WO2022048125A1 - Information processing method and apparatus, device and storage medium - Google Patents

Information processing method and apparatus, device and storage medium Download PDF

Info

Publication number
WO2022048125A1
WO2022048125A1 PCT/CN2021/079365 CN2021079365W WO2022048125A1 WO 2022048125 A1 WO2022048125 A1 WO 2022048125A1 CN 2021079365 W CN2021079365 W CN 2021079365W WO 2022048125 A1 WO2022048125 A1 WO 2022048125A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
network
information
calculation parameter
access
Prior art date
Application number
PCT/CN2021/079365
Other languages
French (fr)
Chinese (zh)
Inventor
罗朝明
茹昭
Original Assignee
Oppo广东移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo广东移动通信有限公司 filed Critical Oppo广东移动通信有限公司
Priority to CN202180042424.2A priority Critical patent/CN115769542A/en
Publication of WO2022048125A1 publication Critical patent/WO2022048125A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Definitions

  • the embodiments of the present application relate to the field of communication technologies, and in particular, to an information processing method, apparatus, device, and storage medium.
  • Intelligent devices include devices, instruments, and machines with computing and processing capabilities.
  • a smart device for the first time or in the usage scenario of replacing the smart device (such as replacing the smart device from one network environment to another network environment)
  • the smart device is connected to the network, and then the smart device is controlled through the network.
  • the related art provides a variety of methods for configuring smart devices to access the network, mainly including: soft AP (Access Point, access point) distribution network (hereinafter referred to as "soft AP distribution network”) and scanning code distribution network.
  • soft AP distribution network The main process of soft AP distribution network is as follows: the smart device turns on the soft AP and broadcasts the soft AP's beacon; the distribution network device joins the soft AP after scanning the soft AP's beacon; The network device can send the network configuration information of the AP to be accessed to the smart device. After that, the smart device closes the soft AP and accesses the AP according to the network configuration information, thereby completing the network configuration process.
  • the main process of scanning the code to configure the network is as follows: the network configuration device displays the network configuration information of the AP that needs to be connected in the form of a QR code; the smart device scans the QR code displayed by the network configuration device to obtain the network configuration information, and then according to The network configuration information is connected to the AP to complete the network configuration process.
  • the above-mentioned network configuration process does not involve the identity authentication of the smart device, so it is very likely that a counterfeit smart device can obtain the network configuration information of the AP, which will lead to the leakage of the network configuration information of the AP, which will greatly affect the security of the AP. threat. Therefore, how to realize the identity authentication of the smart device to improve the security of the AP needs further discussion and research.
  • Embodiments of the present application provide an information processing method, apparatus, device, and storage medium.
  • the technical solution is as follows:
  • an embodiment of the present application provides an information processing method, which is applied to a device to be connected to a network, and the method includes:
  • the beacon includes key calculation parameters and/or the device identifier of the device to be connected to the network, and the key calculation parameter is used to determine the device to be connected to the network and the network distribution device The access key to perform authentication between.
  • an embodiment of the present application provides an information processing method, which is applied to a distribution network device, and the method includes:
  • the beacon includes a key calculation parameter and/or a device identifier of the device to be connected to the network, and the key calculation parameter is used to determine the relationship between the device to be connected to the network and the network distribution device The access key to perform authentication.
  • an embodiment of the present application provides an information processing method, which is applied to a device to be connected to a network, and the method includes:
  • a first graphic code is displayed, and the first graphic code includes a key calculation parameter and/or the device identification of the device to be connected to the network, and the key calculation parameter is used to determine the information decryption key, and the information decryption key is used to decrypt the network configuration information from the network configuration device, the network configuration information is used to configure the device to be connected to the network to access the second access point.
  • an embodiment of the present application provides an information processing method, which is applied to a distribution network device, and the method includes:
  • the first graphic code includes a key calculation parameter and/or the device identification of the device to be connected to the network, the key calculation parameter is used to determine the information encryption key, the information The encryption key is used to encrypt network configuration information, and the network configuration information is used to configure the device to be connected to the network to access the second access point.
  • an embodiment of the present application provides an information processing method, which is applied to a device to be connected to a network, and the method includes:
  • the network configuration information is used to configure the device to be connected to the network to access the second access point
  • the key calculation parameter is used to determine an information decryption key
  • the information decryption key is used to decrypt the adoption information Encryption key encrypted network configuration information.
  • an embodiment of the present application provides an information processing method, which is applied to a distribution network device, and the method includes:
  • the third graphic code includes network configuration information and key calculation parameters encrypted with an information encryption key
  • the network configuration information is used to configure the device to be connected to the network to access the second access point
  • the key calculation parameter is used to determine the information decryption key
  • the information decryption key is used to decrypt the information encryption key using the information encryption key. key-encrypted network configuration information.
  • an embodiment of the present application provides an information processing method, which is applied to a device to be connected to a network, and the method includes:
  • First information from the distribution network device is received, where the first information includes a key calculation parameter, and the key calculation parameter is used to determine the first information key.
  • an embodiment of the present application provides an information processing method, which is applied to a distribution network device, and the method includes:
  • an embodiment of the present application provides an information processing apparatus, which is set in a device to be connected to a network, and the apparatus includes:
  • a beacon broadcasting module configured to broadcast a beacon of the first access point, the beacon includes a key calculation parameter and/or a device identifier of the device to be connected to the network, and the key calculation parameter is used to determine the The access key for performing identity authentication between the device to be connected to the network and the device to be deployed on the network.
  • an embodiment of the present application provides an information processing apparatus, which is set in a distribution network device, and the apparatus includes:
  • a beacon receiving module configured to receive a beacon of the first access point, the beacon includes a key calculation parameter and/or a device identifier of the device to be connected to the network, and the key calculation parameter is used to determine the device to be connected to the network and the device identifier of the device to be accessed.
  • the access key for performing identity authentication between the distribution network devices.
  • an embodiment of the present application provides an information processing apparatus, which is set in a device to be connected to a network, and the apparatus includes:
  • a first display module configured to display a first graphic code, where the first graphic code includes a key calculation parameter and/or a device identifier of the device to be connected to the network, and the key calculation parameter is used to determine an information decryption key,
  • the information decryption key is used to decrypt the network configuration information from the network configuration device, and the network configuration information is used to configure the device to be connected to the network to access the second access point.
  • an embodiment of the present application provides an information processing apparatus, which is set in a distribution network device, and the apparatus includes:
  • the second scanning module is used to scan the first graphic code of the device to be connected to the network, where the first graphic code includes a key calculation parameter and/or a device identifier of the device to be connected to the network, and the key calculation parameter is used to determine information An encryption key, where the information encryption key is used to encrypt network configuration information, and the network configuration information is used to configure the device to be connected to the network to access the second access point.
  • an embodiment of the present application provides an information processing apparatus, which is set in a device to be connected to a network, and the apparatus includes:
  • a third scanning module configured to scan a third graphic code displayed by the network distribution device, where the third graphic code includes network configuration information and key calculation parameters encrypted with an information encryption key;
  • the network configuration information is used to configure the device to be connected to the network to access the second access point
  • the key calculation parameter is used to determine an information decryption key
  • the information decryption key is used to decrypt the adoption information Encryption key encrypted network configuration information.
  • an embodiment of the present application provides an information processing apparatus, which is set in a distribution network device, and the apparatus includes:
  • a third display module configured to display a third graphic code, where the third graphic code includes network configuration information and key calculation parameters encrypted with an information encryption key;
  • the network configuration information is used to configure the device to be connected to the network to access the second access point
  • the key calculation parameter is used to determine the information decryption key
  • the information decryption key is used to decrypt the information encryption key using the information encryption key. key-encrypted network configuration information.
  • an embodiment of the present application provides an information processing apparatus, which is set in a device to be connected to a network, and the apparatus includes:
  • the first receiving module is configured to receive first information from the distribution network device, where the first information includes a key calculation parameter, and the key calculation parameter is used to determine the first information key.
  • an embodiment of the present application provides an information processing apparatus, which is set in a distribution network device, and the apparatus includes:
  • the first sending module is configured to send first information to the device to be connected to the network, where the first information includes a key calculation parameter, and the key calculation parameter is used to determine the first information key.
  • an embodiment of the present application provides a device to be connected to a network, where the device to be connected to a network includes: a processor, and a transceiver connected to the processor; wherein:
  • the transceiver is used to broadcast a beacon of the first access point, the beacon includes a key calculation parameter and/or a device identifier of the device to be connected to the network, and the key calculation parameter is used to determine the The access key for performing identity authentication between the device to be connected to the network and the device to be deployed on the network.
  • an embodiment of the present application provides a network distribution device, where the network distribution device includes: a processor, and a transceiver connected to the processor; wherein:
  • the transceiver is configured to receive a beacon of the first access point, the beacon includes a key calculation parameter and/or a device identifier of the device to be connected to the network, and the key calculation parameter is used to determine the device to be connected to the network and the device ID of the device to be connected to the network.
  • the access key for performing identity authentication between the distribution network devices.
  • an embodiment of the present application provides a device to be connected to a network, and the device to be connected to a network includes: a processor, and a transceiver connected to the processor; wherein:
  • the processor is configured to display a first graphic code, where the first graphic code includes a key calculation parameter and/or a device identifier of the device to be connected to the network, and the key calculation parameter is used to determine an information decryption key,
  • the information decryption key is used to decrypt the network configuration information from the network configuration device, and the network configuration information is used to configure the device to be connected to the network to access the second access point.
  • an embodiment of the present application provides a network distribution device, where the network distribution device includes: a processor, and a transceiver connected to the processor; wherein:
  • the processor is configured to scan the first graphic code of the device to be connected to the network, where the first graphic code includes a key calculation parameter and/or a device identifier of the device to be connected to the network, and the key calculation parameter is used to determine information An encryption key, where the information encryption key is used to encrypt network configuration information, and the network configuration information is used to configure the device to be connected to the network to access the second access point.
  • an embodiment of the present application provides a device to be connected to a network, and the device to be connected to a network includes: a processor, and a transceiver connected to the processor; wherein:
  • the processor is configured to scan a third graphic code displayed by the network distribution device, where the third graphic code includes network configuration information and key calculation parameters encrypted with an information encryption key;
  • the network configuration information is used to configure the device to be connected to the network to access the second access point
  • the key calculation parameter is used to determine an information decryption key
  • the information decryption key is used to decrypt the adoption information Encryption key encrypted network configuration information.
  • an embodiment of the present application provides a network distribution device, where the network distribution device includes: a processor, and a transceiver connected to the processor; wherein:
  • the processor configured to display a third graphic code, where the third graphic code includes network configuration information and key calculation parameters encrypted with an information encryption key;
  • the network configuration information is used to configure the device to be connected to the network to access the second access point
  • the key calculation parameter is used to determine the information decryption key
  • the information decryption key is used to decrypt the information encryption key using the information encryption key. key-encrypted network configuration information.
  • an embodiment of the present application provides a device to be connected to a network, and the device to be connected to a network includes: a processor, and a transceiver connected to the processor; wherein:
  • the transceiver is configured to receive first information from a distribution network device, where the first information includes a key calculation parameter, and the key calculation parameter is used to determine the first information key.
  • an embodiment of the present application provides a network distribution device, where the network distribution device includes: a processor, and a transceiver connected to the processor; wherein:
  • the transceiver is configured to send first information to the device to be connected to the network, where the first information includes a key calculation parameter, and the key calculation parameter is used to determine the first information key.
  • an embodiment of the present application provides a computer-readable storage medium, where a computer program is stored in the storage medium, and the computer program is used to be executed by a processor of a device to be connected to the network, so as to implement the device to be connected to the network as described above. side information processing methods.
  • an embodiment of the present application provides a computer-readable storage medium, where a computer program is stored in the storage medium, and the computer program is used to be executed by a processor of a network distribution device, so as to realize the above-mentioned network distribution device side information processing methods.
  • an embodiment of the present application provides a chip, where the chip includes a programmable logic circuit and/or program instructions, and when the chip runs on the device to be connected to the network, it is used to implement the above-mentioned device to be connected to the network side.
  • Information processing method when the chip runs on the device to be connected to the network, it is used to implement the above-mentioned device to be connected to the network side.
  • an embodiment of the present application provides a chip, the chip includes a programmable logic circuit and/or program instructions, and when the chip runs on a distribution network device, it is used to implement the above-mentioned configuration on the distribution network device side.
  • Information processing method when the chip runs on a distribution network device, it is used to implement the above-mentioned configuration on the distribution network device side.
  • an embodiment of the present application provides a computer program product, which is used to implement the above-mentioned information processing method on the device to be connected to the network when the computer program product runs on the device to be connected to the network.
  • an embodiment of the present application provides a computer program product, which is used to implement the information processing method on the side of the distribution network device as described above when the computer program product runs on the distribution network device.
  • FIG. 1 is a schematic diagram of a distribution network system provided by an embodiment of the present application.
  • Fig. 2 is the flow chart of soft AP distribution network provided by an embodiment of the present application.
  • FIG. 3 is a flowchart of a scanning code distribution network provided by an embodiment of the present application.
  • FIG. 4 is a flowchart of security authentication provided by an embodiment of the present application.
  • FIG. 6 is a flowchart of a method for determining an access key provided by an embodiment of the present application.
  • FIG. 9 is a flowchart of a method for determining an information decryption key and an information encryption key provided by an embodiment of the present application.
  • FIG. 10 is a flowchart of an information processing method coupled with a network distribution process provided by an embodiment of the present application
  • FIG. 11 is a flowchart of an information processing method decoupled from a distribution network process provided by an embodiment of the present application
  • FIG. 13 is a flowchart of an information processing method provided by another embodiment of the present application.
  • FIG. 14 is a flowchart of a method for determining an information decryption key and an information encryption key provided by another embodiment of the present application;
  • 17 is a flowchart of a method for determining an information decryption key and an information encryption key provided by yet another embodiment of the present application;
  • FIG. 19 is a block diagram of an information processing apparatus provided by an embodiment of the present application.
  • 20 is a block diagram of an information processing apparatus provided by another embodiment of the present application.
  • 21 is a block diagram of an information processing apparatus provided by another embodiment of the present application.
  • 22 is a block diagram of an information processing apparatus provided by another embodiment of the present application.
  • FIG. 23 is a block diagram of an information processing apparatus provided by still another embodiment of the present application.
  • 24 is a block diagram of an information processing apparatus provided by still another embodiment of the present application.
  • 25 is a block diagram of an information processing apparatus provided by still another embodiment of the present application.
  • FIG. 26 is a block diagram of an information processing apparatus provided by still another embodiment of the present application.
  • FIG. 27 is a block diagram of an information processing apparatus provided by still another embodiment of the present application.
  • FIG. 29 is a block diagram of an information processing apparatus provided by still another embodiment of the present application.
  • FIG. 30 is a block diagram of an information processing apparatus provided by still another embodiment of the present application.
  • FIG. 31 is a block diagram of an information processing apparatus provided by still another embodiment of the present application.
  • 32 is a block diagram of an information processing apparatus provided by another embodiment of the present application.
  • 33 is a block diagram of an information processing apparatus provided by another embodiment of the present application.
  • 35 is a schematic structural diagram of a device to be connected to a network provided by an embodiment of the present application.
  • FIG. 36 is a schematic structural diagram of a distribution network device provided by an embodiment of the present application.
  • FIG. 1 shows a schematic diagram of a network distribution system provided by an embodiment of the present application.
  • the network distribution system may include: a device to be connected to a network 110 and a network distribution device 120 .
  • the device 110 to be connected to the network refers to a device with network access capability, for example, a device with WiFi (Wireless Fidelity, wireless fidelity) access capability.
  • the device 110 to be connected to the network is a smart device (such as VR (Virtual Reality, virtual reality) glasses, a smart wearable device, etc.), a terminal device, or other device with network access capability, which is not made in this embodiment of the present application. limited.
  • the device 110 to be connected to the network may be a smart TV, a smart speaker, a smart air conditioner, a smart lamp, a smart door and window, a smart curtain, and a smart socket. and other smart home devices.
  • there is one device 110 to be connected to the network or there are multiple devices 110 to be connected to the network, which is not limited in this embodiment of the present application. Determine the maximum number of devices that can be managed, etc.
  • the network distribution device 120 refers to a device capable of configuring network access.
  • the network distribution device 120 may be a server, terminal device, router, terminal device, mobile phone, tablet computer, wearable device, or other devices capable of configuring network access.
  • this embodiment of the present application does not limit this.
  • the implementation form of the distribution network device 120 may be determined in combination with the application scenario of the distribution network system. In an example, as shown in FIG. 1 , when the distribution network system is applied to smart home life, considering that the home environment has the characteristics of small area and frequent activities, the use of distribution network equipment 120 that occupies a large space will affect the normal operation.
  • the distribution network device 120 can be implemented as a router, a terminal device, a mobile phone, a tablet computer, a wearable device, and the like.
  • the number of distribution network devices corresponding to the distribution network system may be one or multiple, which is not limited in this embodiment of the present application.
  • the network distribution devices corresponding to different distribution network systems are different, so that the device 110 to be connected to the network corresponding to a certain distribution network system is bound to the network distribution device 120 under the distribution network system.
  • the network system is implemented as a smart home life, taking the family as a unit, the devices to be connected to the network in a certain family are bound to the distribution network devices of the family.
  • the network configuration device 120 can configure the device 110 to be connected to the network to access the AP, that is, configure the device to be connected to the network 110 to access the network.
  • the network access device 110 there are mainly two ways to configure the network access device 110 to be connected to the network: soft AP network configuration and code scanning configuration network. In the following, the two network distribution methods are introduced and explained respectively.
  • FIG. 2 shows a flowchart of a soft AP network configuration provided by an embodiment of the present application.
  • the process of soft AP network configuration mainly includes the following steps:
  • Step 210 the device to be connected to the network starts the soft AP and broadcasts the beacon of the soft AP.
  • the device to be connected to the network can start the soft AP when it enters the network distribution mode. After the device to be connected to the network starts the soft AP, it can broadcast the beacon of the soft AP.
  • the beacon of the soft AP includes at least one of the following contents: the device ID (Identifier, identification) of the device to be connected to the network, a user-defined network name , the protocol name of the application protocol, etc.
  • the device ID may be the MAC (Media Access Control Address, media access control) address of the device to be connected to the network.
  • the beacon of the soft AP includes at least one of the following fields: a BSSID (Basic Service Set Identifier, basic service set identifier) field, an SSID (Service Set Identifier, service set identifier) field, and a vendor specific (Vendor Specific) field.
  • BSSID Basic Service Set Identifier, basic service set identifier
  • SSID Service Set Identifier, service set identifier
  • vendor specific Vendor Specific
  • Step 220 when the network configuration device scans the beacon of the soft AP, it joins the soft AP.
  • the distribution network device can scan the beacons broadcast by other devices on different channels.
  • the distribution network device scans the beacon of the soft AP on the channel where the device to be connected broadcasts the beacon of the soft AP, it can join the soft AP.
  • the network configuration device confirms whether the SSID field in the beacon conforms to the preset format, and adds it to the soft AP if the SSID field conforms to the preset format.
  • Step 230 Establish a communication connection between the network distribution device and the device to be connected to the network.
  • the network distribution device can establish a communication connection with the device to be connected through the soft AP.
  • the communication between the network distribution equipment and the equipment to be connected to the network satisfies the TCP (Transmission Control Protocol, Transmission Control Protocol) protocol, and thus, the communication connection between the network distribution equipment and the equipment to be connected to the network can also be referred to as a TCP connection; or , the communication between the network distribution device and the device to be connected to the network satisfies the UDP (User Datagram Protocol) protocol, so the communication connection between the distribution network device and the device to be connected to the network can also be called a UDP connection.
  • TCP Transmission Control Protocol, Transmission Control Protocol
  • UDP User Datagram Protocol
  • Step 240 The network distribution device sends an information acquisition request to the device to be connected to the network.
  • the information acquisition request is used to request to acquire information about APs that can be accessed by the device to be connected to the network.
  • the information acquisition request is used to request to acquire the SSID field of the AP that the device to access can access and/or the signal strength of the AP that can be accessed.
  • the device to be connected may scan the AP's beacon according to a certain period (for example, 10 seconds), and determine whether it can access the AP according to the SSID field in the beacon.
  • step 250 the device to be connected to the network sends the information of the accessible AP to the network distribution device.
  • the device to be connected to the network After receiving the information acquisition request, the device to be connected to the network, in response to the information acquisition request, sends information about APs that can be accessed by the device to be connected to the network to the network distribution device, so as to access the AP information.
  • the accessible AP information includes at least one of the following: the SSID field of the accessible AP, and the signal strength of the accessible AP.
  • Step 260 The network configuration device sends network configuration information to the device to be connected to the network.
  • the network distribution device can select the AP to be accessed by the device to be connected to the network according to the information of the accessible APs.
  • This embodiment of the present application does not limit the manner in which the network configuration device selects the AP to be accessed by the network access device.
  • the network configuration device determines the AP with the highest signal strength indicated by the accessible AP information as the AP to be accessed by the network access device. . After the network configuration device selects the AP to be accessed by the device to be connected to the network, it can send network configuration information to the device to be connected to the network to configure the device to be connected to the selected AP.
  • the network configuration information includes at least one of the following: the SSID field of the AP to be accessed by the device to be connected to the network, and the authentication information of the AP to be accessed by the device to be connected to the network.
  • the authentication information of the AP to be accessed by the device to be connected to the network includes the password of the AP to be accessed by the device to be connected to the network.
  • Step 270 The device to be connected to the network sends a configuration response message to the network configuration device.
  • the configuration response message is used to respond to the network configuration information sent by the network configuration device, so as to indicate to the network configuration device whether the device to be connected to the network has received the network configuration information.
  • the network configuration device receives the network configuration information by default after sending the network configuration information to the device to be connected to the network. In the case that the device to be connected to the network successfully receives the network configuration information, it may not send the configuration information to the network configuration device.
  • Response message if the device to be connected to the network fails to receive the network configuration information successfully, such as the device to be connected to the network cannot parse the network configuration information, it can send a configuration response message to the network configuration device.
  • Step 280 the network configuration device cancels access to the soft AP.
  • the network configuration device After the network configuration device sends the network configuration information to the device to be connected to the network, it can disconnect the connection with the soft AP started by the device to be connected to the network, that is, cancel the access to the soft AP.
  • the distribution network device cancels access to the soft AP after sending the network configuration information; or, after receiving the configuration response message, the distribution network device cancels access to the soft AP, and the embodiment of the present application cancels access to the distribution network device.
  • the timing of soft AP is not limited.
  • Step 290 the device to be connected to the network closes the soft AP.
  • the device to be connected to the network Since the device to be connected to the network usually cannot access two APs at the same time, the device to be connected to the network needs to close the soft AP to access the AP indicated by the network configuration information.
  • the device to be connected to the network closes the soft AP; or, the device to be connected to the network closes the soft AP after sending a configuration response message to the distribution network device; After entering the soft AP, the soft AP is closed.
  • the embodiment of the present application does not limit the timing of closing the soft AP for the device to be connected to the network.
  • the device to be connected to the network cancels access to the soft AP, it can access the AP indicated by the network configuration information according to the authentication information in the network configuration information.
  • the network distribution device cancels access to the soft AP, in order to continue to control and manage the device to be connected to the network, it can also access the AP indicated by the network configuration information. Therefore, the network distribution device and the device to be connected to the network establish a communication connection through the access AP.
  • FIG. 3 shows a flowchart of a scanning code distribution network provided by an embodiment of the present application.
  • the process of scanning code distribution network mainly includes the following steps:
  • Step 310 the network distribution device scans the two-dimensional code of the device to be connected to the network.
  • the device to be connected to the network can display the QR code on its screen; if the device to be connected to the network does not have the function of screen display, the device manufacturer of the device to be connected to the network can leave the factory of the device to be connected to the network , paste the QR code on the device to be connected to the network.
  • the two-dimensional code of the device to be connected to the network indicates the device information of the device to be connected to the network.
  • the device information includes at least one of the following: the device type of the device to be connected to the network, and the device public key.
  • the network distribution device scans the QR code of the device to be connected to the network to obtain the device information of the device to be connected to the network.
  • Step 320 the network distribution device generates a two-dimensional code according to the network configuration information and displays the two-dimensional code.
  • the network configuration device can determine the AP to be accessed by the device to be connected to the network, and determine the network configuration information corresponding to the AP.
  • the network configuration information includes at least one of the following: the SSID field of the AP to be accessed by the device to be connected to the network, the device to be connected to the network.
  • Authentication information of the access AP is the authentication information of the AP to be accessed by the device to be connected to the network.
  • the authentication information of the AP to be accessed by the device to be connected to the network includes the password of the AP to be accessed by the device to be connected to the network.
  • the network distribution device can encrypt the network configuration information according to the device public key of the device to be connected to the network obtained by scanning, and generate a two-dimensional code according to the encrypted network configuration information for the device to be connected to the network to scan.
  • Step 330 the device to be connected to the network scans the two-dimensional code provided by the network distribution device to obtain network configuration information.
  • the device to be connected to the network scans the QR code provided by the distribution device to obtain the network configuration information provided by the distribution device. Since the two-dimensional code provided by the network distribution device is generated by encrypting the network configuration information with the device public key of the device to be connected to the network, after the device to be connected to the network scans the two-dimensional code provided by the network distribution device, it obtains the encrypted network configuration information. It uses the device public key to decrypt to obtain the network configuration information.
  • Step 340 the device to be connected to the network accesses the AP.
  • the AP indicated by the network configuration information can be accessed according to the authentication information of the AP obtained by scanning. After the network access device accesses the AP, it can further access the cloud platform for authentication and so on.
  • the above network distribution process does not involve the identity authentication of the smart device, so it is very likely that a counterfeit smart device can obtain the network configuration information of the AP, resulting in the leakage of the network configuration information of the AP.
  • AP security poses a great threat.
  • the network distribution device if it is necessary to verify the identity of the network access device during the soft AP network distribution process, the network distribution device needs to be used as a proxy service, that is, the network distribution device is connected to the network device to start.
  • a soft AP obtain the device certificate of the device to be connected to the network; after that, the network configuration device switches from the soft AP to the AP that the device to be connected to accesses to connect to the cloud service, and forwards the device certificate of the device to be connected to the cloud service.
  • the verification result is fed back to the distribution network device; then, the distribution network device needs to switch from the AP to be accessed by the device to be connected back to the soft AP, and then set the network configuration information of the AP to be accessed by the device to be connected to the network (such as SSID and password, etc.). It can be seen that this process requires network distribution equipment to switch back and forth between different access points, which is cumbersome and inefficient.
  • the embodiments of the present application provide an information processing method, which can be used to solve the above technical problems.
  • the technical solutions of the present application will be described with reference to several embodiments.
  • the embodiment of the present application adopts a 4-way handshake (Sample 4-way handshake) process for security authentication, wherein:
  • Authenticator authentication party
  • EAPOL Extensible Authentication Protocol, Extended Authentication Protocol
  • ANonce random number generated by AP
  • Supplicant requester
  • the Supplicant sends the EAPOL-Key carrying the SNonce (a random number generated by the STA) and other information to the Authenticator. Among them, after receiving the ANonce, the Supplicant can calculate the PTK (Pairwise Transient Key, paired temporary key) according to the ANonce.
  • the calculation formula of the PTK is as follows:
  • PTK PRF-Length(PMK,”Pairwise key expansion",Min(AA,SPA)
  • the Authenticator After the Authenticator receives the SNonce, it can generate a PTK, and compare the received MIC with the MIC generated by itself for integrity verification. If the verification fails, the handshake fails.
  • Message 3 (Message 3 in the 4-way handshake): The Authenticator sends an EAPOL-Key carrying GTK (Group Transient Key, group temporary key) and MIC (Message Integrity Code, message integrity check code) to Supplicant.
  • GTK Group Transient Key, group temporary key
  • MIC Message Integrity Code, message integrity check code
  • 4-Way Handshake Message 4 (message 4 in the 4-way handshake): Supplicant sends the EAPOL-Key for confirmation to the Authenticator. After receiving the 4-Way Handshake Message 3, the Supplicant can use the PTK generated by itself to decrypt the GTK, and verify the MIC at the same time. If there is no error, it will send an ACK (Acknowledge) to the Authenticator for confirmation.
  • the control port of Authenticator will be opened, so that 802.11 data frames will be able to pass normally, and all unicast data frames will be protected by PTK, and all multicast data and broadcast data will be protected by PTK. GTK protection.
  • the calculation parameters of PTK include PMK. If the PMKs of the two parties are inconsistent, the calculated PTKs are also inconsistent, and the two parties cannot correctly parse the data of the other party, and thus cannot complete the handshake, then Supplicant will not be able to. Access Authenticator.
  • the PMK is a common key (that is, the password of the Authenticator) predicted by the Supplicant and the Authenticator, and there is a great risk of leakage, which is not conducive to security protection.
  • FIG. 5 shows a flowchart of an information processing method provided by an embodiment of the present application, and the method can be applied to the distribution network system shown in FIG. 1 .
  • the method may include the following steps:
  • Step 510 the device to be connected to the network broadcasts the beacon of the first access point, the beacon includes the key calculation parameter and/or the device identifier of the device to be connected to the network, and the key calculation parameter is used to determine the connection between the device to be connected to the network and the network distribution device.
  • the access key to perform authentication is used to perform authentication.
  • the device to be connected to the network can start the first access point when it enters the network distribution mode.
  • the device to be connected to the network automatically enters the network configuration mode when it is turned on for the first time, or the device to be connected to the network is operated by the user to passively trigger entering the distribution network. model.
  • the first access point is a soft AP started by the device to be connected to the network.
  • the beacon of the first access point may be broadcast, and the beacon includes the key calculation parameter and/or the device identifier of the device to be connected to the network.
  • the device identifier of the device to be connected to the network includes the device ID of the device to be connected to the network, so as to uniquely identify the device to be connected to the network.
  • the key calculation parameter is used to determine the access key for performing identity authentication between the device to be connected to the network and the network distribution device.
  • the length of the key calculation parameter is greater than or equal to one byte. This embodiment of the present application does not limit the content of the key calculation parameter.
  • the key calculation parameter includes a predefined value; or, the key calculation parameter includes a random number.
  • the key calculation parameter is pre-configured by the device cloud platform (the cloud platform corresponding to the device to be connected to the network); or, the key calculation parameter is generated by the device to be connected to the network.
  • the key calculation parameter in order to reduce the risk of leakage of the key calculation parameter and improve the security of the key calculation parameter, includes a random number generated by the device to be connected to the network.
  • the beacon of the first access point further includes a pre-shared verification identifier F, optionally, the pre-shared verification identifier occupies at least 1 bit.
  • the beacon of the first access point includes at least one of the following fields: a BSSID field, an SSID field, and a custom field (eg, a Vendor Specific field).
  • a BSSID field includes the key calculation parameter and/or the device identification of the device to be connected to the network; or,
  • the SSID field includes key calculation parameters and/or the device identification of the device to be connected to the network; or, the custom field includes key calculation parameters and/or the device identification of the device to be connected to the network.
  • the key calculation parameter is set in the SSID field
  • the device identifier of the device to be connected to the network is set in the BSSID field.
  • the key calculation parameters and the device ID of the device to be connected to the network can be in fields other than the custom fields to avoid configuring network devices. Not available.
  • the device manufacturer of the device to be connected to the network may uniquely assign a key K to the device to be connected to the network, and preconfigure the key K to the device to be connected to the network. Since the device identifier of the device to be connected to the network is used to uniquely identify the device to be connected to the network, there is a one-to-one correspondence between the device identifier of the device to be connected to the network and the key K of the device to be connected to the network.
  • the device manufacturer of the device to be connected to the network can upload the device identifier of the device to be connected to the network and the key K of the device to be connected to the network to the cloud platform of the device manufacturer (ie, the cloud platform corresponding to the device to be connected to the network).
  • Step 520 the distribution network device receives the beacon of the first access point.
  • the distribution network device can scan the beacons broadcast by other devices on different channels, so that on the channel where the device to be connected broadcasts the beacon of the first access point, the distribution network device can scan the beacon of the first access point , that is, the distribution network device can receive the beacon of the first access point.
  • the network distribution device may further parse the beacon of the first access point to obtain the device identification and/or key calculation parameters of the device to be connected to the network.
  • the network distribution device can send the key calculation parameters and/or the device identification of the device to be connected to the network to the distribution cloud platform, and the distribution cloud platform and the device cloud platform calculate the access to perform identity authentication between the device to be connected to the network and the network distribution device. key.
  • the technical solutions provided by the embodiments of this application add a key calculation parameter to the beacon of the access point activated by the device to be connected to the network, and the key calculation parameter is used to determine the relationship between the device to be connected to the network and the network distribution device.
  • the access key for performing identity authentication between devices provides a basis for performing identity authentication between the device to be connected to the network and the device to be deployed on the network, which is helpful for the subsequent realization of identity authentication between the device to be connected to the network and the device to be connected to the network.
  • the identity authentication between the device to be accessed and the network distribution device is performed before the device to access the network obtains the network configuration information, that is, the device to be connected to the network can obtain the network configuration information only when the identity authentication is passed. , thereby reducing the risk of network configuration information leakage and improving the security of the access point.
  • the network device switches the access point back and forth to verify the identity of the device to be connected to the network.
  • the embodiment of the present application simplifies the identity authentication process and improves the identity authentication efficiency.
  • the following describes the calculation process of the access key (first access key) on the side of the device to be connected to the network and the access key (second access key) on the side of the distribution device.
  • the above method further includes the following steps:
  • Step 531 the device to be connected to the network determines the first access key based on the key calculation parameter and the first device key.
  • the first device key is the device key of the device to be connected to the network preset in the device to be connected to the network, that is, the above-mentioned key K.
  • the first access key can be calculated based on the key calculation parameter and the first device key.
  • the device to be connected to the network may use a key generation algorithm to process the key calculation parameter and the first device key.
  • the above step 531 includes: the device to be connected to the network uses the first key generation algorithm to The key calculation parameter and the first device key are processed to obtain the first encryption key; the first encryption key is processed by the first encoding method to obtain the first access key. Since the first encryption key obtained by the first key generation algorithm is usually binary data, in order to obtain the first access key in the form of a visible string, the first encryption key needs to be encoded.
  • An encoding method encodes the first encryption key.
  • the first encoding manner includes: Base64 (representing binary data based on 64 printable characters).
  • the first key generation algorithm includes any item: AES (Advanced Encryption Standard, Advanced Encryption Standard) 128-CMAC (Cypher-Based Message Authentication Code, based on symmetric encryption to achieve message authentication), HKDF (HMAC (Hash) -based Message Authentication Code, hash operation message verification code)-based KDF (Key Derivation Function, key derivation function), HMAC-based key derivation function), PBKDF (Password-Based Key Derivation Function, password-based key Derivation function), SHA (Secure Hash Algorithm, secure hash algorithm), DES (Data Encryption Standard, data encryption standard) algorithm, 3DES (Triple DES, triple data encryption standard) algorithm.
  • AES Advanced Encryption Standard, Advanced Encryption Standard
  • 128-CMAC Chip-Based Message Authentication Code, based on symmetric encryption to achieve message authentication
  • HKDF HMAC (Hash) -based Message Authentication Code, hash operation
  • the above method further includes the following steps:
  • Step 532 The distribution network device sends a first acquisition request to the distribution network cloud platform, where the first acquisition request is used to request to acquire a second access key.
  • the calculation parameters of the second access key need to be the same as the calculation parameters of the first access key.
  • the above-mentioned calculation parameters of the first access key include the key calculation parameters and the first device key. Therefore, the calculation parameters of the second access key should also include the key calculation parameters and the device key of the device to be connected to the network.
  • the device key of the device to be connected to the network is only held by the cloud platform (that is, the device cloud platform) of the device to be connected to the network and the device manufacturer of the device to be connected to the network. Second, the access key needs to be calculated by the device cloud platform.
  • the distribution network device After receiving the beacon of the first access point, the distribution network device can obtain the device identification and/or key calculation parameters of the device to be connected to the network from the beacon of the first access point, and then the distribution network device sends the data to the distribution network cloud.
  • the platform sends the first acquisition request to request the acquisition of the second access key.
  • the first acquisition request includes the key calculation parameter and/or the device identifier of the device to be connected to the network; or, the first acquisition request also includes the device to be connected to the network.
  • the network distribution device needs to first establish a secure connection with the distribution network cloud platform, and then send the data to the distribution network cloud platform. First get request.
  • the device key of the device to be connected to the network is not held by the network configuration cloud platform. Therefore, after receiving the first acquisition request, the network configuration cloud platform , the second access key needs to be further obtained from the device cloud platform. That is, as shown in FIG. 6, after the above step 532, the following steps are further included:
  • Step 53A the distribution network cloud platform determines the device cloud platform.
  • the distribution network cloud platform needs to first determine the device cloud platform corresponding to the device to be connected to the network.
  • the first acquisition request sent by the network distribution device to the network distribution cloud platform includes the device manufacturer name of the device to be connected to the network, and the network distribution cloud platform can determine the corresponding device cloud platform according to the device manufacturer name of the device to be connected to the network.
  • Step 53B the distribution network cloud platform sends a third acquisition request to the device cloud platform, where the third acquisition request is used to request to acquire the second access key.
  • the network configuration cloud platform may further send a third acquisition request to the device cloud platform to request the device cloud platform to calculate the second access key and request the device cloud platform to store the second access key.
  • the key is sent to the distribution network cloud platform.
  • the third acquisition request includes key calculation parameters and/or the device identifier of the device to be connected to the network; or, the third acquisition request also includes the device to be connected to the network. The name of the device manufacturer, the device name of the device to be connected to the network, the product serial number of the device to be connected to the network, etc.
  • the distribution network cloud platform needs to establish a secure connection with the device cloud platform first, and then send the first message to the device cloud platform.
  • Step 53C the device cloud platform calculates the second access key.
  • the device cloud platform can determine the second device key according to the device identification of the device to be connected to the network,
  • the second device key is the device key of the device to be connected to the network stored in the device cloud platform, that is, the key K.
  • the calculation method of the first access key and the calculation method of the second access key should also be consistent.
  • An access key is used to calculate a second access key.
  • the process of calculating the second access key by the device cloud platform is as follows: the device cloud platform adopts the first key generation algorithm to calculate the parameters and the key calculation parameters.
  • the second device key is processed to obtain the second encryption key; the second encryption key is processed by using the first encoding method to obtain the second access key.
  • the process of encoding the second encryption key may also be implemented by a distribution network cloud platform or a distribution network device. That is, after the device cloud platform calculates the second encryption key based on the key calculation parameters and the second device key, the encoding process of the second encryption key can be performed by any of the device cloud platform, the distribution network cloud platform, and the distribution network device. one to implement.
  • Step 53D the device cloud platform sends the access key information to the distribution network cloud platform.
  • the device cloud platform can directly calculate the second access key and send the second access key to the distribution network cloud platform, or it can first calculate the second encryption key and send the second encryption key to the cloud platform. Send it to the distribution network cloud platform. Therefore, the access key information sent by the device cloud platform to the distribution network cloud platform includes the second access key or the second encryption key.
  • Step 534 The distribution network cloud platform sends access key information to the distribution network device, where the access key information is used to determine the second access key.
  • the distribution network cloud platform may directly forward the access key information to the distribution network device.
  • the distribution network cloud platform can also directly forward the access key information to the distribution network device, and then the distribution network device encodes the second encryption key. Processing, that is, after the above step 534, it further includes: the distribution network device uses the first encoding method to process the second encryption key to obtain the second access key; or, the distribution network cloud platform may The encoding process is performed to obtain the second access key, and the second access key is sent to the distribution network device.
  • FIG. 6 only uses the device cloud platform to calculate the second access key and send the second access key to the distribution network cloud platform as an example for introduction and description, but this does not constitute the technical solution of the present application.
  • the second encryption key may also be encoded by the distribution network cloud platform or the distribution network device.
  • the above method further includes: the device to be connected to the network and the device for network distribution perform identity authentication based on the first access key and the second access key, respectively.
  • the device to be connected to the network calculates the first access key and the device to be connected to the network obtains the second access key
  • the device to be connected to the network and the device to be connected to the network can perform identity authentication based on the first access key and the second access key.
  • the above-mentioned 4-way handshake process is used for identity authentication
  • the device to be connected to the network is equivalent to the Supplicant in the above-mentioned 4-way handshake process
  • the network distribution device is equivalent to the Authenticator in the above-mentioned 4-way handshake process.
  • the key is equivalent to the PMK on the Supplicant side in the above-mentioned 4-way handshake process
  • the second access key is equivalent to the PMK on the Authenticator side in the above-mentioned 4-way handshake process.
  • the above method further includes: in the case that the identity authentication is passed, the network distribution device accesses the first access point. After the identity authentication is passed, the network configuration device can access the first access point activated by the device to be connected to the network. Optionally, after the network configuration device accesses the first access point, the network configuration device sends the network configuration to the device to be connected to the network. information, the network configuration information is used to configure the device to be connected to the network to access the second access point.
  • the embodiments of the present application only take the calculation of the access key based on the key calculation parameter and the device key of the device to be connected to the network as an example. It is easy to think of using other calculation parameters to calculate the access key, such as calculating the access key by using the key calculation parameter, the device key of the device to be connected to the network, and the device identifier of the device to be connected to the network, these should all belong to the protection scope of this application. Inside.
  • the device to be connected to the network and the network distribution device respectively obtain the access key according to the key calculation parameter, and perform identity authentication according to the separately obtained access key, so that the device to be connected to the network and the network distribution device can perform identity authentication.
  • the identity of the device to be connected to the network is authenticated, so as to avoid leakage of the network configuration information and improve the security of the access point.
  • the access key on the side of the distribution device is calculated by the cloud platform corresponding to the device to be connected to the network, so as to avoid leaking the device key of the device to be connected to the network. , which improves the effectiveness of identity authentication.
  • the information processing method provided by the embodiment of the present application includes the following steps:
  • Step 700 the device to be connected to the network broadcasts the beacon of the soft AP.
  • the beacon includes a key calculation parameter and/or a device identity of the device to be connected to the network, and the key calculation parameter is used to determine an access key for performing identity authentication between the device to be connected to the network and the network distribution device.
  • Step 710 the distribution network device receives the beacon of the soft AP. After receiving the beacon of the soft AP, the distribution network device can further analyze the beacon of the soft AP to obtain the device identification and/or key calculation parameters of the device to be connected to the network.
  • Step 720 the device to be connected to the network determines the first access key based on the key calculation parameter and the first device key.
  • the device to be connected to the network uses the first key generation algorithm to process the key calculation parameter and the first device key to obtain the first encryption key; uses the first encoding method to process the first encryption key to obtain the first access key. key.
  • Step 730 The distribution network device sends a first acquisition request to the distribution network cloud platform, where the first acquisition request is used to request to acquire a second access key.
  • the first acquisition request includes the key calculation parameter and/or the device identifier of the device to be connected to the network.
  • the network distribution device needs to first establish a secure connection with the distribution network cloud platform, and then send the data to the distribution network cloud platform. First get request.
  • Step 740 the configuration network cloud platform determines the device cloud platform.
  • the distribution network cloud platform can determine the corresponding device cloud platform according to the device manufacturer name of the device to be connected to the network.
  • Step 750 The distribution network cloud platform sends a third acquisition request to the device cloud platform, where the third acquisition request is used to request to acquire the second access key.
  • the distribution network cloud platform needs to first establish a secure connection with the device cloud platform, and then send the first message to the device cloud platform.
  • Step 760 the device cloud platform calculates the second access key.
  • the device cloud platform can determine the second device key according to the device identifier of the device to be connected to the network. After that, the device cloud platform uses the first key generation algorithm to process the key calculation parameters and the second device key to obtain the second encryption key; uses the first encoding method to process the second encryption key to obtain the second encryption key. access key.
  • Step 770 the device cloud platform sends the second access key to the distribution network cloud platform.
  • Step 780 The distribution network cloud platform sends the second access key to the distribution network device.
  • step 790 the device to be connected to the network and the network distribution device perform identity authentication based on the first access key and the second access key, respectively.
  • the identity authentication is passed, and the network configuration device can access the soft AP, and send the network configuration information of the home WiFi network to the device to be connected to the network.
  • the embodiment of the present application does not limit the execution sequence of the above steps, and the above steps can be combined in any execution order on the premise of satisfying the implementation logic.
  • the above-mentioned step 720 may also be performed before the above-mentioned step 710 , or the above-mentioned step 720 may also be performed after the above-mentioned step 780 . These should all fall within the protection scope of the present application.
  • FIG. 8 shows a flowchart of an information processing method provided by an embodiment of the present application, and the method can be applied to the distribution network system shown in FIG. 1 .
  • the method may include the following steps:
  • Step 810 The network distribution device sends first information to the device to be connected to the network, where the first information includes a key calculation parameter, and the key calculation parameter is used to determine the first information key.
  • the network distribution device After connecting to the first access point started by the device to be connected to the network, the network distribution device establishes a communication connection with the device to be connected to the network.
  • the communication connection between the network configuration device and the device to be connected to the network is a TCP connection or a UDP connection.
  • data transmission can be performed between the network distribution device and the device to be connected to the network.
  • the network distribution device sends first information to the device to be connected to the network, where the first information includes a key calculation parameter.
  • the device to be connected to the network can use the key calculation parameter to determine the first information key, and the first information key can be used to decrypt the second information encrypted with the second information key or the network configuration information encrypted with the second information key, It can also be used to encrypt the first reference information.
  • the device to be connected to the network can successfully parse the network configuration information or the second information encrypted by the second information key, and then the device to be connected to the network passes the identity authentication;
  • the first information key and the second information key are the same, and the first reference information and the second reference information are the same, the first reference information encrypted with the first encryption key and the first reference information encrypted with the second encryption key are the same.
  • the two reference information can be consistent, and then the device to be connected to the network can pass the identity authentication.
  • the key calculation parameter includes a random number; or, the key calculation parameter includes a preconfigured value.
  • the key calculation parameter is generated by the device cloud platform (the cloud platform corresponding to the device to be connected to the network).
  • the length of the key calculation parameter is greater than or equal to one byte. This embodiment of the present application does not limit the timing for determining the key calculation parameter.
  • the device cloud platform generates the key calculation parameter after receiving the request for obtaining the second information key or for obtaining the fourth reference information;
  • the device cloud platform has pre-generated key calculation parameters, and subsequently receives a request for obtaining the second information key or for obtaining the fourth reference information, and directly calculates the parameters according to the key and the device key of the device to be connected to the network.
  • the second information key can be calculated using the key.
  • the embodiment of the present application proposes two methods for the identity authentication under the soft AP distribution network, one way is that the identity authentication process is coupled with the network distribution process, and the other way is the decoupling of the identity authentication process and the network distribution process.
  • the following describes the two methods respectively.
  • the above-mentioned first information further includes network configuration information encrypted with the second information key; the above-mentioned method further includes: the distribution network cloud platform sends the key calculation parameter and the second information key to the distribution network device; the distribution network The device determines the first information based on the key calculation parameter, the second information key, and the network configuration information.
  • the network configuration information is used to configure the device to be connected to the network to access the second access point.
  • the network configuration device needs to send the network device corresponding to the second access point to the device to be connected to the network.
  • configuration information, and the subsequent device to be connected to the network can access the second access point according to the network configuration information.
  • the network configuration device does not directly send the network configuration information to the device to be connected to the network, but uses the second information key to process the network configuration information, and then sends the encrypted network configuration information to the device to be connected to the network. If the device to be connected to the network can successfully decrypt the encrypted network configuration information, it can use the acquired network configuration information to access the second access point.
  • the network distribution device In order to ensure that the first information key calculated by the device to be connected to the network can be consistent with the second information key, the network distribution device also needs to send the key calculation parameters used in the calculation of the second information key to the device to be connected to the network, so that In subsequent steps, the device to be connected to the network determines the first information key according to the key calculation parameter and the device key of the device to be connected to the network.
  • the calculation process of the first information key and the second information key please refer to the following method embodiments, and details are not repeated here.
  • the network distribution device needs to send at least the following information to the device to be connected to the network: network configuration information encrypted with the second information key, and key calculation parameters. Therefore, the network distribution device needs to first determine the network configuration information encrypted with the second information key according to the network configuration information and the second information key, and then send the network configuration information and key calculation parameters encrypted with the second information key to the The device to be connected to the network. Based on this, optionally, determining the first information based on the key calculation parameter, the second information key, and the network configuration information includes: using the fourth encryption algorithm and the second information key to process the network configuration information to obtain The network configuration information encrypted with the second information key; the first information is determined based on the key calculation parameter and the network configuration information encrypted with the second information key.
  • the fourth encryption algorithm is a symmetric encryption algorithm.
  • the fourth encryption algorithm includes but is not limited to any one of the following: AES128-CMAC, AES128-CBC, AES128-GCM, AES256-CMAC, AES256-CBC, and AES256-GCM.
  • the device to be connected to the network After the network distribution device sends the first information to the device to be connected to the network, the device to be connected to the network first determines the first information key according to the key calculation parameter in the first information, and then uses the first information key to decrypt the first information using the second key. Information key encrypted network configuration information.
  • the above method further includes: the device to be connected to the network uses the first information key to decrypt the network configuration information encrypted by the second information key; in the case that the first information key and the second information key are consistent, The identity authentication of the network access device can succeed, and then the network access device succeeds in obtaining network configuration information; in the case where the first information key and the second information key are inconsistent, the network access device identity authentication fails, and the network access device fails to obtain network configuration information. .
  • the embodiment of the present application also proposes two methods for decoupling the identity authentication process from the network distribution process.
  • One method is that the network distribution device performs identity identification according to the data encrypted by the first information key and the second information key respectively.
  • Authentication another way is that the network distribution device performs identity authentication according to the data from the device cloud platform and the device to be connected to the network.
  • the above method further includes: the device to be connected to the network obtains the first encrypted information according to the first information key and the first reference information; the device to be connected to the network sends the first encrypted information to the network distribution device.
  • the first reference information is used for the identity authentication process of the device to be connected to the network.
  • the device manufacturer of the device to be connected to the network uniquely allocates reference information for the device to be connected to the network, and preconfigures the reference information into the device to be connected to the network (the reference information preconfigured in the device to be connected to the network is referred to as "first reference information") . Since the device identifier of the device to be connected to the network is used to uniquely identify the device to be connected to the network, there is a one-to-one correspondence between the device identifier of the device to be connected to the network and the reference information.
  • the device manufacturer of the device to be connected to the network can upload the device identification and reference information of the device to be connected to the network to the device cloud platform (that is, the cloud platform corresponding to the device to be connected to the network) (the reference information stored in the device cloud platform is called "second reference”. information").
  • the reference information is a preconfigured value, or the reference information is a preconfigured random number, and the content of the reference information is not limited in this embodiment of the present application.
  • the first reference information and the second reference information are respectively held by the device to be connected to the network and the device cloud platform (the cloud platform corresponding to the device to be connected to the network), so the network distribution device cannot directly
  • the second reference information is acquired, but the acquired first reference information (ie, the second encrypted information) encrypted with the second information key. That is, the above method further includes: the distribution network cloud platform sends the second encrypted information to the distribution network device.
  • the device cloud platform may calculate the second information key based on the key calculation parameter, and use the second information key to encrypt the second reference information to obtain the second encrypted information, and then combine the second encrypted information and the
  • the key calculation parameters are sent to the distribution network cloud platform, and the distribution network cloud platform is further sent to the distribution network equipment.
  • the key calculation parameter can be sent to the device to be connected to the network, so that the device to be connected to the network can use the key calculation parameter to calculate the first information key and encrypt it with the first information key.
  • the first reference information is used to obtain the first encrypted information, and the first encrypted information is further sent to the distribution network device.
  • the network distribution device receives the first encrypted information from the device to be connected to the network; By comparison, if the two encrypted information are the same, the identity authentication of the device to be connected to the network has passed, and the network configuration device can further send network configuration information to the device to be connected to the network. Based on this, the above method further includes: when the first encrypted information and the second encrypted information are consistent, the network configuration device sends network configuration information to the device to be connected to the network, where the network configuration information is used to configure the device to be connected to the network to access the second access point.
  • the identity authentication of the device to be connected to the network fails.
  • Network configuration information is, only when the first information key and the second information key are consistent, and the first reference information and the second reference information are consistent, the identity authentication of the device to be connected to the network can be successful, and then the device to be connected to the network can be obtained.
  • the first information further includes second information encrypted with the second information key; the method further includes: decrypting the second information encrypted with the second information key using the first information key, to obtain the third information Reference information; send third reference information to the distribution network device.
  • the second information is used for the identity authentication process of the device to be connected to the network.
  • the second information decrypted by the device to be connected to the network includes third reference information.
  • the third reference information is a preconfigured value, or, the third reference information is a preconfigured random number, and the content of the third reference information is not limited in this embodiment of the present application.
  • the second information decrypted by the device to be connected to the network may further include a predefined value, and the predefined value is only held by the device to be connected to the network and the device cloud platform.
  • the device cloud platform may calculate the second information key based on the key calculation parameter, and use the second information key to encrypt the second information to obtain the encrypted second information (the device cloud platform encrypts the second information key) information, the reference information in the second information is called "fourth reference information"), and then the reference information, the encrypted second information and the key calculation parameters are sent to the distribution network cloud platform, and the distribution network cloud platform further sends to distribution network equipment.
  • the key calculation parameter and the encrypted second information can be sent to the device to be connected to the network, so that the device to be connected to the network subsequently uses the key calculation parameter to calculate the first information key, and Use the first information key to decrypt the encrypted second information to obtain the reference information in the second information (the reference information in the second information decrypted by the device side to be accessed is called "third reference information"), and further The reference information is sent to the distribution network device.
  • the distribution network device receives the third reference information from the device to be connected to the network; By comparison, if the two reference information are the same, the identity authentication of the device to be connected to the network has passed, and the network configuration device can further send network configuration information to the device to be connected to the network.
  • the above method further includes: the device to be connected to the network sends third reference information to the distribution network device; the distribution network cloud platform sends fourth reference information to the distribution network device; In this case, network configuration information is sent to the device to be connected to the network, where the network configuration information is used to configure the device to be connected to the network to access the second access point.
  • the identity authentication of the device to be connected to the network fails.
  • Network configuration information is, only when the first information key and the second information key are consistent, and the third reference information and the fourth reference information are consistent, the identity authentication of the device to be connected to the network can be successful, and then the device to be connected to the network can be obtained.
  • the key calculation parameters are sent to the device to be connected to the network through the network distribution device, and the key calculation parameters are used to calculate the information key, and the information key can be used for decryption using the device.
  • the data encrypted by the information key calculated by the cloud platform or the network configuration information encrypted by the information key calculated by the device cloud platform can also be used to encrypt the reference information.
  • the device to be connected can successfully parse the network configuration information or data encrypted with the information key calculated by the device cloud platform, and then the device to be connected to the network can successfully parse the network configuration information or data encrypted by the information key calculated by the device cloud platform.
  • identity authentication the network configuration information can be further obtained; or, in the case where the information key calculated by the device to be connected to the network is consistent with the information key calculated by the device cloud platform, the data obtained by encrypting the two information keys respectively can be used. Consistency is achieved, and then the device to be connected to the network passes identity authentication and further obtains network configuration information. Therefore, in the embodiment of the present application, the identity of the device to be accessed is authenticated before the device to access the wireless access point, so as to avoid leakage of network configuration information corresponding to the wireless access point, and improve the security of the wireless access point.
  • the identity authentication process of the device to be connected to the network can be coupled with the network distribution process, that is, the network distribution device directly encrypts the network configuration information with the information key calculated by the device cloud platform, and the information calculated by the device to be connected to the network is encrypted.
  • the device to be connected to the network can directly obtain the network configuration information, which reduces the data exchange between the network distribution device and the device to be connected to the network, and reduces the number of distribution devices and the device to be connected to the network. processing overhead.
  • the identity authentication process of the device to be connected to the network can also be decoupled from the network distribution process, that is, after the identity authentication of the device to be connected to the network is passed, the network distribution device sends the network configuration information to the device to be connected to the network.
  • the decoupling of the identity authentication process and the distribution network process can fully improve the security of network configuration information.
  • the following describes the calculation process of the first information key on the side of the device to be connected to the network and the second information key on the side of the network distribution device.
  • the above method further includes the following steps:
  • Step 831 the device to be connected to the network determines the first information key based on the key calculation parameter and the first device key.
  • the device manufacturer of the device to be connected to the network may uniquely assign a key K to the device to be connected to the network, and preconfigure the key K to the device to be connected to the network. Since the device identifier of the device to be connected to the network is used to uniquely identify the device to be connected to the network, there is a one-to-one correspondence between the device identifier of the device to be connected to the network and the key K of the device to be connected to the network.
  • the device manufacturer of the device to be connected to the network can upload the device identifier of the device to be connected to the network and the key K of the device to be connected to the network to the device cloud platform (ie, the cloud platform corresponding to the device to be connected to the network).
  • the first device key is the device key of the device to be connected that is preset in the device to be connected to the network. After the device to be connected to the network specifies the key calculation parameter and the first device key, the first information key can be calculated based on the key calculation parameter and the first device key.
  • the device to be connected to the network may use a key generation algorithm to process the key calculation parameter and the first device key.
  • the above step 831 includes: the device to be connected to the network uses a fourth key generation algorithm to The key calculation parameter and the first device key are processed to obtain the first information key.
  • the fourth key generation algorithm includes any one of: AES128-CMAC, HKDF-based KDF, PBKDF, SHA, DES algorithm, and 3DES algorithm.
  • the identity authentication process and the network distribution process of the device to be connected to the network can be either coupled or decoupled. The following describes the two situations respectively.
  • Case 1 The identity authentication process of the device to be connected to the network is coupled with the network distribution process:
  • the above method further includes the following steps:
  • Step 841 The network distribution device receives the beacon of the first access point activated by the device to be connected to the network, where the beacon includes the device identifier of the device to be connected to the network.
  • the device to be connected to the network can start the first access point when it enters the network distribution mode.
  • the device to be connected to the network automatically enters the network configuration mode when it is turned on for the first time, or the device to be connected to the network is operated by the user to passively trigger entering the distribution network. model.
  • the first access point is a soft AP started by the device to be connected to the network.
  • the beacon of the first access point may be broadcast, and the beacon includes the device identifier of the device to be connected to the network.
  • the device identifier of the device to be connected to the network includes the device ID of the device to be connected to the network, so as to uniquely identify the device to be connected to the network.
  • the beacon of the first access point includes at least one of the following fields: a BSSID field, an SSID field, and a custom field (such as a Vendor Specific field).
  • a BSSID field a BSSID field
  • an SSID field a custom field
  • the device identifier of the device to be connected to the network is set in the BSSID field.
  • the distribution network device can scan the beacons broadcast by other devices on different channels, so that on the channel where the device to be connected broadcasts the beacon of the first access point, the distribution network device can scan the beacon of the first access point , that is, the distribution network device can receive the beacon of the first access point.
  • Step 842 The distribution network device sends a seventh acquisition request to the distribution network cloud platform, where the seventh acquisition request is used to request to acquire the second information key.
  • the seventh acquisition request is used for requesting to acquire the second information key. Since the second information key is calculated by the device cloud platform, when the distribution network device needs to obtain the second information key, it can send a seventh acquisition request to the distribution network cloud platform for further acquisition through the distribution network cloud platform The second information key.
  • This embodiment of the present application does not limit the content of the seventh acquisition request.
  • the seventh acquisition request includes the device identifier of the device to be connected to the network; The device name of the device, the product serial number of the device to be connected to the network, etc.
  • the network distribution device needs to first establish a secure connection with the distribution network cloud platform, and then send the data to the distribution network cloud platform. Seventh Get Request.
  • Step 843 the configuration network cloud platform determines the device cloud platform.
  • the distribution network cloud platform needs to first determine the device cloud platform corresponding to the device to be connected to the network.
  • the seventh acquisition request sent by the network configuration device to the network configuration cloud platform includes the device manufacturer name of the device to be connected to the network, and the network configuration cloud platform can determine the corresponding device cloud platform according to the device manufacturer name of the device to be connected to the network.
  • Step 844 the distribution network cloud platform sends an eighth acquisition request to the device cloud platform, where the eighth acquisition request is used to request to acquire the second information key.
  • the eighth acquisition request is used to request the acquisition of the second information key. Based on this, after determining the device cloud platform corresponding to the device to be connected to the network, the distribution network cloud platform can further send an eighth acquisition request to the device cloud platform to request the device cloud platform. The platform calculates the second information key, and requests the device cloud platform to send the second information key to the distribution network cloud platform.
  • the eighth acquisition request includes the device identifier of the device to be connected to the network; The device name of the device, the product serial number of the device to be connected to the network, etc.
  • the distribution network cloud platform needs to establish a secure connection with the device cloud platform first, and then send the first message to the device cloud platform.
  • Step 845 the device cloud platform calculates the second information key.
  • the device cloud platform can determine the second device key according to the device identifier of the device to be connected to the network, and the second device key is The device key of the device to be connected to the network stored in the device cloud platform, that is, the key K.
  • the calculation method of the first information key and the calculation method of the second information key should also be consistent.
  • a second information key is calculated by means of an information key.
  • the process of calculating the second information key by the device cloud platform is as follows: the device cloud platform adopts the fourth key generation algorithm to calculate the parameters of the key and The second device key is processed to obtain the second information key.
  • the fourth key generation algorithm please refer to the above method embodiments, and details are not repeated here.
  • Step 846 the device cloud platform sends the second information key and key calculation parameters to the distribution network cloud platform.
  • the device cloud platform can send the second information key and key calculation parameters to the distribution network cloud platform.
  • Step 847 The distribution network cloud platform sends the second information key to the distribution network device.
  • the distribution network cloud platform After receiving the second information key, the distribution network cloud platform further sends the second information key and the key calculation parameter to the distribution network device, so as to respond to the seventh acquisition request of the distribution network device.
  • Scenario 2 The identity authentication process of the device to be connected to the network is decoupled from the network distribution process:
  • the above method further includes the following steps:
  • Step 851 The network distribution device receives the beacon of the first access point activated by the device to be connected to the network, and the beacon includes the device identifier of the device to be connected to the network.
  • step 851 For the description of step 851, please refer to the description of step 841, which is not repeated here.
  • Step 852 The distribution network device sends a ninth acquisition request to the distribution network cloud platform.
  • the ninth acquisition request is used to request to acquire the second reference information or the second information. Since the reference information of the device to be connected to the network is held by the device cloud platform and the device to be connected to the network (the second information also includes the reference information of the device to be connected to the network), the network distribution device needs to obtain the second reference information or the second information when Next, a ninth acquisition request may be sent to the distribution network cloud platform, so as to further acquire the second reference information or the second information through the distribution network cloud platform.
  • the ninth acquisition request includes the device identifier of the device to be connected to the network; The device name of the device, the product serial number of the device to be connected to the network, etc.
  • the network distribution device needs to first establish a secure connection with the distribution network cloud platform, and then send the data to the distribution network cloud platform. Ninth Acquisition Request.
  • Step 853 the configuration network cloud platform determines the device cloud platform.
  • step 853 please refer to the above-mentioned step 843, and details are not repeated here.
  • Step 854 the distribution network cloud platform sends a tenth acquisition request to the device cloud platform.
  • the tenth acquisition request is used to request the acquisition of the second reference information or the second information. Based on this, after determining the device cloud platform corresponding to the device to be connected to the network, the network distribution cloud platform can further send the tenth acquisition request to the device cloud platform to obtain the information.
  • the device cloud platform is requested to send the second reference information or the second information to the distribution network cloud platform.
  • This embodiment of the present application does not limit the content of the tenth acquisition request.
  • the tenth acquisition request includes the device identifier of the device to be connected to the network; The device name of the device, the product serial number of the device to be connected to the network, etc.
  • the distribution network cloud platform needs to establish a secure connection with the device cloud platform first, and then send the first message to the device cloud platform.
  • Ten get requests if there is no secure connection established between the distribution network cloud platform and the device cloud platform, the distribution network cloud platform needs to establish a secure connection with the device cloud platform first, and then send the first message to the device cloud platform.
  • Step 855 the device cloud platform calculates the second information key.
  • the device cloud platform can determine the second device key according to the device identification of the device to be connected to the network, and the second device key is The device key of the device to be connected to the network stored in the device cloud platform, that is, the key K.
  • the calculation method of the first information key and the calculation method of the second information key should also be consistent.
  • a second information key is calculated by means of an information key.
  • the process of calculating the second information key by the device cloud platform is as follows: the device cloud platform adopts the fourth key generation algorithm to calculate the parameters of the key and The second device key is processed to obtain the second information key.
  • the fourth key generation algorithm please refer to the above method embodiments, and details are not repeated here.
  • Step 856 the device cloud platform encrypts the second reference information or the second information by using the second information key.
  • the reference information of the device to be connected to the network is held by the device cloud platform and the device to be connected to the network. Therefore, after determining the second information key, the device cloud platform uses the second information key to encrypt the first 2. Reference information or second information, so as to avoid leaking the reference information of the device to be connected to the network.
  • Step 857 The device cloud platform sends the key calculation parameter and the second reference information or second information encrypted with the second information key to the distribution network cloud platform.
  • Step 858 The distribution network cloud platform sends the key calculation parameter and the second reference information or second information encrypted with the second information key to the distribution network device.
  • the distribution network cloud platform After receiving the key calculation parameter from the device cloud platform and the second reference information or second information encrypted with the second information key, the distribution network cloud platform further sends it to the distribution network device, in response to the first information of the distribution network device.
  • the embodiment of the present application only uses the first information key and the second information key to be calculated based on the key calculation parameters and the device key of the device to be connected to the network for illustration. After applying for the technical solution, it is easy to think of using other calculation parameters to calculate the information key, such as calculating the first information key and The second information key, all of which should fall within the protection scope of this application.
  • the key calculation parameter is generated through the cloud platform corresponding to the device to be connected to the network, and the key is calculated according to the key. Calculate the parameters and the device key of the device to be connected to the network, determine the information key, and further send the information key and key calculation parameters to the network distribution device, so as to avoid leaking the device key of the device to be connected to the network and improve the effectiveness of identity authentication. sex.
  • the key calculation parameter is generated through the cloud platform corresponding to the device to be connected to the network, and the information encryption parameter is determined according to the key calculation parameter and the device key of the device to be connected to the network. Then use the information key to further encrypt the reference information, so as to send the key calculation parameters and encrypted reference information to the distribution network device, so as to avoid leaking the device key and reference information of the device to be connected to the network, and improve the effectiveness of identity authentication. sex.
  • the information processing method includes the following steps:
  • Step 1001 the device to be connected to the network broadcasts the beacon of the soft AP.
  • the beacon includes the device identifier of the device to be connected to the network.
  • Step 1002 the distribution network device receives the beacon of the soft AP. After receiving the beacon of the soft AP, the distribution network device can further analyze the beacon of the soft AP to obtain the device identity of the device to be connected to the network.
  • Step 1003 the distribution network device sends a seventh acquisition request to the distribution network cloud platform, where the seventh acquisition request is used to request to acquire the second information key.
  • the seventh acquisition request includes the device identifier of the device to be connected to the network.
  • the network distribution device needs to first establish a secure connection with the distribution network cloud platform, and then send the data to the distribution network cloud platform. Seventh Get Request.
  • Step 1004 the distribution network cloud platform determines the device cloud platform.
  • the distribution network cloud platform can determine the corresponding device cloud platform according to the device manufacturer name of the device to be connected to the network.
  • Step 1005 the distribution network cloud platform sends an eighth acquisition request to the device cloud platform.
  • the eighth acquisition request is used to request to acquire the second information key.
  • the distribution network cloud platform needs to establish a secure connection with the device cloud platform first, and then send the first message to the device cloud platform. Eight Get Requests.
  • Step 1006 the device cloud platform calculates the second information key.
  • the device cloud platform can determine the second device key according to the device identifier of the device to be connected to the network. After that, the device cloud platform uses the fourth key generation algorithm to process the key calculation parameter and the second device key to obtain the second information key.
  • Step 1007 the device cloud platform sends the second information key and key calculation parameters to the distribution network cloud platform.
  • Step 1008 the distribution network cloud platform sends the second information key and the key calculation parameter to the distribution network device.
  • Step 1009 The distribution network device determines the first information based on the second information key, the key calculation parameter and the network configuration information.
  • the network configuration device uses the third encryption algorithm and the information encryption key to process the network configuration information, and obtains the network configuration information encrypted with the information encryption key; configuration information, and determine the first information.
  • Step 1010 The network distribution device sends the first information to the device to be connected to the network.
  • Step 1011 the device to be connected to the network determines the first information key based on the key calculation parameter and the first device key.
  • the device to be connected to the network determines the first information key according to the first device key stored by itself and the key calculation parameter in the first information.
  • the first device key is processed to obtain the first information key.
  • Step 1012 the device to be connected to the network uses the first information key to decrypt the network configuration information encrypted by the second information key.
  • the device to be connected to the network succeeds in acquiring the network configuration information; if the information decryption key and the information encryption key are inconsistent, the device to be connected to the network fails to obtain the network configuration information.
  • the information processing method includes the following steps:
  • Step 1101 the device to be connected to the network broadcasts the beacon of the soft AP.
  • the beacon includes the device identifier of the device to be connected to the network.
  • Step 1102 the distribution network device receives the beacon of the soft AP. After receiving the beacon of the soft AP, the distribution network device can further analyze the beacon of the soft AP to obtain the device identity of the device to be connected to the network.
  • Step 1103 The distribution network device sends a ninth acquisition request to the distribution network cloud platform.
  • the ninth acquisition request is used to request to acquire the second reference information.
  • the ninth acquisition request includes the device identifier of the device to be connected to the network.
  • the network distribution device needs to first establish a secure connection with the distribution network cloud platform, and then send the data to the distribution network cloud platform. Ninth Acquisition Request.
  • Step 1104 the distribution network cloud platform determines the device cloud platform.
  • the distribution network cloud platform can determine the corresponding device cloud platform according to the device manufacturer name of the device to be connected to the network.
  • Step 1105 the distribution network cloud platform sends a tenth acquisition request to the device cloud platform.
  • the tenth acquisition request is used to request to acquire the second reference information.
  • the distribution network cloud platform needs to establish a secure connection with the device cloud platform first, and then send the first message to the device cloud platform. Ten get requests.
  • Step 1106 the device cloud platform calculates the second information key. After receiving the tenth acquisition request, the device cloud platform may determine the second device key according to the device identifier of the device to be connected to the network. After that, the device cloud platform uses the fourth key generation algorithm to process the key calculation parameter and the second device key to obtain the second information key.
  • Step 1107 the device cloud platform encrypts the second reference information with the second information key to obtain the second encrypted information. Since the reference information of the device to be connected to the network is held by the device cloud platform and the device to be connected to the network, in order to avoid leakage of the reference information of the device to be connected to the network, the device cloud platform needs to encrypt the second reference information.
  • Step 1108 the device cloud platform sends the key calculation parameter and the second encryption information to the distribution network cloud platform.
