third device, so that the fourth device performs the third device according to the first authentication information. Certification.
  • the transmitter is further configured to: send signature information of the second device to the third device; and/or send configurator authentication information to the fourth device, where the configurator authenticates
  • the information includes signature information of the second device and a signature public key of the second device.
  • the receiver is further configured to receive a signature public key of the first device that is sent by the first device;
  • the sender is further configured to send the signature public key of the first device to the third device, so that the third device pairs the fourth device according to the signature public key of the first device Certify.
  • the device in this embodiment can be used to implement the technical solution on the second device side of the method embodiment shown in FIG. 2 and FIG. 5 to FIG. 10 , and the implementation principle and technical effects are similar, and details are not described herein again.
  • the network includes a first device, a second device, and a fourth device; wherein the first The device is a configurator, the fourth device is a device configured by the first device, and the second device is the first device by sending a signature public key of the second device to the fourth device In a manner, the second device is configured as a configurator capable of configuring the device to be configured, the device to be configured includes a third device, and the device is the fourth device.
  • the structure of the apparatus of this embodiment is the same as that of the structure shown in FIG. 18, and also includes a receiver, a processor, and a transmitter.
  • the receiving device is configured to receive first authentication information that is sent by the network device, where the first authentication information includes a public key of the third device, after the third device is configured to be configured by the second device.
  • a signature of the public key of the third device where the signature of the public key of the third device is a signature private key corresponding to the signature public key of the second device by the second device
  • the third a processor configured to send to the third device
  • a processor configured to: according to a public key of the third device, a signature of a public key of the third device, and a location sent by the first device
  • the third public device is authenticated by the signature public key of the second device, and the transmitter is configured to send the second authentication information to the third device, so that the third device is configured according to the second authentication information.
  • authenticating the fourth device where the second authentication information includes a public key of the fourth device and a signature of a public key of the fourth device;
  • the network device is the second device or the third device.
  • the device of this embodiment may be used to implement the technical solution of the fourth device side of the method embodiment shown in FIG. 3 and FIG. 4 , and the implementation principle and technical effects thereof are similar, and details are not described herein again.
  • the network includes a first device, a second device, and a fourth device, where the first device is a configurator, the fourth device is a device configured by the first device, and the second device is And causing, by the first device, a configurator that can configure the device to be configured by using a method of sending the signature public key of the second device to the fourth device, where the device to be configured includes a third device; the device is the third device.
  • the structure of the apparatus of this embodiment is the same as that of the structure shown in FIG. 18, and also includes a receiver, a processor, and a transmitter.
  • the processor is configured to obtain first authentication information after the second device configures the third device, where the first authentication information includes a public key of the third device and the third device a signature of the public key; wherein the signature of the public key of the third device is determined by the second device according to the signature private key corresponding to the signature public key of the second device and the public key of the third device And sending to the third device, the transmitter, configured to send the first authentication information to The fourth device, so that the fourth device authenticates the third device according to the first authentication information, and the receiver is configured to receive second authentication information sent by the fourth device, where the The second authentication information includes a public key of the fourth device and a signature of the public key of the fourth device, and a processor, configured to be used according to the public key of the fourth device and the signature of the public key of the fourth device And signing the public key of the first device, and authenticating the fourth
  • the receiver is further configured to receive a signature public key of the first device that is sent by the second device.
  • the device of this embodiment may be used to implement the technical solution of the third device side of the method embodiment shown in FIG. 3 and FIG. 4 , and the implementation principle and technical effects thereof are similar, and details are not described herein again.
  • the network includes a first device, a second device, and a fourth device, where the first device is a configurator, the fourth device is a device configured by the first device, and the second device is And causing, by the first device, the second device to be a configurator capable of configuring the device to be configured, by sending the signature information of the second device to the second device, where the device to be configured includes a device, wherein the signature information of the second device is determined by the first device according to the signature private key of the first device and the signature public key of the second device; and the signature information of the second device The signature of the signature public key of the second device, and/or the encrypted signature public key of the second device; the device is the fourth device.
  • the structure of the apparatus of this embodiment is the same as that of the structure shown in FIG. 18, and also includes a receiver, a processor, and a transmitter.
  • the receiver is configured to receive first authentication information sent by the first network device after the second device configures the third device, where the first authentication information includes a public key of the third device a signature of the public key of the third device, where the signature of the public key of the third device is a signature private key corresponding to the signature public key of the second device by the second device, and the third
  • the receiver is further configured to receive the configurator authentication information sent by the second network device, where the configurator authentication information includes signature information of the second device, and a signature public key of the second device; the processor, configured to determine the second according to signature information of the second device, a signature public key of the first device, and a signature public key of the second device Whether the signature public key of the device is correct; if yes, authenticating the third device according to the public key of the third device, the signature of the public key of the third device, and
  • the first network device is the second device or the third device
  • the second network device is the second device or the third device.
  • the first device becomes a configurator capable of configuring the device to be configured.
  • the fifth device is a configurator; the configurator authentication information further includes: signature information of the first device and a signature public key of the first device;
  • the signature information of the first device is determined by the fifth device according to the signature public key of the first device and the signature private key of the fifth device; the signature information of the first device includes the The signature of the signature public key of the first device, and/or the encrypted signature public key of the first device;
  • the processor determines, according to the signature information of the second device, the signature public key of the first device, and the signature public key of the second device, whether the signature public key of the second device is correct, specifically including :
  • the signature information, the signature public key of the first device, and the signature public key of the second device determine whether the signature public key of the second device is correct.
  • the configurator authentication information further includes: a sequence identifier, where the sequence identifier is used to indicate that the fourth device first determines whether the signature public key of the first device is correct, and then determines the second device. Whether the signature public key is correct;
  • the sequence of the signature public key of the first device and the signature public key of the second device in the configurator authentication information indicates that the fourth device first determines whether the signature public key of the first device is correct. And determining whether the signature public key of the second device is correct.
  • the device in this embodiment may be used to implement the technical solution on the fourth device side of the method embodiment shown in FIG. 5 to FIG. 10 , and the implementation principle and technical effects are similar, and details are not described herein again.
  • the network includes a first device, a second device, and a fourth device, where the first device is a configurator, the fourth device is a device configured by the first device, and the second device is Sending, by the first device, the signature information of the second device to the party of the second device
  • the second device is configured as a configurator capable of configuring the device to be configured, the device to be configured includes a third device, wherein the signature information of the second device is the first device according to the first device Determining, by the signature private key of the device and the signature public key of the second device; the signature information of the second device includes a signature of the signature public key of the second device, and/or the encrypted second The signature public key of the device; the device is the fourth device.
  • the structure of the apparatus of this embodiment is the same as that of the structure shown in FIG. 18, and also includes a receiver, a processor, and a transmitter.
  • the processor is configured to obtain first authentication information after the second device configures the third device, where the first authentication information includes a public key of the third device and the third device a signature of the public key; wherein the signature of the public key of the third device is determined by the second device according to the signature private key corresponding to the signature public key of the second device and the public key of the third device And sending to the third device, the transmitter, configured to send the first authentication information to the fourth device, to enable the fourth device to use the third device according to the first authentication information Performing authentication; receiving, by the receiver, second authentication information that is sent by the fourth device, where the second authentication information includes a public key of the fourth device and a signature of a public key of the fourth device; And the fourth device is authenticated according to the public key of the fourth device, the signature of the public key of the fourth device, and the signature public key of the first device.
  • the transmitter is further configured to: send configurator authentication information to the fourth device, where the configurator authentication information includes signature information of the second device and a signature public key of the second device .
  • the first device becomes a configurator capable of configuring the device to be configured.
  • the fifth device is a configurator; the configurator authentication information further includes: signature information of the first device and a signature public key of the first device;
  • the signature information of the first device is determined by the fifth device according to the signature public key of the first device and the signature private key of the fifth device; the signature information of the first device includes the The signature of the signature public key of the first device, and/or the encrypted signature public key of the first device.
  • the configurator authentication information further includes: a sequence identifier, where the sequence identifier is used to indicate that the fourth device first determines whether the signature public key of the first device is correct, and then determines the second device. Whether the signature public key is correct;
  • the sequence of the signature public key indicates that the fourth device first determines whether the signature public key of the first device is correct, and then determines whether the signature public key of the second device is correct.
  • the receiver is further configured to receive a signature public key of the first device that is sent by the second device.
  • the device in this embodiment may be used to implement the technical solution on the third device side of the method embodiment shown in FIG. 5 to FIG. 10 , and the implementation principle and technical effects are similar, and details are not described herein again.
  • the network includes a first device, a second device, and a fourth device, where the first device, the second device, and the fourth device belong to the same group; the first device is a configurator; The device configured by the first device; the device is the second device.
  • the structure of the apparatus of this embodiment is the same as that of the structure shown in FIG. 18, and also includes a receiver, a processor, and a transmitter.
  • a receiver configured to receive a group key of the group to which the second device belongs, sent by the first device
  • a processor configured to encrypt the signature public key of the second device according to the group key
  • a transmitter configured to send the encrypted signature public key of the second device to the fourth device, so that the second device becomes a configurator capable of configuring the device to be configured, where the device to be configured Includes the third device.
  • the processor is further configured to determine, according to the signature private key of the second device and the public key of the third device, a signature of the public key of the third device;
  • the transmitter is further configured to send a signature of the public key of the third device to the third device, so that the third device sends the first authentication information to the fourth device;
  • the first authentication information includes a public key of the third device and a signature of the public key of the third device, so that the fourth device performs the third device according to the first authentication information. Certification.
  • the receiver is further configured to receive a signature public key of the first device that is sent by the first device;
  • the transmitter is further configured to send the signature public key of the first device to the third device, so that the third device performs the fourth device according to the signature public key of the first device. Certification.
  • the device in this embodiment may be used to implement the technical solution on the second device side of the method embodiment shown in FIG. 11 to FIG. 13 , and the implementation principle and technical effects are similar, and details are not described herein again.
  • the steps can be completed by the relevant hardware of the program instructions.
  • the aforementioned program can be stored in a computer readable storage medium.
  • the program when executed, performs the steps including the foregoing method embodiments; and the foregoing storage medium includes various media that can store program codes, such as a ROM, a RAM, a magnetic disk, or an optical disk.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明实施例提供一种无线通信网络中设备配置的方法、装置及系统。通过第二设备将第一消息发送至第一设备,所述第一消息包括所述第二设备的签名公钥;所述第一设备将所述第二设备的签名公钥发送至所述第四设备或者将所述第二设备的签名信息发送至所述第二设备,以使所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;使得无线通信网络中的设备成为能够对待配置设备进行配置的配置器;因此,当无线通信网络中存在多个待配置设备需要进行配置时,可以由多个配置器对多个待配置设备进行配置;解决了现有技术中存在的配置效率较低的问题。

