Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

79 results about "Key establishment" patented technology

Method for key management and node authentication of sensor network

The invention relates to a method for key management and node authentication of a sensor network. The method comprises the following steps: 1) key pre-distribution, wherein a deployment server is used for establishing communication keys for the secure connection between nodes and distributing the communication keys to all the nodes before network deployment; 2) key establishment, wherein key pairs for the secure connection are established between nodes after the network deployment; and the step of key establishment further comprises the following steps: 2.1) the establishment of shared keys, wherein key pairs are established between adjacent nodes having the shared keys; and 2.2) the establishment of path keys, wherein key pairs are established between nodes having no shared keys but multi-hop secure connection; and 3) the authentication of node identities, wherein the identity authentication is carried out before the formal communication between nodes, so as to confirm the validity and effectiveness of the identity of the other party. The invention is capable of effectively resisting the attack on network communication, such as eavesdropping, tampering and resetting, achieving the secure communication between nodes, effectively saving the node resources of the sensor network and prolonging the service life of the sensor network.
Owner:CHINA IWNCOMM

Smart community home gateway-based safety payment method

The invention relates to a smart community home gateway-based safety payment method. The smart community home gateway-based safety payment method comprises the following steps: a, wirelessly connecting a home gateway with a terminal through a Zigbee mode and establishing a safety payment center in the home gateway; b, submitting a financial payment enabling request by the terminal and prompting the terminal to input a payment admission password by the home gateway; c, establishing a payment key by the safety payment center by using an SKKE (Symmetric-key Key Establishment) protocol; d, encrypting an MAC (Media Access Control) address of the home gateway by the safety payment center by using a binding key and transmitting to a bank server together with corresponding financial payment account and password; and e, checking the transmitted financial payment account, the password, the decrypted MAC address and the MAC address extracted in the transmitted information by the bank server, and performing payment operation when the financial payment account, the password, the decrypted MAC address and the MAC address extracted in the transmitted information are correspondingly consistent. The smart community home gateway-based safety payment method is convenient in payment operation, and the safety and the reliability of payment are improved.
Owner:JIANGSU HILLSUN INFORMATION IND

Key management and node authentication method for sensor network

A key management and node authentication method for a sensor network is disclosed. The method comprises the following steps of: 1) keys pre-distribution: before deploying the network, communication keys for establishing security connection between nodes are pre-distributed to all of nodes by a deployment server. 2) Keys establishment: after deploying the network, a pair key for the security connection is established between nodes, which includes the following steps of: 2.1) establishment of shared keys: the pair key is established between neighbor nodes in which the shared keys are existed; 2.2) path keys establishment: the pair key is established between the nodes in which there is no shared keys but there is a multi-hop security connection. 3) Node identity (ID) authentication: before formally communicating between nodes, the identity is authenticated so as to determine the legality and the validity of the identity of the other. It is possible for effectively resisting attacks such as wiretapping, tampering, and replaying and the like for the network communication, realizing the secret communication between the nodes, effectively saving resources of the nodes of the sensor network, and prolonging the service lift of the sensor network in the method.
Owner:CHINA IWNCOMM

Method and device for one-key establishment of communication connection between Bluetooth devices

InactiveCN105516897AThe connection is automatically establishedFirmly connectedConnection managementSubstation equipmentBluetoothEmbedded system
The invention provides a method and a device for one-key establishment of communication connection between Bluetooth devices. The method is realized by installing an application program in a smart phone and comprises the steps of obtaining Bluetooth authority and opening a Bluetooth function of the smart phone to enable that the smart phone can be searched by surrounding Bluetooth devices; controlling a Bluetooth adapter to search all the surrounding Bluetooth devices; judging whether a bound Bluetooth device exists; if the bound Bluetooth device exists uniquely, automatically connecting the Bluetooth device; otherwise, displaying the names of the multiple bound Bluetooth devices in a screen and automatically connecting the Bluetooth device which is selected by a user based on the selection of the user; and if no bound Bluetooth device exists, displaying the names of the searched Bluetooth devices in the screen one by one and then automatically connecting the Bluetooth device which is selected by the user based on the selection of the user. According to the method and the device for one-key establishment of communication connection between the Bluetooth devices, communication connection between two Bluetooth devices can be established automatically through one key, and the user can connect the smart phones by using the Bluetooth devices conveniently.
Owner:HARBIN INST OF TECH SHENZHEN GRADUATE SCHOOL

Key management and node authentication method for sensor network

A key management and node authentication method for a sensor network is disclosed. The method comprises the following steps of: 1) keys pre-distribution: before deploying the network, communication keys for establishing security connection between nodes are pre-distributed to all of nodes by a deployment server. 2) Keys establishment: after deploying the network, a pair key for the security connection is established between nodes, which includes the following steps of: 2.1) establishment of shared keys: the pair key is established between neighbor nodes in which the shared keys are existed; 2.2) path keys establishment: the pair key is established between the nodes in which there is no shared keys but there is a multi-hop security connection. 3) Node identity (ID) authentication: before formally communicating between nodes, the identity is authenticated so as to determine the legality and the validity of the identity of the other. It is possible for effectively resisting attacks such as wiretapping, tampering, and replaying and the like for the network communication, realizing the secret communication between the nodes, effectively saving resources of the nodes of the sensor network, and prolonging the service lift of the sensor network in the method.
Owner:CHINA IWNCOMM

Shared secret key establishment method between wireless equipment based on receiving signal intensity

The invention discloses a shared secret key establishment method between wireless equipment based on receiving signal intensity. The method comprises the steps that 1) a security isolation environment is created for two sets of wireless equipment; 2) initiation equipment transmits multiple authentication requests to response equipment according to the set transmitting power and the set time interval; 3) the response equipment calculates the standard deviation of the receiving signal intensity; and if the standard deviation of the receiving signal intensity is less than a threshold value, an authentication passing message is replied to the initiation equipment, or authentication is not passed; 4) the initiation equipment generates a secret key K of which length is m bits, and then transmits m data packets to the response equipment; 5) the response equipment records the signal receiving intensity of the m data packets and recovers a secret key K' of which length is m bits according to m receiving signal intensity, and then replies a message encrypted by the secret key K'; and 6) the initiation equipment performs decryption by using the secret key K, and replies an authentication success message if decryption is successful so that secret key sharing is completed. Communication security is greatly enhanced by the shared secret key establishment method between the wireless equipment based on the receiving signal intensity.
Owner:INST OF INFORMATION ENG CAS +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products