  • Step 1109 the distribution network cloud platform sends the key calculation parameter and the second encryption information to the distribution network device.
  • Step 1110 The network distribution device sends the key calculation parameter to the device to be connected to the network.
  • Step 1111 the device to be connected to the network determines the first information key based on the key calculation parameter and the first device key.
  • the device to be connected to the network determines the first information key according to the first device key stored by itself and the key calculation parameter in the first information.
  • the first device key is processed to obtain the first information key.
  • Step 1112 the device to be connected to the network encrypts the first reference information by using the first information key to obtain the first encrypted information.
  • the reference information of the device to be connected to the network is preconfigured in the device to be connected to the network by the device manufacturer of the device to be connected to the network. After the device to be connected to the network calculates the first information key, the first information key can be used to encrypt the first reference information.
  • the device to be connected to the network uses the first reference information and the third encryption algorithm to process the first reference information to obtain the first encrypted information.
  • Step 1113 the device to be connected to the network sends the first encrypted information to the network distribution device.
  • Step 1114 In the case that the first encrypted information and the second encrypted information are consistent, the network configuration device sends network configuration information to the device to be connected to the network.
  • the distribution network device receives the second encrypted information from the distribution network cloud platform, and on the other hand, it receives the first encrypted information from the device to be connected to the network, and then compares the first encrypted information with the second encrypted information.
  • the network configuration information is sent to the device to be connected to the network, where the network configuration information is used to configure the device to be connected to the home WiFi network.
  • the network access device After the network access device receives the network configuration information, it can join the home WiFi network according to the network configuration information.
  • the information processing method includes the following steps:
  • Step 1201 the device to be connected to the network broadcasts the beacon of the soft AP.
  • the beacon includes the device identifier of the device to be connected to the network.
  • Step 1202 the distribution network device receives the beacon of the soft AP. After receiving the beacon of the soft AP, the distribution network device can further analyze the beacon of the soft AP to obtain the device identity of the device to be connected to the network.
  • Step 1203 The distribution network device sends a ninth acquisition request to the distribution network cloud platform.
  • the ninth acquisition request is used to request to acquire the second information.
  • the ninth acquisition request includes the device identifier of the device to be connected to the network.
  • the network distribution device needs to first establish a secure connection with the distribution network cloud platform, and then send the data to the distribution network cloud platform. Ninth Acquisition Request.
  • Step 1204 the distribution network cloud platform determines the device cloud platform.
  • the distribution network cloud platform can determine the corresponding device cloud platform according to the device manufacturer name of the device to be connected to the network.
  • Step 1205 The distribution network cloud platform sends a tenth acquisition request to the device cloud platform.
  • the tenth acquisition request is used to request to acquire the second information.
  • the distribution network cloud platform needs to establish a secure connection with the device cloud platform first, and then send the first message to the device cloud platform.
  • Ten get requests if there is no secure connection established between the distribution network cloud platform and the device cloud platform, the distribution network cloud platform needs to establish a secure connection with the device cloud platform first, and then send the first message to the device cloud platform. Ten get requests.
  • Step 1206 the device cloud platform calculates the second information key. After receiving the tenth acquisition request, the device cloud platform may determine the second device key according to the device identifier of the device to be connected to the network. After that, the device cloud platform uses the fourth key generation algorithm to process the key calculation parameter and the second device key to obtain the second information key.
  • Step 1207 the device cloud platform encrypts the second information by using the second information key. Since the reference information of the device to be connected to the network is held by the device cloud platform and the device to be connected to the network, in order to avoid leakage of the reference information of the device to be connected to the network, the device cloud platform needs to encrypt the reference information, and then obtain the second information encryption key. Encrypted second information, where the second information includes reference information of the device to be connected to the network.
  • Step 1208 the device cloud platform sends the key calculation parameter, the second information and the fourth reference information to the distribution network cloud platform.
  • Step 1209 The distribution network cloud platform sends the key calculation parameter, the second information and the fourth reference information to the distribution network device.
  • Step 1210 The network distribution device sends the key calculation parameter and the second information to the device to be connected to the network.
  • Step 1211 the device to be connected to the network determines the first information key based on the key calculation parameter and the first device key.
  • the device to be connected to the network determines the first information key according to the first device key stored by itself and the key calculation parameter in the first information.
  • the first device key is processed to obtain the first information key.
  • Step 1212 the device to be connected to the network uses the first information key to decrypt the second information to obtain third reference information.
  • the device to be connected to the network decrypts the second information, and can obtain the reference information of the device to be connected to the network in the second information, that is, the third reference information.
  • Step 1213 The device to be connected to the network sends third reference information to the network distribution device.
  • Step 1214 In the case that the third reference information and the fourth reference information are consistent, the network distribution device sends network configuration information to the device to be connected to the network.
  • the network distribution device receives the fourth reference information from the distribution network cloud platform, and on the other hand, receives the third reference information from the device to be connected to the network, and then compares the fourth reference information with the third reference information. If the fourth reference information is consistent with the third reference information, it is confirmed that the device to be connected to the network has passed identity authentication, and network configuration information is sent to the device to be connected to the network, where the network configuration information is used to configure the device to be connected to the home WiFi network. After the network access device receives the network configuration information, it can join the home WiFi network according to the network configuration information.
  • FIG. 13 shows a flowchart of an information processing method provided by an embodiment of the present application, and the method can be applied to the distribution network system shown in FIG. 1 .
  • the method may include the following steps:
  • Step 1310 the device to be connected to the network displays a first graphic code
  • the first graphic code includes the key calculation parameter and/or the device identifier of the device to be connected to the network
  • the key calculation parameter is used to determine the information decryption key
  • the information decryption key is used for decryption
  • the network configuration information from the network distribution device is used to configure the device to be connected to the network to access the second access point.
  • a device For a device to be connected to a network with a scanning function or a camera function, it can also access the network by scanning and configuring the network.
  • the embodiment of the present application also provides an identity authentication method.
  • the device to be connected to the network first displays the first graphic code.
  • the first graphic code is displayed on the screen of the device to be connected to the network;
  • the first image code may be pasted on the device surface of the device to be connected to the network by the device manufacturer of the device to be connected to the network, or pasted on the packaging box of the device to be connected to the network, which is not limited in this embodiment of the present application.
  • the first graphic code is represented as a two-dimensional code, a barcode, or the like.
  • the first graphic code includes a key calculation parameter and/or a device identifier of a device to be connected to the network.
  • the first graphic code further includes the device manufacturer name of the device to be connected to the network, the device name of the device to be connected to the network, the product serial number of the device to be connected to the network, and the like.
  • the key calculation parameter is used to determine the information decryption key for decrypting the network configuration information.
  • the length of the key calculation parameter is greater than or equal to one byte.
  • the key calculation parameter is preconfigured by the device cloud platform; or, the key calculation parameter is generated by the device to be connected to the network. If the device to be connected to the network does not have the screen display function, the key calculation parameters can be pre-configured by the device cloud platform corresponding to the device to be connected to the network; if the device to be connected to the network has the screen display function, the key calculation parameters The device generates itself.
  • the key calculation parameter includes a random number; or, the key calculation parameter includes a preconfigured value.
  • the device manufacturer of the device to be connected to the network may uniquely assign a key K to the device to be connected to the network, and preconfigure the key K to the device to be connected to the network. Since the device identifier of the device to be connected to the network is used to uniquely identify the device to be connected to the network, there is a one-to-one correspondence between the device identifier of the device to be connected to the network and the key K of the device to be connected to the network.
  • the device manufacturer of the device to be connected to the network can upload the device identifier of the device to be connected to the network and the key K of the device to be connected to the network to the cloud platform of the device manufacturer (ie, the cloud platform corresponding to the device to be connected to the network).
  • Step 1320 the network distribution device scans the first graphic code of the device to be connected to the network, the first graphic code includes the key calculation parameter and/or the device identification of the device to be connected to the network, the key calculation parameter is used to determine the information encryption key, and the information encryption key is The key is used to encrypt network configuration information, and the network configuration information is used to configure the device to be connected to the network to access the second access point.
  • the network distribution device scans the first graphic code of the device to be connected to the network to obtain the key calculation parameter and/or the device identifier of the device to be connected to the network.
  • the key calculation parameter is used to determine the information decryption key for decrypting the network configuration information; for the network configuration device, the key calculation parameter is used to determine the information encryption key for encrypting the network configuration information.
  • the network distribution device configures the network for the device to be connected by scanning the code to configure the network, after obtaining the information encryption key, the network distribution device needs to further display the second graphic code for the device to scan to obtain the network configuration information.
  • the above method further includes: the network distribution device determines the second graphic code according to the network configuration information and the information encryption key; and displays the second graphic code.
  • the information encryption key is used to encrypt the network configuration information, that is, the network configuration device can use the first encryption algorithm and the information encryption key to process the network configuration information, obtain the encrypted network configuration information, and then generate the encrypted network configuration information according to the encrypted network configuration information.
  • the second graphic code is used to encrypt the network configuration information.
  • the first encryption algorithm is a symmetric encryption algorithm.
  • the first encryption algorithm includes but is not limited to any of the following: AES128-CMAC, AES128-CBC (Cipher Block Chaining, cipher block chaining), AES128-GCM (Galois/Counter Mode), AES256-CMAC, AES256 -CBC, AES256-GCM.
  • the above method further includes: the device to be connected to the network scans a second graphic code displayed by the network configuration device, where the second graphic code includes network configuration information encrypted with an information encryption key.
  • the device to be connected to the network scans the second image code to obtain the network configuration information encrypted with the information encryption key. Since the device to be connected to the network determines the information decryption key based on the key calculation parameter, the device to be connected to the network uses the information decryption key to decrypt the information. Network configuration information. If the information decryption key and the information encryption key are the same, the device to be connected to the network successfully obtains the network configuration information; if the information decryption key and the information encryption key are inconsistent, the device to be connected to the network obtains the network configuration information. fail.
  • the device to be connected to the network can use the key calculation parameter to determine the information decryption key, and the network distribution device uses the key calculation parameter to determine the decryption key.
  • the key calculation parameters can obtain the information encryption key, and then the device to be connected to the network can use the information decryption key to decrypt the network configuration information encrypted by the distribution device using the information encryption key.
  • the following describes the calculation process of the information decryption key on the side of the network access device and the information encryption key on the side of the distribution device.
  • the above method further includes the following steps:
  • Step 1331 the device to be connected to the network determines the information decryption key based on the key calculation parameter and the first device key.
  • the first device key is the device key of the device to be connected to the network preset in the device to be connected to the network, that is, the above-mentioned key K. After specifying the key calculation parameters and the first device key, the device to be connected to the network can calculate the information decryption key based on the key calculation parameters and the first device key.
  • the device to be connected to the network may use a key generation algorithm to process the key calculation parameter and the first device key.
  • the above step 1331 includes: the device to be connected to the network uses the second key generation algorithm to The key calculation parameter and the first device key are processed to obtain the information decryption key.
  • the second key generation algorithm includes any one of: AES128-CMAC, HKDF-based KDF, PBKDF, SHA, DES algorithm, and 3DES algorithm.
  • the above method further includes the following steps:
  • Step 1332 The distribution network device sends a second acquisition request to the distribution network cloud platform, where the second acquisition request is used to request to acquire the information encryption key.
  • the calculation parameters of the information encryption key and the calculation parameters of the information decryption key need to be the same.
  • the above calculation parameters of the information decryption key include the key calculation parameter and the first device key. Therefore, the calculation parameters of the information encryption key should also include the key calculation parameter and the device key of the device to be connected to the network.
  • the device key of the device to be connected to the network is only held by the cloud platform (that is, the device cloud platform) of the device to be connected to the network and the device manufacturer of the device to be connected to the network. Therefore, the information The encryption key needs to be calculated by the device cloud platform.
  • the network distribution device scans the graphic code of the device to be connected to the network, and obtains the device identification and/or key calculation parameters of the device to be connected to the network, and then the distribution network device sends a second acquisition request to the distribution network cloud platform to request to obtain the information encryption key.
  • This embodiment of the present application does not limit the content of the second acquisition request.
  • the second acquisition request includes key calculation parameters and/or the device identifier of the device to be connected to the network; or, the second acquisition request also includes the device to be connected to the network.
  • the network distribution device needs to first establish a secure connection with the distribution network cloud platform, and then send the data to the distribution network cloud platform. The second get request.
  • the device key of the device to be connected to the network is not held by the network configuration cloud platform. Therefore, after receiving the second acquisition request, the network configuration cloud platform , you need to further obtain the information encryption key from the device cloud platform. That is, as shown in Figure 14, after the above step 1332, the following steps are further included:
  • Step 133A the distribution network cloud platform determines the device cloud platform.
  • the distribution network cloud platform needs to first determine the device cloud platform corresponding to the device to be connected to the network.
  • the second acquisition request sent by the network distribution device to the network distribution cloud platform includes the device manufacturer name of the device to be connected to the network, and the network distribution cloud platform can determine the corresponding device cloud platform according to the device manufacturer name of the device to be connected to the network.
  • Step 133B The distribution network cloud platform sends a fourth acquisition request to the device cloud platform, where the fourth acquisition request is used to request to acquire an information encryption key.
  • the distribution network cloud platform may further send a fourth acquisition request to the device cloud platform to request the device cloud platform to calculate the information encryption key, and request the device cloud platform to send the information encryption key.
  • the fourth acquisition request includes key calculation parameters and/or the device identifier of the device to be connected to the network; or, the fourth acquisition request also includes the device to be connected to the network. The name of the device manufacturer, the device name of the device to be connected to the network, the product serial number of the device to be connected to the network, etc.
  • the distribution network cloud platform needs to establish a secure connection with the device cloud platform first, and then send the first message to the device cloud platform.
  • Four Get Requests if there is no secure connection established between the distribution network cloud platform and the device cloud platform, the distribution network cloud platform needs to establish a secure connection with the device cloud platform first, and then send the first message to the device cloud platform.
  • Step 133C the device cloud platform calculates the information encryption key.
  • the device cloud platform can determine the second device key according to the device identification of the device to be connected to the network,
  • the second device key is the device key of the device to be connected to the network stored in the device cloud platform, that is, the key K.
  • the calculation method of the information decryption key and the calculation method of the information encryption key should also be consistent. way to calculate the message encryption key.
  • the process of calculating the information encryption key by the device cloud platform is as follows: the device cloud platform adopts the second key generation algorithm to calculate the parameters of the key and the second key The device key is processed to obtain the information encryption key.
  • the second key generation algorithm please refer to the above method embodiments, and details are not repeated here.
  • Step 133D the device cloud platform sends the information encryption key to the distribution network cloud platform.
  • the device cloud platform After the device cloud platform calculates the information encryption key, it can send the information encryption key to the distribution network cloud platform.
  • Step 1334 the distribution network cloud platform sends the information encryption key to the distribution network device.
  • the distribution network cloud platform After receiving the information encryption key, the distribution network cloud platform further sends the information encryption key to the distribution network device in response to the second acquisition request of the distribution network device.
  • the embodiment of the present application only uses the information encryption key and the information decryption key to calculate based on the key calculation parameter and the device key of the device to be connected to the network for illustration. After the technical solution, it is easy to think of using other calculation parameters to calculate the access key. key, all of which should fall within the scope of protection of this application.
  • the information decryption key and the information encryption key are obtained by the device to be connected to the network and the network distribution device respectively according to the key calculation parameters, and the subsequent network distribution device uses the information encryption key to encrypt the network.
  • Configuration information the device to be connected to the network uses the information decryption key to decrypt the network configuration information encrypted with the information encryption key. Only when the information encryption key and the information decryption key are the same, the device to be connected to the network can obtain the network configuration information. Before the network access device obtains the network configuration information, the identity of the network access device is authenticated, so as to avoid leakage of the network configuration information and improve the security of the access point.
  • the information encryption key on the side of the distribution device is calculated by the cloud platform corresponding to the device to be connected to the network, so as to avoid leaking the device key of the device to be connected to the network. key, which improves the effectiveness of identity authentication.
  • the information processing method provided by the embodiment of the present application includes the following steps:
  • Step 1500 the network distribution device scans the first graphic code of the device to be connected to the network, the first graphic code includes the key calculation parameter and/or the device identification of the device to be connected to the network, the key calculation parameter is used to determine the information encryption key, and the information encryption key is used to determine the information encryption key.
  • the key is used to encrypt the network configuration information, and the network configuration information is used to configure the device to be connected to the home WiFi network.
  • the network distribution device scans the first graphic code of the device to be connected to the network to obtain the key calculation parameter and/or the device identifier of the device to be connected to the network.
  • Step 1510 The network distribution device sends a second acquisition request to the distribution network cloud platform.
  • the second acquisition request is used for requesting to acquire the information encryption key.
  • the second acquisition request includes the key calculation parameter and/or the device identifier of the device to be connected to the network.
  • the network distribution device needs to first establish a secure connection with the distribution network cloud platform, and then send the data to the distribution network cloud platform. The second get request.
  • Step 1520 the configuration network cloud platform determines the device cloud platform.
  • the second acquisition request sent by the network distribution device to the network distribution cloud platform includes the device manufacturer name of the device to be connected to the network, and the network distribution cloud platform can determine the corresponding device cloud platform according to the device manufacturer name of the device to be connected to the network.
  • Step 1530 The distribution network cloud platform sends a fourth acquisition request to the device cloud platform, where the fourth acquisition request is used to request to acquire an information encryption key.
  • the fourth acquisition request includes the key calculation parameter and/or the device identifier of the device to be connected to the network.
  • the distribution network cloud platform needs to establish a secure connection with the device cloud platform first, and then send the first message to the device cloud platform.
  • Step 1540 the device cloud platform calculates the information encryption key.
  • the device cloud platform can determine the second device key according to the device identifier of the device to be connected to the network, where the second device key is the device key of the device to be connected to the network stored by the device cloud platform.
  • the device cloud platform uses the second key generation algorithm to process the key calculation parameter and the second device key to obtain the information encryption key.
  • Step 1550 the device cloud platform sends the information encryption key to the distribution network cloud platform.
  • Step 1560 the distribution network cloud platform sends the information encryption key to the distribution network device.
  • Step 1570 The network configuration device uses the first encryption algorithm and the information encryption key to process the network configuration information to obtain encrypted network configuration information; generate a second graphic code according to the encrypted network configuration information, and display the second graphic code .
  • Step 1580 the device to be connected to the network calculates the information decryption key.
  • the device to be connected to the network uses the second key generation algorithm to process the key calculation parameter and the first device key to obtain the information decryption key.
  • Step 1590 the device to be connected to the network scans the second graphic code.
  • the device to be connected to the network scans the second image code to obtain the network configuration information encrypted with the information encryption key. Since the device to be connected to the network determines the information decryption key based on the key calculation parameter, the device to be connected to the network uses the information decryption key to decrypt the information. Network configuration information. If the information decryption key and the information encryption key are the same, the device to be connected to the network successfully obtains the network configuration information; if the information decryption key and the information encryption key are inconsistent, the device to be connected to the network obtains the network configuration information. fail.
  • the embodiment of the present application does not limit the execution sequence of the above steps, and the above steps can be combined in any execution order on the premise of satisfying the implementation logic.
  • the above step 1580 can also be executed before the above step 1500, or the above step 1580 can also be executed after the above step 1540. These should all fall within the protection scope of the present application.
  • FIG. 16 shows a flowchart of an information processing method provided by an embodiment of the present application, and the method can be applied to the distribution network system shown in FIG. 1 .
  • the method may include the following steps:
  • Step 1610 the network configuration device displays a third graphic code, and the third graphic code includes the network configuration information encrypted by the information encryption key and the key calculation parameter; wherein, the network configuration information is used to configure the device to be connected to the network to access the second access
  • the key calculation parameter is used to determine the information decryption key, and the information decryption key is used to decrypt the network configuration information encrypted with the information encryption key.
  • the embodiment of the present application further provides an information processing method.
  • the distribution network device first displays a third graphic code, optionally, the third graphic code is represented as a two-dimensional code, a barcode, or the like.
  • the third graphic code includes the network configuration information encrypted by the information encryption key, and the key calculation parameter.
  • the key calculation parameter is used to determine the information encryption key; for the device to be connected to the network, the key calculation parameter is used to determine the information decryption key.
  • the determination process of the information encryption key and the information decryption key please refer to the following method embodiments, and details are not repeated here.
  • the key calculation parameter includes a random number; or, the key calculation parameter includes a preconfigured value.
  • the key calculation parameter is generated by the device cloud platform (the cloud platform corresponding to the device to be connected to the network).
  • the length of the key calculation parameter is greater than or equal to one byte.
  • the device cloud platform generates the key calculation parameters after receiving the request for obtaining the information encryption key; or, the device cloud platform pre-generates the encryption key After receiving the request for obtaining the information encryption key, the information encryption key can be calculated directly according to the key calculation parameter and the device key of the device to be connected to the network.
  • the information encryption key with the device key of the device to be connected to the network as the calculation parameter is calculated by the device cloud platform, and then the device cloud platform further passes the network configuration cloud platform to encrypt the information encryption key and The key calculation parameters are sent to the distribution network device.
  • the network distribution device After receiving the information encryption key and the key calculation parameter, the network distribution device needs to generate a third graphic code based on the information encryption key and the key calculation parameter for the device to be connected to the network to scan. Therefore, in an example, the above method further includes: the distribution network device receives the information encryption key, the key calculation parameter and the network configuration information from the distribution network cloud platform; based on the information encryption key, the key calculation parameter and the network configuration information to determine the third graphic code.
  • the above-mentioned determining the third graphic code based on the information encryption key, the key calculation parameter and the network configuration information includes: using the second encryption algorithm and the information encryption key to process the network configuration information, and obtaining the information encryption key using the information encryption key. key-encrypted network configuration information; generate a third graphic code according to the network configuration information encrypted with the information encryption key and key calculation parameters. Since the key calculation parameters are not encrypted by the information encryption key, that is, the key calculation parameters are in plaintext, the device to be connected to the network can obtain the key calculation parameters by scanning the third graphic code.
  • the second encryption algorithm is a symmetric encryption algorithm.
  • the second encryption algorithm includes but is not limited to any one of the following: AES128-CMAC, AES128-CBC, AES128-GCM, AES256-CMAC, AES256-CBC, and AES256-GCM.
  • Step 1620 the device to be connected to the network scans the third graphic code displayed by the network distribution device.
  • the device to be connected to the network scans the third graphic code displayed by the network distribution device to obtain the key calculation parameters in plaintext and the network configuration information encrypted with the information encryption key. After that, the device to be connected to the network needs to further determine the information decryption key based on the key calculation parameter, so as to decrypt the network configuration information encrypted by the information encryption key.
  • the process of determining the information decryption key by the device to be connected to the network please refer to the following method embodiments, and details are not repeated here.
  • the device to be connected to the network succeeds in obtaining the network configuration information; if the information decryption key and the information encryption key are inconsistent, the device to be connected to the network obtains the network configuration information. Configuration information failed.
  • the technical solutions provided by the embodiments of the present application add key calculation parameters and network configuration information encrypted by the information encryption key to the graphic code displayed by the network distribution device, and then the device to be connected to the network scans the graphic code, that is, The key calculation parameter can be obtained, so that the information decryption key can be determined according to the key calculation parameter. Only when the information encryption key and the information decryption key are the same, the device to be connected to the network can obtain the network configuration information, thus realizing the need to access the network. The identity of the device is authenticated to avoid leakage of network configuration information.
  • the technical solution provided by the embodiment of the present application can further improve the security of the key calculation parameter.
  • the following describes the calculation process of the information decryption key on the side of the network access device and the information encryption key on the side of the distribution device.
  • the above method further includes the following steps:
  • Step 1631 the device to be connected to the network determines the information decryption key based on the key calculation parameter and the first device key.
  • the first device key is the device key of the device to be connected to the network preset in the device to be connected to the network, that is, the above-mentioned key K. After specifying the key calculation parameters and the first device key, the device to be connected to the network can calculate the information decryption key based on the key calculation parameters and the first device key.
  • the device to be connected to the network may use a key generation algorithm to process the key calculation parameter and the first device key.
  • the above step 1631 includes: the device to be connected to the network uses a third key generation algorithm to The key calculation parameter and the first device key are processed to obtain the information decryption key.
  • the third key generation algorithm includes any one of: AES128-CMAC, HKDF-based KDF, PBKDF, SHA, DES algorithm, and 3DES algorithm.
  • the above method further includes the following steps:
  • Step 1632 The network configuration device scans the fourth graphic code of the device to be connected to the network, where the fourth graphic code includes the device identifier of the device to be connected to the network.
  • the device to be connected to the network can display a fourth graphic code.
  • the fourth graphic code is displayed on the screen of the device to be connected to the network;
  • the fourth image code may be pasted on the device surface of the device to be connected to the network by the device manufacturer of the device to be connected to the network, or pasted on the packaging box of the device to be connected to the network, which is not limited in this embodiment of the present application.
  • the fourth graphic code is represented as a two-dimensional code, a barcode, or the like.
  • the fourth graphic code includes the device identification of the device to be connected to the network.
  • the fourth graphic code further includes the device manufacturer name of the device to be connected to the network, the device name of the device to be connected to the network, the product serial number of the device to be connected to the network, and the like.
  • the network distribution device can obtain the device identification of the device to be connected to the network by scanning the fourth graphic code.
  • Step 1633 The distribution network device sends a fifth acquisition request to the distribution network cloud platform, where the fifth acquisition request is used to request to acquire an information encryption key.
  • the distribution network device when the distribution network device needs to obtain the information encryption key, it can send a fifth acquisition request to the distribution network cloud platform to further obtain the information encryption through the distribution network cloud platform. key.
  • This embodiment of the present application does not limit the content of the fifth acquisition request.
  • the fifth acquisition request includes the device identifier of the device to be connected to the network; The device name of the device, the product serial number of the device to be connected to the network, etc.
  • the network distribution device needs to first establish a secure connection with the distribution network cloud platform, and then send the data to the distribution network cloud platform. Fifth get request.
  • Step 1634 the distribution network cloud platform determines the device cloud platform.
  • the distribution network cloud platform needs to first determine the device cloud platform corresponding to the device to be connected to the network.
  • the second acquisition request sent by the network distribution device to the network distribution cloud platform includes the device manufacturer name of the device to be connected to the network, and the network distribution cloud platform can determine the corresponding device cloud platform according to the device manufacturer name of the device to be connected to the network.
  • Step 1635 The distribution network cloud platform sends a sixth acquisition request to the device cloud platform, where the sixth acquisition request is used to request to acquire an information encryption key.
  • the distribution network cloud platform may further send a sixth acquisition request to the device cloud platform to request the device cloud platform to calculate the information encryption key, and request the device cloud platform to send the information encryption key.
  • the sixth acquisition request includes the device identifier of the device to be connected to the network; The device name of the device, the product serial number of the device to be connected to the network, etc.
  • the network distribution cloud platform needs to establish a secure connection with the device cloud platform first, and then send the first message to the device cloud platform.
  • Step 1636 the device cloud platform calculates the information encryption key.
  • the device manufacturer of the device to be connected to the network may uniquely assign a key K to the device to be connected to the network, and preconfigure the key K to the device to be connected to the network. Since the device identifier of the device to be connected to the network is used to uniquely identify the device to be connected to the network, there is a one-to-one correspondence between the device identifier of the device to be connected to the network and the key K of the device to be connected to the network.
  • the device manufacturer of the device to be connected to the network can upload the device identifier of the device to be connected to the network and the key K of the device to be connected to the network to the cloud platform of the device manufacturer (ie, the cloud platform corresponding to the device to be connected to the network).
  • the device cloud platform can determine the second device key according to the device identification of the device to be connected to the network, and the second device key is The device key of the device to be connected to the network stored in the device cloud platform, that is, the key K.
  • the calculation method of the information decryption key and the calculation method of the information encryption key should also be consistent. way to calculate the message encryption key.
  • the process of calculating the information encryption key by the device cloud platform is as follows: the device cloud platform adopts the third key generation algorithm to calculate the parameters of the key and the second key The device key is processed to obtain the information encryption key.
  • the third key generation algorithm please refer to the above method embodiments, and details are not repeated here.
  • Step 1637 The device cloud platform sends the information encryption key and key calculation parameters to the distribution network cloud platform.
  • the device cloud platform can send the information encryption key and key calculation parameters to the distribution network cloud platform.
  • Step 1638 the distribution network cloud platform sends the information encryption key to the distribution network device.
  • the distribution network cloud platform After receiving the information encryption key, the distribution network cloud platform further sends the information encryption key and the key calculation parameter to the distribution network device, so as to respond to the fifth acquisition request of the distribution network device.
  • the embodiment of the present application only uses the information encryption key and the information decryption key to calculate based on the key calculation parameter and the device key of the device to be connected to the network for illustration. After the technical solution, it is easy to think of using other calculation parameters to calculate the access key. key, all of which should fall within the scope of protection of this application.
  • the technical solutions provided by the embodiments of the present application generate key calculation parameters through the cloud platform corresponding to the device to be connected to the network, and determine the information encryption key according to the key calculation parameters and the device key of the device to be connected to the network, In order to further send the information encryption key and key calculation parameters to the distribution network device, so as to avoid leaking the device key of the device to be connected to the network, and improve the effectiveness of identity authentication.
  • the information processing method provided by the embodiment of the present application includes the following steps:
  • Step 1801 the network configuration device scans the fourth graphic code of the device to be connected to the network.
  • the fourth graphic code includes the device identification of the device to be connected to the network.
  • the network distribution device scans the fourth graphic code of the device to be connected to the network to obtain the device identification of the device to be connected to the network.
  • Step 1802 The distribution network device sends a fifth acquisition request to the distribution network cloud platform, where the fifth acquisition request is used to request to acquire an information encryption key.
  • the fifth acquisition request includes the device identifier of the device to be connected to the network.
  • the network distribution device needs to first establish a secure connection with the distribution network cloud platform, and then send the data to the distribution network cloud platform. Fifth get request.
  • Step 1803 the distribution network cloud platform determines the device cloud platform.
  • the fifth acquisition request sent by the distribution device to the distribution cloud platform includes the device manufacturer name of the device to be connected to the network, and the distribution cloud platform can determine the corresponding device cloud platform according to the device manufacturer name of the device to be connected to the network.
  • Step 1804 the distribution network cloud platform sends a sixth acquisition request to the device cloud platform, where the sixth acquisition request is used to request to acquire an information encryption key.
  • the sixth acquisition request includes the device identifier of the device to be connected to the network.
  • the distribution network cloud platform needs to establish a secure connection with the device cloud platform first, and then send the first message to the device cloud platform.
  • Step 1805 the device cloud platform calculates the information encryption key.
  • the device cloud platform can determine the second device key according to the device identifier of the device to be connected to the network, where the second device key is the device key of the device to be connected to the network stored by the device cloud platform.
  • the device cloud platform uses the third key generation algorithm to process the key calculation parameter and the second device key to obtain the information encryption key.
  • Step 1806 the device cloud platform sends the information encryption key and key calculation parameters to the distribution network cloud platform.
  • Step 1807 The distribution network cloud platform sends the information encryption key and key calculation parameters to the distribution network device.
  • Step 1808 the network configuration device uses the second encryption algorithm and the information encryption key to process the network configuration information, and obtains the network configuration information encrypted with the information encryption key; according to the network configuration information encrypted with the information encryption key and the key calculation The parameter generates the third graphic code and displays the third graphic code.
  • Step 1809 the device to be connected to the network scans the third graphic code.
  • the device to be connected to the network scans the third image code, the network configuration information and key calculation parameters encrypted with the information encryption key can be obtained.
  • Step 1810 the device to be connected to the network calculates the information decryption key.
  • the device to be connected to the network determines the information decryption key based on the key calculation parameter and the first device key.
  • the device to be connected to the network uses the third key generation algorithm to process the key calculation parameter and the first device key to obtain the information decryption key.
  • Step 1811 the device to be connected to the network acquires network configuration information.
  • the device to be connected to the network can use the calculated information decryption key to decrypt the previously obtained network configuration information encrypted with the information encryption key. If the information decryption key and the information encryption key are the same, the device to be connected to the network successfully obtains the network configuration information. ; When the information decryption key and the information encryption key are inconsistent, the device to be connected to the network fails to obtain the network configuration information.
  • the embodiments of the present application describe the information processing methods provided by the embodiments of the present application from the perspective of interaction among devices to be connected to the network, network distribution devices, network distribution cloud platforms, and device cloud platforms.
  • the above-mentioned steps performed by the device to be connected to the network can be independently implemented as an information processing method on the side of the device to be connected to the network; the above-mentioned steps performed by the network distribution device can be independently implemented as an information processing method on the network distribution device side.
  • FIG. 19 shows a block diagram of an information processing apparatus provided by an embodiment of the present application.
  • the apparatus has the function of implementing the above-mentioned method example on the device side to be connected to the network, and the function may be implemented by hardware or by executing corresponding software in hardware.
  • the device may be the device to be connected to the network described above, or may be set in the device to be connected to the network.
  • the apparatus 1900 may include: a beacon broadcasting module 1910 .
  • the beacon broadcasting module 1910 is used to broadcast the beacon of the first access point, the beacon includes key calculation parameters and/or the device identification of the device to be connected to the network, and the key calculation parameters are used to determine the The access key for performing identity authentication between the device to be accessed and the network distribution device is described.
  • the apparatus 1900 further includes: a first key determination module 1920, configured to determine a first access key based on the key calculation parameter and the first device key.
  • the first key determination module 1920 is configured to: use a first key generation algorithm to process the key calculation parameter and the first device key to obtain a first encryption key; the first encryption key is processed in a first encoding manner to obtain the first access key.
  • the apparatus 1900 further includes: an identity authentication module 1930, configured to perform the identity authentication with the distribution network device based on the first access key; wherein, If the first access key and the second access key determined by the distribution network device are consistent, the identity authentication is passed; if the first access key and the second access key determined by the distribution network device If the access keys are inconsistent, the identity authentication fails.
  • an identity authentication module 1930 configured to perform the identity authentication with the distribution network device based on the first access key; wherein, If the first access key and the second access key determined by the distribution network device are consistent, the identity authentication is passed; if the first access key and the second access key determined by the distribution network device If the access keys are inconsistent, the identity authentication fails.
  • the beacon includes at least one of the following fields: a BSSID field, an SSID field, and a custom field;
  • the BSSID field includes the key calculation parameter and/or the device identifier of the device to be connected to the network; or,
  • the SSID field includes the key calculation parameter and/or the device identification of the device to be connected to the network; or, the custom field includes the key calculation parameter and/or the device identification of the device to be connected to the network.
  • the key calculation parameter includes a random number.
  • the length of the key calculation parameter is greater than or equal to one byte.
  • the apparatus 1900 further includes: a configuration information receiving module 1940, configured to receive the network configuration information from the distribution network device when the identity authentication is passed, so The network configuration information is used to configure the device to be connected to the network to access the second access point.
  • a configuration information receiving module 1940 configured to receive the network configuration information from the distribution network device when the identity authentication is passed, so The network configuration information is used to configure the device to be connected to the network to access the second access point.
  • the technical solutions provided by the embodiments of this application add a key calculation parameter to the beacon of the access point activated by the device to be connected to the network, and the key calculation parameter is used to determine the relationship between the device to be connected to the network and the network distribution device.
  • the access key for performing identity authentication between devices provides a basis for performing identity authentication between the device to be connected to the network and the device to be deployed on the network, which is helpful for the subsequent realization of identity authentication between the device to be connected to the network and the device to be connected to the network.
  • the identity authentication between the device to be accessed and the network distribution device is performed before the device to access the network obtains the network configuration information, that is, the device to be connected to the network can obtain the network configuration information only when the identity authentication is passed. , thereby reducing the risk of network configuration information leakage and improving the security of the access point.
  • the network device switches the access point back and forth to verify the identity of the device to be connected to the network.
  • the embodiment of the present application simplifies the identity authentication process and improves the identity authentication efficiency.
  • FIG. 21 shows a block diagram of an information processing apparatus provided by an embodiment of the present application.
  • the apparatus has the function of implementing the method example on the side of the distribution network device, and the function may be implemented by hardware, or by executing corresponding software in hardware.
  • the device may be the distribution network equipment described above, or may be set in the distribution network equipment.
  • the apparatus 2100 may include: a beacon receiving module 2110 .
  • a beacon receiving module 2110 configured to receive a beacon of the first access point, where the beacon includes a key calculation parameter and/or a device identifier of the device to be connected to the network, and the key calculation parameter is used to determine the device to be connected to the network An access key for performing identity authentication with the distribution network device.
  • the apparatus 2100 further includes: a first request sending module 2120, configured to send a first obtaining request to the distribution network cloud platform, where the first obtaining request is used to request to obtain the second Access key; the key information receiving module 2130 is configured to receive access key information from the distribution network cloud platform, where the access key information is used to determine the second access key.
  • a first request sending module 2120 configured to send a first obtaining request to the distribution network cloud platform, where the first obtaining request is used to request to obtain the second Access key
  • the key information receiving module 2130 is configured to receive access key information from the distribution network cloud platform, where the access key information is used to determine the second access key.
  • the access key information includes the second access key.
  • the access key information includes a second encryption key; as shown in FIG. 22 , the apparatus 2100 further includes: a second key determination module 2140, configured to use the first encoding method to encrypt the second encryption key.
  • the second encryption key is processed to obtain the second access key.
  • the first acquisition request includes the key calculation parameter and/or the device identifier of the device to be connected to the network.
  • the apparatus 2100 further includes: an identity authentication module 2150, configured to perform the identity authentication with the device to be connected to the network based on the second access key; wherein, If the second access key is consistent with the first access key determined by the device to be connected to the network, the identity authentication is passed; if the second access key and the first access key determined by the device to be connected are the same If the access keys are inconsistent, the identity authentication fails.
  • an identity authentication module 2150 configured to perform the identity authentication with the device to be connected to the network based on the second access key; wherein, If the second access key is consistent with the first access key determined by the device to be connected to the network, the identity authentication is passed; if the second access key and the first access key determined by the device to be connected are the same If the access keys are inconsistent, the identity authentication fails.
  • the beacon includes at least one of the following fields: a BSSID field, an SSID field, and a custom field;
  • the BSSID field includes the key calculation parameter and/or the device identifier of the device to be connected to the network; or,
  • the SSID field includes the key calculation parameter and/or the device identification of the device to be connected to the network; or, the custom field includes the key calculation parameter and/or the device identification of the device to be connected to the network.
  • the key calculation parameter includes a random number.
  • the length of the key calculation parameter is greater than or equal to one byte.
  • the apparatus 2100 further includes: an access module 2160, configured to access the first access point when the identity authentication is passed.
  • the apparatus 2100 further includes: a configuration information sending module 2170, configured to send network configuration information to the device to be connected to the network, where the network configuration information is used to configure the device to be connected to the network Access the second access point.
  • a configuration information sending module 2170 configured to send network configuration information to the device to be connected to the network, where the network configuration information is used to configure the device to be connected to the network Access the second access point.
  • the technical solutions provided by the embodiments of this application add a key calculation parameter to the beacon of the access point activated by the device to be connected to the network, and the key calculation parameter is used to determine the relationship between the device to be connected to the network and the network distribution device.
  • the access key for performing identity authentication between devices provides a basis for performing identity authentication between the device to be connected to the network and the device to be deployed on the network, which is helpful for the subsequent realization of identity authentication between the device to be connected to the network and the device to be connected to the network.
  • the identity authentication between the device to be accessed and the network distribution device is performed before the device to access the network obtains the network configuration information, that is, the device to be connected to the network can obtain the network configuration information only when the identity authentication is passed. , thereby reducing the risk of network configuration information leakage and improving the security of the access point.
  • the network device switches the access point back and forth to verify the identity of the device to be connected to the network.
  • the embodiment of the present application simplifies the identity authentication process and improves the identity authentication efficiency.
  • FIG. 23 shows a block diagram of an information processing apparatus provided by an embodiment of the present application.
  • the apparatus has the function of implementing the above-mentioned method example on the device side to be connected to the network, and the function may be implemented by hardware or by executing corresponding software in hardware.
  • the device may be the device to be connected to the network described above, or may be set in the device to be connected to the network.
  • the apparatus 2300 may include: a first receiving module 2310 .
  • the first receiving module 2310 is configured to receive first information from the distribution network device, where the first information includes a key calculation parameter, and the key calculation parameter is used to determine the first information key.
  • the apparatus 2300 further includes: a first key determination module 2320, configured to determine the first information based on the key calculation parameter and the first device key key.
  • the first key determination module 2320 is configured to: use a fourth key generation algorithm to process the key calculation parameter and the first device key to obtain the first information key.
  • the first information further includes network configuration information encrypted with a second information key, where the network configuration information is used to configure the device to be connected to the network to access the second access point; as shown in FIG. 24 , the apparatus 2300 further includes: a first decryption module 2330, configured to use the first information key to decrypt the network configuration information encrypted with the second information key; If the second information key is the same, the device to be connected to the network successfully obtains the network configuration information; if the first information key and the second information key are inconsistent, the device to be connected to the network obtains the network configuration information. The network configuration information failed.
  • the apparatus 2300 further includes: a first encryption module 2340, configured to obtain the first encrypted information according to the first information key and the first reference information; send the first information Module 2350, configured to send the first encrypted information to the network distribution device.
  • a first encryption module 2340 configured to obtain the first encrypted information according to the first information key and the first reference information
  • send the first information Module 2350 configured to send the first encrypted information to the network distribution device.
  • the first encryption module 2340 is configured to: use a third encryption algorithm and the first information key to process the first reference information to obtain the first reference information Encrypted information.
  • the first information further includes second information encrypted with a second information key; as shown in FIG. 24 , the apparatus 2300 further includes: a second decryption module 2360, configured to use the first decryption module 2360 The information key decrypts the second information encrypted with the second information key to obtain third reference information; a third information sending module 2370 is configured to send the third reference information to the distribution network device.
  • the key calculation parameter includes a random number.
  • the length of the key calculation parameter is greater than or equal to one byte.
  • the key calculation parameters are sent to the device to be connected to the network through the network distribution device, and the key calculation parameters are used to calculate the information key, and the information key can be used for decryption using the device.
  • the data encrypted by the information key calculated by the cloud platform or the network configuration information encrypted by the information key calculated by the device cloud platform can also be used to encrypt the reference information.
  • the device to be connected can successfully parse the network configuration information or data encrypted with the information key calculated by the device cloud platform, and then the device to be connected to the network can successfully parse the network configuration information or data encrypted by the information key calculated by the device cloud platform.
  • identity authentication the network configuration information can be further obtained; or, in the case where the information key calculated by the device to be connected to the network is consistent with the information key calculated by the device cloud platform, the data obtained by encrypting the two information keys respectively can be used. Consistency is achieved, and then the device to be connected to the network passes identity authentication and further obtains network configuration information. Therefore, in the embodiment of the present application, the identity of the device to be accessed is authenticated before the device to access the wireless access point, so as to avoid leakage of network configuration information corresponding to the wireless access point, and improve the security of the wireless access point.
  • the identity authentication process of the device to be connected to the network can be coupled with the network distribution process, that is, the network distribution device directly encrypts the network configuration information with the information key calculated by the device cloud platform, and the information calculated by the device to be connected to the network is encrypted.
  • the device to be connected to the network can directly obtain the network configuration information, which reduces the data exchange between the network distribution device and the device to be connected to the network, and reduces the number of distribution devices and the device to be connected to the network. processing overhead.
  • the identity authentication process of the device to be connected to the network can also be decoupled from the network distribution process, that is, after the identity authentication of the device to be connected to the network is passed, the network distribution device sends the network configuration information to the device to be connected to the network.
  • the decoupling of the identity authentication process and the distribution network process can fully improve the security of network configuration information.
  • FIG. 25 shows a block diagram of an information processing apparatus provided by an embodiment of the present application.
  • the apparatus has the function of implementing the method example on the side of the distribution network device, and the function may be implemented by hardware, or by executing corresponding software in hardware.
  • the device may be the distribution network equipment described above, or may be set in the distribution network equipment.
  • the apparatus 2500 may include: a first sending module 2510 .
  • the first sending module 2510 is configured to send first information to the device to be connected to the network, where the first information includes a key calculation parameter, and the key calculation parameter is used to determine the first information key.
  • the first information further includes network configuration information encrypted with a second information key, where the network configuration information is used to configure the device to be connected to the network to access the second access point; as shown in FIG. 26 .
  • the apparatus 2500 further includes: a first receiving module 2520 for receiving the key calculation parameter and the second information key from the distribution network cloud platform; a second determining module 2530 for The key calculation parameter, the second information key, and the network configuration information determine the first information.
  • the second determining module 2530 is configured to: use the fourth encryption algorithm and the second information key to process the network configuration information, and obtain the network configuration information encrypted with an information key; the first information is determined based on the key calculation parameter and the network configuration information encrypted with the second information key.
  • the apparatus 2500 further includes: a first information receiving module 2540, configured to receive first encrypted information from the device to be connected to the network, where the first encrypted information includes using the The first reference information encrypted by the first information key; the second information receiving module 2550 is used to receive the second encrypted information from the distribution network cloud platform, and the second encrypted information includes the encrypted information encrypted with the second information key. Second reference information; a configuration information sending module 2560, configured to send network configuration information to the device to be connected to the network when the first encrypted information and the second encrypted information are consistent, where the network configuration information is used for Configure the device to be connected to the network to access the second access point.
  • the apparatus 2500 further includes: a third information receiving module 2570, configured to receive the third reference information from the distribution network device; a fourth information receiving module 2580, It is used to receive the fourth reference information from the distribution network cloud platform; the configuration information sending module 2560 is used to send the network to the device to be connected to the network when the third reference information and the fourth reference information are consistent Configuration information, where the network configuration information is used to configure the device to be connected to the network to access the second access point.
  • a third information receiving module 2570 configured to receive the third reference information from the distribution network device
  • a fourth information receiving module 2580 It is used to receive the fourth reference information from the distribution network cloud platform
  • the configuration information sending module 2560 is used to send the network to the device to be connected to the network when the third reference information and the fourth reference information are consistent Configuration information, where the network configuration information is used to configure the device to be connected to the network to access the second access point.
  • the key calculation parameter includes a random number.
  • the length of the key calculation parameter is greater than or equal to one byte.
  • the key calculation parameters are sent to the device to be connected to the network through the network distribution device, and the key calculation parameters are used to calculate the information key, and the information key can be used for decryption using the device.
  • the data encrypted by the information key calculated by the cloud platform or the network configuration information encrypted by the information key calculated by the device cloud platform can also be used to encrypt the reference information.
  • the device to be connected can successfully parse the network configuration information or data encrypted with the information key calculated by the device cloud platform, and then the device to be connected to the network can successfully parse the network configuration information or data encrypted by the information key calculated by the device cloud platform.
  • identity authentication the network configuration information can be further obtained; or, in the case where the information key calculated by the device to be connected to the network is consistent with the information key calculated by the device cloud platform, the data obtained by encrypting the two information keys respectively can be used. Consistency is achieved, and then the device to be connected to the network passes identity authentication and further obtains network configuration information. Therefore, in the embodiment of the present application, the identity of the device to be accessed is authenticated before the device to access the wireless access point, so as to avoid leakage of network configuration information corresponding to the wireless access point, and improve the security of the wireless access point.
  • the identity authentication process of the device to be connected to the network can be coupled with the network distribution process, that is, the network distribution device directly encrypts the network configuration information with the information key calculated by the device cloud platform, and the information calculated by the device to be connected to the network is encrypted.
  • the device to be connected to the network can directly obtain the network configuration information, which reduces the data exchange between the network distribution device and the device to be connected to the network, and reduces the number of distribution devices and the device to be connected to the network. processing overhead.
  • the identity authentication process of the device to be connected to the network can also be decoupled from the network distribution process, that is, after the identity authentication of the device to be connected to the network is passed, the network distribution device sends the network configuration information to the device to be connected to the network.
  • the decoupling of the identity authentication process and the distribution network process can fully improve the security of network configuration information.
  • FIG. 27 shows a block diagram of an information processing apparatus provided by an embodiment of the present application.
  • the apparatus has the function of implementing the above-mentioned method example on the device side to be connected to the network, and the function may be implemented by hardware or by executing corresponding software in hardware.
  • the device may be the device to be connected to the network described above, or may be set in the device to be connected to the network.
  • the apparatus 2700 may include: a first display module 2710 .
  • the first display module 2710 is used to display a first graphic code, where the first graphic code includes a key calculation parameter and/or the device identification of the device to be connected to the network, and the key calculation parameter is used to determine the information decryption key , the information decryption key is used to decrypt the network configuration information from the network configuration device, and the network configuration information is used to configure the device to be connected to the network to access the second access point.
  • the apparatus 2700 further includes: a decryption key determination module 2720, configured to determine the information decryption key based on the key calculation parameter and the first device key.
  • the decryption key determination module 2720 is configured to: use the second key generation algorithm to process the key calculation parameter and the first device key to obtain the information decryption key.
  • the apparatus 2700 further includes: a first scanning module 2730, configured to scan a second graphic code displayed by the network distribution device, where the second graphic code includes using an information encryption password The network configuration information encrypted with the key; wherein, in the case that the information decryption key and the information encryption key are consistent, the device to be connected to the network successfully obtains the network configuration information; When the information encryption key is inconsistent with the information encryption key, the device to be connected to the network fails to acquire the network configuration information.
  • a first scanning module 2730 configured to scan a second graphic code displayed by the network distribution device, where the second graphic code includes using an information encryption password The network configuration information encrypted with the key; wherein, in the case that the information decryption key and the information encryption key are consistent, the device to be connected to the network successfully obtains the network configuration information; When the information encryption key is inconsistent with the information encryption key, the device to be connected to the network fails to acquire the network configuration information.
  • the key calculation parameter includes a random number.
  • the key calculation parameter is preconfigured by a device cloud platform; or, the key calculation parameter is generated by the device to be connected to the network.
  • the length of the key calculation parameter is greater than or equal to one byte.
  • the device to be connected to the network can use the key calculation parameter to determine the information decryption key, and the network distribution device uses the key calculation parameter to determine the decryption key.
  • the key calculation parameter can obtain the information encryption key, and then the device to be connected to the network can use the information decryption key to decrypt the network configuration information encrypted by the distribution device using the information encryption key.
  • FIG. 29 shows a block diagram of an information processing apparatus provided by an embodiment of the present application.
  • the apparatus has the function of implementing the method example on the side of the distribution network device, and the function may be implemented by hardware, or by executing corresponding software in hardware.
  • the device may be the distribution network equipment described above, or may be set in the distribution network equipment.
  • the apparatus 2900 may include: a second scanning module 2910 .
  • the second scanning module 2910 is configured to scan the first graphic code of the device to be connected to the network, where the first graphic code includes a key calculation parameter and/or the device identifier of the device to be connected to the network, and the key calculation parameter is used to determine An information encryption key, where the information encryption key is used to encrypt network configuration information, and the network configuration information is used to configure the device to be connected to the network to access the second access point.
  • the apparatus 2900 further includes: a second request sending module 2920, configured to send a second obtaining request to the distribution network cloud platform, where the second obtaining request is used to request to obtain the Information encryption key; encryption key receiving module 2930, configured to receive the information encryption key from the distribution network cloud platform.
  • a second request sending module 2920 configured to send a second obtaining request to the distribution network cloud platform, where the second obtaining request is used to request to obtain the Information encryption key
  • encryption key receiving module 2930 configured to receive the information encryption key from the distribution network cloud platform.
  • the second acquisition request includes the key calculation parameter and/or the device identifier of the device to be connected to the network.
  • the apparatus 2900 further includes: a graphic code determination module 2940, configured to determine a second graphic code based on the network configuration information and the information encryption key; a second display module 2950, for displaying the second graphic code.
  • the graphic code determination module 2940 is configured to: use the first encryption algorithm and the information encryption key to process the network configuration information to obtain encrypted network configuration information ; Generate the second graphic code according to the encrypted network configuration information.
  • the key calculation parameter includes a random number.
  • the key calculation parameter is preconfigured by a device cloud platform; or, the key calculation parameter is generated by the device to be connected to the network.
  • the length of the key calculation parameter is greater than or equal to one byte.
  • the device to be connected to the network can use the key calculation parameter to determine the information decryption key, and the network distribution device uses the key calculation parameter to determine the decryption key.
  • the key calculation parameter can obtain the information encryption key, and then the device to be connected to the network can use the information decryption key to decrypt the network configuration information encrypted by the distribution device using the information encryption key.
  • FIG. 31 shows a block diagram of an information processing apparatus provided by an embodiment of the present application.
  • the apparatus has the function of implementing the above-mentioned method example on the device side to be connected to the network, and the function may be implemented by hardware or by executing corresponding software in hardware.
  • the device may be the device to be connected to the network described above, or may be set in the device to be connected to the network.
  • the apparatus 3100 may include: a third scanning module 3110 .
  • the third scanning module 3110 is configured to scan the third graphic code displayed by the network distribution device, where the third graphic code includes the network configuration information and key calculation parameters encrypted by the information encryption key; In order to configure the device to be connected to the network to access the second access point, the key calculation parameter is used to determine the information decryption key, and the information decryption key is used to decrypt the network configuration information encrypted with the information encryption key. .
  • the apparatus 3100 further includes: a decryption key determination module 3120, configured to determine the information decryption key based on the key calculation parameter and the first device key.
  • the decryption key determination module 3120 is configured to: use a third key generation algorithm to process the key calculation parameter and the first device key to obtain the information decryption key.
  • the device to be connected to the network succeeds in acquiring the network configuration information; If the keys are inconsistent, the device to be connected to the network fails to acquire the network configuration information.
  • the key calculation parameter includes a random number.
  • the length of the key calculation parameter is greater than or equal to one byte.
  • the technical solutions provided by the embodiments of the present application add key calculation parameters and network configuration information encrypted by the information encryption key to the graphic code displayed by the network distribution device, and then the device to be connected to the network scans the graphic code, that is, The key calculation parameter can be obtained, so that the information decryption key can be determined according to the key calculation parameter. Only when the information encryption key and the information decryption key are the same, the device to be connected to the network can obtain the network configuration information, thus realizing the need to access the network. The identity of the device is authenticated to avoid leakage of network configuration information.
  • the technical solution provided by the embodiment of the present application can further improve the security of the key calculation parameter.
  • FIG. 33 shows a block diagram of an information processing apparatus provided by an embodiment of the present application.
  • the apparatus has the function of implementing the method example on the side of the distribution network device, and the function may be implemented by hardware, or by executing corresponding software in hardware.
  • the device may be the distribution network equipment described above, or may be set in the distribution network equipment.
  • the apparatus 3300 may include: a third display module 3310 .
  • the third display module 3310 is configured to display a third graphic code, where the third graphic code includes network configuration information and key calculation parameters encrypted with an information encryption key; wherein the network configuration information is used to configure the device to be connected to the network The second access point is accessed, and the key calculation parameter is used to determine an information decryption key, and the information decryption key is used to decrypt the network configuration information encrypted with the information encryption key.
  • the apparatus 3300 further includes: an information receiving module 3320, configured to receive the information encryption key, the key calculation parameter and the network from the distribution network cloud platform Configuration information; a graphic code determination module 3330, configured to determine the third graphic code based on the information encryption key, the key calculation parameter and the network configuration information.
  • the graphic code determination module 3330 is configured to: use the second encryption algorithm and the information encryption key to process the network configuration information, and obtain the information encryption key using the information encryption key. key-encrypted network configuration information; the third graphic code is generated based on the network configuration information encrypted with the information encryption key and the key calculation parameter.
  • the key calculation parameter includes a random number.
  • the length of the key calculation parameter is greater than or equal to one byte.
  • the technical solutions provided by the embodiments of the present application add key calculation parameters and network configuration information encrypted by the information encryption key to the graphic code displayed by the network distribution device, and then the device to be connected to the network scans the graphic code, that is, The key calculation parameter can be obtained, so that the information decryption key can be determined according to the key calculation parameter. Only when the information encryption key and the information decryption key are the same, the device to be connected to the network can obtain the network configuration information, thus realizing the need to access the network. The identity of the device is authenticated to avoid leakage of network configuration information.
  • the technical solution provided by the embodiment of the present application can further improve the security of the key calculation parameter.
  • the device provided in the above embodiment realizes its functions, only the division of the above functional modules is used as an example for illustration. In practical applications, the above functions can be allocated to different functional modules according to actual needs. That is, the content structure of the device is divided into different functional modules to complete all or part of the functions described above.
  • FIG. 35 shows a schematic structural diagram of a device to be connected to a network 350 provided by an embodiment of the present application.
  • the device to be connected to a network can be used to execute the above-mentioned method for processing information of a device to be connected to a network.
  • the device 350 to be connected to the network may include: a processor 351, and a transceiver 352 connected to the processor 351; wherein:
  • the processor 351 includes one or more processing cores, and the processor 351 executes various functional applications and information processing by running software programs and modules.
  • Transceiver 352 includes a receiver and a transmitter.
  • transceiver 352 is a communication chip.
  • the device 350 to be connected to the network further includes: a memory and a bus.
  • the memory is connected to the processor through a bus.
  • the memory can be used to store a computer program, and the processor is used to execute the computer program, so as to implement each step performed by the device to be connected to the network in the foregoing method embodiments.
  • volatile or non-volatile storage devices include but are not limited to: RAM (Random-Access Memory, random access memory) and ROM (Read-Only Memory), EPROM (Erasable Programmable Read-Only Memory, Erasable Programmable Read-Only Memory), EEPROM (Electrically Erasable Programmable Read-Only Memory, Electrically Erasable Programmable Read-Only Memory) ), flash memory or other solid-state storage technology, CD-ROM (Compact Disc Read-Only Memory), DVD (Digital Video Disc, high-density digital video disc) or other optical storage, tape cassettes, tapes, disk storage or other magnetic storage devices. in:
  • the transceiver 352 is configured to broadcast the beacon of the first access point, and the beacon includes key calculation parameters and/or the device identifier of the device to be connected to the network, so The key calculation parameter is used to determine the access key for performing identity authentication between the device to be connected to the network and the network distribution device.
  • the processor 351 is configured to: determine the first access key based on the key calculation parameter and the first device key.
  • the processor 351 is configured to: use a first key generation algorithm to process the key calculation parameter and the first device key to obtain a first encryption key; use a first encoding The first encryption key is processed in a manner to obtain the first access key.
  • the processor 351 is configured to: perform the identity authentication with the distribution network device based on the first access key; wherein, between the first access key and the If the second access key determined by the distribution network device is consistent, the identity authentication is passed; if the first access key and the second access key determined by the distribution network device are inconsistent, the identity authentication Authentication failed.
  • the beacon includes at least one of the following fields: a BSSID field, an SSID field, and a custom field;
  • the BSSID field includes the key calculation parameter and/or the device identifier of the device to be connected to the network; or,
  • the SSID field includes the key calculation parameter and/or the device identification of the device to be connected to the network; or, the custom field includes the key calculation parameter and/or the device identification of the device to be connected to the network.
  • the key calculation parameter includes a random number.
  • the length of the key calculation parameter is greater than or equal to one byte.
  • the transceiver 352 is configured to: when the identity authentication is passed, receive network configuration information from the network configuration device, where the network configuration information is used to configure the device to be connected to the network Access the second access point.
  • the processor 351 is configured to display a first graphic code, where the first graphic code includes a key calculation parameter and/or a device identifier of the device to be connected to the network, the password
  • the key calculation parameter is used to determine the information decryption key
  • the information decryption key is used to decrypt the network configuration information from the network configuration device
  • the network configuration information is used to configure the device to be connected to the network to access the second access point .
  • the processor 351 is configured to: determine the information decryption key based on the key calculation parameter and the first device key.
  • the processor 351 is configured to: use a second key generation algorithm to process the key calculation parameter and the first device key to obtain the information decryption key.
  • the processor 351 is configured to: scan a second graphic code displayed by the network configuration device, where the second graphic code includes the network configuration information encrypted with an information encryption key; wherein, in When the information decryption key and the information encryption key are consistent, the device to be connected to the network succeeds in acquiring the network configuration information; when the information decryption key and the information encryption key are inconsistent, The device to be connected to the network fails to acquire the network configuration information.
  • the key calculation parameter includes a random number.
  • the key calculation parameter is preconfigured by a device cloud platform; or, the key calculation parameter is generated by the device to be connected to the network.
  • the length of the key calculation parameter is greater than or equal to one byte.
  • the processor 351 is configured to scan a third graphic code displayed by the network configuration device, where the third graphic code includes the network configuration information encrypted by the information encryption key and the key calculation parameters; wherein, the network configuration information is used to configure the device to be connected to the network to access the second access point, the key calculation parameter is used to determine an information decryption key, and the information decryption key is used to decrypt the Network configuration information encrypted with an information encryption key.
  • the processor 351 is further configured to: determine the information decryption key based on the key calculation parameter and the first device key.
  • the processor 351 is further configured to: use a third key generation algorithm to process the key calculation parameter and the first device key to obtain the information decryption key.
  • the device to be connected to the network succeeds in acquiring the network configuration information; If the keys are inconsistent, the device to be connected to the network fails to acquire the network configuration information.
  • the key calculation parameter includes a random number.
  • the length of the key calculation parameter is greater than or equal to one byte.
  • the transceiver 352 is configured to receive first information from a distribution network device, where the first information includes key calculation parameters and second information encrypted with an information encryption key , the key calculation parameter is used to determine the information decryption key, and the information decryption key is used to decrypt the second information encrypted with the information encryption key.
  • the processor 351 is configured to: determine the information decryption key based on the key calculation parameter and the first device key.
  • the processor 351 is configured to: use a fourth key generation algorithm to process the key calculation parameter and the first device key to obtain the information decryption key.
  • the second information includes first reference information
  • the processor 351 is configured to use the information decryption key to decrypt the second information encrypted with the information encryption key to obtain the first reference information. reference information
  • the transceiver 352 is configured to receive network configuration information from the distribution network device when the first reference information and the second reference information are consistent, where the network configuration information is used to configure all The device to be connected to the network accesses the second access point.
  • the second information includes network configuration information
  • the network configuration information is used to configure the device to be connected to the network to access the second access point; between the information encryption key and the information decryption key If they are consistent, the device to be connected to the network succeeds in acquiring the network configuration information; if the information encryption key and the information decryption key are inconsistent, the device to be connected to the network fails to obtain the network configuration information.
  • the key calculation parameter includes a random number.
  • the length of the key calculation parameter is greater than or equal to one byte.
  • FIG. 36 shows a schematic structural diagram of a distribution network device 360 provided by an embodiment of the present application.
  • the distribution network device can be used to execute the above-mentioned method for processing information on the distribution network device side.
  • the network distribution device 360 may include: a processor 361, and a transceiver 362 connected to the processor 361; wherein:
  • the processor 361 includes one or more processing cores, and the processor 361 executes various functional applications and information processing by running software programs and modules.
  • Transceiver 362 includes a receiver and a transmitter.
  • transceiver 362 is a communication chip.
  • the distribution network device 360 further includes: a memory and a bus.
  • the memory is connected to the processor through a bus.
  • the memory can be used to store a computer program, and the processor is used to execute the computer program, so as to implement each step performed by the distribution network device in the above method embodiments.
  • the memory may be implemented by any type or combination of volatile or non-volatile storage devices including, but not limited to: RAM and ROM, EPROM, EEPROM, flash memory or other Solid-state storage technology, CD-ROM, DVD or other optical storage, tape cartridges, magnetic tape, magnetic disk storage or other magnetic storage devices. in:
  • the transceiver 362 is configured to receive a beacon of the first access point, where the beacon includes a key calculation parameter and/or a device identifier of a device to be connected to the network, the key The key calculation parameter is used to determine the access key for performing identity authentication between the device to be connected to the network and the network distribution device.
  • the transceiver 362 is configured to: send a first acquisition request to the distribution network cloud platform, where the first acquisition request is used to request to acquire a second access key; receive data from the distribution network cloud platform access key information, the access key information is used to determine the second access key.
  • the access key information includes the second access key.
  • the processor 361 is configured to: process the second encryption key in a first encoding manner to obtain the second access key.
  • the first acquisition request includes the key calculation parameter and/or the device identifier of the device to be connected to the network.
  • the processor 361 is configured to: perform the identity authentication with the device to be networked based on the second access key; wherein, between the second access key and the If the first access key determined by the device to be connected is consistent, the identity authentication is passed; if the second access key and the first access key determined by the device to be connected are inconsistent, the identity authentication Authentication failed.
  • the beacon includes at least one of the following fields: a BSSID field, an SSID field, and a custom field;
  • the BSSID field includes the key calculation parameter and/or the device identifier of the device to be connected to the network; or,
  • the SSID field includes the key calculation parameter and/or the device identification of the device to be connected to the network; or, the custom field includes the key calculation parameter and/or the device identification of the device to be connected to the network.
  • the key calculation parameter includes a random number.
  • the length of the key calculation parameter is greater than or equal to one byte.
  • the processor 361 is configured to: access the first access point when the identity authentication is passed.
  • the transceiver 362 is configured to: send network configuration information to the device to be connected to the network, where the network configuration information is used to configure the device to be connected to the network to access the second access point.
  • the processor 361 is configured to scan the first graphic code of the device to be connected to the network, where the first graphic code includes a key calculation parameter and/or the device identifier of the device to be connected to the network , the key calculation parameter is used to determine an information encryption key, and the information encryption key is used to encrypt network configuration information, and the network configuration information is used to configure the device to be connected to the network to access the second access point.
  • the transceiver 362 is configured to: send a second acquisition request to the distribution network cloud platform, where the second acquisition request is used to request to acquire the information encryption key; receive data from the distribution network cloud The information encryption key of the platform.
  • the second acquisition request includes the key calculation parameter and/or the device identifier of the device to be connected to the network.
  • the processor 361 is configured to: determine a second graphic code based on the network configuration information and the information encryption key; and display the second graphic code.
  • the processor 361 is configured to: use the first encryption algorithm and the information encryption key to process the network configuration information to obtain encrypted network configuration information; The configuration information generates the second graphic code.
  • the key calculation parameter includes a random number.
  • the key calculation parameter is preconfigured by a device cloud platform; or, the key calculation parameter is generated by the device to be connected to the network.
  • the length of the key calculation parameter is greater than or equal to one byte.
  • the processor 361 is configured to display a third graphic code, where the third graphic code includes network configuration information and key calculation parameters encrypted with an information encryption key;
  • the network configuration information is used to configure the device to be connected to the second access point, the key calculation parameter is used to determine the information decryption key, and the information decryption key is used to decrypt the encrypted data using the information encryption key.
  • Network configuration information is used to display a third graphic code, where the third graphic code includes network configuration information and key calculation parameters encrypted with an information encryption key;
  • the network configuration information is used to configure the device to be connected to the second access point, the key calculation parameter is used to determine the information decryption key, and the information decryption key is used to decrypt the encrypted data using the information encryption key.
  • the processor 361 is further configured to: receive the information encryption key, the key calculation parameter and the network configuration information from the distribution network cloud platform; encrypt the key based on the information , the key calculation parameter and the network configuration information to determine the third graphic code.
  • the processor 361 is further configured to: use the second encryption algorithm and the information encryption key to process the network configuration information to obtain the network configuration information encrypted with the information encryption key;
  • the third graphic code is generated based on the network configuration information encrypted with the information encryption key and the key calculation parameter.
  • the key calculation parameter includes a random number.
  • the length of the key calculation parameter is greater than or equal to one byte.
  • the transceiver 362 is configured to send first information to the device to be connected to the network, where the first information includes a key calculation parameter and second information encrypted with an information encryption key, where The key calculation parameter is used to determine an information decryption key, and the information decryption key is used to decrypt the second information encrypted with the information encryption key.
  • the second information includes first reference information; the method further includes: the transceiver 362, configured to receive the key calculation parameter and the encryption of the adopted information from the distribution network cloud platform second information encrypted with a key; the processor 361 is configured to determine the first information based on the key calculation parameter and the second information encrypted with an information encryption key.
  • the second information includes network configuration information, and the network configuration information is used to configure the device to be connected to the network to access the second access point;
  • the transceiver 362 is configured to receive information from the distribution network cloud the key calculation parameter and the information encryption key of the platform;
  • the processor 361 is configured to determine the first key calculation parameter based on the key calculation parameter, the information encryption key and the network configuration information information.
  • the processor 361 is configured to: use a third encryption algorithm and the information encryption key to process the network configuration information to obtain the network configuration information encrypted with the information encryption key;
  • the key calculation parameter and the network configuration information encrypted with the information encryption key determine the first information.
  • the key calculation parameter includes a random number.
  • the length of the key calculation parameter is greater than or equal to one byte.
  • Embodiments of the present application further provide a computer-readable storage medium, where a computer program is stored in the storage medium, and the computer program is used to be executed by the processor of the device to be connected to the network, so as to realize the information processing on the device to be connected to the network as described above. method.
  • Embodiments of the present application further provide a computer-readable storage medium, where a computer program is stored in the storage medium, and the computer program is used to be executed by a processor of a distribution network device, so as to realize the above-mentioned information processing on the network distribution device side method.
  • An embodiment of the present application further provides a chip, the chip includes a programmable logic circuit and/or program instructions, and when the chip runs on the device to be connected to the network, it is used to implement the above-mentioned method for processing information on the device to be connected to the network.
  • An embodiment of the present application further provides a chip, the chip includes a programmable logic circuit and/or program instructions, and when the chip runs on a distribution network device, it is used to implement the above-mentioned method for processing information on the distribution network device side.
  • the embodiment of the present application further provides a computer program product, which is used to implement the above-mentioned method for processing information on the device to be connected to the network when the computer program product runs on the device to be connected to the network.
  • the embodiment of the present application also provides a computer program product, which is used to implement the above-mentioned method for processing information on the distribution network device side when the computer program product runs on the distribution network device.
  • Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another.
  • a storage medium can be any available medium that can be accessed by a general purpose or special purpose computer.

