Supercharge Your Innovation With Domain-Expert AI Agents!

Method, system and equipment for safe switch configuration

A configuration method and a technology for configuring a system, applied in the field of communication, can solve problems such as not considering the re-acquisition of credentials between the Client and the new Master, not providing a method for obtaining credentials, and not involving switching D2DMaster device negotiation processes, etc., to achieve safe switching The effect of the configuration

Active Publication Date: 2013-06-12
HUAWEI DEVICE CO LTD
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] However, the above-mentioned technical methods are some basic methods for creating short-distance secure communication domains. They do not involve the device negotiation process of switching D2D Masters, and do not consider whether each Client and the new Master need to obtain a new certificate of trust when switching D2D Masters. How to obtain the certificate of trust with the new Master

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and equipment for safe switch configuration
  • Method, system and equipment for safe switch configuration
  • Method, system and equipment for safe switch configuration

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only part of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0034] The embodiment of the present invention provides a secure handover configuration method to realize the secure handover configuration of wireless star device-to-device network connection D2D master device.

[0035] Such as figure 1 As shown, it is a flow chart of a security handover configuration method according to an embodiment of the present invention, including:

[0036] Step S101, obtaining the configuration password of the client or ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a method, a system and equipment for safe switch configuration. The safe switch configuration method is used for performing safe configuration when D2D master control equipment is switched from wireless star equipment to an equipment network D2D, and comprises the following steps: acquiring a configuration cipher of a client or a work key between the client and on-duty master control equipment; according to the acquired configuration cipher or the work key, performing wireless fidelity protected setup WPS negotiation with the client, and generating a work key between the client and designated master control equipment; and sending the generated work key to the client. A subsequent client can establish connection with the designated master control equipment according to the generated work key, so the safe switch configuration of the master control equipment from the wireless star equipment to the equipment network D2D is realized.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of communications, and in particular, to a security handover configuration method, system, and equipment. Background technique [0002] WPS (Wireless Fidelity Protected Setup, Wireless Fidelity Protected Setup) protocol is a standard for providing simple security settings for wireless home networking. Its basic idea is to use a register to manage AP (Access point, access point) With the installation and addition of application devices, users only need to complete relatively simple tasks such as inputting passwords or pressing buttons, comparing and displaying information, etc., to easily obtain the credential for subsequent network transmission data. The WPS standard emphasizes the two aspects of convenient operation and safety. The WPS configuration method can be based on two mechanisms, in-band or out-of-band, where in-band refers to the wireless channel of WI-FI (Wireless Fideli...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/24
Inventor 刘茜蕾丁志明杨永利树贵明
Owner HUAWEI DEVICE CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More