Description

无线通信网络中设备配置的方法、装置及系统 技术领域
本发明实施例涉及通信技术,尤其涉及一种无线通信网络中设备配置的方法、装置及系统。
背景技术
无线通信网络中可以包括一个配置器,通过该配置器对待配置设备进行配置使得该待配置设备能够加入网络。
现有技术中,配置器对待配置设备进行配置使得该待配置设备能够加入网络(例如基础服务集合(BSS,Basic Service Set)网络)的流程主要包括:BSS网络的配置器(其中,BSS网络的配置器可以为接入点(AP,Access Point)或站点(STA,station))根据设备(BSS网络的待配置设备可以为STA)的第一公钥及自身的第一私钥生成第一共享密钥,该待配置设备根据该配置器的第一公钥(其中,配置器的第一公钥与第一私钥是对应的公私钥)及自身的第一私钥(其中,待配置设备的第一私钥与第一公钥是对应的公私钥)也生成第一共享密码,该配置器与该待配置设备基于该第一共享密钥建立安全连接;在建立安全连接之后,该配置器基于自身的第二私钥(也即,签名私钥)及该待配置设备的第二公钥对该待配置设备的第二公钥进行数字签名,获得该待配置设备的第二公钥的签名,并将该待配置设备的第二公钥的签名及该签名私钥对应的签名公钥发送至该待配置设备;至此,该配置器完成了对该待配置设备的配置。
但是,现有技术中,当网络中有多个待配置设备需要进行配置时,存在配置效率较低的问题。
发明内容
本发明实施例提供一种无线通信网络中设备配置的方法、装置及系统,用以解决现有技术中当网络中有多个待配置设备需要进行配置时,存在配置效率较低的问题。
第一方面,本发明提供一种无线通信网络中设备配置的方法,所述网络包括第一设备、第二设备和第四设备,所述第一设备为配置器;所述第四设备为所述第一设备所配置的设备;所述方法包括:
所述第一设备接收所述第二设备发送的第一消息,所述第一消息包括所述第二设备的签名公钥;
所述第一设备将所述第二设备的签名公钥发送至所述第四设备,以使所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;或者,
所述第一设备将所述第二设备的签名信息发送至所述第二设备,以使所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;其中,所述第二设备的签名信息为所述第一设备根据所述第一设备的签名私钥及所述第二设备的签名公钥所确定,所述第二设备的签名信息包括所述第二设备的签名公钥的签名,和/或,加密后的所述第二设备的签名公钥。
结合第一方面,在第一方面的第一种可能实现的方式中,当所述网络为临近感知网络NAN时,所述第一设备将所述第二设备的签名公钥发送至所述第四设备,包括:
所述第一设备在发现窗口DW、或寻呼paging窗口、或管理窗口中将所述第二设备的签名公钥发送至所述第四设备。
结合第一方面或第一方面的第一种可能实现的方式,在第一方面的第二种可能实现的方式中,所述方法还包括:
所述第一设备将所述第一设备的签名公钥发送至所述第二设备,以使所述第二设备将所述第一设备的签名公钥发送至所述第三设备,以便所述第三设备根据所述第一设备的签名公钥对所述第四设备进行认证。
第二方面,本发明提供一种无线通信网络中设备配置的方法,所述网络包括第一设备、第二设备和第四设备;其中,所述第一设备为配置器,所述第四设备为所述第一设备所配置的设备;所述方法包括:
所述第二设备将第一消息发送至所述第一设备,所述第一消息包括所述第二设备的签名公钥;
所述第一消息用于所述第一设备将所述第二设备的签名公钥发送至所述 第四设备,以使所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;或者,所述第一消息用于所述第一设备将所述第二设备的签名信息发送至所述第二设备,以使所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;
当所述第一消息用于所述第一设备将所述第二设备的签名信息发送至所述第二设备时,所述第二设备将第一消息发送至所述第一设备之后,还包括:
所述第二设备接收所述第一设备发送的所述第二设备的签名信息;
所述第二设备的签名信息包括所述第二设备的签名公钥的签名,和/或,加密后的所述第二设备的签名公钥,所述第二设备的签名信息为所述第一设备根据所述第一设备的签名私钥及所述第二设备的签名公钥所确定。
结合第二方面,在第二方面的第一种可能实现的方式中,所述第二设备将第一消息发送至所述第一设备之后,还包括:
所述第二设备根据所述第二设备的签名私钥及所述第三设备的公钥,确定所述第三设备的公钥的签名;
所述第二设备将所述第三设备的公钥的签名发送至所述第三设备,以便所述第三设备向所述第四设备发送第一认证信息,和/或,所述第二设备将所述第一认证信息发送至所述第四设备;
其中,所述第一认证信息包括所述第三设备的公钥及所述第三设备的公钥的签名,以使所述第四设备根据所述第一认证信息对所述第三设备进行认证。
结合第二方面的第一种可能实现的方式,在第二方面的第二种可能实现的方式中,所述方法还包括:
所述第二设备将所述第二设备的签名信息发送至所述第三设备;和/或,
所述第二设备将配置器认证信息发送至所述第四设备,所述配置器认证信息包括所述第二设备的签名信息及所述第二设备的签名公钥。
结合第二方面或第二方面的第一种至第二种任一种可能实现的方式,在第二方面的第三种可能实现的方式中,所述方法还包括:
所述第二设备接收所述第一设备发送的所述第一设备的签名公钥;
所述第二设备将所述第一设备的签名公钥发送至所述第三设备,以使所述第三设备根据所述第一设备的签名公钥对所述第四设备进行认证。
第三方面,本发明提供一种无线通信网络中设备配置的方法,所述网络包括第一设备、第二设备及第四设备;其中,所述第一设备为配置器,所述第四设备为所述第一设备所配置的设备;所述第二设备为所述第一设备通过将所述第二设备的签名公钥发送至所述第四设备的方式,使得所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;所述方法包括:
所述第四设备在所述第二设备对待配置的所述第三设备进行配置之后,接收网络设备发送的第一认证信息,所述第一认证信息包括所述第三设备的公钥、所述第三设备的公钥的签名;其中,所述第三设备的公钥的签名为所述第二设备根据所述第二设备的签名公钥对应的签名私钥及所述第三设备的公钥所确定并发送给所述第三设备的;
所述第四设备根据所述第三设备的公钥、所述第三设备的公钥的签名及所述第一设备发送的所述第二设备的签名公钥,对所述第三设备进行认证;
所述第四设备将第二认证信息发送至所述第三设备,以使所述第三设备根据所述第二认证信息对所述第四设备进行认证;其中,所述第二认证信息包括所述第四设备的公钥及所述第四设备的公钥的签名;
其中,所述网络设备为所述第二设备或所述第三设备。
第四方面,本发明提供一种无线通信网络中设备配置的方法,所述无线通信网络包括第一设备、第二设备及第四设备;其中所述第一设备为配置器,所述第四设备为所述第一设备所配置的设备;所述第二设备为所述第一设备通过将所述第二设备的签名公钥发送至所述第四设备的方式,使得所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;所述方法包括:
在所述第二设备对所述第三设备进行配置之后,所述第三设备获得第一认证信息,所述第一认证信息包括所述第三设备的公钥及所述第三设备的公钥的签名;其中,所述第三设备的公钥的签名为所述第二设备根据所述第二设备的签名公钥对应的签名私钥及所述第三设备的公钥所确定并发送给所述第三设备的;
所述第三设备将所述第一认证信息发送至所述第四设备,以使所述第四设备根据所述第一认证信息对所述第三设备进行认证;
所述第三设备接收所述第四设备发送的第二认证信息,所述第二认证信息包括所述第四设备的公钥及所述第四设备的公钥的签名;
所述第三设备根据所述第四设备的公钥、所述第四设备的公钥的签名及所述第一设备的签名公钥,对所述第四设备进行认证。
结合第四方面,在第四方面的第一种可能实现的方式中,所述第三设备根据所述第四设备的公钥、所述第四设备的公钥的签名及所述第一设备的签名公钥,对所述第四设备进行认证之前,还包括:
所述第三设备接收所述第二设备发送的所述第一设备的签名公钥。
第五方面,本发明提供一种无线通信网络中设备配置的方法,所述无线通信网络包括第一设备、第二设备及第四设备;其中所述第一设备为配置器,所述第四设备为所述第一设备所配置的设备;所述第二设备为所述第一设备通过将所述第二设备的签名信息发送至所述第二设备的方式,使得所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;其中,所述第二设备的签名信息为所述第一设备根据所述第一设备的签名私钥及所述第二设备的签名公钥所确定;所述第二设备的签名信息包括所述第二设备的签名公钥的签名,和/或,加密后的所述第二设备的签名公钥;所述方法包括:
所述第四设备在所述第二设备对所述第三设备进行配置之后,接收第一网络设备发送的第一认证信息,所述第一认证信息包括所述第三设备的公钥、所述第三设备的公钥的签名;其中,所述第三设备的公钥的签名为所述第二设备根据所述第二设备的签名公钥对应的签名私钥及所述第三设备的公钥所确定并发送给所述第三设备的;
所述第四设备接收第二网络设备发送的配置器认证信息,所述配置器认证信息包括所述第二设备的签名信息及所述第二设备的签名公钥;
所述第四设备根据所述第二设备的签名信息、所述第一设备的签名公钥及所述第二设备的签名公钥,确定所述第二设备的签名公钥是否正确;
若是,则根据所述第三设备的公钥、所述第三设备的公钥的签名及所述第二设备的签名公钥,对所述第三设备进行认证;
所述第四设备将第二认证信息发送至所述第三设备,以使所述第三设备根据所述第二认证信息对所述第四设备进行认证;其中,所述第二认证信息 包括所述第四设备的公钥及所述第四设备的公钥的签名;
其中,所述第一网络设备为所述第二设备或所述第三设备,第二网络设备为所述第二设备或所述第三设备。
结合第五方面,在第五方面的第一种可能实现的方式中,若所述第一设备为第五设备通过将所述第一设备的签名信息发送至所述第一设备的方式,使得所述第一设备成为能够对待配置设备进行配置的配置器,所述第五设备为配置器;则所述配置器认证信息,还包括:所述第一设备的签名信息及所述第一设备的签名公钥;
其中,所述第一设备的签名信息为所述第五设备根据所述第一设备的签名公钥及所述第五设备的签名私钥所确定;所述第一设备的签名信息包括所述第一设备的签名公钥的签名,和/或,加密后的所述第一设备的签名公钥;
相应的,所述第四设备根据所述第二设备的签名信息及所述第一设备的签名公钥,确定所述第二设备的签名公钥是否正确之前,还包括:
所述第四设备根据所述第一设备的签名信息、所述第一设备的签名公钥及所述第五设备的签名公钥确定所述第一设备的签名公钥是否正确;若是则执行根据所述第二设备的签名信息、所述第一设备的签名公钥及所述第二设备的签名公钥,确定所述第二设备的签名公钥是否正确的步骤。
结合第五方面的第一种可能实现的方式,在第五方面的第二种可能实现的方式中,所述配置器认证信息还包括:顺序标识,所述顺序标识用于指示所述第四设备首先确定所述第一设备的签名公钥是否正确,再确定所述第二设备的签名公钥是否正确;
或者,所述配置器认证信息中所述第一设备的签名公钥及所述第二设备的签名公钥的先后顺序指示所述第四设备首先确定所述第一设备的签名公钥是否正确,再确定所述第二设备的签名公钥是否正确。
第六方面,本发明提供一种无线通信网络中设备配置的方法,所述无线通信网络包括第一设备、第二设备及第四设备;其中所述第一设备为配置器,所述第四设备为所述第一设备所配置的设备;所述第二设备为所述第一设备通过将所述第二设备的签名信息发送至所述第二设备的方式,使得所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;其中,所述第二设备的签名信息为所述第一设备根据所述第一设备的签 名私钥及所述第二设备的签名公钥所确定;所述第二设备的签名信息包括所述第二设备的签名公钥的签名,和/或,加密后的所述第二设备的签名公钥;所述方法包括:
在所述第二设备对所述第三设备进行配置之后,所述第三设备获得第一认证信息,所述第一认证信息包括所述第三设备的公钥及所述第三设备的公钥的签名;其中,所述第三设备的公钥的签名为所述第二设备根据所述第二设备的签名公钥对应的签名私钥及所述第三设备的公钥所确定并发送给所述第三设备的;
所述第三设备将所述第一认证信息发送至所述第四设备,以使所述第四设备根据所述第一认证信息对所述第三设备进行认证;
所述第三设备接收所述第四设备发送的第二认证信息,所述第二认证信息包括所述第四设备的公钥及所述第四设备的公钥的签名;
所述第三设备根据所述第四设备的公钥、所述第四设备的公钥的签名及所述第一设备的签名公钥,对所述第四设备进行认证。
结合第六方面,在第六方面的第一种可能实现的方式中,所述方法还包括:
所述第三设备将配置器认证信息发送至所述第四设备,所述配置器认证信息包括所述第二设备的签名信息及所述第二设备的签名公钥。
结合第六方面的第一种可能实现的方式,在第六方面的第二种可能实现的方式中,若所述第一设备为第五设备通过将所述第一设备的签名信息发送至所述第一设备的方式,使得所述第一设备成为能够对待配置设备进行配置的配置器,所述第五设备为配置器;则所述配置器认证信息,还包括:所述第一设备的签名信息及所述第一设备的签名公钥;
其中,所述第一设备的签名信息为所述第五设备根据所述第一设备的签名公钥及所述第五设备的签名私钥所确定;所述第一设备的签名信息包括所述第一设备的签名公钥的签名,和/或,加密后的所述第一设备的签名公钥。
结合第六方面的第二种可能实现的方式,在第六方面的第三种可能实现的方式中,所述配置器认证信息还包括:顺序标识,所述顺序标识用于指示所述第四设备首先确定所述第一设备的签名公钥是否正确,再确定所述第二设备的签名公钥是否正确;
或者,所述配置器认证信息中所述第一设备的签名公钥及所述第二设备的签名公钥的先后顺序指示所述第四设备首先确定所述第一设备的签名公钥是否正确,再确定所述第二设备的签名公钥是否正确。
结合第六方面或第六方面的第一种至第三种任一种可能实现的方式,在第六方面的第四种可能实现的方式中,所述第三设备根据所述第四设备的公钥、所述第四设备的公钥的签名及所述第一设备的签名公钥,对所述第四设备进行认证之前,还包括:
所述第三设备接收所述第二设备发送的所述第一设备的签名公钥。
第七方面,本发明提供一种无线通信网络中设备配置的方法,所述网络包括第一设备、第二设备和第四设备,所述第一设备、第二设备和第四设备属于同一组;所述第一设备为配置器;所述第四设备为所述第一设备所配置的设备;所述方法包括:
所述第二设备接收所述第一设备发送的所述第二设备所属组的组密钥;
所述第二设备根据所述组密钥对所述第二设备的签名公钥进行加密;
所述第二设备将加密后的所述第二设备的签名公钥发送至所述第四设备,以使所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备。
结合第七方面,在第七方面的第一种可能实现的方式中,所述第二设备将加密后的所述第二设备的签名公钥发送至所述第四设备之后,还包括:
所述第二设备根据所述第二设备的签名私钥及所述第三设备的公钥,确定所述第三设备的公钥的签名;
所述第二设备将所述第三设备的公钥的签名发送至所述第三设备,以便所述第三设备向第四设备发送第一认证信息;
其中,所述第一认证信息包括所述第三设备的公钥及所述第三设备的公钥的签名,以使所述第四设备根据所述第一认证信息对所述第三设备进行认证。
结合第七方面或第七方面的第一种可能实现的方式,在第七方面的第二种可能实现的方式中,所述方法还包括:
所述第二设备接收所述第一设备发送的所述第一设备的签名公钥;
所述第二设备将所述第一设备的签名公钥发送至所述第三设备,以使所 述第三设备根据所述第一设备的签名公钥对所述第四设备进行认证。
第八方面,本发明提供一种无线通信网络中设备配置的装置,所述网络包括第一设备、第二设备和第四设备,所述第一设备为配置器;所述第四设备为所述第一设备所配置的设备;所述装置为所述第一设备,所述装置包括:
接收模块,用于接收所述第二设备发送的第一消息,所述第一消息包括所述第二设备的签名公钥;
发送模块,用于将所述第二设备的签名公钥发送至所述第四设备,以使所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;或者,
用于将所述第二设备的签名信息发送至所述第二设备,以使所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;其中,所述第二设备的签名信息为所述第一设备根据所述第一设备的签名私钥及所述第二设备的签名公钥所确定,所述第二设备的签名信息包括所述第二设备的签名公钥的签名,和/或,加密后的所述第二设备的签名公钥。
结合第八方面,在第八方面的第一种可能实现的方式中,当所述网络为临近感知网络NAN时,所述发送模块将所述第二设备的签名公钥发送至所述第四设备,具体包括:
在发现窗口DW、或寻呼paging窗口、或管理窗口中将所述第二设备的签名公钥发送至所述第四设备。
结合第八方面或第八方面的第一种可能实现的方式,在第八方面的第二种可能实现的方式中,所述发送模块,还用于将所述第一设备的签名公钥发送至所述第二设备,以使所述第二设备将所述第一设备的签名公钥发送至所述第三设备,以便所述第三设备根据所述第一设备的签名公钥对所述第四设备进行认证。
第九方面,本发明提供一种无线通信网络中设备配置的装置,所述网络包括第一设备、第二设备和第四设备;其中,所述第一设备为配置器,所述第四设备为所述第一设备所配置的设备;所述装置为所述第二设备,所述装置包括:
发送模块,用于将第一消息发送至所述第一设备,所述第一消息包括所述第二设备的签名公钥;
所述第一消息用于所述第一设备将所述第二设备的签名公钥发送至所述第四设备,以使所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;或者,所述第一消息用于所述第一设备将所述第二设备的签名信息发送至所述第二设备,以使所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;
当所述第一消息用于所述第一设备将所述第二设备的签名信息发送至所述第二设备时,所述装置还包括:
第一接收模块,用于接收所述第一设备发送的所述第二设备的签名信息;
所述第二设备的签名信息包括所述第二设备的签名公钥的签名,和/或,加密后的所述第二设备的签名公钥,所述第二设备的签名信息为所述第一设备根据所述第一设备的签名私钥及所述第二设备的签名公钥所确定。
结合第九方面,在第九方面的第一种可能实现的方式中,所述装置还包括:处理模块,用于根据所述第二设备的签名私钥及第三设备的公钥,确定所述第三设备的公钥的签名;
所述发送模块,还用于将所述第三设备的公钥的签名发送至所述第三设备,以便所述第三设备向所述第四设备发送第一认证信息,和/或,用于将所述第一认证信息发送至所述第四设备;
其中,所述第一认证信息包括所述第三设备的公钥及所述第三设备的公钥的签名,以使所述第四设备根据所述第一认证信息对所述第三设备进行认证。
结合第九方面的第一种可能实现的方式,在第九方面的第二种可能实现的方式中,所述发送模块,还用于:
将所述第二设备的签名信息发送至所述第三设备;和/或,
将配置器认证信息发送至所述第四设备,所述配置器认证信息包括所述第二设备的签名信息及所述第二设备的签名公钥。
结合第九方面或第九方面的第一种至第二种任一种可能实现的方式,在第九方面的第三种可能实现的方式中,所述装置还包括:
第二接收模块,用于接收所述第一设备发送的所述第一设备的签名公钥;
所述发送模块,还用于将所述第一设备的签名公钥发送至所述第三设备,以使所述第三设备根据所述第一设备的签名公钥对所述第四设备进行认证。
第十方面,本发明提供一种无线通信网络中设备配置的装置,所述网络包括第一设备、第二设备及第四设备;其中,所述第一设备为配置器,所述第四设备为所述第一设备所配置的设备;所述第二设备为所述第一设备通过将所述第二设备的签名公钥发送至所述第四设备的方式,使得所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;所述装置为所述第四设备,所述装置包括:
接收模块,用于在所述第二设备对待配置的所述第三设备进行配置之后,接收网络设备发送的第一认证信息,所述第一认证信息包括所述第三设备的公钥、所述第三设备的公钥的签名;其中,所述第三设备的公钥的签名为所述第二设备根据所述第二设备的签名公钥对应的签名私钥及所述第三设备的公钥所确定并发送给所述第三设备的;
处理模块,用于根据所述第三设备的公钥、所述第三设备的公钥的签名及所述第一设备发送的所述第二设备的签名公钥,对所述第三设备进行认证;
发送模块,用于将第二认证信息发送至所述第三设备,以使所述第三设备根据所述第二认证信息对所述第四设备进行认证;其中,所述第二认证信息包括所述第四设备的公钥及所述第四设备的公钥的签名;
其中,所述网络设备为所述第二设备或所述第三设备。
第十一方面,本发明提供一种无线通信网络中设备配置的装置,所述无线通信网络包括第一设备、第二设备及第四设备;其中所述第一设备为配置器,所述第四设备为所述第一设备所配置的设备;所述第二设备为所述第一设备通过将所述第二设备的签名公钥发送至所述第四设备的方式,使得所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;所述装置为所述第三设备,所述装置包括:
处理模块,用于在所述第二设备对所述第三设备进行配置之后,获得第一认证信息,所述第一认证信息包括所述第三设备的公钥及所述第三设备的公钥的签名;其中,所述第三设备的公钥的签名为所述第二设备根据所述第二设备的签名公钥对应的签名私钥及所述第三设备的公钥所确定并发送给所述第三设备的;
发送模块,用于将所述第一认证信息发送至所述第四设备,以使所述第四设备根据所述第一认证信息对所述第三设备进行认证;
接收模块,用于接收所述第四设备发送的第二认证信息,所述第二认证信息包括所述第四设备的公钥及所述第四设备的公钥的签名;
所述处理模块,还用于根据所述第四设备的公钥、所述第四设备的公钥的签名及所述第一设备的签名公钥,对所述第四设备进行认证。
结合第十一方面,在第十一方面的第一种可能实现的方式中,所述接收模块,还用于接收所述第二设备发送的所述第一设备的签名公钥。
第十二方面,本发明提供一种无线通信网络中设备配置的方法,所述无线通信网络包括第一设备、第二设备及第四设备;其中所述第一设备为配置器,所述第四设备为所述第一设备所配置的设备;所述第二设备为所述第一设备通过将所述第二设备的签名信息发送至所述第二设备的方式,使得所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;其中,所述第二设备的签名信息为所述第一设备根据所述第一设备的签名私钥及所述第二设备的签名公钥所确定;所述第二设备的签名信息包括所述第二设备的签名公钥的签名,和/或,加密后的所述第二设备的签名公钥;所述装置为所述第四设备,所述装置包括:
接收模块,用于在所述第二设备对所述第三设备进行配置之后,接收第一网络设备发送的第一认证信息,所述第一认证信息包括所述第三设备的公钥、所述第三设备的公钥的签名;其中,所述第三设备的公钥的签名为所述第二设备根据所述第二设备的签名公钥对应的签名私钥及所述第三设备的公钥所确定并发送给所述第三设备的;
所述接收模块,还用于接收第二网络设备发送的配置器认证信息,所述配置器认证信息包括所述第二设备的签名信息及所述第二设备的签名公钥;