Abstract

Embodiments of the present application relate to the technical field of communications, and provide an information processing method and apparatus, a device and a storage medium. The method comprises: a device that is to access a network broadcasts a beacon of a first access point, the beacon comprising a key calculation parameter and/or a device identifier of said device, and the key calculation parameter being used for determining an access key for performing identity authentication between said device and a distribution network device; and the distribution network device receives the beacon of the first access point. According to the embodiments of the present application, a key calculation parameter is added to the beacon of the access point started by the device that is to access a network, and the key calculation parameter is used for determining an access key for performing identity authentication between said device and a distribution network device, thereby providing a basis for performing the identity authentication between said device and the distribution network device, and facilitating the implementation of the identity authentication between said device and the distribution network device.

Description

信息处理方法、装置、设备及存储介质Information processing method, apparatus, equipment and storage medium
本申请要求于2020年09月06日提交的申请号为202010925363.1、发明名称为“信息处理方法、装置、设备及存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims the priority of the Chinese patent application with the application number 202010925363.1 and the invention title "Information Processing Method, Apparatus, Equipment and Storage Medium" filed on September 6, 2020, the entire contents of which are incorporated into this application by reference .
技术领域technical field
本申请实施例涉及通信技术领域,特别涉及一种信息处理方法、装置、设备及存储介质。The embodiments of the present application relate to the field of communication technologies, and in particular, to an information processing method, apparatus, device, and storage medium.
背景技术Background technique
智能设备(Intelligent Device)包括具备计算能力和处理能力的设备、器械以及机器等。通常情况下,在第一次使用智能设备或者在更换智能设备的使用场景(如将智能设备从一个网络环境更换至另一个网络环境中使用)等情况下,需要对智能设备进行配网,以使得智能设备连接至网络,进而通过网络实现对智能设备的控制。Intelligent devices include devices, instruments, and machines with computing and processing capabilities. Usually, in the case of using a smart device for the first time or in the usage scenario of replacing the smart device (such as replacing the smart device from one network environment to another network environment), it is necessary to configure the network for the smart device. The smart device is connected to the network, and then the smart device is controlled through the network.
相关技术提供了多种配置智能设备入网的方法,主要包括:软AP(Access Point,接入点)配网(以下称为“soft AP配网”)和扫码配网。soft AP配网的主要流程如下:智能设备开启soft AP,并广播soft AP的信标(beacon);配网设备在扫描到该soft AP的信标后,加入该soft AP;通过soft AP,配网设备可以向智能设备发送需要接入的AP的网络配置信息,之后,智能设备关闭soft AP,并根据该网络配置信息接入AP,进而完成配网过程。扫码配网的主要流程如下:配网设备将需要接入的AP的网络配置信息以二维码的形式显示;智能设备扫描配网设备显示的二维码,以获取网络配置信息,之后根据该网络配置信息接入AP,完成配网过程。The related art provides a variety of methods for configuring smart devices to access the network, mainly including: soft AP (Access Point, access point) distribution network (hereinafter referred to as "soft AP distribution network") and scanning code distribution network. The main process of soft AP distribution network is as follows: the smart device turns on the soft AP and broadcasts the soft AP's beacon; the distribution network device joins the soft AP after scanning the soft AP's beacon; The network device can send the network configuration information of the AP to be accessed to the smart device. After that, the smart device closes the soft AP and accesses the AP according to the network configuration information, thereby completing the network configuration process. The main process of scanning the code to configure the network is as follows: the network configuration device displays the network configuration information of the AP that needs to be connected in the form of a QR code; the smart device scans the QR code displayed by the network configuration device to obtain the network configuration information, and then according to The network configuration information is connected to the AP to complete the network configuration process.
然而,上述配网的流程并不涉及对智能设备的身份认证,从而极有可能出现仿冒的智能设备获取到AP的网络配置信息,导致AP的网络配置信息泄露,对AP的安全性造成极大威胁。因此,如何实现对智能设备的身份认证,以提升AP的安全性,还需要进一步地讨论和研究。However, the above-mentioned network configuration process does not involve the identity authentication of the smart device, so it is very likely that a counterfeit smart device can obtain the network configuration information of the AP, which will lead to the leakage of the network configuration information of the AP, which will greatly affect the security of the AP. threat. Therefore, how to realize the identity authentication of the smart device to improve the security of the AP needs further discussion and research.
发明内容SUMMARY OF THE INVENTION
本申请实施例提供了一种信息处理方法、装置、设备及存储介质。所述技术方案如下:Embodiments of the present application provide an information processing method, apparatus, device, and storage medium. The technical solution is as follows:
一方面,本申请实施例提供了一种信息处理方法,应用于待入网设备中,所述方法包括:On the one hand, an embodiment of the present application provides an information processing method, which is applied to a device to be connected to a network, and the method includes:
广播第一接入点的信标,所述信标中包括密钥计算参数和/或所述待入网设备的设备标识,所述密钥计算参数用于确定所述待入网设备和配网设备之间执行身份认证的访问密钥。Broadcast the beacon of the first access point, the beacon includes key calculation parameters and/or the device identifier of the device to be connected to the network, and the key calculation parameter is used to determine the device to be connected to the network and the network distribution device The access key to perform authentication between.
另一方面,本申请实施例提供了一种信息处理方法,应用于配网设备中,所述方法包括:On the other hand, an embodiment of the present application provides an information processing method, which is applied to a distribution network device, and the method includes:
接收第一接入点的信标,所述信标中包括密钥计算参数和/或待入网设备的设备标识,所述密钥计算参数用于确定待入网设备和所述配网设备之间执行身份认证的访问密钥。Receive a beacon of the first access point, the beacon includes a key calculation parameter and/or a device identifier of the device to be connected to the network, and the key calculation parameter is used to determine the relationship between the device to be connected to the network and the network distribution device The access key to perform authentication.
再一方面,本申请实施例提供了一种信息处理方法,应用于待入网设备中,所述方法包括:In another aspect, an embodiment of the present application provides an information processing method, which is applied to a device to be connected to a network, and the method includes:
显示第一图形码,所述第一图形码包括密钥计算参数和/或所述待入网设备的设备标识,所述密钥计算参数用于确定信息解密密钥,所述信息解密密钥用于解密来自于配网设备的网络配置信息,所述网络配置信息用于配置所述待入网设备接入第二接入点。A first graphic code is displayed, and the first graphic code includes a key calculation parameter and/or the device identification of the device to be connected to the network, and the key calculation parameter is used to determine the information decryption key, and the information decryption key is used to decrypt the network configuration information from the network configuration device, the network configuration information is used to configure the device to be connected to the network to access the second access point.
又一方面,本申请实施例提供了一种信息处理方法,应用于配网设备中,所述方法包括:In another aspect, an embodiment of the present application provides an information processing method, which is applied to a distribution network device, and the method includes:
扫描待入网设备的第一图形码,所述第一图形码包括密钥计算参数和/或所述待入网设备的设备标识,所述密钥计算参数用于确定信息加密密钥,所述信息加密密钥用于加密网络配置信息,所述网络配置信息用于配置所述待入网设备接入第二接入点。Scan the first graphic code of the device to be connected to the network, the first graphic code includes a key calculation parameter and/or the device identification of the device to be connected to the network, the key calculation parameter is used to determine the information encryption key, the information The encryption key is used to encrypt network configuration information, and the network configuration information is used to configure the device to be connected to the network to access the second access point.
还一方面,本申请实施例提供了一种信息处理方法,应用于待入网设备中,所述方法包括:In another aspect, an embodiment of the present application provides an information processing method, which is applied to a device to be connected to a network, and the method includes:
扫描配网设备显示的第三图形码,所述第三图形码包括采用信息加密密钥加密的网络配置信息和密钥计算参数;Scan the third graphic code displayed by the distribution network device, where the third graphic code includes the network configuration information and key calculation parameters encrypted with the information encryption key;
其中,所述网络配置信息用于配置所述待入网设备接入第二接入点,所述密钥计算参数用于确定信息解密密钥,所述信息解密密钥用于解密所述采用信息加密密钥加密的网络配置信息。Wherein, the network configuration information is used to configure the device to be connected to the network to access the second access point, the key calculation parameter is used to determine an information decryption key, and the information decryption key is used to decrypt the adoption information Encryption key encrypted network configuration information.
还一方面,本申请实施例提供了一种信息处理方法,应用于配网设备中,所述方法包括:In another aspect, an embodiment of the present application provides an information processing method, which is applied to a distribution network device, and the method includes:
显示第三图形码,所述第三图形码包括采用信息加密密钥加密的网络配置信息和密钥计算参数;Displaying a third graphic code, the third graphic code includes network configuration information and key calculation parameters encrypted with an information encryption key;
其中,所述网络配置信息用于配置待入网设备接入第二接入点,所述密钥计算参数用于确定信息解密密钥,所述信息解密密钥用于解密所述采用信息加密密钥加密的网络配置信息。Wherein, the network configuration information is used to configure the device to be connected to the network to access the second access point, the key calculation parameter is used to determine the information decryption key, and the information decryption key is used to decrypt the information encryption key using the information encryption key. key-encrypted network configuration information.
还一方面,本申请实施例提供了一种信息处理方法,应用于待入网设备中,所述方法包括:In another aspect, an embodiment of the present application provides an information processing method, which is applied to a device to be connected to a network, and the method includes:
接收来自于配网设备的第一信息,所述第一信息包括密钥计算参数,所述密钥计算参数用于确定第一信息密钥。First information from the distribution network device is received, where the first information includes a key calculation parameter, and the key calculation parameter is used to determine the first information key.
还一方面,本申请实施例提供了一种信息处理方法,应用于配网设备中,所述方法包括:In another aspect, an embodiment of the present application provides an information processing method, which is applied to a distribution network device, and the method includes:
向待入网设备发送第一信息,所述第一信息包括密钥计算参数,所述密钥计算参数用于确定第一信息密钥。Send first information to the device to be connected to the network, where the first information includes a key calculation parameter, and the key calculation parameter is used to determine the first information key.
还一方面,本申请实施例提供了一种信息处理装置,设置在待入网设备中,所述装置包括:In another aspect, an embodiment of the present application provides an information processing apparatus, which is set in a device to be connected to a network, and the apparatus includes:
信标广播模块,用于广播第一接入点的信标,所述信标中包括密钥计算参数和/或所述待入网设备的设备标识,所述密钥计算参数用于确定所述待入网设备和配网设备之间执行身份认证的访问密钥。A beacon broadcasting module, configured to broadcast a beacon of the first access point, the beacon includes a key calculation parameter and/or a device identifier of the device to be connected to the network, and the key calculation parameter is used to determine the The access key for performing identity authentication between the device to be connected to the network and the device to be deployed on the network.
还一方面,本申请实施例提供了一种信息处理装置,设置在配网设备中,所述装置包括:In another aspect, an embodiment of the present application provides an information processing apparatus, which is set in a distribution network device, and the apparatus includes:
信标接收模块,用于接收第一接入点的信标,所述信标中包括密钥计算参数和/或待入网设备的设备标识,所述密钥计算参数用于确定待入网设备和所述配网设备之间执行身份认证的访问密钥。A beacon receiving module, configured to receive a beacon of the first access point, the beacon includes a key calculation parameter and/or a device identifier of the device to be connected to the network, and the key calculation parameter is used to determine the device to be connected to the network and the device identifier of the device to be accessed. The access key for performing identity authentication between the distribution network devices.
还一方面,本申请实施例提供了一种信息处理装置,设置在待入网设备中,所述装置包括:In another aspect, an embodiment of the present application provides an information processing apparatus, which is set in a device to be connected to a network, and the apparatus includes:
第一显示模块,用于显示第一图形码,所述第一图形码包括密钥计算参数和/或所述待入网设备的设备标识,所述密钥计算参数用于确定信息解密密钥,所述信息解密密钥用于解密来自于配网设备的网络配置信息,所述网络配置信息用于配置所述待入网设备接入第二接入点。a first display module, configured to display a first graphic code, where the first graphic code includes a key calculation parameter and/or a device identifier of the device to be connected to the network, and the key calculation parameter is used to determine an information decryption key, The information decryption key is used to decrypt the network configuration information from the network configuration device, and the network configuration information is used to configure the device to be connected to the network to access the second access point.
还一方面,本申请实施例提供了一种信息处理装置,设置在配网设备中,所述装置包括:In another aspect, an embodiment of the present application provides an information processing apparatus, which is set in a distribution network device, and the apparatus includes:
第二扫描模块,用于扫描待入网设备的第一图形码,所述第一图形码包括密钥计算参数和/或所述待入网设备的设备标识,所述密钥计算参数用于确定信息加密密钥,所述信息加密密钥用于加密网络配置信息,所述网络配置信息用于配置所述待入网设备接入第二接入点。The second scanning module is used to scan the first graphic code of the device to be connected to the network, where the first graphic code includes a key calculation parameter and/or a device identifier of the device to be connected to the network, and the key calculation parameter is used to determine information An encryption key, where the information encryption key is used to encrypt network configuration information, and the network configuration information is used to configure the device to be connected to the network to access the second access point.
还一方面,本申请实施例提供了一种信息处理装置,设置在待入网设备中,所述装置包括:In another aspect, an embodiment of the present application provides an information processing apparatus, which is set in a device to be connected to a network, and the apparatus includes:
第三扫描模块,用于扫描配网设备显示的第三图形码,所述第三图形码包括采用信息加密密钥加密的网络配置信息和密钥计算参数;a third scanning module, configured to scan a third graphic code displayed by the network distribution device, where the third graphic code includes network configuration information and key calculation parameters encrypted with an information encryption key;
其中,所述网络配置信息用于配置所述待入网设备接入第二接入点,所述密钥计算参数用于确定信息解密密钥,所述信息解密密钥用于解密所述采用信息加密密钥加密的网络配置信息。Wherein, the network configuration information is used to configure the device to be connected to the network to access the second access point, the key calculation parameter is used to determine an information decryption key, and the information decryption key is used to decrypt the adoption information Encryption key encrypted network configuration information.
还一方面,本申请实施例提供了一种信息处理装置,设置在配网设备中,所述装置包括:In another aspect, an embodiment of the present application provides an information processing apparatus, which is set in a distribution network device, and the apparatus includes:
第三显示模块,用于显示第三图形码,所述第三图形码包括采用信息加密密钥加密的网络配置信息和密钥计算参数;a third display module, configured to display a third graphic code, where the third graphic code includes network configuration information and key calculation parameters encrypted with an information encryption key;
其中,所述网络配置信息用于配置待入网设备接入第二接入点,所述密钥计算参数用于确定信息解密密钥,所述信息解密密钥用于解密所述采用信息加密密钥加密的网络配置信息。Wherein, the network configuration information is used to configure the device to be connected to the network to access the second access point, the key calculation parameter is used to determine the information decryption key, and the information decryption key is used to decrypt the information encryption key using the information encryption key. key-encrypted network configuration information.
还一方面,本申请实施例提供了一种信息处理装置,设置在待入网设备中,所述装置包括:In another aspect, an embodiment of the present application provides an information processing apparatus, which is set in a device to be connected to a network, and the apparatus includes:
第一接收模块,用于接收来自于配网设备的第一信息,所述第一信息包括密钥计算参数,所述密钥计算参数用于确定第一信息密钥。The first receiving module is configured to receive first information from the distribution network device, where the first information includes a key calculation parameter, and the key calculation parameter is used to determine the first information key.
还一方面,本申请实施例提供了一种信息处理装置,设置在配网设备中,所述装置包括:In another aspect, an embodiment of the present application provides an information processing apparatus, which is set in a distribution network device, and the apparatus includes:
第一发送模块,用于向待入网设备发送第一信息,所述第一信息包括密钥计算参数,所述密钥计算参数用于确定第一信息密钥。The first sending module is configured to send first information to the device to be connected to the network, where the first information includes a key calculation parameter, and the key calculation parameter is used to determine the first information key.
还一方面,本申请实施例提供了一种待入网设备,所述待入网设备包括:处理器,以及与所述处理器相连的收发器;其中:In another aspect, an embodiment of the present application provides a device to be connected to a network, where the device to be connected to a network includes: a processor, and a transceiver connected to the processor; wherein:
所述收发器,用于广播第一接入点的信标,所述信标中包括密钥计算参数和/或所述待入网设备的设备标识,所述密钥计算参数用于确定所述待入网设备和配网设备之间执行身份认证的访问密钥。The transceiver is used to broadcast a beacon of the first access point, the beacon includes a key calculation parameter and/or a device identifier of the device to be connected to the network, and the key calculation parameter is used to determine the The access key for performing identity authentication between the device to be connected to the network and the device to be deployed on the network.
还一方面,本申请实施例提供了一种配网设备,所述配网设备包括:处理器,以及与所述处理器相连的收发器;其中:In another aspect, an embodiment of the present application provides a network distribution device, where the network distribution device includes: a processor, and a transceiver connected to the processor; wherein:
所述收发器,用于接收第一接入点的信标,所述信标中包括密钥计算参数和/或待入网设备的设备标识,所述密钥计算参数用于确定待入网设备和所述配网设备之间执行身份认证的访问密钥。The transceiver is configured to receive a beacon of the first access point, the beacon includes a key calculation parameter and/or a device identifier of the device to be connected to the network, and the key calculation parameter is used to determine the device to be connected to the network and the device ID of the device to be connected to the network. The access key for performing identity authentication between the distribution network devices.
还一方面,本申请实施例提供了一种待入网设备,所述待入网设备包括:处理器,以及与所述处理器相连的收发器;其中:In another aspect, an embodiment of the present application provides a device to be connected to a network, and the device to be connected to a network includes: a processor, and a transceiver connected to the processor; wherein:
所述处理器,用于显示第一图形码,所述第一图形码包括密钥计算参数和/或所述待入网设备的设备标识,所述密钥计算参数用于确定信息解密密钥,所述信息解密密钥用于解密来自于配网设备的网络配置信 息,所述网络配置信息用于配置所述待入网设备接入第二接入点。The processor is configured to display a first graphic code, where the first graphic code includes a key calculation parameter and/or a device identifier of the device to be connected to the network, and the key calculation parameter is used to determine an information decryption key, The information decryption key is used to decrypt the network configuration information from the network configuration device, and the network configuration information is used to configure the device to be connected to the network to access the second access point.
还一方面,本申请实施例提供了一种配网设备,所述配网设备包括:处理器,以及与所述处理器相连的收发器;其中:In another aspect, an embodiment of the present application provides a network distribution device, where the network distribution device includes: a processor, and a transceiver connected to the processor; wherein:
所述处理器,用于扫描待入网设备的第一图形码,所述第一图形码包括密钥计算参数和/或所述待入网设备的设备标识,所述密钥计算参数用于确定信息加密密钥,所述信息加密密钥用于加密网络配置信息,所述网络配置信息用于配置所述待入网设备接入第二接入点。The processor is configured to scan the first graphic code of the device to be connected to the network, where the first graphic code includes a key calculation parameter and/or a device identifier of the device to be connected to the network, and the key calculation parameter is used to determine information An encryption key, where the information encryption key is used to encrypt network configuration information, and the network configuration information is used to configure the device to be connected to the network to access the second access point.
还一方面,本申请实施例提供了一种待入网设备,所述待入网设备包括:处理器,以及与所述处理器相连的收发器;其中:In another aspect, an embodiment of the present application provides a device to be connected to a network, and the device to be connected to a network includes: a processor, and a transceiver connected to the processor; wherein:
所述处理器,用于扫描配网设备显示的第三图形码,所述第三图形码包括采用信息加密密钥加密的网络配置信息和密钥计算参数;The processor is configured to scan a third graphic code displayed by the network distribution device, where the third graphic code includes network configuration information and key calculation parameters encrypted with an information encryption key;
其中,所述网络配置信息用于配置所述待入网设备接入第二接入点,所述密钥计算参数用于确定信息解密密钥,所述信息解密密钥用于解密所述采用信息加密密钥加密的网络配置信息。Wherein, the network configuration information is used to configure the device to be connected to the network to access the second access point, the key calculation parameter is used to determine an information decryption key, and the information decryption key is used to decrypt the adoption information Encryption key encrypted network configuration information.
还一方面,本申请实施例提供了一种配网设备,所述配网设备包括:处理器,以及与所述处理器相连的收发器;其中:In another aspect, an embodiment of the present application provides a network distribution device, where the network distribution device includes: a processor, and a transceiver connected to the processor; wherein:
所述处理器,用于显示第三图形码,所述第三图形码包括采用信息加密密钥加密的网络配置信息和密钥计算参数;the processor, configured to display a third graphic code, where the third graphic code includes network configuration information and key calculation parameters encrypted with an information encryption key;
其中,所述网络配置信息用于配置待入网设备接入第二接入点,所述密钥计算参数用于确定信息解密密钥,所述信息解密密钥用于解密所述采用信息加密密钥加密的网络配置信息。Wherein, the network configuration information is used to configure the device to be connected to the network to access the second access point, the key calculation parameter is used to determine the information decryption key, and the information decryption key is used to decrypt the information encryption key using the information encryption key. key-encrypted network configuration information.
还一方面,本申请实施例提供了一种待入网设备,所述待入网设备包括:处理器,以及与所述处理器相连的收发器;其中:In another aspect, an embodiment of the present application provides a device to be connected to a network, and the device to be connected to a network includes: a processor, and a transceiver connected to the processor; wherein:
所述收发器,用于接收来自于配网设备的第一信息,所述第一信息包括密钥计算参数,所述密钥计算参数用于确定第一信息密钥。The transceiver is configured to receive first information from a distribution network device, where the first information includes a key calculation parameter, and the key calculation parameter is used to determine the first information key.
还一方面,本申请实施例提供了一种配网设备,所述配网设备包括:处理器,以及与所述处理器相连的收发器;其中:In another aspect, an embodiment of the present application provides a network distribution device, where the network distribution device includes: a processor, and a transceiver connected to the processor; wherein:
所述收发器,用于向待入网设备发送第一信息,所述第一信息包括密钥计算参数,所述密钥计算参数用于确定第一信息密钥。The transceiver is configured to send first information to the device to be connected to the network, where the first information includes a key calculation parameter, and the key calculation parameter is used to determine the first information key.
还一方面,本申请实施例提供了一种计算机可读存储介质,所述存储介质中存储有计算机程序,所述计算机程序用于被待入网设备的处理器执行,以实现如上述待入网设备侧的信息处理方法。In another aspect, an embodiment of the present application provides a computer-readable storage medium, where a computer program is stored in the storage medium, and the computer program is used to be executed by a processor of a device to be connected to the network, so as to implement the device to be connected to the network as described above. side information processing methods.
还一方面,本申请实施例提供了一种计算机可读存储介质,所述存储介质中存储有计算机程序,所述计算机程序用于被配网设备的处理器执行,以实现如上述配网设备侧的信息处理方法。In another aspect, an embodiment of the present application provides a computer-readable storage medium, where a computer program is stored in the storage medium, and the computer program is used to be executed by a processor of a network distribution device, so as to realize the above-mentioned network distribution device side information processing methods.
还一方面,本申请实施例提供了一种芯片,所述芯片包括可编程逻辑电路和/或程序指令,当所述芯片在待入网设备上运行时,用于实现如上述待入网设备侧的信息处理方法。In another aspect, an embodiment of the present application provides a chip, where the chip includes a programmable logic circuit and/or program instructions, and when the chip runs on the device to be connected to the network, it is used to implement the above-mentioned device to be connected to the network side. Information processing method.
还一方面,本申请实施例提供了一种芯片,所述芯片包括可编程逻辑电路和/或程序指令,当所述芯片在配网设备上运行时,用于实现如上述配网设备侧的信息处理方法。On the other hand, an embodiment of the present application provides a chip, the chip includes a programmable logic circuit and/or program instructions, and when the chip runs on a distribution network device, it is used to implement the above-mentioned configuration on the distribution network device side. Information processing method.
还一方面,本申请实施例提供了一种计算机程序产品,当计算机程序产品在待入网设备上运行时,用于实现如上述待入网设备侧的信息处理方法。In another aspect, an embodiment of the present application provides a computer program product, which is used to implement the above-mentioned information processing method on the device to be connected to the network when the computer program product runs on the device to be connected to the network.
还一方面,本申请实施例提供了一种计算机程序产品,当计算机程序产品在配网设备上运行时,用于实现如上述配网设备侧的信息处理方法。In another aspect, an embodiment of the present application provides a computer program product, which is used to implement the information processing method on the side of the distribution network device as described above when the computer program product runs on the distribution network device.
附图说明Description of drawings
为了更清楚地说明本申请实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to illustrate the technical solutions in the embodiments of the present application more clearly, the following briefly introduces the drawings that are used in the description of the embodiments. Obviously, the drawings in the following description are only some embodiments of the present application. For those of ordinary skill in the art, other drawings can also be obtained from these drawings without creative effort.
图1是本申请一个实施例提供的配网系统的示意图;1 is a schematic diagram of a distribution network system provided by an embodiment of the present application;
图2是本申请一个实施例提供的soft AP配网的流程图;Fig. 2 is the flow chart of soft AP distribution network provided by an embodiment of the present application;
图3是本申请一个实施例提供的扫码配网的流程图;3 is a flowchart of a scanning code distribution network provided by an embodiment of the present application;
图4是本申请一个实施例提供的安全认证的流程图;FIG. 4 is a flowchart of security authentication provided by an embodiment of the present application;
图5是本申请一个实施例提供的信息处理方法的流程图;5 is a flowchart of an information processing method provided by an embodiment of the present application;
图6是本申请一个实施例提供的访问密钥的确定方法的流程图;6 is a flowchart of a method for determining an access key provided by an embodiment of the present application;
图7是本申请另一个实施例提供的信息处理方法的流程图;7 is a flowchart of an information processing method provided by another embodiment of the present application;
图8是本申请再一个实施例提供的信息处理方法的流程图;8 is a flowchart of an information processing method provided by another embodiment of the present application;
图9是本申请一个实施例提供的信息解密密钥和信息加密密钥的确定方法的流程图;9 is a flowchart of a method for determining an information decryption key and an information encryption key provided by an embodiment of the present application;
图10是本申请一个实施例提供的与配网过程耦合的信息处理方法的流程图;10 is a flowchart of an information processing method coupled with a network distribution process provided by an embodiment of the present application;
图11是本申请一个实施例提供的与配网过程解耦合的信息处理方法的流程图;11 is a flowchart of an information processing method decoupled from a distribution network process provided by an embodiment of the present application;
图12是本申请另一个实施例提供的与配网过程解耦合的信息处理方法的流程图;12 is a flowchart of an information processing method decoupled from a distribution network process provided by another embodiment of the present application;
图13是本申请又一个实施例提供的信息处理方法的流程图;13 is a flowchart of an information processing method provided by another embodiment of the present application;
图14是本申请另一个实施例提供的信息解密密钥和信息加密密钥的确定方法的流程图;14 is a flowchart of a method for determining an information decryption key and an information encryption key provided by another embodiment of the present application;
图15是本申请还一个实施例提供的信息处理方法的流程图;15 is a flowchart of an information processing method provided by yet another embodiment of the present application;
图16是本申请还一个实施例提供的信息处理方法的流程图;16 is a flowchart of an information processing method provided by yet another embodiment of the present application;
图17是本申请再一个实施例提供的信息解密密钥和信息加密密钥的确定方法的流程图;17 is a flowchart of a method for determining an information decryption key and an information encryption key provided by yet another embodiment of the present application;
图18是本申请还一个实施例提供的信息处理方法的流程图;18 is a flowchart of an information processing method provided by yet another embodiment of the present application;
图19是本申请一个实施例提供的信息处理装置的框图;19 is a block diagram of an information processing apparatus provided by an embodiment of the present application;
图20是本申请另一个实施例提供的信息处理装置的框图;20 is a block diagram of an information processing apparatus provided by another embodiment of the present application;
图21是本申请再一个实施例提供的信息处理装置的框图;21 is a block diagram of an information processing apparatus provided by another embodiment of the present application;
图22是本申请又一个实施例提供的信息处理装置的框图;22 is a block diagram of an information processing apparatus provided by another embodiment of the present application;
图23是本申请还一个实施例提供的信息处理装置的框图;23 is a block diagram of an information processing apparatus provided by still another embodiment of the present application;
图24是本申请还一个实施例提供的信息处理装置的框图;24 is a block diagram of an information processing apparatus provided by still another embodiment of the present application;
图25是本申请还一个实施例提供的信息处理装置的框图;25 is a block diagram of an information processing apparatus provided by still another embodiment of the present application;
图26是本申请还一个实施例提供的信息处理装置的框图;FIG. 26 is a block diagram of an information processing apparatus provided by still another embodiment of the present application;
图27是本申请还一个实施例提供的信息处理装置的框图;27 is a block diagram of an information processing apparatus provided by still another embodiment of the present application;
图28是本申请还一个实施例提供的信息处理装置的框图;28 is a block diagram of an information processing apparatus provided by still another embodiment of the present application;
图29是本申请还一个实施例提供的信息处理装置的框图;FIG. 29 is a block diagram of an information processing apparatus provided by still another embodiment of the present application;
图30是本申请还一个实施例提供的信息处理装置的框图;30 is a block diagram of an information processing apparatus provided by still another embodiment of the present application;
图31是本申请还一个实施例提供的信息处理装置的框图;31 is a block diagram of an information processing apparatus provided by still another embodiment of the present application;
图32是本申请还一个实施例提供的信息处理装置的框图;32 is a block diagram of an information processing apparatus provided by another embodiment of the present application;
图33是本申请还一个实施例提供的信息处理装置的框图;33 is a block diagram of an information processing apparatus provided by another embodiment of the present application;
图34是本申请还一个实施例提供的信息处理装置的框图;34 is a block diagram of an information processing apparatus provided by still another embodiment of the present application;
图35是本申请一个实施例提供的待入网设备的结构示意图;35 is a schematic structural diagram of a device to be connected to a network provided by an embodiment of the present application;
图36是本申请一个实施例提供的配网设备的结构示意图。FIG. 36 is a schematic structural diagram of a distribution network device provided by an embodiment of the present application.
具体实施方式detailed description
为使本申请的目的、技术方案和优点更加清楚,下面将结合附图对本申请实施方式作进一步地详细描述。In order to make the objectives, technical solutions and advantages of the present application clearer, the embodiments of the present application will be further described in detail below with reference to the accompanying drawings.
请参考图1,其示出了本申请一个实施例提供的配网系统的示意图,该配网系统可以包括:待入网设备110和配网设备120。Please refer to FIG. 1 , which shows a schematic diagram of a network distribution system provided by an embodiment of the present application. The network distribution system may include: a device to be connected to a network 110 and a network distribution device 120 .
待入网设备110是指具备网络接入能力的设备,例如,具备WiFi(Wireless Fidelity,无线保真)接入能力的设备。可选地,待入网设备110为智能设备(如VR(Virtual Reality,虚拟现实)眼镜、智能可穿戴设备等)、终端设备,或者其它具备网络接入能力的设备,本申请实施例对此不作限定。在一个示例中,如图1所示,在配网系统应用于智能家居生活的情况下,待入网设备110可以是智能电视、智能音箱、智能空调、智能电灯、智能门窗、智能窗帘、智能插座等智能家居设备。可选地,待入网设备110为一个,或者,待入网设备110为多个,本申请实施例对此不作限定,实际应用中,待入网设备110的数量可以结合应用需求或者配网设备120所能管理的最大设备数量等确定。The device 110 to be connected to the network refers to a device with network access capability, for example, a device with WiFi (Wireless Fidelity, wireless fidelity) access capability. Optionally, the device 110 to be connected to the network is a smart device (such as VR (Virtual Reality, virtual reality) glasses, a smart wearable device, etc.), a terminal device, or other device with network access capability, which is not made in this embodiment of the present application. limited. In an example, as shown in FIG. 1 , when the distribution network system is applied to smart home life, the device 110 to be connected to the network may be a smart TV, a smart speaker, a smart air conditioner, a smart lamp, a smart door and window, a smart curtain, and a smart socket. and other smart home devices. Optionally, there is one device 110 to be connected to the network, or there are multiple devices 110 to be connected to the network, which is not limited in this embodiment of the present application. Determine the maximum number of devices that can be managed, etc.
配网设备120是指具备配置入网能力的设备,可选地,配网设备120可以是服务器、终端设备、路由器、终端设备、手机、平板电脑、可穿戴设备,或者其它具备配置入网能力的设备,本申请实施例对此不作限定,实际应用中,配网设备120的实现形态可以结合配网系统的应用情景确定。在一个示例中,如图1所示,在配网系统应用于智能家居生活的情况下,考虑到家居环境具有面积小、活动频繁等特点,使用占用空间较大的配网设备120会影响正常的家居生活,配网设备120可以实现为路由器、终端设备、手机、平板电脑、可穿戴设备等。可选地,针对某一配网系统,该配网系统对应的配网设备的数量可以为一个,也可以为多个,本申请实施例对此不作限定,通常,出于节约资源等方面的考虑,某一配网系统对应的配网设备的数量为一个。可选地,不同的配网系统对应的配网设备是不同的,从而对应于某一配网系统下的待入网设备110与该配网系统下的配网设备120绑定,例如,在配网系统实现为智能家居生活的情况下,以家庭为单位,某一家庭中的待入网设备与该家庭的配网设备绑定。The network distribution device 120 refers to a device capable of configuring network access. Optionally, the network distribution device 120 may be a server, terminal device, router, terminal device, mobile phone, tablet computer, wearable device, or other devices capable of configuring network access. , this embodiment of the present application does not limit this. In practical applications, the implementation form of the distribution network device 120 may be determined in combination with the application scenario of the distribution network system. In an example, as shown in FIG. 1 , when the distribution network system is applied to smart home life, considering that the home environment has the characteristics of small area and frequent activities, the use of distribution network equipment 120 that occupies a large space will affect the normal operation. For home life, the distribution network device 120 can be implemented as a router, a terminal device, a mobile phone, a tablet computer, a wearable device, and the like. Optionally, for a certain distribution network system, the number of distribution network devices corresponding to the distribution network system may be one or multiple, which is not limited in this embodiment of the present application. Generally, for the purpose of saving resources and the like, Consider that the number of distribution network devices corresponding to a distribution network system is one. Optionally, the network distribution devices corresponding to different distribution network systems are different, so that the device 110 to be connected to the network corresponding to a certain distribution network system is bound to the network distribution device 120 under the distribution network system. When the network system is implemented as a smart home life, taking the family as a unit, the devices to be connected to the network in a certain family are bound to the distribution network devices of the family.
本申请实施例中,配网设备120能够配置待入网设备110接入AP,即配置待入网设备110入网。相关技术中,主要有两种配置待入网设备110入网的方式:soft AP配网和扫码配网。下面,分别针对这两种配网方式进行介绍说明。In this embodiment of the present application, the network configuration device 120 can configure the device 110 to be connected to the network to access the AP, that is, configure the device to be connected to the network 110 to access the network. In the related art, there are mainly two ways to configure the network access device 110 to be connected to the network: soft AP network configuration and code scanning configuration network. In the following, the two network distribution methods are introduced and explained respectively.
请参考图2,其示出了本申请一个实施例提供的soft AP配网的流程图。如图2所示,soft AP配网的过程主要包括如下几个步骤:Please refer to FIG. 2 , which shows a flowchart of a soft AP network configuration provided by an embodiment of the present application. As shown in Figure 2, the process of soft AP network configuration mainly includes the following steps:
步骤210,待入网设备启动soft AP并广播soft AP的信标。Step 210, the device to be connected to the network starts the soft AP and broadcasts the beacon of the soft AP.
本申请实施例中,待入网设备在进入配网模式的情况下可以启动soft AP。待入网设备启动soft AP之后,可以广播soft AP的信标,可选地,soft AP的信标包括以下至少一项内容:待入网设备的设备ID(Identifier,标识)、用户自定义的网络名称、应用协议的协议名称等。其中,设备ID可以为待入网设备的MAC(Media Access Control Address,媒体存取控制)地址。可选地,soft AP的信标包括以下至少一个字段:BSSID(Basic Service Set Identifier,基本服务集标识)字段、SSID(Service Set Identifier,服务集标识)字段、厂商自定义(Vendor Specific)字段。In the embodiment of the present application, the device to be connected to the network can start the soft AP when it enters the network distribution mode. After the device to be connected to the network starts the soft AP, it can broadcast the beacon of the soft AP. Optionally, the beacon of the soft AP includes at least one of the following contents: the device ID (Identifier, identification) of the device to be connected to the network, a user-defined network name , the protocol name of the application protocol, etc. The device ID may be the MAC (Media Access Control Address, media access control) address of the device to be connected to the network. Optionally, the beacon of the soft AP includes at least one of the following fields: a BSSID (Basic Service Set Identifier, basic service set identifier) field, an SSID (Service Set Identifier, service set identifier) field, and a vendor specific (Vendor Specific) field.
步骤220,配网设备在扫描到soft AP的信标的情况下,加入至soft AP。Step 220, when the network configuration device scans the beacon of the soft AP, it joins the soft AP.
配网设备可以在不同的信道上扫描其它设备广播的信标,当配网设备在待入网设备广播soft AP的信标的信道上扫描到该soft AP的信标时,可以加入至该soft AP。可选地,配网设备在扫描到soft AP的信标后,确认信标中的SSID字段是否符合预设格式,在SSID字段符合预设格式的情况下,加入至soft AP。The distribution network device can scan the beacons broadcast by other devices on different channels. When the distribution network device scans the beacon of the soft AP on the channel where the device to be connected broadcasts the beacon of the soft AP, it can join the soft AP. Optionally, after scanning the beacon of the soft AP, the network configuration device confirms whether the SSID field in the beacon conforms to the preset format, and adds it to the soft AP if the SSID field conforms to the preset format.
步骤230,配网设备与待入网设备之间建立通信连接。Step 230: Establish a communication connection between the network distribution device and the device to be connected to the network.
在接入至soft AP之后,配网设备可以通过soft AP与待入网设备之间建立通信连接。可选地,配网设备与待入网设备之间的通信满足TCP(Transmission Control Protocol,传输控制协议)协议,因而,配网设备与待入网设备之间的通信连接又可以称为TCP连接;或者,配网设备与待入网设备之间的通信满足UDP(User Datagram Protocol,用户数据包协议)协议,因而配网设备与待入网设备之间的通信连接又可以称为UDP连接。After connecting to the soft AP, the network distribution device can establish a communication connection with the device to be connected through the soft AP. Optionally, the communication between the network distribution equipment and the equipment to be connected to the network satisfies the TCP (Transmission Control Protocol, Transmission Control Protocol) protocol, and thus, the communication connection between the network distribution equipment and the equipment to be connected to the network can also be referred to as a TCP connection; or , the communication between the network distribution device and the device to be connected to the network satisfies the UDP (User Datagram Protocol) protocol, so the communication connection between the distribution network device and the device to be connected to the network can also be called a UDP connection.
步骤240,配网设备向待入网设备发送信息获取请求。Step 240: The network distribution device sends an information acquisition request to the device to be connected to the network.
信息获取请求用于请求获取待入网设备能够接入的AP相关的信息,可选地,信息获取请求用于请求获取待入网设备可接入AP的SSID字段和/或可接入AP的信号强度。本申请实施例中,待入网设备在进入配网模式之后,可以按照一定的周期(如10秒)扫描AP的信标,并根据信标中的SSID字段确定是否能够接入AP。The information acquisition request is used to request to acquire information about APs that can be accessed by the device to be connected to the network. Optionally, the information acquisition request is used to request to acquire the SSID field of the AP that the device to access can access and/or the signal strength of the AP that can be accessed. . In this embodiment of the present application, after entering the network distribution mode, the device to be connected may scan the AP's beacon according to a certain period (for example, 10 seconds), and determine whether it can access the AP according to the SSID field in the beacon.
步骤250,待入网设备向配网设备发送可接入AP信息。In step 250, the device to be connected to the network sends the information of the accessible AP to the network distribution device.
待入网设备在接收到信息获取请求后,响应于该信息获取请求,向配网设备发送待入网设备可接入的AP相关的信息,即可接入AP信息。可选地,可接入AP信息包括以下至少一项:可接入AP的SSID字段、可接入AP的信号强度。After receiving the information acquisition request, the device to be connected to the network, in response to the information acquisition request, sends information about APs that can be accessed by the device to be connected to the network to the network distribution device, so as to access the AP information. Optionally, the accessible AP information includes at least one of the following: the SSID field of the accessible AP, and the signal strength of the accessible AP.
步骤260,配网设备向待入网设备发送网络配置信息。Step 260: The network configuration device sends network configuration information to the device to be connected to the network.
配网设备接收到待入网设备发送的可接入AP信息之后,可以根据可接入AP信息选择待入网设备接入的AP。本申请实施例对配网设备选择待入网设备接入的AP的方式不作限定,可选地,配网设备将可接入AP信息指示的信号强度最高的AP确定为待入网设备接入的AP。在配网设备选定待入网设备接入的AP之后,即可向待入网设备发送网络配置信息,以配置待入网设备接入其选择的AP。可选地,网络配置信息包括以下至少一项:待入网设备接入的AP的SSID字段、待入网设备接入的AP的认证信息。可选地,待入网设备接入的AP的认证信息包括待入网设备接入的AP的密码。After receiving the accessible AP information sent by the device to be connected to the network, the network distribution device can select the AP to be accessed by the device to be connected to the network according to the information of the accessible APs. This embodiment of the present application does not limit the manner in which the network configuration device selects the AP to be accessed by the network access device. Optionally, the network configuration device determines the AP with the highest signal strength indicated by the accessible AP information as the AP to be accessed by the network access device. . After the network configuration device selects the AP to be accessed by the device to be connected to the network, it can send network configuration information to the device to be connected to the network to configure the device to be connected to the selected AP. Optionally, the network configuration information includes at least one of the following: the SSID field of the AP to be accessed by the device to be connected to the network, and the authentication information of the AP to be accessed by the device to be connected to the network. Optionally, the authentication information of the AP to be accessed by the device to be connected to the network includes the password of the AP to be accessed by the device to be connected to the network.
步骤270,待入网设备向配网设备发送配置响应消息。Step 270: The device to be connected to the network sends a configuration response message to the network configuration device.
配置响应消息用于响应配网设备发送的网络配置信息,以向配网设备指示待入网设备是否接收到网络配置信息。可选地,配网设备在向待入网设备发送网络配置信息后默认待入网设备接收到网络配置信息,在待入网设备成功接收到网络配置信息的情况下,其可以不向配网设备发送配置响应消息;在待入网设备没有成功接收到网络配置信息的情况下,如待入网设备无法解析网络配置信息的情况下,其可以向配网设备发送配置响应消息。The configuration response message is used to respond to the network configuration information sent by the network configuration device, so as to indicate to the network configuration device whether the device to be connected to the network has received the network configuration information. Optionally, the network configuration device receives the network configuration information by default after sending the network configuration information to the device to be connected to the network. In the case that the device to be connected to the network successfully receives the network configuration information, it may not send the configuration information to the network configuration device. Response message; if the device to be connected to the network fails to receive the network configuration information successfully, such as the device to be connected to the network cannot parse the network configuration information, it can send a configuration response message to the network configuration device.
步骤280,配网设备取消接入soft AP。Step 280, the network configuration device cancels access to the soft AP.
在配网设备向待入网设备发送网络配置信息后,可以断开与待入网设备启动的soft AP之间的连接,也即,取消接入soft AP。可选地,配网设备在发送网络配置信息之后,取消接入soft AP;或者,配网设备在接收到配置响应消息之后,取消接入soft AP,本申请实施例对配网设备取消接入soft AP的时机不作限定。After the network configuration device sends the network configuration information to the device to be connected to the network, it can disconnect the connection with the soft AP started by the device to be connected to the network, that is, cancel the access to the soft AP. Optionally, the distribution network device cancels access to the soft AP after sending the network configuration information; or, after receiving the configuration response message, the distribution network device cancels access to the soft AP, and the embodiment of the present application cancels access to the distribution network device. The timing of soft AP is not limited.
步骤290,待入网设备关闭soft AP。Step 290, the device to be connected to the network closes the soft AP.
由于待入网设备通常不能同时接入两个AP,因此,待入网设备需要关闭soft AP以接入网络配置信息指示的AP。可选地,待入网设备在接收到网络配置信息之后,关闭soft AP;或者,待入网设备在向配网 设备发送配置响应消息之后,关闭soft AP;或者,待入网设备在配网设备取消接入soft AP之后,关闭soft AP,本申请实施例对待入网设备关闭soft AP的时机不作限定。Since the device to be connected to the network usually cannot access two APs at the same time, the device to be connected to the network needs to close the soft AP to access the AP indicated by the network configuration information. Optionally, after receiving the network configuration information, the device to be connected to the network closes the soft AP; or, the device to be connected to the network closes the soft AP after sending a configuration response message to the distribution network device; After entering the soft AP, the soft AP is closed. The embodiment of the present application does not limit the timing of closing the soft AP for the device to be connected to the network.
待入网设备在取消接入soft AP之后,即可依据网络配置信息中的认证信息接入网络配置信息指示的AP。配网设备在取消接入soft AP之后,为实现继续对待入网设备进行控制和管理等,也可以接入网络配置信息指示的AP。从而,配网设备和待入网设备通过接入的AP建立通信连接。After the device to be connected to the network cancels access to the soft AP, it can access the AP indicated by the network configuration information according to the authentication information in the network configuration information. After the network distribution device cancels access to the soft AP, in order to continue to control and manage the device to be connected to the network, it can also access the AP indicated by the network configuration information. Therefore, the network distribution device and the device to be connected to the network establish a communication connection through the access AP.
请参考图3,其示出了本申请一个实施例提供的扫码配网的流程图。如图3所示,扫码配网的过程主要包括如下几个步骤:Please refer to FIG. 3 , which shows a flowchart of a scanning code distribution network provided by an embodiment of the present application. As shown in Figure 3, the process of scanning code distribution network mainly includes the following steps:
步骤310,配网设备扫描待入网设备的二维码。Step 310, the network distribution device scans the two-dimensional code of the device to be connected to the network.
在待入网设备具备屏幕显示功能的情况下,待入网设备可以在其屏幕中显示二维码;在待入网设备不具备屏幕显示功能的情况下,待入网设备的设备厂商可以在待入网设备出厂时,为待入网设备贴上二维码。本申请实施例中,待入网设备的二维码指示待入网设备的设备信息,可选地,设备信息包括以下至少一项:待入网设备的设备类型、设备公钥。配网设备扫描待入网设备的二维码即可获取待入网设备的设备信息。If the device to be connected to the network has the screen display function, the device to be connected to the network can display the QR code on its screen; if the device to be connected to the network does not have the function of screen display, the device manufacturer of the device to be connected to the network can leave the factory of the device to be connected to the network , paste the QR code on the device to be connected to the network. In the embodiment of the present application, the two-dimensional code of the device to be connected to the network indicates the device information of the device to be connected to the network. Optionally, the device information includes at least one of the following: the device type of the device to be connected to the network, and the device public key. The network distribution device scans the QR code of the device to be connected to the network to obtain the device information of the device to be connected to the network.
步骤320,配网设备根据网络配置信息生成二维码并显示二维码。Step 320, the network distribution device generates a two-dimensional code according to the network configuration information and displays the two-dimensional code.
配网设备可以确定待入网设备接入的AP,并确定该AP对应的网络配置信息,可选地,网络配置信息包括以下至少一项:待入网设备接入的AP的SSID字段、待入网设备接入的AP的认证信息。可选地,待入网设备接入的AP的认证信息包括待入网设备接入的AP的密码。配网设备可以根据扫描得到的待入网设备的设备公钥加密网络配置信息,并根据加密后的网络配置信息生成二维码供待入网设备扫描。The network configuration device can determine the AP to be accessed by the device to be connected to the network, and determine the network configuration information corresponding to the AP. Optionally, the network configuration information includes at least one of the following: the SSID field of the AP to be accessed by the device to be connected to the network, the device to be connected to the network. Authentication information of the access AP. Optionally, the authentication information of the AP to be accessed by the device to be connected to the network includes the password of the AP to be accessed by the device to be connected to the network. The network distribution device can encrypt the network configuration information according to the device public key of the device to be connected to the network obtained by scanning, and generate a two-dimensional code according to the encrypted network configuration information for the device to be connected to the network to scan.
步骤330,待入网设备扫描配网设备提供的二维码,以获得网络配置信息。Step 330, the device to be connected to the network scans the two-dimensional code provided by the network distribution device to obtain network configuration information.
待入网设备扫描配网设备提供的二维码,即可获取配网设备提供的网络配置信息。由于配网设备提供的二维码是通过待入网设备的设备公钥加密网络配置信息后生成的,因为,待入网设备扫描配网设备提供的二维码之后,获取是加密的网络配置信息,其使用设备公钥解密即可得到网络配置信息。The device to be connected to the network scans the QR code provided by the distribution device to obtain the network configuration information provided by the distribution device. Since the two-dimensional code provided by the network distribution device is generated by encrypting the network configuration information with the device public key of the device to be connected to the network, after the device to be connected to the network scans the two-dimensional code provided by the network distribution device, it obtains the encrypted network configuration information. It uses the device public key to decrypt to obtain the network configuration information.
步骤340,待入网设备接入AP。Step 340, the device to be connected to the network accesses the AP.
根据扫描得到的AP的认证信息即可接入网络配置信息指示的AP,待入网设备接入AP之后,可以进一步接入云平台,以进行认证等。The AP indicated by the network configuration information can be accessed according to the authentication information of the AP obtained by scanning. After the network access device accesses the AP, it can further access the cloud platform for authentication and so on.
由上述配网流程可以看出,上述配网的流程并不涉及对智能设备的身份认证,从而极有可能出现仿冒的智能设备获取到AP的网络配置信息,导致AP的网络配置信息泄露,对AP的安全性造成极大威胁。另外,针对soft AP配网而言,若需要实现在soft AP配网过程中对待入网设备的身份进行验证,则需要配网设备作为代理服务,也即,配网设备在连接上待入网设备启动的soft AP的情况下,获取待入网设备的设备证书;之后,配网设备从soft AP切换至待入网设备需接入的AP以连接上云服务,并转发待入网设备的设备证书至云服务,云服务验证通过后将验证结果反馈给配网设备;接着,配网设备需要从待入网设备需接入的AP切换回soft AP,再设置待入网设备需接入的AP的网络配置信息(如SSID和密码等)。由此可见,这一过程需要配网设备在不同的接入点之间来回切换,操作繁琐且效率低下。It can be seen from the above network distribution process that the above network distribution process does not involve the identity authentication of the smart device, so it is very likely that a counterfeit smart device can obtain the network configuration information of the AP, resulting in the leakage of the network configuration information of the AP. AP security poses a great threat. In addition, for the soft AP distribution network, if it is necessary to verify the identity of the network access device during the soft AP network distribution process, the network distribution device needs to be used as a proxy service, that is, the network distribution device is connected to the network device to start. In the case of a soft AP, obtain the device certificate of the device to be connected to the network; after that, the network configuration device switches from the soft AP to the AP that the device to be connected to accesses to connect to the cloud service, and forwards the device certificate of the device to be connected to the cloud service. , after the cloud service verification is passed, the verification result is fed back to the distribution network device; then, the distribution network device needs to switch from the AP to be accessed by the device to be connected back to the soft AP, and then set the network configuration information of the AP to be accessed by the device to be connected to the network ( such as SSID and password, etc.). It can be seen that this process requires network distribution equipment to switch back and forth between different access points, which is cumbersome and inefficient.
基于此,本申请实施例提供了一种信息处理方法,可用于解决上述技术问题。下面,结合几个实施例对本申请的技术方案进行介绍说明。Based on this, the embodiments of the present application provide an information processing method, which can be used to solve the above technical problems. Hereinafter, the technical solutions of the present application will be described with reference to several embodiments.
在对本申请的技术方案进行介绍说明之前,先对本申请实施例中涉及的安全认证流程进行介绍说明。本申请实施例采用4次握手(Sample 4-way handshake)的流程进行安全认证,其中:Before the technical solutions of the present application are introduced and explained, the security authentication process involved in the embodiments of the present application is introduced and explained. The embodiment of the present application adopts a 4-way handshake (Sample 4-way handshake) process for security authentication, wherein:
4-Way Handshake Message 1(4次握手中消息1):Authenticator(鉴权方)向Supplicant(请求方)发送携带ANonce(AP生成的随机数)的EAPOL(Extensible Authentication Protocol,扩展认证协议)-Key(密钥)。4-Way Handshake Message 1 (message 1 in the 4-way handshake): Authenticator (authentication party) sends EAPOL (Extensible Authentication Protocol, Extended Authentication Protocol)-Key carrying ANonce (random number generated by AP) to Supplicant (requester)-Key (key).
4-Way Handshake Message 2(4次握手中消息2):Supplicant向Authenticator发送携带SNonce(STA生成的随机数)以及其它信息的EAPOL-Key。其中,Supplicant在接收到ANonce之后,可以根据该ANonce计算PTK(Pairwise Transient Key,成对临时密钥),PTK的计算公式如下:4-Way Handshake Message 2 (Message 2 in the 4-way handshake): The Supplicant sends the EAPOL-Key carrying the SNonce (a random number generated by the STA) and other information to the Authenticator. Among them, after receiving the ANonce, the Supplicant can calculate the PTK (Pairwise Transient Key, paired temporary key) according to the ANonce. The calculation formula of the PTK is as follows:
PTK=PRF–Length(PMK,“Pairwise key expansion”,Min(AA,SPA)||Max(AA,SPA)||Min(ANonce,SNonce)||Max(ANonce,SNonce))。PTK=PRF-Length(PMK,"Pairwise key expansion",Min(AA,SPA)||Max(AA,SPA)||Min(ANonce,SNonce)||Max(ANonce,SNonce)).
Authenticator收到SNonce后,可以生成PTK,将收到的MIC和自己生成的MIC比较进行完整性校验,如果校验失败,则握手失败。After the Authenticator receives the SNonce, it can generate a PTK, and compare the received MIC with the MIC generated by itself for integrity verification. If the verification fails, the handshake fails.
4-Way Handshake Message 3(4次握手中消息3):Authenticator向Supplicant发送携带GTK(Group Transient Key,组临时密钥)、MIC(Message Integrity Code,消息完整性校验码)的EAPOL-Key。4-Way Handshake Message 3 (Message 3 in the 4-way handshake): The Authenticator sends an EAPOL-Key carrying GTK (Group Transient Key, group temporary key) and MIC (Message Integrity Code, message integrity check code) to Supplicant.
4-Way Handshake Message 4(4次握手中消息4):Supplicant向Authenticator发送用于确认的EAPOL-Key。Supplicant在接收到4-Way Handshake Message 3之后,可以使用自己生成的PTK解密GTK,同时验证MIC,若无误,则向Authenticator发送ACK(Acknowledge,确认)进行确认。4-Way Handshake Message 4 (message 4 in the 4-way handshake): Supplicant sends the EAPOL-Key for confirmation to the Authenticator. After receiving the 4-Way Handshake Message 3, the Supplicant can use the PTK generated by itself to decrypt the GTK, and verify the MIC at the same time. If there is no error, it will send an ACK (Acknowledge) to the Authenticator for confirmation.
Authenticator和Supplicant完成认证以后,Authenticator的控制端口将会被打开,这样802.11的数据 帧将能够正常通过,而且所有的单播数据帧将会被PTK保护,所有的组播数据以及广播数据将会被GTK保护。After Authenticator and Supplicant complete the authentication, the control port of Authenticator will be opened, so that 802.11 data frames will be able to pass normally, and all unicast data frames will be protected by PTK, and all multicast data and broadcast data will be protected by PTK. GTK protection.
由上述4次握手流程可以看出,PTK的计算参数中包括PMK,若双方的PMK不一致,则计算出的PTK也不一致,则双方无法正确解析对方的数据,进而无法完成握手,则Supplicant将无法接入Authenticator。另外,相关技术中,PMK为Supplicant和Authenticator预知的共同密钥(也即,Authenticator的密码),存在极大的泄露风险,不利于安全保护。It can be seen from the above 4-way handshake process that the calculation parameters of PTK include PMK. If the PMKs of the two parties are inconsistent, the calculated PTKs are also inconsistent, and the two parties cannot correctly parse the data of the other party, and thus cannot complete the handshake, then Supplicant will not be able to. Access Authenticator. In addition, in the related art, the PMK is a common key (that is, the password of the Authenticator) predicted by the Supplicant and the Authenticator, and there is a great risk of leakage, which is not conducive to security protection.
请参考图5,其示出了本申请一个实施例提供的信息处理方法的流程图,该方法可以应用于图1所示的配网系统中。该方法可以包括如下几个步骤:Please refer to FIG. 5 , which shows a flowchart of an information processing method provided by an embodiment of the present application, and the method can be applied to the distribution network system shown in FIG. 1 . The method may include the following steps:
步骤510,待入网设备广播第一接入点的信标,信标中包括密钥计算参数和/或待入网设备的设备标识,密钥计算参数用于确定待入网设备和配网设备之间执行身份认证的访问密钥。Step 510, the device to be connected to the network broadcasts the beacon of the first access point, the beacon includes the key calculation parameter and/or the device identifier of the device to be connected to the network, and the key calculation parameter is used to determine the connection between the device to be connected to the network and the network distribution device. The access key to perform authentication.
待入网设备在进入配网模式的情况下可以启动第一接入点,可选地,待入网设备在首次开启时自动进入配网模式,或者,待入网设备由用户操作以被动触发进入配网模式。可选地,第一接入点为待入网设备启动的soft AP。The device to be connected to the network can start the first access point when it enters the network distribution mode. Optionally, the device to be connected to the network automatically enters the network configuration mode when it is turned on for the first time, or the device to be connected to the network is operated by the user to passively trigger entering the distribution network. model. Optionally, the first access point is a soft AP started by the device to be connected to the network.
本申请实施例中,待入网设备启动第一接入点之后,可以广播第一接入点的信标,该信标中包括密钥计算参数和/或待入网设备的设备标识。待入网设备的设备标识包括待入网设备的设备ID,以用于唯一标识待入网设备。密钥计算参数用于确定待入网设备和配网设备之间执行身份认证的访问密钥。可选地,密钥计算参数的长度大于或等于一个字节。本申请实施例对密钥计算参数的内容不作限定,可选地,密钥计算参数包括预定义的数值;或者,密钥计算参数包括随机数。本申请实施例对密钥计算参数的生成方式不作限定,可选地,密钥计算参数由设备云平台(待入网设备对应的云平台)预配置;或者,密钥计算参数由待入网设备生成。在一个示例中,为了降低密钥计算参数泄露的风险,提升密钥计算参数的安全性,密钥计算参数包括待入网设备生成的随机数。可选地,第一接入点的信标中还包括预共享验证标识F,可选地,该预共享验证标识至少占用1个比特。In the embodiment of the present application, after the device to be connected to the network starts the first access point, the beacon of the first access point may be broadcast, and the beacon includes the key calculation parameter and/or the device identifier of the device to be connected to the network. The device identifier of the device to be connected to the network includes the device ID of the device to be connected to the network, so as to uniquely identify the device to be connected to the network. The key calculation parameter is used to determine the access key for performing identity authentication between the device to be connected to the network and the network distribution device. Optionally, the length of the key calculation parameter is greater than or equal to one byte. This embodiment of the present application does not limit the content of the key calculation parameter. Optionally, the key calculation parameter includes a predefined value; or, the key calculation parameter includes a random number. This embodiment of the present application does not limit the generation method of the key calculation parameter. Optionally, the key calculation parameter is pre-configured by the device cloud platform (the cloud platform corresponding to the device to be connected to the network); or, the key calculation parameter is generated by the device to be connected to the network. . In an example, in order to reduce the risk of leakage of the key calculation parameter and improve the security of the key calculation parameter, the key calculation parameter includes a random number generated by the device to be connected to the network. Optionally, the beacon of the first access point further includes a pre-shared verification identifier F, optionally, the pre-shared verification identifier occupies at least 1 bit.
在一个示例中,第一接入点的信标包括以下至少一个字段:BSSID字段、SSID字段、自定义字段(如Vendor Specific字段)。可选地,密钥计算参数和待入网设备的设备标识中的任意一个可以设置在上述任意一个字段中,也即,BSSID字段包括密钥计算参数和/或待入网设备的设备标识;或者,SSID字段包括密钥计算参数和/或待入网设备的设备标识;或者,自定义字段包括密钥计算参数和/或待入网设备的设备标识。例如,密钥计算参数设置在SSID字段中,待入网设备的设备标识设置在BSSID字段中。通常情况下,由于权限限制,自定义字段有时无法被其它设备获取,兼容性较差,因此,密钥计算参数和待入网设备的设备标识可以在自定义字段以外的字段,以避免配网设备无法获取。In one example, the beacon of the first access point includes at least one of the following fields: a BSSID field, an SSID field, and a custom field (eg, a Vendor Specific field). Optionally, any one of the key calculation parameter and the device identification of the device to be connected to the network can be set in any of the above fields, that is, the BSSID field includes the key calculation parameter and/or the device identification of the device to be connected to the network; or, The SSID field includes key calculation parameters and/or the device identification of the device to be connected to the network; or, the custom field includes key calculation parameters and/or the device identification of the device to be connected to the network. For example, the key calculation parameter is set in the SSID field, and the device identifier of the device to be connected to the network is set in the BSSID field. Usually, due to permission restrictions, custom fields can sometimes not be acquired by other devices, and the compatibility is poor. Therefore, the key calculation parameters and the device ID of the device to be connected to the network can be in fields other than the custom fields to avoid configuring network devices. Not available.
本申请实施例中,待入网设备的设备厂商可以为待入网设备唯一分配一个密钥K,并将该密钥K预配置至待入网设备中。由于待入网设备的设备标识用于唯一标识待入网设备,因此,待入网设备的设备标识和待入网设备的密钥K之间存在一一对应的关系。待入网设备的设备厂商可以将待入网设备的设备标识和待入网设备的密钥K上传至设备厂商的云平台(也即,待入网设备对应的云平台)中。In the embodiment of the present application, the device manufacturer of the device to be connected to the network may uniquely assign a key K to the device to be connected to the network, and preconfigure the key K to the device to be connected to the network. Since the device identifier of the device to be connected to the network is used to uniquely identify the device to be connected to the network, there is a one-to-one correspondence between the device identifier of the device to be connected to the network and the key K of the device to be connected to the network. The device manufacturer of the device to be connected to the network can upload the device identifier of the device to be connected to the network and the key K of the device to be connected to the network to the cloud platform of the device manufacturer (ie, the cloud platform corresponding to the device to be connected to the network).
有关待入网设备侧访问密钥(第一访问密钥)的计算过程,请参见下述方法实施例,此处不多赘述。For the calculation process of the access key (first access key) on the side of the device to be connected to the network, please refer to the following method embodiments, and details are not repeated here.
步骤520,配网设备接收第一接入点的信标。Step 520, the distribution network device receives the beacon of the first access point.
配网设备可以在不同的信道上扫描其它设备广播的信标,从而,在待入网设备广播第一接入点的信标的信道上,配网设备可以扫描到该第一接入点的信标,也即,配网设备可以接收到第一接入点的信标。可选地,配网设备在接收到第一接入点的信标后,可以进一步解析第一接入点的信标,以获取待入网设备的设备标识和/或密钥计算参数。之后配网设备可以将密钥计算参数和/或待入网设备的设备标识发送给配网云平台,由配网云平台和设备云平台计算待入网设备和配网设备之间执行身份认证的访问密钥。The distribution network device can scan the beacons broadcast by other devices on different channels, so that on the channel where the device to be connected broadcasts the beacon of the first access point, the distribution network device can scan the beacon of the first access point , that is, the distribution network device can receive the beacon of the first access point. Optionally, after receiving the beacon of the first access point, the network distribution device may further parse the beacon of the first access point to obtain the device identification and/or key calculation parameters of the device to be connected to the network. After that, the network distribution device can send the key calculation parameters and/or the device identification of the device to be connected to the network to the distribution cloud platform, and the distribution cloud platform and the device cloud platform calculate the access to perform identity authentication between the device to be connected to the network and the network distribution device. key.
有关配网设备侧访问密钥(第二访问密钥)的计算过程,请参见下述方法实施例,此处不多赘述。For the calculation process of the access key (second access key) on the side of the distribution network device, please refer to the following method embodiments, and details are not repeated here.
综上所述,本申请实施例提供的技术方案,通过在待入网设备启动的接入点的信标中增加密钥计算参数,该密钥计算参数用于确定待入网设备和配网设备之间执行身份认证的访问密钥,进而为待入网设备和配网设备之间执行身份认证提供了基础,有助于后续待入网设备和配网设备之间身份认证的实现。并且,本申请实施例中,待入网设备和配网设备之间的身份认证在待入网设备获取到网络配置信息之前,也即,待入网设备只有在身份认证通过的情况下才能获取网络配置信息,进而降低了网络配置信息泄露的风险,提升了接入点的安全性。另外,本申请实施例中,只需要在待入网设备启动的接入点的信标中增加密钥计算参数,即可实现待入网设备和配网设备的身份认证,相比于相关技术需要配网设备来回切换接入点以验证待入网设备的身份,本申请实施例简化了身份认证流程,提升了身份认证效率。To sum up, the technical solutions provided by the embodiments of this application add a key calculation parameter to the beacon of the access point activated by the device to be connected to the network, and the key calculation parameter is used to determine the relationship between the device to be connected to the network and the network distribution device. The access key for performing identity authentication between devices provides a basis for performing identity authentication between the device to be connected to the network and the device to be deployed on the network, which is helpful for the subsequent realization of identity authentication between the device to be connected to the network and the device to be connected to the network. In addition, in the embodiment of the present application, the identity authentication between the device to be accessed and the network distribution device is performed before the device to access the network obtains the network configuration information, that is, the device to be connected to the network can obtain the network configuration information only when the identity authentication is passed. , thereby reducing the risk of network configuration information leakage and improving the security of the access point. In addition, in this embodiment of the present application, it is only necessary to add a key calculation parameter to the beacon of the access point activated by the device to be connected to the network, and then the identity authentication of the device to be connected to the network and the network distribution device can be realized. The network device switches the access point back and forth to verify the identity of the device to be connected to the network. The embodiment of the present application simplifies the identity authentication process and improves the identity authentication efficiency.
下面针对待入网设备侧访问密钥(第一访问密钥)和配网设备侧访问密钥(第二访问密钥)的计算过 程进行介绍说明。The following describes the calculation process of the access key (first access key) on the side of the device to be connected to the network and the access key (second access key) on the side of the distribution device.
首先,介绍说明待入网设备侧访问密钥(第一访问密钥)的计算过程。First, the calculation process of the access key (first access key) on the side of the device to be connected to the network is described.
在一个示例中,如图6所示,上述方法还包括如下几个步骤:In an example, as shown in Figure 6, the above method further includes the following steps:
步骤531,待入网设备基于密钥计算参数和第一设备密钥,确定第一访问密钥。Step 531, the device to be connected to the network determines the first access key based on the key calculation parameter and the first device key.
第一设备密钥为预置在待入网设备中的待入网设备的设备密钥,也即上述密钥K。待入网设备在明确密钥计算参数和第一设备密钥之后,即可基于密钥计算参数和第一设备密钥计算第一访问密钥。The first device key is the device key of the device to be connected to the network preset in the device to be connected to the network, that is, the above-mentioned key K. After the device to be connected to the network specifies the key calculation parameter and the first device key, the first access key can be calculated based on the key calculation parameter and the first device key.
本申请实施例中,待入网设备可以采用密钥生成算法对密钥计算参数和第一设备密钥进行处理,可选地,上述步骤531,包括:待入网设备采用第一密钥生成算法对密钥计算参数和第一设备密钥进行处理,得到第一加密密钥;采用第一编码方式对第一加密密钥进行处理,得到第一访问密钥。由于通过第一密钥生成算法得到的第一加密密钥通常为二进制数据,为了得到可见字符串形式的第一访问密钥,则需要对第一加密密钥进行编码,本申请实施例采用第一编码方式对第一加密密钥进行编码。可选地,第一编码方式包括:Base64(基于64个可打印字符来表示二进制数据)。可选地,第一密钥生成算法包括任意一项:AES(Advanced Encryption Standard,高级加密标准)128-CMAC(Cypher-Based Message Authentication Code,基于对称加密方式实现消息认证)、HKDF(HMAC(Hash-based Message Authentication Code,哈希运算消息验证码)-based KDF(Key Derivation Function,密钥推导函数),基于HMAC的密钥推导函数)、PBKDF(Password-Based Key Derivation Function,基于密码的密钥推导函数)、SHA(Secure Hash Algorithm,安全散列算法)、DES(Data Encryption Standard,数据加密标准)算法、3DES(Triple DES,三重数据加密标准)算法。In this embodiment of the present application, the device to be connected to the network may use a key generation algorithm to process the key calculation parameter and the first device key. Optionally, the above step 531 includes: the device to be connected to the network uses the first key generation algorithm to The key calculation parameter and the first device key are processed to obtain the first encryption key; the first encryption key is processed by the first encoding method to obtain the first access key. Since the first encryption key obtained by the first key generation algorithm is usually binary data, in order to obtain the first access key in the form of a visible string, the first encryption key needs to be encoded. An encoding method encodes the first encryption key. Optionally, the first encoding manner includes: Base64 (representing binary data based on 64 printable characters). Optionally, the first key generation algorithm includes any item: AES (Advanced Encryption Standard, Advanced Encryption Standard) 128-CMAC (Cypher-Based Message Authentication Code, based on symmetric encryption to achieve message authentication), HKDF (HMAC (Hash) -based Message Authentication Code, hash operation message verification code)-based KDF (Key Derivation Function, key derivation function), HMAC-based key derivation function), PBKDF (Password-Based Key Derivation Function, password-based key Derivation function), SHA (Secure Hash Algorithm, secure hash algorithm), DES (Data Encryption Standard, data encryption standard) algorithm, 3DES (Triple DES, triple data encryption standard) algorithm.
其次,介绍说明配网设备侧访问密钥(第二访问密钥)的计算过程。Next, the calculation process of the access key (second access key) on the side of the distribution network device is introduced.
在一个示例中,如图6所示,上述方法还包括如下几个步骤:In an example, as shown in Figure 6, the above method further includes the following steps:
步骤532,配网设备向配网云平台发送第一获取请求,第一获取请求用于请求获取第二访问密钥。Step 532: The distribution network device sends a first acquisition request to the distribution network cloud platform, where the first acquisition request is used to request to acquire a second access key.
为了能够实现配网设备和待入网设备生成的访问密钥一致,第二访问密钥的计算参数和第一访问密钥的计算参数需要相同。上述第一访问密钥的计算参数包括密钥计算参数和第一设备密钥,因此,第二访问密钥的计算参数也应该包括密钥计算参数和待入网设备的设备密钥。通常情况下,为了确保待入网设备的设备密钥的安全,待入网设备的设备密钥仅有待入网设备和待入网设备的设备厂商的云平台(也即设备云平台)持有,因此,第二访问密钥需要由设备云平台参与计算。In order to achieve the same access keys generated by the network distribution device and the device to be connected to the network, the calculation parameters of the second access key need to be the same as the calculation parameters of the first access key. The above-mentioned calculation parameters of the first access key include the key calculation parameters and the first device key. Therefore, the calculation parameters of the second access key should also include the key calculation parameters and the device key of the device to be connected to the network. Usually, in order to ensure the security of the device key of the device to be connected to the network, the device key of the device to be connected to the network is only held by the cloud platform (that is, the device cloud platform) of the device to be connected to the network and the device manufacturer of the device to be connected to the network. Second, the access key needs to be calculated by the device cloud platform.
配网设备在接收到第一接入点的信标后,可以从第一接入点的信标中获取待入网设备的设备标识和/或密钥计算参数,进而配网设备向配网云平台发送第一获取请求,以请求获取第二访问密钥。本申请实施例对第一获取请求的内容不作限定,可选地,第一获取请求中包括密钥计算参数和/或待入网设备的设备标识;或者,第一获取请求中还包括待入网设备的设备厂商名称、待入网设备的设备名称、待入网设备的产品序列号等。可选地,如图6所示,若配网设备与配网云平台之间没有建立安全连接,则配网设备需要先与配网云平台之间建立安全连接,然后向配网云平台发送第一获取请求。After receiving the beacon of the first access point, the distribution network device can obtain the device identification and/or key calculation parameters of the device to be connected to the network from the beacon of the first access point, and then the distribution network device sends the data to the distribution network cloud. The platform sends the first acquisition request to request the acquisition of the second access key. This embodiment of the present application does not limit the content of the first acquisition request. Optionally, the first acquisition request includes the key calculation parameter and/or the device identifier of the device to be connected to the network; or, the first acquisition request also includes the device to be connected to the network. The name of the device manufacturer, the device name of the device to be connected to the network, the product serial number of the device to be connected to the network, etc. Optionally, as shown in Figure 6, if there is no secure connection established between the distribution network device and the distribution network cloud platform, the network distribution device needs to first establish a secure connection with the distribution network cloud platform, and then send the data to the distribution network cloud platform. First get request.
本申请实施例中,为了确保待入网设备的设备密钥的安全性,待入网设备的设备密钥也不被配网云平台持有,因此,配网云平台在接收到第一获取请求后,需要进一步从设备云平台处获取第二访问密钥。也即,如图6所示,上述步骤532之后,还包括如下几个步骤:In the embodiment of the present application, in order to ensure the security of the device key of the device to be connected to the network, the device key of the device to be connected to the network is not held by the network configuration cloud platform. Therefore, after receiving the first acquisition request, the network configuration cloud platform , the second access key needs to be further obtained from the device cloud platform. That is, as shown in FIG. 6, after the above step 532, the following steps are further included:
