Key agreement method and device, storage medium and system

A technology for key negotiation and equipment, which is applied in the field of information security and can solve problems such as legality verification of new equipment

Inactive Publication Date: 2019-01-18
MIDEA GRP CO LTD
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the already configured network equipment generally does no

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key agreement method and device, storage medium and system
  • Key agreement method and device, storage medium and system
  • Key agreement method and device, storage medium and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0090] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0091] The invention provides a key negotiation method. The invention realizes that the equipped network equipment automatically searches for the undistributed network equipment, and after verifying that the undistributed network equipment is legal, it encrypts the distribution network information and sends it to the undistributed network equipment, realizing the undistributed network equipment. Network devices automatically connect to the network, thereby improving the communication security of home devices.

[0092] like figure 1 as shown, figure 1 It is a schematic diagram of the hardware operating environment of the terminal involved in the solution of the embodiment of the present invention.

[0093] The terminal in this embodiment of the present invention may be a smart device, such as an air conditioner, an a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a key agreement method, which comprises the following steps: when a distributed network device discovers an undistributed network device, a first random number is generated, and the first random number is sent to the undistributed network device; at that time of receiving the key negotiation request message, the distribute network equipment obtains the public key of the undistributed network equipment and the cipher text data according to the key negotiation request message; the ciphertext data is decrypted through the public key of the undistributed network device to obtain a second random number; when the second random number coincides with the first random number, the allocated network device performs key agreement with the unallocated network device. The invention also discloses a device, a computer-readable storage medium and a key agreement system. The invention realizes the automatic connection of the unallocated network equipment to the network, therebyimproving the communication safety of the household equipment.

Description

technical field [0001] The present invention relates to the technical field of information security, and in particular to a key agreement method, a network-distributed device, an undistributed network device, a computer-readable storage medium, and a key agreement system. Background technique [0002] With the continuous development of information technology, smart devices are widely used in life. When a new device is configured to the network, generally the configured network device directly broadcasts the key, and sends the network configuration information to the new device, so that the new device can join the network. However, the already configured network equipment generally does not verify the validity of the new equipment, which has certain risks. [0003] The above content is only used to assist in understanding the technical solution of the present invention, and does not mean that the above content is admitted as prior art. Contents of the invention [0004] T...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0838H04L9/0844H04L9/3236H04L9/3239H04L9/3247
Inventor 罗振华刘复鑫江锦红
Owner MIDEA GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products