A security association method, device and system
A security association and routing technology, applied in the field of information security, can solve problems such as limited use range, inability to ensure industrial wireless network security, and the difficulty of implementing security association methods, achieving the effect of ensuring communication security and a wide range of applications
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0047] see figure 1 It is a schematic flowchart of a security association method provided by Embodiment 1 of the present invention, the method is applied to field devices, and the method includes the following steps:
[0048] S11. The field device establishes a connection with the routing device through a network interface;
[0049] It can be understood that the essence of the so-called security association is to realize the authentication pairing between the field device and the routing device and the configuration of the shared key, wherein the configuration of the shared key includes two cases, one case is to enable a pre- Stored in the shared key of the two devices; another case is that the two devices generate a shared key through key agreement, and the embodiment of the present invention describes the latter case.
[0050] S12. Send the generated first random number to the routing device;
[0051] S13. Receive the second random number and the first signature sent by th...
Embodiment 2
[0065] see figure 2 A security association method provided in Embodiment 2 of the present invention is applicable to routing devices, and the method includes the following steps:
[0066] S21. The routing device establishes a connection with the field device through a network interface;
[0067] S22. After receiving the first random number sent by the field device, generate a second random number, calculate and obtain a first signature according to the first random number and the second random number, and use the second random number and sending the first signature to the field device;
[0068] S23. Receive the second signature sent by the field device, and verify the second signature. If the verification is passed, generate a random key, encrypt the random key to obtain a ciphertext, and calculate according to the ciphertext to obtain the second signature. three signatures, and send the third signature to the field device, wherein the second signature is the field device a...
Embodiment 3
[0074] Corresponding to the security association method disclosed in Embodiment 1 of the present invention, Embodiment 3 of the present invention also provides a security association device, see image 3 , the device is applied to field equipment, and the device includes:
[0075] The first connection module 11 is configured to establish a connection between the field device and the routing device through a network interface;
[0076] The first sending module 12 is configured to send the generated first random number to the routing device;
[0077] The first receiving module 13 is configured to receive the second random number and the first signature sent by the routing device, wherein the first signature is the second random number generated by the routing device itself and the received first signature. The first signature generated by random number calculation;
[0078] The first verification module 14 is used to verify the first signature, and if the verification is passe...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