步骤53A,配网云平台确定设备云平台。Step 53A, the distribution network cloud platform determines the device cloud platform.
配网云平台需要先确定待入网设备对应的设备云平台。可选地,配网设备向配网云平台发送的第一获取请求中包括待入网设备的设备厂商名称,进而配网云平台可以根据该待入网设备的设备厂商名称确定对应的设备云平台。The distribution network cloud platform needs to first determine the device cloud platform corresponding to the device to be connected to the network. Optionally, the first acquisition request sent by the network distribution device to the network distribution cloud platform includes the device manufacturer name of the device to be connected to the network, and the network distribution cloud platform can determine the corresponding device cloud platform according to the device manufacturer name of the device to be connected to the network.
步骤53B,配网云平台向设备云平台发送第三获取请求,该第三获取请求用于请求获取第二访问密钥。Step 53B, the distribution network cloud platform sends a third acquisition request to the device cloud platform, where the third acquisition request is used to request to acquire the second access key.
确定了待入网设备对应的设备云平台之后,配网云平台可以进一步向设备云平台发送第三获取请求,以请求设备云平台计算第二访问密钥,并请求设备云平台将第二访问密钥发送给配网云平台。本申请实施例对第三获取请求的内容不作限定,可选地,第三获取请求中包括密钥计算参数和/或待入网设备的设备标识;或者,第三获取请求中还包括待入网设备的设备厂商名称、待入网设备的设备名称、待入网设备的产品序列号等。可选地,如图6所示,若配网云平台与设备云平台之间没有建立安全连接,则配网云平台需要先和设备云平台之间建立安全连接,之后向设备云平台发送第三获取请求。After determining the device cloud platform corresponding to the device to be connected to the network, the network configuration cloud platform may further send a third acquisition request to the device cloud platform to request the device cloud platform to calculate the second access key and request the device cloud platform to store the second access key. The key is sent to the distribution network cloud platform. This embodiment of the present application does not limit the content of the third acquisition request. Optionally, the third acquisition request includes key calculation parameters and/or the device identifier of the device to be connected to the network; or, the third acquisition request also includes the device to be connected to the network. The name of the device manufacturer, the device name of the device to be connected to the network, the product serial number of the device to be connected to the network, etc. Optionally, as shown in Figure 6, if there is no secure connection established between the distribution network cloud platform and the device cloud platform, then the distribution network cloud platform needs to establish a secure connection with the device cloud platform first, and then send the first message to the device cloud platform. Three Get Requests.
步骤53C,设备云平台计算第二访问密钥。Step 53C, the device cloud platform calculates the second access key.
由于第三获取请求中携带密钥计算参数和/或待入网设备的设备标识,设备云平台在接收到第三获取请求之后,即可依据待入网设备的设备标识,确定第二设备密钥,该第二设备密钥是设备云平台存储的待入网设备的设备密钥,也即密钥K。为了能够实现第一访问密钥和第二访问密钥一致,第一访问密钥的计算方式和第二访问密钥的计算方式也应当一致,因此,设备云平台应当采用与待入网设备计算第一访问密钥的方式来计算第二访问密钥。可选地,若待入网设备采用上述步骤531来计算第一访问密钥,则设备云平 台计算第二访问密钥的过程如下:设备云平台采用第一密钥生成算法对密钥计算参数和第二设备密钥进行处理,得到第二加密密钥;采用第一编码方式对第二加密密钥进行处理,得到第二访问密钥。有关第一密钥生成算法和第一编码方式的介绍说明,请参见上述方法实施例,此处不多赘述。Since the third acquisition request carries the key calculation parameters and/or the device identification of the device to be connected to the network, after receiving the third acquisition request, the device cloud platform can determine the second device key according to the device identification of the device to be connected to the network, The second device key is the device key of the device to be connected to the network stored in the device cloud platform, that is, the key K. In order to realize the consistency of the first access key and the second access key, the calculation method of the first access key and the calculation method of the second access key should also be consistent. An access key is used to calculate a second access key. Optionally, if the device to be connected to the network adopts the above step 531 to calculate the first access key, the process of calculating the second access key by the device cloud platform is as follows: the device cloud platform adopts the first key generation algorithm to calculate the parameters and the key calculation parameters. The second device key is processed to obtain the second encryption key; the second encryption key is processed by using the first encoding method to obtain the second access key. For an introduction and description of the first key generation algorithm and the first encoding manner, please refer to the foregoing method embodiments, and details are not repeated here.
可选地,为了分散第二访问密钥的计算开销,对第二加密密钥的编码过程也可以由配网云平台或配网设备来实施。也即,设备云平台基于密钥计算参数和第二设备密钥计算出第二加密密钥之后,第二加密密钥的编码过程可以由设备云平台、配网云平台、配网设备中任意一个来实施。Optionally, in order to disperse the computational overhead of the second access key, the process of encoding the second encryption key may also be implemented by a distribution network cloud platform or a distribution network device. That is, after the device cloud platform calculates the second encryption key based on the key calculation parameters and the second device key, the encoding process of the second encryption key can be performed by any of the device cloud platform, the distribution network cloud platform, and the distribution network device. one to implement.
步骤53D,设备云平台向配网云平台发送访问密钥信息。Step 53D, the device cloud platform sends the access key information to the distribution network cloud platform.
由上述介绍可知,设备云平台可以直接计算出第二访问密钥,并将第二访问密钥发送给配网云平台,也可以先计算出第二加密密钥,并将第二加密密钥发送给配网云平台。因此,设备云平台向配网云平台发送的访问密钥信息中包括第二访问密钥或第二加密密钥。It can be seen from the above introduction that the device cloud platform can directly calculate the second access key and send the second access key to the distribution network cloud platform, or it can first calculate the second encryption key and send the second encryption key to the cloud platform. Send it to the distribution network cloud platform. Therefore, the access key information sent by the device cloud platform to the distribution network cloud platform includes the second access key or the second encryption key.
步骤534,配网云平台向配网设备发送访问密钥信息,访问密钥信息用于确定第二访问密钥。Step 534: The distribution network cloud platform sends access key information to the distribution network device, where the access key information is used to determine the second access key.
可选地,在访问密钥信息包括第二访问密钥的情况下,配网云平台在接收到访问密钥信息之后,可以直接将该访问密钥信息转发给配网设备。可选地,在访问密钥信息包括第二加密密钥的情况下,配网云平台也可以直接将访问密钥信息转发给配网设备,然后由配网设备对第二加密密钥进行编码处理,也即,上述步骤534之后,还包括:配网设备采用第一编码方式对第二加密密钥进行处理,得到第二访问密钥;或者,配网云平台可以对第二加密密钥进行编码处理,得到第二访问密钥,并将第二访问密钥发送给配网设备。Optionally, when the access key information includes the second access key, after receiving the access key information, the distribution network cloud platform may directly forward the access key information to the distribution network device. Optionally, when the access key information includes the second encryption key, the distribution network cloud platform can also directly forward the access key information to the distribution network device, and then the distribution network device encodes the second encryption key. Processing, that is, after the above step 534, it further includes: the distribution network device uses the first encoding method to process the second encryption key to obtain the second access key; or, the distribution network cloud platform may The encoding process is performed to obtain the second access key, and the second access key is sent to the distribution network device.
需要说明的一点是,图6仅以设备云平台计算出第二访问密钥,并将第二访问密钥发送给配网云平台为例进行介绍说明,但这并不构成对本申请的技术方案的限定,实际应用中,也可以由配网云平台或配网设备对第二加密密钥进行编码处理。It should be noted that FIG. 6 only uses the device cloud platform to calculate the second access key and send the second access key to the distribution network cloud platform as an example for introduction and description, but this does not constitute the technical solution of the present application. In practical applications, the second encryption key may also be encoded by the distribution network cloud platform or the distribution network device.
在一个示例中,上述方法还包括:待入网设备和配网设备分别基于第一访问密钥和第二访问密钥执行身份认证。In an example, the above method further includes: the device to be connected to the network and the device for network distribution perform identity authentication based on the first access key and the second access key, respectively.
在待入网设备计算出第一访问密钥,配网设备得到第二访问密钥的情况下,待入网设备和配网设备可以基于第一访问密钥和第二访问密钥执行身份认证。可选地,本申请实施例采用上述4次握手流程进行身份认证,则待入网设备相当于上述4次握手流程中的Supplicant,配网设备相当于上述4次握手流程中的Authenticator,第一访问密钥相当于上述4次握手流程中Supplicant侧的PMK,第二访问密钥相当于上述4次握手流程中Authenticator侧的PMK。则在第一访问密钥和配网设备确定的第二访问密钥一致的情况下,身份认证可以通过;在第一访问密钥和配网设备确定的第二访问密钥不一致的情况下,身份认证不可以通过。有关待入网设备和配网设备执行身份认证的具体流程请参见上述4次握手流程,此处不多赘述。When the device to be connected to the network calculates the first access key and the device to be connected to the network obtains the second access key, the device to be connected to the network and the device to be connected to the network can perform identity authentication based on the first access key and the second access key. Optionally, in this embodiment of the present application, the above-mentioned 4-way handshake process is used for identity authentication, and the device to be connected to the network is equivalent to the Supplicant in the above-mentioned 4-way handshake process, and the network distribution device is equivalent to the Authenticator in the above-mentioned 4-way handshake process. The key is equivalent to the PMK on the Supplicant side in the above-mentioned 4-way handshake process, and the second access key is equivalent to the PMK on the Authenticator side in the above-mentioned 4-way handshake process. Then, if the first access key and the second access key determined by the distribution network device are consistent, the identity authentication can pass; if the first access key and the second access key determined by the distribution network device are inconsistent, Identity authentication cannot be passed. For the specific process of identity authentication performed by the device to be accessed and the network distribution device, please refer to the above-mentioned 4-way handshake process, which will not be repeated here.
在一个示例中,上述方法还包括:在身份认证通过的情况下,配网设备接入第一接入点。在身份认证通过之后,配网设备可以接入待入网设备启动的第一接入点,可选地,在配网设备接入第一接入点之后,配网设备向待入网设备发送网络配置信息,网络配置信息用于配置待入网设备接入第二接入点。In an example, the above method further includes: in the case that the identity authentication is passed, the network distribution device accesses the first access point. After the identity authentication is passed, the network configuration device can access the first access point activated by the device to be connected to the network. Optionally, after the network configuration device accesses the first access point, the network configuration device sends the network configuration to the device to be connected to the network. information, the network configuration information is used to configure the device to be connected to the network to access the second access point.
需要说明的一点是,本申请实施例仅以访问密钥基于密钥计算参数和待入网设备的设备密钥来计算进行举例说明,本领域技术人员在了解了本申请的技术方案后,将很容易想到采用其它的计算参数来计算访问密钥,如采用密钥计算参数、待入网设备的设备密钥和待入网设备的设备标识来计算访问密钥,这些均应属于本申请的保护范围之内。It should be noted that the embodiments of the present application only take the calculation of the access key based on the key calculation parameter and the device key of the device to be connected to the network as an example. It is easy to think of using other calculation parameters to calculate the access key, such as calculating the access key by using the key calculation parameter, the device key of the device to be connected to the network, and the device identifier of the device to be connected to the network, these should all belong to the protection scope of this application. Inside.
综上所述,本申请实施例提供的技术方案,通过待入网设备和配网设备分别依据密钥计算参数获取访问密钥,并依据分别获取的访问密钥执行身份认证,实现了在待入网设备接入网络之前,或在待入网设备获取网络配置信息之前,对待入网设备的身份进行认证,避免网络配置信息的泄露,提升了接入点的安全性。并且,本申请实施例中,为了充分确保待入网设备的设备密钥的安全性,配网设备侧的访问密钥由待入网设备对应的云平台计算,以避免泄露待入网设备的设备密钥,提升了身份认证的有效性。To sum up, in the technical solutions provided by the embodiments of the present application, the device to be connected to the network and the network distribution device respectively obtain the access key according to the key calculation parameter, and perform identity authentication according to the separately obtained access key, so that the device to be connected to the network and the network distribution device can perform identity authentication. Before the device is connected to the network, or before the device to be connected to the network obtains the network configuration information, the identity of the device to be connected to the network is authenticated, so as to avoid leakage of the network configuration information and improve the security of the access point. In addition, in the embodiment of the present application, in order to fully ensure the security of the device key of the device to be connected to the network, the access key on the side of the distribution device is calculated by the cloud platform corresponding to the device to be connected to the network, so as to avoid leaking the device key of the device to be connected to the network. , which improves the effectiveness of identity authentication.
下面以第一接入点为soft AP,第二接入点为家庭WiFi网络为例,对本申请的技术方案进行介绍说明。如图7所示,本申请实施例提供的信息处理方法包括如下几个步骤:The technical solution of the present application is described below by taking the first access point as a soft AP and the second access point as a home WiFi network as an example. As shown in FIG. 7 , the information processing method provided by the embodiment of the present application includes the following steps:
步骤700,待入网设备广播soft AP的信标。信标中包括密钥计算参数和/或待入网设备的设备标识,密钥计算参数用于确定待入网设备和配网设备之间执行身份认证的访问密钥。Step 700, the device to be connected to the network broadcasts the beacon of the soft AP. The beacon includes a key calculation parameter and/or a device identity of the device to be connected to the network, and the key calculation parameter is used to determine an access key for performing identity authentication between the device to be connected to the network and the network distribution device.
步骤710,配网设备接收soft AP的信标。配网设备在接收到soft AP的信标后,可以进一步解析soft AP的信标,以获取待入网设备的设备标识和/或密钥计算参数。Step 710, the distribution network device receives the beacon of the soft AP. After receiving the beacon of the soft AP, the distribution network device can further analyze the beacon of the soft AP to obtain the device identification and/or key calculation parameters of the device to be connected to the network.
步骤720,待入网设备基于密钥计算参数和第一设备密钥,确定第一访问密钥。待入网设备采用第一密钥生成算法对密钥计算参数和第一设备密钥进行处理,得到第一加密密钥;采用第一编码方式对第一加密密钥进行处理,得到第一访问密钥。Step 720, the device to be connected to the network determines the first access key based on the key calculation parameter and the first device key. The device to be connected to the network uses the first key generation algorithm to process the key calculation parameter and the first device key to obtain the first encryption key; uses the first encoding method to process the first encryption key to obtain the first access key. key.
步骤730,配网设备向配网云平台发送第一获取请求,第一获取请求用于请求获取第二访问密钥。第 一获取请求中包括密钥计算参数和/或待入网设备的设备标识。可选地,如图7所示,若配网设备与配网云平台之间没有建立安全连接,则配网设备需要先与配网云平台之间建立安全连接,然后向配网云平台发送第一获取请求。Step 730: The distribution network device sends a first acquisition request to the distribution network cloud platform, where the first acquisition request is used to request to acquire a second access key. The first acquisition request includes the key calculation parameter and/or the device identifier of the device to be connected to the network. Optionally, as shown in Figure 7, if there is no secure connection established between the distribution network device and the distribution network cloud platform, the network distribution device needs to first establish a secure connection with the distribution network cloud platform, and then send the data to the distribution network cloud platform. First get request.
步骤740,配网云平台确定设备云平台。配网云平台可以根据待入网设备的设备厂商名称确定对应的设备云平台。Step 740, the configuration network cloud platform determines the device cloud platform. The distribution network cloud platform can determine the corresponding device cloud platform according to the device manufacturer name of the device to be connected to the network.
步骤750,配网云平台向设备云平台发送第三获取请求,该第三获取请求用于请求获取第二访问密钥。可选地,如图7所示,若配网云平台与设备云平台之间没有建立安全连接,则配网云平台需要先和设备云平台之间建立安全连接,之后向设备云平台发送第三获取请求。Step 750: The distribution network cloud platform sends a third acquisition request to the device cloud platform, where the third acquisition request is used to request to acquire the second access key. Optionally, as shown in Figure 7, if no secure connection is established between the distribution network cloud platform and the device cloud platform, then the distribution network cloud platform needs to first establish a secure connection with the device cloud platform, and then send the first message to the device cloud platform. Three Get Requests.
步骤760,设备云平台计算第二访问密钥。设备云平台在接收到第三获取请求之后,即可依据待入网设备的设备标识,确定第二设备密钥。之后,设备云平台采用第一密钥生成算法对密钥计算参数和第二设备密钥进行处理,得到第二加密密钥;采用第一编码方式对第二加密密钥进行处理,得到第二访问密钥。Step 760, the device cloud platform calculates the second access key. After receiving the third acquisition request, the device cloud platform can determine the second device key according to the device identifier of the device to be connected to the network. After that, the device cloud platform uses the first key generation algorithm to process the key calculation parameters and the second device key to obtain the second encryption key; uses the first encoding method to process the second encryption key to obtain the second encryption key. access key.
步骤770,设备云平台向配网云平台发送第二访问密钥。Step 770, the device cloud platform sends the second access key to the distribution network cloud platform.
步骤780,配网云平台向配网设备发送第二访问密钥。Step 780: The distribution network cloud platform sends the second access key to the distribution network device.
步骤790,待入网设备和配网设备分别基于第一访问密钥和第二访问密钥进行身份认证。在第一访问密钥和第二访问密钥一致的情况下,身份认证通过,配网设备能够接入soft AP,并向待入网设备发送家庭WiFi网络的网络配置信息。In step 790, the device to be connected to the network and the network distribution device perform identity authentication based on the first access key and the second access key, respectively. In the case that the first access key and the second access key are consistent, the identity authentication is passed, and the network configuration device can access the soft AP, and send the network configuration information of the home WiFi network to the device to be connected to the network.
需要说明的一点是,本申请实施例对上述各个步骤的执行先后顺序不作限定,在满足实现逻辑的前提下,上述各个步骤可以任何执行顺序进行组合。例如,上述步骤720也可以在上述步骤710之前执行,或者,上述步骤720还可以再上述步骤780之后执行。这些均应属于本申请的保护范围之内。It should be noted that the embodiment of the present application does not limit the execution sequence of the above steps, and the above steps can be combined in any execution order on the premise of satisfying the implementation logic. For example, the above-mentioned step 720 may also be performed before the above-mentioned step 710 , or the above-mentioned step 720 may also be performed after the above-mentioned step 780 . These should all fall within the protection scope of the present application.
请参考图8,其示出了本申请一个实施例提供的信息处理方法的流程图,该方法可以应用于图1所示的配网系统中。该方法可以包括如下几个步骤:Please refer to FIG. 8 , which shows a flowchart of an information processing method provided by an embodiment of the present application, and the method can be applied to the distribution network system shown in FIG. 1 . The method may include the following steps:
步骤810,配网设备向待入网设备发送第一信息,第一信息包括密钥计算参数,密钥计算参数用于确定第一信息密钥。Step 810: The network distribution device sends first information to the device to be connected to the network, where the first information includes a key calculation parameter, and the key calculation parameter is used to determine the first information key.
配网设备在连接待入网设备启动的第一接入点之后,与待入网设备之间建立通信连接。可选地,配网设备与待入网设备之间的通信连接为TCP连接或UDP连接。在建立通信连接之后,配网设备和待入网设备之间可以进行数据的传输。本申请实施例中,配网设备向待入网设备发送第一信息,该第一信息中包括密钥计算参数。待入网设备采用密钥计算参数可以确定第一信息密钥,该第一信息密钥可以用于解密采用第二信息密钥加密的第二信息或采用第二信息密钥加密的网络配置信息,也可以用于加密第一参考信息。在第一信息密钥和第二信息密钥一致的情况下,待入网设备才能成功解析采用第二信息密钥加密的网络配置信息或第二信息,进而待入网设备通过身份认证;或者,在第一信息密钥和第二信息密钥一致,且第一参考信息和第二参考信息一致的情况下,采用第一加密密钥加密的第一参考信息和采用第二加密密钥加密的第二参考信息才能够一致,进而待入网设备通过身份认证。After connecting to the first access point started by the device to be connected to the network, the network distribution device establishes a communication connection with the device to be connected to the network. Optionally, the communication connection between the network configuration device and the device to be connected to the network is a TCP connection or a UDP connection. After the communication connection is established, data transmission can be performed between the network distribution device and the device to be connected to the network. In the embodiment of the present application, the network distribution device sends first information to the device to be connected to the network, where the first information includes a key calculation parameter. The device to be connected to the network can use the key calculation parameter to determine the first information key, and the first information key can be used to decrypt the second information encrypted with the second information key or the network configuration information encrypted with the second information key, It can also be used to encrypt the first reference information. In the case where the first information key and the second information key are the same, the device to be connected to the network can successfully parse the network configuration information or the second information encrypted by the second information key, and then the device to be connected to the network passes the identity authentication; When the first information key and the second information key are the same, and the first reference information and the second reference information are the same, the first reference information encrypted with the first encryption key and the first reference information encrypted with the second encryption key are the same. The two reference information can be consistent, and then the device to be connected to the network can pass the identity authentication.
本申请实施例对密钥计算参数的内容不作限定,可选地,密钥计算参数包括随机数;或者,密钥计算参数包括预配置的数值。可选地,密钥计算参数由设备云平台(待入网设备对应的云平台)生成。可选地,所述密钥计算参数的长度大于或等于一个字节。本申请实施例对密钥计算参数的确定时机不作限定,可选地,设备云平台在接收到用于获取第二信息密钥或用于获取第四参考信息的请求后生成密钥计算参数;或者,设备云平台预先生成有密钥计算参数,后续接收到用于获取第二信息密钥或用于获取第四参考信息的请求后,直接依据该密钥计算参数和待入网设备的设备密钥计算第二信息密钥即可。This embodiment of the present application does not limit the content of the key calculation parameter. Optionally, the key calculation parameter includes a random number; or, the key calculation parameter includes a preconfigured value. Optionally, the key calculation parameter is generated by the device cloud platform (the cloud platform corresponding to the device to be connected to the network). Optionally, the length of the key calculation parameter is greater than or equal to one byte. This embodiment of the present application does not limit the timing for determining the key calculation parameter. Optionally, the device cloud platform generates the key calculation parameter after receiving the request for obtaining the second information key or for obtaining the fourth reference information; Alternatively, the device cloud platform has pre-generated key calculation parameters, and subsequently receives a request for obtaining the second information key or for obtaining the fourth reference information, and directly calculates the parameters according to the key and the device key of the device to be connected to the network. The second information key can be calculated using the key.
本申请实施例针对soft AP配网下的身份认证,提出两种方式,一种方式是身份认证过程与配网过程耦合,另一种方式是身份认证过程和配网过程解耦合。下面分别针对这两种方式进行介绍说明。The embodiment of the present application proposes two methods for the identity authentication under the soft AP distribution network, one way is that the identity authentication process is coupled with the network distribution process, and the other way is the decoupling of the identity authentication process and the network distribution process. The following describes the two methods respectively.
首先,介绍说明身份认证过程与配网过程耦合的方式。First, the method of coupling the identity authentication process and the network distribution process is introduced.
在一个示例中,上述第一信息还包括采用第二信息密钥加密的网络配置信息;上述方法还包括:配网云平台向配网设备发送密钥计算参数和第二信息密钥;配网设备基于密钥计算参数、第二信息密钥和网络配置信息,确定第一信息。In an example, the above-mentioned first information further includes network configuration information encrypted with the second information key; the above-mentioned method further includes: the distribution network cloud platform sends the key calculation parameter and the second information key to the distribution network device; the distribution network The device determines the first information based on the key calculation parameter, the second information key, and the network configuration information.
网络配置信息用于配置待入网设备接入第二接入点,配网设备在配置待入网设备接入第二接入点的过程中,需要向待入网设备发送第二接入点对应的网络配置信息,后续待入网设备根据该网络配置信息即可接入第二接入点。本申请实施例中,配网设备不是直接将网络配置信息发送给待入网设备,而是采用第二信息密钥对网络配置信息进行处理之后,将加密的网络配置信息发送给待入网设备,后续待入网设备若能成功解密加密的网络配置信息,则能够使用获取的网络配置信息接入第二接入点。The network configuration information is used to configure the device to be connected to the network to access the second access point. During the process of configuring the device to be connected to the network to access the second access point, the network configuration device needs to send the network device corresponding to the second access point to the device to be connected to the network. configuration information, and the subsequent device to be connected to the network can access the second access point according to the network configuration information. In this embodiment of the present application, the network configuration device does not directly send the network configuration information to the device to be connected to the network, but uses the second information key to process the network configuration information, and then sends the encrypted network configuration information to the device to be connected to the network. If the device to be connected to the network can successfully decrypt the encrypted network configuration information, it can use the acquired network configuration information to access the second access point.
为了确保待入网设备计算出的第一信息密钥能够与第二信息密钥一致,配网设备还需将第二信息密钥计算过程中使用的密钥计算参数也发送给待入网设备,以便于后续待入网设备根据该密钥计算参数以及待 入网设备的设备密钥,确定第一信息密钥。有关第一信息密钥和第二信息密钥的计算过程,请参见下述方法实施例,此处不多赘述。In order to ensure that the first information key calculated by the device to be connected to the network can be consistent with the second information key, the network distribution device also needs to send the key calculation parameters used in the calculation of the second information key to the device to be connected to the network, so that In subsequent steps, the device to be connected to the network determines the first information key according to the key calculation parameter and the device key of the device to be connected to the network. For the calculation process of the first information key and the second information key, please refer to the following method embodiments, and details are not repeated here.
由上述介绍可知,配网设备需要向待入网设备至少发送以下信息:采用第二信息密钥加密的网络配置信息、密钥计算参数。因此,配网设备需要先根据网络配置信息和第二信息密钥确定采用第二信息密钥加密的网络配置信息,然后将采用第二信息密钥加密的网络配置信息和密钥计算参数发送给待入网设备。基于此,可选地,上述基于密钥计算参数、第二信息密钥和网络配置信息,确定第一信息,包括:采用第四加密算法和第二信息密钥对网络配置信息进行处理,得到采用第二信息密钥加密的网络配置信息;基于密钥计算参数和采用第二信息密钥加密的网络配置信息,确定第一信息。It can be seen from the above description that the network distribution device needs to send at least the following information to the device to be connected to the network: network configuration information encrypted with the second information key, and key calculation parameters. Therefore, the network distribution device needs to first determine the network configuration information encrypted with the second information key according to the network configuration information and the second information key, and then send the network configuration information and key calculation parameters encrypted with the second information key to the The device to be connected to the network. Based on this, optionally, determining the first information based on the key calculation parameter, the second information key, and the network configuration information includes: using the fourth encryption algorithm and the second information key to process the network configuration information to obtain The network configuration information encrypted with the second information key; the first information is determined based on the key calculation parameter and the network configuration information encrypted with the second information key.
可选地,第四加密算法为对称加密算法。可选地,第四加密算法包括但不限于下述任意一项:AES128-CMAC、AES128-CBC、AES128-GCM、AES256-CMAC、AES256-CBC、AES256-GCM。Optionally, the fourth encryption algorithm is a symmetric encryption algorithm. Optionally, the fourth encryption algorithm includes but is not limited to any one of the following: AES128-CMAC, AES128-CBC, AES128-GCM, AES256-CMAC, AES256-CBC, and AES256-GCM.
配网设备将第一信息发送给待入网设备之后,待入网设备先根据第一信息中的密钥计算参数确定第一信息密钥,然后使用第一信息密钥解密第一信息中采用第二信息密钥加密的网络配置信息。在一个示例中,上述方法还包括:待入网设备采用第一信息密钥解密采用第二信息密钥加密的网络配置信息;在第一信息密钥和第二信息密钥一致的情况下,待入网设备身份认证能够成功,进而待入网设备获取网络配置信息成功;在第一信息密钥和第二信息密钥不一致的情况下,待入网设备身份认证失败,进而待入网设备获取网络配置信息失败。After the network distribution device sends the first information to the device to be connected to the network, the device to be connected to the network first determines the first information key according to the key calculation parameter in the first information, and then uses the first information key to decrypt the first information using the second key. Information key encrypted network configuration information. In one example, the above method further includes: the device to be connected to the network uses the first information key to decrypt the network configuration information encrypted by the second information key; in the case that the first information key and the second information key are consistent, The identity authentication of the network access device can succeed, and then the network access device succeeds in obtaining network configuration information; in the case where the first information key and the second information key are inconsistent, the network access device identity authentication fails, and the network access device fails to obtain network configuration information. .
其次,介绍说明身份认证过程与配网过程解耦合的方式。本申请实施例针对身份认证过程与配网过程解耦合的方式也提出了两种方式,一种方式是配网设备根据分别采用第一信息密钥和第二信息密钥加密的数据来进行身份认证,另一种方式是配网设备根据分别来自于设备云平台和待入网设备的数据来进行身份认证。下面,分别对这两种方式进行介绍说明。Secondly, the method of decoupling the identity authentication process and the distribution network process is introduced. The embodiment of the present application also proposes two methods for decoupling the identity authentication process from the network distribution process. One method is that the network distribution device performs identity identification according to the data encrypted by the first information key and the second information key respectively. Authentication, another way is that the network distribution device performs identity authentication according to the data from the device cloud platform and the device to be connected to the network. Below, these two methods are introduced and explained respectively.
方式一:method one:
在一个示例中,上述方法还包括:待入网设备根据第一信息密钥和第一参考信息,得到第一加密信息;待入网设备向配网设备发送第一加密信息。In an example, the above method further includes: the device to be connected to the network obtains the first encrypted information according to the first information key and the first reference information; the device to be connected to the network sends the first encrypted information to the network distribution device.
第一参考信息用于待入网设备的身份认证过程。可选地,待入网设备的设备厂商为待入网设备唯一分配参考信息,并将参考信息预配置至待入网设备中(预配置在待入网设备中的参考信息称为“第一参考信息”)。由于待入网设备的设备标识用于唯一标识待入网设备,因此,待入网设备的设备标识和参考信息之间存在一一对应的关系。待入网设备的设备厂商可以将待入网设备的设备标识和参考信息上传至设备云平台(也即,待入网设备对应的云平台)中(设备云平台中存储的参考信息称为“第二参考信息”)。可选地,参考信息为预配置的数值,或者,参考信息为预配置的随机数,本申请实施例对参考信息的内容不作限定。The first reference information is used for the identity authentication process of the device to be connected to the network. Optionally, the device manufacturer of the device to be connected to the network uniquely allocates reference information for the device to be connected to the network, and preconfigures the reference information into the device to be connected to the network (the reference information preconfigured in the device to be connected to the network is referred to as "first reference information") . Since the device identifier of the device to be connected to the network is used to uniquely identify the device to be connected to the network, there is a one-to-one correspondence between the device identifier of the device to be connected to the network and the reference information. The device manufacturer of the device to be connected to the network can upload the device identification and reference information of the device to be connected to the network to the device cloud platform (that is, the cloud platform corresponding to the device to be connected to the network) (the reference information stored in the device cloud platform is called "second reference". information"). Optionally, the reference information is a preconfigured value, or the reference information is a preconfigured random number, and the content of the reference information is not limited in this embodiment of the present application.
为了确保第一参考信息和第二参考信息的安全,第一参考信息和第二参考信息分别由待入网设备以及设备云平台(待入网设备对应的云平台)持有,则配网设备无法直接获取第二参考信息,而是获取的采用第二信息密钥加密的第一参考信息(即第二加密信息)。也即,上述方法还包括:配网云平台向配网设备发送第二加密信息。In order to ensure the security of the first reference information and the second reference information, the first reference information and the second reference information are respectively held by the device to be connected to the network and the device cloud platform (the cloud platform corresponding to the device to be connected to the network), so the network distribution device cannot directly The second reference information is acquired, but the acquired first reference information (ie, the second encrypted information) encrypted with the second information key. That is, the above method further includes: the distribution network cloud platform sends the second encrypted information to the distribution network device.
本申请实施例中,设备云平台可以基于密钥计算参数计算出第二信息密钥,并使用该第二信息密钥加密第二参考信息,得到第二加密信息,然后将第二加密信息以及密钥计算参数发送给配网云平台,配网云平台再进一步发送给配网设备。配网设备与待入网设备建立通信连接之后,可以将密钥计算参数发送给待入网设备,以便于后续待入网设备采用密钥计算参数计算第一信息密钥,并采用第一信息密钥加密第一参考信息,得到第一加密信息,并进一步将该第一加密信息发送给配网设备。In this embodiment of the present application, the device cloud platform may calculate the second information key based on the key calculation parameter, and use the second information key to encrypt the second reference information to obtain the second encrypted information, and then combine the second encrypted information and the The key calculation parameters are sent to the distribution network cloud platform, and the distribution network cloud platform is further sent to the distribution network equipment. After the network distribution device establishes a communication connection with the device to be connected to the network, the key calculation parameter can be sent to the device to be connected to the network, so that the device to be connected to the network can use the key calculation parameter to calculate the first information key and encrypt it with the first information key. The first reference information is used to obtain the first encrypted information, and the first encrypted information is further sent to the distribution network device.
配网设备一方面接收来自于待入网设备的第一加密信息,另一方面接收来自于配网云平台的第二加密信息,进而配网设备可以进一步将第一加密信息和第二加密信息进行比对,若这两个加密信息相同,则待入网设备的身份认证通过,配网设备可以进一步向待入网设备发送网络配置信息。基于此,上述方法还包括:配网设备在第一加密信息和第二加密信息一致的情况下,向待入网设备发送网络配置信息,网络配置信息用于配置待入网设备接入第二接入点。On the one hand, the network distribution device receives the first encrypted information from the device to be connected to the network; By comparison, if the two encrypted information are the same, the identity authentication of the device to be connected to the network has passed, and the network configuration device can further send network configuration information to the device to be connected to the network. Based on this, the above method further includes: when the first encrypted information and the second encrypted information are consistent, the network configuration device sends network configuration information to the device to be connected to the network, where the network configuration information is used to configure the device to be connected to the network to access the second access point.
需要说明的一点是,本申请实施例中,第一参考信息和第二参考信息不一致的情况下,待入网设备的身份认证失败,另外,在待入网设备确定的第一信息密钥和设备云平台确定的第二信息密钥不一致的情况下,待入网设备的身份认证也会失败。也即,只有在第一信息密钥和第二信息密钥一致,且第一参考信息和第二参考信息一致的情况下,待入网设备的身份认证才能够成功,进而待入网设备才能够获取网络配置信息。It should be noted that, in the embodiment of this application, when the first reference information and the second reference information are inconsistent, the identity authentication of the device to be connected to the network fails. In addition, the first information key determined by the device to be connected to the network and the device cloud If the second information key determined by the platform is inconsistent, the identity authentication of the device to be connected to the network will also fail. That is, only when the first information key and the second information key are consistent, and the first reference information and the second reference information are consistent, the identity authentication of the device to be connected to the network can be successful, and then the device to be connected to the network can be obtained. Network configuration information.
方式二:Method two:
在一个示例中,上述第一信息还包括采用第二信息密钥加密的第二信息;上述方法还包括:采用第一信息密钥解密采用第二信息密钥加密的第二信息,得到第三参考信息;向配网设备发送第三参考信息。In an example, the first information further includes second information encrypted with the second information key; the method further includes: decrypting the second information encrypted with the second information key using the first information key, to obtain the third information Reference information; send third reference information to the distribution network device.
第二信息用于待入网设备的身份认证过程。待入网设备解密得到的第二信息包括第三参考信息。可选 地,第三参考信息为预配置的数值,或者,第三参考信息为预配置的随机数,本申请实施例对第三参考信息的内容不作限定。在一个示例中,为了提升身份认证的有效性,待入网设备解密得到的第二信息中还可以包括预定义数值,该预定义数值只有待入网设备和设备云平台持有。The second information is used for the identity authentication process of the device to be connected to the network. The second information decrypted by the device to be connected to the network includes third reference information. Optionally, the third reference information is a preconfigured value, or, the third reference information is a preconfigured random number, and the content of the third reference information is not limited in this embodiment of the present application. In an example, in order to improve the validity of identity authentication, the second information decrypted by the device to be connected to the network may further include a predefined value, and the predefined value is only held by the device to be connected to the network and the device cloud platform.
本申请实施例中,设备云平台可以基于密钥计算参数计算出第二信息密钥,并使用该第二信息密钥加密第二信息,得到加密后的第二信息(设备云平台加密第二信息时,第二信息中的参考信息称为“第四参考信息”),然后将参考信息、加密后的第二信息以及密钥计算参数发送给配网云平台,配网云平台再进一步发送给配网设备。配网设备与待入网设备建立通信连接之后,可以将密钥计算参数和加密后的第二信息发送给待入网设备,以便于后续待入网设备采用密钥计算参数计算第一信息密钥,并采用第一信息密钥解密加密后的第二信息,得到第二信息中的参考信息(待入网设备侧解密得到的第二信息中的参考信息称为“第三参考信息”),并进一步将该参考信息发送给配网设备。In this embodiment of the present application, the device cloud platform may calculate the second information key based on the key calculation parameter, and use the second information key to encrypt the second information to obtain the encrypted second information (the device cloud platform encrypts the second information key) information, the reference information in the second information is called "fourth reference information"), and then the reference information, the encrypted second information and the key calculation parameters are sent to the distribution network cloud platform, and the distribution network cloud platform further sends to distribution network equipment. After the network distribution device establishes a communication connection with the device to be connected to the network, the key calculation parameter and the encrypted second information can be sent to the device to be connected to the network, so that the device to be connected to the network subsequently uses the key calculation parameter to calculate the first information key, and Use the first information key to decrypt the encrypted second information to obtain the reference information in the second information (the reference information in the second information decrypted by the device side to be accessed is called "third reference information"), and further The reference information is sent to the distribution network device.
配网设备一方面接收来自于待入网设备的第三参考信息,另一方面接收来自于配网云平台的第四参考信息,进而配网设备可以进一步将第三参考信息和第四参考信息进行比对,若这两个参考信息相同,则待入网设备的身份认证通过,配网设备可以进一步向待入网设备发送网络配置信息。基于此,上述方法还包括:待入网设备向配网设备发送第三参考信息;配网云平台向配网设备发送第四参考信息;配网设备在第三参考信息和第四参考信息一致的情况下,向待入网设备发送网络配置信息,网络配置信息用于配置待入网设备接入第二接入点。On the one hand, the distribution network device receives the third reference information from the device to be connected to the network; By comparison, if the two reference information are the same, the identity authentication of the device to be connected to the network has passed, and the network configuration device can further send network configuration information to the device to be connected to the network. Based on this, the above method further includes: the device to be connected to the network sends third reference information to the distribution network device; the distribution network cloud platform sends fourth reference information to the distribution network device; In this case, network configuration information is sent to the device to be connected to the network, where the network configuration information is used to configure the device to be connected to the network to access the second access point.
需要说明的一点是,本申请实施例中,第三参考信息和第四参考信息不一致的情况下,待入网设备的身份认证失败,另外,在待入网设备确定的第一信息密钥和设备云平台确定的第二信息密钥不一致的情况下,待入网设备的身份认证也会失败。也即,只有在第一信息密钥和第二信息密钥一致,且第三参考信息和第四参考信息一致的情况下,待入网设备的身份认证才能够成功,进而待入网设备才能够获取网络配置信息。It should be noted that, in the embodiment of this application, when the third reference information and the fourth reference information are inconsistent, the identity authentication of the device to be connected to the network fails. In addition, the first information key determined by the device to be connected to the network and the device cloud If the second information key determined by the platform is inconsistent, the identity authentication of the device to be connected to the network will also fail. That is, only when the first information key and the second information key are consistent, and the third reference information and the fourth reference information are consistent, the identity authentication of the device to be connected to the network can be successful, and then the device to be connected to the network can be obtained. Network configuration information.
综上所述,本申请实施例提供的技术方案,通过配网设备向待入网设备发送密钥计算参数,该密钥计算参数用于计算信息密钥,该信息密钥可以用于解密采用设备云平台计算的信息密钥加密的数据或采用设备云平台计算的信息密钥加密的网络配置信息,也可以用于加密参考信息。在待入网设备计算的信息密钥和设备云平台计算的信息密钥一致的情况下,待入网设备才能成功解析采用设备云平台计算的信息密钥加密的网络配置信息或数据,进而待入网设备通过身份认证,并进一步获取网络配置信息;或者,在待入网设备计算的信息密钥和设备云平台计算的信息密钥一致的情况下,采用这两个信息密钥分别加密得到的数据才能够实现一致,进而待入网设备通过身份认证,并进一步获取网络配置信息。因此,本申请实施例在待入网设备接入无线接入点之前对待入网设备的身份进行认证,避免无线接入点对应的网络配置信息泄露,提成无线接入点的安全性。To sum up, in the technical solutions provided by the embodiments of the present application, the key calculation parameters are sent to the device to be connected to the network through the network distribution device, and the key calculation parameters are used to calculate the information key, and the information key can be used for decryption using the device. The data encrypted by the information key calculated by the cloud platform or the network configuration information encrypted by the information key calculated by the device cloud platform can also be used to encrypt the reference information. Only when the information key calculated by the device to be connected to the network and the information key calculated by the device cloud platform are the same, the device to be connected can successfully parse the network configuration information or data encrypted with the information key calculated by the device cloud platform, and then the device to be connected to the network can successfully parse the network configuration information or data encrypted by the information key calculated by the device cloud platform. Through identity authentication, the network configuration information can be further obtained; or, in the case where the information key calculated by the device to be connected to the network is consistent with the information key calculated by the device cloud platform, the data obtained by encrypting the two information keys respectively can be used. Consistency is achieved, and then the device to be connected to the network passes identity authentication and further obtains network configuration information. Therefore, in the embodiment of the present application, the identity of the device to be accessed is authenticated before the device to access the wireless access point, so as to avoid leakage of network configuration information corresponding to the wireless access point, and improve the security of the wireless access point.
并且,本申请实施例中,对待入网设备的身份认证过程可以和配网过程耦合,也即,配网设备直接采用设备云平台计算的信息密钥加密网络配置信息,在待入网设备计算的信息密钥和设备云平台计算的信息密钥一致的情况下,待入网设备可以直接获取到网络配置信息,减少了配网设备和待入网设备之间的数据往来,降低配网设备和待入网设备的处理开销。另外,本申请实施例中,对待入网设备的身份认证过程也可以和配网过程解耦合,也即,配网设备在待入网设备的身份认证通过后,向待入网设备发送网络配置信息,通过身份认证过程和配网过程解耦合,可以充分提成网络配置信息的安全性。Moreover, in this embodiment of the present application, the identity authentication process of the device to be connected to the network can be coupled with the network distribution process, that is, the network distribution device directly encrypts the network configuration information with the information key calculated by the device cloud platform, and the information calculated by the device to be connected to the network is encrypted. When the key and the information key calculated by the device cloud platform are the same, the device to be connected to the network can directly obtain the network configuration information, which reduces the data exchange between the network distribution device and the device to be connected to the network, and reduces the number of distribution devices and the device to be connected to the network. processing overhead. In addition, in this embodiment of the present application, the identity authentication process of the device to be connected to the network can also be decoupled from the network distribution process, that is, after the identity authentication of the device to be connected to the network is passed, the network distribution device sends the network configuration information to the device to be connected to the network. The decoupling of the identity authentication process and the distribution network process can fully improve the security of network configuration information.
下面针对待入网设备侧的第一信息密钥和配网设备侧的第二信息密钥的计算过程进行介绍说明。The following describes the calculation process of the first information key on the side of the device to be connected to the network and the second information key on the side of the network distribution device.
首先,介绍说明待入网设备侧的第一信息密钥的计算过程。First, the calculation process of the first information key on the side of the device to be connected to the network is described.
在一个示例中,如图9所示,上述方法还包括如下几个步骤:In an example, as shown in Figure 9, the above method further includes the following steps:
步骤831,待入网设备基于密钥计算参数和第一设备密钥,确定第一信息密钥。Step 831, the device to be connected to the network determines the first information key based on the key calculation parameter and the first device key.
本申请实施例中,待入网设备的设备厂商可以为待入网设备唯一分配一个密钥K,并将该密钥K预配置至待入网设备中。由于待入网设备的设备标识用于唯一标识待入网设备,因此,待入网设备的设备标识和待入网设备的密钥K之间存在一一对应的关系。待入网设备的设备厂商可以将待入网设备的设备标识和待入网设备的密钥K上传至设备云平台(也即,待入网设备对应的云平台)中。第一设备密钥即为预置在待入网设备中的待入网设备的设备密钥。待入网设备在明确密钥计算参数和第一设备密钥之后,即可基于密钥计算参数和第一设备密钥计算第一信息密钥。In the embodiment of the present application, the device manufacturer of the device to be connected to the network may uniquely assign a key K to the device to be connected to the network, and preconfigure the key K to the device to be connected to the network. Since the device identifier of the device to be connected to the network is used to uniquely identify the device to be connected to the network, there is a one-to-one correspondence between the device identifier of the device to be connected to the network and the key K of the device to be connected to the network. The device manufacturer of the device to be connected to the network can upload the device identifier of the device to be connected to the network and the key K of the device to be connected to the network to the device cloud platform (ie, the cloud platform corresponding to the device to be connected to the network). The first device key is the device key of the device to be connected that is preset in the device to be connected to the network. After the device to be connected to the network specifies the key calculation parameter and the first device key, the first information key can be calculated based on the key calculation parameter and the first device key.
本申请实施例中,待入网设备可以采用密钥生成算法对密钥计算参数和第一设备密钥进行处理,可选地,上述步骤831,包括:待入网设备采用第四密钥生成算法对密钥计算参数和第一设备密钥进行处理,得到第一信息密钥。可选地,第四密钥生成算法包括任意一项:AES128-CMAC、HKDF-based KDF、PBKDF、SHA、DES算法、3DES算法。In this embodiment of the present application, the device to be connected to the network may use a key generation algorithm to process the key calculation parameter and the first device key. Optionally, the above step 831 includes: the device to be connected to the network uses a fourth key generation algorithm to The key calculation parameter and the first device key are processed to obtain the first information key. Optionally, the fourth key generation algorithm includes any one of: AES128-CMAC, HKDF-based KDF, PBKDF, SHA, DES algorithm, and 3DES algorithm.
其次,介绍说明配网设备侧的第二信息密钥的计算过程。本申请实施例中,待入网设备的身份认证过 程和配网过程既可以耦合,也可以解耦合,下面针对这两种情况,分别进行介绍说明。Next, the calculation process of the second information key on the side of the distribution network device is introduced. In the embodiment of the present application, the identity authentication process and the network distribution process of the device to be connected to the network can be either coupled or decoupled. The following describes the two situations respectively.
情况一:待入网设备的身份认证过程和配网过程耦合:Case 1: The identity authentication process of the device to be connected to the network is coupled with the network distribution process:
在一个示例中,如图9所示,上述方法还包括如下几个步骤:In an example, as shown in Figure 9, the above method further includes the following steps:
步骤841,配网设备接收待入网设备启动的第一接入点的信标,信标中包括待入网设备的设备标识。Step 841: The network distribution device receives the beacon of the first access point activated by the device to be connected to the network, where the beacon includes the device identifier of the device to be connected to the network.
待入网设备在进入配网模式的情况下可以启动第一接入点,可选地,待入网设备在首次开启时自动进入配网模式,或者,待入网设备由用户操作以被动触发进入配网模式。可选地,第一接入点为待入网设备启动的soft AP。待入网设备在进入配网模式之后,可以广播第一接入点的信标,该信标中包括待入网设备的设备标识。待入网设备的设备标识包括待入网设备的设备ID,以用于唯一标识待入网设备。可选地,第一接入点的信标包括以下至少一个字段:BSSID字段、SSID字段、自定义字段(如Vendor Specific字段)。可选地,待入网设备的设备标识设置在BSSID字段中。The device to be connected to the network can start the first access point when it enters the network distribution mode. Optionally, the device to be connected to the network automatically enters the network configuration mode when it is turned on for the first time, or the device to be connected to the network is operated by the user to passively trigger entering the distribution network. model. Optionally, the first access point is a soft AP started by the device to be connected to the network. After the device to be connected to the network enters the network distribution mode, the beacon of the first access point may be broadcast, and the beacon includes the device identifier of the device to be connected to the network. The device identifier of the device to be connected to the network includes the device ID of the device to be connected to the network, so as to uniquely identify the device to be connected to the network. Optionally, the beacon of the first access point includes at least one of the following fields: a BSSID field, an SSID field, and a custom field (such as a Vendor Specific field). Optionally, the device identifier of the device to be connected to the network is set in the BSSID field.
配网设备可以在不同的信道上扫描其它设备广播的信标,从而,在待入网设备广播第一接入点的信标的信道上,配网设备可以扫描到该第一接入点的信标,也即,配网设备可以接收到第一接入点的信标。The distribution network device can scan the beacons broadcast by other devices on different channels, so that on the channel where the device to be connected broadcasts the beacon of the first access point, the distribution network device can scan the beacon of the first access point , that is, the distribution network device can receive the beacon of the first access point.
步骤842,配网设备向配网云平台发送第七获取请求,该第七获取请求用于请求获取第二信息密钥。Step 842: The distribution network device sends a seventh acquisition request to the distribution network cloud platform, where the seventh acquisition request is used to request to acquire the second information key.
第七获取请求用于请求获取第二信息密钥。由于第二信息密钥由设备云平台计算得到,因此,配网设备在需要获取第二信息密钥的情况下,可以向配网云平台发送第七获取请求,以通过配网云平台进一步获取第二信息密钥。本申请实施例对第七获取请求的内容不作限定,可选地,第七获取请求中包括待入网设备的设备标识;或者,第七获取请求中还包括待入网设备的设备厂商名称、待入网设备的设备名称、待入网设备的产品序列号等。可选地,如图9所示,若配网设备与配网云平台之间没有建立安全连接,则配网设备需要先与配网云平台之间建立安全连接,然后向配网云平台发送第七获取请求。The seventh acquisition request is used for requesting to acquire the second information key. Since the second information key is calculated by the device cloud platform, when the distribution network device needs to obtain the second information key, it can send a seventh acquisition request to the distribution network cloud platform for further acquisition through the distribution network cloud platform The second information key. This embodiment of the present application does not limit the content of the seventh acquisition request. Optionally, the seventh acquisition request includes the device identifier of the device to be connected to the network; The device name of the device, the product serial number of the device to be connected to the network, etc. Optionally, as shown in Figure 9, if there is no secure connection established between the distribution network device and the distribution network cloud platform, the network distribution device needs to first establish a secure connection with the distribution network cloud platform, and then send the data to the distribution network cloud platform. Seventh Get Request.
步骤843,配网云平台确定设备云平台。Step 843, the configuration network cloud platform determines the device cloud platform.
配网云平台需要先确定待入网设备对应的设备云平台。可选地,配网设备向配网云平台发送的第七获取请求中包括待入网设备的设备厂商名称,进而配网云平台可以根据该待入网设备的设备厂商名称确定对应的设备云平台。The distribution network cloud platform needs to first determine the device cloud platform corresponding to the device to be connected to the network. Optionally, the seventh acquisition request sent by the network configuration device to the network configuration cloud platform includes the device manufacturer name of the device to be connected to the network, and the network configuration cloud platform can determine the corresponding device cloud platform according to the device manufacturer name of the device to be connected to the network.
步骤844,配网云平台向设备云平台发送第八获取请求,该第八获取请求用于请求获取第二信息密钥。Step 844, the distribution network cloud platform sends an eighth acquisition request to the device cloud platform, where the eighth acquisition request is used to request to acquire the second information key.
第八获取请求用于请求获取第二信息密钥,基于此,配网云平台在确定了待入网设备对应的设备云平台之后,可以进一步向设备云平台发送第八获取请求,以请求设备云平台计算第二信息密钥,并请求设备云平台将第二信息密钥发送给配网云平台。本申请实施例对第八获取请求的内容不作限定,可选地,第八获取请求中包括待入网设备的设备标识;或者,第八获取请求中还包括待入网设备的设备厂商名称、待入网设备的设备名称、待入网设备的产品序列号等。可选地,如图9所示,若配网云平台与设备云平台之间没有建立安全连接,则配网云平台需要先和设备云平台之间建立安全连接,之后向设备云平台发送第八获取请求。The eighth acquisition request is used to request the acquisition of the second information key. Based on this, after determining the device cloud platform corresponding to the device to be connected to the network, the distribution network cloud platform can further send an eighth acquisition request to the device cloud platform to request the device cloud platform. The platform calculates the second information key, and requests the device cloud platform to send the second information key to the distribution network cloud platform. This embodiment of the present application does not limit the content of the eighth acquisition request. Optionally, the eighth acquisition request includes the device identifier of the device to be connected to the network; The device name of the device, the product serial number of the device to be connected to the network, etc. Optionally, as shown in Figure 9, if there is no secure connection established between the distribution network cloud platform and the device cloud platform, the distribution network cloud platform needs to establish a secure connection with the device cloud platform first, and then send the first message to the device cloud platform. Eight Get Requests.
步骤845,设备云平台计算第二信息密钥。Step 845, the device cloud platform calculates the second information key.
由于第八获取请求中携带待入网设备的设备标识,设备云平台在接收到第八获取请求之后,即可依据待入网设备的设备标识,确定第二设备密钥,该第二设备密钥是设备云平台存储的待入网设备的设备密钥,也即密钥K。为了能够实现第一信息密钥和第二信息密钥一致,第一信息密钥的计算方式和第二信息密钥的计算方式也应当一致,因此,设备云平台应当采用与待入网设备计算第一信息密钥的方式来计算第二信息密钥。可选地,若待入网设备采用上述步骤831来计算第一信息密钥,则设备云平台计算第二信息密钥的过程如下:设备云平台采用第四密钥生成算法对密钥计算参数和第二设备密钥进行处理,得到第二信息密钥。有关第四密钥生成算法的介绍说明,请参见上述方法实施例,此处不多赘述。Since the eighth acquisition request carries the device identifier of the device to be connected to the network, after receiving the eighth acquisition request, the device cloud platform can determine the second device key according to the device identifier of the device to be connected to the network, and the second device key is The device key of the device to be connected to the network stored in the device cloud platform, that is, the key K. In order to realize the consistency of the first information key and the second information key, the calculation method of the first information key and the calculation method of the second information key should also be consistent. A second information key is calculated by means of an information key. Optionally, if the device to be connected to the network adopts the above step 831 to calculate the first information key, the process of calculating the second information key by the device cloud platform is as follows: the device cloud platform adopts the fourth key generation algorithm to calculate the parameters of the key and The second device key is processed to obtain the second information key. For an introduction and description of the fourth key generation algorithm, please refer to the above method embodiments, and details are not repeated here.
步骤846,设备云平台向配网云平台发送第二信息密钥和密钥计算参数。Step 846, the device cloud platform sends the second information key and key calculation parameters to the distribution network cloud platform.
设备云平台在计算出第二信息密钥后,即可将第二信息密钥和密钥计算参数发送给配网云平台。After calculating the second information key, the device cloud platform can send the second information key and key calculation parameters to the distribution network cloud platform.
步骤847,配网云平台向配网设备发送第二信息密钥。Step 847: The distribution network cloud platform sends the second information key to the distribution network device.
配网云平台接收到第二信息密钥后,进一步将第二信息密钥和密钥计算参数发送给配网设备,以响应于配网设备的第七获取请求。After receiving the second information key, the distribution network cloud platform further sends the second information key and the key calculation parameter to the distribution network device, so as to respond to the seventh acquisition request of the distribution network device.
情况二:待入网设备的身份认证过程和配网过程解耦合:Scenario 2: The identity authentication process of the device to be connected to the network is decoupled from the network distribution process:
在一个示例中,如图9所示,上述方法还包括如下几个步骤:In an example, as shown in Figure 9, the above method further includes the following steps:
步骤851,配网设备接收待入网设备启动的第一接入点的信标,信标中包括待入网设备的设备标识。Step 851: The network distribution device receives the beacon of the first access point activated by the device to be connected to the network, and the beacon includes the device identifier of the device to be connected to the network.
有关步骤851的介绍说明,请参见上述步骤841的介绍说明,此处不多赘述。For the description of step 851, please refer to the description of step 841, which is not repeated here.
步骤852,配网设备向配网云平台发送第九获取请求。Step 852: The distribution network device sends a ninth acquisition request to the distribution network cloud platform.
第九获取请求用于请求获取第二参考信息或第二信息。由于待入网设备的参考信息由设备云平台和待入网设备持有(第二信息中也包括待入网设备的参考信息),因此,配网设备在需要获取第二参考信息或第二信息的情况下,可以向配网云平台发送第九获取请求,以通过配网云平台进一步获取第二参考信息或 第二信息。本申请实施例对第九获取请求的内容不作限定,可选地,第九获取请求中包括待入网设备的设备标识;或者,第九获取请求中还包括待入网设备的设备厂商名称、待入网设备的设备名称、待入网设备的产品序列号等。可选地,如图9所示,若配网设备与配网云平台之间没有建立安全连接,则配网设备需要先与配网云平台之间建立安全连接,然后向配网云平台发送第九获取请求。The ninth acquisition request is used to request to acquire the second reference information or the second information. Since the reference information of the device to be connected to the network is held by the device cloud platform and the device to be connected to the network (the second information also includes the reference information of the device to be connected to the network), the network distribution device needs to obtain the second reference information or the second information when Next, a ninth acquisition request may be sent to the distribution network cloud platform, so as to further acquire the second reference information or the second information through the distribution network cloud platform. This embodiment of the present application does not limit the content of the ninth acquisition request. Optionally, the ninth acquisition request includes the device identifier of the device to be connected to the network; The device name of the device, the product serial number of the device to be connected to the network, etc. Optionally, as shown in Figure 9, if there is no secure connection established between the distribution network device and the distribution network cloud platform, the network distribution device needs to first establish a secure connection with the distribution network cloud platform, and then send the data to the distribution network cloud platform. Ninth Acquisition Request.
步骤853,配网云平台确定设备云平台。Step 853, the configuration network cloud platform determines the device cloud platform.
有关步骤853的介绍说明,请参见上述步骤843,此处不多赘述。For the description of step 853, please refer to the above-mentioned step 843, and details are not repeated here.
步骤854,配网云平台向设备云平台发送第十获取请求。Step 854, the distribution network cloud platform sends a tenth acquisition request to the device cloud platform.
第十获取请求用于请求获取第二参考信息或第二信息,基于此,配网云平台在确定了待入网设备对应的设备云平台之后,可以进一步向设备云平台发送第十获取请求,以请求设备云平台将第二参考信息或第二信息发送给配网云平台。本申请实施例对第十获取请求的内容不作限定,可选地,第十获取请求中包括待入网设备的设备标识;或者,第十获取请求中还包括待入网设备的设备厂商名称、待入网设备的设备名称、待入网设备的产品序列号等。可选地,如图9所示,若配网云平台与设备云平台之间没有建立安全连接,则配网云平台需要先和设备云平台之间建立安全连接,之后向设备云平台发送第十获取请求。The tenth acquisition request is used to request the acquisition of the second reference information or the second information. Based on this, after determining the device cloud platform corresponding to the device to be connected to the network, the network distribution cloud platform can further send the tenth acquisition request to the device cloud platform to obtain the information. The device cloud platform is requested to send the second reference information or the second information to the distribution network cloud platform. This embodiment of the present application does not limit the content of the tenth acquisition request. Optionally, the tenth acquisition request includes the device identifier of the device to be connected to the network; The device name of the device, the product serial number of the device to be connected to the network, etc. Optionally, as shown in Figure 9, if there is no secure connection established between the distribution network cloud platform and the device cloud platform, the distribution network cloud platform needs to establish a secure connection with the device cloud platform first, and then send the first message to the device cloud platform. Ten get requests.
步骤855,设备云平台计算第二信息密钥。Step 855, the device cloud platform calculates the second information key.
由于第十获取请求中携带待入网设备的设备标识,设备云平台在接收到第十获取请求之后,即可依据待入网设备的设备标识,确定第二设备密钥,该第二设备密钥是设备云平台存储的待入网设备的设备密钥,也即密钥K。为了能够实现第一信息密钥和第二信息密钥一致,第一信息密钥的计算方式和第二信息密钥的计算方式也应当一致,因此,设备云平台应当采用与待入网设备计算第一信息密钥的方式来计算第二信息密钥。可选地,若待入网设备采用上述步骤831来计算第一信息密钥,则设备云平台计算第二信息密钥的过程如下:设备云平台采用第四密钥生成算法对密钥计算参数和第二设备密钥进行处理,得到第二信息密钥。有关第四密钥生成算法的介绍说明,请参见上述方法实施例,此处不多赘述。Since the tenth acquisition request carries the device identification of the device to be connected to the network, after receiving the tenth acquisition request, the device cloud platform can determine the second device key according to the device identification of the device to be connected to the network, and the second device key is The device key of the device to be connected to the network stored in the device cloud platform, that is, the key K. In order to realize the consistency of the first information key and the second information key, the calculation method of the first information key and the calculation method of the second information key should also be consistent. A second information key is calculated by means of an information key. Optionally, if the device to be connected to the network adopts the above step 831 to calculate the first information key, the process of calculating the second information key by the device cloud platform is as follows: the device cloud platform adopts the fourth key generation algorithm to calculate the parameters of the key and The second device key is processed to obtain the second information key. For an introduction and description of the fourth key generation algorithm, please refer to the above method embodiments, and details are not repeated here.
步骤856,设备云平台采用第二信息密钥加密第二参考信息或第二信息。Step 856, the device cloud platform encrypts the second reference information or the second information by using the second information key.
为了确保待入网设备的参考信息的安全,待入网设备的参考信息由设备云平台和待入网设备持有,因此,设备云平台在确定第二信息密钥之后,采用第二信息密钥加密第二参考信息或第二信息,以避免泄露待入网设备的参考信息。In order to ensure the security of the reference information of the device to be connected to the network, the reference information of the device to be connected to the network is held by the device cloud platform and the device to be connected to the network. Therefore, after determining the second information key, the device cloud platform uses the second information key to encrypt the first 2. Reference information or second information, so as to avoid leaking the reference information of the device to be connected to the network.
步骤857,设备云平台向配网云平台发送密钥计算参数和采用第二信息密钥加密的第二参考信息或第二信息。Step 857: The device cloud platform sends the key calculation parameter and the second reference information or second information encrypted with the second information key to the distribution network cloud platform.
步骤858,配网云平台向配网设备发送密钥计算参数和采用第二信息密钥加密的第二参考信息或第二信息。Step 858: The distribution network cloud platform sends the key calculation parameter and the second reference information or second information encrypted with the second information key to the distribution network device.
配网云平台接收到来自于设备云平台的密钥计算参数和采用第二信息密钥加密的第二参考信息或第二信息之后,进一步发送给配网设备,以响应于配网设备的第九获取请求。After receiving the key calculation parameter from the device cloud platform and the second reference information or second information encrypted with the second information key, the distribution network cloud platform further sends it to the distribution network device, in response to the first information of the distribution network device. Nine Get Requests.
需要说明的一点是,本申请实施例仅以第一信息密钥和第二信息密钥基于密钥计算参数和待入网设备的设备密钥来计算进行举例说明,本领域技术人员在了解了本申请的技术方案后,将很容易想到采用其它的计算参数来计算信息密钥,如采用密钥计算参数、待入网设备的设备密钥和待入网设备的设备标识来计算第一信息密钥和第二信息密钥,这些均应属于本申请的保护范围之内。It should be noted that the embodiment of the present application only uses the first information key and the second information key to be calculated based on the key calculation parameters and the device key of the device to be connected to the network for illustration. After applying for the technical solution, it is easy to think of using other calculation parameters to calculate the information key, such as calculating the first information key and The second information key, all of which should fall within the protection scope of this application.
综上所述,本申请实施例提供的技术方案,在待入网设备的身份认证过程和配网过程耦合的情况下,通过待入网设备对应的云平台生成密钥计算参数,并根据该密钥计算参数以及待入网设备的设备密钥,确定信息密钥,以进一步将信息密钥和密钥计算参数发送给配网设备,从而避免泄露待入网设备的设备密钥,提升了身份认证的有效性。在待入网设备的身份认证过程和配网过程解耦合的情况下,通过待入网设备对应的云平台生成密钥计算参数,并根据该密钥计算参数以及待入网设备的设备密钥确定信息密钥,之后采用信息密钥进一步加密参考信息,以将密钥计算参数和加密后的参考信息发送给配网设备,从而避免泄露待入网设备的设备密钥和参考信息,提升了身份认证的有效性。To sum up, in the technical solutions provided by the embodiments of the present application, when the identity authentication process of the device to be connected to the network is coupled with the network distribution process, the key calculation parameter is generated through the cloud platform corresponding to the device to be connected to the network, and the key is calculated according to the key. Calculate the parameters and the device key of the device to be connected to the network, determine the information key, and further send the information key and key calculation parameters to the network distribution device, so as to avoid leaking the device key of the device to be connected to the network and improve the effectiveness of identity authentication. sex. When the identity authentication process of the device to be connected to the network is decoupled from the network distribution process, the key calculation parameter is generated through the cloud platform corresponding to the device to be connected to the network, and the information encryption parameter is determined according to the key calculation parameter and the device key of the device to be connected to the network. Then use the information key to further encrypt the reference information, so as to send the key calculation parameters and encrypted reference information to the distribution network device, so as to avoid leaking the device key and reference information of the device to be connected to the network, and improve the effectiveness of identity authentication. sex.
下面以第一接入点为soft AP,第二接入点为家庭WiFi网络为例,对与配网过程耦合的身份认证过程进行介绍说明。如图10所示,本申请实施例提供的信息处理方法包括如下几个步骤:Taking the first access point as a soft AP and the second access point as a home WiFi network as an example, the following describes the identity authentication process coupled with the network distribution process. As shown in FIG. 10 , the information processing method provided by the embodiment of the present application includes the following steps:
步骤1001,待入网设备广播soft AP的信标。信标中包括待入网设备的设备标识。Step 1001, the device to be connected to the network broadcasts the beacon of the soft AP. The beacon includes the device identifier of the device to be connected to the network.
步骤1002,配网设备接收soft AP的信标。配网设备在接收到soft AP的信标后,可以进一步解析soft AP的信标,以获取待入网设备的设备标识。Step 1002, the distribution network device receives the beacon of the soft AP. After receiving the beacon of the soft AP, the distribution network device can further analyze the beacon of the soft AP to obtain the device identity of the device to be connected to the network.
步骤1003,配网设备向配网云平台发送第七获取请求,第七获取请求用于请求获取第二信息密钥。第七获取请求中包括待入网设备的设备标识。可选地,如图10所示,若配网设备与配网云平台之间没有建立安全连接,则配网设备需要先与配网云平台之间建立安全连接,然后向配网云平台发送第七获取请求。Step 1003, the distribution network device sends a seventh acquisition request to the distribution network cloud platform, where the seventh acquisition request is used to request to acquire the second information key. The seventh acquisition request includes the device identifier of the device to be connected to the network. Optionally, as shown in Figure 10, if there is no secure connection established between the distribution network device and the distribution network cloud platform, the network distribution device needs to first establish a secure connection with the distribution network cloud platform, and then send the data to the distribution network cloud platform. Seventh Get Request.
步骤1004,配网云平台确定设备云平台。配网云平台可以根据待入网设备的设备厂商名称确定对应的 设备云平台。Step 1004, the distribution network cloud platform determines the device cloud platform. The distribution network cloud platform can determine the corresponding device cloud platform according to the device manufacturer name of the device to be connected to the network.
步骤1005,配网云平台向设备云平台发送第八获取请求。该第八获取请求用于请求获取第二信息密钥。可选地,如图10所示,若配网云平台与设备云平台之间没有建立安全连接,则配网云平台需要先和设备云平台之间建立安全连接,之后向设备云平台发送第八获取请求。Step 1005, the distribution network cloud platform sends an eighth acquisition request to the device cloud platform. The eighth acquisition request is used to request to acquire the second information key. Optionally, as shown in Figure 10, if there is no secure connection established between the distribution network cloud platform and the device cloud platform, the distribution network cloud platform needs to establish a secure connection with the device cloud platform first, and then send the first message to the device cloud platform. Eight Get Requests.
步骤1006,设备云平台计算第二信息密钥。设备云平台在接收到第八获取请求之后,即可依据待入网设备的设备标识,确定第二设备密钥。之后,设备云平台采用第四密钥生成算法对密钥计算参数和第二设备密钥进行处理,得到第二信息密钥。Step 1006, the device cloud platform calculates the second information key. After receiving the eighth acquisition request, the device cloud platform can determine the second device key according to the device identifier of the device to be connected to the network. After that, the device cloud platform uses the fourth key generation algorithm to process the key calculation parameter and the second device key to obtain the second information key.
步骤1007,设备云平台向配网云平台发送第二信息密钥和密钥计算参数。Step 1007, the device cloud platform sends the second information key and key calculation parameters to the distribution network cloud platform.
步骤1008,配网云平台向配网设备发送第二信息密钥和密钥计算参数。Step 1008, the distribution network cloud platform sends the second information key and the key calculation parameter to the distribution network device.
步骤1009,配网设备基于第二信息密钥、密钥计算参数和网络配置信息,确定第一信息。可选地,配网设备采用第三加密算法和信息加密密钥对网络配置信息进行处理,得到采用信息加密密钥加密的网络配置信息;基于密钥计算参数和采用信息加密密钥加密的网络配置信息,确定第一信息。Step 1009: The distribution network device determines the first information based on the second information key, the key calculation parameter and the network configuration information. Optionally, the network configuration device uses the third encryption algorithm and the information encryption key to process the network configuration information, and obtains the network configuration information encrypted with the information encryption key; configuration information, and determine the first information.
步骤1010,配网设备向待入网设备发送第一信息。Step 1010: The network distribution device sends the first information to the device to be connected to the network.
步骤1011,待入网设备基于密钥计算参数和第一设备密钥,确定第一信息密钥。待入网设备根据自身存储的第一设备密钥和第一信息中的密钥计算参数,确定第一信息密钥,可选地,待入网设备采用第四密钥生成算法对密钥计算参数和第一设备密钥进行处理,得到第一信息密钥。Step 1011, the device to be connected to the network determines the first information key based on the key calculation parameter and the first device key. The device to be connected to the network determines the first information key according to the first device key stored by itself and the key calculation parameter in the first information. The first device key is processed to obtain the first information key.
步骤1012,待入网设备采用第一信息密钥解密采用第二信息密钥加密的网络配置信息。Step 1012, the device to be connected to the network uses the first information key to decrypt the network configuration information encrypted by the second information key.
在信息解密密钥和信息加密密钥一致的情况下,待入网设备获取网络配置信息成功;在信息解密密钥和信息加密密钥不一致的情况下,待入网设备获取网络配置信息失败。If the information decryption key and the information encryption key are the same, the device to be connected to the network succeeds in acquiring the network configuration information; if the information decryption key and the information encryption key are inconsistent, the device to be connected to the network fails to obtain the network configuration information.
下面以第一接入点为soft AP,第二接入点为家庭WiFi网络为例,对与配网过程解耦合的一种身份认证过程进行介绍说明。如图11所示,本申请实施例提供的信息处理方法包括如下几个步骤:Taking the first access point as a soft AP and the second access point as a home WiFi network as an example, the following describes an identity authentication process that is decoupled from the network distribution process. As shown in FIG. 11 , the information processing method provided by the embodiment of the present application includes the following steps:
步骤1101,待入网设备广播soft AP的信标。信标中包括待入网设备的设备标识。Step 1101, the device to be connected to the network broadcasts the beacon of the soft AP. The beacon includes the device identifier of the device to be connected to the network.
步骤1102,配网设备接收soft AP的信标。配网设备在接收到soft AP的信标后,可以进一步解析soft AP的信标,以获取待入网设备的设备标识。Step 1102, the distribution network device receives the beacon of the soft AP. After receiving the beacon of the soft AP, the distribution network device can further analyze the beacon of the soft AP to obtain the device identity of the device to be connected to the network.
