[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN106789022B - Method, device and system for generating shared key - Google Patents

Method, device and system for generating shared key Download PDF

Info

Publication number
CN106789022B
CN106789022B CN201611240968.7A CN201611240968A CN106789022B CN 106789022 B CN106789022 B CN 106789022B CN 201611240968 A CN201611240968 A CN 201611240968A CN 106789022 B CN106789022 B CN 106789022B
Authority
CN
China
Prior art keywords
server
intelligent lock
key
public key
mobile terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201611240968.7A
Other languages
Chinese (zh)
Other versions
CN106789022A (en
Inventor
董晓烨
王�华
赵鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Jushu Intelligent Technology Co ltd
Original Assignee
Shanghai Jushu Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Jushu Intelligent Technology Co ltd filed Critical Shanghai Jushu Intelligent Technology Co ltd
Priority to CN201611240968.7A priority Critical patent/CN106789022B/en
Publication of CN106789022A publication Critical patent/CN106789022A/en
Application granted granted Critical
Publication of CN106789022B publication Critical patent/CN106789022B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Lock And Its Accessories (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the invention provides a method, a device and a system for generating a shared secret key, and relates to the field of communication. The method comprises the following steps: the mobile terminal sends a server public key request carrying the ID of the intelligent lock to the server so that the server generates a server key pair which corresponds to the ID of the intelligent lock and comprises a server private key and a server public key; receiving a server public key returned by the server; sending the server public key to the intelligent lock so that the intelligent lock generates an intelligent lock key pair comprising the intelligent lock public key and the intelligent lock private key according to the server public key, and calculating an intelligent lock shared key according to the intelligent lock private key and the server public key; receiving an intelligent lock public key returned by the intelligent lock; and sending the public key of the intelligent lock to the server so that the server can calculate a server shared key equal to the shared key of the intelligent lock according to the private key of the server and the public key of the intelligent lock. The method, the device and the system for generating the shared secret key solve the problem that the shared secret key is leaked when the intelligent door lock is initialized, and improve the safety.

