Unlock instant, AI-driven research and patent intelligence for your innovation.

A key configuration method and system for network communication

A configuration method and network communication technology, applied in the field of cryptography, can solve problems such as insecure key transmission, inability to change the initial key, troublesome key change operation, etc., and achieve the effect of solving security

Active Publication Date: 2016-06-08
深圳慧锐通智能技术股份有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the present invention is that the communication system in the prior art is often unable to change the initial key, or when changing the initial key, it will encounter technical defects such as troublesome key change operation and insecure key transmission. Key configuration method and system for network communication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A key configuration method and system for network communication
  • A key configuration method and system for network communication
  • A key configuration method and system for network communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to have a clearer understanding of the technical features, purposes and effects of the present invention, the specific implementation manners of the present invention will now be described in detail with reference to the accompanying drawings.

[0030] Such as figure 1 As shown, it is a flow chart of the first embodiment of the key configuration method for network communication of the present invention, which uses the mobile phone and the home gateway in the smart home system, and the mobile phone sends control commands to the home through 3G, 4G networks, and the Internet. The gateway can thus control each smart home, and can also send control commands to the home gateway through WIFI, Bluetooth and other local area networks to control each smart home. When the key is configured in this embodiment, the home gateway and the mobile phone communicate through a WIFI connection, that is, the two are in the same network segment of the same home gateway. That is, in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secret key configuration method and system in a network communication. When a secret key is configured, a configuration end and a configured end are in the same network segment of the same local area network, and each is stored with an initial secret key, a first preset rule and a second preset rule, the method comprises the following steps: S1, the configuration end encrypting a number of random characters through the adoption of the initial secret key and then broadcasting; S2, the configured end decrypting to obtain the number of random characters, and generating a first secret key through the adoption of information containing the number of random characters, and encrypting an identity label; S3, the configuration end generating the first secret key and decrypting to obtain the identity label, generating a second secret key through an identity label operation so as to encrypt a communication secret key; S4, the configured end generating the second secret key, and decrypting to obtain the communication secret key. The secret key configuration method disclosed by the invention has the beneficial effect that a safe and reliable secret key transmission method is provided between the configuration end and the configured end to solve the security of the secret key transmission in the local area network.

Description

technical field [0001] The present invention relates to the field of cryptography, and more specifically, relates to a key configuration method and system for network communication. Background technique [0002] In the existing common symmetric cryptography, the encryption algorithm and the decryption algorithm use the same key, which is generally preset at the initiator and receiver respectively. Among them, when the initiator sends a message to the receiver, the initiator encrypts the message to be sent with a key, and sends the encrypted information, and the receiver uses the same key to decrypt the information sent by the sender Get the message sent by the sender. Therefore, the security of the message mainly depends on the security of the key. Once the key is cracked, the content of the message may be leaked. The existing symmetric cryptography is widely used because of its simplicity and high efficiency. [0003] In the existing communication systems, a large part o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0861H04L63/068
Inventor 李建文何树万姚爱国李全彬肖明超朱刚严凤英李家才
Owner 深圳慧锐通智能技术股份有限公司