步骤1103,配网设备向配网云平台发送第九获取请求。第九获取请求用于请求获取第二参考信息。第九获取请求中包括待入网设备的设备标识。可选地,如图11所示,若配网设备与配网云平台之间没有建立安全连接,则配网设备需要先与配网云平台之间建立安全连接,然后向配网云平台发送第九获取请求。Step 1103: The distribution network device sends a ninth acquisition request to the distribution network cloud platform. The ninth acquisition request is used to request to acquire the second reference information. The ninth acquisition request includes the device identifier of the device to be connected to the network. Optionally, as shown in Figure 11, if there is no secure connection established between the distribution network device and the distribution network cloud platform, the network distribution device needs to first establish a secure connection with the distribution network cloud platform, and then send the data to the distribution network cloud platform. Ninth Acquisition Request.
步骤1104,配网云平台确定设备云平台。配网云平台可以根据待入网设备的设备厂商名称确定对应的设备云平台。Step 1104, the distribution network cloud platform determines the device cloud platform. The distribution network cloud platform can determine the corresponding device cloud platform according to the device manufacturer name of the device to be connected to the network.
步骤1105,配网云平台向设备云平台发送第十获取请求。该第十获取请求用于请求获取第二参考信息。可选地,如图11所示,若配网云平台与设备云平台之间没有建立安全连接,则配网云平台需要先和设备云平台之间建立安全连接,之后向设备云平台发送第十获取请求。Step 1105, the distribution network cloud platform sends a tenth acquisition request to the device cloud platform. The tenth acquisition request is used to request to acquire the second reference information. Optionally, as shown in Figure 11, if there is no secure connection established between the distribution network cloud platform and the device cloud platform, the distribution network cloud platform needs to establish a secure connection with the device cloud platform first, and then send the first message to the device cloud platform. Ten get requests.
步骤1106,设备云平台计算第二信息密钥。设备云平台在接收到第十获取请求之后,即可依据待入网设备的设备标识,确定第二设备密钥。之后,设备云平台采用第四密钥生成算法对密钥计算参数和第二设备密钥进行处理,得到第二信息密钥。Step 1106, the device cloud platform calculates the second information key. After receiving the tenth acquisition request, the device cloud platform may determine the second device key according to the device identifier of the device to be connected to the network. After that, the device cloud platform uses the fourth key generation algorithm to process the key calculation parameter and the second device key to obtain the second information key.
步骤1107,设备云平台采用第二信息密钥加密第二参考信息,得到第二加密信息。由于待入网设备的参考信息由设备云平台和待入网设备持有,因此,为了避免待入网设备的参考信息泄露,设备云平台需要对第二参考信息进行加密处理。Step 1107, the device cloud platform encrypts the second reference information with the second information key to obtain the second encrypted information. Since the reference information of the device to be connected to the network is held by the device cloud platform and the device to be connected to the network, in order to avoid leakage of the reference information of the device to be connected to the network, the device cloud platform needs to encrypt the second reference information.
步骤1108,设备云平台向配网云平台发送密钥计算参数和第二加密信息。Step 1108, the device cloud platform sends the key calculation parameter and the second encryption information to the distribution network cloud platform.
步骤1109,配网云平台向配网设备发送密钥计算参数和第二加密信息。Step 1109, the distribution network cloud platform sends the key calculation parameter and the second encryption information to the distribution network device.
步骤1110,配网设备向待入网设备发送密钥计算参数。Step 1110: The network distribution device sends the key calculation parameter to the device to be connected to the network.
步骤1111,待入网设备基于密钥计算参数和第一设备密钥,确定第一信息密钥。待入网设备根据自身存储的第一设备密钥和第一信息中的密钥计算参数,确定第一信息密钥,可选地,待入网设备采用第四密钥生成算法对密钥计算参数和第一设备密钥进行处理,得到第一信息密钥。Step 1111, the device to be connected to the network determines the first information key based on the key calculation parameter and the first device key. The device to be connected to the network determines the first information key according to the first device key stored by itself and the key calculation parameter in the first information. The first device key is processed to obtain the first information key.
步骤1112,待入网设备采用第一信息密钥加密第一参考信息,得到第一加密信息。待入网设备的参考信息由待入网设备的设备厂商预先配置在待入网设备中,之后,待入网设备在计算出第一信息密钥之后,可以采用第一信息密钥加密第一参考信息。可选地,待入网设备采用第一参考信息和第三加密算法对第一参考信息进行处理,得到第一加密信息。Step 1112, the device to be connected to the network encrypts the first reference information by using the first information key to obtain the first encrypted information. The reference information of the device to be connected to the network is preconfigured in the device to be connected to the network by the device manufacturer of the device to be connected to the network. After the device to be connected to the network calculates the first information key, the first information key can be used to encrypt the first reference information. Optionally, the device to be connected to the network uses the first reference information and the third encryption algorithm to process the first reference information to obtain the first encrypted information.
步骤1113,待入网设备向配网设备发送第一加密信息。Step 1113, the device to be connected to the network sends the first encrypted information to the network distribution device.
步骤1114,配网设备在第一加密信息和第二加密信息一致的情况下,向待入网设备发送网络配置信息。配网设备一方面接收来自于配网云平台的第二加密信息,另一方面接收来自于待入网设备的第一加密信 息,之后比对第一加密信息和第二加密信息。在第一加密信息和第二加密信息一致的情况下,确认待入网设备通过身份认证,并向待入网设备发送网络配置信息,该网络配置信息用于配置待入网设备加入家庭WiFi网络。待入网设备接收到网络配置信息后,即可依据该网络配置信息加入家庭WiFi网络。Step 1114: In the case that the first encrypted information and the second encrypted information are consistent, the network configuration device sends network configuration information to the device to be connected to the network. On the one hand, the distribution network device receives the second encrypted information from the distribution network cloud platform, and on the other hand, it receives the first encrypted information from the device to be connected to the network, and then compares the first encrypted information with the second encrypted information. When the first encrypted information and the second encrypted information are consistent, it is confirmed that the device to be connected to the network has passed identity authentication, and network configuration information is sent to the device to be connected to the network, where the network configuration information is used to configure the device to be connected to the home WiFi network. After the network access device receives the network configuration information, it can join the home WiFi network according to the network configuration information.
下面以第一接入点为soft AP,第二接入点为家庭WiFi网络为例,对与配网过程解耦合的另一种身份认证过程进行介绍说明。如图12所示,本申请实施例提供的信息处理方法包括如下几个步骤:Taking the first access point as a soft AP and the second access point as a home WiFi network as an example, the following describes another identity authentication process that is decoupled from the network configuration process. As shown in FIG. 12 , the information processing method provided by the embodiment of the present application includes the following steps:
步骤1201,待入网设备广播soft AP的信标。信标中包括待入网设备的设备标识。Step 1201, the device to be connected to the network broadcasts the beacon of the soft AP. The beacon includes the device identifier of the device to be connected to the network.
步骤1202,配网设备接收soft AP的信标。配网设备在接收到soft AP的信标后,可以进一步解析soft AP的信标,以获取待入网设备的设备标识。Step 1202, the distribution network device receives the beacon of the soft AP. After receiving the beacon of the soft AP, the distribution network device can further analyze the beacon of the soft AP to obtain the device identity of the device to be connected to the network.
步骤1203,配网设备向配网云平台发送第九获取请求。第九获取请求用于请求获取第二信息。第九获取请求中包括待入网设备的设备标识。可选地,如图12所示,若配网设备与配网云平台之间没有建立安全连接,则配网设备需要先与配网云平台之间建立安全连接,然后向配网云平台发送第九获取请求。Step 1203: The distribution network device sends a ninth acquisition request to the distribution network cloud platform. The ninth acquisition request is used to request to acquire the second information. The ninth acquisition request includes the device identifier of the device to be connected to the network. Optionally, as shown in Figure 12, if no secure connection is established between the distribution network device and the distribution network cloud platform, the network distribution device needs to first establish a secure connection with the distribution network cloud platform, and then send the data to the distribution network cloud platform. Ninth Acquisition Request.
步骤1204,配网云平台确定设备云平台。配网云平台可以根据待入网设备的设备厂商名称确定对应的设备云平台。Step 1204, the distribution network cloud platform determines the device cloud platform. The distribution network cloud platform can determine the corresponding device cloud platform according to the device manufacturer name of the device to be connected to the network.
步骤1205,配网云平台向设备云平台发送第十获取请求。该第十获取请求用于请求获取第二信息。可选地,如图12所示,若配网云平台与设备云平台之间没有建立安全连接,则配网云平台需要先和设备云平台之间建立安全连接,之后向设备云平台发送第十获取请求。Step 1205: The distribution network cloud platform sends a tenth acquisition request to the device cloud platform. The tenth acquisition request is used to request to acquire the second information. Optionally, as shown in Figure 12, if there is no secure connection established between the distribution network cloud platform and the device cloud platform, the distribution network cloud platform needs to establish a secure connection with the device cloud platform first, and then send the first message to the device cloud platform. Ten get requests.
步骤1206,设备云平台计算第二信息密钥。设备云平台在接收到第十获取请求之后,即可依据待入网设备的设备标识,确定第二设备密钥。之后,设备云平台采用第四密钥生成算法对密钥计算参数和第二设备密钥进行处理,得到第二信息密钥。Step 1206, the device cloud platform calculates the second information key. After receiving the tenth acquisition request, the device cloud platform may determine the second device key according to the device identifier of the device to be connected to the network. After that, the device cloud platform uses the fourth key generation algorithm to process the key calculation parameter and the second device key to obtain the second information key.
步骤1207,设备云平台采用第二信息密钥加密第二信息。由于待入网设备的参考信息由设备云平台和待入网设备持有,因此,为了避免待入网设备的参考信息泄露,设备云平台需要对参考信息进行加密处理,进而得到采用第二信息加密密钥加密的第二信息,该第二信息即包括待入网设备的参考信息。Step 1207, the device cloud platform encrypts the second information by using the second information key. Since the reference information of the device to be connected to the network is held by the device cloud platform and the device to be connected to the network, in order to avoid leakage of the reference information of the device to be connected to the network, the device cloud platform needs to encrypt the reference information, and then obtain the second information encryption key. Encrypted second information, where the second information includes reference information of the device to be connected to the network.
步骤1208,设备云平台向配网云平台发送密钥计算参数、第二信息和第四参考信息。Step 1208, the device cloud platform sends the key calculation parameter, the second information and the fourth reference information to the distribution network cloud platform.
步骤1209,配网云平台向配网设备发送密钥计算参数、第二信息和第四参考信息。Step 1209: The distribution network cloud platform sends the key calculation parameter, the second information and the fourth reference information to the distribution network device.
步骤1210,配网设备向待入网设备发送密钥计算参数和第二信息。Step 1210: The network distribution device sends the key calculation parameter and the second information to the device to be connected to the network.
步骤1211,待入网设备基于密钥计算参数和第一设备密钥,确定第一信息密钥。待入网设备根据自身存储的第一设备密钥和第一信息中的密钥计算参数,确定第一信息密钥,可选地,待入网设备采用第四密钥生成算法对密钥计算参数和第一设备密钥进行处理,得到第一信息密钥。Step 1211, the device to be connected to the network determines the first information key based on the key calculation parameter and the first device key. The device to be connected to the network determines the first information key according to the first device key stored by itself and the key calculation parameter in the first information. The first device key is processed to obtain the first information key.
步骤1212,待入网设备采用第一信息密钥解密第二信息,得到第三参考信息。待入网设备解密第二信息,可以得到第二信息中的待入网设备的参考信息,也即,第三参考信息。Step 1212, the device to be connected to the network uses the first information key to decrypt the second information to obtain third reference information. The device to be connected to the network decrypts the second information, and can obtain the reference information of the device to be connected to the network in the second information, that is, the third reference information.
步骤1213,待入网设备向配网设备发送第三参考信息。Step 1213: The device to be connected to the network sends third reference information to the network distribution device.
步骤1214,配网设备在第三参考信息和第四参考信息一致的情况下,向待入网设备发送网络配置信息。配网设备一方面接收来自于配网云平台的第四参考信息,另一方面接收来自于待入网设备的第三参考信息,之后比对第四参考信息和第三参考信息。在第四参考信息和第三参考信息一致的情况下,确认待入网设备通过身份认证,并向待入网设备发送网络配置信息,该网络配置信息用于配置待入网设备加入家庭WiFi网络。待入网设备接收到网络配置信息后,即可依据该网络配置信息加入家庭WiFi网络。Step 1214: In the case that the third reference information and the fourth reference information are consistent, the network distribution device sends network configuration information to the device to be connected to the network. On the one hand, the network distribution device receives the fourth reference information from the distribution network cloud platform, and on the other hand, receives the third reference information from the device to be connected to the network, and then compares the fourth reference information with the third reference information. If the fourth reference information is consistent with the third reference information, it is confirmed that the device to be connected to the network has passed identity authentication, and network configuration information is sent to the device to be connected to the network, where the network configuration information is used to configure the device to be connected to the home WiFi network. After the network access device receives the network configuration information, it can join the home WiFi network according to the network configuration information.
请参考图13,其示出了本申请一个实施例提供的信息处理方法的流程图,该方法可以应用于图1所示的配网系统中。该方法可以包括如下几个步骤:Please refer to FIG. 13 , which shows a flowchart of an information processing method provided by an embodiment of the present application, and the method can be applied to the distribution network system shown in FIG. 1 . The method may include the following steps:
步骤1310,待入网设备显示第一图形码,第一图形码包括密钥计算参数和/或待入网设备的设备标识,密钥计算参数用于确定信息解密密钥,信息解密密钥用于解密来自于配网设备的网络配置信息,网络配置信息用于配置待入网设备接入第二接入点。Step 1310, the device to be connected to the network displays a first graphic code, the first graphic code includes the key calculation parameter and/or the device identifier of the device to be connected to the network, the key calculation parameter is used to determine the information decryption key, and the information decryption key is used for decryption The network configuration information from the network distribution device is used to configure the device to be connected to the network to access the second access point.
对于具备扫描功能或摄像功能的待入网设备而言,其也可以通过扫描配网的方式接入网络。针对扫描配网,本申请实施例也提供了身份认证方式。For a device to be connected to a network with a scanning function or a camera function, it can also access the network by scanning and configuring the network. For the scanning distribution network, the embodiment of the present application also provides an identity authentication method.
待入网设备首先显示第一图形码,可选地,在待入网设备具备屏幕显示功能的情况下,第一图形码由待入网设备显示在其屏幕中;在待入网设备不具备屏幕显示功能的情况下,第一图像码可以由待入网设备的设备厂商粘贴在待入网设备的设备表面,或者粘贴在待入网设备的包装盒上,本申请实施例对此不作限定。可选地,第一图形码表现为二维码、条形码等。本申请实施例中,第一图形码包括密钥计算参数和/或待入网设备的设备标识。可选地,第一图形码还包括待入网设备的设备厂商名称、待入网设备的设备名称、待入网设备的产品序列号等。The device to be connected to the network first displays the first graphic code. Optionally, when the device to be connected to the network has a screen display function, the first graphic code is displayed on the screen of the device to be connected to the network; In this case, the first image code may be pasted on the device surface of the device to be connected to the network by the device manufacturer of the device to be connected to the network, or pasted on the packaging box of the device to be connected to the network, which is not limited in this embodiment of the present application. Optionally, the first graphic code is represented as a two-dimensional code, a barcode, or the like. In this embodiment of the present application, the first graphic code includes a key calculation parameter and/or a device identifier of a device to be connected to the network. Optionally, the first graphic code further includes the device manufacturer name of the device to be connected to the network, the device name of the device to be connected to the network, the product serial number of the device to be connected to the network, and the like.
密钥计算参数用于确定解密网络配置信息的信息解密密钥。可选地,密钥计算参数的长度大于或等于 一个字节。本申请实施例对密钥计算参数的确定方式不作限定,可选地,密钥计算参数由设备云平台预配置;或者,密钥计算参数由待入网设备生成。在待入网设备不具备屏幕显示功能的情况下,密钥计算参数可以由待入网设备对应的设备云平台预配置;在待入网设备具备屏幕显示功能的情况下,密钥计算参数可以由待入网设备自己生成。本申请实施例对密钥计算参数的内容不作限定,可选地,密钥计算参数包括随机数;或者,密钥计算参数包括预配置的数值。The key calculation parameter is used to determine the information decryption key for decrypting the network configuration information. Optionally, the length of the key calculation parameter is greater than or equal to one byte. This embodiment of the present application does not limit the method for determining the key calculation parameter. Optionally, the key calculation parameter is preconfigured by the device cloud platform; or, the key calculation parameter is generated by the device to be connected to the network. If the device to be connected to the network does not have the screen display function, the key calculation parameters can be pre-configured by the device cloud platform corresponding to the device to be connected to the network; if the device to be connected to the network has the screen display function, the key calculation parameters The device generates itself. This embodiment of the present application does not limit the content of the key calculation parameter. Optionally, the key calculation parameter includes a random number; or, the key calculation parameter includes a preconfigured value.
本申请实施例中,待入网设备的设备厂商可以为待入网设备唯一分配一个密钥K,并将该密钥K预配置至待入网设备中。由于待入网设备的设备标识用于唯一标识待入网设备,因此,待入网设备的设备标识和待入网设备的密钥K之间存在一一对应的关系。待入网设备的设备厂商可以将待入网设备的设备标识和待入网设备的密钥K上传至设备厂商的云平台(也即,待入网设备对应的云平台)中。In the embodiment of the present application, the device manufacturer of the device to be connected to the network may uniquely assign a key K to the device to be connected to the network, and preconfigure the key K to the device to be connected to the network. Since the device identifier of the device to be connected to the network is used to uniquely identify the device to be connected to the network, there is a one-to-one correspondence between the device identifier of the device to be connected to the network and the key K of the device to be connected to the network. The device manufacturer of the device to be connected to the network can upload the device identifier of the device to be connected to the network and the key K of the device to be connected to the network to the cloud platform of the device manufacturer (ie, the cloud platform corresponding to the device to be connected to the network).
步骤1320,配网设备扫描待入网设备的第一图形码,第一图形码包括密钥计算参数和/或待入网设备的设备标识,密钥计算参数用于确定信息加密密钥,信息加密密钥用于加密网络配置信息,网络配置信息用于配置待入网设备接入第二接入点。Step 1320, the network distribution device scans the first graphic code of the device to be connected to the network, the first graphic code includes the key calculation parameter and/or the device identification of the device to be connected to the network, the key calculation parameter is used to determine the information encryption key, and the information encryption key is The key is used to encrypt network configuration information, and the network configuration information is used to configure the device to be connected to the network to access the second access point.
配网设备扫描待入网设备的第一图形码,即可获取密钥计算参数和/或待入网设备的设备标识。对于待入网设备而言,密钥计算参数用于确定解密网络配置信息的信息解密密钥;对于配网设备而言,密钥计算参数用于确定加密网络配置信息的信息加密密钥。The network distribution device scans the first graphic code of the device to be connected to the network to obtain the key calculation parameter and/or the device identifier of the device to be connected to the network. For the device to be connected to the network, the key calculation parameter is used to determine the information decryption key for decrypting the network configuration information; for the network configuration device, the key calculation parameter is used to determine the information encryption key for encrypting the network configuration information.
由于配网设备是通过扫码配网的方式为待入网设备配网,因此,配网设备在得到信息加密密钥之后,需要进一步显示第二图形码,以供待入网设备扫描获取网络配置信息。可选地,上述方法还包括:配网设备根据网络配置信息和信息加密密钥,确定第二图形码;显示第二图形码。信息加密密钥用于加密网络配置信息,即配网设备可以采用第一加密算法和信息加密密钥对网络配置信息进行处理,得到加密后的网络配置信息,然后根据加密后的网络配置信息生成第二图形码。可选地,第一加密算法为对称加密算法。可选地,第一加密算法包括但不限于下述任意一项:AES128-CMAC、AES128-CBC(Cipher Block Chaining,密码分组链接)、AES128-GCM(Galois/Counter Mode)、AES256-CMAC、AES256-CBC、AES256-GCM。Because the network distribution device configures the network for the device to be connected by scanning the code to configure the network, after obtaining the information encryption key, the network distribution device needs to further display the second graphic code for the device to scan to obtain the network configuration information. . Optionally, the above method further includes: the network distribution device determines the second graphic code according to the network configuration information and the information encryption key; and displays the second graphic code. The information encryption key is used to encrypt the network configuration information, that is, the network configuration device can use the first encryption algorithm and the information encryption key to process the network configuration information, obtain the encrypted network configuration information, and then generate the encrypted network configuration information according to the encrypted network configuration information. The second graphic code. Optionally, the first encryption algorithm is a symmetric encryption algorithm. Optionally, the first encryption algorithm includes but is not limited to any of the following: AES128-CMAC, AES128-CBC (Cipher Block Chaining, cipher block chaining), AES128-GCM (Galois/Counter Mode), AES256-CMAC, AES256 -CBC, AES256-GCM.
在一个示例中,上述方法还包括:待入网设备扫描配网设备显示的第二图形码,第二图形码包括采用信息加密密钥加密的网络配置信息。待入网设备扫描第二图像码,即可获取采用信息加密密钥加密的网络配置信息,由于待入网设备基于密钥计算参数确定了信息解密密钥,因而待入网设备采用信息解密密钥解密该网络配置信息,在信息解密密钥和信息加密密钥一致的情况下,待入网设备获取网络配置信息成功;在信息解密密钥和信息加密密钥不一致的情况下,待入网设备获取网络配置信息失败。In one example, the above method further includes: the device to be connected to the network scans a second graphic code displayed by the network configuration device, where the second graphic code includes network configuration information encrypted with an information encryption key. The device to be connected to the network scans the second image code to obtain the network configuration information encrypted with the information encryption key. Since the device to be connected to the network determines the information decryption key based on the key calculation parameter, the device to be connected to the network uses the information decryption key to decrypt the information. Network configuration information. If the information decryption key and the information encryption key are the same, the device to be connected to the network successfully obtains the network configuration information; if the information decryption key and the information encryption key are inconsistent, the device to be connected to the network obtains the network configuration information. fail.
综上所述,本申请实施例提供的技术方案,通过在待入网设备的图形码中添加密钥计算参数,待入网设备使用该密钥计算参数可以确定信息解密密钥,配网设备通过该密钥计算参数可以得到信息加密密钥,进而待入网设备使用信息解密密钥可以解密配网设备采用信息加密密钥加密的网络配置信息,只有在信息加密密钥和信息解密密钥一致的情况下,待入网设备才能获取网络配置信息,实现了待入网设备的身份进行认证,避免了网络配置信息的泄露。To sum up, in the technical solutions provided by the embodiments of the present application, by adding a key calculation parameter to the graphic code of the device to be connected to the network, the device to be connected to the network can use the key calculation parameter to determine the information decryption key, and the network distribution device uses the key calculation parameter to determine the decryption key. The key calculation parameters can obtain the information encryption key, and then the device to be connected to the network can use the information decryption key to decrypt the network configuration information encrypted by the distribution device using the information encryption key. Only when the information encryption key and the information decryption key are the same In this way, only the device to be connected to the network can obtain the network configuration information, which realizes the authentication of the identity of the device to be connected to the network, and avoids the leakage of the network configuration information.
下面对待入网设备侧的信息解密密钥和配网设备侧的信息加密密钥的计算过程进行介绍说明。The following describes the calculation process of the information decryption key on the side of the network access device and the information encryption key on the side of the distribution device.
首先,介绍说明待入网设备侧的信息解密密钥的计算过程。First, the calculation process of the information decryption key on the side of the device to be connected to the network is described.
在一个示例中,如图14所示,上述方法还包括如下几个步骤:In an example, as shown in Figure 14, the above method further includes the following steps:
步骤1331,待入网设备基于密钥计算参数和第一设备密钥,确定信息解密密钥。Step 1331, the device to be connected to the network determines the information decryption key based on the key calculation parameter and the first device key.
第一设备密钥为预置在待入网设备中的待入网设备的设备密钥,也即上述密钥K。待入网设备在明确密钥计算参数和第一设备密钥之后,即可基于密钥计算参数和第一设备密钥计算信息解密密钥。The first device key is the device key of the device to be connected to the network preset in the device to be connected to the network, that is, the above-mentioned key K. After specifying the key calculation parameters and the first device key, the device to be connected to the network can calculate the information decryption key based on the key calculation parameters and the first device key.
本申请实施例中,待入网设备可以采用密钥生成算法对密钥计算参数和第一设备密钥进行处理,可选地,上述步骤1331,包括:待入网设备采用第二密钥生成算法对密钥计算参数和第一设备密钥进行处理,得到信息解密密钥。可选地,第二密钥生成算法包括任意一项:AES128-CMAC、HKDF-based KDF、PBKDF、SHA、DES算法、3DES算法。In this embodiment of the present application, the device to be connected to the network may use a key generation algorithm to process the key calculation parameter and the first device key. Optionally, the above step 1331 includes: the device to be connected to the network uses the second key generation algorithm to The key calculation parameter and the first device key are processed to obtain the information decryption key. Optionally, the second key generation algorithm includes any one of: AES128-CMAC, HKDF-based KDF, PBKDF, SHA, DES algorithm, and 3DES algorithm.
其次,介绍说明配网设备侧的信息加密密钥的计算过程。Secondly, the calculation process of the information encryption key on the side of the distribution network device is introduced.
在一个示例中,如图14所示,上述方法还包括如下几个步骤:In an example, as shown in Figure 14, the above method further includes the following steps:
步骤1332,配网设备向配网云平台发送第二获取请求,第二获取请求用于请求获取信息加密密钥。Step 1332: The distribution network device sends a second acquisition request to the distribution network cloud platform, where the second acquisition request is used to request to acquire the information encryption key.
为了能够实现配网设备生成的信息加密密钥和待入网设备生成的信息解密密钥一致,信息加密密钥的计算参数和信息解密密钥的计算参数需要相同。上述信息解密密钥的计算参数包括密钥计算参数和第一设备密钥,因此,信息加密密钥的计算参数也应该包括密钥计算参数和待入网设备的设备密钥。通常情况下,为了确保待入网设备的设备密钥的安全,待入网设备的设备密钥仅有待入网设备和待入网设备的设备厂商的云平台(也即设备云平台)持有,因此,信息加密密钥需要由设备云平台参与计算。In order to make the information encryption key generated by the distribution network device consistent with the information decryption key generated by the device to be connected to the network, the calculation parameters of the information encryption key and the calculation parameters of the information decryption key need to be the same. The above calculation parameters of the information decryption key include the key calculation parameter and the first device key. Therefore, the calculation parameters of the information encryption key should also include the key calculation parameter and the device key of the device to be connected to the network. Usually, in order to ensure the security of the device key of the device to be connected to the network, the device key of the device to be connected to the network is only held by the cloud platform (that is, the device cloud platform) of the device to be connected to the network and the device manufacturer of the device to be connected to the network. Therefore, the information The encryption key needs to be calculated by the device cloud platform.
配网设备在扫描待入网设备的图形码,获取到待入网设备的设备标识和/或密钥计算参数,进而配网设 备向配网云平台发送第二获取请求,以请求获取信息加密密钥。本申请实施例对第二获取请求的内容不作限定,可选地,第二获取请求中包括密钥计算参数和/或待入网设备的设备标识;或者,第二获取请求中还包括待入网设备的设备厂商名称、待入网设备的设备名称、待入网设备的产品序列号等。可选地,如图6所示,若配网设备与配网云平台之间没有建立安全连接,则配网设备需要先与配网云平台之间建立安全连接,然后向配网云平台发送第二获取请求。The network distribution device scans the graphic code of the device to be connected to the network, and obtains the device identification and/or key calculation parameters of the device to be connected to the network, and then the distribution network device sends a second acquisition request to the distribution network cloud platform to request to obtain the information encryption key. . This embodiment of the present application does not limit the content of the second acquisition request. Optionally, the second acquisition request includes key calculation parameters and/or the device identifier of the device to be connected to the network; or, the second acquisition request also includes the device to be connected to the network. The name of the device manufacturer, the device name of the device to be connected to the network, the product serial number of the device to be connected to the network, etc. Optionally, as shown in Figure 6, if there is no secure connection established between the distribution network device and the distribution network cloud platform, the network distribution device needs to first establish a secure connection with the distribution network cloud platform, and then send the data to the distribution network cloud platform. The second get request.
本申请实施例中,为了确保待入网设备的设备密钥的安全性,待入网设备的设备密钥也不被配网云平台持有,因此,配网云平台在接收到第二获取请求后,需要进一步从设备云平台处获取信息加密密钥。也即,如图14所示,上述步骤1332之后,还包括如下几个步骤:In this embodiment of the present application, in order to ensure the security of the device key of the device to be connected to the network, the device key of the device to be connected to the network is not held by the network configuration cloud platform. Therefore, after receiving the second acquisition request, the network configuration cloud platform , you need to further obtain the information encryption key from the device cloud platform. That is, as shown in Figure 14, after the above step 1332, the following steps are further included:
步骤133A,配网云平台确定设备云平台。Step 133A, the distribution network cloud platform determines the device cloud platform.
配网云平台需要先确定待入网设备对应的设备云平台。可选地,配网设备向配网云平台发送的第二获取请求中包括待入网设备的设备厂商名称,进而配网云平台可以根据该待入网设备的设备厂商名称确定对应的设备云平台。The distribution network cloud platform needs to first determine the device cloud platform corresponding to the device to be connected to the network. Optionally, the second acquisition request sent by the network distribution device to the network distribution cloud platform includes the device manufacturer name of the device to be connected to the network, and the network distribution cloud platform can determine the corresponding device cloud platform according to the device manufacturer name of the device to be connected to the network.
步骤133B,配网云平台向设备云平台发送第四获取请求,该第四获取请求用于请求获取信息加密密钥。Step 133B: The distribution network cloud platform sends a fourth acquisition request to the device cloud platform, where the fourth acquisition request is used to request to acquire an information encryption key.
确定了待入网设备对应的设备云平台之后,配网云平台可以进一步向设备云平台发送第四获取请求,以请求设备云平台计算信息加密密钥,并请求设备云平台将信息加密密钥发送给配网云平台。本申请实施例对第四获取请求的内容不作限定,可选地,第四获取请求中包括密钥计算参数和/或待入网设备的设备标识;或者,第四获取请求中还包括待入网设备的设备厂商名称、待入网设备的设备名称、待入网设备的产品序列号等。可选地,如图14所示,若配网云平台与设备云平台之间没有建立安全连接,则配网云平台需要先和设备云平台之间建立安全连接,之后向设备云平台发送第四获取请求。After determining the device cloud platform corresponding to the device to be connected to the network, the distribution network cloud platform may further send a fourth acquisition request to the device cloud platform to request the device cloud platform to calculate the information encryption key, and request the device cloud platform to send the information encryption key. To the distribution network cloud platform. This embodiment of the present application does not limit the content of the fourth acquisition request. Optionally, the fourth acquisition request includes key calculation parameters and/or the device identifier of the device to be connected to the network; or, the fourth acquisition request also includes the device to be connected to the network. The name of the device manufacturer, the device name of the device to be connected to the network, the product serial number of the device to be connected to the network, etc. Optionally, as shown in Figure 14, if there is no secure connection established between the distribution network cloud platform and the device cloud platform, the distribution network cloud platform needs to establish a secure connection with the device cloud platform first, and then send the first message to the device cloud platform. Four Get Requests.
步骤133C,设备云平台计算信息加密密钥。Step 133C, the device cloud platform calculates the information encryption key.
由于第四获取请求中携带密钥计算参数和/或待入网设备的设备标识,设备云平台在接收到第四获取请求之后,即可依据待入网设备的设备标识,确定第二设备密钥,该第二设备密钥是设备云平台存储的待入网设备的设备密钥,也即密钥K。为了能够实现信息解密密钥和信息加密密钥一致,信息解密密钥的计算方式和信息加密密钥的计算方式也应当一致,因此,设备云平台应当采用与待入网设备计算信息解密密钥的方式来计算信息加密密钥。可选地,若待入网设备采用上述步骤1331来计算信息解密密钥,则设备云平台计算信息加密密钥的过程如下:设备云平台采用第二密钥生成算法对密钥计算参数和第二设备密钥进行处理,得到信息加密密钥。有关第二密钥生成算法的介绍说明,请参见上述方法实施例,此处不多赘述。Since the fourth acquisition request carries the key calculation parameters and/or the device identification of the device to be connected to the network, after receiving the fourth acquisition request, the device cloud platform can determine the second device key according to the device identification of the device to be connected to the network, The second device key is the device key of the device to be connected to the network stored in the device cloud platform, that is, the key K. In order to realize the consistency of the information decryption key and the information encryption key, the calculation method of the information decryption key and the calculation method of the information encryption key should also be consistent. way to calculate the message encryption key. Optionally, if the device to be connected to the network adopts the above step 1331 to calculate the information decryption key, the process of calculating the information encryption key by the device cloud platform is as follows: the device cloud platform adopts the second key generation algorithm to calculate the parameters of the key and the second key The device key is processed to obtain the information encryption key. For an introduction and description of the second key generation algorithm, please refer to the above method embodiments, and details are not repeated here.
步骤133D,设备云平台向配网云平台发送信息加密密钥。Step 133D, the device cloud platform sends the information encryption key to the distribution network cloud platform.
设备云平台在计算出信息加密密钥后,即可将信息加密密钥发送给配网云平台。After the device cloud platform calculates the information encryption key, it can send the information encryption key to the distribution network cloud platform.
步骤1334,配网云平台向配网设备发送信息加密密钥。Step 1334, the distribution network cloud platform sends the information encryption key to the distribution network device.
配网云平台接收到信息加密密钥后,进一步将信息加密密钥发送给配网设备,以响应于配网设备的第二获取请求。After receiving the information encryption key, the distribution network cloud platform further sends the information encryption key to the distribution network device in response to the second acquisition request of the distribution network device.
需要说明的一点是,本申请实施例仅以信息加密密钥和信息解密密钥基于密钥计算参数和待入网设备的设备密钥来计算进行举例说明,本领域技术人员在了解了本申请的技术方案后,将很容易想到采用其它的计算参数来计算访问密钥,如采用密钥计算参数、待入网设备的设备密钥和待入网设备的设备标识来计算信息加密密钥和信息解密密钥,这些均应属于本申请的保护范围之内。It should be noted that the embodiment of the present application only uses the information encryption key and the information decryption key to calculate based on the key calculation parameter and the device key of the device to be connected to the network for illustration. After the technical solution, it is easy to think of using other calculation parameters to calculate the access key. key, all of which should fall within the scope of protection of this application.
综上所述,本申请实施例提供的技术方案,通过待入网设备和配网设备分别依据密钥计算参数获取信息解密密钥和信息加密密钥,后续配网设备使用信息加密密钥加密网络配置信息,待入网设备使用信息解密密钥解密采用信息加密密钥加密的网络配置信息,只有在信息加密密钥和信息解密密钥一致的情况下,待入网设备才能获取网络配置信息,从而在待入网设备获取网络配置信息之前,对待入网设备的身份进行认证,避免网络配置信息的泄露,提升了接入点的安全性。并且,本申请实施例中,为了充分确保待入网设备的设备密钥的安全性,配网设备侧的信息加密密钥由待入网设备对应的云平台计算,以避免泄露待入网设备的设备密钥,提升了身份认证的有效性。To sum up, in the technical solutions provided by the embodiments of the present application, the information decryption key and the information encryption key are obtained by the device to be connected to the network and the network distribution device respectively according to the key calculation parameters, and the subsequent network distribution device uses the information encryption key to encrypt the network. Configuration information, the device to be connected to the network uses the information decryption key to decrypt the network configuration information encrypted with the information encryption key. Only when the information encryption key and the information decryption key are the same, the device to be connected to the network can obtain the network configuration information. Before the network access device obtains the network configuration information, the identity of the network access device is authenticated, so as to avoid leakage of the network configuration information and improve the security of the access point. In addition, in the embodiment of the present application, in order to fully ensure the security of the device key of the device to be connected to the network, the information encryption key on the side of the distribution device is calculated by the cloud platform corresponding to the device to be connected to the network, so as to avoid leaking the device key of the device to be connected to the network. key, which improves the effectiveness of identity authentication.
下面以第二接入点为家庭WiFi网络为例,对本申请的技术方案进行介绍说明。如图15所示,本申请实施例提供的信息处理方法包括如下几个步骤:The technical solution of the present application is described below by taking the second access point as a home WiFi network as an example. As shown in FIG. 15 , the information processing method provided by the embodiment of the present application includes the following steps:
步骤1500,配网设备扫描待入网设备的第一图形码,第一图形码包括密钥计算参数和/或待入网设备的设备标识,密钥计算参数用于确定信息加密密钥,信息加密密钥用于加密网络配置信息,网络配置信息用于配置待入网设备接入家庭WiFi网络。配网设备扫描待入网设备的第一图形码,即可获取密钥计算参数和/或待入网设备的设备标识。Step 1500, the network distribution device scans the first graphic code of the device to be connected to the network, the first graphic code includes the key calculation parameter and/or the device identification of the device to be connected to the network, the key calculation parameter is used to determine the information encryption key, and the information encryption key is used to determine the information encryption key. The key is used to encrypt the network configuration information, and the network configuration information is used to configure the device to be connected to the home WiFi network. The network distribution device scans the first graphic code of the device to be connected to the network to obtain the key calculation parameter and/or the device identifier of the device to be connected to the network.
步骤1510,配网设备向配网云平台发送第二获取请求。第二获取请求用于请求获取信息加密密钥。第 二获取请求中包括密钥计算参数和/或待入网设备的设备标识。可选地,如图15所示,若配网设备与配网云平台之间没有建立安全连接,则配网设备需要先与配网云平台之间建立安全连接,然后向配网云平台发送第二获取请求。Step 1510: The network distribution device sends a second acquisition request to the distribution network cloud platform. The second acquisition request is used for requesting to acquire the information encryption key. The second acquisition request includes the key calculation parameter and/or the device identifier of the device to be connected to the network. Optionally, as shown in Figure 15, if there is no secure connection established between the distribution network device and the distribution network cloud platform, the network distribution device needs to first establish a secure connection with the distribution network cloud platform, and then send the data to the distribution network cloud platform. The second get request.
步骤1520,配网云平台确定设备云平台。配网设备向配网云平台发送的第二获取请求中包括待入网设备的设备厂商名称,进而配网云平台可以根据该待入网设备的设备厂商名称确定对应的设备云平台。Step 1520, the configuration network cloud platform determines the device cloud platform. The second acquisition request sent by the network distribution device to the network distribution cloud platform includes the device manufacturer name of the device to be connected to the network, and the network distribution cloud platform can determine the corresponding device cloud platform according to the device manufacturer name of the device to be connected to the network.
步骤1530,配网云平台向设备云平台发送第四获取请求,该第四获取请求用于请求获取信息加密密钥。第四获取请求中包括密钥计算参数和/或待入网设备的设备标识。可选地,如图15所示,若配网云平台与设备云平台之间没有建立安全连接,则配网云平台需要先和设备云平台之间建立安全连接,之后向设备云平台发送第四获取请求。Step 1530: The distribution network cloud platform sends a fourth acquisition request to the device cloud platform, where the fourth acquisition request is used to request to acquire an information encryption key. The fourth acquisition request includes the key calculation parameter and/or the device identifier of the device to be connected to the network. Optionally, as shown in Figure 15, if there is no secure connection established between the distribution network cloud platform and the device cloud platform, the distribution network cloud platform needs to establish a secure connection with the device cloud platform first, and then send the first message to the device cloud platform. Four Get Requests.
步骤1540,设备云平台计算信息加密密钥。设备云平台在接收到第四获取请求之后,即可依据待入网设备的设备标识,确定第二设备密钥,该第二设备密钥是设备云平台存储的待入网设备的设备密钥。之后,设备云平台采用第二密钥生成算法对密钥计算参数和第二设备密钥进行处理,得到信息加密密钥。Step 1540, the device cloud platform calculates the information encryption key. After receiving the fourth acquisition request, the device cloud platform can determine the second device key according to the device identifier of the device to be connected to the network, where the second device key is the device key of the device to be connected to the network stored by the device cloud platform. After that, the device cloud platform uses the second key generation algorithm to process the key calculation parameter and the second device key to obtain the information encryption key.
步骤1550,设备云平台向配网云平台发送信息加密密钥。Step 1550, the device cloud platform sends the information encryption key to the distribution network cloud platform.
步骤1560,配网云平台向配网设备发送信息加密密钥。Step 1560, the distribution network cloud platform sends the information encryption key to the distribution network device.
步骤1570,配网设备采用第一加密算法和信息加密密钥对网络配置信息进行处理,得到加密后的网络配置信息;根据加密后的网络配置信息生成第二图形码,并显示第二图形码。Step 1570: The network configuration device uses the first encryption algorithm and the information encryption key to process the network configuration information to obtain encrypted network configuration information; generate a second graphic code according to the encrypted network configuration information, and display the second graphic code .
步骤1580,待入网设备计算信息解密密钥。待入网设备采用第二密钥生成算法对密钥计算参数和第一设备密钥进行处理,得到信息解密密钥。Step 1580, the device to be connected to the network calculates the information decryption key. The device to be connected to the network uses the second key generation algorithm to process the key calculation parameter and the first device key to obtain the information decryption key.
步骤1590,待入网设备扫描第二图形码。待入网设备扫描第二图像码,即可获取采用信息加密密钥加密的网络配置信息,由于待入网设备基于密钥计算参数确定了信息解密密钥,因而待入网设备采用信息解密密钥解密该网络配置信息,在信息解密密钥和信息加密密钥一致的情况下,待入网设备获取网络配置信息成功;在信息解密密钥和信息加密密钥不一致的情况下,待入网设备获取网络配置信息失败。Step 1590, the device to be connected to the network scans the second graphic code. The device to be connected to the network scans the second image code to obtain the network configuration information encrypted with the information encryption key. Since the device to be connected to the network determines the information decryption key based on the key calculation parameter, the device to be connected to the network uses the information decryption key to decrypt the information. Network configuration information. If the information decryption key and the information encryption key are the same, the device to be connected to the network successfully obtains the network configuration information; if the information decryption key and the information encryption key are inconsistent, the device to be connected to the network obtains the network configuration information. fail.
需要说明的一点是,本申请实施例对上述各个步骤的执行先后顺序不作限定,在满足实现逻辑的前提下,上述各个步骤可以任何执行顺序进行组合。例如,上述步骤1580也可以在上述步骤1500之前执行,或者,上述步骤1580还可以再上述步骤1540之后执行。这些均应属于本申请的保护范围之内。It should be noted that the embodiment of the present application does not limit the execution sequence of the above steps, and the above steps can be combined in any execution order on the premise of satisfying the implementation logic. For example, the above step 1580 can also be executed before the above step 1500, or the above step 1580 can also be executed after the above step 1540. These should all fall within the protection scope of the present application.
请参考图16,其示出了本申请一个实施例提供的信息处理方法的流程图,该方法可以应用于图1所示的配网系统中。该方法可以包括如下几个步骤:Please refer to FIG. 16 , which shows a flowchart of an information processing method provided by an embodiment of the present application, and the method can be applied to the distribution network system shown in FIG. 1 . The method may include the following steps:
步骤1610,配网设备显示第三图形码,第三图形码包括采用信息加密密钥加密的网络配置信息和密钥计算参数;其中,网络配置信息用于配置待入网设备接入第二接入点,密钥计算参数用于确定信息解密密钥,信息解密密钥用于解密采用信息加密密钥加密的网络配置信息。Step 1610, the network configuration device displays a third graphic code, and the third graphic code includes the network configuration information encrypted by the information encryption key and the key calculation parameter; wherein, the network configuration information is used to configure the device to be connected to the network to access the second access The key calculation parameter is used to determine the information decryption key, and the information decryption key is used to decrypt the network configuration information encrypted with the information encryption key.
针对扫描配网,本申请实施例还提供了一种信息处理方法。配网设备首先显示第三图形码,可选地,第三图形码表现为二维码、条形码等。本申请实施例中,第三图形码包括采用信息加密密钥加密的网络配置信息,以及密钥计算参数。对于配网设备侧而言,密钥计算参数用于确定信息加密密钥;对于待入网设备侧而言,密钥计算参数用于确定信息解密密钥。有关信息加密密钥和信息解密密钥的确定过程,请参见下述方法实施例,此处不多赘述。For the scanning distribution network, the embodiment of the present application further provides an information processing method. The distribution network device first displays a third graphic code, optionally, the third graphic code is represented as a two-dimensional code, a barcode, or the like. In the embodiment of the present application, the third graphic code includes the network configuration information encrypted by the information encryption key, and the key calculation parameter. For the network distribution device side, the key calculation parameter is used to determine the information encryption key; for the device to be connected to the network, the key calculation parameter is used to determine the information decryption key. For the determination process of the information encryption key and the information decryption key, please refer to the following method embodiments, and details are not repeated here.
本申请实施例对密钥计算参数的内容不作限定,可选地,密钥计算参数包括随机数;或者,密钥计算参数包括预配置的数值。可选地,密钥计算参数由设备云平台(待入网设备对应的云平台)生成。可选地,所述密钥计算参数的长度大于或等于一个字节。本申请实施例对密钥计算参数的确定时机不作限定,可选地,设备云平台在接收到用于获取信息加密密钥的请求后生成密钥计算参数;或者,设备云平台预先生成有密钥计算参数,后续接收到用于获取信息加密密钥的请求后,直接依据该密钥计算参数和待入网设备的设备密钥计算信息加密密钥即可。This embodiment of the present application does not limit the content of the key calculation parameter. Optionally, the key calculation parameter includes a random number; or, the key calculation parameter includes a preconfigured value. Optionally, the key calculation parameter is generated by the device cloud platform (the cloud platform corresponding to the device to be connected to the network). Optionally, the length of the key calculation parameter is greater than or equal to one byte. This embodiment of the present application does not limit the timing of determining the key calculation parameters. Optionally, the device cloud platform generates the key calculation parameters after receiving the request for obtaining the information encryption key; or, the device cloud platform pre-generates the encryption key After receiving the request for obtaining the information encryption key, the information encryption key can be calculated directly according to the key calculation parameter and the device key of the device to be connected to the network.
为了避免泄露待入网设备的设备密钥,以待入网设备的设备密钥为计算参数的信息加密密钥由设备云平台计算得到,然后设备云平台进一步通过配网云平台将信息加密密钥以及密钥计算参数发送至配网设备。配网设备在接收到信息加密密钥和密钥计算参数之后,需要基于信息加密密钥和密钥计算参数生成第三图形码,以供待入网设备扫描。因此,在一个示例中,上述方法还包括:配网设备接收来自于配网云平台的信息加密密钥、密钥计算参数和网络配置信息;基于信息加密密钥、密钥计算参数和网络配置信息,确定第三图形码。In order to avoid leaking the device key of the device to be connected to the network, the information encryption key with the device key of the device to be connected to the network as the calculation parameter is calculated by the device cloud platform, and then the device cloud platform further passes the network configuration cloud platform to encrypt the information encryption key and The key calculation parameters are sent to the distribution network device. After receiving the information encryption key and the key calculation parameter, the network distribution device needs to generate a third graphic code based on the information encryption key and the key calculation parameter for the device to be connected to the network to scan. Therefore, in an example, the above method further includes: the distribution network device receives the information encryption key, the key calculation parameter and the network configuration information from the distribution network cloud platform; based on the information encryption key, the key calculation parameter and the network configuration information to determine the third graphic code.
可选地,上述基于信息加密密钥、密钥计算参数和网络配置信息,确定第三图形码,包括:采用第二加密算法和信息加密密钥对网络配置信息进行处理,得到采用信息加密密钥加密的网络配置信息;根据采用信息加密密钥加密的网络配置信息和密钥计算参数,生成第三图形码。由于密钥计算参数没有采用信息加密密钥加密,也即,密钥计算参数为明文的,因此,待入网设备扫描第三图形码即可获取密钥计算参数。 可选地,第二加密算法为对称加密算法。可选地,第二加密算法包括但不限于下述任意一项:AES128-CMAC、AES128-CBC、AES128-GCM、AES256-CMAC、AES256-CBC、AES256-GCM。Optionally, the above-mentioned determining the third graphic code based on the information encryption key, the key calculation parameter and the network configuration information includes: using the second encryption algorithm and the information encryption key to process the network configuration information, and obtaining the information encryption key using the information encryption key. key-encrypted network configuration information; generate a third graphic code according to the network configuration information encrypted with the information encryption key and key calculation parameters. Since the key calculation parameters are not encrypted by the information encryption key, that is, the key calculation parameters are in plaintext, the device to be connected to the network can obtain the key calculation parameters by scanning the third graphic code. Optionally, the second encryption algorithm is a symmetric encryption algorithm. Optionally, the second encryption algorithm includes but is not limited to any one of the following: AES128-CMAC, AES128-CBC, AES128-GCM, AES256-CMAC, AES256-CBC, and AES256-GCM.
步骤1620,待入网设备扫描配网设备显示的第三图形码。Step 1620, the device to be connected to the network scans the third graphic code displayed by the network distribution device.
待入网设备扫描配网设备显示的第三图形码,即可获取明文的密钥计算参数、采用信息加密密钥加密的网络配置信息。之后,待入网设备需要基于密钥计算参数进一步确定信息解密密钥,以解密采用信息加密密钥加密的网络配置信息。有关待入网设备确定信息解密密钥的过程请参见下述方法实施例,此处不多赘述。本申请实施例中,在信息解密密钥和信息加密密钥一致的情况下,待入网设备获取网络配置信息成功;在信息解密密钥和信息加密密钥不一致的情况下,待入网设备获取网络配置信息失败。The device to be connected to the network scans the third graphic code displayed by the network distribution device to obtain the key calculation parameters in plaintext and the network configuration information encrypted with the information encryption key. After that, the device to be connected to the network needs to further determine the information decryption key based on the key calculation parameter, so as to decrypt the network configuration information encrypted by the information encryption key. For the process of determining the information decryption key by the device to be connected to the network, please refer to the following method embodiments, and details are not repeated here. In this embodiment of the present application, if the information decryption key and the information encryption key are the same, the device to be connected to the network succeeds in obtaining the network configuration information; if the information decryption key and the information encryption key are inconsistent, the device to be connected to the network obtains the network configuration information. Configuration information failed.
综上所述,本申请实施例提供的技术方案,通过在配网设备显示的图形码中添加密钥计算参数和采用信息加密密钥加密的网络配置信息,进而待入网设备扫描该图形码即可获取密钥计算参数,从而根据该密钥计算参数确定信息解密密钥,只有在信息加密密钥和信息解密密钥一致的情况下,待入网设备才能获取网络配置信息,从而实现了待入网设备的身份进行认证,避免了网络配置信息的泄露。并且,本申请实施例中,特别针对扫码配网的方式,提出由设备云平台生成密钥计算参数,并进一步通过配网设备在显示的图形码中添加密钥计算参数,以便于待入网设备扫描获取,相比于包含密钥计算参数的图形码以贴纸的形式粘贴在待入网设备上,本申请实施例提供的技术方案可以进一步提升密钥计算参数的安全性。To sum up, the technical solutions provided by the embodiments of the present application add key calculation parameters and network configuration information encrypted by the information encryption key to the graphic code displayed by the network distribution device, and then the device to be connected to the network scans the graphic code, that is, The key calculation parameter can be obtained, so that the information decryption key can be determined according to the key calculation parameter. Only when the information encryption key and the information decryption key are the same, the device to be connected to the network can obtain the network configuration information, thus realizing the need to access the network. The identity of the device is authenticated to avoid leakage of network configuration information. In addition, in the embodiment of the present application, especially for the method of scanning the code to configure the network, it is proposed to generate the key calculation parameter by the device cloud platform, and further add the key calculation parameter to the displayed graphic code through the network configuration device, so as to facilitate the network access. Compared with the fact that the graphic code containing the key calculation parameter is pasted on the device to be connected to the network in the form of a sticker, the technical solution provided by the embodiment of the present application can further improve the security of the key calculation parameter.
下面对待入网设备侧的信息解密密钥和配网设备侧的信息加密密钥的计算过程进行介绍说明。The following describes the calculation process of the information decryption key on the side of the network access device and the information encryption key on the side of the distribution device.
首先,介绍说明待入网设备侧的信息解密密钥的计算过程。First, the calculation process of the information decryption key on the side of the device to be connected to the network is described.
在一个示例中,如图17所示,上述方法还包括如下几个步骤:In an example, as shown in Figure 17, the above method further includes the following steps:
步骤1631,待入网设备基于密钥计算参数和第一设备密钥,确定信息解密密钥。Step 1631, the device to be connected to the network determines the information decryption key based on the key calculation parameter and the first device key.
第一设备密钥为预置在待入网设备中的待入网设备的设备密钥,也即上述密钥K。待入网设备在明确密钥计算参数和第一设备密钥之后,即可基于密钥计算参数和第一设备密钥计算信息解密密钥。The first device key is the device key of the device to be connected to the network preset in the device to be connected to the network, that is, the above-mentioned key K. After specifying the key calculation parameters and the first device key, the device to be connected to the network can calculate the information decryption key based on the key calculation parameters and the first device key.
本申请实施例中,待入网设备可以采用密钥生成算法对密钥计算参数和第一设备密钥进行处理,可选地,上述步骤1631,包括:待入网设备采用第三密钥生成算法对密钥计算参数和第一设备密钥进行处理,得到信息解密密钥。可选地,第三密钥生成算法包括任意一项:AES128-CMAC、HKDF-based KDF、PBKDF、SHA、DES算法、3DES算法。In this embodiment of the present application, the device to be connected to the network may use a key generation algorithm to process the key calculation parameter and the first device key. Optionally, the above step 1631 includes: the device to be connected to the network uses a third key generation algorithm to The key calculation parameter and the first device key are processed to obtain the information decryption key. Optionally, the third key generation algorithm includes any one of: AES128-CMAC, HKDF-based KDF, PBKDF, SHA, DES algorithm, and 3DES algorithm.
其次,介绍说明配网设备侧的信息加密密钥的计算过程。Secondly, the calculation process of the information encryption key on the side of the distribution network device is introduced.
在一个示例中,如图17所示,上述方法还包括如下几个步骤:In an example, as shown in Figure 17, the above method further includes the following steps:
步骤1632,配网设备扫描待入网设备的第四图形码,第四图形码包括待入网设备的设备标识。Step 1632: The network configuration device scans the fourth graphic code of the device to be connected to the network, where the fourth graphic code includes the device identifier of the device to be connected to the network.
待入网设备可以显示第四图形码,可选地,在待入网设备具备屏幕显示功能的情况下,第四图形码由待入网设备显示在其屏幕中;在待入网设备不具备屏幕显示功能的情况下,第四图像码可以由待入网设备的设备厂商粘贴在待入网设备的设备表面,或者粘贴在待入网设备的包装盒上,本申请实施例对此不作限定。可选地,第四图形码表现为二维码、条形码等。本申请实施例中,第四图形码包括待入网设备的设备标识。可选地,第四图形码还包括待入网设备的设备厂商名称、待入网设备的设备名称、待入网设备的产品序列号等。配网设备通过扫描第四图形码,即可获取待入网设备的设备标识。The device to be connected to the network can display a fourth graphic code. Optionally, when the device to be connected to the network has a screen display function, the fourth graphic code is displayed on the screen of the device to be connected to the network; In this case, the fourth image code may be pasted on the device surface of the device to be connected to the network by the device manufacturer of the device to be connected to the network, or pasted on the packaging box of the device to be connected to the network, which is not limited in this embodiment of the present application. Optionally, the fourth graphic code is represented as a two-dimensional code, a barcode, or the like. In the embodiment of the present application, the fourth graphic code includes the device identification of the device to be connected to the network. Optionally, the fourth graphic code further includes the device manufacturer name of the device to be connected to the network, the device name of the device to be connected to the network, the product serial number of the device to be connected to the network, and the like. The network distribution device can obtain the device identification of the device to be connected to the network by scanning the fourth graphic code.
步骤1633,配网设备向配网云平台发送第五获取请求,该第五获取请求用于请求获取信息加密密钥。Step 1633: The distribution network device sends a fifth acquisition request to the distribution network cloud platform, where the fifth acquisition request is used to request to acquire an information encryption key.
由于信息加密密钥由设备云平台计算得到,因此,配网设备在需要获取信息加密密钥的情况下,可以向配网云平台发送第五获取请求,以通过配网云平台进一步获取信息加密密钥。本申请实施例对第五获取请求的内容不作限定,可选地,第五获取请求中包括待入网设备的设备标识;或者,第五获取请求中还包括待入网设备的设备厂商名称、待入网设备的设备名称、待入网设备的产品序列号等。可选地,如图17所示,若配网设备与配网云平台之间没有建立安全连接,则配网设备需要先与配网云平台之间建立安全连接,然后向配网云平台发送第五获取请求。Since the information encryption key is calculated by the device cloud platform, when the distribution network device needs to obtain the information encryption key, it can send a fifth acquisition request to the distribution network cloud platform to further obtain the information encryption through the distribution network cloud platform. key. This embodiment of the present application does not limit the content of the fifth acquisition request. Optionally, the fifth acquisition request includes the device identifier of the device to be connected to the network; The device name of the device, the product serial number of the device to be connected to the network, etc. Optionally, as shown in Figure 17, if no secure connection is established between the distribution network device and the distribution network cloud platform, the network distribution device needs to first establish a secure connection with the distribution network cloud platform, and then send the data to the distribution network cloud platform. Fifth get request.
步骤1634,配网云平台确定设备云平台。Step 1634, the distribution network cloud platform determines the device cloud platform.
配网云平台需要先确定待入网设备对应的设备云平台。可选地,配网设备向配网云平台发送的第二获取请求中包括待入网设备的设备厂商名称,进而配网云平台可以根据该待入网设备的设备厂商名称确定对应的设备云平台。The distribution network cloud platform needs to first determine the device cloud platform corresponding to the device to be connected to the network. Optionally, the second acquisition request sent by the network distribution device to the network distribution cloud platform includes the device manufacturer name of the device to be connected to the network, and the network distribution cloud platform can determine the corresponding device cloud platform according to the device manufacturer name of the device to be connected to the network.
步骤1635,配网云平台向设备云平台发送第六获取请求,该第六获取请求用于请求获取信息加密密钥。Step 1635: The distribution network cloud platform sends a sixth acquisition request to the device cloud platform, where the sixth acquisition request is used to request to acquire an information encryption key.
确定了待入网设备对应的设备云平台之后,配网云平台可以进一步向设备云平台发送第六获取请求,以请求设备云平台计算信息加密密钥,并请求设备云平台将信息加密密钥发送给配网云平台。本申请实施例对第六获取请求的内容不作限定,可选地,第六获取请求中包括待入网设备的设备标识;或者,第六获取请求中还包括待入网设备的设备厂商名称、待入网设备的设备名称、待入网设备的产品序列号等。可选地,如图17所示,若配网云平台与设备云平台之间没有建立安全连接,则配网云平台需要先和设备云平 台之间建立安全连接,之后向设备云平台发送第六获取请求。After determining the device cloud platform corresponding to the device to be connected to the network, the distribution network cloud platform may further send a sixth acquisition request to the device cloud platform to request the device cloud platform to calculate the information encryption key, and request the device cloud platform to send the information encryption key. To the distribution network cloud platform. This embodiment of the present application does not limit the content of the sixth acquisition request. Optionally, the sixth acquisition request includes the device identifier of the device to be connected to the network; The device name of the device, the product serial number of the device to be connected to the network, etc. Optionally, as shown in Figure 17, if there is no secure connection established between the distribution network cloud platform and the device cloud platform, the network distribution cloud platform needs to establish a secure connection with the device cloud platform first, and then send the first message to the device cloud platform. Six Get Requests.
步骤1636,设备云平台计算信息加密密钥。Step 1636, the device cloud platform calculates the information encryption key.
本申请实施例中,待入网设备的设备厂商可以为待入网设备唯一分配一个密钥K,并将该密钥K预配置至待入网设备中。由于待入网设备的设备标识用于唯一标识待入网设备,因此,待入网设备的设备标识和待入网设备的密钥K之间存在一一对应的关系。待入网设备的设备厂商可以将待入网设备的设备标识和待入网设备的密钥K上传至设备厂商的云平台(也即,待入网设备对应的云平台)中。In the embodiment of the present application, the device manufacturer of the device to be connected to the network may uniquely assign a key K to the device to be connected to the network, and preconfigure the key K to the device to be connected to the network. Since the device identifier of the device to be connected to the network is used to uniquely identify the device to be connected to the network, there is a one-to-one correspondence between the device identifier of the device to be connected to the network and the key K of the device to be connected to the network. The device manufacturer of the device to be connected to the network can upload the device identifier of the device to be connected to the network and the key K of the device to be connected to the network to the cloud platform of the device manufacturer (ie, the cloud platform corresponding to the device to be connected to the network).
由于第六获取请求中携带待入网设备的设备标识,设备云平台在接收到第六获取请求之后,即可依据待入网设备的设备标识,确定第二设备密钥,该第二设备密钥是设备云平台存储的待入网设备的设备密钥,也即密钥K。为了能够实现信息解密密钥和信息加密密钥一致,信息解密密钥的计算方式和信息加密密钥的计算方式也应当一致,因此,设备云平台应当采用与待入网设备计算信息解密密钥的方式来计算信息加密密钥。可选地,若待入网设备采用上述步骤1631来计算信息解密密钥,则设备云平台计算信息加密密钥的过程如下:设备云平台采用第三密钥生成算法对密钥计算参数和第二设备密钥进行处理,得到信息加密密钥。有关第三密钥生成算法的介绍说明,请参见上述方法实施例,此处不多赘述。Since the sixth acquisition request carries the device identification of the device to be connected to the network, after receiving the sixth acquisition request, the device cloud platform can determine the second device key according to the device identification of the device to be connected to the network, and the second device key is The device key of the device to be connected to the network stored in the device cloud platform, that is, the key K. In order to realize the consistency of the information decryption key and the information encryption key, the calculation method of the information decryption key and the calculation method of the information encryption key should also be consistent. way to calculate the message encryption key. Optionally, if the device to be connected to the network adopts the above step 1631 to calculate the information decryption key, the process of calculating the information encryption key by the device cloud platform is as follows: the device cloud platform adopts the third key generation algorithm to calculate the parameters of the key and the second key The device key is processed to obtain the information encryption key. For an introduction and description of the third key generation algorithm, please refer to the above method embodiments, and details are not repeated here.
步骤1637,设备云平台向配网云平台发送信息加密密钥和密钥计算参数。Step 1637: The device cloud platform sends the information encryption key and key calculation parameters to the distribution network cloud platform.
设备云平台在计算出信息加密密钥后,即可将信息加密密钥和密钥计算参数发送给配网云平台。After calculating the information encryption key, the device cloud platform can send the information encryption key and key calculation parameters to the distribution network cloud platform.
步骤1638,配网云平台向配网设备发送信息加密密钥。Step 1638, the distribution network cloud platform sends the information encryption key to the distribution network device.
配网云平台接收到信息加密密钥后,进一步将信息加密密钥和密钥计算参数发送给配网设备,以响应于配网设备的第五获取请求。After receiving the information encryption key, the distribution network cloud platform further sends the information encryption key and the key calculation parameter to the distribution network device, so as to respond to the fifth acquisition request of the distribution network device.
需要说明的一点是,本申请实施例仅以信息加密密钥和信息解密密钥基于密钥计算参数和待入网设备的设备密钥来计算进行举例说明,本领域技术人员在了解了本申请的技术方案后,将很容易想到采用其它的计算参数来计算访问密钥,如采用密钥计算参数、待入网设备的设备密钥和待入网设备的设备标识来计算信息加密密钥和信息解密密钥,这些均应属于本申请的保护范围之内。It should be noted that the embodiment of the present application only uses the information encryption key and the information decryption key to calculate based on the key calculation parameter and the device key of the device to be connected to the network for illustration. After the technical solution, it is easy to think of using other calculation parameters to calculate the access key. key, all of which should fall within the scope of protection of this application.
综上所述,本申请实施例提供的技术方案,通过待入网设备对应的云平台生成密钥计算参数,并根据该密钥计算参数以及待入网设备的设备密钥,确定信息加密密钥,以进一步将信息加密密钥和密钥计算参数发送给配网设备,从而避免泄露待入网设备的设备密钥,提升了身份认证的有效性。To sum up, the technical solutions provided by the embodiments of the present application generate key calculation parameters through the cloud platform corresponding to the device to be connected to the network, and determine the information encryption key according to the key calculation parameters and the device key of the device to be connected to the network, In order to further send the information encryption key and key calculation parameters to the distribution network device, so as to avoid leaking the device key of the device to be connected to the network, and improve the effectiveness of identity authentication.
下面以第二接入点为家庭WiFi网络为例,对本申请的技术方案进行介绍说明。如图18所示,本申请实施例提供的信息处理方法包括如下几个步骤:The technical solution of the present application is described below by taking the second access point as a home WiFi network as an example. As shown in FIG. 18 , the information processing method provided by the embodiment of the present application includes the following steps:
步骤1801,配网设备扫描待入网设备的第四图形码。第四图形码包括待入网设备的设备标识。配网设备扫描待入网设备的第四图形码,即可获取待入网设备的设备标识。Step 1801, the network configuration device scans the fourth graphic code of the device to be connected to the network. The fourth graphic code includes the device identification of the device to be connected to the network. The network distribution device scans the fourth graphic code of the device to be connected to the network to obtain the device identification of the device to be connected to the network.
步骤1802,配网设备向配网云平台发送第五获取请求,该第五获取请求用于请求获取信息加密密钥。第五获取请求中包括待入网设备的设备标识。可选地,如图18所示,若配网设备与配网云平台之间没有建立安全连接,则配网设备需要先与配网云平台之间建立安全连接,然后向配网云平台发送第五获取请求。Step 1802: The distribution network device sends a fifth acquisition request to the distribution network cloud platform, where the fifth acquisition request is used to request to acquire an information encryption key. The fifth acquisition request includes the device identifier of the device to be connected to the network. Optionally, as shown in Figure 18, if there is no secure connection established between the distribution network device and the distribution network cloud platform, the network distribution device needs to first establish a secure connection with the distribution network cloud platform, and then send the data to the distribution network cloud platform. Fifth get request.
步骤1803,配网云平台确定设备云平台。配网设备向配网云平台发送的第五获取请求中包括待入网设备的设备厂商名称,进而配网云平台可以根据该待入网设备的设备厂商名称确定对应的设备云平台。Step 1803, the distribution network cloud platform determines the device cloud platform. The fifth acquisition request sent by the distribution device to the distribution cloud platform includes the device manufacturer name of the device to be connected to the network, and the distribution cloud platform can determine the corresponding device cloud platform according to the device manufacturer name of the device to be connected to the network.
步骤1804,配网云平台向设备云平台发送第六获取请求,该第六获取请求用于请求获取信息加密密钥。第六获取请求中包括待入网设备的设备标识。可选地,如图18所示,若配网云平台与设备云平台之间没有建立安全连接,则配网云平台需要先和设备云平台之间建立安全连接,之后向设备云平台发送第六获取请求。Step 1804, the distribution network cloud platform sends a sixth acquisition request to the device cloud platform, where the sixth acquisition request is used to request to acquire an information encryption key. The sixth acquisition request includes the device identifier of the device to be connected to the network. Optionally, as shown in Figure 18, if there is no secure connection established between the distribution network cloud platform and the device cloud platform, the distribution network cloud platform needs to establish a secure connection with the device cloud platform first, and then send the first message to the device cloud platform. Six Get Requests.
步骤1805,设备云平台计算信息加密密钥。设备云平台在接收到第六获取请求之后,即可依据待入网设备的设备标识,确定第二设备密钥,该第二设备密钥是设备云平台存储的待入网设备的设备密钥。之后,设备云平台采用第三密钥生成算法对密钥计算参数和第二设备密钥进行处理,得到信息加密密钥。Step 1805, the device cloud platform calculates the information encryption key. After receiving the sixth acquisition request, the device cloud platform can determine the second device key according to the device identifier of the device to be connected to the network, where the second device key is the device key of the device to be connected to the network stored by the device cloud platform. After that, the device cloud platform uses the third key generation algorithm to process the key calculation parameter and the second device key to obtain the information encryption key.
步骤1806,设备云平台向配网云平台发送信息加密密钥和密钥计算参数。Step 1806, the device cloud platform sends the information encryption key and key calculation parameters to the distribution network cloud platform.
步骤1807,配网云平台向配网设备发送信息加密密钥和密钥计算参数。Step 1807: The distribution network cloud platform sends the information encryption key and key calculation parameters to the distribution network device.
步骤1808,配网设备采用第二加密算法和信息加密密钥对网络配置信息进行处理,得到采用信息加密密钥加密的网络配置信息;根据采用信息加密密钥加密的网络配置信息和密钥计算参数生成第三图形码,并显示第三图形码。Step 1808, the network configuration device uses the second encryption algorithm and the information encryption key to process the network configuration information, and obtains the network configuration information encrypted with the information encryption key; according to the network configuration information encrypted with the information encryption key and the key calculation The parameter generates the third graphic code and displays the third graphic code.
步骤1809,待入网设备扫描第三图形码。待入网设备扫描第三图像码,即可获取采用信息加密密钥加密的网络配置信息和密钥计算参数。Step 1809, the device to be connected to the network scans the third graphic code. When the device to be connected to the network scans the third image code, the network configuration information and key calculation parameters encrypted with the information encryption key can be obtained.
步骤1810,待入网设备计算信息解密密钥。待入网设备基于密钥计算参数和第一设备密钥,确定信息解密密钥。可选地,待入网设备采用第三密钥生成算法对密钥计算参数和第一设备密钥进行处理,得到信息解密密钥。Step 1810, the device to be connected to the network calculates the information decryption key. The device to be connected to the network determines the information decryption key based on the key calculation parameter and the first device key. Optionally, the device to be connected to the network uses the third key generation algorithm to process the key calculation parameter and the first device key to obtain the information decryption key.
步骤1811,待入网设备获取网络配置信息。待入网设备可以采用计算出的信息解密密钥解密之前获取 的采用信息加密密钥加密的网络配置信息,在信息解密密钥和信息加密密钥一致的情况下,待入网设备获取网络配置信息成功;在信息解密密钥和信息加密密钥不一致的情况下,待入网设备获取网络配置信息失败。Step 1811, the device to be connected to the network acquires network configuration information. The device to be connected to the network can use the calculated information decryption key to decrypt the previously obtained network configuration information encrypted with the information encryption key. If the information decryption key and the information encryption key are the same, the device to be connected to the network successfully obtains the network configuration information. ; When the information decryption key and the information encryption key are inconsistent, the device to be connected to the network fails to obtain the network configuration information.
需要说明的一点是,本申请实施例从待入网设备、配网设备、配网云平台、设备云平台之间交互的角度对本申请实施例提供的信息处理方法进行了介绍说明。上述有关待入网设备执行的步骤,可以单独实现为待入网设备侧的信息处理方法;上述有关配网设备执行的步骤,可以单独实现为配网设备侧的信息处理方法。It should be noted that the embodiments of the present application describe the information processing methods provided by the embodiments of the present application from the perspective of interaction among devices to be connected to the network, network distribution devices, network distribution cloud platforms, and device cloud platforms. The above-mentioned steps performed by the device to be connected to the network can be independently implemented as an information processing method on the side of the device to be connected to the network; the above-mentioned steps performed by the network distribution device can be independently implemented as an information processing method on the network distribution device side.
下述为本申请装置实施例,可以用于执行本申请方法实施例。对于本申请装置实施例中未披露的细节,请参照本申请方法实施例。The following are apparatus embodiments of the present application, which can be used to execute the method embodiments of the present application. For details not disclosed in the device embodiments of the present application, please refer to the method embodiments of the present application.
请参考图19,其示出了本申请一个实施例提供的信息处理装置的框图。该装置具有实现上述待入网设备侧的方法示例的功能,所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该装置可以是上文介绍的待入网设备,也可以设置在待入网设备中。如图19所示,该装置1900可以包括:信标广播模块1910。Please refer to FIG. 19 , which shows a block diagram of an information processing apparatus provided by an embodiment of the present application. The apparatus has the function of implementing the above-mentioned method example on the device side to be connected to the network, and the function may be implemented by hardware or by executing corresponding software in hardware. The device may be the device to be connected to the network described above, or may be set in the device to be connected to the network. As shown in FIG. 19 , the apparatus 1900 may include: a beacon broadcasting module 1910 .
信标广播模块1910,用于广播第一接入点的信标,所述信标中包括密钥计算参数和/或所述待入网设备的设备标识,所述密钥计算参数用于确定所述待入网设备和配网设备之间执行身份认证的访问密钥。The beacon broadcasting module 1910 is used to broadcast the beacon of the first access point, the beacon includes key calculation parameters and/or the device identification of the device to be connected to the network, and the key calculation parameters are used to determine the The access key for performing identity authentication between the device to be accessed and the network distribution device is described.
在一个示例中,如图20所示,所述装置1900还包括:第一密钥确定模块1920,用于基于所述密钥计算参数和第一设备密钥,确定第一访问密钥。In an example, as shown in FIG. 20 , the apparatus 1900 further includes: a first key determination module 1920, configured to determine a first access key based on the key calculation parameter and the first device key.
在一个示例中,如图20所示,所述第一密钥确定模块1920,用于:采用第一密钥生成算法对所述密钥计算参数和所述第一设备密钥进行处理,得到第一加密密钥;采用第一编码方式对所述第一加密密钥进行处理,得到所述第一访问密钥。In an example, as shown in FIG. 20 , the first key determination module 1920 is configured to: use a first key generation algorithm to process the key calculation parameter and the first device key to obtain a first encryption key; the first encryption key is processed in a first encoding manner to obtain the first access key.
