Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Distributed key generation and authentication method and communication device for executing method

A technology for communication equipment and key generation, applied in key distribution, which can solve the problems that ZigBee and ZigBeePro networks cannot be applied, increase the risk of key leakage, increase the amount of network data, etc., and achieve good success rate and authentication speed , save hardware cost, easy to integrate

Pending Publication Date: 2020-10-16
ESPRESSIF SYST SHANGHAI
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] 2. The device installation code needs to be burned in the safe storage area, and the general flash storage area cannot meet the corresponding requirements, which will increase the cost;
[0013] 3. In the process of transmitting the device installation code to the network control device, other secure transmission channels are needed, and this transmission channel may also be cracked;
[0014] 4. The process of application key distribution requires the intervention of intermediate devices, which increases the amount of network data on the one hand, and increases the risk of key leakage on the other hand;
[0015] 5. The method of enhancing the security level through the device installation code will have standard compatibility issues, and this method cannot be applied to ZigBee and ZigBee Pro networks; and
[0016] 6. The method of enhancing the security level through the device installation code requires that the two communicating devices must use the device installation code at the same time. If one of the devices does not use the device installation code, the application data will be exposed and the security requirements will not be met.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed key generation and authentication method and communication device for executing method
  • Distributed key generation and authentication method and communication device for executing method
  • Distributed key generation and authentication method and communication device for executing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] like figure 1 , 2 As shown, in a preferred embodiment of the present invention, a distributed key generation and authentication method for a wireless network of the present invention implemented in a ZigBee wireless network, and a communication method for implementing the method in a ZigBee wireless network are provided The application layer architecture of the device. based on figure 1 The illustrated method can be used in two ZigBee wireless networks such as figure 2 Application keys are generated and authenticated between the depicted communication devices (ie, the first communication device and the second communication device) for subsequent encrypted data transmission between the two communication devices. For the confidentiality of encrypted data, reference may be made to level 2 in the aforementioned levels, that is, commercial-level confidentiality.

[0042] In this embodiment, the two communication devices are, for example, an electricity meter and a meter...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a distributed key generation and authentication method of a wireless network. The method is used for generating and authenticating an application key between two communicationdevices in the same wireless network for subsequent encrypted data transmission between the two communication devices. Both communication devices have a trigger switch, and the two communication devices are triggered to generate an application key and authenticate the application key by externally operating the trigger switch. The invention also provides a communication device for performing the distributed key generation and authentication method of the wireless network. A user operates a trigger key from the outside to enable communication device to enter an authentication interaction state,and the transmitting power of broadcasting and transmitting information is additionally limited when the communication device executes the distributed key generation and authentication method of thewireless network, the invention provides a high-security-level data transmission system, and the leakage risk of data transmission in the wireless network is effectively avoided.

Description

technical field [0001] The present invention relates to the technical field of wireless communication, and in particular, to a distributed key generation and authentication method for a wireless network and a communication device for executing the method. Background technique [0002] Since the construction of a wireless communication network (ie, a wireless network) is not limited by geographical environment like a wired network, it is widely used and enables wireless communication users to communicate on the move. These advantages of wireless networks all come from the wireless communication channel they use, and the wireless communication channel is an open channel, which not only gives wireless communication users freedom of communication, but also brings some insecurity factors to the wireless network, such as in the network. The communication content between the communicating devices is easy to be eavesdropped, the communication content can be changed, and the identiti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/04H04L9/08
CPCH04L9/0819H04L9/0825H04L9/0869Y02D30/70
Inventor 徐俊俊
Owner ESPRESSIF SYST SHANGHAI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products