处理模块,用于根据所述第二设备的签名信息、所述第一设备的签名公钥及所述第二设备的签名公钥,确定所述第二设备的签名公钥是否正确;若是,则根据所述第三设备的公钥、所述第三设备的公钥的签名及所述第二设备的签名公钥,对所述第三设备进行认证;
发送模块,用于将第二认证信息发送至所述第三设备,以使所述第三设备根据所述第二认证信息对所述第四设备进行认证;其中,所述第二认证信息包括所述第四设备的公钥及所述第四设备的公钥的签名;
其中,所述第一网络设备为所述第二设备或所述第三设备,第二网络设 备为所述第二设备或所述第三设备。
结合第十二方面,在第十二方面的第一种可能实现的方式中,若所述第一设备为第五设备通过将所述第一设备的签名信息发送至所述第一设备的方式,使得所述第一设备成为能够对待配置设备进行配置的配置器,所述第五设备为配置器;则所述配置器认证信息,还包括:所述第一设备的签名信息及所述第一设备的签名公钥;
其中,所述第一设备的签名信息为所述第五设备根据所述第一设备的签名公钥及所述第五设备的签名私钥所确定;所述第一设备的签名信息包括所述第一设备的签名公钥的签名,和/或,加密后的所述第一设备的签名公钥;
相应的,所述处理模块根据所述第二设备的签名信息、所述第一设备的签名公钥及所述第二设备的签名公钥,确定所述第二设备的签名公钥是否正确,具体包括:
根据所述第一设备的签名信息、所述第一设备的签名公钥及所述第五设备的签名公钥确定所述第一设备的签名公钥是否正确;若是则根据所述第二设备的签名信息、所述第一设备的签名公钥及所述第二设备的签名公钥,确定所述第二设备的签名公钥是否正确。
结合第十二方面的第一种可能实现的方式,在第十二方面的第二种可能实现的方式中,所述配置器认证信息还包括:顺序标识,所述顺序标识用于指示所述第四设备首先确定所述第一设备的签名公钥是否正确,再确定所述第二设备的签名公钥是否正确;
或者,所述配置器认证信息中所述第一设备的签名公钥及所述第二设备的签名公钥的先后顺序指示所述第四设备首先确定所述第一设备的签名公钥是否正确,再确定所述第二设备的签名公钥是否正确。
第十三方面,本发明提供一种无线通信网络中设备配置的装置,所述无线通信网络包括第一设备、第二设备及第四设备;其中所述第一设备为配置器,所述第四设备为所述第一设备所配置的设备;所述第二设备为所述第一设备通过将所述第二设备的签名信息发送至所述第二设备的方式,使得所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;其中,所述第二设备的签名信息为所述第一设备根据所述第一设备的签名私钥及所述第二设备的签名公钥所确定;所述第二设备的签名信息包 括所述第二设备的签名公钥的签名,和/或,加密后的所述第二设备的签名公钥;所述装置为所述第三设备,所述装置包括:
处理模块,用于在所述第二设备对所述第三设备进行配置之后,获得第一认证信息,所述第一认证信息包括所述第三设备的公钥及所述第三设备的公钥的签名;其中,所述第三设备的公钥的签名为所述第二设备根据所述第二设备的签名公钥对应的签名私钥及所述第三设备的公钥所确定并发送给所述第三设备的;
发送模块,用于将所述第一认证信息发送至所述第四设备,以使所述第四设备根据所述第一认证信息对所述第三设备进行认证;
接收模块,用于接收所述第四设备发送的第二认证信息,所述第二认证信息包括所述第四设备的公钥及所述第四设备的公钥的签名;
处理模块,用于根据所述第四设备的公钥、所述第四设备的公钥的签名及所述第一设备的签名公钥,对所述第四设备进行认证。
结合第十三方面,在第十三方面的第一种可能实现的方式中,所述发送模块还用于:
将配置器认证信息发送至所述第四设备,所述配置器认证信息包括所述第二设备的签名信息及所述第二设备的签名公钥。
结合第十三方面的第一种可能实现的方式,在第十三方面的第二种可能实现的方式中,若所述第一设备为第五设备通过将所述第一设备的签名信息发送至所述第一设备的方式,使得所述第一设备成为能够对待配置设备进行配置的配置器,所述第五设备为配置器;则所述配置器认证信息,还包括:所述第一设备的签名信息及所述第一设备的签名公钥;
其中,所述第一设备的签名信息为所述第五设备根据所述第一设备的签名公钥及所述第五设备的签名私钥所确定;所述第一设备的签名信息包括所述第一设备的签名公钥的签名,和/或,加密后的所述第一设备的签名公钥。
结合第十三方面的第二种可能实现的方式,在第十三方面的第三种可能实现的方式中,所述配置器认证信息还包括:顺序标识,所述顺序标识用于指示所述第四设备首先确定所述第一设备的签名公钥是否正确,再确定所述第二设备的签名公钥是否正确;
或者,所述配置器认证信息中所述第一设备的签名公钥及所述第二设备 的签名公钥的先后顺序指示所述第四设备首先确定所述第一设备的签名公钥是否正确,再确定所述第二设备的签名公钥是否正确。
结合第十三方面或第十三方面的第一种至第三种任一种可能实现的方式,在第十三方面的第四种可能实现的方式中,所述接收模块,还用于接收所述第二设备发送的所述第一设备的签名公钥。
第十四方面,本发明提供一种无线通信网络中设备配置的装置,所述网络包括第一设备、第二设备和第四设备,所述第一设备、第二设备和第四设备属于同一组;所述第一设备为配置器;所述第四设备为所述第一设备所配置的设备;所述装置为所述第二设备,所述装置包括:
接收模块,用于接收所述第一设备发送的所述第二设备所属组的组密钥;
处理模块,用于根据所述组密钥对所述第二设备的签名公钥进行加密;
发送模块,用于将加密后的所述第二设备的签名公钥发送至所述第四设备,以使所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备。
结合第十四方面,在第十四方面的第一种可能实现的方式中,所述处理模块,还用于根据所述第二设备的签名私钥及所述第三设备的公钥,确定所述第三设备的公钥的签名;
所述发送模块,还用于将所述第三设备的公钥的签名发送至所述第三设备,以便所述第三设备向第四设备发送第一认证信息;
其中,所述第一认证信息包括所述第三设备的公钥及所述第三设备的公钥的签名,以使所述第四设备根据所述第一认证信息对所述第三设备进行认证。
结合第十四方面或第十四方面的第一种可能实现的方式,在第十四方面的第二种可能实现的方式中,所述接收模块,还用于接收所述第一设备发送的所述第一设备的签名公钥;
所述发送模块,还用于将所述第一设备的签名公钥发送至所述第三设备,以使所述第三设备根据所述第一设备的签名公钥对所述第四设备进行认证。
第十五方面,本发明提供一种无线通信网络中配置设备的系统,包括:权利要求第八方面或第八方面的第一种至第二种任一种所述的第一设备、第九方面或第九方面的第一种至第三种任一种所述的第二设备。
结合第十五方面,在第十五方面的第一种可能实现的方式中,所述系统还包括:第十方面所述的第四设备及第十一方面或第十一方面的第一种所述的第三设备。
结合第十五方面,在第十五方面的第二种可能实现的方式中,所述系统还包括:第十二方面或第十二方面的第一种至第二种任一种所述的第四设备及第十三方面或第十三方面的第一种至第四种任一种所述的第三设备。
第十六方面,本发明提供一种无线通信网络中配置设备的系统,包括:第一设备、第十四方面或第十四方面的第一种至第二种任一种所述的第二设备。
本发明提供一种无线通信网络中设备配置的方法、装置及系统,通过所述第一设备接收所述第二设备发送的第一消息,所述第一消息包括所述第二设备的签名公钥;所述第一设备将所述第二设备的签名公钥发送至所述第四设备,以使所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;或者,所述第一设备将所述第二设备的签名信息发送至所述第二设备,以使所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;其中,所述第二设备的签名信息为所述第一设备根据所述第一设备的签名私钥及所述第二设备的签名公钥所确定,所述第二设备的签名信息包括所述第二设备的签名公钥的签名,和/或,加密后的所述第二设备的签名公钥;使得无线通信网络中的设备(例如,第二设备)成为能够对待配置设备进行配置的配置器;因此,当无线通信网络中存在多个待配置设备需要进行配置时,可以由多个配置器对多个待配置设备进行配置;解决了现有技术中存在的配置效率较低的问题。
附图说明
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作一简单地介绍,显而易见地,下面描述中的附图是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1为本发明无线通信网络中设备配置的方法实施例一的流程图;
图2为本发明无线通信网络中设备配置的方法实施例二的流程图;
图3为本发明无线通信网络中设备配置的方法实施例三的流程图;
图4为本发明无线通信网络中设备配置的方法实施例四的流程图;
图5为本发明无线通信网络中设备配置的方法实施例五的流程图;
图6为本发明无线通信网络中设备配置的方法实施例六的流程图;
图7为本发明无线通信网络中设备配置的方法实施例七的流程图;
图8为本发明无线通信网络中设备配置的方法实施例八的流程图;
图9为本发明无线通信网络中设备配置的方法实施例九的流程图;
图10为本发明无线通信网络中设备配置的方法实施例十的流程图;
图11为本发明无线通信网络中设备配置的方法实施例十一的流程图;
图12为本发明无线通信网络中设备配置的方法实施例十二的流程图;
图13为本发明无线通信网络中设备配置的方法实施例十三的流程图;
图14为本发明无线通信网络中设备配置的装置实施例一的结构示意图;
图15为本发明无线通信网络中设备配置的装置实施例二的结构示意图;
图16为本发明无线通信网络中设备配置的装置实施例三的结构示意图;
图17为本发明无线通信网络中设备配置的装置实施例八的结构示意图;
图18为本发明无线通信网络中设备配置的装置实施例九的结构示意图。
具体实施方式
为使本发明实施例的目的、技术方案和优点更加清楚,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
需要说明的是,本发明中的无线通信网络具体可以为基于无线保真(Wi-Fi,Wireless Fidelity)技术的网络。例如可以为:基本服务集(BSS,Basic Service Set)网络、临近感知网络(NAN,Neighbor awareness network)、对等(P2P,Peer to Peer)网络等、独立基本服务集(IBSS,Independent Basic Service Set)网络等。
当无线通信网络为BSS网络时,本发明中的设备(例如,第一设备、第二设备等等)可以为AP或STA。
当无线通信网络为P2P网络时,本发明中的设备(例如,第一设备、第二设备等等)可以为组拥有者(GO,group owner)设备或客户端(client)。
当无线通信网络为NAN网络时,本发明中的设备(例如,第一设备、第二设备等等)可以为:主(master)状态设备、锚主(Anchor master)状态设备、非主但同步(Non-Master Sync)状态设备、或非主非同步(Non-Master Non-Sync State)状态设备。
图1为本发明无线通信网络中设备配置的方法实施例一的流程图;所述无线通信网络包括第一设备、第二设备和第四设备;其中,所述第一设备为配置器,所述第四设备为所述第一设备所配置的设备(也即,第一设备对第四设备进行配置,使得第四设备能够加入所述无线通信网络);如图1所示,本实施例的方法可以包括:
步骤101、所述第二设备将第一消息发送至所述第一设备,所述第一消息包括所述第二设备的签名公钥;
其中,所述第一消息用于所述第一设备将所述第二设备的签名公钥发送至所述第四设备,以使所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;
需要说明的是,所述签名公钥指的是数字签名过程中,对哈希值进行加密时所使用的私钥(也即签名私钥)所对应的公钥(也即,签名公钥)。
其中,数字签名是指发送端对指定的消息内容进行哈希运算得到哈希值,然后对哈希值签名私钥进行加密,加密的结果就称为签名。通过数字签名接收端在收到该签名后可以验证该签名的正确性,具体可以为:接收端利用发送端进行数字签名时所使用的签名私钥对应的签名公钥对该签名进行解密,获得哈希值;并对指定的消息内容进行哈希运算得到另一哈希值,将两个哈希值进行比较;若相同,则确定该签名正确。
需要说明的是,签名公钥是属于非对称加密算法中的公钥。其中,非对称加密算法需要两个密钥:公开密钥(public key)和私有密钥(private key);对于公开密钥(也即公钥)加密后的信息,需要使用对应的私有密钥(也即,私钥)进行解密。对于私钥加密的信息,需要使用对应的公钥进行解密。常用的非对称加密算法包括RSA(Ron Rivest、Adi Shamirh和LenAdleman)算法。
步骤102、所述第一设备将所述第二设备的签名公钥发送至所述第四设备,以使所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备。
其中,所述第二设备的签名公钥用于所述第四设备对所述第二设备配置的第三设备进行认证。
其中,所述配置器(对应的英文可以为configurator或introducer)是指所述无线通信网络中对待配置设备进行配置使得该待配置设备能够加入所述无线通信网络的设备;所述配置器还可以具有使得所述无线通信网络中的设备之间建立安全连接的功能;所述配置器还可以具有摄像头,用户界面(UI,User Interface),人机接口。所述配置器为手机,平板电脑(PAD)等。
其中,本发明中两个设备(例如,第一设备与第二设备)之间传递信息的消息可以是扩展认证协议(EAP,Extensible Authentication Protocol)消息、行动(action)消息、现有电气和电子工程师协会(IEEE,Institute of Electrical and Electronics Engineers)802.11规范或无线保真联盟(WFA,WiFi alliance)规范中的消息;或者,也可以是新定义的消息。
现有技术中,无线通信网络中仅包括了一个配置器,由该配置器对待配置设备进行配置使得该待配置设备能够加入网络;当该无线通信网络中有多个待配置设备需要进行配置时,该配置器需要对该多个待配置设备进行配置;因此存在配置效率较低的问题。
本发明实施例中,通过第二设备将第一消息发送至第一设备,所述第一消息包括所述第二设备的签名公钥;所述第一设备将所述第二设备的签名公钥发送至所述第四设备,以使所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;使得无线通信网络中的设备成为能够对待配置设备进行配置的配置器;因此,当无线通信网络中存在多个待配置设备需要进行配置时,可以由多个配置器对多个待配置设备进行配置;解决了现有技术中存在的配置效率较低的问题。
图2为本发明无线通信网络中设备配置的方法实施例二的流程图;所述无线通信网络包括第一设备、第二设备和第四设备;其中,所述第一设备为配置器,所述第四设备为所述第一设备所配置的设备;如图2所示,本实施例的方法可以包括:
步骤201、所述第二设备将第一消息发送至所述第一设备,所述第一消息包括所述第二设备的签名公钥;
需要说明的是,步骤201与步骤101类似,在此不再赘述。
步骤202、所述第一设备将所述第二设备的签名信息发送至所述第二设备,以使所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;
其中,所述第二设备的签名信息为所述第一设备根据所述第一设备的签名私钥及所述第二设备的签名公钥所确定,所述第二设备的签名信息包括所述第二设备的签名公钥的签名,和/或,加密后的所述第二设备的签名公钥。
其中,所述第二设备的签名信息用于所述第四设备确定接收到的所述第二设备的签名公钥是否正确,并在确定接收到的所述第二设备的签名公钥正确之后,根据接收到的所述第二设备的签名公钥对所述第二设备配置的第三设备进行认证。
本发明实施例中,通过第二设备将第一消息发送至第一设备,所述第一消息包括所述第二设备的签名公钥;所述第一设备将所述第二设备的签名信息发送至所述第二设备,以使所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;使得无线通信网络中的设备成为能够对待配置设备进行配置的配置器;因此,当无线通信网络中存在多个待配置设备需要进行配置时,可以由多个配置器对多个待配置设备进行配置;解决了现有技术中存在的配置效率较低的问题。
图3为本发明无线通信网络中设备配置的方法实施例三的流程图;所述无线通信网络包括第一设备和第四设备;其中,所述第一设备为配置器,所述第四设备为所述第一设备所配置的设备;如图3所示,本实施例的方法可以包括:
步骤301、所述第一设备获得所述第二设备的第一公钥;
其中,所述第二设备为待配置设备。
可选的,步骤301具体可以为:所述第一设备通过扫描所述第二设备的二维码,获得所述第二设备的第一公钥;其中,所述二维码中包括所述第二设备的第一公钥。
或者,步骤301具体可以为:所述第一设备通过与所述第二设备进行近 场通信(NFC,Near Field Communication)获得所述第二设备的第一公钥。
步骤302、所述第一设备将所述第一设备的公钥发送至所述第二设备;
步骤303、所述第一设备根据所述第一设备的私钥及所述第二设备的第一公钥生成第一共享密钥;
需要说明的是,步骤303与步骤302之间的先后顺序不作限定,可以没有先后顺序。
具体的,所述第一设备根据所述第一设备的私钥及所述第二设备的第一公钥,采用密钥交换算法,生成第一共享密钥。
可选的,所述密钥交换算法可以为迪菲-赫尔曼(DH,Diffie-Hellman)算法或基于椭圆曲线的DH算法(ECDH,Elliptic Curve Cryptosystems Diffie-Hellman)算法等。
需要说明的是,所述第一设备的公钥与第一设备的私钥为对应的公私钥。
步骤304、所述第二设备根据所述第一设备的公钥及所述第二设备的第一私钥生成所述第一共享密钥;
需要说明的是,步骤304与步骤303之间的先后顺序不作限定,可以没有先后顺序。
需要说明的是,第二设备的第一公钥与第二设备的第一私钥为对应的公私钥。
步骤305、所述第一设备及所述第二设备基于所述第一共享密钥或所述第一共享密钥的衍生密钥建立安全连接;
其中,第一共享密钥的衍生密钥可以为根据所述第一共享密钥所生成的密钥,或者,也可以为根据所述第一共享密钥及特定信息所生成的密钥。
需要说明的是,步骤301~步骤305可以认为是所述第一设备与所述第二设备建立安全连接的过程。
步骤306、所述第一设备将所述第一设备的签名公钥发送至所述第二设备;
需要说明的是,本发明中签名公钥(及对应的签名私钥)是用于配置器对设备进行数字签名;其他的公钥(及对应的私钥)(例如,第一设备的公钥、与第一设备的公钥对应的第一私钥、第二设备的第一公钥、与第二设备的第一公钥对应的第一私钥等等)是用于基于非对称加密算法建立安全连接 (也即,用于生成共享密钥)。
步骤307、所述第二设备将所述第二设备的第二公钥发送至所述第一设备;
需要说明的是,步骤306与步骤307之间可以没有先后顺序。
步骤308、所述第一设备根据所述第二设备的第二公钥、所述第一设备的签名私钥,确定所述第二设备的第二公钥的签名。
具体的,所述第一设备首先对所述第二设备的第二公钥(或者,也可以包括其他指定的内容)进行哈希运算,得到哈希值;所述第一设备在根据所述第一设备的签名私钥对该哈希值进行加密,从而获得所述第二设备的第二公钥的签名。
需要说明的是,所述第一设备的签名私钥及所述第一设备的签名公钥是对应的公私钥。
步骤309、所述第一设备将所述第二设备的第二公钥的签名发送至所述第二设备;
需要说明的是,所述第一设备可以通过一条消息将所述第二设备的第二公钥的签名及所述第一设备的签名公钥发送至所述第二设备;或者,所述第一设备可以分别通过不同的消息将所述第二设备的第二公钥的签名及所述第一设备的签名公钥发送至所述第二设备。
需要说明的是,步骤309执行完之后可以认为是第一设备将第二设备配置为能够接入所述无线通信网络的设备。同时,步骤307~步骤309为可选步骤。当未包括步骤307~步骤309时,步骤311之后第二设备可以根据所述第二设备的签名公钥、所述第二设备的第二公钥确定所述第二设备的第二公钥的签名;至此所述第二设备已配置为能够接入所述无线网络的设备。
步骤310、所述第二设备将第一消息发送至所述第一设备;其中,所述第一消息包括所述第二设备的签名公钥;
需要说明的是,步骤310与步骤306之间可以没有先后顺序。
步骤311、所述第一设备将所述第二设备的签名公钥发送至所述第四设备,以使所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;
需要说明的是,当网络中还包括除第一设备、第二设备及第四设备之外 的其他设备时,第一设备也可以将第二设备的签名公钥发送至其他设备。
可选的,所述第一设备将所述第二设备的签名公钥发送至第四设备,可以包括:
所述第一设备将所述第二设备的签名公钥直接发送至所述第四设备;
或者,所述第一设备将所述第二设备的签名公钥发送至所述网络中的其他设备,由所述其他设备将其转发至所述第四设备。
或者,所述第一设备根据所述第一设备的签名私钥对所述第二设备的签名公钥进行加密,并将加密后的所述第二设备的签名公钥发送至所述第四设备;
或者,所述第一设备根据所述无线通信网络中的组密钥(group key)对所述第二设备的签名公钥进行加密,并将加密后的所述第二设备的签名公钥发送至所述第四设备。
其中,组密钥可以由配置器发送至被该配置器所配置的能够加入网络的设备。例如,由第一设备将组密钥发送至第二设备。
需要说明的是,当所述无线通信网络为NAN时,一个设备(例如,设备1)需要向另一个设备(例如设备2)发送信息时,设备1需要在发现窗口DW、或寻呼paging窗口、或管理窗口中将信息发送至设备2。其中,设备2在发现窗口DW、寻呼paging窗口或管理窗口内为唤醒(awake)状态,能收听消息。
步骤312、所述第四设备获得所述第二设备的签名公钥;
具体的,当所述第一设备将加密后的所述第二设备的签名公钥发送至所述第四设备之后,所述第四设备可以根据所述第一设备的签名公钥(或组密钥)对加密后的所述第二设备的签名公钥进行解密,获得所述第二设备的签名公钥。
步骤313、所述第二设备获得第三设备的第一公钥;
其中,所述第三设备为待配置设备。
需要说明的是,步骤313中所述第二设备获得所述第三设备的第一公钥的方法与步骤301中第一设备获得第二设备的第一公钥的方法类似,在此不再赘述。
步骤314、所述第二设备将所述第二设备的第三公钥发送至所述第三设 备;
步骤315、所述第二设备根据所述第二设备的第三私钥及所述第三设备的第一公钥生成第二共享密钥;
需要说明的是,所述第二设备的第三公钥及所述第二设备的第三私钥是对应的公私钥。
步骤316、所述第三设备根据所述第二设备的第三公钥及所述第三设备的第一私钥生成所述第二共享密钥;
需要说明的是,所述第三设备的第一公钥及所述第三设备的第一私钥是对应的公私钥。
需要说明的是步骤314~步骤316分别与步骤302~步骤304类似,在此不再赘述。
步骤317、所述第二设备及所述第三设备基于所述第二共享密钥或所述第二共享密钥的衍生密钥建立安全连接;
其中,第二共享密钥的衍生密钥可以为根据所述第二共享密钥所生成的密钥,或者,也可以为根据所述第二共享密钥及特定信息所生成的密钥。
步骤318、所述第二设备将所述第一设备的签名公钥发送至所述第三设备;