在一个示例中,如图20所示,所述装置1900还包括:身份认证模块1930,用于基于所述第一访问密钥,与所述配网设备之间执行所述身份认证;其中,在所述第一访问密钥和所述配网设备确定的第二访问密钥一致的情况下,所述身份认证通过;在所述第一访问密钥和所述配网设备确定的第二访问密钥不一致的情况下,所述身份认证不通过。In an example, as shown in FIG. 20 , the apparatus 1900 further includes: an identity authentication module 1930, configured to perform the identity authentication with the distribution network device based on the first access key; wherein, If the first access key and the second access key determined by the distribution network device are consistent, the identity authentication is passed; if the first access key and the second access key determined by the distribution network device If the access keys are inconsistent, the identity authentication fails.
在一个示例中,所述信标包括以下至少一个字段:BSSID字段、SSID字段、自定义字段;所述BSSID字段包括所述密钥计算参数和/或所述待入网设备的设备标识;或者,所述SSID字段包括所述密钥计算参数和/或所述待入网设备的设备标识;或者,所述自定义字段包括所述密钥计算参数和/或所述待入网设备的设备标识。In one example, the beacon includes at least one of the following fields: a BSSID field, an SSID field, and a custom field; the BSSID field includes the key calculation parameter and/or the device identifier of the device to be connected to the network; or, The SSID field includes the key calculation parameter and/or the device identification of the device to be connected to the network; or, the custom field includes the key calculation parameter and/or the device identification of the device to be connected to the network.
在一个示例中,所述密钥计算参数包括随机数。In one example, the key calculation parameter includes a random number.
在一个示例中,所述密钥计算参数的长度大于或等于一个字节。In one example, the length of the key calculation parameter is greater than or equal to one byte.
在一个示例中,如图20所示,所述装置1900还包括:配置信息接收模块1940,用于在所述身份认证通过的情况下,接收来自于所述配网设备的网络配置信息,所述网络配置信息用于配置所述待入网设备接入第二接入点。In an example, as shown in FIG. 20, the apparatus 1900 further includes: a configuration information receiving module 1940, configured to receive the network configuration information from the distribution network device when the identity authentication is passed, so The network configuration information is used to configure the device to be connected to the network to access the second access point.
综上所述,本申请实施例提供的技术方案,通过在待入网设备启动的接入点的信标中增加密钥计算参数,该密钥计算参数用于确定待入网设备和配网设备之间执行身份认证的访问密钥,进而为待入网设备和配网设备之间执行身份认证提供了基础,有助于后续待入网设备和配网设备之间身份认证的实现。并且,本申请实施例中,待入网设备和配网设备之间的身份认证在待入网设备获取到网络配置信息之前,也即,待入网设备只有在身份认证通过的情况下才能获取网络配置信息,进而降低了网络配置信息泄露的风险,提升了接入点的安全性。另外,本申请实施例中,只需要在待入网设备启动的接入点的信标中增加密钥计算参数,即可实现待入网设备和配网设备的身份认证,相比于相关技术需要配网设备来回切换接入点以验证待入网设备的身份,本申请实施例简化了身份认证流程,提升了身份认证效率。To sum up, the technical solutions provided by the embodiments of this application add a key calculation parameter to the beacon of the access point activated by the device to be connected to the network, and the key calculation parameter is used to determine the relationship between the device to be connected to the network and the network distribution device. The access key for performing identity authentication between devices provides a basis for performing identity authentication between the device to be connected to the network and the device to be deployed on the network, which is helpful for the subsequent realization of identity authentication between the device to be connected to the network and the device to be connected to the network. In addition, in the embodiment of the present application, the identity authentication between the device to be accessed and the network distribution device is performed before the device to access the network obtains the network configuration information, that is, the device to be connected to the network can obtain the network configuration information only when the identity authentication is passed. , thereby reducing the risk of network configuration information leakage and improving the security of the access point. In addition, in this embodiment of the present application, it is only necessary to add a key calculation parameter to the beacon of the access point activated by the device to be connected to the network, and then the identity authentication of the device to be connected to the network and the network distribution device can be realized. The network device switches the access point back and forth to verify the identity of the device to be connected to the network. The embodiment of the present application simplifies the identity authentication process and improves the identity authentication efficiency.
请参考图21,其示出了本申请一个实施例提供的信息处理装置的框图。该装置具有实现上述配网设备侧的方法示例的功能,所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该装置可以是上文介绍的配网设备,也可以设置在配网设备中。如图21所示,该装置2100可以包括:信标接收模块2110。Please refer to FIG. 21 , which shows a block diagram of an information processing apparatus provided by an embodiment of the present application. The apparatus has the function of implementing the method example on the side of the distribution network device, and the function may be implemented by hardware, or by executing corresponding software in hardware. The device may be the distribution network equipment described above, or may be set in the distribution network equipment. As shown in FIG. 21 , the apparatus 2100 may include: a beacon receiving module 2110 .
信标接收模块2110,用于接收第一接入点的信标,所述信标中包括密钥计算参数和/或待入网设备的设备标识,所述密钥计算参数用于确定待入网设备和所述配网设备之间执行身份认证的访问密钥。A beacon receiving module 2110, configured to receive a beacon of the first access point, where the beacon includes a key calculation parameter and/or a device identifier of the device to be connected to the network, and the key calculation parameter is used to determine the device to be connected to the network An access key for performing identity authentication with the distribution network device.
在一个示例中,如图22所示,所述装置2100还包括:第一请求发送模块2120,用于向配网云平台发送第一获取请求,所述第一获取请求用于请求获取第二访问密钥;密钥信息接收模块2130,用于接收来自于所述配网云平台的访问密钥信息,所述访问密钥信息用于确定所述第二访问密钥。In an example, as shown in FIG. 22 , the apparatus 2100 further includes: a first request sending module 2120, configured to send a first obtaining request to the distribution network cloud platform, where the first obtaining request is used to request to obtain the second Access key; the key information receiving module 2130 is configured to receive access key information from the distribution network cloud platform, where the access key information is used to determine the second access key.
在一个示例中,所述访问密钥信息包括所述第二访问密钥。In one example, the access key information includes the second access key.
在一个示例中,所述访问密钥信息包括第二加密密钥;如图22所示,所述装置2100还包括:第二密钥确定模块2140,用于采用第一编码方式对所述第二加密密钥进行处理,得到所述第二访问密钥。In an example, the access key information includes a second encryption key; as shown in FIG. 22 , the apparatus 2100 further includes: a second key determination module 2140, configured to use the first encoding method to encrypt the second encryption key. The second encryption key is processed to obtain the second access key.
在一个示例中,所述第一获取请求中包括所述密钥计算参数和/或所述待入网设备的设备标识。In an example, the first acquisition request includes the key calculation parameter and/or the device identifier of the device to be connected to the network.
在一个示例中,如图22所示,所述装置2100还包括:身份认证模块2150,用于基于所述第二访问密钥,与所述待入网设备之间执行所述身份认证;其中,在所述第二访问密钥和所述待入网设备确定的第一访问密钥一致的情况下,所述身份认证通过;在所述第二访问密钥和所述待入网设备确定的第一访问密钥不一致的情况下,所述身份认证不通过。In an example, as shown in FIG. 22, the apparatus 2100 further includes: an identity authentication module 2150, configured to perform the identity authentication with the device to be connected to the network based on the second access key; wherein, If the second access key is consistent with the first access key determined by the device to be connected to the network, the identity authentication is passed; if the second access key and the first access key determined by the device to be connected are the same If the access keys are inconsistent, the identity authentication fails.
在一个示例中,所述信标包括以下至少一个字段:BSSID字段、SSID字段、自定义字段;所述BSSID字段包括所述密钥计算参数和/或所述待入网设备的设备标识;或者,所述SSID字段包括所述密钥计算参数和/或所述待入网设备的设备标识;或者,所述自定义字段包括所述密钥计算参数和/或所述待入网设备的设备标识。In one example, the beacon includes at least one of the following fields: a BSSID field, an SSID field, and a custom field; the BSSID field includes the key calculation parameter and/or the device identifier of the device to be connected to the network; or, The SSID field includes the key calculation parameter and/or the device identification of the device to be connected to the network; or, the custom field includes the key calculation parameter and/or the device identification of the device to be connected to the network.
在一个示例中,所述密钥计算参数包括随机数。In one example, the key calculation parameter includes a random number.
在一个示例中,所述密钥计算参数的长度大于或等于一个字节。In one example, the length of the key calculation parameter is greater than or equal to one byte.
在一个示例中,如图22所示,所述装置2100还包括:接入模块2160,用于在所述身份认证通过的情况下,接入所述第一接入点。In an example, as shown in FIG. 22 , the apparatus 2100 further includes: an access module 2160, configured to access the first access point when the identity authentication is passed.
在一个示例中,如图22所示,所述装置2100还包括:配置信息发送模块2170,用于向所述待入网设备发送网络配置信息,所述网络配置信息用于配置所述待入网设备接入第二接入点。In an example, as shown in FIG. 22, the apparatus 2100 further includes: a configuration information sending module 2170, configured to send network configuration information to the device to be connected to the network, where the network configuration information is used to configure the device to be connected to the network Access the second access point.
综上所述,本申请实施例提供的技术方案,通过在待入网设备启动的接入点的信标中增加密钥计算参数,该密钥计算参数用于确定待入网设备和配网设备之间执行身份认证的访问密钥,进而为待入网设备和配网设备之间执行身份认证提供了基础,有助于后续待入网设备和配网设备之间身份认证的实现。并且,本申请实施例中,待入网设备和配网设备之间的身份认证在待入网设备获取到网络配置信息之前,也即,待入网设备只有在身份认证通过的情况下才能获取网络配置信息,进而降低了网络配置信息泄露的风险,提升了接入点的安全性。另外,本申请实施例中,只需要在待入网设备启动的接入点的信标中增加密钥计算参数,即可实现待入网设备和配网设备的身份认证,相比于相关技术需要配网设备来回切换接入点以验证待入网设备的身份,本申请实施例简化了身份认证流程,提升了身份认证效率。To sum up, the technical solutions provided by the embodiments of this application add a key calculation parameter to the beacon of the access point activated by the device to be connected to the network, and the key calculation parameter is used to determine the relationship between the device to be connected to the network and the network distribution device. The access key for performing identity authentication between devices provides a basis for performing identity authentication between the device to be connected to the network and the device to be deployed on the network, which is helpful for the subsequent realization of identity authentication between the device to be connected to the network and the device to be connected to the network. In addition, in the embodiment of the present application, the identity authentication between the device to be accessed and the network distribution device is performed before the device to access the network obtains the network configuration information, that is, the device to be connected to the network can obtain the network configuration information only when the identity authentication is passed. , thereby reducing the risk of network configuration information leakage and improving the security of the access point. In addition, in this embodiment of the present application, it is only necessary to add a key calculation parameter to the beacon of the access point activated by the device to be connected to the network, and then the identity authentication of the device to be connected to the network and the network distribution device can be realized. The network device switches the access point back and forth to verify the identity of the device to be connected to the network. The embodiment of the present application simplifies the identity authentication process and improves the identity authentication efficiency.
请参考图23,其示出了本申请一个实施例提供的信息处理装置的框图。该装置具有实现上述待入网设备侧的方法示例的功能,所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该装置可以是上文介绍的待入网设备,也可以设置在待入网设备中。如图23所示,该装置2300可以包括:第一接收模块2310。Please refer to FIG. 23 , which shows a block diagram of an information processing apparatus provided by an embodiment of the present application. The apparatus has the function of implementing the above-mentioned method example on the device side to be connected to the network, and the function may be implemented by hardware or by executing corresponding software in hardware. The device may be the device to be connected to the network described above, or may be set in the device to be connected to the network. As shown in FIG. 23 , the apparatus 2300 may include: a first receiving module 2310 .
第一接收模块2310,用于接收来自于配网设备的第一信息,所述第一信息包括密钥计算参数,所述密钥计算参数用于确定第一信息密钥。The first receiving module 2310 is configured to receive first information from the distribution network device, where the first information includes a key calculation parameter, and the key calculation parameter is used to determine the first information key.
在一个示例中,如图24所示,所述装置2300还包括:第一密钥确定模块2320,用于基于所述密钥计算参数和所述第一设备密钥,确定所述第一信息密钥。In an example, as shown in FIG. 24 , the apparatus 2300 further includes: a first key determination module 2320, configured to determine the first information based on the key calculation parameter and the first device key key.
在一个示例中,如图24所示,所述第一密钥确定模块2320,用于:采用第四密钥生成算法对所述密钥计算参数和所述第一设备密钥进行处理,得到所述第一信息密钥。In an example, as shown in FIG. 24 , the first key determination module 2320 is configured to: use a fourth key generation algorithm to process the key calculation parameter and the first device key to obtain the first information key.
在一个示例中,所述第一信息还包括采用第二信息密钥加密的网络配置信息,所述网络配置信息用于配置所述待入网设备接入第二接入点;如图24所示,所述装置2300还包括:第一解密模块2330,用于采用所述第一信息密钥解密所述采用第二信息密钥加密的网络配置信息;在所述第一信息密钥和所述第二信息密钥一致的情况下,所述待入网设备获取所述网络配置信息成功;在所述第一信息密钥和所述第二信息密钥不一致的情况下,所述待入网设备获取所述网络配置信息失败。In an example, the first information further includes network configuration information encrypted with a second information key, where the network configuration information is used to configure the device to be connected to the network to access the second access point; as shown in FIG. 24 , the apparatus 2300 further includes: a first decryption module 2330, configured to use the first information key to decrypt the network configuration information encrypted with the second information key; If the second information key is the same, the device to be connected to the network successfully obtains the network configuration information; if the first information key and the second information key are inconsistent, the device to be connected to the network obtains the network configuration information. The network configuration information failed.
在一个示例中,如图24所示,所述装置2300还包括:第一加密模块2340,用于根据所述第一信息密钥和第一参考信息,得到第一加密信息;第一信息发送模块2350,用于向所述配网设备发送所述第一加密信息。In an example, as shown in FIG. 24, the apparatus 2300 further includes: a first encryption module 2340, configured to obtain the first encrypted information according to the first information key and the first reference information; send the first information Module 2350, configured to send the first encrypted information to the network distribution device.
在一个示例中,如图24所示,所述第一加密模块2340,用于:采用第三加密算法和所述第一信息密钥对所述第一参考信息进行处理,得到所述第一加密信息。In an example, as shown in FIG. 24 , the first encryption module 2340 is configured to: use a third encryption algorithm and the first information key to process the first reference information to obtain the first reference information Encrypted information.
在一个示例中,所述第一信息还包括采用第二信息密钥加密的第二信息;如图24所示,所述装置2300还包括:第二解密模块2360,用于采用所述第一信息密钥解密所述采用第二信息密钥加密的第二信息,得到第三参考信息;第三信息发送模块2370,用于向所述配网设备发送所述第三参考信息。In an example, the first information further includes second information encrypted with a second information key; as shown in FIG. 24 , the apparatus 2300 further includes: a second decryption module 2360, configured to use the first decryption module 2360 The information key decrypts the second information encrypted with the second information key to obtain third reference information; a third information sending module 2370 is configured to send the third reference information to the distribution network device.
在一个示例中,所述密钥计算参数包括随机数。In one example, the key calculation parameter includes a random number.
在一个示例中,所述密钥计算参数的长度大于或等于一个字节。In one example, the length of the key calculation parameter is greater than or equal to one byte.
综上所述,本申请实施例提供的技术方案,通过配网设备向待入网设备发送密钥计算参数,该密钥计算参数用于计算信息密钥,该信息密钥可以用于解密采用设备云平台计算的信息密钥加密的数据或采用设备云平台计算的信息密钥加密的网络配置信息,也可以用于加密参考信息。在待入网设备计算的信息密钥和设备云平台计算的信息密钥一致的情况下,待入网设备才能成功解析采用设备云平台计算的信息密钥加密的网络配置信息或数据,进而待入网设备通过身份认证,并进一步获取网络配置信息;或者,在待入网设备计算的信息密钥和设备云平台计算的信息密钥一致的情况下,采用这两个信息密钥分别加密得到的数据才能够实现一致,进而待入网设备通过身份认证,并进一步获取网络配置信息。因此,本申请实施例在待入网设备接入无线接入点之前对待入网设备的身份进行认证,避免无线接入点对应的网络配置信息泄露,提成无线接入点的安全性。To sum up, in the technical solutions provided by the embodiments of the present application, the key calculation parameters are sent to the device to be connected to the network through the network distribution device, and the key calculation parameters are used to calculate the information key, and the information key can be used for decryption using the device. The data encrypted by the information key calculated by the cloud platform or the network configuration information encrypted by the information key calculated by the device cloud platform can also be used to encrypt the reference information. Only when the information key calculated by the device to be connected to the network and the information key calculated by the device cloud platform are the same, the device to be connected can successfully parse the network configuration information or data encrypted with the information key calculated by the device cloud platform, and then the device to be connected to the network can successfully parse the network configuration information or data encrypted by the information key calculated by the device cloud platform. Through identity authentication, the network configuration information can be further obtained; or, in the case where the information key calculated by the device to be connected to the network is consistent with the information key calculated by the device cloud platform, the data obtained by encrypting the two information keys respectively can be used. Consistency is achieved, and then the device to be connected to the network passes identity authentication and further obtains network configuration information. Therefore, in the embodiment of the present application, the identity of the device to be accessed is authenticated before the device to access the wireless access point, so as to avoid leakage of network configuration information corresponding to the wireless access point, and improve the security of the wireless access point.
并且,本申请实施例中,对待入网设备的身份认证过程可以和配网过程耦合,也即,配网设备直接采用设备云平台计算的信息密钥加密网络配置信息,在待入网设备计算的信息密钥和设备云平台计算的信息密钥一致的情况下,待入网设备可以直接获取到网络配置信息,减少了配网设备和待入网设备之间的数据往来,降低配网设备和待入网设备的处理开销。另外,本申请实施例中,对待入网设备的身份认证过程也可以和配网过程解耦合,也即,配网设备在待入网设备的身份认证通过后,向待入网设备发送网络配置信息,通过身份认证过程和配网过程解耦合,可以充分提成网络配置信息的安全性。Moreover, in this embodiment of the present application, the identity authentication process of the device to be connected to the network can be coupled with the network distribution process, that is, the network distribution device directly encrypts the network configuration information with the information key calculated by the device cloud platform, and the information calculated by the device to be connected to the network is encrypted. When the key and the information key calculated by the device cloud platform are the same, the device to be connected to the network can directly obtain the network configuration information, which reduces the data exchange between the network distribution device and the device to be connected to the network, and reduces the number of distribution devices and the device to be connected to the network. processing overhead. In addition, in this embodiment of the present application, the identity authentication process of the device to be connected to the network can also be decoupled from the network distribution process, that is, after the identity authentication of the device to be connected to the network is passed, the network distribution device sends the network configuration information to the device to be connected to the network. The decoupling of the identity authentication process and the distribution network process can fully improve the security of network configuration information.
请参考图25,其示出了本申请一个实施例提供的信息处理装置的框图。该装置具有实现上述配网设备侧的方法示例的功能,所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该装置可以是上文介绍的配网设备,也可以设置在配网设备中。如图25所示,该装置2500可以包括:第一发送模块2510。Please refer to FIG. 25 , which shows a block diagram of an information processing apparatus provided by an embodiment of the present application. The apparatus has the function of implementing the method example on the side of the distribution network device, and the function may be implemented by hardware, or by executing corresponding software in hardware. The device may be the distribution network equipment described above, or may be set in the distribution network equipment. As shown in FIG. 25 , the apparatus 2500 may include: a first sending module 2510 .
第一发送模块2510,用于向待入网设备发送第一信息,所述第一信息包括密钥计算参数,所述密钥计算参数用于确定第一信息密钥。The first sending module 2510 is configured to send first information to the device to be connected to the network, where the first information includes a key calculation parameter, and the key calculation parameter is used to determine the first information key.
在一个示例中,所述第一信息还包括采用第二信息密钥加密的网络配置信息,所述网络配置信息用于配置所述待入网设备接入第二接入点;如图26所示,所述装置2500还包括:第一接收模块2520,用于接收来自于配网云平台的所述密钥计算参数和所述第二信息密钥;第二确定模块2530,用于基于所述密钥计算参数、所述第二信息密钥和所述网络配置信息,确定所述第一信息。In an example, the first information further includes network configuration information encrypted with a second information key, where the network configuration information is used to configure the device to be connected to the network to access the second access point; as shown in FIG. 26 . , the apparatus 2500 further includes: a first receiving module 2520 for receiving the key calculation parameter and the second information key from the distribution network cloud platform; a second determining module 2530 for The key calculation parameter, the second information key, and the network configuration information determine the first information.
在一个示例中,如图26所示,所述第二确定模块2530,用于:采用第四加密算法和所述第二信息密钥对所述网络配置信息进行处理,得到所述采用第二信息密钥加密的网络配置信息;基于所述密钥计算参数和所述采用第二信息密钥加密的网络配置信息,确定所述第一信息。In an example, as shown in FIG. 26 , the second determining module 2530 is configured to: use the fourth encryption algorithm and the second information key to process the network configuration information, and obtain the network configuration information encrypted with an information key; the first information is determined based on the key calculation parameter and the network configuration information encrypted with the second information key.
在一个示例中,如图26所示,所述装置2500还包括:第一信息接收模块2540,用于接收来自于所述待入网设备的第一加密信息,所述第一加密信息包括采用所述第一信息密钥加密的第一参考信息;第二信息接收模块2550,用于接收来自于配网云平台的第二加密信息,所述第二加密信息包括采用第二信息密钥加密的第二参考信息;配置信息发送模块2560,用于在所述第一加密信息和所述第二加密信息一致的情况下,向所述待入网设备发送网络配置信息,所述网络配置信息用于配置所述待入网设备接入第二接入点。In an example, as shown in FIG. 26 , the apparatus 2500 further includes: a first information receiving module 2540, configured to receive first encrypted information from the device to be connected to the network, where the first encrypted information includes using the The first reference information encrypted by the first information key; the second information receiving module 2550 is used to receive the second encrypted information from the distribution network cloud platform, and the second encrypted information includes the encrypted information encrypted with the second information key. Second reference information; a configuration information sending module 2560, configured to send network configuration information to the device to be connected to the network when the first encrypted information and the second encrypted information are consistent, where the network configuration information is used for Configure the device to be connected to the network to access the second access point.
在一个示例中,如图26所示,所述装置2500还包括:第三信息接收模块2570,用于接收来自于所述配网设备的所述第三参考信息;第四信息接收模块2580,用于接收来自于配网云平台的第四参考信息;配置信息发送模块2560,用于在所述第三参考信息和所述第四参考信息一致的情况下,向所述待入网设备发送网络配置信息,所述网络配置信息用于配置所述待入网设备接入第二接入点。In an example, as shown in FIG. 26 , the apparatus 2500 further includes: a third information receiving module 2570, configured to receive the third reference information from the distribution network device; a fourth information receiving module 2580, It is used to receive the fourth reference information from the distribution network cloud platform; the configuration information sending module 2560 is used to send the network to the device to be connected to the network when the third reference information and the fourth reference information are consistent Configuration information, where the network configuration information is used to configure the device to be connected to the network to access the second access point.
在一个示例中,所述密钥计算参数包括随机数。In one example, the key calculation parameter includes a random number.
在一个示例中,所述密钥计算参数的长度大于或等于一个字节。In one example, the length of the key calculation parameter is greater than or equal to one byte.
综上所述,本申请实施例提供的技术方案,通过配网设备向待入网设备发送密钥计算参数,该密钥计算参数用于计算信息密钥,该信息密钥可以用于解密采用设备云平台计算的信息密钥加密的数据或采用设备云平台计算的信息密钥加密的网络配置信息,也可以用于加密参考信息。在待入网设备计算的信息密钥和设备云平台计算的信息密钥一致的情况下,待入网设备才能成功解析采用设备云平台计算的信息密钥加密的网络配置信息或数据,进而待入网设备通过身份认证,并进一步获取网络配置信息;或者,在待入网设备计算的信息密钥和设备云平台计算的信息密钥一致的情况下,采用这两个信息密钥分别加密得到的数据才能够实现一致,进而待入网设备通过身份认证,并进一步获取网络配置信息。因此,本申请实施例在待入网设备接入无线接入点之前对待入网设备的身份进行认证,避免无线接入点对应的网络配置信息泄露,提成无线接入点的安全性。To sum up, in the technical solutions provided by the embodiments of the present application, the key calculation parameters are sent to the device to be connected to the network through the network distribution device, and the key calculation parameters are used to calculate the information key, and the information key can be used for decryption using the device. The data encrypted by the information key calculated by the cloud platform or the network configuration information encrypted by the information key calculated by the device cloud platform can also be used to encrypt the reference information. Only when the information key calculated by the device to be connected to the network and the information key calculated by the device cloud platform are the same, the device to be connected can successfully parse the network configuration information or data encrypted with the information key calculated by the device cloud platform, and then the device to be connected to the network can successfully parse the network configuration information or data encrypted by the information key calculated by the device cloud platform. Through identity authentication, the network configuration information can be further obtained; or, in the case where the information key calculated by the device to be connected to the network is consistent with the information key calculated by the device cloud platform, the data obtained by encrypting the two information keys respectively can be used. Consistency is achieved, and then the device to be connected to the network passes identity authentication and further obtains network configuration information. Therefore, in the embodiment of the present application, the identity of the device to be accessed is authenticated before the device to access the wireless access point, so as to avoid leakage of network configuration information corresponding to the wireless access point, and improve the security of the wireless access point.
并且,本申请实施例中,对待入网设备的身份认证过程可以和配网过程耦合,也即,配网设备直接采用设备云平台计算的信息密钥加密网络配置信息,在待入网设备计算的信息密钥和设备云平台计算的信息密钥一致的情况下,待入网设备可以直接获取到网络配置信息,减少了配网设备和待入网设备之间的数据往来,降低配网设备和待入网设备的处理开销。另外,本申请实施例中,对待入网设备的身份认证过程也 可以和配网过程解耦合,也即,配网设备在待入网设备的身份认证通过后,向待入网设备发送网络配置信息,通过身份认证过程和配网过程解耦合,可以充分提成网络配置信息的安全性。Moreover, in this embodiment of the present application, the identity authentication process of the device to be connected to the network can be coupled with the network distribution process, that is, the network distribution device directly encrypts the network configuration information with the information key calculated by the device cloud platform, and the information calculated by the device to be connected to the network is encrypted. When the key and the information key calculated by the device cloud platform are the same, the device to be connected to the network can directly obtain the network configuration information, which reduces the data exchange between the network distribution device and the device to be connected to the network, and reduces the number of distribution devices and the device to be connected to the network. processing overhead. In addition, in this embodiment of the present application, the identity authentication process of the device to be connected to the network can also be decoupled from the network distribution process, that is, after the identity authentication of the device to be connected to the network is passed, the network distribution device sends the network configuration information to the device to be connected to the network. The decoupling of the identity authentication process and the distribution network process can fully improve the security of network configuration information.
请参考图27,其示出了本申请一个实施例提供的信息处理装置的框图。该装置具有实现上述待入网设备侧的方法示例的功能,所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该装置可以是上文介绍的待入网设备,也可以设置在待入网设备中。如图27所示,该装置2700可以包括:第一显示模块2710。Please refer to FIG. 27 , which shows a block diagram of an information processing apparatus provided by an embodiment of the present application. The apparatus has the function of implementing the above-mentioned method example on the device side to be connected to the network, and the function may be implemented by hardware or by executing corresponding software in hardware. The device may be the device to be connected to the network described above, or may be set in the device to be connected to the network. As shown in FIG. 27 , the apparatus 2700 may include: a first display module 2710 .
第一显示模块2710,用于显示第一图形码,所述第一图形码包括密钥计算参数和/或所述待入网设备的设备标识,所述密钥计算参数用于确定信息解密密钥,所述信息解密密钥用于解密来自于配网设备的网络配置信息,所述网络配置信息用于配置所述待入网设备接入第二接入点。The first display module 2710 is used to display a first graphic code, where the first graphic code includes a key calculation parameter and/or the device identification of the device to be connected to the network, and the key calculation parameter is used to determine the information decryption key , the information decryption key is used to decrypt the network configuration information from the network configuration device, and the network configuration information is used to configure the device to be connected to the network to access the second access point.
在一个示例中,如图28所示,所述装置2700还包括:解密密钥确定模块2720,用于基于所述密钥计算参数和第一设备密钥,确定所述信息解密密钥。In an example, as shown in FIG. 28 , the apparatus 2700 further includes: a decryption key determination module 2720, configured to determine the information decryption key based on the key calculation parameter and the first device key.
在一个示例中,如图28所示,所述解密密钥确定模块2720,用于:采用第二密钥生成算法对所述密钥计算参数和所述第一设备密钥进行处理,得到所述信息解密密钥。In an example, as shown in FIG. 28 , the decryption key determination module 2720 is configured to: use the second key generation algorithm to process the key calculation parameter and the first device key to obtain the information decryption key.
在一个示例中,如图28所示,所述装置2700还包括:第一扫描模块2730,用于扫描所述配网设备显示的第二图形码,所述第二图形码包括采用信息加密密钥加密的所述网络配置信息;其中,在所述信息解密密钥和所述信息加密密钥一致的情况下,所述待入网设备获取所述网络配置信息成功;在所述信息解密密钥和所述信息加密密钥不一致的情况下,所述待入网设备获取所述网络配置信息失败。In an example, as shown in FIG. 28 , the apparatus 2700 further includes: a first scanning module 2730, configured to scan a second graphic code displayed by the network distribution device, where the second graphic code includes using an information encryption password The network configuration information encrypted with the key; wherein, in the case that the information decryption key and the information encryption key are consistent, the device to be connected to the network successfully obtains the network configuration information; When the information encryption key is inconsistent with the information encryption key, the device to be connected to the network fails to acquire the network configuration information.
在一个示例中,所述密钥计算参数包括随机数。In one example, the key calculation parameter includes a random number.
在一个示例中,所述密钥计算参数由设备云平台预配置;或者,所述密钥计算参数由所述待入网设备生成。In an example, the key calculation parameter is preconfigured by a device cloud platform; or, the key calculation parameter is generated by the device to be connected to the network.
在一个示例中,所述密钥计算参数的长度大于或等于一个字节。In one example, the length of the key calculation parameter is greater than or equal to one byte.
综上所述,本申请实施例提供的技术方案,通过在待入网设备的图形码中添加密钥计算参数,待入网设备使用该密钥计算参数可以确定信息解密密钥,配网设备通过该密钥计算参数可以得到信息加密密钥,进而待入网设备使用信息解密密钥可以解密配网设备采用信息加密密钥加密的网络配置信息,只有在信息加密密钥和信息解密密钥一致的情况下,待入网设备才能获取网络配置信息,实现了待入网设备的身份进行认证,避免了网络配置信息的泄露。To sum up, in the technical solutions provided by the embodiments of the present application, by adding a key calculation parameter to the graphic code of the device to be connected to the network, the device to be connected to the network can use the key calculation parameter to determine the information decryption key, and the network distribution device uses the key calculation parameter to determine the decryption key. The key calculation parameter can obtain the information encryption key, and then the device to be connected to the network can use the information decryption key to decrypt the network configuration information encrypted by the distribution device using the information encryption key. Only when the information encryption key and the information decryption key are the same In this way, only the device to be connected to the network can obtain the network configuration information, which realizes the authentication of the identity of the device to be connected to the network, and avoids the leakage of the network configuration information.
请参考图29,其示出了本申请一个实施例提供的信息处理装置的框图。该装置具有实现上述配网设备侧的方法示例的功能,所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该装置可以是上文介绍的配网设备,也可以设置在配网设备中。如图29所示,该装置2900可以包括:第二扫描模块2910。Please refer to FIG. 29 , which shows a block diagram of an information processing apparatus provided by an embodiment of the present application. The apparatus has the function of implementing the method example on the side of the distribution network device, and the function may be implemented by hardware, or by executing corresponding software in hardware. The device may be the distribution network equipment described above, or may be set in the distribution network equipment. As shown in FIG. 29 , the apparatus 2900 may include: a second scanning module 2910 .
第二扫描模块2910,用于扫描待入网设备的第一图形码,所述第一图形码包括密钥计算参数和/或所述待入网设备的设备标识,所述密钥计算参数用于确定信息加密密钥,所述信息加密密钥用于加密网络配置信息,所述网络配置信息用于配置所述待入网设备接入第二接入点。The second scanning module 2910 is configured to scan the first graphic code of the device to be connected to the network, where the first graphic code includes a key calculation parameter and/or the device identifier of the device to be connected to the network, and the key calculation parameter is used to determine An information encryption key, where the information encryption key is used to encrypt network configuration information, and the network configuration information is used to configure the device to be connected to the network to access the second access point.
在一个示例中,如图30所示,所述装置2900还包括:第二请求发送模块2920,用于向配网云平台发送第二获取请求,所述第二获取请求用于请求获取所述信息加密密钥;加密密钥接收模块2930,用于接收来自于所述配网云平台的所述信息加密密钥。In an example, as shown in FIG. 30 , the apparatus 2900 further includes: a second request sending module 2920, configured to send a second obtaining request to the distribution network cloud platform, where the second obtaining request is used to request to obtain the Information encryption key; encryption key receiving module 2930, configured to receive the information encryption key from the distribution network cloud platform.
在一个示例中,所述第二获取请求中包括所述密钥计算参数和/或所述待入网设备的设备标识。In an example, the second acquisition request includes the key calculation parameter and/or the device identifier of the device to be connected to the network.
在一个示例中,如图30所示,所述装置2900还包括:图形码确定模块2940,用于基于所述网络配置信息和所述信息加密密钥,确定第二图形码;第二显示模块2950,用于显示所述第二图形码。In an example, as shown in FIG. 30, the apparatus 2900 further includes: a graphic code determination module 2940, configured to determine a second graphic code based on the network configuration information and the information encryption key; a second display module 2950, for displaying the second graphic code.
在一个示例中,如图30所示,所述图形码确定模块2940,用于:采用第一加密算法和所述信息加密密钥对所述网络配置信息进行处理,得到加密后的网络配置信息;根据所述加密后的网络配置信息生成所述第二图形码。In an example, as shown in FIG. 30 , the graphic code determination module 2940 is configured to: use the first encryption algorithm and the information encryption key to process the network configuration information to obtain encrypted network configuration information ; Generate the second graphic code according to the encrypted network configuration information.
在一个示例中,所述密钥计算参数包括随机数。In one example, the key calculation parameter includes a random number.
在一个示例中,所述密钥计算参数由设备云平台预配置;或者,所述密钥计算参数由所述待入网设备生成。In an example, the key calculation parameter is preconfigured by a device cloud platform; or, the key calculation parameter is generated by the device to be connected to the network.
在一个示例中,所述密钥计算参数的长度大于或等于一个字节。In one example, the length of the key calculation parameter is greater than or equal to one byte.
综上所述,本申请实施例提供的技术方案,通过在待入网设备的图形码中添加密钥计算参数,待入网设备使用该密钥计算参数可以确定信息解密密钥,配网设备通过该密钥计算参数可以得到信息加密密钥,进而待入网设备使用信息解密密钥可以解密配网设备采用信息加密密钥加密的网络配置信息,只有在信息加密密钥和信息解密密钥一致的情况下,待入网设备才能获取网络配置信息,实现了待入网设备的身份进行认证,避免了网络配置信息的泄露。To sum up, in the technical solutions provided by the embodiments of the present application, by adding a key calculation parameter to the graphic code of the device to be connected to the network, the device to be connected to the network can use the key calculation parameter to determine the information decryption key, and the network distribution device uses the key calculation parameter to determine the decryption key. The key calculation parameter can obtain the information encryption key, and then the device to be connected to the network can use the information decryption key to decrypt the network configuration information encrypted by the distribution device using the information encryption key. Only when the information encryption key and the information decryption key are the same In this way, only the device to be connected to the network can obtain the network configuration information, which realizes the authentication of the identity of the device to be connected to the network, and avoids the leakage of the network configuration information.
请参考图31,其示出了本申请一个实施例提供的信息处理装置的框图。该装置具有实现上述待入网设备侧的方法示例的功能,所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该装置可以是上文介绍的待入网设备,也可以设置在待入网设备中。如图31所示,该装置3100可以包括:第三扫描模块3110。Please refer to FIG. 31 , which shows a block diagram of an information processing apparatus provided by an embodiment of the present application. The apparatus has the function of implementing the above-mentioned method example on the device side to be connected to the network, and the function may be implemented by hardware or by executing corresponding software in hardware. The device may be the device to be connected to the network described above, or may be set in the device to be connected to the network. As shown in FIG. 31 , the apparatus 3100 may include: a third scanning module 3110 .
第三扫描模块3110,用于扫描配网设备显示的第三图形码,所述第三图形码包括采用信息加密密钥加密的网络配置信息和密钥计算参数;其中,所述网络配置信息用于配置所述待入网设备接入第二接入点,所述密钥计算参数用于确定信息解密密钥,所述信息解密密钥用于解密所述采用信息加密密钥加密的网络配置信息。The third scanning module 3110 is configured to scan the third graphic code displayed by the network distribution device, where the third graphic code includes the network configuration information and key calculation parameters encrypted by the information encryption key; In order to configure the device to be connected to the network to access the second access point, the key calculation parameter is used to determine the information decryption key, and the information decryption key is used to decrypt the network configuration information encrypted with the information encryption key. .
在一个示例中,如图32所示,所述装置3100还包括:解密密钥确定模块3120,用于基于所述密钥计算参数和第一设备密钥,确定所述信息解密密钥。In an example, as shown in FIG. 32 , the apparatus 3100 further includes: a decryption key determination module 3120, configured to determine the information decryption key based on the key calculation parameter and the first device key.
在一个示例中,如图32所示,所述解密密钥确定模块3120,用于:采用第三密钥生成算法对所述密钥计算参数和所述第一设备密钥进行处理,得到所述信息解密密钥。In an example, as shown in FIG. 32 , the decryption key determination module 3120 is configured to: use a third key generation algorithm to process the key calculation parameter and the first device key to obtain the information decryption key.
在一个示例中,在所述信息解密密钥和所述信息加密密钥一致的情况下,所述待入网设备获取所述网络配置信息成功;在所述信息解密密钥和所述信息加密密钥不一致的情况下,所述待入网设备获取所述网络配置信息失败。In an example, when the information decryption key and the information encryption key are consistent, the device to be connected to the network succeeds in acquiring the network configuration information; If the keys are inconsistent, the device to be connected to the network fails to acquire the network configuration information.
在一个示例中,所述密钥计算参数包括随机数。In one example, the key calculation parameter includes a random number.
在一个示例中,所述密钥计算参数的长度大于或等于一个字节。In one example, the length of the key calculation parameter is greater than or equal to one byte.
综上所述,本申请实施例提供的技术方案,通过在配网设备显示的图形码中添加密钥计算参数和采用信息加密密钥加密的网络配置信息,进而待入网设备扫描该图形码即可获取密钥计算参数,从而根据该密钥计算参数确定信息解密密钥,只有在信息加密密钥和信息解密密钥一致的情况下,待入网设备才能获取网络配置信息,从而实现了待入网设备的身份进行认证,避免了网络配置信息的泄露。并且,本申请实施例中,特别针对扫码配网的方式,提出由设备云平台生成密钥计算参数,并进一步通过配网设备在显示的图形码中添加密钥计算参数,以便于待入网设备扫描获取,相比于包含密钥计算参数的图形码以贴纸的形式粘贴在待入网设备上,本申请实施例提供的技术方案可以进一步提升密钥计算参数的安全性。To sum up, the technical solutions provided by the embodiments of the present application add key calculation parameters and network configuration information encrypted by the information encryption key to the graphic code displayed by the network distribution device, and then the device to be connected to the network scans the graphic code, that is, The key calculation parameter can be obtained, so that the information decryption key can be determined according to the key calculation parameter. Only when the information encryption key and the information decryption key are the same, the device to be connected to the network can obtain the network configuration information, thus realizing the need to access the network. The identity of the device is authenticated to avoid leakage of network configuration information. In addition, in the embodiment of the present application, especially for the method of scanning the code to configure the network, it is proposed to generate the key calculation parameter by the device cloud platform, and further add the key calculation parameter to the displayed graphic code through the network configuration device, so as to facilitate the network access. Compared with the fact that the graphic code containing the key calculation parameter is pasted on the device to be connected to the network in the form of a sticker, the technical solution provided by the embodiment of the present application can further improve the security of the key calculation parameter.
请参考图33,其示出了本申请一个实施例提供的信息处理装置的框图。该装置具有实现上述配网设备侧的方法示例的功能,所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该装置可以是上文介绍的配网设备,也可以设置在配网设备中。如图33所示,该装置3300可以包括:第三显示模块3310。Please refer to FIG. 33 , which shows a block diagram of an information processing apparatus provided by an embodiment of the present application. The apparatus has the function of implementing the method example on the side of the distribution network device, and the function may be implemented by hardware, or by executing corresponding software in hardware. The device may be the distribution network equipment described above, or may be set in the distribution network equipment. As shown in FIG. 33 , the apparatus 3300 may include: a third display module 3310 .
第三显示模块3310,用于显示第三图形码,所述第三图形码包括采用信息加密密钥加密的网络配置信息和密钥计算参数;其中,所述网络配置信息用于配置待入网设备接入第二接入点,所述密钥计算参数用于确定信息解密密钥,所述信息解密密钥用于解密所述采用信息加密密钥加密的网络配置信息。The third display module 3310 is configured to display a third graphic code, where the third graphic code includes network configuration information and key calculation parameters encrypted with an information encryption key; wherein the network configuration information is used to configure the device to be connected to the network The second access point is accessed, and the key calculation parameter is used to determine an information decryption key, and the information decryption key is used to decrypt the network configuration information encrypted with the information encryption key.
在一个示例中,如图34所示,所述装置3300还包括:信息接收模块3320,用于接收来自于配网云平台的所述信息加密密钥、所述密钥计算参数和所述网络配置信息;图形码确定模块3330,用于基于所述信息加密密钥、所述密钥计算参数和所述网络配置信息,确定所述第三图形码。In an example, as shown in FIG. 34, the apparatus 3300 further includes: an information receiving module 3320, configured to receive the information encryption key, the key calculation parameter and the network from the distribution network cloud platform Configuration information; a graphic code determination module 3330, configured to determine the third graphic code based on the information encryption key, the key calculation parameter and the network configuration information.
在一个示例中,如图34所示,所述图形码确定模块3330,用于:采用第二加密算法和所述信息加密密钥对所述网络配置信息进行处理,得到所述采用信息加密密钥加密的网络配置信息;基于所述采用信息加密密钥加密的网络配置信息和所述密钥计算参数,生成所述第三图形码。In an example, as shown in FIG. 34 , the graphic code determination module 3330 is configured to: use the second encryption algorithm and the information encryption key to process the network configuration information, and obtain the information encryption key using the information encryption key. key-encrypted network configuration information; the third graphic code is generated based on the network configuration information encrypted with the information encryption key and the key calculation parameter.
在一个示例中,所述密钥计算参数包括随机数。In one example, the key calculation parameter includes a random number.
在一个示例中,所述密钥计算参数的长度大于或等于一个字节。In one example, the length of the key calculation parameter is greater than or equal to one byte.
综上所述,本申请实施例提供的技术方案,通过在配网设备显示的图形码中添加密钥计算参数和采用信息加密密钥加密的网络配置信息,进而待入网设备扫描该图形码即可获取密钥计算参数,从而根据该密钥计算参数确定信息解密密钥,只有在信息加密密钥和信息解密密钥一致的情况下,待入网设备才能获取网络配置信息,从而实现了待入网设备的身份进行认证,避免了网络配置信息的泄露。并且,本申请实施例中,特别针对扫码配网的方式,提出由设备云平台生成密钥计算参数,并进一步通过配网设备在显示的图形码中添加密钥计算参数,以便于待入网设备扫描获取,相比于包含密钥计算参数的图形码以贴纸的形式粘贴在待入网设备上,本申请实施例提供的技术方案可以进一步提升密钥计算参数的安全性。To sum up, the technical solutions provided by the embodiments of the present application add key calculation parameters and network configuration information encrypted by the information encryption key to the graphic code displayed by the network distribution device, and then the device to be connected to the network scans the graphic code, that is, The key calculation parameter can be obtained, so that the information decryption key can be determined according to the key calculation parameter. Only when the information encryption key and the information decryption key are the same, the device to be connected to the network can obtain the network configuration information, thus realizing the need to access the network. The identity of the device is authenticated to avoid leakage of network configuration information. In addition, in the embodiment of the present application, especially for the method of scanning the code to configure the network, it is proposed to generate the key calculation parameter by the device cloud platform, and further add the key calculation parameter to the displayed graphic code through the network configuration device, so as to facilitate the network access. Compared with the fact that the graphic code containing the key calculation parameter is pasted on the device to be connected to the network in the form of a sticker, the technical solution provided by the embodiment of the present application can further improve the security of the key calculation parameter.
需要说明的一点是,上述实施例提供的装置在实现其功能时,仅以上述各个功能模块的划分进行举例说明,实际应用中,可以根据实际需要而将上述功能分配由不同的功能模块完成,即将设备的内容结构划分成不同的功能模块,以完成以上描述的全部或者部分功能。It should be noted that, when the device provided in the above embodiment realizes its functions, only the division of the above functional modules is used as an example for illustration. In practical applications, the above functions can be allocated to different functional modules according to actual needs. That is, the content structure of the device is divided into different functional modules to complete all or part of the functions described above.
关于上述实施例中的装置,其中各个模块执行操作的具体方式已经在有关该方法的实施例中进行了详 细描述,此处将不做详细阐述说明。Regarding the apparatus in the above-mentioned embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment of the method, and will not be described in detail here.
请参考图35,其示出了本申请一个实施例提供的待入网设备350的结构示意图,例如,该待入网设备可以用于执行上述待入网设备侧信息处理方法。具体来讲,该待入网设备350可以包括:处理器351,以及与所述处理器351相连的收发器352;其中:Please refer to FIG. 35 , which shows a schematic structural diagram of a device to be connected to a network 350 provided by an embodiment of the present application. For example, the device to be connected to a network can be used to execute the above-mentioned method for processing information of a device to be connected to a network. Specifically, the device 350 to be connected to the network may include: a processor 351, and a transceiver 352 connected to the processor 351; wherein:
处理器351包括一个或者一个以上处理核心,处理器351通过运行软件程序以及模块,从而执行各种功能应用以及信息处理。The processor 351 includes one or more processing cores, and the processor 351 executes various functional applications and information processing by running software programs and modules.
收发器352包括接收器和发射器。可选地,收发器352是一块通信芯片。 Transceiver 352 includes a receiver and a transmitter. Optionally, transceiver 352 is a communication chip.
在一个示例中,待入网设备350还包括:存储器和总线。存储器通过总线与处理器相连。存储器可用于存储计算机程序,处理器用于执行该计算机程序,以实现上述方法实施例中的待入网设备执行的各个步骤。In an example, the device 350 to be connected to the network further includes: a memory and a bus. The memory is connected to the processor through a bus. The memory can be used to store a computer program, and the processor is used to execute the computer program, so as to implement each step performed by the device to be connected to the network in the foregoing method embodiments.
此外,存储器可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,易失性或非易失性存储设备包括但不限于:RAM(Random-Access Memory,随机存储器)和ROM(Read-Only Memory,只读存储器)、EPROM(Erasable Programmable Read-Only Memory,可擦写可编程只读存储器)、EEPROM(Electrically Erasable Programmable Read-Only Memory,电可擦写可编程只读存储器)、闪存或其他固态存储其技术,CD-ROM(Compact Disc Read-Only Memory,只读光盘)、DVD(Digital Video Disc,高密度数字视频光盘)或其他光学存储、磁带盒、磁带、磁盘存储或其他磁性存储设备。其中:In addition, the memory can be implemented by any type of volatile or non-volatile storage device or a combination thereof. Volatile or non-volatile storage devices include but are not limited to: RAM (Random-Access Memory, random access memory) and ROM (Read-Only Memory), EPROM (Erasable Programmable Read-Only Memory, Erasable Programmable Read-Only Memory), EEPROM (Electrically Erasable Programmable Read-Only Memory, Electrically Erasable Programmable Read-Only Memory) ), flash memory or other solid-state storage technology, CD-ROM (Compact Disc Read-Only Memory), DVD (Digital Video Disc, high-density digital video disc) or other optical storage, tape cassettes, tapes, disk storage or other magnetic storage devices. in:
在一种可能的实施方式中,所述收发器352,用于广播第一接入点的信标,所述信标中包括密钥计算参数和/或所述待入网设备的设备标识,所述密钥计算参数用于确定所述待入网设备和配网设备之间执行身份认证的访问密钥。In a possible implementation manner, the transceiver 352 is configured to broadcast the beacon of the first access point, and the beacon includes key calculation parameters and/or the device identifier of the device to be connected to the network, so The key calculation parameter is used to determine the access key for performing identity authentication between the device to be connected to the network and the network distribution device.
在一个示例中,所述处理器351,用于:基于所述密钥计算参数和第一设备密钥,确定第一访问密钥。In one example, the processor 351 is configured to: determine the first access key based on the key calculation parameter and the first device key.
在一个示例中,所述处理器351,用于:采用第一密钥生成算法对所述密钥计算参数和所述第一设备密钥进行处理,得到第一加密密钥;采用第一编码方式对所述第一加密密钥进行处理,得到所述第一访问密钥。In an example, the processor 351 is configured to: use a first key generation algorithm to process the key calculation parameter and the first device key to obtain a first encryption key; use a first encoding The first encryption key is processed in a manner to obtain the first access key.
在一个示例中,所述处理器351,用于:基于所述第一访问密钥,与所述配网设备之间执行所述身份认证;其中,在所述第一访问密钥和所述配网设备确定的第二访问密钥一致的情况下,所述身份认证通过;在所述第一访问密钥和所述配网设备确定的第二访问密钥不一致的情况下,所述身份认证不通过。In an example, the processor 351 is configured to: perform the identity authentication with the distribution network device based on the first access key; wherein, between the first access key and the If the second access key determined by the distribution network device is consistent, the identity authentication is passed; if the first access key and the second access key determined by the distribution network device are inconsistent, the identity authentication Authentication failed.
在一个示例中,所述信标包括以下至少一个字段:BSSID字段、SSID字段、自定义字段;所述BSSID字段包括所述密钥计算参数和/或所述待入网设备的设备标识;或者,所述SSID字段包括所述密钥计算参数和/或所述待入网设备的设备标识;或者,所述自定义字段包括所述密钥计算参数和/或所述待入网设备的设备标识。In one example, the beacon includes at least one of the following fields: a BSSID field, an SSID field, and a custom field; the BSSID field includes the key calculation parameter and/or the device identifier of the device to be connected to the network; or, The SSID field includes the key calculation parameter and/or the device identification of the device to be connected to the network; or, the custom field includes the key calculation parameter and/or the device identification of the device to be connected to the network.
在一个示例中,所述密钥计算参数包括随机数。In one example, the key calculation parameter includes a random number.
在一个示例中,所述密钥计算参数的长度大于或等于一个字节。In one example, the length of the key calculation parameter is greater than or equal to one byte.
在一个示例中,所述收发器352,用于:在所述身份认证通过的情况下,接收来自于所述配网设备的网络配置信息,所述网络配置信息用于配置所述待入网设备接入第二接入点。In an example, the transceiver 352 is configured to: when the identity authentication is passed, receive network configuration information from the network configuration device, where the network configuration information is used to configure the device to be connected to the network Access the second access point.
在另一种可能的实施方式中,所述处理器351,用于显示第一图形码,所述第一图形码包括密钥计算参数和/或所述待入网设备的设备标识,所述密钥计算参数用于确定信息解密密钥,所述信息解密密钥用于解密来自于配网设备的网络配置信息,所述网络配置信息用于配置所述待入网设备接入第二接入点。In another possible implementation manner, the processor 351 is configured to display a first graphic code, where the first graphic code includes a key calculation parameter and/or a device identifier of the device to be connected to the network, the password The key calculation parameter is used to determine the information decryption key, the information decryption key is used to decrypt the network configuration information from the network configuration device, and the network configuration information is used to configure the device to be connected to the network to access the second access point .
在一个示例中,所述处理器351,用于:基于所述密钥计算参数和第一设备密钥,确定所述信息解密密钥。In an example, the processor 351 is configured to: determine the information decryption key based on the key calculation parameter and the first device key.
在一个示例中,所述处理器351,用于:采用第二密钥生成算法对所述密钥计算参数和所述第一设备密钥进行处理,得到所述信息解密密钥。In an example, the processor 351 is configured to: use a second key generation algorithm to process the key calculation parameter and the first device key to obtain the information decryption key.
在一个示例中,所述处理器351,用于:扫描所述配网设备显示的第二图形码,所述第二图形码包括采用信息加密密钥加密的所述网络配置信息;其中,在所述信息解密密钥和所述信息加密密钥一致的情况下,所述待入网设备获取所述网络配置信息成功;在所述信息解密密钥和所述信息加密密钥不一致的情况下,所述待入网设备获取所述网络配置信息失败。In an example, the processor 351 is configured to: scan a second graphic code displayed by the network configuration device, where the second graphic code includes the network configuration information encrypted with an information encryption key; wherein, in When the information decryption key and the information encryption key are consistent, the device to be connected to the network succeeds in acquiring the network configuration information; when the information decryption key and the information encryption key are inconsistent, The device to be connected to the network fails to acquire the network configuration information.
在一个示例中,所述密钥计算参数包括随机数。In one example, the key calculation parameter includes a random number.
在一个示例中,所述密钥计算参数由设备云平台预配置;或者,所述密钥计算参数由所述待入网设备生成。In an example, the key calculation parameter is preconfigured by a device cloud platform; or, the key calculation parameter is generated by the device to be connected to the network.
在一个示例中,所述密钥计算参数的长度大于或等于一个字节。In one example, the length of the key calculation parameter is greater than or equal to one byte.
在又一种可能的实施方式中,所述处理器351,用于扫描配网设备显示的第三图形码,所述第三图形码包括采用信息加密密钥加密的网络配置信息和密钥计算参数;其中,所述网络配置信息用于配置所述待 入网设备接入第二接入点,所述密钥计算参数用于确定信息解密密钥,所述信息解密密钥用于解密所述采用信息加密密钥加密的网络配置信息。In another possible implementation manner, the processor 351 is configured to scan a third graphic code displayed by the network configuration device, where the third graphic code includes the network configuration information encrypted by the information encryption key and the key calculation parameters; wherein, the network configuration information is used to configure the device to be connected to the network to access the second access point, the key calculation parameter is used to determine an information decryption key, and the information decryption key is used to decrypt the Network configuration information encrypted with an information encryption key.
在一个示例中,所述处理器351,还用于:基于所述密钥计算参数和第一设备密钥,确定所述信息解密密钥。In an example, the processor 351 is further configured to: determine the information decryption key based on the key calculation parameter and the first device key.
在一个示例中,所述处理器351,还用于:采用第三密钥生成算法对所述密钥计算参数和所述第一设备密钥进行处理,得到所述信息解密密钥。In an example, the processor 351 is further configured to: use a third key generation algorithm to process the key calculation parameter and the first device key to obtain the information decryption key.
在一个示例中,在所述信息解密密钥和所述信息加密密钥一致的情况下,所述待入网设备获取所述网络配置信息成功;在所述信息解密密钥和所述信息加密密钥不一致的情况下,所述待入网设备获取所述网络配置信息失败。In an example, when the information decryption key and the information encryption key are consistent, the device to be connected to the network succeeds in acquiring the network configuration information; If the keys are inconsistent, the device to be connected to the network fails to acquire the network configuration information.
在一个示例中,所述密钥计算参数包括随机数。In one example, the key calculation parameter includes a random number.
在一个示例中,所述密钥计算参数的长度大于或等于一个字节。在还一种可能的实施方式中,所述收发器352,用于接收来自于配网设备的第一信息,所述第一信息包括密钥计算参数和采用信息加密密钥加密的第二信息,所述密钥计算参数用于确定信息解密密钥,所述信息解密密钥用于解密所述采用信息加密密钥加密的第二信息。In one example, the length of the key calculation parameter is greater than or equal to one byte. In another possible implementation manner, the transceiver 352 is configured to receive first information from a distribution network device, where the first information includes key calculation parameters and second information encrypted with an information encryption key , the key calculation parameter is used to determine the information decryption key, and the information decryption key is used to decrypt the second information encrypted with the information encryption key.
在一个示例中,所述处理器351,用于:基于所述密钥计算参数和第一设备密钥,确定所述信息解密密钥。In an example, the processor 351 is configured to: determine the information decryption key based on the key calculation parameter and the first device key.
在一个示例中,所述处理器351,用于:采用第四密钥生成算法对所述密钥计算参数和所述第一设备密钥进行处理,得到所述信息解密密钥。In an example, the processor 351 is configured to: use a fourth key generation algorithm to process the key calculation parameter and the first device key to obtain the information decryption key.
在一个示例中,所述第二信息包括第一参考信息;所述处理器351,用于采用所述信息解密密钥解密所述采用信息加密密钥加密的第二信息,得到所述第一参考信息;所述收发器352,用于在所述第一参考信息和第二参考信息一致的情况下,接收来自于所述配网设备的网络配置信息,所述网络配置信息用于配置所述待入网设备接入第二接入点。In an example, the second information includes first reference information; the processor 351 is configured to use the information decryption key to decrypt the second information encrypted with the information encryption key to obtain the first reference information. reference information; the transceiver 352 is configured to receive network configuration information from the distribution network device when the first reference information and the second reference information are consistent, where the network configuration information is used to configure all The device to be connected to the network accesses the second access point.
在一个示例中,所述第二信息包括网络配置信息,所述网络配置信息用于配置所述待入网设备接入第二接入点;在所述信息加密密钥和所述信息解密密钥一致的情况下,所述待入网设备获取所述网络配置信息成功;在所述信息加密密钥和所述信息解密密钥不一致的情况下,所述待入网设备获取所述网络配置信息失败。In an example, the second information includes network configuration information, and the network configuration information is used to configure the device to be connected to the network to access the second access point; between the information encryption key and the information decryption key If they are consistent, the device to be connected to the network succeeds in acquiring the network configuration information; if the information encryption key and the information decryption key are inconsistent, the device to be connected to the network fails to obtain the network configuration information.
在一个示例中,所述密钥计算参数包括随机数。In one example, the key calculation parameter includes a random number.
在一个示例中,所述密钥计算参数的长度大于或等于一个字节。In one example, the length of the key calculation parameter is greater than or equal to one byte.
请参考图36,其示出了本申请一个实施例提供的配网设备360的结构示意图,例如,该配网设备可以用于执行上述配网设备侧信息处理方法。具体来讲,该配网设备360可以包括:处理器361,以及与所述处理器361相连的收发器362;其中:Please refer to FIG. 36 , which shows a schematic structural diagram of a distribution network device 360 provided by an embodiment of the present application. For example, the distribution network device can be used to execute the above-mentioned method for processing information on the distribution network device side. Specifically, the network distribution device 360 may include: a processor 361, and a transceiver 362 connected to the processor 361; wherein:
处理器361包括一个或者一个以上处理核心,处理器361通过运行软件程序以及模块,从而执行各种功能应用以及信息处理。The processor 361 includes one or more processing cores, and the processor 361 executes various functional applications and information processing by running software programs and modules.
收发器362包括接收器和发射器。可选地,收发器362是一块通信芯片。 Transceiver 362 includes a receiver and a transmitter. Optionally, transceiver 362 is a communication chip.
在一个示例中,配网设备360还包括:存储器和总线。存储器通过总线与处理器相连。存储器可用于存储计算机程序,处理器用于执行该计算机程序,以实现上述方法实施例中的配网设备执行的各个步骤。In one example, the distribution network device 360 further includes: a memory and a bus. The memory is connected to the processor through a bus. The memory can be used to store a computer program, and the processor is used to execute the computer program, so as to implement each step performed by the distribution network device in the above method embodiments.
此外,存储器可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,易失性或非易失性存储设备包括但不限于:RAM和ROM、EPROM、EEPROM、闪存或其他固态存储其技术,CD-ROM、DVD或其他光学存储、磁带盒、磁带、磁盘存储或其他磁性存储设备。其中:Furthermore, the memory may be implemented by any type or combination of volatile or non-volatile storage devices including, but not limited to: RAM and ROM, EPROM, EEPROM, flash memory or other Solid-state storage technology, CD-ROM, DVD or other optical storage, tape cartridges, magnetic tape, magnetic disk storage or other magnetic storage devices. in:
在一种可能的实施方式中,所述收发器362,用于接收第一接入点的信标,所述信标中包括密钥计算参数和/或待入网设备的设备标识,所述密钥计算参数用于确定待入网设备和所述配网设备之间执行身份认证的访问密钥。In a possible implementation manner, the transceiver 362 is configured to receive a beacon of the first access point, where the beacon includes a key calculation parameter and/or a device identifier of a device to be connected to the network, the key The key calculation parameter is used to determine the access key for performing identity authentication between the device to be connected to the network and the network distribution device.
在一个示例中,所述收发器362,用于:向配网云平台发送第一获取请求,所述第一获取请求用于请求获取第二访问密钥;接收来自于所述配网云平台的访问密钥信息,所述访问密钥信息用于确定所述第二访问密钥。In an example, the transceiver 362 is configured to: send a first acquisition request to the distribution network cloud platform, where the first acquisition request is used to request to acquire a second access key; receive data from the distribution network cloud platform access key information, the access key information is used to determine the second access key.
在一个示例中,所述访问密钥信息包括所述第二访问密钥。In one example, the access key information includes the second access key.
在一个示例中,所述处理器361,用于:采用第一编码方式对所述第二加密密钥进行处理,得到所述第二访问密钥。In an example, the processor 361 is configured to: process the second encryption key in a first encoding manner to obtain the second access key.
在一个示例中,所述第一获取请求中包括所述密钥计算参数和/或所述待入网设备的设备标识。In an example, the first acquisition request includes the key calculation parameter and/or the device identifier of the device to be connected to the network.
在一个示例中,所述处理器361,用于:基于所述第二访问密钥,与所述待入网设备之间执行所述身份认证;其中,在所述第二访问密钥和所述待入网设备确定的第一访问密钥一致的情况下,所述身份认证 通过;在所述第二访问密钥和所述待入网设备确定的第一访问密钥不一致的情况下,所述身份认证不通过。In an example, the processor 361 is configured to: perform the identity authentication with the device to be networked based on the second access key; wherein, between the second access key and the If the first access key determined by the device to be connected is consistent, the identity authentication is passed; if the second access key and the first access key determined by the device to be connected are inconsistent, the identity authentication Authentication failed.
在一个示例中,所述信标包括以下至少一个字段:BSSID字段、SSID字段、自定义字段;所述BSSID字段包括所述密钥计算参数和/或所述待入网设备的设备标识;或者,所述SSID字段包括所述密钥计算参数和/或所述待入网设备的设备标识;或者,所述自定义字段包括所述密钥计算参数和/或所述待入网设备的设备标识。In one example, the beacon includes at least one of the following fields: a BSSID field, an SSID field, and a custom field; the BSSID field includes the key calculation parameter and/or the device identifier of the device to be connected to the network; or, The SSID field includes the key calculation parameter and/or the device identification of the device to be connected to the network; or, the custom field includes the key calculation parameter and/or the device identification of the device to be connected to the network.
在一个示例中,所述密钥计算参数包括随机数。In one example, the key calculation parameter includes a random number.
在一个示例中,所述密钥计算参数的长度大于或等于一个字节。In one example, the length of the key calculation parameter is greater than or equal to one byte.
在一个示例中,所述处理器361,用于:在所述身份认证通过的情况下,接入所述第一接入点。In an example, the processor 361 is configured to: access the first access point when the identity authentication is passed.
在一个示例中,所述收发器362,用于:向所述待入网设备发送网络配置信息,所述网络配置信息用于配置所述待入网设备接入第二接入点。In an example, the transceiver 362 is configured to: send network configuration information to the device to be connected to the network, where the network configuration information is used to configure the device to be connected to the network to access the second access point.
在另一种可能的实施方式中,所述处理器361,用于扫描待入网设备的第一图形码,所述第一图形码包括密钥计算参数和/或所述待入网设备的设备标识,所述密钥计算参数用于确定信息加密密钥,所述信息加密密钥用于加密网络配置信息,所述网络配置信息用于配置所述待入网设备接入第二接入点。In another possible implementation manner, the processor 361 is configured to scan the first graphic code of the device to be connected to the network, where the first graphic code includes a key calculation parameter and/or the device identifier of the device to be connected to the network , the key calculation parameter is used to determine an information encryption key, and the information encryption key is used to encrypt network configuration information, and the network configuration information is used to configure the device to be connected to the network to access the second access point.
在一个示例中,所述收发器362,用于:向配网云平台发送第二获取请求,所述第二获取请求用于请求获取所述信息加密密钥;接收来自于所述配网云平台的所述信息加密密钥。In an example, the transceiver 362 is configured to: send a second acquisition request to the distribution network cloud platform, where the second acquisition request is used to request to acquire the information encryption key; receive data from the distribution network cloud The information encryption key of the platform.
在一个示例中,所述第二获取请求中包括所述密钥计算参数和/或所述待入网设备的设备标识。In an example, the second acquisition request includes the key calculation parameter and/or the device identifier of the device to be connected to the network.
在一个示例中,所述处理器361,用于:基于所述网络配置信息和所述信息加密密钥,确定第二图形码;显示所述第二图形码。In an example, the processor 361 is configured to: determine a second graphic code based on the network configuration information and the information encryption key; and display the second graphic code.
在一个示例中,所述处理器361,用于:采用第一加密算法和所述信息加密密钥对所述网络配置信息进行处理,得到加密后的网络配置信息;根据所述加密后的网络配置信息生成所述第二图形码。In an example, the processor 361 is configured to: use the first encryption algorithm and the information encryption key to process the network configuration information to obtain encrypted network configuration information; The configuration information generates the second graphic code.
在一个示例中,所述密钥计算参数包括随机数。In one example, the key calculation parameter includes a random number.
在一个示例中,所述密钥计算参数由设备云平台预配置;或者,所述密钥计算参数由所述待入网设备生成。In an example, the key calculation parameter is preconfigured by a device cloud platform; or, the key calculation parameter is generated by the device to be connected to the network.
在一个示例中,所述密钥计算参数的长度大于或等于一个字节。In one example, the length of the key calculation parameter is greater than or equal to one byte.
在又一种可能的实施方式中,所述处理器361,用于显示第三图形码,所述第三图形码包括采用信息加密密钥加密的网络配置信息和密钥计算参数;其中,所述网络配置信息用于配置待入网设备接入第二接入点,所述密钥计算参数用于确定信息解密密钥,所述信息解密密钥用于解密所述采用信息加密密钥加密的网络配置信息。In another possible implementation manner, the processor 361 is configured to display a third graphic code, where the third graphic code includes network configuration information and key calculation parameters encrypted with an information encryption key; The network configuration information is used to configure the device to be connected to the second access point, the key calculation parameter is used to determine the information decryption key, and the information decryption key is used to decrypt the encrypted data using the information encryption key. Network configuration information.
在一个示例中,所述处理器361,还用于:接收来自于配网云平台的所述信息加密密钥、所述密钥计算参数和所述网络配置信息;基于所述信息加密密钥、所述密钥计算参数和所述网络配置信息,确定所述第三图形码。In an example, the processor 361 is further configured to: receive the information encryption key, the key calculation parameter and the network configuration information from the distribution network cloud platform; encrypt the key based on the information , the key calculation parameter and the network configuration information to determine the third graphic code.
在一个示例中,所述处理器361,还用于:采用第二加密算法和所述信息加密密钥对所述网络配置信息进行处理,得到所述采用信息加密密钥加密的网络配置信息;基于所述采用信息加密密钥加密的网络配置信息和所述密钥计算参数,生成所述第三图形码。In an example, the processor 361 is further configured to: use the second encryption algorithm and the information encryption key to process the network configuration information to obtain the network configuration information encrypted with the information encryption key; The third graphic code is generated based on the network configuration information encrypted with the information encryption key and the key calculation parameter.
在一个示例中,所述密钥计算参数包括随机数。In one example, the key calculation parameter includes a random number.
在一个示例中,所述密钥计算参数的长度大于或等于一个字节。In one example, the length of the key calculation parameter is greater than or equal to one byte.
在还一种可能的实施方式中,所述收发器362,用于向待入网设备发送第一信息,所述第一信息包括密钥计算参数和采用信息加密密钥加密的第二信息,所述密钥计算参数用于确定信息解密密钥,所述信息解密密钥用于解密所述采用信息加密密钥加密的第二信息。In another possible implementation manner, the transceiver 362 is configured to send first information to the device to be connected to the network, where the first information includes a key calculation parameter and second information encrypted with an information encryption key, where The key calculation parameter is used to determine an information decryption key, and the information decryption key is used to decrypt the second information encrypted with the information encryption key.
在一个示例中,所述第二信息包括第一参考信息;所述方法还包括:所述收发器362,用于接收来自于配网云平台的所述密钥计算参数和所述采用信息加密密钥加密的第二信息;所述处理器361,用于基于所述密钥计算参数和所述采用信息加密密钥加密的第二信息,确定所述第一信息。In an example, the second information includes first reference information; the method further includes: the transceiver 362, configured to receive the key calculation parameter and the encryption of the adopted information from the distribution network cloud platform second information encrypted with a key; the processor 361 is configured to determine the first information based on the key calculation parameter and the second information encrypted with an information encryption key.
在一个示例中,所述第二信息包括网络配置信息,所述网络配置信息用于配置所述待入网设备接入第二接入点;所述收发器362,用于接收来自于配网云平台的所述密钥计算参数和所述信息加密密钥;所述处理器361,用于基于所述密钥计算参数、所述信息加密密钥和所述网络配置信息,确定所述第一信息。In an example, the second information includes network configuration information, and the network configuration information is used to configure the device to be connected to the network to access the second access point; the transceiver 362 is configured to receive information from the distribution network cloud the key calculation parameter and the information encryption key of the platform; the processor 361 is configured to determine the first key calculation parameter based on the key calculation parameter, the information encryption key and the network configuration information information.
在一个示例中,所述处理器361,用于:采用第三加密算法和所述信息加密密钥对所述网络配置信息进行处理,得到所述采用信息加密密钥加密的网络配置信息;基于所述密钥计算参数和所述采用信息加密密钥加密的网络配置信息,确定所述第一信息。In an example, the processor 361 is configured to: use a third encryption algorithm and the information encryption key to process the network configuration information to obtain the network configuration information encrypted with the information encryption key; The key calculation parameter and the network configuration information encrypted with the information encryption key determine the first information.
在一个示例中,所述密钥计算参数包括随机数。In one example, the key calculation parameter includes a random number.
在一个示例中,所述密钥计算参数的长度大于或等于一个字节。In one example, the length of the key calculation parameter is greater than or equal to one byte.
本申请实施例还提供了一种计算机可读存储介质,所述存储介质中存储有计算机程序,所述计算机程 序用于被待入网设备的处理器执行,以实现如上述待入网设备侧信息处理方法。Embodiments of the present application further provide a computer-readable storage medium, where a computer program is stored in the storage medium, and the computer program is used to be executed by the processor of the device to be connected to the network, so as to realize the information processing on the device to be connected to the network as described above. method.
本申请实施例还提供了一种计算机可读存储介质,所述存储介质中存储有计算机程序,所述计算机程序用于被配网设备的处理器执行,以实现如上述配网设备侧信息处理方法。Embodiments of the present application further provide a computer-readable storage medium, where a computer program is stored in the storage medium, and the computer program is used to be executed by a processor of a distribution network device, so as to realize the above-mentioned information processing on the network distribution device side method.
本申请实施例还提供了一种芯片,所述芯片包括可编程逻辑电路和/或程序指令,当所述芯片在待入网设备上运行时,用于实现如上述待入网设备侧信息处理方法。An embodiment of the present application further provides a chip, the chip includes a programmable logic circuit and/or program instructions, and when the chip runs on the device to be connected to the network, it is used to implement the above-mentioned method for processing information on the device to be connected to the network.
本申请实施例还提供了一种芯片,所述芯片包括可编程逻辑电路和/或程序指令,当所述芯片在配网设备上运行时,用于实现如上述配网设备侧信息处理方法。An embodiment of the present application further provides a chip, the chip includes a programmable logic circuit and/or program instructions, and when the chip runs on a distribution network device, it is used to implement the above-mentioned method for processing information on the distribution network device side.
本申请实施例还提供了一种计算机程序产品,当计算机程序产品在待入网设备上运行时,用于实现如上述待入网设备侧信息处理方法。The embodiment of the present application further provides a computer program product, which is used to implement the above-mentioned method for processing information on the device to be connected to the network when the computer program product runs on the device to be connected to the network.
本申请实施例还提供了一种计算机程序产品,当计算机程序产品在配网设备上运行时,用于实现如上述配网设备侧信息处理方法。The embodiment of the present application also provides a computer program product, which is used to implement the above-mentioned method for processing information on the distribution network device side when the computer program product runs on the distribution network device.
本领域技术人员应该可以意识到,在上述一个或多个示例中,本申请实施例所描述的功能可以用硬件、软件、固件或它们的任意组合来实现。当使用软件实现时,可以将这些功能存储在计算机可读介质中或者作为计算机可读介质上的一个或多个指令或代码进行传输。计算机可读介质包括计算机存储介质和通信介质,其中通信介质包括便于从一个地方向另一个地方传送计算机程序的任何介质。存储介质可以是通用或专用计算机能够存取的任何可用介质。Those skilled in the art should realize that, in one or more of the above examples, the functions described in the embodiments of the present application may be implemented by hardware, software, firmware, or any combination thereof. When implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage medium can be any available medium that can be accessed by a general purpose or special purpose computer.
以上所述仅为本申请的示例性实施例,并不用以限制本申请,凡在本申请的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本申请的保护范围之内。The above are only exemplary embodiments of the present application and are not intended to limit the present application. Any modifications, equivalent replacements, improvements, etc. made within the spirit and principles of the present application shall be included in the protection of the present application. within the range.

