Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

43 results about "Pairwise key" patented technology

Bridge-type-based wireless sensing network key management scheme

The invention relates to a bridge-type-based wireless sensing network key management scheme. The bridge-type-based wireless sensing network key management scheme includes the following steps that firstly, key pre-allocation is carried out, and namely allocation information is preset onto each sensor node by a starting server before node deployment; secondly, in the clustering phase, after cluster head nodes are selected, the clustering phase begins immediately, and each sensor node is added to the corresponding nearest cluster in the clustering process; thirdly, in the neighbor node discovery phase, whether other nodes are to be recorded as neighbor nodes or not is determined by each sensor according to the included angle calculation formula; fourthly, intra-cluster matched keys are built, wherein matched keys between each sensor node and other neighbor nodes are worked out through the bridge type; fifthly, inter-cluster matched keys are built, wherein matched keys between each cluster head node and other cluster head nodes are worked out through symmetric bivariate polynomials. By means of the scheme, on the premise that a certain connection rate is guaranteed, information transfer safety and effectiveness can be guaranteed, and the memory space of a memory is well saved.
Owner:BEIJING INSTITUTE OF TECHNOLOGYGY

IOS equipment and bluetooth peripheral equipment pairing method and device

The invention provides an iOS equipment and bluetooth peripheral equipment pairing method and device, and belongs to the technical field of communication. The iOS equipment and bluetooth peripheral equipment pairing method mainly comprises the steps that iOS equipment and bluetooth peripheral equipment establish physical connection; the iOS equipment transmits data request information to the bluetooth peripheral equipment, and the bluetooth peripheral equipment returns data response information carrying equipment identification information; the iOS equipment initiates a pairing request according to the equipment identification information; the iOS equipment generates first pairing key information, and the bluetooth peripheral equipment generates second pairing key information; the bluetooth peripheral equipment transmits the second pairing key information to the iOS equipment, and the second pairing key information is displayed on the iOS equipment; and the iOS equipment confirms consistency of the first pairing key information and the second pairing key information, and pairing is completed if the first pairing key information and the second pairing key information are consistent. Input operation and display information of the bluetooth peripheral equipment without input equipment or display screen are enabled to be operated on the iOS equipment so that the security of the pairing process can be enhanced, and the bluetooth peripheral equipment is enabled not to only passively select the Just Works pairing mode.
Owner:FUJIAN LANDI COMML EQUIP CO LTD

A key management and identity authentication method based on wireless sensor network

The invention discloses a key management and identity authentication method based on a wireless sensor network, which comprises the following steps: S1, establishing a matrix M containing five-tuple information of a plurality of neighboring nodes; S2, establishing a matrix M containing five-tuple information of a plurality of neighboring nodes; S3, establishing a matrix M containing five-tuple information of the neighboring nodes. 2, judging whether that req node is included in the matrix M, if so, turning to S3, otherwise turning to S5; S3, judging whether the quintuple information of the requesting node is valid, if so, turning to S4, otherwise refusing communication; S4, the requested node and the requesting node authenticate through the key distribution center to generate a pairing key; S5, searching the relay node according to the respective communication areas of the requesting node and the requested node, and then repeating S3 to S4 between the relay node and the requesting node, and repeating S3 and S4 between the relay node and the requested node. The invention can achieve the purposes of reducing node resource storage consumption, improving forward and backward safety between nodes and resisting replay attack.
Owner:NANJING UNIV OF POSTS & TELECOMM

Wireless sensor network dynamic encryption method based on encryption parameter lists

The invention discloses a wireless sensor network dynamic encryption method based on encryption parameter lists. First of all, before networking, according to types of nodes, an encryption parameter list for each node is stored in sequence by a deployment server; afterwards, a communication starter first finishes message encryption according to identity information of a receiver, pairwise keys and encryption parameters and then sends the message; and finally, the receiver finishes the operation of message decryption according to identity information of the receiver, pairwise keys and parameter information in the message. According to the invention, an independent encryption parameter list for each node is prestored, and dynamic encryption of the message is finished in combination with an ordinary key management mechanism, so that confidentiality of data is enhanced, and real-time and flexible data encryption is finished without updating keys frequently or storing a plurality of keys at one time; and meanwhile, encryption parameter lists are stored in the nodes in a prestored manner, so that security of encryption parameter lists and confidentiality of data transmission are enhanced, then the threats of information disclosure and key decoding caused by easiness in eavesdropping in the wireless environment can be dealt with.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