可选的,所述第二设备还可以将所述第二设备的签名公钥发送至所述第三设备,以使所述第三设备可以根据所述第二设备的签名公钥对所述第二设备配置的其他设备进行认证。
需要说明的是,当所述无线通信网络中还包括其他的配置器(即除了第一设备及第二设备之外的配置器)时,所述第二设备还可以将其他的配置器的签名公钥也发送至第三设备,使得第三设备可以与该无线通信网络中任一设备建立安全连接。
步骤319、所述第三设备将所述第三设备的第二公钥发送至所述第二设备;
需要说明的是,步骤318与步骤319之间可以没有先后顺序。
步骤320、所述第二设备根据所述第三设备的第二公钥、所述第二设备的签名私钥,确定所述第三设备的第二公钥的签名;
需要说明的是,所述第二设备的签名私钥及所述第二设备的签名公钥是 对应的公私钥。
需要说明的是,步骤320与步骤308类似,在此不再赘述。
步骤321、所述第二设备将所述第三设备的第二公钥的签名发送至所述第三设备;
需要说明的是,步骤321执行完之后可以认为第二设备将第三设备配置为能够接入所述无线通信网络的设备。
步骤322、所述第三设备将第一认证信息发送至所述第四设备;其中,所述第一认证信息包括所述第三设备的第二公钥的签名及所述第三设备的第二公钥;
步骤323、所述第四设备根据所述第三设备的第二公钥、所述第三设备的第二公钥的签名及所述第二设备的签名公钥,对所述第三设备进行认证;
具体的,步骤323可以包括:
所述第四设备根据所述第二设备的签名公钥对所述第三设备的第二公钥的签名进行解密,获得第一哈希值;
所述第四设备根据所述第三设备的第二公钥(或者,还可以包括其他指定的内容),采用哈希运算获得第二哈希值;
所述第四设备判断所述第一哈希值与所述第二哈希值是否相同;
若相同,则所述第四设备确定所述第三设备认证成功;否则,所述第四设备确定所述第三设备认证失败。当认证成功时执行步骤324,否则结束。
步骤324、所述第四设备将第二认证信息发送至所述第三设备,所述第二认证信息包括所述第四设备的公钥的签名及所述第四设备的公钥;
其中,所述第四设备的公钥的签名为所述第一设备根据所述第一设备的签名私钥及所述第四设备的公钥确定。
步骤325、所述第三设备根据所述第四设备的公钥、所述第四设备的公钥的签名及所述第一设备的签名公钥,对所述第四设备进行认证;
需要说明的是,步骤325第三设备对第四设备认证的方法与步骤323类似中类似,在此不再赘述。
当认证成功时执行步骤326,否则结束。
步骤326、所述第四设备根据所述第三设备的第二公钥及所述第四设备的私钥生成第三共享密钥;
需要说明的是,所述第四设备的公钥与所述第四设备的私钥为对应的公私钥。
需要说明的是,步骤326与步骤324、步骤325可以没有先后顺序。
步骤327、所述第三设备根据所述第三设备的第二私钥及所述第四设备的公钥生成所述第三共享密钥;
需要说明的是,第三设备的第二私钥与第三设备的第二公钥为对应的公私钥。
步骤328、所述第三设备及所述第四设备基于所述第三共享密钥或所述第三共享密钥的衍生密钥建立安全连接。
其中,第三共享密钥的衍生密钥可以为根据所述第三共享密钥所生成的密钥,或者,也可以为根据所述第三共享密钥及特定信息所生成的密钥。
需要说明的是,当第三设备发起到第四设备的连接时,步骤322中可以为第三设备将第一认证信息发送至第四设备;当第四设备发起到第三设备的连接时,步骤322中可以为第四设备将第二认证信息发送至第三设备。类似的,步骤323~步骤325也发生相应的改变。
本实施例中,通过第一设备与待配置的第二设备建立安全连接;所述第一设备将所述第二设备的签名公钥发送至第四设备以使所述第二设备成为能够对待配置设备进行配置的配置器(不执行步骤307~步骤309),或者将所述第二设备配置为能够加入无线通信网络的设备之后再将所述第二设备的签名公钥发送至第四设备以使所述第二设备成为能够对待配置设备进行配置的配置器(执行步骤307~步骤309);使得当无线通信网络中存在多个待配置设备需要进行配置时,可以有多个配置器对待配置设备进行配置;解决了现有技术中存在的配置效率较低的问题。并且,通过所述第二设备根据所述第三设备的第二公钥、所述第二设备的签名私钥,确定所述第三设备的第二公钥的签名;所述第四设备根据所述第三设备的第二公钥、所述第三设备的第二公钥的签名及所述第二设备的签名公钥,对所述第三设备进行认证;所述第三设备根据所述第四设备的公钥、所述第四设备的公钥的签名及所述第一设备的签名公钥,对所述第四设备进行认证;使得第一设备配置的第四设备与第二设备配置的第三设备之间能够建立安全连接。
需要说明的是,本实施例中将第二设备配置为能够接入无线通信网络的 设备与将所述第二设备的签名公钥发送至第四设备,以使所述第二设备成为能够对待配置设备进行配置的配置器的设备可以相同,也可以不同;本实施中第一设备可以为无线通信网络中第一个配置器,也可以是经其他配置器所配置成的配置器。
图4为本发明无线通信网络中设备配置的方法实施例四的流程图;所述无线通信网络包括第一设备、第二设备和第四设备;其中,所述第一设备为配置器,所述第四设备为所述第一设备所配置的设备;如图4所示,本实施例的方法可以包括:
步骤401、所述第二设备将第一消息发送至所述第一设备,所述第一消息包括所述第二设备的签名公钥;
步骤402、所述第一设备将所述第二设备的签名信息发送至所述第二设备,以使所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;
步骤403、所述第二设备根据所述第二设备的签名公钥及所述第三设备的第二公钥,确定所述第三设备的第二公钥的签名;
需要说明的是,步骤403与步骤313~步骤320类似,在此不再赘述。
步骤404、所述第二设备将第一认证信息发送至所述第四设备,所述第一认证信息包括所述第三设备的第二公钥的签名及所述第三设备的第二公钥;
步骤405、所述第四设备根据所述第三设备的第二公钥、所述第三设备的第二公钥的签名及所述第二设备的签名公钥,对所述第三设备进行认证;
需要说明的是,步骤405与步骤323类似,在此不再赘述。
当认证成功时执行步骤406,否则结束。
需要说明的是,当第四设备发起到第三设备的连接时,可以触发执行步骤405。
步骤406、所述第四设备将第二认证信息发送至所述第三设备;
其中,所述第二认证信息包括所述第四设备的公钥的签名及所述第四设备的公钥;
步骤407、所述第三设备与所述第四设备建立安全连接。
需要说明的是,步骤407与步骤325~步骤328类似,在此不再赘述。
本实施例中,通过第二设备将第一认证信息发送至第四设备,所述第一认证信息包括所述第三设备的第二公钥的签名及所述第三设备的第二公钥;使得在第四设备向第二设备发起连接时,第四设备可以直接根据所述第二设备发送的第一认证信息对所述第三设备进行认证;使得第四设备不需要再等待接收到第三设备发送的第一认证信息来对第三设备进行认证;提高了认证效率。
图5为本发明无线通信网络中设备配置的方法实施例五的流程图;所述无线通信网络包括第一设备、第二设备和第四设备;其中,所述第一设备为配置器,所述第四设备为所述第一设备所配置的设备;如图5所示,本实施例的方法可以包括:
步骤501、所述第二设备将第一消息发送至所述第一设备,所述第一消息包括所述第二设备的签名公钥;
步骤502、所述第一设备根据所述第二设备的签名公钥及所述第一设备的签名私钥,确定所述第二设备的签名信息;
其中,所述第二设备的签名信息包括所述第二设备的签名公钥的签名,和/或,加密后的所述第二设备的签名公钥;
可选的,所述第一设备根据所述第二设备的签名公钥及所述第一设备被的签名私钥,确定所述第二设备的签名公钥的签名,可以包括:
所述第一设备首先对所述第二设备的签名公钥(或者,也可以包括其他指定的内容)进行哈希运算,得到哈希值;所述第一设备再根据所述第一设备的签名私钥对该哈希值进行加密,从而获得所述第二设备的签名公钥的签名。
或者,所述第一设备根据所述第二设备的签名公钥及所述第一设备的签名私钥,确定所述加密后的所述第二设备的签名公钥,可以包括:
所述第一设备根据所述第一设备的签名私钥对所述第二设备的签名公钥进行加密,从而确定出所述加密后的所述第二设备的签名公钥。
步骤503、所述第一设备将所述第二设备的签名信息发送至所述第二设备,以使所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;
步骤504、所述第二设备与所述第三设备建立安全连接;
需要说明的是,步骤504与步骤313~步骤317类似,在此不再赘述。
步骤505、所述第二设备将所述第一设备的签名公钥及所述第二设备的签名信息发送至所述第三设备;
其中,所述第一设备的签名公钥用于所述第三设备对第四设备进行认证。
可选的,所述第二设备还可以将所述第二设备的签名公钥发送至所述第三设备,以使所述第三设备可以根据所述第二设备的签名公钥对设备x进行认证;其中,设备x是由所述第二设备配置为能够加入所述网络的设备。
需要说明的是,第二设备可以通过一条消息或多条消息将所述第一设备的签名公钥及所述第二设备的签名信息发送至所述第三设备。
步骤506、所述第二设备对所述第三设备的第二公钥进行签名;
需要说明的是,步骤506与步骤319~步骤321类似,在此不再赘述。在步骤406中已将第三设备的第二公钥的签名发送至所述第三设备。
需要说明的是,步骤505与步骤506之间可以没有先后顺序。
步骤507、所述第三设备将第一认证信息及配置器认证信息发送至所述第四设备;
其中,所述第一认证信息包括所述第三设备的第二公钥的签名及所述第三设备的第二公钥;所述配置器认证信息包括所述第二设备的签名信息及所述第二设备的签名公钥。
需要说明的是,第一认证信息和配置器认证信息可以在一条消息里面发送至第四设备,或者,也可以分多条消息发送至第四设备。
需要说明的是,当第三设备发起到第四设备的连接时,可以触发执行步骤507。
步骤508、所述第四设备根据所述配置器认证信息及所述第一设备的签名公钥,确定所述配置器认证信息中的所述第二设备的签名公钥是否正确;
若是,则执行步骤509,否则结束。
可选的,所述第四设备根据所述第二设备的签名公钥的签名、所述第二设备的签名公钥及所述第一设备的签名公钥,确定所述第二设备的签名公钥的是否正确可以包括:
所述第四设备根据所述第一设备的签名公钥对所述第二设备的签名公钥的签名进行解密,获得哈希值a;所述第四设备根据所述第二设备的签名公钥 (或者,还可以包括其他指定的内容),采用哈希运算获得哈希值b;所述第四设备判断所述哈希值a与所述哈希值b是否相同;若相同,则所述第四设备确定所述第二设备的签名公钥正确;否则,确定所述第二设备的签名公钥不正确。
可选的,所述第四设备根据加密后的所述第二设备的签名公钥、所述第二设备的签名公钥及所述第一设备的签名公钥,确定所述第二设备的签名公钥是否正确可以包括:
所述第四设备根据所述第一设备的签名公钥对所述加密后的所述第二设备的签名公钥进行解密,获得解密后的结果;所述第四设备确定所述解密后的结果与所述第二设备的签名公钥是否相同;若相同,则确定所述第二设备的签名公钥正确;否则,确定所述第二设备的签名公钥不正确。
需要说明的是,由于第四设备是由第一设备配置为能够加入所述网络中的设备的,因此第四设备可以通过接收所述第一设备发来的所述第一设备的签名公钥获得所述第一设备的签名公钥。
步骤509、所述第四设备根据所述第一认证信息及所述第二设备的签名公钥,对所述第三设备进行认证;
当认证成功时执行步骤510,否则结束。
步骤510、所述第四设备将第二认证信息发送至所述第三设备;
其中,所述第二认证信息包括所述第四设备的公钥的签名及所述第四设备的公钥;
步骤511、所述第三设备与所述第四设备建立安全连接。
需要说明的是,步骤511与步骤407类似,在此不再赘述。
本实施例中,通过所述第一设备根据所述第二设备的签名公钥及所述第一设备的签名私钥,确定所述第二设备的签名信息;所述第一设备将所述第二设备的签名信息发送至所述第二设备,以使所述第二设备成为能够对待配置设备进行配置的配置器;使得当无线通信网络中存在多个待配置设备需要进行配置时,可以有多个配置器对待配置设备进行配置;解决了现有技术中存在的配置效率较低的问题。并且,通过第二设备对所述第三设备的第二公钥进行签名,并将所述第一设备的签名公钥及所述第二设备的签名信息发送至所述第三设备;所述第三设备将第一认证信息及配置器认证信息发送至第 四设备;其中,所述第一认证信息包括所述第三设备的第二公钥的签名及所述第三设备的第二公钥,所述配置器认证信息包括所述第二设备的签名信息及所述第二设备的签名公钥;所述第四设备根据所述第三设备的第二公钥、所述第三设备的第二公钥的签名及所述第二设备的签名公钥,对所述第三设备进行认证;所述第三设备根据所述第四设备的公钥、所述第四设备的公钥的签名及所述第一设备的签名公钥,对所述第四设备进行认证;使得第一设备配置的第四设备与第二设备配置的第三设备之间能够建立安全连接。
图6为本发明无线通信网络中设备配置的方法实施例六的流程图;所述无线通信网络包括第一设备、第二设备和第四设备;其中,所述第一设备为配置器,所述第四设备为所述第一设备所配置的设备;如图6所示,本实施例的方法可以包括:
步骤601、所述第二设备将第一消息发送至所述第一设备,所述第一消息包括所述第二设备的签名公钥;
步骤602、所述第一设备根据所述第二设备的签名公钥及所述第一设备的签名私钥,确定所述第二设备的签名信息;
需要说明的是,步骤602与步骤502类似,在此不再赘述。
步骤603、所述第一设备将所述第二设备的签名信息发送至所述第二设备,以使所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;
需要说明的是,步骤603与步骤503类似,在此不再赘述。
步骤604、所述第二设备将配置器认证信息发送至所述第四设备;
其中,所述配置器认证信息包括所述第二设备的签名信息及所述第二设备的签名公钥。
步骤605、所述第二设备与所述第三设备建立安全连接;
需要说明的是,步骤605与步骤504类似,在此不再赘述。
步骤606、所述第二设备将所述第一设备的签名公钥发送至所述第三设备;
可选的,所述第二设备还可以将所述第二设备的签名公钥及所述第二设备的签名信息发送至所述第三设备。
步骤607、所述第二设备对所述第三设备的第二公钥进行签名;
需要说明的是,步骤607与步骤506类似,在此不再赘述。
步骤608、所述第三设备将第一认证信息发送至所述第四设备;
其中,所述第一认证信息包括所述第三设备的第二公钥的签名及所述第三设备的第二公钥。
需要说明的是,当第三设备发起到第四设备的连接时,可以触发执行步骤608。
步骤609、所述第四设备根据所述配置器认证信息及所述第一设备的签名公钥,确定所述配置器认证信息中的所述第二设备的签名公钥是否正确;
若是,则执行步骤610,否则结束。
需要说明的是,步骤609与步骤508类似,在此不再赘述。
步骤610、所述第四设备根据所述第一认证信息及所述第二设备的签名公钥,对所述第三设备进行认证;
当认证成功时执行步骤611,否则结束。
需要说明的是,步骤610与步骤509类似,在此不再赘述。
步骤611、所述第四设备将第二认证信息发送至所述第三设备;
其中,所述第二认证信息包括所述第四设备的公钥的签名及所述第四设备的公钥;
步骤612、所述第三设备与所述第四设备建立安全连接。
需要说明的是,步骤612与步骤511类似,在此不再赘述。
本实施例中,通过第二设备对所述第三设备的第二公钥进行签名,并将所述第一设备的签名公钥及所述第二设备的签名信息发送至所述第三设备;所述第二设备将配置器认证信息发送至第四设备,所述配置器认证信息包括所述第二设备的签名信息及所述第二设备的签名公钥;第三设备将第一认证信息发送至第四设备,所述第一认证信息包括所述第三设备的第二公钥的签名及所述第三设备的第二公钥;所述第四设备根据所述第三设备的第二公钥、所述第三设备的第二公钥的签名及所述第二设备的签名公钥,对所述第三设备进行认证;所述第三设备根据所述第四设备的公钥、所述第四设备的公钥的签名及所述第一设备的签名公钥,对所述第四设备进行认证;使得第一设备配置的第四设备与第二设备配置的第三设备之间能够建立安全连接。
图7为本发明无线通信网络中设备配置的方法实施例七的流程图;所述 无线通信网络包括第一设备、第二设备和第四设备;其中,所述第一设备为配置器,所述第四设备为所述第一设备所配置的设备;如图7所示,本实施例的方法可以包括:
步骤701、所述第二设备将第一消息发送至所述第一设备,所述第一消息包括所述第二设备的签名公钥;
步骤702、所述第一设备根据所述第二设备的签名公钥及所述第一设备的签名私钥,确定所述第二设备的签名信息;
需要说明的是,步骤702与步骤502类似,在此不再赘述。
步骤703、所述第一设备将所述第二设备的签名信息发送至所述第二设备,以使所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;
需要说明的是,步骤703与步骤503类似,在此不再赘述。
步骤704、所述第二设备与所述第三设备建立安全连接;
需要说明的是,步骤704与步骤504类似,在此不再赘述。
步骤705、所述第二设备将所述第一设备的签名公钥及所述第二设备的签名信息发送至所述第三设备;
需要说明的是,步骤705与步骤505类似,在此不再赘述。
可选的,所述第二设备还可以将所述第二设备的签名公钥发送至所述第三设备。
步骤706、所述第二设备对所述第三设备的第二公钥进行签名;
要说明的是,步骤706与步骤506类似,在此不再赘述。
步骤707、所述第二设备将第一认证信息发送至第四设备;
其中,所述第一认证信息包括所述第三设备的第二公钥及所述第三设备的第二公钥的签名。
需要说明的是,步骤707可以在所述第二设备确定所述第三设备的第二公钥的签名之后执行。
步骤708、所述第三设备将配置器认证信息发送至所述第四设备;
其中,所述配置器认证信息包括所述第二设备的签名信息及所述第二设备的签名公钥。
需要说明的是,当第三设备发起到第四设备的连接时,可以触发执行步 骤708。
步骤709、所述第四设备根据所述配置器认证信息及所述第一设备的签名公钥,确定所述配置器认证信息中的所述第二设备的签名公钥是否正确;
需要说明的是,步骤709与步骤508类似,在此不再赘述。
步骤710、所述第四设备根据所述第一认证信息及所述第二设备的签名公钥,对所述第三设备进行认证;
当认证成功时执行步骤711,否则结束。
步骤711、所述第四设备将第二认证信息发送至所述第三设备;
其中,所述第二认证信息包括所述第四设备的公钥的签名及所述第四设备的公钥;
步骤712、所述第三设备与所述第四设备建立安全连接。
需要说明的是,步骤712与步骤511类似,在此不再赘述。
本实施例中,通过第二设备将第一认证信息发送至第四设备,所述第一认证信息包括所述第三设备的第二公钥的签名及所述第三设备的第二公钥;第三设备将配置器认证信息发送至第四设备,所述配置器认证信息包括所述第二设备的签名信息及所述第二设备的签名公钥;所述第四设备根据所述第三设备的第二公钥、所述第三设备的第二公钥的签名及所述第二设备的签名公钥,对所述第三设备进行认证;所述第三设备根据所述第四设备的公钥、所述第四设备的公钥的签名及所述第一设备的签名公钥,对所述第四设备进行认证;使得第一设备配置的第四设备与第二设备配置的第三设备之间能够建立安全连接。
图8为本发明无线通信网络中设备配置的方法实施例八的流程图;所述无线通信网络包括第一设备、第二设备和第四设备;其中,所述第一设备为配置器,所述第四设备为所述第一设备所配置的设备;如图8所示,本实施例的方法可以包括:
步骤801、所述第二设备将第一消息发送至所述第一设备,所述第一消息包括所述第二设备的签名公钥;
步骤802、所述第一设备根据所述第二设备的签名公钥及所述第一设备的签名私钥,确定所述第二设备的签名信息;
需要说明的是,步骤802与步骤502类似,在此不再赘述。
步骤803、所述第一设备将所述第二设备的签名信息发送至所述第二设备,以使所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;
需要说明的是,步骤803与步骤503类似,在此不再赘述。
步骤804、所述第二设备将配置器认证信息发送至所述第四设备;
其中,所述配置器认证信息包括所述第二设备的签名信息及所述第二设备的签名公钥。
步骤805、所述第二设备与所述第三设备建立安全连接;
其中,所述第三设备为待配置设备。
需要说明的是,步骤805与步骤504类似,在此不再赘述。
步骤806、所述第二设备将所述第一设备的签名公钥发送至所述第三设备;
可选的,所述第二设备还可以将所述第二设备的签名公钥发送至所述第三设备。
步骤807、所述第二设备对所述第三设备的第二公钥进行签名;
需要说明的是,步骤807与步骤506类似,在此不再赘述。
步骤808、所述第二设备将第一认证信息发送至所述第四设备;
其中,所述第一认证信息包括所述第三设备的第二公钥的签名及所述第三设备的第二公钥。
步骤809、所述第四设备根据所述配置器认证信息及所述第一设备的签名公钥,确定所述配置器认证信息中的所述第二设备的签名公钥是否正确;
若是,则执行810,否则结束。
需要说明的是,当第四设备发起到第三设备的连接时,可以触发执行步骤809。
步骤810、所述第四设备根据所述第一认证信息及所述第二设备的签名公钥,对所述第三设备进行认证;
当认证成功时执行步骤811,否则结束。
步骤811、所述第四设备将第二认证信息发送至所述第三设备;
其中,所述第二认证信息包括所述第四设备的公钥的签名及所述第四设备的公钥;
步骤812、所述第三设备与所述第四设备建立安全连接。
需要说明的是,步骤812与步骤511类似,在此不再赘述。
本实施例中,通过第二设备将第一认证信息及配置器认证信息发送至第四设备;其中,所述第一认证信息包括所述第三设备的第二公钥的签名及所述第三设备的第二公钥;所述配置器认证信息包括所述第二设备的签名信息及所述第二设备的签名公钥;使得在第四设备向第二设备发起连接时,第四设备可以直接根据所述第二设备发送的第一认证信息对所述第三设备进行认证;使得第四设备不需要再等待接收到第三设备发送的第一认证信息来对第三设备进行认证;提高了认证效率。
图9为本发明无线通信网络中设备配置的方法实施例九的流程图。本实施例的场景为:无线通信网络中包括第一设备、第二设备、第四设备;其中,第一设备为第五设备通过将所述第一设备的签名信息发送至所述第一设备的方式,使得所述第一设备成为能够对待配置设备进行配置的配置器,第五设备为配置器,所述第四设备为所述第一设备所配置的设备。如图9所示,本实施例的方法可以包括:
步骤901、所述第二设备将第一消息发送至所述第一设备,所述第一消息包括所述第二设备的签名公钥;
步骤902、所述第一设备根据所述第二设备的签名公钥及所述第一设备的签名私钥,确定所述第二设备的签名信息;
其中,所述第二设备的签名信息包括所述第二设备的签名公钥的签名,和/或,加密后的所述第二设备的签名公钥;
需要说明的是,步骤902与步骤502类似,在此不再赘述。
步骤903、所述第一设备将所述第一设备的签名信息及所述第二设备的签名信息发送至所述第二设备,以使所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;
其中,所述第一设备的签名信息包括所述第一设备的签名公钥的签名,和/或,加密后的所述第一设备的签名公钥。
其中,所述第一设备的签名信息为第五设备根据所述第一设备的签名公钥及所述第五设备的签名私钥所确定;具体的确定方法与步骤902中第一设备确定第二设备的签名信息的方法类似,在此不再赘述。
步骤904、所述第二设备与第三设备建立安全连接;
其中,所述第三设备为待配置设备。
需要说明的是,步骤904与步骤504类似,在此不再赘述。
