Unlock instant, AI-driven research and patent intelligence for your innovation.

A communication device and its method and system for negotiating a key with a terminal

A technology of a communication device and terminal, applied in the field of communication security, can solve the problems of low security, easy to be stolen or monitored, and the basic security of smart home is not highly valued, and achieve the effect of improving security.

Active Publication Date: 2021-07-20
FEITIAN TECHNOLOGIES
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] With the rapid development of the smart home field in recent years, smart door locks are gradually being widely accepted, but as a basic security issue that reflects smart homes, they are not highly valued; for example, the communication information between the terminal and the smart door lock is based on Transmission in plain text is easy to be stolen or monitored, and the security is extremely low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A communication device and its method and system for negotiating a key with a terminal
  • A communication device and its method and system for negotiating a key with a terminal
  • A communication device and its method and system for negotiating a key with a terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] Embodiment 1 of the present invention provides a method for negotiating a key between a communication device and a terminal; the communication device is used for interactive communication between the smart door lock and the terminal. Before this method, the terminal and the communication device perform an initialization process. During the initialization process, the terminal Generate a second symmetric key and store it corresponding to the symmetric key ID, the communication device generates a first symmetric key and store it correspondingly to the symmetric key ID, the first symmetric key is the same as the second symmetric key; the method is as follows figure 1 shown, including the following steps:

[0057] Step 101: the terminal generates a first random number; sends the first random number and the preset symmetric key ID to the communication device;

[0058] Optionally, before step 101, the following steps are also included:

[0059] Step A1: The terminal connects...

Embodiment 2

[0118] The second embodiment provides a method for negotiating a key between a terminal and a communication device. The communication device is used for interactive communication between the smart door lock and the terminal, such as figure 2 shown, including the following steps:

[0119] Step E1: The communication device receives the first random number and the symmetric key ID sent by the terminal, retrieves the first symmetric key stored corresponding to the symmetric key ID according to the received symmetric key ID; generates a second random number; A symmetric key, the second random number and the received first random number to obtain the first ciphertext data; sending the second random number and the first ciphertext data to the terminal;

[0120] Optionally, in step E1, the first ciphertext data is obtained according to the first symmetric key, the second random number and the received first random number, specifically:

[0121] The communication device calculates th...

Embodiment 3

[0148] The third embodiment provides a method for negotiating a key between a communication device and a terminal. The communication device is used for interactive communication between the smart door lock and the terminal, such as image 3 shown, including the following steps:

[0149] Step 301: The terminal performs a Bluetooth connection with the communication device, and when the Bluetooth connection is successful, execute step 302;

[0150] Optionally, the terminal and the communication device can also be connected through other communication methods, such as ZigBee;

[0151] Step 302: the terminal generates and saves the first private key and the first public key; generates a key exchange request according to the first public key, and sends the key exchange request to the communication device;

[0152] For example, the first private key includes 32 bytes, which is A8992255B6CB2276A8CFDB786FD6FBCABFE20D355787914327D8E717BB43FCFE;

[0153] The first public key includes 6...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a communication device and a method and system for negotiating a key with a terminal, and relates to the field of communication security; the method includes that the communication device receives a first random number and a symmetric key ID sent by a terminal, The key ID retrieves the first symmetric key stored corresponding to the symmetric key ID; generates a second random number; obtains the first ciphertext data according to the first symmetric key, the second random number and the received first random number; sends The second random number and the first ciphertext data are sent to the terminal; the third ciphertext data sent by the terminal is received, and the fourth ciphertext data is obtained according to the retrieved first symmetric key and the second random number, when the fourth ciphertext data When it is equal to the received third ciphertext data, the first session data is obtained according to the first random number, the second random number and the first symmetric key, and the first session data is saved as the session key; the authentication success message is sent to terminal.

Description

technical field [0001] The present invention relates to the field of communication security, in particular to a method, system and communication device for negotiating keys between a communication device and a terminal. Background technique [0002] With the development of the era of science and technology, locks have also undergone many updates. Smart door locks refer to locks that are different from traditional mechanical locks and are more intelligent in terms of user identification, security, and management. Smart door lock is a mature technology that uses non-mechanical keys as user identification, such as: fingerprint lock, iris recognition access control, magnetic card, radio frequency card and contact card, etc.; smart door lock is safe, reliable, convenient and fast. [0003] With the rapid development of the smart home field in recent years, smart door locks are gradually being widely accepted, but as a basic security issue that reflects smart homes, they are not h...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0838H04L9/0869H04L63/0869
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES