A key agreement method and electronic equipment

A key agreement and device technology, applied in the field of communication, can solve problems such as low efficiency

Active Publication Date: 2021-11-30
HUAWEI TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the prior art, the session key is obtained by the mobile phone through end-to-station (station to station, STS) negotiation with the IoT device after discovering the IoT device. This method of obtaining the session key is inefficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A key agreement method and electronic equipment
  • A key agreement method and electronic equipment
  • A key agreement method and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] It should be understood that unless otherwise stated in this application, " / " means or. For example, A / B can mean either A or B. The "and / or" in this application is only an association relationship describing associated objects, indicating that there may be three relationships. For example, A and / or B may mean: A exists alone, A and B exist simultaneously, and B exists alone. "At least one" means one or more. "A plurality" means two or more than two. For example, at least one of a, b or c can represent: a, b, c, a and b, a and c, b and c, a, b and c seven situations.

[0053] In this application, "exemplary," "in some embodiments," "in other embodiments," etc. are used to mean examples, illustrations, or illustrations. Any embodiment or design described herein as "example" is not to be construed as preferred or advantageous over other embodiments or designs. Rather, the use of the word example is intended to present concepts in a concrete manner.

[0054] In addit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A key agreement method and electronic equipment relate to the technical field of communications. Specifically, the method includes: the IoT control device multicasts a discovery message carrying the first public key in the first local area network, and after receiving the first ciphertext and the second public key, sends the second ciphertext to the first IoT device. ciphertext. After receiving the third ciphertext from the first IoT device, the IoT control device decrypts the third ciphertext according to the first session key to obtain the second signature and the second session information; and based on the long-term public information of the first IoT device, key to verify the second signature; after the second signature is successfully verified, encrypt communication with the first IoT device based on the first session key. In this technical solution, since the IoT control device carries the first public key in the discovery message, the STS negotiation process is integrated into the discovery process, thereby helping to reduce the number of message interactions between the IoT device and the IoT control device, and improving Get the efficiency of the session key.

Description

technical field [0001] The present application relates to the technical field of communications, and in particular to a key agreement method and electronic equipment. Background technique [0002] After an Internet of Things (Internet of Things, IoT) device is connected to a network, a user can control the IoT device through an IoT application program (hereinafter referred to as an IoT application) installed on a mobile phone. Taking the IoT device as a smart desk lamp as an example, the user performs corresponding operations on the IoT application installed on the mobile phone, so that the mobile phone can respond to the user's operation and send control commands to the smart desk lamp, thereby realizing the control of the smart desk lamp, such as controlling the smart desk lamp. The desk lamp is turned on or off, etc. [0003] In order to ensure the security of the communication between the mobile phone and the IoT device, a session key is usually used to encrypt the comm...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/03H04W12/0431H04L9/08H04W12/00
CPCH04W12/04H04L9/0869H04L9/0838H04W12/03H04L9/3247H04L2209/805H04W12/009H04W12/047H04W12/108H04W4/70H04L67/51G16Y30/10H04L9/0618H04L9/0819
Inventor 甘璐黄剑豪马小双周冲
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products