步骤905、所述第二设备将所述第一设备的签名信息及所述第二设备的签名信息发送至所述第三设备;
可选的,所述第二设备还可以将所述第一设备的签名公钥、所述第二设备的签名公钥及第五设备的签名公钥发送至所述第三设备,以使所述第三设备能够对由第一设备、第二设备及第五设备所配置为能够加入网络的设备进行认证。
步骤906、所述第二设备对所述第三设备的第二公钥进行签名;
需要说明的是,步骤906与步骤506类似,在此不再赘述。
步骤907、所述第三设备将第一认证信息及配置器认证信息发送至所述第四设备;
其中,所述第一认证信息包括所述第三设备的第二公钥的签名及所述第三设备的第二公钥;所述配置器认证信息包括所述第一设备的签名信息、所述第一设备的签名公钥、所述第二设备的签名信息及所述第二设备的签名公钥。
可选的,所述配置器认证信息还可以包括:顺序标识,所述顺序标识用于指示所述第四设备首先确定所述第一设备的签名公钥是否正确,再确定所述第二设备的签名公钥是否正确;或者,所述配置器认证信息中所述第一设备的签名公钥及所述第二设备的签名公钥的先后顺序指示所述第四设备首先确定所述第一设备的签名公钥是否正确,再确定所述第二设备的签名公钥是否正确。
步骤908、所述第四设备根据所述第五设备的签名公钥及所述配置器认证信息中所述第一设备的签名信息及所述第一设备的签名公钥,确定所述配置器认证信息中所述第一设备的签名公钥是否正确;
若是,则执行步骤909,否则结束。
需要说明的是,步骤908中第四设备确定第一设备的签名公钥是否正确的方法与步骤508中第四设备确定第二设备的签名公钥是否正确的方法类似,在此不再赘述。
需要说明的是,由于第四设备是由第五设备配置为能够加入所述网络中的设备的,因此第四设备可以通过接收所述第五设备发来的所述第五设备的签名公钥获得所述第五设备的签名公钥。
步骤909、所述第四设备根据所述配置器认证消息中所述第一设备的签名公钥、所述第二设备的签名信息及所述第二设备的签名公钥,确定所述配置器认证信息中所述第二设备的签名公钥是否正确;
若是,则执行步骤910,否则结束。
需要说明的是,步骤909与步骤508类似,在此不再赘述。
步骤910、所述第四设备根据所述第一认证信息及所述第二设备的签名公钥,对所述第三设备进行认证;
当认证成功时执行步骤911,否则结束。
步骤911、所述第四设备将第二认证信息发送至所述第三设备;
其中,所述第二认证信息包括所述第四设备的公钥的签名及所述第四设备的公钥;
步骤912、所述第三设备与所述第四设备建立安全连接。
需要说明的是,步骤912与步骤511类似,在此不再赘述。
本实施例中,通过所述第二设备对所述第三设备的第二公钥进行签名;所述第二设备将所述第一设备的签名公钥、所述第一设备的签名信息及所述第二设备的签名信息发送至所述第三设备;所述第三设备将第一认证信息及配置器认证信息发送至第四设备;其中,所述第一认证信息包括所述第三设备的第二公钥的签名及所述第三设备的第二公钥,所述配置器认证信息包括所述第二设备的签名信息、所述第二设备的签名公钥、所述第一设备的签名信息及所述第一设备的签名公钥;使得第四设备能够在根据所述第五设备的签名公钥、所述第一设备的签名信息及所述第一设备的签名公钥,确定所述第一设备的签名公钥正确之后,再根据第一设备的签名公钥、所述第二设备的签名信息及所述第二设备的签名公钥确定所述第二设备的签名公钥是否正确;并在确定所述第二设备的签名公钥正确之后,进一步根据第二设备的签名公钥对所述第三设备进行认证,并在认证成功后建立设备之间的安全连接。
图10为本发明无线通信网络中设备配置的方法实施例十的流程图;所述无线通信网络包括第一设备、第二设备、第四设备;其中,第一设备为配置 器,所述第二设备为第一设备通过将所述第二设备的签名公钥发送至第四设备或者将所述第二设备的签名信息发送至所述第二设备的方式,使得所述第二设备成为能够对待配置设备进行配置的配置器,所述第四设备为所述第一设备所配置的设备。如图10所示,本实施例的方法可以包括:
步骤1001、所述第二设备根据所述第二设备的签名私钥及所述第二设备的第四公钥,确定所述第二设备的第四公钥的签名;
需要说明的是,步骤1001中第二设备确定第二设备的第四公钥的签名与步骤320中第二设备确定第三设备的第二公钥的签名类似,在此不再赘述。
步骤1002、所述第二设备将所述第二设备的第四公钥及所述第二设备的第四公钥的签名发送至所述第四设备;
步骤1003、所述第四设备根据所述第二设备的签名公钥及所述第二设备的第四公钥的签名,对所述第二设备进行认证;
当认证成功时执行步骤1004,否则结束。
需要说明的是,步骤1003中第四设备对第二设备进行认证的方法与步骤323中第四设备对第三设备进行认证的方法类似,在此不再赘述。
步骤1003之前还可以包括:所述第四设备接收所述第一设备发送的所述第二设备的签名公钥。
或者,步骤1003之前还可以包括:
所述第四设备接收第二网络设备发送的配置器认证信息,所述配置器认证信息包括所述第二设备的签名信息及所述第二设备的签名公钥;所述第四设备根据所述第二设备的签名信息、所述第一设备的签名公钥及所述第二设备的签名公钥,确定所述第二设备的签名公钥是否正确;若是,则执行步骤1003。
步骤1004、所述第四设备根据所述第二设备的第四公钥及所述第四设备的私钥生成第四共享密钥;
步骤1005、所述第四设备将所述第四设备的公钥的签名及所述第四设备的公钥发送至所述第二设备;
需要说明的是,步骤1005与步骤1004之前并没有先后顺序。
需要说明的是,第四设备的公钥与第四设备的私钥为对应的公私钥。
步骤1006、所述第二设备根据所述第一设备的签名公钥及所述第四设备 的公钥的签名,对所述第四设备进行认证;
当认证成功时执行步骤1007,否则结束。
需要说明的是,步骤1005中第二设备对第四设备进行认证的方法与步骤1003中第四设备对第二设备进行认证的方法类似,在此不再赘述。
步骤1007、所述第二设备根据所述第四设备的公钥及所述第二设备的第四私钥,生成所述第四共享密钥;
需要说明的是,第二设备的第四私钥与第二设备的第四公钥为对应的公私钥。
步骤1008、所述第二设备及所述第四设备基于所述第四共享密钥或所述第四共享密钥的衍生密钥建立安全连接。
本发明实施例中,通过第二设备根据所述第二设备的签名私钥及所述第二设备的第四公钥,确定所述第二设备的第四公钥的签名;所述第二设备将所述第二设备的第四公钥的签名及所述第二设备的第四公钥发送至第四设备;所述第四设备根据对端第二设备的签名公钥及所述第二设备的第四设备的签名,对所述第二设备进行认证;使得作为配置器的第二设备能够根据自己的签名公钥为自己确定一个数字签名,并能够根据该数字签名与第四设备的安全连接。
图11为本发明无线通信网络中设备配置的方法实施例十一的流程图;所述无线通信网络包括第一设备、第二设备及第四设备;其中,所述第一设备、第二设备和第四设备属于同一组;所述第一设备为配置器,所述第四设备为所述第一设备所配置的设备;如图11所示,本实施例的方法可以包括:
步骤1101、所述第一设备将所述第二设备所属组的组密钥发送至所述第二设备;
步骤1102、所述第二设备根据所述组密钥对所述第二设备的签名公钥进行加密;
步骤1103、所述第二设备将加密后的所述第二设备的签名公钥发送至所述第四设备,以使所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备。
本实施例中,通过第一设备将组密钥发送至第二设备,所述第二设备根据所述组密钥对所述第二设备的签名公钥进行加密,并将加密后的所述第二 设备的签名公钥发送至所述第四设备,以使所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;使得无线通信网络中的设备成为能够对待配置设备进行配置的配置器;因此,当无线通信网络中存在多个待配置设备需要进行配置时,可以由多个配置器对多个待配置设备进行配置;解决了现有技术中存在的配置效率较低的问题。
图12为本发明无线通信网络中设备配置的方法实施例十二的流程图;所述无线通信网络包括第一设备及第四设备;其中,所述第一设备和第四设备属于同一组;所述第一设备为配置器,所述第四设备为所述第一设备所配置的设备;如图12所示,本实施例的方法可以包括:
步骤1201、第一设备获得第二设备的第一公钥;
其中,所述第二设备为待配置设备。
步骤1202、所述第一设备将所述第一设备的公钥发送至所述第二设备;
步骤1203、所述第一设备根据所述第一设备的私钥及所述第二设备的第一公钥生成第一共享密钥;
步骤1204、所述第二设备根据所述第一设备的公钥及所述第二设备的第一私钥生成所述第一共享密钥;
步骤1205、所述第一设备及所述第二设备基于所述第一共享密钥或所述第一共享密钥的衍生密钥建立安全连接;
需要说明的是,步骤1201~步骤1205分别与步骤301~步骤305类似,在此不再赘述。
步骤1206、所述第一设备将所述第一设备所属的组的组密钥及所述第一设备的签名公钥发送至所述第二设备;
步骤1207、所述第二设备根据所述组密钥对所述第二设备的签名公钥进行加密,获得加密后的所述第二设备的签名公钥;
步骤1208、所述第二设备与第三设备建立安全连接;
其中,所述第三设备为待配置设备。
需要说明的是,步骤1208与步骤504类似,在此不再赘述。
步骤1209、所述第二设备将所述第一设备的签名公钥及所述加密后的所述第二设备的签名公钥发送至所述第三设备;
步骤1210、所述第二设备对所述第三设备的第二公钥进行签名;
需要说明的是,步骤1210与步骤506类似,在此不再赘述。
步骤1211、所述第三设备将第一认证信息及配置器认证信息发送至第四设备;
其中,所述第一认证信息包括所述第三设备的第二公钥的签名及所述第三设备的第二公钥;所述配置器认证信息包括所述加密后的所述第二设备的签名公钥。
步骤1212、所述第四设备根据所述组密钥对所述配置器认证信息中包括的加密后的所述第二设备的签名公钥进行解密,获得所述第二设备的签名公钥;并根据所述第一认证信息及所述第二设备的签名公钥,对所述第三设备进行认证;
当认证成功时执行步骤1213,否则结束。
步骤1213、所述第四设备将第二认证信息发送至所述第三设备;
其中,所述第二认证信息包括所述第四设备的公钥的签名及所述第四设备的公钥;
步骤1214、所述第三设备与所述第四设备建立安全连接。
需要说明的是,步骤1214与步骤511类似,在此不再赘述。
本实施例中,通过所述第一设备将组密钥发送至第二设备,所述第二设备根据所述组密钥确定加密后的所述第二设备的签名公钥;所述第二设备对所述第三设备的第二公钥进行签名,并将所述加密后的所述第二设备的签名公钥发送至所述第三设备;所述第三设备将第一认证信息及配置器认证信息发送至第四设备;其中,所述第一认证信息包括所述第三设备的第二公钥的签名及所述第三设备的第二公钥,所述配置器认证信息包括加密后的所述第二设备的签名公钥;所述第四设备根据所述组密钥对加密后的所述第二设备的签名公钥进行解密获得第二设备的签名公钥,并所述第三设备的第二公钥、所述第三设备的第二公钥的签名及所述第二设备的签名公钥,对所述第三设备进行认证;使得第一设备配置的第四设备与第二设备配置的第三设备之间能够建立安全连接。
图13为本发明无线通信网络中设备配置的方法实施例十三的流程图;所述无线通信网络包括第一设备、第二设备和第四设备;其中,所述第一设备、第二设备及第四设备属于同一组;所述第一设备为配置器,所述第四设备为 所述第一设备所配置的设备;如图13所示,本实施例的方法可以包括:
步骤1301、第一设备将所述第一设备所属的组的组密钥及所述第一设备的签名公钥发送至第二设备;
需要说明的是,本发明中的组可以为至少包含所述第一设备的集合;
步骤1302、所述第二设备根据所述组密钥对所述第二设备的签名公钥进行加密,获得加密后的所述第二设备的签名公钥;
步骤1303、所述第二设备将配置器认证信息发送至所述第四设备;
其中,所述配置器认证信息包括加密后的所述第二设备的签名公钥。
步骤1304、所述第四设备根据所述组密钥对所述配置器认证信息中包括的加密后的所述第二设备的签名公钥进行解密,获得所述第二设备的签名公钥;
步骤1305、所述第二设备与第三设备建立安全连接;
其中,所述第三设备为待配置设备。
需要说明的是,步骤1305与步骤504类似,在此不再赘述。
步骤1306、所述第二设备将所述第一设备的签名公钥发送至第三设备;
可选的,所述第二设备还可以将加密后的所述第二设备的签名公钥及组密钥发送至所述第三设备,以使所述第三设备可以获得所述第二设备的签名公钥,以便所述第三设备对所述第二设备配置的其他设备进行认证。
步骤1307、所述第二设备对所述第三设备的第二公钥进行签名;
需要说明的是,步骤1307与步骤506类似,在此不再赘述。
步骤1308、所述第三设备将第一认证信息发送至所述第四设备;
其中,所述第一认证信息包括所述第三设备的第二公钥的签名及所述第三设备的第二公钥。
需要说明的是,当第三设备发起到第四设备的连接时,可以触发执行步骤1308。
步骤1309、所述第四设备根据所述第一认证信息及所述第二设备的签名公钥,对所述第三设备进行认证;
当认证成功时执行步骤1310,否则结束。
需要说明的是,步骤1309与步骤509类似,在此不再赘述。
步骤1310、所述第四设备将第二认证信息发送至所述第三设备;
其中,所述第二认证信息包括所述第四设备的公钥的签名及所述第四设备的公钥;
步骤1311、所述第三设备与所述第四设备建立安全连接。
需要说明的是,步骤1310与步骤511类似,在此不再赘述。
本实施例中,通过第一设备将组密钥发送至第二设备,所述第二设备根据所述组密钥对所述第二设备的签名公钥进行加密;所述第二设备对所述第三设备的第二公钥进行签名,并将所述第一设备的签名公钥发送至所述第三设备;所述第二设备将配置器认证信息发送至第四设备,所述配置器认证信息包括加密后的所述第二设备的签名公钥;第三设备将第一认证信息发送至第四设备,所述第一认证信息包括所述第三设备的第二公钥的签名及所述第三设备的第二公钥;所述第四设备根据所述组密钥对加密后的所述第二设备的签名公钥进行解密获得第二设备的签名公钥,并所述第三设备的第二公钥、所述第三设备的第二公钥的签名及所述第二设备的签名公钥,对所述第三设备进行认证;使得第一设备配置的第四设备与第二设备配置的第三设备之间能够建立安全连接。
图14为本发明无线通信网络中设备配置的装置实施例一的结构示意图;所述网络包括第一设备、第二设备和第四设备;其中,所述第一设备为配置器,所述第四设备为所述第一设备所配置的设备;所述装置为所述第一设备,如图14所示,本实施例的装置可以包括:接收模块1401和发送模块1402。其中,接收模块1401,用于接收所述第二设备发送的第一消息,所述第一消息包括所述第二设备的签名公钥;发送模块1402,用于将所述第二设备的签名公钥发送至所述第四设备,以使所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;或者,用于将所述第二设备的签名信息发送至所述第二设备,以使所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;其中,所述第二设备的签名信息为所述第一设备根据所述第一设备的签名私钥及所述第二设备的签名公钥所确定,所述第二设备的签名信息包括所述第二设备的签名公钥的签名,和/或,加密后的所述第二设备的签名公钥。
可选的,当所述网络为临近感知网络NAN时,发送模块1402将所述第二设备的签名公钥发送至所述第四设备,具体包括:在发现窗口DW、或寻 呼paging窗口、或管理窗口中将所述第二设备的签名公钥发送至所述第四设备。
可选的,发送模块1402,还用于将所述第一设备的签名公钥发送至所述第二设备,以使所述第二设备将所述第一设备的签名公钥发送至所述第三设备,以便所述第三设备根据所述第一设备的签名公钥对所述第四设备进行认证。
本实施例的装置,可以用于执行图1~图10所示方法实施例第一设备侧的技术方案,其实现原理和技术效果类似,此处不再赘述。
图15为本发明无线通信网络中设备配置的装置实施例二的结构示意图;所述网络包括第一设备、第二设备和第四设备;其中,所述第一设备为配置器,所述第四设备为所述第一设备所配置的设备;所述装置为所述第二设备,如图15所示,本实施例的装置可以包括:发送模块1501,用于将第一消息发送至所述第一设备,所述第一消息包括所述第二设备的签名公钥;
其中,所述第一消息用于所述第一设备将所述第二设备的签名公钥发送至所述第四设备,以使所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;或者,所述第一消息用于所述第一设备将所述第二设备的签名信息发送至所述第二设备,以使所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;
当所述第一消息用于所述第一设备将所述第二设备的签名信息发送至所述第二设备时,所述装置还包括:
第一接收模块1502,用于接收所述第一设备发送的所述第二设备的签名信息;
其中,所述第二设备的签名信息包括所述第二设备的签名公钥的签名,和/或,加密后的所述第二设备的签名公钥,所述第二设备的签名信息为所述第一设备根据所述第一设备的签名私钥及所述第二设备的签名公钥所确定。
可选的,所述装置还包括:处理模块1503,用于根据所述第二设备的签名私钥及第三设备的公钥,确定所述第三设备的公钥的签名;
发送模块1501,还用于将所述第三设备的公钥的签名发送至所述第三设备,以便所述第三设备向所述第四设备发送第一认证信息,和/或,用于将所述第一认证信息发送至所述第四设备;
其中,所述第一认证信息包括所述第三设备的公钥及所述第三设备的公钥的签名,以使所述第四设备根据所述第一认证信息对所述第三设备进行认证。
可选的,发送模块1501,还用于:将所述第二设备的签名信息发送至所述第三设备;和/或,将配置器认证信息发送至所述第四设备,所述配置器认证信息包括所述第二设备的签名信息及所述第二设备的签名公钥。
可选的,所述装置还包括:第二接收模块1504,用于接收所述第一设备发送的所述第一设备的签名公钥;
相应的,发送模块1501还用于将所述第一设备的签名公钥发送至所述第三设备,以使所述第三设备根据所述第一设备的签名公钥对所述第四设备进行认证。
本实施例的装置,可以用于执行图1~图10所示方法实施例第二设备侧的技术方案,其实现原理和技术效果类似,此处不再赘述。
图16为本发明无线通信网络中设备配置的装置实施例三的结构示意图;所述网络包括第一设备、第二设备及第四设备;其中,所述第一设备为配置器,所述第四设备为所述第一设备所配置的设备;所述第二设备为所述第一设备通过将所述第二设备的签名公钥发送至所述第四设备的方式,使得所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;所述装置为所述第四设备,如图16所示,本实施例的装置可以包括:接收模块1601、处理模块1602及发送模块1603。其中,接收模块1601,用于在所述第二设备对待配置的所述第三设备进行配置之后,接收网络设备发送的第一认证信息,所述第一认证信息包括所述第三设备的公钥、所述第三设备的公钥的签名;其中,所述第三设备的公钥的签名为所述第二设备根据所述第二设备的签名公钥对应的签名私钥及所述第三设备的公钥所确定并发送给所述第三设备的;处理模块1602,用于根据所述第三设备的公钥、所述第三设备的公钥的签名及所述第一设备发送的所述第二设备的签名公钥,对所述第三设备进行认证;发送模块1603,用于将第二认证信息发送至所述第三设备,以使所述第三设备根据所述第二认证信息对所述第四设备进行认证;其中,所述第二认证信息包括所述第四设备的公钥及所述第四设备的公钥的签名;
其中,所述网络设备为所述第二设备或所述第三设备。
本实施例的装置,可以用于执行图3、图4所示方法实施例第四设备侧的技术方案,其实现原理和技术效果类似,此处不再赘述。
本发明无线通信网络中设备配置的装置实施例四
其中,所述网络包括第一设备、第二设备及第四设备;其中,所述第一设备为配置器,所述第四设备为所述第一设备所配置的设备;所述第二设备为所述第一设备通过将所述第二设备的签名公钥发送至所述第四设备的方式,使得所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;所述装置为所述第三设备。
本实施例的装置的结构与图16所示的结构相同,同样也包括接收模块、处理模块及发送模块。其中,处理模块,用于在所述第二设备对所述第三设备进行配置之后,获得第一认证信息,所述第一认证信息包括所述第三设备的公钥及所述第三设备的公钥的签名;其中,所述第三设备的公钥的签名为所述第二设备根据所述第二设备的签名公钥对应的签名私钥及所述第三设备的公钥所确定并发送给所述第三设备的;发送模块,用于将所述第一认证信息发送至所述第四设备,以使所述第四设备根据所述第一认证信息对所述第三设备进行认证;接收模块,用于接收所述第四设备发送的第二认证信息,所述第二认证信息包括所述第四设备的公钥及所述第四设备的公钥的签名;处理模块,还用于根据所述第四设备的公钥、所述第四设备的公钥的签名及所述第一设备的签名公钥,对所述第四设备进行认证。
可选的,接收模块,还用于接收所述第二设备发送的所述第一设备的签名公钥。
本实施例的装置,可以用于执行图3、图4所示方法实施例第三设备侧的技术方案,其实现原理和技术效果类似,此处不再赘述。
本发明无线通信网络中设备配置的装置实施例五
其中,所述网络包括第一设备、第二设备及第四设备;其中,所述第一设备为配置器,所述第四设备为所述第一设备所配置的设备;所述第二设备为所述第一设备通过将所述第二设备的签名信息发送至所述第二设备的方式,使得所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;其中,所述第二设备的签名信息为所述第一设备根据 所述第一设备的签名私钥及所述第二设备的签名公钥所确定;所述第二设备的签名信息包括所述第二设备的签名公钥的签名,和/或,加密后的所述第二设备的签名公钥;所述装置为所述第四设备。
本实施例的装置的结构与图16所示的结构相同,同样也包括接收模块、处理模块及发送模块。其中,接收模块,用于在所述第二设备对所述第三设备进行配置之后,接收第一网络设备发送的第一认证信息,所述第一认证信息包括所述第三设备的公钥、所述第三设备的公钥的签名;其中,所述第三设备的公钥的签名为所述第二设备根据所述第二设备的签名公钥对应的签名私钥及所述第三设备的公钥所确定并发送给所述第三设备的;接收模块,还用于接收第二网络设备发送的配置器认证信息,所述配置器认证信息包括所述第二设备的签名信息及所述第二设备的签名公钥;处理模块,用于根据所述第二设备的签名信息、所述第一设备的签名公钥及所述第二设备的签名公钥,确定所述第二设备的签名公钥是否正确;若是,则根据所述第三设备的公钥、所述第三设备的公钥的签名及所述第二设备的签名公钥,对所述第三设备进行认证;发送模块,用于将第二认证信息发送至所述第三设备,以使所述第三设备根据所述第二认证信息对所述第四设备进行认证;其中,所述第二认证信息包括所述第四设备的公钥及所述第四设备的公钥的签名;
其中,所述第一网络设备为所述第二设备或所述第三设备,第二网络设备为所述第二设备或所述第三设备。
可选的,若所述第一设备为第五设备通过将所述第一设备的签名信息发送至所述第一设备的方式,使得所述第一设备成为能够对待配置设备进行配置的配置器,所述第五设备为配置器;则所述配置器认证信息,还包括:所述第一设备的签名信息及所述第一设备的签名公钥;
其中,所述第一设备的签名信息为所述第五设备根据所述第一设备的签名公钥及所述第五设备的签名私钥所确定;所述第一设备的签名信息包括所述第一设备的签名公钥的签名,和/或,加密后的所述第一设备的签名公钥;