Bluetooth pairing method supporting identity authentication, security chip and Bluetooth module

ActiveCN113329386ACredible GuaranteeImprove pairing autonomyShort range communication serviceSecurity arrangementKey exchangeEngineering
The invention relates to the technical field of security. The embodiment of the invention provides a Bluetooth pairing method supporting identity authentication, a security chip and a Bluetooth module. The Bluetooth pairing method supporting identity authentication is based on a key exchange protocol of an identification cryptographic algorithm, and comprises the following steps: acquiring an identity identifier of an opposite-end Bluetooth module; generating exchange data according to the obtained identity label and the identity label of the Bluetooth module at the home terminal; generating a negotiation key according to the exchange data; confirming that the negotiation key is successfully authenticated; using the negotiation key as a pairing key in the pairing process of the home terminal Bluetooth module and the opposite terminal Bluetooth module, wherein the step of generating the exchange data, the step of generating the negotiation key and the step of authenticating the negotiation key are all based on a key exchange protocol of the identification cryptographic algorithm. According to the embodiment provided by the invention, the security and autonomy in the Bluetooth module pairing process are improved.
Owner:BEIJING SMARTCHIP MICROELECTRONICS TECH COMPANY +3

Bluetooth pairing method and device for mobile phone and payment terminal

The invention provides a Bluetooth pairing method and device for a mobile phone and a payment terminal, and belongs to the technical field of communication. The Bluetooth pairing method for the mobile phone and the payment terminal comprises the following steps that: the mobile phone establishes a physical connection with the payment terminal; the mobile phone transmits data request information to the payment terminal; the payment terminal returns data response information carrying equipment identification information; the mobile phone initiates a pairing request according to the equipment identification information; the mobile phone generates first pairing key information, and the payment terminal generates second pairing key information; the payment terminal transmits the second pairing key information to the mobile phone, and the second pairing key information is displayed on the mobile phone; and the mobile phone confirms whether the first pairing key information is consistent with the second pairing key information or not, and if so, finishing pairing. Through adoption of the Bluetooth pairing method and device, input operations and information display of the payment terminal without input equipment or any display screen can be implemented on the mobile phone, so that the security of a pairing process is enhanced, and the defect that the payment terminal can only passively select a Just Works pairing mode is overcome.
Owner:FUJIAN LANDI COMML EQUIP CO LTD

Intellectual property consultation information management method and device, computer and storage medium

The invention relates to an intellectual property consultation information management method and device, a computer and a storage medium, and the management method comprises the steps: transmitting interaction request information for information interaction to a target interaction end, so as to enable the target interaction end to transmit the same or corresponding pairing secret key to a transmitting end and a receiving end participating in information interaction at the same time; enabling the transmitting end to receive the pairing secret key sent by the target interaction end, and encrypting the consultation information to be sent according to the pairing secret key to generate encrypted information taking the pairing secret key as a decryption secret key; enabling the receiving end toreceive the pairing secret key sent by the target interaction end, and carrying out pairing decryption on the encryption information sent by the transmitting end. Through the process, the process oftransmitting and receiving by the transmitting end and the receiving end is the information verification process, and if the receiving end cannot be matched with the encrypted information transmittedby the transmitting end, the consultation information in the encrypted information cannot be acquired, so the security of the consultation information is improved.
Owner:苏州细无声信息科技服务有限公司

Bilinear cipher key pair pre-distributing method oriented to safety of mobile self-organizing network

The invention discloses a bilinear key pre-distribution method which faces the safety of the mobile ad hoc network. The method comprises the following steps: firstly, supposing the number of the nodes in the ad hoc network as n, during the key pre-distribution course, generating a n*n secure matrix N in a Galois field GF(q) by a base station, wherein, the matrix element Nij is a subset of ZP<*>, i is equal to or more than 1 and j is equal to or less than n; distributing the information of the element in Row i to the No. i node for storage and personal holding, wherein, i is equal to or more than 1 and is equal to or less than n; providing a public key that is equal to the node under identification cipher system for each point Pi in the mapping area G1of each node i by the basestation, and obtaining the public key by the other nodes in the network; after the fishing of the key pre-distribution, realizing an agreement and pair-wise key of the node i and node j. The invention provides a bilinear key pre-distribution method which faces the safety of the mobile ad hoc network, which has small key scale, high safety strength, fast speed, high efficiency, strong anti-acquisition performance of nodes and good connectivity of the key.
Owner:ZHEJIANG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products