Claims (132)

  1. 一种信息处理方法,其特征在于,应用于待入网设备中,所述方法包括:An information processing method, characterized in that it is applied to a device to be connected to a network, the method comprising:
    广播第一接入点的信标,所述信标中包括密钥计算参数和/或所述待入网设备的设备标识,所述密钥计算参数用于确定所述待入网设备和配网设备之间执行身份认证的访问密钥。Broadcast the beacon of the first access point, the beacon includes key calculation parameters and/or the device identifier of the device to be connected to the network, and the key calculation parameter is used to determine the device to be connected to the network and the network distribution device The access key to perform authentication between.
  2. 根据权利要求1所述的方法,其特征在于,所述方法还包括:The method according to claim 1, wherein the method further comprises:
    基于所述密钥计算参数和第一设备密钥,确定第一访问密钥。Based on the key calculation parameters and the first device key, a first access key is determined.
  3. 根据权利要求2所述的方法,其特征在于,所述基于所述密钥计算参数和第一设备密钥,确定第一访问密钥,包括:The method according to claim 2, wherein the determining the first access key based on the key calculation parameter and the first device key comprises:
    采用第一密钥生成算法对所述密钥计算参数和所述第一设备密钥进行处理,得到第一加密密钥;Using the first key generation algorithm to process the key calculation parameter and the first device key to obtain a first encryption key;
    采用第一编码方式对所述第一加密密钥进行处理,得到所述第一访问密钥。The first encryption key is processed in the first encoding manner to obtain the first access key.
  4. 根据权利要求2或3所述的方法,其特征在于,所述基于所述密钥计算参数和第一设备密钥,确定第一访问密钥之后,还包括:The method according to claim 2 or 3, wherein after determining the first access key based on the key calculation parameter and the first device key, the method further comprises:
    基于所述第一访问密钥,与所述配网设备之间执行所述身份认证;Based on the first access key, perform the identity authentication with the distribution network device;
    其中,在所述第一访问密钥和所述配网设备确定的第二访问密钥一致的情况下,所述身份认证通过;在所述第一访问密钥和所述配网设备确定的第二访问密钥不一致的情况下,所述身份认证不通过。Wherein, if the first access key and the second access key determined by the distribution network device are consistent, the identity authentication is passed; if the first access key and the second access key determined by the distribution network device are consistent If the second access keys are inconsistent, the identity authentication fails.
  5. 根据权利要求1至4任一项所述的方法,其特征在于,所述信标包括以下至少一个字段:基本服务集标识BSSID字段、服务集标识SSID字段、自定义字段;The method according to any one of claims 1 to 4, wherein the beacon includes at least one of the following fields: a basic service set identifier BSSID field, a service set identifier SSID field, and a custom field;
    所述BSSID字段包括所述密钥计算参数和/或所述待入网设备的设备标识;The BSSID field includes the key calculation parameter and/or the device identifier of the device to be connected to the network;
    或者,所述SSID字段包括所述密钥计算参数和/或所述待入网设备的设备标识;Alternatively, the SSID field includes the key calculation parameter and/or the device identifier of the device to be connected to the network;
    或者,所述自定义字段包括所述密钥计算参数和/或所述待入网设备的设备标识。Alternatively, the custom field includes the key calculation parameter and/or the device identifier of the device to be connected to the network.
  6. 根据权利要求1至5任一项所述的方法,其特征在于,所述密钥计算参数包括随机数。The method according to any one of claims 1 to 5, wherein the key calculation parameter includes a random number.
  7. 根据权利要求1至6任一项所述的方法,其特征在于,所述密钥计算参数的长度大于或等于一个字节。The method according to any one of claims 1 to 6, wherein the length of the key calculation parameter is greater than or equal to one byte.
  8. 根据权利要求1至7任一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 1 to 7, wherein the method further comprises:
    在所述身份认证通过的情况下,接收来自于所述配网设备的网络配置信息,所述网络配置信息用于配置所述待入网设备接入第二接入点。In the case that the identity authentication is passed, network configuration information from the network distribution device is received, where the network configuration information is used to configure the device to be connected to the network to access the second access point.
  9. 一种信息处理方法,其特征在于,应用于配网设备中,所述方法包括:An information processing method, characterized in that, applied to a distribution network device, the method comprising:
    接收第一接入点的信标,所述信标中包括密钥计算参数和/或待入网设备的设备标识,所述密钥计算参数用于确定待入网设备和所述配网设备之间执行身份认证的访问密钥。Receive a beacon of the first access point, the beacon includes a key calculation parameter and/or a device identifier of the device to be connected to the network, and the key calculation parameter is used to determine the relationship between the device to be connected to the network and the network distribution device The access key to perform authentication.
  10. 根据权利要求9所述的方法,其特征在于,所述方法还包括:The method according to claim 9, wherein the method further comprises:
    向配网云平台发送第一获取请求,所述第一获取请求用于请求获取第二访问密钥;sending a first acquisition request to the distribution network cloud platform, where the first acquisition request is used to request to acquire a second access key;
    接收来自于所述配网云平台的访问密钥信息,所述访问密钥信息用于确定所述第二访问密钥。Receive access key information from the distribution network cloud platform, where the access key information is used to determine the second access key.
  11. 根据权利要求10所述的方法,其特征在于,所述访问密钥信息包括所述第二访问密钥。11. The method of claim 10, wherein the access key information includes the second access key.
  12. 根据权利要求10所述的方法,其特征在于,所述访问密钥信息包括第二加密密钥;所述接收来自于所述配网云平台的访问密钥信息之后,还包括:The method according to claim 10, wherein the access key information includes a second encryption key; after receiving the access key information from the distribution network cloud platform, the method further includes:
    采用第一编码方式对所述第二加密密钥进行处理,得到所述第二访问密钥。The second encryption key is processed in the first encoding manner to obtain the second access key.
  13. 根据权利要求10至12任一项所述的方法,其特征在于,所述第一获取请求中包括所述密钥计算参数和/或所述待入网设备的设备标识。The method according to any one of claims 10 to 12, wherein the first acquisition request includes the key calculation parameter and/or the device identifier of the device to be connected to the network.
  14. 根据权利要求10至13任一项所述的方法,其特征在于,所述接收来自于所述配网云平台的访问密钥信息之后,还包括:The method according to any one of claims 10 to 13, wherein after receiving the access key information from the distribution network cloud platform, the method further comprises:
    基于所述第二访问密钥,与所述待入网设备之间执行所述身份认证;Based on the second access key, perform the identity authentication with the device to be connected to the network;
    其中,在所述第二访问密钥和所述待入网设备确定的第一访问密钥一致的情况下,所述身份认证通过;在所述第二访问密钥和所述待入网设备确定的第一访问密钥不一致的情况下,所述身份认证不通过。Wherein, if the second access key is consistent with the first access key determined by the device to be connected to the network, the identity authentication is passed; if the second access key and the device to be connected to the network are determined If the first access keys are inconsistent, the identity authentication fails.
  15. 根据权利要求9至14任一项所述的方法,其特征在于,所述信标包括以下至少一个字段:基本服务集标识BSSID字段、服务集标识SSID字段、自定义字段;The method according to any one of claims 9 to 14, wherein the beacon includes at least one of the following fields: a basic service set identification BSSID field, a service set identification SSID field, and a custom field;
    所述BSSID字段包括所述密钥计算参数和/或所述待入网设备的设备标识;The BSSID field includes the key calculation parameter and/or the device identifier of the device to be connected to the network;
    或者,所述SSID字段包括所述密钥计算参数和/或所述待入网设备的设备标识;Alternatively, the SSID field includes the key calculation parameter and/or the device identifier of the device to be connected to the network;
    或者,所述自定义字段包括所述密钥计算参数和/或所述待入网设备的设备标识。Alternatively, the custom field includes the key calculation parameter and/or the device identifier of the device to be connected to the network.
  16. 根据权利要求9至15任一项所述的方法,其特征在于,所述密钥计算参数包括随机数。The method according to any one of claims 9 to 15, wherein the key calculation parameter comprises a random number.
  17. 根据权利要求9至16任一项所述的方法,其特征在于,所述密钥计算参数的长度大于或等于一个 字节。The method according to any one of claims 9 to 16, wherein the length of the key calculation parameter is greater than or equal to one byte.
  18. 根据权利要求9至17任一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 9 to 17, wherein the method further comprises:
    在所述身份认证通过的情况下,接入所述第一接入点。In the case that the identity authentication is passed, the first access point is accessed.
  19. 根据权利要求18所述的方法,其特征在于,所述接入所述第一接入点之后,还包括:The method according to claim 18, wherein after the accessing the first access point, the method further comprises:
    向所述待入网设备发送网络配置信息,所述网络配置信息用于配置所述待入网设备接入第二接入点。Sending network configuration information to the device to be connected to the network, where the network configuration information is used to configure the device to be connected to the network to access the second access point.
  20. 一种信息处理方法,其特征在于,应用于待入网设备中,所述方法包括:An information processing method, characterized in that it is applied to a device to be connected to a network, the method comprising:
    显示第一图形码,所述第一图形码包括密钥计算参数和/或所述待入网设备的设备标识,所述密钥计算参数用于确定信息解密密钥,所述信息解密密钥用于解密来自于配网设备的网络配置信息,所述网络配置信息用于配置所述待入网设备接入第二接入点。A first graphic code is displayed, and the first graphic code includes a key calculation parameter and/or the device identification of the device to be connected to the network, and the key calculation parameter is used to determine the information decryption key, and the information decryption key is used to decrypt the network configuration information from the network configuration device, the network configuration information is used to configure the device to be connected to the network to access the second access point.
  21. 根据权利要求20所述的方法,其特征在于,所述方法还包括:The method of claim 20, wherein the method further comprises:
    基于所述密钥计算参数和第一设备密钥,确定所述信息解密密钥。The information decryption key is determined based on the key calculation parameter and the first device key.
  22. 根据权利要求21所述的方法,其特征在于,所述基于所述密钥计算参数和第一设备密钥,确定信息解密密钥,包括:The method according to claim 21, wherein the determining an information decryption key based on the key calculation parameter and the first device key comprises:
    采用第二密钥生成算法对所述密钥计算参数和所述第一设备密钥进行处理,得到所述信息解密密钥。The key calculation parameter and the first device key are processed by using the second key generation algorithm to obtain the information decryption key.
  23. 根据权利要求20至22任一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 20 to 22, wherein the method further comprises:
    扫描所述配网设备显示的第二图形码,所述第二图形码包括采用信息加密密钥加密的所述网络配置信息;scanning the second graphic code displayed by the network distribution device, where the second graphic code includes the network configuration information encrypted with an information encryption key;
    其中,在所述信息解密密钥和所述信息加密密钥一致的情况下,所述待入网设备获取所述网络配置信息成功;在所述信息解密密钥和所述信息加密密钥不一致的情况下,所述待入网设备获取所述网络配置信息失败。Wherein, if the information decryption key and the information encryption key are consistent, the device to be connected to the network succeeds in acquiring the network configuration information; if the information decryption key and the information encryption key are inconsistent In this case, the device to be connected to the network fails to acquire the network configuration information.
  24. 根据权利要求20至23任一项所述的方法,其特征在于,所述密钥计算参数包括随机数。The method according to any one of claims 20 to 23, wherein the key calculation parameter includes a random number.
  25. 根据权利要求20至24任一项所述的方法,其特征在于,所述密钥计算参数由设备云平台预配置;或者,所述密钥计算参数由所述待入网设备生成。The method according to any one of claims 20 to 24, wherein the key calculation parameter is preconfigured by a device cloud platform; or, the key calculation parameter is generated by the device to be connected to the network.
  26. 根据权利要求20至25任一项所述的方法,其特征在于,所述密钥计算参数的长度大于或等于一个字节。The method according to any one of claims 20 to 25, wherein the length of the key calculation parameter is greater than or equal to one byte.
  27. 一种信息处理方法,其特征在于,应用于配网设备中,所述方法包括:An information processing method, characterized in that, applied to a distribution network device, the method comprising:
    扫描待入网设备的第一图形码,所述第一图形码包括密钥计算参数和/或所述待入网设备的设备标识,所述密钥计算参数用于确定信息加密密钥,所述信息加密密钥用于加密网络配置信息,所述网络配置信息用于配置所述待入网设备接入第二接入点。Scan the first graphic code of the device to be connected to the network, the first graphic code includes a key calculation parameter and/or the device identification of the device to be connected to the network, the key calculation parameter is used to determine the information encryption key, the information The encryption key is used to encrypt network configuration information, and the network configuration information is used to configure the device to be connected to the network to access the second access point.
  28. 根据权利要求27所述的方法,其特征在于,所述方法还包括:The method of claim 27, wherein the method further comprises:
    向配网云平台发送第二获取请求,所述第二获取请求用于请求获取所述信息加密密钥;sending a second acquisition request to the distribution network cloud platform, where the second acquisition request is used to request to acquire the information encryption key;
    接收来自于所述配网云平台的所述信息加密密钥。Receive the information encryption key from the distribution network cloud platform.
  29. 根据权利要求28所述的方法,其特征在于,所述第二获取请求中包括所述密钥计算参数和/或所述待入网设备的设备标识。The method according to claim 28, wherein the second acquisition request includes the key calculation parameter and/or the device identifier of the device to be connected to the network.
  30. 根据权利要求27至29任一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 27 to 29, wherein the method further comprises:
    基于所述网络配置信息和所述信息加密密钥,确定第二图形码;determining a second graphic code based on the network configuration information and the information encryption key;
    显示所述第二图形码。The second graphic code is displayed.
  31. 根据权利要求30所述的方法,其特征在于,所述基于所述网络配置信息和所述信息加密密钥,确定第二图形码,包括:The method according to claim 30, wherein the determining the second graphic code based on the network configuration information and the information encryption key comprises:
    采用第一加密算法和所述信息加密密钥对所述网络配置信息进行处理,得到加密后的网络配置信息;Using the first encryption algorithm and the information encryption key to process the network configuration information to obtain encrypted network configuration information;
    根据所述加密后的网络配置信息生成所述第二图形码。The second graphic code is generated according to the encrypted network configuration information.
  32. 根据权利要求27至31任一项所述的方法,其特征在于,所述密钥计算参数包括随机数。The method according to any one of claims 27 to 31, wherein the key calculation parameter comprises a random number.
  33. 根据权利要求27至32任一项所述的方法,其特征在于,所述密钥计算参数由设备云平台预配置;或者,所述密钥计算参数由所述待入网设备生成。The method according to any one of claims 27 to 32, wherein the key calculation parameter is preconfigured by a device cloud platform; or, the key calculation parameter is generated by the device to be connected to the network.
  34. 根据权利要求27至33任一项所述的方法,其特征在于,所述密钥计算参数的长度大于或等于一个字节。The method according to any one of claims 27 to 33, wherein the length of the key calculation parameter is greater than or equal to one byte.
  35. 一种信息处理方法,其特征在于,应用于待入网设备中,所述方法包括:An information processing method, characterized in that it is applied to a device to be connected to a network, the method comprising:
    扫描配网设备显示的第三图形码,所述第三图形码包括采用信息加密密钥加密的网络配置信息和密钥计算参数;Scan the third graphic code displayed by the distribution network device, where the third graphic code includes the network configuration information and key calculation parameters encrypted with the information encryption key;
    其中,所述网络配置信息用于配置所述待入网设备接入第二接入点,所述密钥计算参数用于确定信息解密密钥,所述信息解密密钥用于解密所述采用信息加密密钥加密的网络配置信息。Wherein, the network configuration information is used to configure the device to be connected to the network to access the second access point, the key calculation parameter is used to determine an information decryption key, and the information decryption key is used to decrypt the adoption information Encryption key encrypted network configuration information.
  36. 根据权利要求35所述的方法,其特征在于,所述扫描配网设备显示的第三图形码之后,还包括:The method according to claim 35, wherein after scanning the third graphic code displayed by the distribution network device, the method further comprises:
    基于所述密钥计算参数和第一设备密钥,确定所述信息解密密钥。The information decryption key is determined based on the key calculation parameter and the first device key.
  37. 根据权利要求36所述的方法,其特征在于,所述基于所述密钥计算参数和第一设备密钥,确定所述信息解密密钥,包括:The method according to claim 36, wherein the determining the information decryption key based on the key calculation parameter and the first device key comprises:
    采用第三密钥生成算法对所述密钥计算参数和所述第一设备密钥进行处理,得到所述信息解密密钥。A third key generation algorithm is used to process the key calculation parameter and the first device key to obtain the information decryption key.
  38. 根据权利要求35至37任一项所述的方法,其特征在于,The method according to any one of claims 35 to 37, wherein,
    在所述信息解密密钥和所述信息加密密钥一致的情况下,所述待入网设备获取所述网络配置信息成功;In the case that the information decryption key and the information encryption key are consistent, the device to be connected to the network succeeds in acquiring the network configuration information;
    在所述信息解密密钥和所述信息加密密钥不一致的情况下,所述待入网设备获取所述网络配置信息失败。In the case that the information decryption key and the information encryption key are inconsistent, the device to be connected to the network fails to acquire the network configuration information.
  39. 根据权利要求35至38任一项所述的方法,其特征在于,所述密钥计算参数包括随机数。The method according to any one of claims 35 to 38, wherein the key calculation parameter includes a random number.
  40. 根据权利要求35至39任一项所述的方法,其特征在于,所述密钥计算参数的长度大于或等于一个字节。The method according to any one of claims 35 to 39, wherein the length of the key calculation parameter is greater than or equal to one byte.
  41. 一种信息处理方法,其特征在于,应用于配网设备中,所述方法包括:An information processing method, characterized in that, applied to a distribution network device, the method comprising:
    显示第三图形码,所述第三图形码包括采用信息加密密钥加密的网络配置信息和密钥计算参数;Displaying a third graphic code, the third graphic code includes network configuration information and key calculation parameters encrypted with an information encryption key;
    其中,所述网络配置信息用于配置待入网设备接入第二接入点,所述密钥计算参数用于确定信息解密密钥,所述信息解密密钥用于解密所述采用信息加密密钥加密的网络配置信息。Wherein, the network configuration information is used to configure the device to be connected to the network to access the second access point, the key calculation parameter is used to determine the information decryption key, and the information decryption key is used to decrypt the information encryption key using the information encryption key. key-encrypted network configuration information.
  42. 根据权利要求41所述的方法,其特征在于,所述方法还包括:The method of claim 41, wherein the method further comprises:
    接收来自于配网云平台的所述信息加密密钥和所述密钥计算参数;Receive the information encryption key and the key calculation parameter from the distribution network cloud platform;
    基于所述信息加密密钥、所述密钥计算参数和所述网络配置信息,确定所述第三图形码。The third graphic code is determined based on the information encryption key, the key calculation parameter and the network configuration information.
  43. 根据权利要求42所述的方法,其特征在于,所述基于所述信息加密密钥、所述密钥计算参数和所述网络配置信息,确定所述第三图形码,包括:The method according to claim 42, wherein the determining the third graphic code based on the information encryption key, the key calculation parameter and the network configuration information comprises:
    采用第二加密算法和所述信息加密密钥对所述网络配置信息进行处理,得到所述采用信息加密密钥加密的网络配置信息;Use the second encryption algorithm and the information encryption key to process the network configuration information to obtain the network configuration information encrypted with the information encryption key;
    基于所述采用信息加密密钥加密的网络配置信息和所述密钥计算参数,生成所述第三图形码。The third graphic code is generated based on the network configuration information encrypted with the information encryption key and the key calculation parameter.
  44. 根据权利要求41至43任一项所述的方法,其特征在于,所述密钥计算参数包括随机数。The method according to any one of claims 41 to 43, wherein the key calculation parameter comprises a random number.
  45. 根据权利要求41至44任一项所述的方法,其特征在于,所述密钥计算参数的长度大于或等于一个字节。The method according to any one of claims 41 to 44, wherein the length of the key calculation parameter is greater than or equal to one byte.
  46. 一种信息处理方法,其特征在于,应用于待入网设备中,所述方法包括:An information processing method, characterized in that it is applied to a device to be connected to a network, the method comprising:
    接收来自于配网设备的第一信息,所述第一信息包括密钥计算参数,所述密钥计算参数用于确定第一信息密钥。First information from the distribution network device is received, where the first information includes a key calculation parameter, and the key calculation parameter is used to determine the first information key.
  47. 根据权利要求46所述的方法,其特征在于,所述接收来自于配网设备的第一信息之后,还包括:The method according to claim 46, wherein after receiving the first information from the distribution network device, the method further comprises:
    基于所述密钥计算参数和所述第一设备密钥,确定所述第一信息密钥。The first information key is determined based on the key calculation parameter and the first device key.
  48. 根据权利要求47所述的方法,其特征在于,所述基于所述密钥计算参数和所述第一设备密钥,确定所述第一信息密钥,包括:The method according to claim 47, wherein the determining the first information key based on the key calculation parameter and the first device key comprises:
    采用第四密钥生成算法对所述密钥计算参数和所述第一设备密钥进行处理,得到所述第一信息密钥。A fourth key generation algorithm is used to process the key calculation parameter and the first device key to obtain the first information key.
  49. 根据权利要求46至48任一项所述的方法,其特征在于,所述第一信息还包括采用第二信息密钥加密的网络配置信息,所述网络配置信息用于配置所述待入网设备接入第二接入点;所述接收来自于配网设备的第一信息之后,还包括:The method according to any one of claims 46 to 48, wherein the first information further comprises network configuration information encrypted with a second information key, the network configuration information being used to configure the device to be connected to the network Accessing the second access point; after receiving the first information from the distribution network device, the method further includes:
    采用所述第一信息密钥解密所述采用第二信息密钥加密的网络配置信息;Use the first information key to decrypt the network configuration information encrypted with the second information key;
    其中,在所述第一信息密钥和所述第二信息密钥一致的情况下,所述待入网设备获取所述网络配置信息成功;在所述第一信息密钥和所述第二信息密钥不一致的情况下,所述待入网设备获取所述网络配置信息失败。Wherein, in the case that the first information key and the second information key are consistent, the device to be connected to the network succeeds in acquiring the network configuration information; When the keys are inconsistent, the device to be connected to the network fails to acquire the network configuration information.
  50. 根据权利要求46至48任一项所述的方法,其特征在于,所述接收来自于配网设备的第一信息之后,还包括:The method according to any one of claims 46 to 48, wherein after receiving the first information from the distribution network device, the method further comprises:
    基于所述第一信息密钥和第一参考信息,得到第一加密信息;obtaining first encrypted information based on the first information key and the first reference information;
    向所述配网设备发送所述第一加密信息。Send the first encrypted information to the network distribution device.
  51. 根据权利要求50所述的方法,其特征在于,所述基于所述第一信息密钥和第一参考信息,得到第一加密信息,包括:The method according to claim 50, wherein the obtaining the first encrypted information based on the first information key and the first reference information comprises:
    采用第三加密算法和所述第一信息密钥对所述第一参考信息进行处理,得到所述第一加密信息。The first reference information is processed by using a third encryption algorithm and the first information key to obtain the first encrypted information.
  52. 根据权利要求46至48任一项所述的方法,其特征在于,所述第一信息还包括采用第二信息密钥加密的第二信息;所述接收来自于配网设备的第一信息之后,还包括:The method according to any one of claims 46 to 48, wherein the first information further comprises second information encrypted with a second information key; after receiving the first information from the distribution network device ,Also includes:
    采用所述第一信息密钥解密所述采用第二信息密钥加密的第二信息,得到第三参考信息;Decrypt the second information encrypted with the second information key using the first information key to obtain third reference information;
    向所述配网设备发送所述第三参考信息。Send the third reference information to the network distribution device.
  53. 根据权利要求46至52任一项所述的方法,其特征在于,所述密钥计算参数包括随机数。The method according to any one of claims 46 to 52, wherein the key calculation parameter comprises a random number.
  54. 根据权利要求46至53任一项所述的方法,其特征在于,所述密钥计算参数的长度大于或等于一个字节。The method according to any one of claims 46 to 53, wherein the length of the key calculation parameter is greater than or equal to one byte.
  55. 一种信息处理方法,其特征在于,应用于配网设备中,所述方法包括:An information processing method, characterized in that, applied to a distribution network device, the method comprising:
    向待入网设备发送第一信息,所述第一信息包括密钥计算参数,所述密钥计算参数用于确定第一信息密钥。Send first information to the device to be connected to the network, where the first information includes a key calculation parameter, and the key calculation parameter is used to determine the first information key.
  56. 根据权利要求55所述的方法,其特征在于,所述第一信息还包括采用第二信息密钥加密的网络配置信息,所述网络配置信息用于配置所述待入网设备接入第二接入点;所述方法还包括:The method according to claim 55, wherein the first information further comprises network configuration information encrypted with a second information key, the network configuration information being used to configure the device to be connected to the network to access the second connection In point; the method also includes:
    接收来自于配网云平台的所述密钥计算参数和所述第二信息密钥;receiving the key calculation parameter and the second information key from the distribution network cloud platform;
    基于所述密钥计算参数、所述第二信息密钥和所述网络配置信息,确定所述第一信息。The first information is determined based on the key calculation parameter, the second information key, and the network configuration information.
  57. 根据权利要求56所述的方法,其特征在于,所述基于所述密钥计算参数、所述第二信息密钥和所述网络配置信息,确定所述第一信息,包括:The method according to claim 56, wherein the determining the first information based on the key calculation parameter, the second information key and the network configuration information comprises:
    采用第四加密算法和所述第二信息密钥对所述网络配置信息进行处理,得到所述采用第二信息密钥加密的网络配置信息;Using the fourth encryption algorithm and the second information key to process the network configuration information to obtain the network configuration information encrypted with the second information key;
    基于所述密钥计算参数和所述采用第二信息密钥加密的网络配置信息,确定所述第一信息。The first information is determined based on the key calculation parameter and the network configuration information encrypted with the second information key.
  58. 根据权利要求55至57任一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 55 to 57, wherein the method further comprises:
    接收来自于所述待入网设备的第一加密信息,所述第一加密信息包括采用所述第一信息密钥加密的第一参考信息;receiving first encrypted information from the device to be connected to the network, where the first encrypted information includes first reference information encrypted with the first information key;
    接收来自于配网云平台的第二加密信息,所述第二加密信息包括采用第二信息密钥加密的第二参考信息;receiving second encrypted information from the distribution network cloud platform, where the second encrypted information includes second reference information encrypted with a second information key;
    在所述第一加密信息和所述第二加密信息一致的情况下,向所述待入网设备发送网络配置信息,所述网络配置信息用于配置所述待入网设备接入第二接入点。In the case that the first encryption information and the second encryption information are consistent, send network configuration information to the device to be connected to the network, where the network configuration information is used to configure the device to be connected to the network to access the second access point .
  59. 根据权利要求55至57任一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 55 to 57, wherein the method further comprises:
    接收来自于所述待入网设备的所述第三参考信息;receiving the third reference information from the device to be connected to the network;
    接收来自于配网云平台的第四参考信息;Receive the fourth reference information from the distribution network cloud platform;
    在所述第三参考信息和所述第四参考信息一致的情况下,向所述待入网设备发送网络配置信息,所述网络配置信息用于配置所述待入网设备接入第二接入点。In the case that the third reference information and the fourth reference information are consistent, send network configuration information to the device to be connected to the network, where the network configuration information is used to configure the device to be connected to the network to access the second access point .
  60. 根据权利要求55至59任一项所述的方法,其特征在于,所述密钥计算参数包括随机数。The method according to any one of claims 55 to 59, wherein the key calculation parameter comprises a random number.
  61. 根据权利要求55至60任一项所述的方法,其特征在于,所述密钥计算参数的长度大于或等于一个字节。The method according to any one of claims 55 to 60, wherein the length of the key calculation parameter is greater than or equal to one byte.
  62. 一种信息处理装置,其特征在于,设置在待入网设备中,所述装置包括:An information processing device, characterized in that it is arranged in a device to be connected to a network, and the device comprises:
    信标广播模块,用于广播第一接入点的信标,所述信标中包括密钥计算参数和/或所述待入网设备的设备标识,所述密钥计算参数用于确定所述待入网设备和配网设备之间执行身份认证的访问密钥。A beacon broadcasting module, configured to broadcast a beacon of the first access point, the beacon includes a key calculation parameter and/or a device identifier of the device to be connected to the network, and the key calculation parameter is used to determine the The access key for performing identity authentication between the device to be connected to the network and the device to be deployed on the network.
  63. 根据权利要求62所述的装置,其特征在于,所述装置还包括:The apparatus of claim 62, wherein the apparatus further comprises:
    第一密钥确定模块,用于基于所述密钥计算参数和第一设备密钥,确定第一访问密钥。A first key determination module, configured to determine a first access key based on the key calculation parameter and the first device key.
  64. 根据权利要求63所述的装置,其特征在于,所述第一密钥确定模块,用于:The device according to claim 63, wherein the first key determination module is configured to:
    采用第一密钥生成算法对所述密钥计算参数和所述第一设备密钥进行处理,得到第一加密密钥;Using the first key generation algorithm to process the key calculation parameter and the first device key to obtain a first encryption key;
    采用第一编码方式对所述第一加密密钥进行处理,得到所述第一访问密钥。The first encryption key is processed in the first encoding manner to obtain the first access key.
  65. 根据权利要求63或64所述的装置,其特征在于,所述装置还包括:The device according to claim 63 or 64, wherein the device further comprises:
    身份认证模块,用于基于所述第一访问密钥,与所述配网设备之间执行所述身份认证;an identity authentication module, configured to perform the identity authentication with the distribution network device based on the first access key;
    其中,在所述第一访问密钥和所述配网设备确定的第二访问密钥一致的情况下,所述身份认证通过;在所述第一访问密钥和所述配网设备确定的第二访问密钥不一致的情况下,所述身份认证不通过。Wherein, if the first access key and the second access key determined by the distribution network device are consistent, the identity authentication is passed; if the first access key and the second access key determined by the distribution network device are consistent If the second access keys are inconsistent, the identity authentication fails.
  66. 根据权利要求62至65任一项所述的装置,其特征在于,所述信标包括以下至少一个字段:基本服务集标识BSSID字段、服务集标识SSID字段、自定义字段;The apparatus according to any one of claims 62 to 65, wherein the beacon comprises at least one of the following fields: a basic service set identification BSSID field, a service set identification SSID field, and a custom field;
    所述BSSID字段包括所述密钥计算参数和/或所述待入网设备的设备标识;The BSSID field includes the key calculation parameter and/or the device identifier of the device to be connected to the network;
    或者,所述SSID字段包括所述密钥计算参数和/或所述待入网设备的设备标识;Alternatively, the SSID field includes the key calculation parameter and/or the device identifier of the device to be connected to the network;
    或者,所述自定义字段包括所述密钥计算参数和/或所述待入网设备的设备标识。Alternatively, the custom field includes the key calculation parameter and/or the device identifier of the device to be connected to the network.
  67. 根据权利要求62至66任一项所述的装置,其特征在于,所述密钥计算参数包括随机数。The apparatus according to any one of claims 62 to 66, wherein the key calculation parameter includes a random number.
  68. 根据权利要求62至67任一项所述的装置,其特征在于,所述密钥计算参数的长度大于或等于一个字节。The apparatus according to any one of claims 62 to 67, wherein the length of the key calculation parameter is greater than or equal to one byte.
  69. 根据权利要求62至68任一项所述的装置,其特征在于,所述装置还包括:The device according to any one of claims 62 to 68, wherein the device further comprises:
    配置信息接收模块,用于在所述身份认证通过的情况下,接收来自于所述配网设备的网络配置信息,所述网络配置信息用于配置所述待入网设备接入第二接入点。A configuration information receiving module, configured to receive network configuration information from the network distribution device when the identity authentication is passed, where the network configuration information is used to configure the to-be-networked device to access the second access point .
  70. 一种信息处理装置,其特征在于,设置在配网设备中,所述装置包括:An information processing device, characterized in that it is arranged in a distribution network equipment, and the device comprises:
    信标接收模块,用于接收第一接入点的信标,所述信标中包括密钥计算参数和/或待入网设备的设备标识,所述密钥计算参数用于确定待入网设备和所述配网设备之间执行身份认证的访问密钥。A beacon receiving module, configured to receive a beacon of the first access point, the beacon includes a key calculation parameter and/or a device identifier of the device to be connected to the network, and the key calculation parameter is used to determine the device to be connected to the network and the device identifier of the device to be accessed. The access key for performing identity authentication between the distribution network devices.
  71. 根据权利要求70所述的装置,其特征在于,所述装置还包括:The apparatus of claim 70, wherein the apparatus further comprises:
    第一请求发送模块,用于向配网云平台发送第一获取请求,所述第一获取请求用于请求获取第二访问密钥;a first request sending module, configured to send a first acquisition request to the distribution network cloud platform, where the first acquisition request is used to request to acquire a second access key;
    密钥信息接收模块,用于接收来自于所述配网云平台的访问密钥信息,所述访问密钥信息用于确定所述第二访问密钥。The key information receiving module is configured to receive access key information from the distribution network cloud platform, where the access key information is used to determine the second access key.
  72. 根据权利要求71所述的装置,其特征在于,所述访问密钥信息包括所述第二访问密钥。71. The apparatus of claim 71, wherein the access key information comprises the second access key.
  73. 根据权利要求71所述的装置,其特征在于,所述访问密钥信息包括第二加密密钥;所述装置还包括:The apparatus of claim 71, wherein the access key information comprises a second encryption key; the apparatus further comprises:
    第二密钥确定模块,用于采用第一编码方式对所述第二加密密钥进行处理,得到所述第二访问密钥。A second key determination module, configured to process the second encryption key in the first encoding manner to obtain the second access key.
  74. 根据权利要求71至73任一项所述的装置,其特征在于,所述第一获取请求中包括所述密钥计算参数和/或所述待入网设备的设备标识。The apparatus according to any one of claims 71 to 73, wherein the first acquisition request includes the key calculation parameter and/or the device identifier of the device to be connected to the network.
  75. 根据权利要求71至74任一项所述的装置,其特征在于,所述装置还包括:The device according to any one of claims 71 to 74, wherein the device further comprises:
    身份认证模块,用于基于所述第二访问密钥,与所述待入网设备之间执行所述身份认证;an identity authentication module, configured to perform the identity authentication with the device to be networked based on the second access key;
    其中,在所述第二访问密钥和所述待入网设备确定的第一访问密钥一致的情况下,所述身份认证通过;在所述第二访问密钥和所述待入网设备确定的第一访问密钥不一致的情况下,所述身份认证不通过。Wherein, if the second access key is consistent with the first access key determined by the device to be connected to the network, the identity authentication is passed; if the second access key and the device to be connected to the network are determined If the first access keys are inconsistent, the identity authentication fails.
  76. 根据权利要求70至75任一项所述的装置,其特征在于,所述信标包括以下至少一个字段:基本服务集标识BSSID字段、服务集标识SSID字段、自定义字段;The apparatus according to any one of claims 70 to 75, wherein the beacon includes at least one of the following fields: a basic service set identification BSSID field, a service set identification SSID field, and a custom field;
    所述BSSID字段包括所述密钥计算参数和/或所述待入网设备的设备标识;The BSSID field includes the key calculation parameter and/or the device identifier of the device to be connected to the network;
    或者,所述SSID字段包括所述密钥计算参数和/或所述待入网设备的设备标识;Alternatively, the SSID field includes the key calculation parameter and/or the device identifier of the device to be connected to the network;
    或者,所述自定义字段包括所述密钥计算参数和/或所述待入网设备的设备标识。Alternatively, the custom field includes the key calculation parameter and/or the device identifier of the device to be connected to the network.
  77. 根据权利要求70至76任一项所述的装置,其特征在于,所述密钥计算参数包括随机数。The apparatus according to any one of claims 70 to 76, wherein the key calculation parameter includes a random number.
  78. 根据权利要求70至77任一项所述的装置,其特征在于,所述密钥计算参数的长度大于或等于一个字节。The apparatus according to any one of claims 70 to 77, wherein the length of the key calculation parameter is greater than or equal to one byte.
  79. 根据权利要求70至78任一项所述的装置,其特征在于,所述装置还包括:The device according to any one of claims 70 to 78, wherein the device further comprises:
    接入模块,用于在所述身份认证通过的情况下,接入所述第一接入点。An access module, configured to access the first access point when the identity authentication is passed.
  80. 根据权利要求79所述的装置,其特征在于,所述装置还包括:The apparatus of claim 79, wherein the apparatus further comprises:
    配置信息发送模块,用于向所述待入网设备发送网络配置信息,所述网络配置信息用于配置所述待入网设备接入第二接入点。The configuration information sending module is configured to send network configuration information to the device to be connected to the network, where the network configuration information is used to configure the device to be connected to the network to access the second access point.
  81. 一种信息处理装置,其特征在于,设置在待入网设备中,所述装置包括:An information processing device, characterized in that it is arranged in a device to be connected to a network, and the device comprises:
    第一显示模块,用于显示第一图形码,所述第一图形码包括密钥计算参数和/或所述待入网设备的设备标识,所述密钥计算参数用于确定信息解密密钥,所述信息解密密钥用于解密来自于配网设备的网络配置信息,所述网络配置信息用于配置所述待入网设备接入第二接入点。a first display module, configured to display a first graphic code, where the first graphic code includes a key calculation parameter and/or a device identifier of the device to be connected to the network, and the key calculation parameter is used to determine an information decryption key, The information decryption key is used to decrypt the network configuration information from the network configuration device, and the network configuration information is used to configure the device to be connected to the network to access the second access point.
  82. 根据权利要求81所述的装置,其特征在于,所述装置还包括:The apparatus of claim 81, wherein the apparatus further comprises:
    解密密钥确定模块,用于基于所述密钥计算参数和第一设备密钥,确定所述信息解密密钥。A decryption key determination module, configured to determine the information decryption key based on the key calculation parameter and the first device key.
  83. 根据权利要求82所述的装置,其特征在于,所述解密密钥确定模块,用于:The device according to claim 82, wherein the decryption key determination module is used for:
    采用第二密钥生成算法对所述密钥计算参数和所述第一设备密钥进行处理,得到所述信息解密密钥。The key calculation parameter and the first device key are processed by using the second key generation algorithm to obtain the information decryption key.
  84. 根据权利要求81至83任一项所述的装置,其特征在于,所述装置还包括:The device according to any one of claims 81 to 83, wherein the device further comprises:
    第一扫描模块,用于扫描所述配网设备显示的第二图形码,所述第二图形码包括采用信息加密密钥加密的所述网络配置信息;a first scanning module, configured to scan a second graphic code displayed by the network distribution device, where the second graphic code includes the network configuration information encrypted with an information encryption key;
    其中,在所述信息解密密钥和所述信息加密密钥一致的情况下,所述待入网设备获取所述网络配置信息成功;在所述信息解密密钥和所述信息加密密钥不一致的情况下,所述待入网设备获取所述网络配置信息失败。Wherein, if the information decryption key and the information encryption key are consistent, the device to be connected to the network succeeds in acquiring the network configuration information; if the information decryption key and the information encryption key are inconsistent In this case, the device to be connected to the network fails to acquire the network configuration information.
  85. 根据权利要求81至84任一项所述的装置,其特征在于,所述密钥计算参数包括随机数。The apparatus according to any one of claims 81 to 84, wherein the key calculation parameter includes a random number.
  86. 根据权利要求81至85任一项所述的装置,其特征在于,所述密钥计算参数由设备云平台预配置;或者,所述密钥计算参数由所述待入网设备生成。The apparatus according to any one of claims 81 to 85, wherein the key calculation parameter is preconfigured by a device cloud platform; or, the key calculation parameter is generated by the device to be connected to the network.
  87. 根据权利要求81至86任一项所述的装置,其特征在于,所述密钥计算参数的长度大于或等于一个字节。The apparatus according to any one of claims 81 to 86, wherein the length of the key calculation parameter is greater than or equal to one byte.
  88. 一种信息处理装置,其特征在于,设置在配网设备中,所述装置包括:An information processing device, characterized in that it is arranged in a distribution network equipment, and the device comprises:
    第二扫描模块,用于扫描待入网设备的第一图形码,所述第一图形码包括密钥计算参数和/或所述待入网设备的设备标识,所述密钥计算参数用于确定信息加密密钥,所述信息加密密钥用于加密网络配置信息,所述网络配置信息用于配置所述待入网设备接入第二接入点。The second scanning module is used to scan the first graphic code of the device to be connected to the network, where the first graphic code includes a key calculation parameter and/or a device identifier of the device to be connected to the network, and the key calculation parameter is used to determine information An encryption key, where the information encryption key is used to encrypt network configuration information, and the network configuration information is used to configure the device to be connected to the network to access the second access point.
  89. 根据权利要求88所述的装置,其特征在于,所述装置还包括:The apparatus of claim 88, wherein the apparatus further comprises:
    第二请求发送模块,用于向配网云平台发送第二获取请求,所述第二获取请求用于请求获取所述信息加密密钥;A second request sending module, configured to send a second acquisition request to the distribution network cloud platform, where the second acquisition request is used to request to acquire the information encryption key;
    加密密钥接收模块,用于接收来自于所述配网云平台的所述信息加密密钥。An encryption key receiving module, configured to receive the information encryption key from the distribution network cloud platform.
  90. 根据权利要求89所述的装置,其特征在于,所述第二获取请求中包括所述密钥计算参数和/或所述待入网设备的设备标识。The apparatus according to claim 89, wherein the second acquisition request includes the key calculation parameter and/or the device identifier of the device to be connected to the network.
  91. 根据权利要求88至90任一项所述的装置,其特征在于,所述装置还包括:The device according to any one of claims 88 to 90, wherein the device further comprises:
    图形码确定模块,用于基于所述网络配置信息和所述信息加密密钥,确定第二图形码;a graphic code determination module, configured to determine a second graphic code based on the network configuration information and the information encryption key;
    第二显示模块,用于显示所述第二图形码。The second display module is used for displaying the second graphic code.
  92. 根据权利要求91所述的装置,其特征在于,所述图形码确定模块,用于:The device according to claim 91, wherein the graphic code determination module is used for:
    采用第一加密算法和所述信息加密密钥对所述网络配置信息进行处理,得到加密后的网络配置信息;Using the first encryption algorithm and the information encryption key to process the network configuration information to obtain encrypted network configuration information;
    根据所述加密后的网络配置信息生成所述第二图形码。The second graphic code is generated according to the encrypted network configuration information.
  93. 根据权利要求88至92任一项所述的装置,其特征在于,所述密钥计算参数包括随机数。The apparatus according to any one of claims 88 to 92, wherein the key calculation parameter includes a random number.
  94. 根据权利要求88至93任一项所述的装置,其特征在于,所述密钥计算参数由设备云平台预配置;或者,所述密钥计算参数由所述待入网设备生成。The apparatus according to any one of claims 88 to 93, wherein the key calculation parameter is preconfigured by a device cloud platform; or, the key calculation parameter is generated by the device to be connected to the network.
  95. 根据权利要求88至94任一项所述的装置,其特征在于,所述密钥计算参数的长度大于或等于一个字节。The apparatus according to any one of claims 88 to 94, wherein the length of the key calculation parameter is greater than or equal to one byte.
  96. 一种信息处理装置,其特征在于,设置在待入网设备中,所述装置包括:An information processing device, characterized in that it is arranged in a device to be connected to a network, and the device comprises:
    第三扫描模块,用于扫描配网设备显示的第三图形码,所述第三图形码包括采用信息加密密钥加密的网络配置信息和密钥计算参数;a third scanning module, configured to scan a third graphic code displayed by the network distribution device, where the third graphic code includes network configuration information and key calculation parameters encrypted with an information encryption key;
    其中,所述网络配置信息用于配置所述待入网设备接入第二接入点,所述密钥计算参数用于确定信息解密密钥,所述信息解密密钥用于解密所述采用信息加密密钥加密的网络配置信息。Wherein, the network configuration information is used to configure the device to be connected to the network to access the second access point, the key calculation parameter is used to determine an information decryption key, and the information decryption key is used to decrypt the adoption information Encryption key encrypted network configuration information.
  97. 根据权利要求96所述的装置,其特征在于,所述装置还包括:The apparatus of claim 96, wherein the apparatus further comprises:
    解密密钥确定模块,用于基于所述密钥计算参数和第一设备密钥,确定所述信息解密密钥。A decryption key determination module, configured to determine the information decryption key based on the key calculation parameter and the first device key.
  98. 根据权利要求97所述的装置,其特征在于,所述解密密钥确定模块,用于:The device according to claim 97, wherein the decryption key determination module is used for:
    采用第三密钥生成算法对所述密钥计算参数和所述第一设备密钥进行处理,得到所述信息解密密钥。A third key generation algorithm is used to process the key calculation parameter and the first device key to obtain the information decryption key.
  99. 根据权利要求96至98任一项所述的装置,其特征在于,The device according to any one of claims 96 to 98, characterized in that,
    在所述信息解密密钥和所述信息加密密钥一致的情况下,所述待入网设备获取所述网络配置信息成功;In the case that the information decryption key and the information encryption key are consistent, the device to be connected to the network succeeds in acquiring the network configuration information;
    在所述信息解密密钥和所述信息加密密钥不一致的情况下,所述待入网设备获取所述网络配置信息失败。In the case that the information decryption key and the information encryption key are inconsistent, the device to be connected to the network fails to acquire the network configuration information.
  100. 根据权利要求96至99任一项所述的装置,其特征在于,所述密钥计算参数包括随机数。The apparatus according to any one of claims 96 to 99, wherein the key calculation parameter includes a random number.
  101. 根据权利要求96至100任一项所述的装置,其特征在于,所述密钥计算参数的长度大于或等于一个字节。The apparatus according to any one of claims 96 to 100, wherein the length of the key calculation parameter is greater than or equal to one byte.
  102. 一种信息处理装置,其特征在于,设置在配网设备中,所述装置包括:An information processing device, characterized in that it is arranged in a distribution network equipment, and the device comprises:
    第三显示模块,用于显示第三图形码,所述第三图形码包括采用信息加密密钥加密的网络配置信息和密钥计算参数;a third display module, configured to display a third graphic code, where the third graphic code includes network configuration information and key calculation parameters encrypted with an information encryption key;
    其中,所述网络配置信息用于配置待入网设备接入第二接入点,所述密钥计算参数用于确定信息解密密钥,所述信息解密密钥用于解密所述采用信息加密密钥加密的网络配置信息。Wherein, the network configuration information is used to configure the device to be connected to the network to access the second access point, the key calculation parameter is used to determine the information decryption key, and the information decryption key is used to decrypt the information encryption key using the information encryption key. key-encrypted network configuration information.
  103. 根据权利要求102所述的装置,其特征在于,所述装置还包括:The apparatus of claim 102, wherein the apparatus further comprises:
    信息接收模块,用于接收来自于配网云平台的所述信息加密密钥和所述密钥计算参数;an information receiving module for receiving the information encryption key and the key calculation parameter from the distribution network cloud platform;
    图形码确定模块,用于基于所述信息加密密钥、所述密钥计算参数和所述网络配置信息,确定所述第三图形码。A graphic code determination module, configured to determine the third graphic code based on the information encryption key, the key calculation parameter and the network configuration information.
  104. 根据权利要求103所述的装置,其特征在于,所述图形码确定模块,用于:The apparatus according to claim 103, wherein the graphic code determination module is configured to:
    采用第二加密算法和所述信息加密密钥对所述网络配置信息进行处理,得到所述采用信息加密密钥加密的网络配置信息;Use the second encryption algorithm and the information encryption key to process the network configuration information to obtain the network configuration information encrypted with the information encryption key;
    基于所述采用信息加密密钥加密的网络配置信息和所述密钥计算参数,生成所述第三图形码。The third graphic code is generated based on the network configuration information encrypted with the information encryption key and the key calculation parameter.
  105. 根据权利要求102至104任一项所述的装置,其特征在于,所述密钥计算参数包括随机数。The apparatus according to any one of claims 102 to 104, wherein the key calculation parameter includes a random number.
  106. 根据权利要求102至105任一项所述的装置,其特征在于,所述密钥计算参数的长度大于或等于一个字节。The apparatus according to any one of claims 102 to 105, wherein the length of the key calculation parameter is greater than or equal to one byte.
  107. 一种信息处理装置,其特征在于,设置在待入网设备中,所述装置包括:An information processing device, characterized in that it is arranged in a device to be connected to a network, and the device comprises:
    第一接收模块,用于接收来自于配网设备的第一信息,所述第一信息包括密钥计算参数,所述密钥计算参数用于确定第一信息密钥。The first receiving module is configured to receive first information from the distribution network device, where the first information includes a key calculation parameter, and the key calculation parameter is used to determine the first information key.
  108. 根据权利要求107所述的装置,其特征在于,所述装置还包括:The apparatus of claim 107, wherein the apparatus further comprises:
    第一密钥确定模块,用于基于所述密钥计算参数和所述第一设备密钥,确定所述第一信息密钥。A first key determination module, configured to determine the first information key based on the key calculation parameter and the first device key.
  109. 根据权利要求108所述的装置,其特征在于,所述第一密钥确定模块,用于:The apparatus according to claim 108, wherein the first key determination module is configured to:
    采用第四密钥生成算法对所述密钥计算参数和所述第一设备密钥进行处理,得到所述第一信息密钥。A fourth key generation algorithm is used to process the key calculation parameter and the first device key to obtain the first information key.
  110. 根据权利要求107至109任一项所述的装置,其特征在于,所述第一信息还包括采用第二信息密钥加密的网络配置信息,所述网络配置信息用于配置所述待入网设备接入第二接入点;所述装置还包括:The apparatus according to any one of claims 107 to 109, wherein the first information further comprises network configuration information encrypted with a second information key, and the network configuration information is used to configure the device to be connected to the network accessing a second access point; the apparatus further includes:
    第一解密模块,用于采用所述第一信息密钥解密所述采用第二信息密钥加密的网络配置信息;a first decryption module, configured to decrypt the network configuration information encrypted with the second information key by using the first information key;
    其中,在所述第一信息密钥和所述第二信息密钥一致的情况下,所述待入网设备获取所述网络配置信息成功;在所述第一信息密钥和所述第二信息密钥不一致的情况下,所述待入网设备获取所述网络配置信息失败。Wherein, in the case that the first information key and the second information key are consistent, the device to be connected to the network succeeds in acquiring the network configuration information; When the keys are inconsistent, the device to be connected to the network fails to acquire the network configuration information.
  111. 根据权利要求107至109任一项所述的装置,其特征在于,所述装置还包括:The device according to any one of claims 107 to 109, wherein the device further comprises:
    第一加密模块,用于基于所述第一信息密钥和第一参考信息,得到第一加密信息;a first encryption module, configured to obtain first encryption information based on the first information key and the first reference information;
    第一信息发送模块,用于向所述配网设备发送所述第一加密信息。A first information sending module, configured to send the first encrypted information to the network distribution device.
  112. 根据权利要求111所述的装置,其特征在于,所述第一加密模块,用于:The device according to claim 111, wherein the first encryption module is configured to:
    采用第三加密算法和所述第一信息密钥对所述第一参考信息进行处理,得到所述第一加密信息。The first reference information is processed by using a third encryption algorithm and the first information key to obtain the first encrypted information.
  113. 根据权利要求107至109任一项所述的装置,其特征在于,所述第一信息还包括采用第二信息密钥加密的第二信息;所述装置还包括:The apparatus according to any one of claims 107 to 109, wherein the first information further includes second information encrypted with a second information key; the apparatus further includes:
    第二解密模块,用于采用所述第一信息密钥解密所述采用第二信息密钥加密的第二信息,得到第三参考信息;a second decryption module, configured to decrypt the second information encrypted with the second information key by using the first information key to obtain third reference information;
    第三信息发送模块,用于向所述配网设备发送所述第三参考信息。A third information sending module, configured to send the third reference information to the network distribution device.
  114. 根据权利要求107至113任一项所述的装置,其特征在于,所述密钥计算参数包括随机数。The apparatus according to any one of claims 107 to 113, wherein the key calculation parameter comprises a random number.
  115. 根据权利要求107至114任一项所述的装置,其特征在于,所述密钥计算参数的长度大于或等于一个字节。The apparatus according to any one of claims 107 to 114, wherein the length of the key calculation parameter is greater than or equal to one byte.
  116. 一种信息处理装置,其特征在于,设置在配网设备中,所述装置包括:An information processing device, characterized in that it is arranged in a distribution network equipment, and the device comprises:
    第一发送模块,用于向待入网设备发送第一信息,所述第一信息包括密钥计算参数,所述密钥计算参数用于确定第一信息密钥。The first sending module is configured to send first information to the device to be connected to the network, where the first information includes a key calculation parameter, and the key calculation parameter is used to determine the first information key.
  117. 根据权利要求116所述的装置,其特征在于,所述第一信息还包括采用第二信息密钥加密的网络配置信息,所述网络配置信息用于配置所述待入网设备接入第二接入点;所述装置还包括:The apparatus according to claim 116, wherein the first information further comprises network configuration information encrypted with a second information key, and the network configuration information is used to configure the device to be connected to the network to access the second connection. an entry point; the apparatus further includes:
    第一接收模块,用于接收来自于配网云平台的所述密钥计算参数和所述第二信息密钥;a first receiving module, configured to receive the key calculation parameter and the second information key from the distribution network cloud platform;
    第二确定模块,用于基于所述密钥计算参数、所述第二信息密钥和所述网络配置信息,确定所述第一信息。A second determining module, configured to determine the first information based on the key calculation parameter, the second information key and the network configuration information.
  118. 根据权利要求117所述的装置,其特征在于,所述第二确定模块,用于:The apparatus according to claim 117, wherein the second determining module is configured to:
    采用第四加密算法和所述第二信息密钥对所述网络配置信息进行处理,得到所述采用第二信息密钥加密的网络配置信息;Using the fourth encryption algorithm and the second information key to process the network configuration information to obtain the network configuration information encrypted with the second information key;
    基于所述密钥计算参数和所述采用第二信息密钥加密的网络配置信息,确定所述第一信息。The first information is determined based on the key calculation parameter and the network configuration information encrypted with the second information key.
  119. 根据权利要求116至118任一项所述的装置,其特征在于,所述装置还包括:The device according to any one of claims 116 to 118, wherein the device further comprises:
    第一信息接收模块,用于接收来自于所述待入网设备的第一加密信息,所述第一加密信息包括采用所述第一信息密钥加密的第一参考信息;a first information receiving module, configured to receive first encrypted information from the device to be connected to the network, where the first encrypted information includes first reference information encrypted with the first information key;
    第二信息接收模块,用于接收来自于配网云平台的第二加密信息,所述第二加密信息包括采用第二信息密钥加密的第二参考信息;a second information receiving module, configured to receive second encrypted information from the distribution network cloud platform, where the second encrypted information includes second reference information encrypted with a second information key;
    配置信息发送模块,用于在所述第一加密信息和所述第二加密信息一致的情况下,向所述待入网设备发送网络配置信息,所述网络配置信息用于配置所述待入网设备接入第二接入点。A configuration information sending module, configured to send network configuration information to the device to be connected to the network when the first encrypted information and the second encrypted information are consistent, where the network configuration information is used to configure the device to be connected to the network Access the second access point.
  120. 根据权利要求116至118任一项所述的装置,其特征在于,所述装置还包括:The device according to any one of claims 116 to 118, wherein the device further comprises:
    第三信息接收模块,用于接收来自于所述待入网设备的所述第三参考信息;a third information receiving module, configured to receive the third reference information from the device to be connected to the network;
    第四信息接收模块,用于接收来自于配网云平台的第四参考信息;a fourth information receiving module, configured to receive fourth reference information from the distribution network cloud platform;
    配置信息发送模块,用于在所述第三参考信息和所述第四参考信息一致的情况下,向所述待入网设备发送网络配置信息,所述网络配置信息用于配置所述待入网设备接入第二接入点。A configuration information sending module, configured to send network configuration information to the device to be connected to the network when the third reference information is consistent with the fourth reference information, where the network configuration information is used to configure the device to be connected to the network Access the second access point.
  121. 根据权利要求116至120任一项所述的装置,其特征在于,所述密钥计算参数包括随机数。The apparatus according to any one of claims 116 to 120, wherein the key calculation parameter comprises a random number.
  122. 根据权利要求116至121任一项所述的装置,其特征在于,所述密钥计算参数的长度大于或等于一个字节。The apparatus according to any one of claims 116 to 121, wherein the length of the key calculation parameter is greater than or equal to one byte.
  123. 一种待入网设备,其特征在于,所述待入网设备包括:处理器,以及与所述处理器相连的收发器;其中:A device to be connected to a network, characterized in that the device to be connected to a network comprises: a processor, and a transceiver connected to the processor; wherein:
    所述收发器,用于广播第一接入点的信标,所述信标中包括密钥计算参数和/或所述待入网设备的设备标识,所述密钥计算参数用于确定所述待入网设备和配网设备之间执行身份认证的访问密钥。The transceiver is used to broadcast a beacon of the first access point, the beacon includes a key calculation parameter and/or a device identifier of the device to be connected to the network, and the key calculation parameter is used to determine the The access key for performing identity authentication between the device to be connected to the network and the device to be deployed on the network.
  124. 一种配网设备,其特征在于,所述配网设备包括:处理器,以及与所述处理器相连的收发器;其中:A distribution network device, characterized in that the distribution network device comprises: a processor, and a transceiver connected to the processor; wherein:
    所述收发器,用于接收第一接入点的信标,所述信标中包括密钥计算参数和/或待入网设备的设备标识,所述密钥计算参数用于确定待入网设备和所述配网设备之间执行身份认证的访问密钥。The transceiver is configured to receive a beacon of the first access point, the beacon includes a key calculation parameter and/or a device identifier of the device to be connected to the network, and the key calculation parameter is used to determine the device to be connected to the network and the device ID of the device to be connected to the network. The access key for performing identity authentication between the distribution network devices.
  125. 一种待入网设备,其特征在于,所述待入网设备包括:处理器,以及与所述处理器相连的收发器;其中:A device to be connected to a network, characterized in that the device to be connected to a network comprises: a processor, and a transceiver connected to the processor; wherein:
    所述处理器,用于显示第一图形码,所述第一图形码包括密钥计算参数和/或所述待入网设备的设备标识,所述密钥计算参数用于确定信息解密密钥,所述信息解密密钥用于解密来自于配网设备的网络配置信息,所述网络配置信息用于配置所述待入网设备接入第二接入点。The processor is configured to display a first graphic code, where the first graphic code includes a key calculation parameter and/or a device identifier of the device to be connected to the network, and the key calculation parameter is used to determine an information decryption key, The information decryption key is used to decrypt the network configuration information from the network configuration device, and the network configuration information is used to configure the device to be connected to the network to access the second access point.
  126. 一种配网设备,其特征在于,所述配网设备包括:处理器,以及与所述处理器相连的收发器;其中:A distribution network device, characterized in that the distribution network device comprises: a processor, and a transceiver connected to the processor; wherein:
    所述处理器,用于扫描待入网设备的第一图形码,所述第一图形码包括密钥计算参数和/或所述待入网设备的设备标识,所述密钥计算参数用于确定信息加密密钥,所述信息加密密钥用于加密网络配置信息,所述网络配置信息用于配置所述待入网设备接入第二接入点。The processor is configured to scan the first graphic code of the device to be connected to the network, where the first graphic code includes a key calculation parameter and/or a device identifier of the device to be connected to the network, and the key calculation parameter is used to determine information An encryption key, where the information encryption key is used to encrypt network configuration information, and the network configuration information is used to configure the device to be connected to the network to access the second access point.
  127. 一种待入网设备,其特征在于,所述待入网设备包括:处理器,以及与所述处理器相连的收发器;其中:A device to be connected to a network, characterized in that the device to be connected to a network comprises: a processor, and a transceiver connected to the processor; wherein:
    所述处理器,用于扫描配网设备显示的第三图形码,所述第三图形码包括采用信息加密密钥加密的网络配置信息和密钥计算参数;The processor is configured to scan a third graphic code displayed by the network distribution device, where the third graphic code includes network configuration information and key calculation parameters encrypted with an information encryption key;
    其中,所述网络配置信息用于配置所述待入网设备接入第二接入点,所述密钥计算参数用于确定信息解密密钥,所述信息解密密钥用于解密所述采用信息加密密钥加密的网络配置信息。Wherein, the network configuration information is used to configure the device to be connected to the network to access the second access point, the key calculation parameter is used to determine an information decryption key, and the information decryption key is used to decrypt the adoption information Encryption key encrypted network configuration information.
  128. 一种配网设备,其特征在于,所述配网设备包括:处理器,以及与所述处理器相连的收发器;其中:A distribution network device, characterized in that the distribution network device comprises: a processor, and a transceiver connected to the processor; wherein:
    所述处理器,用于显示第三图形码,所述第三图形码包括采用信息加密密钥加密的网络配置信息和密钥计算参数;the processor, configured to display a third graphic code, where the third graphic code includes network configuration information and key calculation parameters encrypted with an information encryption key;
    其中,所述网络配置信息用于配置待入网设备接入第二接入点,所述密钥计算参数用于确定信息解密密钥,所述信息解密密钥用于解密所述采用信息加密密钥加密的网络配置信息。Wherein, the network configuration information is used to configure the device to be connected to the network to access the second access point, the key calculation parameter is used to determine the information decryption key, and the information decryption key is used to decrypt the information encryption key using the information encryption key. key-encrypted network configuration information.
  129. 一种待入网设备,其特征在于,所述待入网设备包括:处理器,以及与所述处理器相连的收发器;其中:A device to be connected to a network, characterized in that the device to be connected to a network comprises: a processor, and a transceiver connected to the processor; wherein:
    所述收发器,用于接收来自于配网设备的第一信息,所述第一信息包括密钥计算参数,所述密钥计算参数用于确定第一信息密钥。The transceiver is configured to receive first information from a distribution network device, where the first information includes a key calculation parameter, and the key calculation parameter is used to determine the first information key.
  130. 一种配网设备,其特征在于,所述配网设备包括:处理器,以及与所述处理器相连的收发器;其中:A distribution network device, characterized in that the distribution network device comprises: a processor, and a transceiver connected to the processor; wherein:
    所述收发器,用于向待入网设备发送第一信息,所述第一信息包括密钥计算参数,所述密钥计算参数用于确定第一信息密钥。The transceiver is configured to send first information to the device to be connected to the network, where the first information includes a key calculation parameter, and the key calculation parameter is used to determine the first information key.
  131. 一种计算机可读存储介质,其特征在于,所述存储介质中存储有计算机程序,所述计算机程序用于被待入网设备的处理器执行,以实现如权利要求1至8任一项所述的信息处理方法,或者实现如权利要求20至26任一项所述的信息处理方法,或者实现如权利要求35至40任一项所述的信息处理方法,或者实现如权利要求46至54任一项所述的信息处理方法。A computer-readable storage medium, characterized in that, a computer program is stored in the storage medium, and the computer program is used to be executed by a processor of a device to be connected to a network, so as to realize any one of claims 1 to 8. The information processing method of the The information processing method described in one item.
  132. 一种计算机可读存储介质,其特征在于,所述存储介质中存储有计算机程序,所述计算机程序用于被配网设备的处理器执行,以实现如权利要求9至19任一项所述的信息处理方法,或者实现如权利要求27至34任一项所述的信息处理方法,或者实现如权利要求41至45任一项所述的信息处理方法,或者实现如权利要求55至61任一项所述的信息处理方法。A computer-readable storage medium, characterized in that, a computer program is stored in the storage medium, and the computer program is used to be executed by a processor of a network configuration device, so as to realize any one of claims 9 to 19. The information processing method of the The information processing method described in one item.
PCT/CN2021/079365 2020-09-06 2021-03-05 Information processing method and apparatus, device and storage medium WO2022048125A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202180042424.2A CN115769542A (en) 2020-09-06 2021-03-05 Information processing method, device, equipment and storage medium