相应的,处理模块根据所述第二设备的签名信息、所述第一设备的签名公钥及所述第二设备的签名公钥,确定所述第二设备的签名公钥是否正确,具体包括:
根据所述第一设备的签名信息、所述第一设备的签名公钥及所述第五设 备的签名公钥确定所述第一设备的签名公钥是否正确;若是则根据所述第二设备的签名信息、所述第一设备的签名公钥及所述第二设备的签名公钥,确定所述第二设备的签名公钥是否正确。
可选的,所述配置器认证信息还包括:顺序标识,所述顺序标识用于指示所述第四设备首先确定所述第一设备的签名公钥是否正确,再确定所述第二设备的签名公钥是否正确;
或者,所述配置器认证信息中所述第一设备的签名公钥及所述第二设备的签名公钥的先后顺序指示所述第四设备首先确定所述第一设备的签名公钥是否正确,再确定所述第二设备的签名公钥是否正确。
本实施例的装置,可以用于执行图5~图10所示方法实施例第四设备侧的技术方案,其实现原理和技术效果类似,此处不再赘述。
本发明无线通信网络中设备配置的装置实施例六
其中,所述网络包括第一设备、第二设备及第四设备;其中,所述第一设备为配置器,所述第四设备为所述第一设备所配置的设备;所述第二设备为所述第一设备通过将所述第二设备的签名信息发送至所述第二设备的方式,使得所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;其中,所述第二设备的签名信息为所述第一设备根据所述第一设备的签名私钥及所述第二设备的签名公钥所确定;所述第二设备的签名信息包括所述第二设备的签名公钥的签名,和/或,加密后的所述第二设备的签名公钥;所述装置为所述第四设备。
本实施例的装置的结构与图16所示的结构相同,同样也包括接收模块、处理模块及发送模块。其中,处理模块,用于在所述第二设备对所述第三设备进行配置之后,获得第一认证信息,所述第一认证信息包括所述第三设备的公钥及所述第三设备的公钥的签名;其中,所述第三设备的公钥的签名为所述第二设备根据所述第二设备的签名公钥对应的签名私钥及所述第三设备的公钥所确定并发送给所述第三设备的;发送模块,用于将所述第一认证信息发送至所述第四设备,以使所述第四设备根据所述第一认证信息对所述第三设备进行认证;接收模块,用于接收所述第四设备发送的第二认证信息,所述第二认证信息包括所述第四设备的公钥及所述第四设备的公钥的签名;处理模块,还用于根据所述第四设备的公钥、所述第四设备的公钥的签 名及所述第一设备的签名公钥,对所述第四设备进行认证。
可选的,所述发送模块还用于:将配置器认证信息发送至所述第四设备,所述配置器认证信息包括所述第二设备的签名信息及所述第二设备的签名公钥。
可选的,若所述第一设备为第五设备通过将所述第一设备的签名信息发送至所述第一设备的方式,使得所述第一设备成为能够对待配置设备进行配置的配置器,所述第五设备为配置器;则所述配置器认证信息,还包括:所述第一设备的签名信息及所述第一设备的签名公钥;
其中,所述第一设备的签名信息为所述第五设备根据所述第一设备的签名公钥及所述第五设备的签名私钥所确定;所述第一设备的签名信息包括所述第一设备的签名公钥的签名,和/或,加密后的所述第一设备的签名公钥。
可选的,所述配置器认证信息还包括:顺序标识,所述顺序标识用于指示所述第四设备首先确定所述第一设备的签名公钥是否正确,再确定所述第二设备的签名公钥是否正确;
或者,所述配置器认证信息中所述第一设备的签名公钥及所述第二设备的签名公钥的先后顺序指示所述第四设备首先确定所述第一设备的签名公钥是否正确,再确定所述第二设备的签名公钥是否正确。
可选的,所述接收模块,还用于接收所述第二设备发送的所述第一设备的签名公钥。
本实施例的装置,可以用于执行图5~图10所示方法实施例第三设备侧的技术方案,其实现原理和技术效果类似,此处不再赘述。
本发明无线通信网络中设备配置的装置实施例七
其中所述网络包括第一设备、第二设备和第四设备,所述第一设备、第二设备和第四设备属于同一组;所述第一设备为配置器;所述第四设备为所述第一设备所配置的设备;所述装置为所述第二设备。
本实施例的装置的结构与图16所示的结构相同,同样也包括接收模块、处理模块及发送模块。其中,接收模块,用于接收所述第一设备发送的所述第二设备所属组的组密钥;处理模块,用于根据所述组密钥对所述第二设备的签名公钥进行加密;发送模块,用于将加密后的所述第二设备的签名公钥发送至所述第四设备,以使所述第二设备成为能够对待配置设备进行配 置的配置器,所述待配置设备包括第三设备。
可选的,所述处理模块,还用于根据所述第二设备的签名私钥及所述第三设备的公钥,确定所述第三设备的公钥的签名;
所述发送模块,还用于将所述第三设备的公钥的签名发送至所述第三设备,以便所述第三设备向第四设备发送第一认证信息;
其中,所述第一认证信息包括所述第三设备的公钥及所述第三设备的公钥的签名,以使所述第四设备根据所述第一认证信息对所述第三设备进行认证。
可选的,所述接收模块,还用于接收所述第一设备发送的所述第一设备的签名公钥;
所述发送模块,还用于将所述第一设备的签名公钥发送至所述第三设备,以使所述第三设备根据所述第一设备的签名公钥对所述第四设备进行认证。
本实施例的装置,可以用于执行图11~图13所示方法实施例第二设备侧的技术方案,其实现原理和技术效果类似,此处不再赘述。
本发明还提供一种线通信网络中配置设备的系统,所述系统包括:无线通信网络中设备配置的装置实施例一所述的第一设备、无线通信网络中设备配置的装置实施例二所述的第二设备。
可选的,所述系统还可以包括:无线通信网络中设备配置的装置实施例三所述的第四设备及无线通信网络中设备配置的装置实施例四所述的第三设备;或者,所述系统还可以包括:无线通信网络中设备配置的装置实施例五所述的第四设备及无线通信网络中设备配置的装置实施例六所述的第三设备。
本实施例的系统,可以用于执行图1~图10所示方法实施例的技术方案,其实现原理和技术效果类似,此处不再赘述。
本发明还提供一种线通信网络中配置设备的系统,所述系统包括:第一设备及无线通信网络中设备配置的装置实施例七所述的第二设备。
本实施例的系统,可以用于执行图11~图13所示方法实施例的技术方案,其实现原理和技术效果类似,此处不再赘述。
图17为本发明无线通信网络中设备配置的装置实施例八的结构示意图;所述网络包括第一设备、第二设备和第四设备;其中,所述第一设备为配置 器,所述第四设备为所述第一设备所配置的设备;所述装置为所述第一设备,如图17所示,本实施例的装置可以包括:接收器1701和发送器1702。其中,接收器1701,用于接收所述第二设备发送的第一消息,所述第一消息包括所述第二设备的签名公钥;发送器1702,用于将所述第二设备的签名公钥发送至所述第四设备,以使所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备。
可选的,当所述网络为临近感知网络NAN时,发送器1702将所述第二设备的签名公钥发送至所述第四设备,具体包括:在发现窗口DW、或寻呼paging窗口、或管理窗口中将所述第二设备的签名公钥发送至所述第四设备。
可选的,发送器1702,还用于将所述第一设备的签名公钥发送至所述第二设备,以使所述第二设备将所述第一设备的签名公钥发送至所述第三设备,以便所述第三设备根据所述第一设备的签名公钥对所述第四设备进行认证。
本实施例的装置,可以用于执行图1、图3、图4、图10所示方法实施例第一设备侧的技术方案,其实现原理和技术效果类似,此处不再赘述。
图18为本发明无线通信网络中设备配置的装置实施例九的结构示意图;所述网络包括第一设备、第二设备和第四设备;其中,所述第一设备为配置器,所述第四设备为所述第一设备所配置的设备;所述装置为所述第一设备,如图18所示,本实施例的装置可以包括:接收器1801、处理器1802和发送器1803。其中,接收器1801,用于接收所述第二设备发送的第一消息,所述第一消息包括所述第二设备的签名公钥;处理器1802,用于根据所述第一设备的签名私钥及所述第二设备的签名公钥确定所述第二设备的签名信息;发送器1803,用于将所述第二设备的签名信息发送至所述第二设备,以使所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;其中,所述第二设备的签名信息包括所述第二设备的签名公钥的签名,和/或,加密后的所述第二设备的签名公钥。
可选的,当所述网络为临近感知网络NAN时,发送器1803将所述第二设备的签名公钥发送至所述第四设备,具体包括:在发现窗口DW、或寻呼paging窗口、或管理窗口中将所述第二设备的签名公钥发送至所述第四设备。
可选的,发送器1803,还用于将所述第一设备的签名公钥发送至所述第二设备,以使所述第二设备将所述第一设备的签名公钥发送至所述第三设备, 以便所述第三设备根据所述第一设备的签名公钥对所述第四设备进行认证。
本实施例的装置,可以用于执行图2、图5~图10所示方法实施例第一设备侧的技术方案,其实现原理和技术效果类似,此处不再赘述。
本发明无线通信网络中设备配置的装置实施例十
其中,所述网络包括第一设备、第二设备和第四设备;其中,所述第一设备为配置器,所述第四设备为所述第一设备所配置的设备;所述装置为所述第二设备。
本实施例的装置的结构与图18所示的结构类似。其中,发送器,用于将第一消息发送至所述第一设备,所述第一消息包括所述第二设备的签名公钥;其中,所述第一消息用于所述第一设备将所述第二设备的签名公钥发送至所述第四设备,以使所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备。
可选的,本实施例的装置还包括:处理器,用于根据所述第二设备的签名私钥及第三设备的公钥,确定所述第三设备的公钥的签名;
所述发送器,还用于将所述第三设备的公钥的签名发送至所述第三设备,以便所述第三设备向所述第四设备发送第一认证信息,和/或,用于将所述第一认证信息发送至所述第四设备;
其中,所述第一认证信息包括所述第三设备的公钥及所述第三设备的公钥的签名,以使所述第四设备根据所述第一认证信息对所述第三设备进行认证。
可选的,本实施例的装置还包括:接收器,用于接收所述第一设备发送的所述第一设备的签名公钥;
相应的,所述发送器还用于将所述第一设备的签名公钥发送至所述第三设备,以使所述第三设备根据所述第一设备的签名公钥对所述第四设备进行认证。
本实施例的装置,可以用于执行图1、图3、图4、图10所示方法实施例第二设备侧的技术方案,其实现原理和技术效果类似,此处不再赘述。
本发明无线通信网络中设备配置的装置实施例十一
其中,所述网络包括第一设备、第二设备和第四设备;其中,所述第一设备为配置器,所述第四设备为所述第一设备所配置的设备;所述装置为所 述第二设备。
本实施例的装置的结构与图18所示的结构类似。其中,发送器,用于将第一消息发送至所述第一设备,所述第一消息包括所述第二设备的签名公钥;其中,所述第一消息用于所述第一设备将所述第二设备的签名信息发送至所述第二设备,以使所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;接收器,用于接收所述第一设备发送的所述第二设备的签名信息;
其中,所述第二设备的签名信息包括所述第二设备的签名公钥的签名,和/或,加密后的所述第二设备的签名公钥,所述第二设备的签名信息为所述第一设备根据所述第一设备的签名私钥及所述第二设备的签名公钥所确定。
可选的,本实施例的装置还包括:处理器,用于根据所述第二设备的签名私钥及第三设备的公钥,确定所述第三设备的公钥的签名;
发送器,还用于将所述第三设备的公钥的签名发送至所述第三设备,以便所述第三设备向所述第四设备发送第一认证信息,和/或,用于将所述第一认证信息发送至所述第四设备;
其中,所述第一认证信息包括所述第三设备的公钥及所述第三设备的公钥的签名,以使所述第四设备根据所述第一认证信息对所述第三设备进行认证。
可选的,发送器,还用于:将所述第二设备的签名信息发送至所述第三设备;和/或,将配置器认证信息发送至所述第四设备,所述配置器认证信息包括所述第二设备的签名信息及所述第二设备的签名公钥。
可选的,接收器,还用于接收所述第一设备发送的所述第一设备的签名公钥;
相应的,发送器,还用于将所述第一设备的签名公钥发送至所述第三设备,以使所述第三设备根据所述第一设备的签名公钥对所述第四设备进行认证。
本实施例的装置,可以用于执行图2、图5~图10所示方法实施例第二设备侧的技术方案,其实现原理和技术效果类似,此处不再赘述。
本发明无线通信网络中设备配置的装置实施例十二
其中,所述网络包括第一设备、第二设备及第四设备;其中,所述第一 设备为配置器,所述第四设备为所述第一设备所配置的设备;所述第二设备为所述第一设备通过将所述第二设备的签名公钥发送至所述第四设备的方式,使得所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;所述装置为所述第四设备。
本实施例的装置的结构与图18所示的结构相同,同样也包括接收器、处理器及发送器。其中,接收器,用于在所述第二设备对待配置的所述第三设备进行配置之后,接收网络设备发送的第一认证信息,所述第一认证信息包括所述第三设备的公钥、所述第三设备的公钥的签名;其中,所述第三设备的公钥的签名为所述第二设备根据所述第二设备的签名公钥对应的签名私钥及所述第三设备的公钥所确定并发送给所述第三设备的;处理器,用于根据所述第三设备的公钥、所述第三设备的公钥的签名及所述第一设备发送的所述第二设备的签名公钥,对所述第三设备进行认证;发送器,用于将第二认证信息发送至所述第三设备,以使所述第三设备根据所述第二认证信息对所述第四设备进行认证;其中,所述第二认证信息包括所述第四设备的公钥及所述第四设备的公钥的签名;
其中,所述网络设备为所述第二设备或所述第三设备。
本实施例的装置,可以用于执行图3、图4所示方法实施例第四设备侧的技术方案,其实现原理和技术效果类似,此处不再赘述。
本发明无线通信网络中设备配置的装置实施例十三
其中,所述网络包括第一设备、第二设备及第四设备;其中,所述第一设备为配置器,所述第四设备为所述第一设备所配置的设备;所述第二设备为所述第一设备通过将所述第二设备的签名公钥发送至所述第四设备的方式,使得所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;所述装置为所述第三设备。
本实施例的装置的结构与图18所示的结构相同,同样也包括接收器、处理器及发送器。其中,处理器,用于在所述第二设备对所述第三设备进行配置之后,获得第一认证信息,所述第一认证信息包括所述第三设备的公钥及所述第三设备的公钥的签名;其中,所述第三设备的公钥的签名为所述第二设备根据所述第二设备的签名公钥对应的签名私钥及所述第三设备的公钥所确定并发送给所述第三设备的;发送器,用于将所述第一认证信息发送至 所述第四设备,以使所述第四设备根据所述第一认证信息对所述第三设备进行认证;接收器,用于接收所述第四设备发送的第二认证信息,所述第二认证信息包括所述第四设备的公钥及所述第四设备的公钥的签名;处理器,还用于根据所述第四设备的公钥、所述第四设备的公钥的签名及所述第一设备的签名公钥,对所述第四设备进行认证。
可选的,接收器,还用于接收所述第二设备发送的所述第一设备的签名公钥。
本实施例的装置,可以用于执行图3、图4所示方法实施例第三设备侧的技术方案,其实现原理和技术效果类似,此处不再赘述。
本发明无线通信网络中设备配置的装置实施例十四
其中,所述网络包括第一设备、第二设备及第四设备;其中,所述第一设备为配置器,所述第四设备为所述第一设备所配置的设备;所述第二设备为所述第一设备通过将所述第二设备的签名信息发送至所述第二设备的方式,使得所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;其中,所述第二设备的签名信息为所述第一设备根据所述第一设备的签名私钥及所述第二设备的签名公钥所确定;所述第二设备的签名信息包括所述第二设备的签名公钥的签名,和/或,加密后的所述第二设备的签名公钥;所述装置为所述第四设备。
本实施例的装置的结构与图18所示的结构相同,同样也包括接收器、处理器及发送器。其中,接收器,用于在所述第二设备对所述第三设备进行配置之后,接收第一网络设备发送的第一认证信息,所述第一认证信息包括所述第三设备的公钥、所述第三设备的公钥的签名;其中,所述第三设备的公钥的签名为所述第二设备根据所述第二设备的签名公钥对应的签名私钥及所述第三设备的公钥所确定并发送给所述第三设备的;接收器,还用于接收第二网络设备发送的配置器认证信息,所述配置器认证信息包括所述第二设备的签名信息及所述第二设备的签名公钥;处理器,用于根据所述第二设备的签名信息、所述第一设备的签名公钥及所述第二设备的签名公钥,确定所述第二设备的签名公钥是否正确;若是,则根据所述第三设备的公钥、所述第三设备的公钥的签名及所述第二设备的签名公钥,对所述第三设备进行认证;发送器,用于将第二认证信息发送至所述第三设备,以使所述第三设备 根据所述第二认证信息对所述第四设备进行认证;其中,所述第二认证信息包括所述第四设备的公钥及所述第四设备的公钥的签名;
其中,所述第一网络设备为所述第二设备或所述第三设备,第二网络设备为所述第二设备或所述第三设备。
可选的,若所述第一设备为第五设备通过将所述第一设备的签名信息发送至所述第一设备的方式,使得所述第一设备成为能够对待配置设备进行配置的配置器,所述第五设备为配置器;则所述配置器认证信息,还包括:所述第一设备的签名信息及所述第一设备的签名公钥;
其中,所述第一设备的签名信息为所述第五设备根据所述第一设备的签名公钥及所述第五设备的签名私钥所确定;所述第一设备的签名信息包括所述第一设备的签名公钥的签名,和/或,加密后的所述第一设备的签名公钥;
相应的,处理器根据所述第二设备的签名信息、所述第一设备的签名公钥及所述第二设备的签名公钥,确定所述第二设备的签名公钥是否正确,具体包括:
根据所述第一设备的签名信息、所述第一设备的签名公钥及所述第五设备的签名公钥确定所述第一设备的签名公钥是否正确;若是则根据所述第二设备的签名信息、所述第一设备的签名公钥及所述第二设备的签名公钥,确定所述第二设备的签名公钥是否正确。
可选的,所述配置器认证信息还包括:顺序标识,所述顺序标识用于指示所述第四设备首先确定所述第一设备的签名公钥是否正确,再确定所述第二设备的签名公钥是否正确;
或者,所述配置器认证信息中所述第一设备的签名公钥及所述第二设备的签名公钥的先后顺序指示所述第四设备首先确定所述第一设备的签名公钥是否正确,再确定所述第二设备的签名公钥是否正确。
本实施例的装置,可以用于执行图5~图10所示方法实施例第四设备侧的技术方案,其实现原理和技术效果类似,此处不再赘述。
本发明无线通信网络中设备配置的装置实施例十五
其中,所述网络包括第一设备、第二设备及第四设备;其中,所述第一设备为配置器,所述第四设备为所述第一设备所配置的设备;所述第二设备为所述第一设备通过将所述第二设备的签名信息发送至所述第二设备的方 式,使得所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;其中,所述第二设备的签名信息为所述第一设备根据所述第一设备的签名私钥及所述第二设备的签名公钥所确定;所述第二设备的签名信息包括所述第二设备的签名公钥的签名,和/或,加密后的所述第二设备的签名公钥;所述装置为所述第四设备。
本实施例的装置的结构与图18所示的结构相同,同样也包括接收器、处理器及发送器。其中,处理器,用于在所述第二设备对所述第三设备进行配置之后,获得第一认证信息,所述第一认证信息包括所述第三设备的公钥及所述第三设备的公钥的签名;其中,所述第三设备的公钥的签名为所述第二设备根据所述第二设备的签名公钥对应的签名私钥及所述第三设备的公钥所确定并发送给所述第三设备的;发送器,用于将所述第一认证信息发送至所述第四设备,以使所述第四设备根据所述第一认证信息对所述第三设备进行认证;接收器,用于接收所述第四设备发送的第二认证信息,所述第二认证信息包括所述第四设备的公钥及所述第四设备的公钥的签名;处理模块,还用于根据所述第四设备的公钥、所述第四设备的公钥的签名及所述第一设备的签名公钥,对所述第四设备进行认证。
可选的,所述发送器还用于:将配置器认证信息发送至所述第四设备,所述配置器认证信息包括所述第二设备的签名信息及所述第二设备的签名公钥。
可选的,若所述第一设备为第五设备通过将所述第一设备的签名信息发送至所述第一设备的方式,使得所述第一设备成为能够对待配置设备进行配置的配置器,所述第五设备为配置器;则所述配置器认证信息,还包括:所述第一设备的签名信息及所述第一设备的签名公钥;
其中,所述第一设备的签名信息为所述第五设备根据所述第一设备的签名公钥及所述第五设备的签名私钥所确定;所述第一设备的签名信息包括所述第一设备的签名公钥的签名,和/或,加密后的所述第一设备的签名公钥。
可选的,所述配置器认证信息还包括:顺序标识,所述顺序标识用于指示所述第四设备首先确定所述第一设备的签名公钥是否正确,再确定所述第二设备的签名公钥是否正确;
或者,所述配置器认证信息中所述第一设备的签名公钥及所述第二设备 的签名公钥的先后顺序指示所述第四设备首先确定所述第一设备的签名公钥是否正确,再确定所述第二设备的签名公钥是否正确。
可选的,所述接收器,还用于接收所述第二设备发送的所述第一设备的签名公钥。
本实施例的装置,可以用于执行图5~图10所示方法实施例第三设备侧的技术方案,其实现原理和技术效果类似,此处不再赘述。
本发明无线通信网络中设备配置的装置实施例十六
其中所述网络包括第一设备、第二设备和第四设备,所述第一设备、第二设备和第四设备属于同一组;所述第一设备为配置器;所述第四设备为所述第一设备所配置的设备;所述装置为所述第二设备。
本实施例的装置的结构与图18所示的结构相同,同样也包括接收器、处理器及发送器。其中,接收器,用于接收所述第一设备发送的所述第二设备所属组的组密钥;处理器,用于根据所述组密钥对所述第二设备的签名公钥进行加密;发送器,用于将加密后的所述第二设备的签名公钥发送至所述第四设备,以使所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备。
可选的,所述处理器,还用于根据所述第二设备的签名私钥及所述第三设备的公钥,确定所述第三设备的公钥的签名;
所述发送器,还用于将所述第三设备的公钥的签名发送至所述第三设备,以便所述第三设备向第四设备发送第一认证信息;
其中,所述第一认证信息包括所述第三设备的公钥及所述第三设备的公钥的签名,以使所述第四设备根据所述第一认证信息对所述第三设备进行认证。
可选的,所述接收器,还用于接收所述第一设备发送的所述第一设备的签名公钥;
所述发送器,还用于将所述第一设备的签名公钥发送至所述第三设备,以使所述第三设备根据所述第一设备的签名公钥对所述第四设备进行认证。
本实施例的装置,可以用于执行图11~图13所示方法实施例第二设备侧的技术方案,其实现原理和技术效果类似,此处不再赘述。
本领域普通技术人员可以理解:实现上述各方法实施例的全部或部分步 骤可以通过程序指令相关的硬件来完成。前述的程序可以存储于一计算机可读取存储介质中。该程序在执行时,执行包括上述各方法实施例的步骤;而前述的存储介质包括:ROM、RAM、磁碟或者光盘等各种可以存储程序代码的介质。
最后应说明的是:以上各实施例仅用以说明本发明的技术方案,而非对其限制;尽管参照前述各实施例对本发明进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分或者全部技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本发明各实施例技术方案的范围。

