Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Key generation method, encrypted data analyzing method, devices and key managing center

A key management center, encryption data technology, applied in the field of communication, can solve the problem of low network security

Active Publication Date: 2016-05-11
QINGDAO HAIER INTELLIGENT HOME TECH CO LTD
View PDF8 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The present invention provides a method for generating a key, a method for analyzing encrypted data, a device, and a key management center, so as to solve the problem of low security in the prior art for configuring home appliances to access the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key generation method, encrypted data analyzing method, devices and key managing center
  • Key generation method, encrypted data analyzing method, devices and key managing center
  • Key generation method, encrypted data analyzing method, devices and key managing center

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0082] An embodiment of the present invention provides a method for generating a key, the method is executed by a key management center, see figure 1 , the method includes:

[0083] S101. Receive a key acquisition request sent by a terminal, where the key acquisition request carries a device identifier and a terminal identifier;

[0084] S102. Generate a key according to the key acquisition request, and send the key to the terminal, where the key is used to enable the terminal to securely communicate with the home appliance, so as to connect the home appliance with the home appliance A network connection, wherein the key uniquely corresponds to the key acquisition request.

[0085] The present invention generates the corresponding key according to the key acquisition request sent by the terminal, so that different key acquisition requests correspond to different keys, thereby greatly reducing the risk of key leakage, and effectively solving the problem of the prior art. The ...

Embodiment 2

[0169] corresponds to figure 1 The key generation method introduced, this embodiment provides a method for parsing encrypted data, the execution subject of this method is a home appliance, see Image 6 , the execution subject of this method is a home appliance, and this method includes:

[0170] S601. Receive encrypted data sent by the terminal, wherein the encrypted data is data obtained by the terminal encrypting preset networking data according to a key generated by the key management center, and the key is the Generated by the key management center according to the key acquisition request sent by the terminal, the key uniquely corresponds to the key acquisition request, and the key acquisition request carries a device identifier and a terminal identifier;

[0171] S602. Analyze the encrypted data to obtain the networking data, and access a network according to the networking data.

[0172] Since the keys of the present invention are all generated by the key management ce...

Embodiment approach

[0206] The embodiment of the present invention also provides a preferred implementation manner, the device further includes: a setting unit;

[0207] The setting unit is configured to pre-set the shared key corresponding to the household electrical appliance according to the household electrical appliance, and set a time stamp after receiving the key acquisition request;

[0208] The generating unit is specifically configured to generate the key according to the device identifier, the terminal identifier, the shared key, and the time stamp, and send the key to the terminal, so that the The terminal uses the key to securely communicate with the home appliance, and connects the home appliance to the network.

[0209] That is, the present invention pre-sets different shared keys according to different household appliances, generates the key with the shared key, the device ID, the terminal ID, and the time stamp, and sends the key to To the terminal, the terminal uses the key to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a key generation method, an encrypted data analyzing method, devices and a key managing center. According to the methods, the devices and the center of the invention, the key managing center receives a key obtaining request sent by a terminal; a key is generated according to the key obtaining request; the key is sent to the terminal; therefore, the terminal carries out secure communication with household appliances through the key; the household appliances are connected to a network; the key leakage risk is greatly reduced; and the problem in the prior art that the networking security of the configured household appliances is low is effectively solved.

Description

technical field [0001] The present invention relates to the technical field of communication, in particular to a method for generating a key, a method for analyzing encrypted data, a device and a key management center. Background technique [0002] The current method of connecting home appliances to the network is mainly to configure home appliances to network by sending multicast messages through mobile phones. Specifically, the mobile phone sends the obtained AP access information and key to the home appliances through multicast, and the home appliances receive the message. , configure access to the wireless access point AP. However, the keys in this method are all the same key, that is, the terminal uses the same key to interact with the home appliance, so that the risk of key leakage is relatively high. Contents of the invention [0003] The invention provides a method for generating a key, a method for analyzing encrypted data, a device, and a key management center, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L9/0863H04L9/0866H04L9/0869H04L9/3297H04L63/0428
Inventor 茹昭
Owner QINGDAO HAIER INTELLIGENT HOME TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products