Key negotiation method and electronic device

A technology of key agreement and electronic equipment, which is applied in the field of communication, can solve the problems of low efficiency, achieve the effects of improving efficiency, reducing the number of message interactions, and reducing the risk of being attacked

Active Publication Date: 2020-03-27
HUAWEI TECH CO LTD
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the prior art, the session key is obtained by the mobile phone through end-to-station (station to station, STS) negotiation with the IoT device after discovering the IoT device. This method of obtaining the session key is inefficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key negotiation method and electronic device
  • Key negotiation method and electronic device
  • Key negotiation method and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] It should be understood that unless otherwise stated in this application, " / " means or. For example, A / B can mean either A or B. The "and / or" in this application is only an association relationship describing associated objects, indicating that there may be three relationships. For example, A and / or B may mean: A exists alone, A and B exist simultaneously, and B exists alone. "At least one" means one or more. "A plurality" means two or more than two. For example, at least one of a, b or c can represent: a, b, c, a and b, a and c, b and c, a, b and c seven situations.

[0053] In this application, "exemplary," "in some embodiments," "in other embodiments," etc. are used to mean examples, illustrations, or illustrations. Any embodiment or design described herein as "example" is not to be construed as preferred or advantageous over other embodiments or designs. Rather, the use of the word example is intended to present concepts in a concrete manner.

[0054] In addit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a key negotiation method and an electronic device, and relates to the technical field of communication. Specifically, the method comprises the following steps: an IoT control device multicasting a discovery message carrying a first public key in a first local area network, and sending a second ciphertext to a first IoT device after receiving a first ciphertext and a secondpublic key; after receiving the third ciphertext from the first IoT device, the IoT control device decrypting the third ciphertext according to the first session key to obtain a second signature and second session information; verifying the second signature based on the long-acting public key of the first IoT device; and after the second signature is successfully verified, performing encrypted communication with the first IoT device based on the first session key. According to the technical scheme, the IoT control device carries the first public key in the discovery message, so that the STS negotiation process is fused into the discovery process, the number of times of message interaction between the IoT device and the IoT control device is reduced, and the efficiency of obtaining the session key is improved.

Description

technical field [0001] The present application relates to the technical field of communications, and in particular to a key agreement method and electronic equipment. Background technique [0002] After an Internet of Things (Internet of Things, IoT) device is connected to a network, a user can control the IoT device through an IoT application program (hereinafter referred to as an IoT application) installed on a mobile phone. Taking the IoT device as a smart desk lamp as an example, the user performs corresponding operations on the IoT application installed on the mobile phone, so that the mobile phone can respond to the user's operation and send control commands to the smart desk lamp, thereby realizing the control of the smart desk lamp, such as controlling the smart desk lamp. The desk lamp is turned on or off, etc. [0003] In order to ensure the security of the communication between the mobile phone and the IoT device, a session key is usually used to encrypt the comm...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00H04W12/04H04L9/08H04W12/0431
CPCH04W12/04H04L9/0869H04L9/0838H04W12/03H04L9/3247H04L2209/805H04W12/009H04W12/047H04W12/108H04W4/70H04L67/51G16Y30/10H04L9/0618H04L9/0819
Inventor 甘璐黄剑豪马小双周冲
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products