Claims (46)

  1. 一种无线通信网络中设备配置的方法,其特征在于,所述网络包括第一设备、第二设备和第四设备,所述第一设备为配置器;所述第四设备为所述第一设备所配置的设备;所述方法包括:
    所述第一设备接收所述第二设备发送的第一消息,所述第一消息包括所述第二设备的签名公钥;
    所述第一设备将所述第二设备的签名公钥发送至所述第四设备,以使所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;或者,
    所述第一设备将所述第二设备的签名信息发送至所述第二设备,以使所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;其中,所述第二设备的签名信息为所述第一设备根据所述第一设备的签名私钥及所述第二设备的签名公钥所确定,所述第二设备的签名信息包括所述第二设备的签名公钥的签名,和/或,加密后的所述第二设备的签名公钥。
  2. 根据权利要求1所述的方法,其特征在于,当所述网络为临近感知网络NAN时,所述第一设备将所述第二设备的签名公钥发送至所述第四设备,包括:
    所述第一设备在发现窗口DW、或寻呼paging窗口、或管理窗口中将所述第二设备的签名公钥发送至所述第四设备。
  3. 根据权利要求1或2所述的方法,其特征在于,所述方法还包括:
    所述第一设备将所述第一设备的签名公钥发送至所述第二设备,以使所述第二设备将所述第一设备的签名公钥发送至所述第三设备,以便所述第三设备根据所述第一设备的签名公钥对所述第四设备进行认证。
  4. 一种无线通信网络中设备配置的方法,其特征在于,所述网络包括第一设备、第二设备和第四设备;其中,所述第一设备为配置器,所述第四设备为所述第一设备所配置的设备;所述方法包括:
    所述第二设备将第一消息发送至所述第一设备,所述第一消息包括所述第二设备的签名公钥;
    所述第一消息用于所述第一设备将所述第二设备的签名公钥发送至所述 第四设备,以使所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;或者,所述第一消息用于所述第一设备将所述第二设备的签名信息发送至所述第二设备,以使所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;
    当所述第一消息用于所述第一设备将所述第二设备的签名信息发送至所述第二设备时,所述第二设备将第一消息发送至所述第一设备之后,还包括:
    所述第二设备接收所述第一设备发送的所述第二设备的签名信息;
    所述第二设备的签名信息包括所述第二设备的签名公钥的签名,和/或,加密后的所述第二设备的签名公钥,所述第二设备的签名信息为所述第一设备根据所述第一设备的签名私钥及所述第二设备的签名公钥所确定。
  5. 根据权利要求4所述的方法,其特征在于,所述第二设备将第一消息发送至所述第一设备之后,还包括:
    所述第二设备根据所述第二设备的签名私钥及所述第三设备的公钥,确定所述第三设备的公钥的签名;
    所述第二设备将所述第三设备的公钥的签名发送至所述第三设备,以便所述第三设备向所述第四设备发送第一认证信息;和/或,所述第二设备将所述第一认证信息发送至所述第四设备;
    其中,所述第一认证信息包括所述第三设备的公钥及所述第三设备的公钥的签名,以使所述第四设备根据所述第一认证信息对所述第三设备进行认证。
  6. 根据权利要求5所述的方法,其特征在于,所述方法还包括:
    所述第二设备将所述第二设备的签名信息发送至所述第三设备;和/或,
    所述第二设备将配置器认证信息发送至所述第四设备,所述配置器认证信息包括所述第二设备的签名信息及所述第二设备的签名公钥。
  7. 根据权利要求4-6任一项所述的方法,其特征在于,所述方法还包括:
    所述第二设备接收所述第一设备发送的所述第一设备的签名公钥;
    所述第二设备将所述第一设备的签名公钥发送至所述第三设备,以使所述第三设备根据所述第一设备的签名公钥对所述第四设备进行认证。
  8. 一种无线通信网络中设备配置的方法,其特征在于,所述网络包括第一设备、第二设备及第四设备;其中,所述第一设备为配置器,所述第四设 备为所述第一设备所配置的设备;所述第二设备为所述第一设备通过将所述第二设备的签名公钥发送至所述第四设备的方式,使得所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;所述方法包括:
    所述第四设备在所述第二设备对待配置的所述第三设备进行配置之后,接收网络设备发送的第一认证信息,所述第一认证信息包括所述第三设备的公钥、所述第三设备的公钥的签名;其中,所述第三设备的公钥的签名为所述第二设备根据所述第二设备的签名公钥对应的签名私钥及所述第三设备的公钥所确定并发送给所述第三设备的;
    所述第四设备根据所述第三设备的公钥、所述第三设备的公钥的签名及所述第一设备发送的所述第二设备的签名公钥,对所述第三设备进行认证;
    所述第四设备将第二认证信息发送至所述第三设备,以使所述第三设备根据所述第二认证信息对所述第四设备进行认证;其中,所述第二认证信息包括所述第四设备的公钥及所述第四设备的公钥的签名;
    其中,所述网络设备为所述第二设备或所述第三设备。
  9. 一种无线通信网络中设备配置的方法,其特征在于,所述无线通信网络包括第一设备、第二设备及第四设备;其中所述第一设备为配置器,所述第四设备为所述第一设备所配置的设备;所述第二设备为所述第一设备通过将所述第二设备的签名公钥发送至所述第四设备的方式,使得所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;所述方法包括:
    在所述第二设备对所述第三设备进行配置之后,所述第三设备获得第一认证信息,所述第一认证信息包括所述第三设备的公钥及所述第三设备的公钥的签名;其中,所述第三设备的公钥的签名为所述第二设备根据所述第二设备的签名公钥对应的签名私钥及所述第三设备的公钥所确定并发送给所述第三设备的;
    所述第三设备将所述第一认证信息发送至所述第四设备,以使所述第四设备根据所述第一认证信息对所述第三设备进行认证;
    所述第三设备接收所述第四设备发送的第二认证信息,所述第二认证信息包括所述第四设备的公钥及所述第四设备的公钥的签名;
    所述第三设备根据所述第四设备的公钥、所述第四设备的公钥的签名及所述第一设备的签名公钥,对所述第四设备进行认证。
  10. 根据权利要求9所述的方法,其特征在于,所述第三设备根据所述第四设备的公钥、所述第四设备的公钥的签名及所述第一设备的签名公钥,对所述第四设备进行认证之前,还包括:
    所述第三设备接收所述第二设备发送的所述第一设备的签名公钥。
  11. 一种无线通信网络中设备配置的方法,其特征在于,所述无线通信网络包括第一设备、第二设备及第四设备;其中所述第一设备为配置器,所述第四设备为所述第一设备所配置的设备;所述第二设备为所述第一设备通过将所述第二设备的签名信息发送至所述第二设备的方式,使得所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;其中,所述第二设备的签名信息为所述第一设备根据所述第一设备的签名私钥及所述第二设备的签名公钥所确定;所述第二设备的签名信息包括所述第二设备的签名公钥的签名,和/或,加密后的所述第二设备的签名公钥;所述方法包括:
    所述第四设备在所述第二设备对所述第三设备进行配置之后,接收第一网络设备发送的第一认证信息,所述第一认证信息包括所述第三设备的公钥、所述第三设备的公钥的签名;其中,所述第三设备的公钥的签名为所述第二设备根据所述第二设备的签名公钥对应的签名私钥及所述第三设备的公钥所确定并发送给所述第三设备的;
    所述第四设备接收第二网络设备发送的配置器认证信息,所述配置器认证信息包括所述第二设备的签名信息及所述第二设备的签名公钥;
    所述第四设备根据所述第二设备的签名信息、所述第一设备的签名公钥及所述第二设备的签名公钥,确定所述第二设备的签名公钥是否正确;
    若是,则根据所述第三设备的公钥、所述第三设备的公钥的签名及所述第二设备的签名公钥,对所述第三设备进行认证;
    所述第四设备将第二认证信息发送至所述第三设备,以使所述第三设备根据所述第二认证信息对所述第四设备进行认证;其中,所述第二认证信息包括所述第四设备的公钥及所述第四设备的公钥的签名;
    其中,所述第一网络设备为所述第二设备或所述第三设备,第二网络设 备为所述第二设备或所述第三设备。
  12. 根据权利要求11所述的方法,其特征在于,若所述第一设备为第五设备通过将所述第一设备的签名信息发送至所述第一设备的方式,使得所述第一设备成为能够对待配置设备进行配置的配置器,所述第五设备为配置器;则所述配置器认证信息,还包括:所述第一设备的签名信息及所述第一设备的签名公钥;
    其中,所述第一设备的签名信息为所述第五设备根据所述第一设备的签名公钥及所述第五设备的签名私钥所确定;所述第一设备的签名信息包括所述第一设备的签名公钥的签名,和/或,加密后的所述第一设备的签名公钥;
    相应的,所述第四设备根据所述第二设备的签名信息及所述第一设备的签名公钥,确定所述第二设备的签名公钥是否正确之前,还包括:
    所述第四设备根据所述第一设备的签名信息、所述第一设备的签名公钥及所述第五设备的签名公钥确定所述第一设备的签名公钥是否正确;若是则执行根据所述第二设备的签名信息、所述第一设备的签名公钥及所述第二设备的签名公钥,确定所述第二设备的签名公钥是否正确的步骤。
  13. 根据权利要求12所述的方法,其特征在于,所述配置器认证信息还包括:顺序标识,所述顺序标识用于指示所述第四设备首先确定所述第一设备的签名公钥是否正确,再确定所述第二设备的签名公钥是否正确;
    或者,所述配置器认证信息中所述第一设备的签名公钥及所述第二设备的签名公钥的先后顺序指示所述第四设备首先确定所述第一设备的签名公钥是否正确,再确定所述第二设备的签名公钥是否正确。
  14. 一种无线通信网络中设备配置的方法,其特征在于,所述无线通信网络包括第一设备、第二设备及第四设备;其中所述第一设备为配置器,所述第四设备为所述第一设备所配置的设备;所述第二设备为所述第一设备通过将所述第二设备的签名信息发送至所述第二设备的方式,使得所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;其中,所述第二设备的签名信息为所述第一设备根据所述第一设备的签名私钥及所述第二设备的签名公钥所确定;所述第二设备的签名信息包括所述第二设备的签名公钥的签名,和/或,加密后的所述第二设备的签名公钥;所述方法包括:
    在所述第二设备对所述第三设备进行配置之后,所述第三设备获得第一认证信息,所述第一认证信息包括所述第三设备的公钥及所述第三设备的公钥的签名;其中,所述第三设备的公钥的签名为所述第二设备根据所述第二设备的签名公钥对应的签名私钥及所述第三设备的公钥所确定并发送给所述第三设备的;
    所述第三设备将所述第一认证信息发送至所述第四设备,以使所述第四设备根据所述第一认证信息对所述第三设备进行认证;
    所述第三设备接收所述第四设备发送的第二认证信息,所述第二认证信息包括所述第四设备的公钥及所述第四设备的公钥的签名;
    所述第三设备根据所述第四设备的公钥、所述第四设备的公钥的签名及所述第一设备的签名公钥,对所述第四设备进行认证。
  15. 根据权利要求14所述的方法,其特征在于,所述方法还包括:
    所述第三设备将配置器认证信息发送至所述第四设备,所述配置器认证信息包括所述第二设备的签名信息及所述第二设备的签名公钥。
  16. 根据权利要求15所述的方法,其特征在于,若所述第一设备为第五设备通过将所述第一设备的签名信息发送至所述第一设备的方式,使得所述第一设备成为能够对待配置设备进行配置的配置器,所述第五设备为配置器;则所述配置器认证信息,还包括:所述第一设备的签名信息及所述第一设备的签名公钥;
    其中,所述第一设备的签名信息为所述第五设备根据所述第一设备的签名公钥及所述第五设备的签名私钥所确定;所述第一设备的签名信息包括所述第一设备的签名公钥的签名,和/或,加密后的所述第一设备的签名公钥。
  17. 根据权利要求16所述的方法,其特征在于,所述配置器认证信息还包括:顺序标识,所述顺序标识用于指示所述第四设备首先确定所述第一设备的签名公钥是否正确,再确定所述第二设备的签名公钥是否正确;
    或者,所述配置器认证信息中所述第一设备的签名公钥及所述第二设备的签名公钥的先后顺序指示所述第四设备首先确定所述第一设备的签名公钥是否正确,再确定所述第二设备的签名公钥是否正确。
  18. 根据权利要求14-17任一项所述的方法,其特征在于,所述第三设备根据所述第四设备的公钥、所述第四设备的公钥的签名及所述第一设备的 签名公钥,对所述第四设备进行认证之前,还包括:
    所述第三设备接收所述第二设备发送的所述第一设备的签名公钥。
  19. 一种无线通信网络中设备配置的方法,其特征在于,所述网络包括第一设备、第二设备和第四设备,所述第一设备、第二设备和第四设备属于同一组;所述第一设备为配置器;所述第四设备为所述第一设备所配置的设备;所述方法包括:
    所述第二设备接收所述第一设备发送的所述第二设备所属组的组密钥;
    所述第二设备根据所述组密钥对所述第二设备的签名公钥进行加密;
    所述第二设备将加密后的所述第二设备的签名公钥发送至所述第四设备,以使所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备。
  20. 根据权利要求19所述的方法,其特征在于,所述第二设备将加密后的所述第二设备的签名公钥发送至所述第四设备之后,还包括:
    所述第二设备根据所述第二设备的签名私钥及所述第三设备的公钥,确定所述第三设备的公钥的签名;
    所述第二设备将所述第三设备的公钥的签名发送至所述第三设备,以便所述第三设备向第四设备发送第一认证信息;
    其中,所述第一认证信息包括所述第三设备的公钥及所述第三设备的公钥的签名,以使所述第四设备根据所述第一认证信息对所述第三设备进行认证。
  21. 根据权利要求19或20所述的方法,其特征在于,所述方法还包括:
    所述第二设备接收所述第一设备发送的所述第一设备的签名公钥;
    所述第二设备将所述第一设备的签名公钥发送至所述第三设备,以使所述第三设备根据所述第一设备的签名公钥对所述第四设备进行认证。
  22. 一种无线通信网络中设备配置的装置,其特征在于,所述网络包括第一设备、第二设备和第四设备,所述第一设备为配置器;所述第四设备为所述第一设备所配置的设备;所述装置为所述第一设备,所述装置包括:
    接收模块,用于接收所述第二设备发送的第一消息,所述第一消息包括所述第二设备的签名公钥;
    发送模块,用于将所述第二设备的签名公钥发送至所述第四设备,以使 所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;或者,
    用于将所述第二设备的签名信息发送至所述第二设备,以使所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;其中,所述第二设备的签名信息为所述第一设备根据所述第一设备的签名私钥及所述第二设备的签名公钥所确定,所述第二设备的签名信息包括所述第二设备的签名公钥的签名,和/或,加密后的所述第二设备的签名公钥。
  23. 根据权利要求22所述的装置,其特征在于,当所述网络为临近感知网络NAN时,所述发送模块将所述第二设备的签名公钥发送至所述第四设备,具体包括:
    在发现窗口DW、或寻呼paging窗口、或管理窗口中将所述第二设备的签名公钥发送至所述第四设备。
  24. 根据权利要求22或23所述的装置,其特征在于,所述发送模块,还用于将所述第一设备的签名公钥发送至所述第二设备,以使所述第二设备将所述第一设备的签名公钥发送至所述第三设备,以便所述第三设备根据所述第一设备的签名公钥对所述第四设备进行认证。
  25. 一种无线通信网络中设备配置的装置,其特征在于,所述网络包括第一设备、第二设备和第四设备;其中,所述第一设备为配置器,所述第四设备为所述第一设备所配置的设备;所述装置为所述第二设备,所述装置包括:
    发送模块,用于将第一消息发送至所述第一设备,所述第一消息包括所述第二设备的签名公钥;
    所述第一消息用于所述第一设备将所述第二设备的签名公钥发送至所述第四设备,以使所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;或者,所述第一消息用于所述第一设备将所述第二设备的签名信息发送至所述第二设备,以使所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;
    当所述第一消息用于所述第一设备将所述第二设备的签名信息发送至所述第二设备时,所述装置还包括:
    第一接收模块,用于接收所述第一设备发送的所述第二设备的签名信息;
    所述第二设备的签名信息包括所述第二设备的签名公钥的签名,和/或,加密后的所述第二设备的签名公钥,所述第二设备的签名信息为所述第一设备根据所述第一设备的签名私钥及所述第二设备的签名公钥所确定。
  26. 根据权利要求25所述的装置,其特征在于,所述装置还包括:处理模块,用于根据所述第二设备的签名私钥及第三设备的公钥,确定所述第三设备的公钥的签名;
    所述发送模块,还用于将所述第三设备的公钥的签名发送至所述第三设备,以便所述第三设备向所述第四设备发送第一认证信息,和/或,用于将所述第一认证信息发送至所述第四设备;
    其中,所述第一认证信息包括所述第三设备的公钥及所述第三设备的公钥的签名,以使所述第四设备根据所述第一认证信息对所述第三设备进行认证。
  27. 根据权利要求26所述的装置,其特征在于,所述发送模块,还用于:
    将所述第二设备的签名信息发送至所述第三设备;和/或,
    将配置器认证信息发送至所述第四设备,所述配置器认证信息包括所述第二设备的签名信息及所述第二设备的签名公钥。
  28. 根据权利要求25-27任一项所述的装置,其特征在于,所述装置还包括:
    第二接收模块,用于接收所述第一设备发送的所述第一设备的签名公钥;
    所述发送模块,还用于将所述第一设备的签名公钥发送至所述第三设备,以使所述第三设备根据所述第一设备的签名公钥对所述第四设备进行认证。
  29. 一种无线通信网络中设备配置的装置,其特征在于,所述网络包括第一设备、第二设备及第四设备;其中,所述第一设备为配置器,所述第四设备为所述第一设备所配置的设备;所述第二设备为所述第一设备通过将所述第二设备的签名公钥发送至所述第四设备的方式,使得所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;所述装置为所述第四设备,所述装置包括:
    接收模块,用于在所述第二设备对待配置的所述第三设备进行配置之后,接收网络设备发送的第一认证信息,所述第一认证信息包括所述第三设备的公钥、所述第三设备的公钥的签名;其中,所述第三设备的公钥的签名为所 述第二设备根据所述第二设备的签名公钥对应的签名私钥及所述第三设备的公钥所确定并发送给所述第三设备的;
    处理模块,用于根据所述第三设备的公钥、所述第三设备的公钥的签名及所述第一设备发送的所述第二设备的签名公钥,对所述第三设备进行认证;
    发送模块,用于将第二认证信息发送至所述第三设备,以使所述第三设备根据所述第二认证信息对所述第四设备进行认证;其中,所述第二认证信息包括所述第四设备的公钥及所述第四设备的公钥的签名;
    其中,所述网络设备为所述第二设备或所述第三设备。
  30. 一种无线通信网络中设备配置的装置,其特征在于,所述无线通信网络包括第一设备、第二设备及第四设备;其中所述第一设备为配置器,所述第四设备为所述第一设备所配置的设备;所述第二设备为所述第一设备通过将所述第二设备的签名公钥发送至所述第四设备的方式,使得所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;所述装置为所述第三设备,所述装置包括:
    处理模块,用于在所述第二设备对所述第三设备进行配置之后,获得第一认证信息,所述第一认证信息包括所述第三设备的公钥及所述第三设备的公钥的签名;其中,所述第三设备的公钥的签名为所述第二设备根据所述第二设备的签名公钥对应的签名私钥及所述第三设备的公钥所确定并发送给所述第三设备的;
    发送模块,用于将所述第一认证信息发送至所述第四设备,以使所述第四设备根据所述第一认证信息对所述第三设备进行认证;
    接收模块,用于接收所述第四设备发送的第二认证信息,所述第二认证信息包括所述第四设备的公钥及所述第四设备的公钥的签名;
    所述处理模块,还用于根据所述第四设备的公钥、所述第四设备的公钥的签名及所述第一设备的签名公钥,对所述第四设备进行认证。
  31. 根据权利要求30所述的装置,其特征在于,所述接收模块,还用于接收所述第二设备发送的所述第一设备的签名公钥。
  32. 一种无线通信网络中设备配置的装置,其特征在于,所述无线通信网络包括第一设备、第二设备及第四设备;其中所述第一设备为配置器,所述第四设备为所述第一设备所配置的设备;所述第二设备为所述第一设备通 过将所述第二设备的签名信息发送至所述第二设备的方式,使得所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;其中,所述第二设备的签名信息为所述第一设备根据所述第一设备的签名私钥及所述第二设备的签名公钥所确定;所述第二设备的签名信息包括所述第二设备的签名公钥的签名,和/或,加密后的所述第二设备的签名公钥;所述装置为所述第四设备,所述装置包括:
    接收模块,用于在所述第二设备对所述第三设备进行配置之后,接收第一网络设备发送的第一认证信息,所述第一认证信息包括所述第三设备的公钥、所述第三设备的公钥的签名;其中,所述第三设备的公钥的签名为所述第二设备根据所述第二设备的签名公钥对应的签名私钥及所述第三设备的公钥所确定并发送给所述第三设备的;
    所述接收模块,还用于接收第二网络设备发送的配置器认证信息,所述配置器认证信息包括所述第二设备的签名信息及所述第二设备的签名公钥;
    处理模块,用于根据所述第二设备的签名信息、所述第一设备的签名公钥及所述第二设备的签名公钥,确定所述第二设备的签名公钥是否正确;若是,则根据所述第三设备的公钥、所述第三设备的公钥的签名及所述第二设备的签名公钥,对所述第三设备进行认证;
    发送模块,用于将第二认证信息发送至所述第三设备,以使所述第三设备根据所述第二认证信息对所述第四设备进行认证;其中,所述第二认证信息包括所述第四设备的公钥及所述第四设备的公钥的签名;
    其中,所述第一网络设备为所述第二设备或所述第三设备,第二网络设备为所述第二设备或所述第三设备。
  33. 根据权利要求32所述的装置,其特征在于,若所述第一设备为第五设备通过将所述第一设备的签名信息发送至所述第一设备的方式,使得所述第一设备成为能够对待配置设备进行配置的配置器,所述第五设备为配置器;则所述配置器认证信息,还包括:所述第一设备的签名信息及所述第一设备的签名公钥;
    其中,所述第一设备的签名信息为所述第五设备根据所述第一设备的签名公钥及所述第五设备的签名私钥所确定;所述第一设备的签名信息包括所述第一设备的签名公钥的签名,和/或,加密后的所述第一设备的签名公钥;
    相应的,所述处理模块根据所述第二设备的签名信息、所述第一设备的签名公钥及所述第二设备的签名公钥,确定所述第二设备的签名公钥是否正确,具体包括:
    根据所述第一设备的签名信息、所述第一设备的签名公钥及所述第五设备的签名公钥确定所述第一设备的签名公钥是否正确;若是则根据所述第二设备的签名信息、所述第一设备的签名公钥及所述第二设备的签名公钥,确定所述第二设备的签名公钥是否正确。
  34. 根据权利要求33所述的装置,其特征在于,所述配置器认证信息还包括:顺序标识,所述顺序标识用于指示所述第四设备首先确定所述第一设备的签名公钥是否正确,再确定所述第二设备的签名公钥是否正确;
    或者,所述配置器认证信息中所述第一设备的签名公钥及所述第二设备的签名公钥的先后顺序指示所述第四设备首先确定所述第一设备的签名公钥是否正确,再确定所述第二设备的签名公钥是否正确。
  35. 一种无线通信网络中设备配置的装置,其特征在于,所述无线通信网络包括第一设备、第二设备及第四设备;其中所述第一设备为配置器,所述第四设备为所述第一设备所配置的设备;所述第二设备为所述第一设备通过将所述第二设备的签名信息发送至所述第二设备的方式,使得所述第二设备成为能够对待配置设备进行配置的配置器,所述待配置设备包括第三设备;其中,所述第二设备的签名信息为所述第一设备根据所述第一设备的签名私钥及所述第二设备的签名公钥所确定;所述第二设备的签名信息包括所述第二设备的签名公钥的签名,和/或,加密后的所述第二设备的签名公钥;所述装置为所述第三设备,所述装置包括:
    处理模块,用于在所述第二设备对所述第三设备进行配置之后,获得第一认证信息,所述第一认证信息包括所述第三设备的公钥及所述第三设备的公钥的签名;其中,所述第三设备的公钥的签名为所述第二设备根据所述第二设备的签名公钥对应的签名私钥及所述第三设备的公钥所确定并发送给所述第三设备的;
    发送模块,用于将所述第一认证信息发送至所述第四设备,以使所述第四设备根据所述第一认证信息对所述第三设备进行认证;
    接收模块,用于接收所述第四设备发送的第二认证信息,所述第二认证 信息包括所述第四设备的公钥及所述第四设备的公钥的签名;
    所述处理模块,还用于根据所述第四设备的公钥、所述第四设备的公钥的签名及所述第一设备的签名公钥,对所述第四设备进行认证。
  36. 根据权利要求35所述的装置,其特征在于,所述发送模块还用于:
    将配置器认证信息发送至所述第四设备,所述配置器认证信息包括所述第二设备的签名信息及所述第二设备的签名公钥。
  37. 根据权利要求36所述的装置,其特征在于,若所述第一设备为第五设备通过将所述第一设备的签名信息发送至所述第一设备的方式,使得所述第一设备成为能够对待配置设备进行配置的配置器,所述第五设备为配置器;则所述配置器认证信息,还包括:所述第一设备的签名信息及所述第一设备的签名公钥;
    其中,所述第一设备的签名信息为所述第五设备根据所述第一设备的签名公钥及所述第五设备的签名私钥所确定;所述第一设备的签名信息包括所述第一设备的签名公钥的签名,和/或,加密后的所述第一设备的签名公钥。
  38. 根据权利要求37所述的装置,其特征在于,所述配置器认证信息还包括:顺序标识,所述顺序标识用于指示所述第四设备首先确定所述第一设备的签名公钥是否正确,再确定所述第二设备的签名公钥是否正确;
    或者,所述配置器认证信息中所述第一设备的签名公钥及所述第二设备的签名公钥的先后顺序指示所述第四设备首先确定所述第一设备的签名公钥是否正确,再确定所述第二设备的签名公钥是否正确。
  39. 根据权利要求35-38任一项所述的装置,其特征在于,所述接收模块,还用于接收所述第二设备发送的所述第一设备的签名公钥。
  40. 一种无线通信网络中设备配置的装置,其特征在于,所述网络包括第一设备、第二设备和第四设备,所述第一设备、第二设备和第四设备属于同一组;所述第一设备为配置器;所述第四设备为所述第一设备所配置的设备;所述装置为所述第二设备,所述装置包括:
    接收模块,用于接收所述第一设备发送的所述第二设备所属组的组密钥;
    处理模块,用于根据所述组密钥对所述第二设备的签名公钥进行加密;
    发送模块,用于将加密后的所述第二设备的签名公钥发送至所述第四设备,以使所述第二设备成为能够对待配置设备进行配置的配置器,所述待配 置设备包括第三设备。
  41. 根据权利要求40所述的装置,其特征在于,所述处理模块,还用于根据所述第二设备的签名私钥及所述第三设备的公钥,确定所述第三设备的公钥的签名;
    所述发送模块,还用于将所述第三设备的公钥的签名发送至所述第三设备,以便所述第三设备向第四设备发送第一认证信息;
    其中,所述第一认证信息包括所述第三设备的公钥及所述第三设备的公钥的签名,以使所述第四设备根据所述第一认证信息对所述第三设备进行认证。
  42. 根据权利要求40或41所述的装置,其特征在于,所述接收模块,还用于接收所述第一设备发送的所述第一设备的签名公钥;
    所述发送模块,还用于将所述第一设备的签名公钥发送至所述第三设备,以使所述第三设备根据所述第一设备的签名公钥对所述第四设备进行认证。
  43. 一种无线通信网络中配置设备的系统,其特征在于,包括:权利要求22~24任一项所述的第一设备、权利要求25~28任一项所述的第二设备。
  44. 根据权利要求43所述的系统,其特征在于,还包括:权利要求29所述的第四设备及权利要求30或31所述的第三设备。
  45. 根据权利要求43所述的系统,其特征在于,还包括:权利要求32-34任一项所述的第四设备及权利要求35~39任一项所述的第三设备。
  46. 一种无线通信网络中配置设备的系统,其特征在于,包括:第一设备、权利要求40-42任一项所述的第二设备。
PCT/CN2015/079965 2015-05-27 2015-05-27 无线通信网络中设备配置的方法、装置及系统 WO2016187850A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2015/079965 WO2016187850A1 (zh) 2015-05-27 2015-05-27 无线通信网络中设备配置的方法、装置及系统
CN201580039873.6A CN106664559B (zh) 2015-05-27 2015-05-27 无线通信网络中设备配置的方法、装置及系统