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010925363.1 2020-09-06
CN202010925363.1A CN114157413A (en) 2020-09-06 2020-09-06 Information processing method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
WO2022048125A1 true WO2022048125A1 (en) 2022-03-10

Family

ID=80460645

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/079365 WO2022048125A1 (en) 2020-09-06 2021-03-05 Information processing method and apparatus, device and storage medium

Country Status (2)

Country Link
CN (2) CN114157413A (en)
WO (1) WO2022048125A1 (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100080383A1 (en) * 2008-09-30 2010-04-01 Greg Vaughan Secure provisioning of a portable device using a representation of a key
CN102395216A (en) * 2011-12-21 2012-03-28 上海云联计算机系统有限公司 Method for rapidly accessing to wireless local area network and mobile terminal thereof
CN102802155A (en) * 2012-08-17 2012-11-28 珠海金山办公软件有限公司 Method for rapidly establishing connection between mobile terminal and intelligent display equipment
CN105682088A (en) * 2014-11-18 2016-06-15 腾讯科技(武汉)有限公司 Wireless network sharing method and terminal
CN106850209A (en) * 2017-02-28 2017-06-13 苏州福瑞思信息科技有限公司 A kind of identity identifying method and device
CN106851632A (en) * 2017-01-22 2017-06-13 海尔优家智能科技(北京)有限公司 A kind of smart machine accesses the method and device of WLAN
CN108632056A (en) * 2017-03-17 2018-10-09 阿里云计算有限公司 A kind of smart machine network collocating method and system
CN111510919A (en) * 2019-01-31 2020-08-07 阿里巴巴集团控股有限公司 Network configuration method, device, equipment and system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100080383A1 (en) * 2008-09-30 2010-04-01 Greg Vaughan Secure provisioning of a portable device using a representation of a key
CN102395216A (en) * 2011-12-21 2012-03-28 上海云联计算机系统有限公司 Method for rapidly accessing to wireless local area network and mobile terminal thereof
CN102802155A (en) * 2012-08-17 2012-11-28 珠海金山办公软件有限公司 Method for rapidly establishing connection between mobile terminal and intelligent display equipment
CN105682088A (en) * 2014-11-18 2016-06-15 腾讯科技(武汉)有限公司 Wireless network sharing method and terminal
CN106851632A (en) * 2017-01-22 2017-06-13 海尔优家智能科技(北京)有限公司 A kind of smart machine accesses the method and device of WLAN
CN106850209A (en) * 2017-02-28 2017-06-13 苏州福瑞思信息科技有限公司 A kind of identity identifying method and device
CN108632056A (en) * 2017-03-17 2018-10-09 阿里云计算有限公司 A kind of smart machine network collocating method and system
CN111510919A (en) * 2019-01-31 2020-08-07 阿里巴巴集团控股有限公司 Network configuration method, device, equipment and system

Also Published As

Publication number Publication date
CN115769542A (en) 2023-03-07
CN114157413A (en) 2022-03-08

Similar Documents

Publication Publication Date Title
US10812969B2 (en) System and method for configuring a wireless device for wireless network access
US10601594B2 (en) End-to-end service layer authentication
CN111669276B (en) Network verification method, device and system
US10305684B2 (en) Secure connection method for network device, related apparatus, and system
CN107005927B (en) Access method, device and system of User Equipment (UE)
US20160269176A1 (en) Key Configuration Method, System, and Apparatus
US11044084B2 (en) Method for unified network and service authentication based on ID-based cryptography
US20190089530A1 (en) Secure Key Transmission Protocol without Certificates or Pre-shared Symmetrical Keys
WO2023280194A1 (en) Network connection management method and apparatus, readable medium, program product, and electronic device
US10680835B2 (en) Secure authentication of remote equipment
WO2019051776A1 (en) Key transmission method and device
US20100161958A1 (en) Device for Realizing Security Function in Mac of Portable Internet System and Authentication Method Using the Device
TW201304486A (en) Key generation in a communication system
WO2022111187A1 (en) Terminal authentication method and apparatus, computer device, and storage medium
WO2019019853A1 (en) Data processing method, terminal device, and network device
WO2014127751A1 (en) Wireless terminal configuration method, apparatus and wireless terminal
WO2015100675A1 (en) Network configuration method, and related device and system
CN108353279B (en) Authentication method and authentication system
WO2023083170A1 (en) Key generation method and apparatus, terminal device, and server
JP2007506329A (en) Method for improving WLAN security
WO2022116209A1 (en) Internet of things device access authentication method and apparatus, device, and storage medium
WO2022041151A1 (en) Device verification method, device, and cloud
CN109561431B (en) WLAN access control system and method based on multi-password identity authentication
CN114390521A (en) Key updating method, device, equipment and storage medium
JP7312279B2 (en) MOBILE NETWORK ACCESS SYSTEM, METHOD, STORAGE MEDIUM AND ELECTRONIC DEVICE

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21863196

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21863196

Country of ref document: EP

Kind code of ref document: A1