Network secret key interaction system, device and method

A technology of network keys and interactive information, which is applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve problems such as information leakage, poor wireless network communication security, and damage to the interests of multiple parties, and achieve the effect of improving security

Active Publication Date: 2018-11-09
BEIJING UNIV OF POSTS & TELECOMM
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the Internet of Things, in order to ensure the efficiency of communication, the existing wireless network communication protocol mainly adopts the measures of unencrypted or less encrypted data transmission; the unencrypted data transmission method means that the encryption is canceled during the communication process. link, which makes the communication information easy to be stolen, and it is easy to cause damage to the interests of multiple parties; the less encrypted data transmission method mainly uses the factory-set predefined key for data encryption transmission; although the data security is guaranteed to a certain extent , but the predefined key cannot be changed, once stolen, it will also cause information leakage
[0004] Therefore, the poor security of wireless network communication has become an urgent problem to be solved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network secret key interaction system, device and method
  • Network secret key interaction system, device and method
  • Network secret key interaction system, device and method

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach

[0080] In the above process (1), the first interaction information also carries the first timestamp T encrypted with the security key ks i1 .

[0081] In process (2), the second device will use the security key ks to encrypt the first time stamp T i1 To decrypt, obtain and save T i1 .

[0082] In the process (4), the second device is also used to use the network key K NWK For the first timestamp T i1 Perform encryption to generate timestamp encrypted information; carry the timestamp encrypted information in the fourth interaction information ω, and send the fourth interaction information ω to the first device.

[0083] Wherein, the fourth mutual information ω satisfies the following formula: ω=(T i1 )K NWK .

[0084] In addition, the fourth interaction information ω may also be generated based on other information exchanged between the first device and the second device during the foregoing interaction process, such as first round information, second round information, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network secret key interaction system, device and method. The system comprises a first device and a second device, wherein the first device is used for sending the generated first interaction information to the second device; the second interaction information sent by the second device after reception of the first interaction information is received; based on the first round of information contained by the first interaction information and the second round of information contained by the second interaction information, a temporary transmission secret key is generated;after the temporary transmission secret key is utilized to encrypt a randomly-generated network secret key, the network secret key is contained in the third interaction information, and the third interaction information with the network secret key is sent to the second device; after the third interaction information is received by the second device, a temporary transmission secret key is generatedbased on the first round of information contained by the first interaction information and the locally-generated second round of information, and the generated temporary transmission secret key is utilized to obtain the network secret key contained in the third interaction information. The system is advantaged in that the network secret key can be negotiated by multiple handshakes, the network secret key can be replaced in time when the network secret key is stolen, and security of wireless network communication is improved.

Description

technical field [0001] The present application relates to the field of data security, in particular, to a network key interaction system, device and method. Background technique [0002] With the continuous development of the Internet of Things technology, the application of the Internet of Things is becoming more and more extensive, and the scale is becoming larger and larger. IoT devices generally use wireless network communication protocols such as ZigBee to communicate. [0003] In the Internet of Things, in order to ensure the efficiency of communication, the existing wireless network communication protocol mainly adopts the measures of unencrypted or less encrypted data transmission; the unencrypted data transmission method means that the encryption is canceled during the communication process. link, which makes the communication information easy to be stolen, and it is easy to cause damage to the interests of multiple parties; the less encrypted data transmission met...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0838H04L9/0869H04L63/0428H04L63/061H04L63/08
Inventor 杨俊刘芮青崔宝江姚绅
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products