Method and system for accessing wireless network

A wireless network and node device technology, applied in the field of wireless network access, can solve problems such as loss of temporary keys, hidden dangers of network security, increase in the complexity of the production process and production costs, and achieve the effects of strong randomness and improved security

Active Publication Date: 2017-07-07
SHENZHEN SHENDIE SEMICON
View PDF10 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Since most wireless smart devices do not have man-machine interface and OOB (Out Of Band), users can only obtain temporary keys through the QR code or bar code on the product packaging box, which directly increases the complexity of the production process and the Production costs, and it is easy to cause the temporary key to be lost and easily obtained by a third party, causing network security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for accessing wireless network
  • Method and system for accessing wireless network
  • Method and system for accessing wireless network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] In view of the shortcomings in the prior art that it is usually necessary to obtain a temporary key through a QR code or a barcode on the product package, which increases the cost of generation, the purpose of the present invention is to provide a method and system for accessing a wireless network, by controlling the switch of the node device Temporary keys are generated multiple times without increasing production costs such as QR codes or barcodes, and the temporary keys are highly random, which effectively improves the security of data interaction between smart devices in the wireless network.

[0054] In order to make the objectives, technical solutions and effects of the present invention clearer and clearer, the present invention will be further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, but not to limit the p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and system for accessing a wireless network. The method for accessing the wireless network comprises the following steps: performing paired feature switching on the controller and the node device; prompting the user to enter a temporary key generated by controlling the number of the on-off of the node device on the controller; performing matching validation according to the temporary key entered by the user, and generating a short-term key according to the temporary key after the verification is successful; and establishing an encrypted connection between the controller and the node device according to the short-term key, and completing the encrypted data interaction. According to the invention, the temporary key is generated by controlling the number of the on-off of the node device, therefore, the production costs such as two-dimensional codes or bar codes are not required to increase; and the randomness of the temporary key is strong, therefore, the security of data interaction between the intelligent devices in the wireless network is effectively improved.

Description

Technical field [0001] The present invention relates to the technical field of wireless networks, in particular to a method and system for accessing a wireless network. Background technique [0002] During the pairing process of devices in the wireless network, when a predictable or easily ascertainable temporary key (TK) value is used, there is no pairing method to provide protection against eavesdropping during the pairing process. In the traditional technical solution, a unique temporary key or the same temporary key is usually assigned to the smart device during the production process and stored in the smart device; after the user purchases the product, the key is obtained and the secret The key is input into the controller for pairing. After the pairing is successful, a secure link can be established between the smart device and the controller, that is, after the pairing operation is completed with the temporary key, the smart device and the controller agree on a long-term s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W76/02H04L9/08H04L29/06H04W12/04H04W12/08
CPCH04L9/0819H04L9/0861H04L63/062H04W12/04H04W12/08H04W76/10
Inventor 陈峰邓迅升陈博
Owner SHENZHEN SHENDIE SEMICON
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products