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2015/079965 WO2016187850A1 (zh) 2015-05-27 2015-05-27 无线通信网络中设备配置的方法、装置及系统

Publications (1)

Publication Number Publication Date
WO2016187850A1 true WO2016187850A1 (zh) 2016-12-01

Family

ID=57393427

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/079965 WO2016187850A1 (zh) 2015-05-27 2015-05-27 无线通信网络中设备配置的方法、装置及系统

Country Status (2)

Country Link
CN (1) CN106664559B (zh)
WO (1) WO2016187850A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115866597B (zh) * 2021-09-24 2024-06-25 青岛海尔科技有限公司 密码信息的发送方法和装置、存储介质及电子装置

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20110073910A (ko) * 2009-12-24 2011-06-30 삼성전기주식회사 무선 네트워크 접속 장치 및 방법
CN103812644A (zh) * 2012-11-09 2014-05-21 华为终端有限公司 一种信息配置方法、设备及系统
CN104219667A (zh) * 2013-05-31 2014-12-17 华为终端有限公司 用于建立连接的方法及设备
CN104349319A (zh) * 2013-08-01 2015-02-11 华为终端有限公司 一种用于配置多设备的方法、设备和系统

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030204748A1 (en) * 2002-04-30 2003-10-30 Tom Chiu Auto-detection of wireless network accessibility
US10771448B2 (en) * 2012-08-10 2020-09-08 Cryptography Research, Inc. Secure feature and key management in integrated circuits

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20110073910A (ko) * 2009-12-24 2011-06-30 삼성전기주식회사 무선 네트워크 접속 장치 및 방법
CN103812644A (zh) * 2012-11-09 2014-05-21 华为终端有限公司 一种信息配置方法、设备及系统
CN104219667A (zh) * 2013-05-31 2014-12-17 华为终端有限公司 用于建立连接的方法及设备
CN104349319A (zh) * 2013-08-01 2015-02-11 华为终端有限公司 一种用于配置多设备的方法、设备和系统

Also Published As

Publication number Publication date
CN106664559A (zh) 2017-05-10
CN106664559B (zh) 2019-11-29

Similar Documents

Publication Publication Date Title
US10003966B2 (en) Key configuration method and apparatus
CN108293185B (zh) 无线设备认证方法和装置
US10979412B2 (en) Methods and apparatus for secure device authentication
CN105723648B (zh) 一种密钥配置方法、系统和装置
US10305684B2 (en) Secure connection method for network device, related apparatus, and system
JP6406681B2 (ja) プレアソシエーションサービスディスカバリのためのシステムおよび方法
JP6203985B1 (ja) 認証証明のセキュアプロビジョニング
EP3308519B1 (en) System, apparatus and method for transferring ownership of a device from manufacturer to user using an embedded resource
EP3700124B1 (en) Security authentication method, configuration method, and related device
US20160360407A1 (en) Distributed configurator entity
WO2014180296A1 (zh) 一种设备之间建立连接的方法、配置设备和无线设备
JP2018532325A (ja) ユーザ機器ueのアクセス方法、アクセスデバイス、およびアクセスシステム
JP2021536157A (ja) 追跡に対するプライバシーを維持しながら無線セキュアリンクを確立する方法および装置
WO2023280194A1 (zh) 网络连接管理方法、装置、可读介质、程序产品及电子设备
EP3794852B1 (en) Secure methods and systems for identifying bluetooth connected devices with installed application
WO2014127751A1 (zh) 无线终端配置方法及装置和无线终端
WO2015100675A1 (zh) 一种网络配置方法、相关装置及系统
WO2016187850A1 (zh) 无线通信网络中设备配置的方法、装置及系统
WO2014100967A1 (zh) 一种ipsec协商的方法、装置、设备和系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15892931

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15892931

Country of ref document: EP

Kind code of ref document: A1