Description

Method, device and system for generating shared key
Technical Field
The present invention relates to the field of communications, and in particular, to a method, an apparatus, and a system for generating a shared key.
Background
The door opening command of the intelligent door lock is generally transmitted and sent in an encryption mode, so that the server and the intelligent door lock are required to share the same secret key. In the existing scheme, when the lock is initialized, the secret key is obtained from the server side in a plaintext mode and is sent to the intelligent door lock in the plaintext mode, the secret key which is used as the key shared secret key for encryption and decryption in the process is transmitted in the plaintext mode, and potential safety hazards exist.
Disclosure of Invention
In view of this, an object of the embodiments of the present invention is to provide a method, an apparatus, and a system for generating a shared key, so as to solve the problem of leakage of the shared key when initializing an intelligent door lock, and improve security.
The technical scheme of the embodiment provided by the invention is as follows:
in a first aspect, an embodiment of the present invention provides a method for generating a shared key, where the method includes: the method comprises the steps that a mobile terminal sends a server public key request carrying an intelligent lock ID to a server, so that the server generates a server secret key pair which corresponds to the intelligent lock ID and comprises a server private key and the server public key; the mobile terminal receives the server public key returned by the server; sending the server public key to the intelligent lock, so that the intelligent lock generates an intelligent lock secret key pair comprising an intelligent lock public key and an intelligent lock private key according to the server public key, and calculating an intelligent lock shared secret key according to the intelligent lock private key and the server public key; receiving the public key of the intelligent lock returned by the intelligent lock; and sending the public key of the intelligent lock to the server so that the server can calculate a server shared key equal to the shared key of the intelligent lock according to the private key of the server and the public key of the intelligent lock.
In a second aspect, an embodiment of the present invention provides a method for generating a shared key, where the method includes: the server acquires a server public key request carrying an intelligent lock ID sent by the mobile terminal; the server generates a server key pair which comprises a server public key and a server private key and corresponds to the intelligent lock ID according to the intelligent lock ID; the server sends the server public key to the intelligent lock through the mobile terminal, so that the intelligent lock generates an intelligent lock secret key pair comprising an intelligent lock public key and an intelligent lock private key according to the server public key, and an intelligent lock shared secret key is calculated according to the intelligent lock private key and the server public key; and the server receives the intelligent lock public key sent by the intelligent lock through the mobile terminal, and calculates a server shared key equal to the intelligent lock shared key according to the server private key and the intelligent lock public key.
In a third aspect, an embodiment of the present invention provides a method for generating a shared key, where the method includes: the intelligent lock sends a server public key request carrying the intelligent lock ID to a server through a mobile terminal, so that the server generates a server secret key pair which corresponds to the intelligent lock ID and comprises a server private key and the server public key; the intelligent lock receives the server public key returned by the server through the mobile terminal, and generates an intelligent lock secret key pair comprising an intelligent lock private key and an intelligent lock public key according to the server public key; the intelligent lock calculates an intelligent lock shared key according to the intelligent lock private key and the server public key; and the intelligent lock sends the intelligent lock public key to the server through the mobile terminal, so that the server calculates a server shared key equal to the intelligent lock shared key according to the intelligent lock public key and the server private key.
In a fourth aspect, an embodiment of the present invention provides a method for generating a shared key, where the method includes: the mobile terminal sends a server public key request carrying the ID of the intelligent lock to a server; the server receives a server public key request sent by the mobile terminal, and generates a server secret key pair which corresponds to the intelligent lock ID and comprises a server private key and the server public key; the server sends the server public key to the mobile terminal; the mobile terminal receives the server public key and sends the server public key to the intelligent lock; the intelligent lock receives the server public key and generates an intelligent lock secret key pair comprising an intelligent lock private key and an intelligent lock private key according to the server public key; the intelligent lock calculates an intelligent lock shared key according to the intelligent lock private key and the server public key; the intelligent lock sends the public key of the intelligent lock to the mobile terminal; the mobile terminal receives the intelligent lock public key and sends the intelligent lock public key to the server; and the server receives the intelligent lock public key and calculates a server shared key equal to the intelligent lock shared key according to the intelligent lock public key and the server key.
In a fifth aspect, an embodiment of the present invention provides an apparatus for generating a shared key, where the apparatus includes: the system comprises a first request sending module, a second request sending module and a third request sending module, wherein the first request sending module is used for sending a server public key request carrying an intelligent lock ID to a server so that the server generates a server secret key pair which corresponds to the intelligent lock ID and comprises a server private key and the server public key; the first public key receiving module is used for receiving the server public key returned by the server; the first public key sending module is used for sending the server public key to the intelligent lock so that the intelligent lock generates an intelligent lock secret key pair comprising an intelligent lock public key and an intelligent lock private key according to the server public key, and an intelligent lock shared secret key is calculated according to the intelligent lock private key and the server public key; the second public key receiving module is used for receiving the public key of the intelligent lock returned by the intelligent lock; and the second public key sending module is used for sending the intelligent lock public key to the server so that the server can calculate a server shared key equal to the intelligent lock shared key according to the server private key and the intelligent lock public key.
In a sixth aspect, an embodiment of the present invention provides an apparatus for generating a shared key, where the apparatus includes: the request acquisition module is used for acquiring a server public key request carrying an intelligent lock ID sent by the mobile terminal; the first data generation module is used for generating a server key pair which corresponds to the ID of the intelligent lock and comprises a server public key and a server private key according to the ID of the intelligent lock; the third public key sending module is used for sending the server public key to the intelligent lock through the mobile terminal so that the intelligent lock generates an intelligent lock secret key pair comprising an intelligent lock public key and an intelligent lock private key according to the server public key, and an intelligent lock shared secret key is calculated according to the intelligent lock private key and the server public key; and the third public key receiving module is used for receiving the intelligent lock public key sent by the intelligent lock through the mobile terminal and calculating a server shared key equal to the intelligent lock shared key according to the server private key and the intelligent lock public key.
In a seventh aspect, an embodiment of the present invention provides an apparatus for generating a shared key, where the apparatus includes: a third request sending module, configured to send, by a mobile terminal, a server public key request carrying the intelligent lock ID to a server, so that the server generates a server private key pair including a server private key and the server public key, where the server private key pair corresponds to the intelligent lock ID; the fourth public key receiving module is used for receiving the server public key returned by the server through the mobile terminal and generating an intelligent lock secret key pair comprising an intelligent lock private key and an intelligent lock public key according to the server public key; the key calculation module is used for calculating an intelligent lock shared key according to the intelligent lock private key and the server public key; and the fourth public key sending module is used for sending the intelligent lock public key to the server through the mobile terminal so that the server can calculate a server shared key equal to the intelligent lock shared key according to the intelligent lock public key and the server private key.
In an eighth aspect, an embodiment of the present invention provides a system for generating a shared key, where the system includes an intelligent lock, a mobile terminal, and a server, where: the mobile terminal is used for sending a server public key request carrying the ID of the intelligent lock to the server; the server is used for receiving a server public key request sent by the mobile terminal and generating a server secret key pair which corresponds to the intelligent lock ID and comprises a server private key and the server public key; the server is used for sending the server public key to the mobile terminal; the mobile terminal is used for receiving the server public key and sending the server public key to the intelligent lock; the intelligent lock is used for receiving the server public key and generating an intelligent lock secret key pair comprising an intelligent lock private key and an intelligent lock private key according to the server public key; the intelligent lock is used for calculating an intelligent lock shared key according to the intelligent lock private key and the server public key; the intelligent lock is used for sending the public key of the intelligent lock to the mobile terminal; the mobile terminal is used for receiving the intelligent lock public key and sending the intelligent lock public key to the server; and the server is used for receiving the intelligent lock public key and calculating a server shared key equal to the intelligent lock shared key according to the intelligent lock public key and the server key.
The method, the device and the system for generating the shared key provided by the embodiment of the invention firstly send a server public key request carrying the ID of the intelligent lock to the server through the mobile terminal so that the server generates a server key pair which corresponds to the ID of the intelligent lock and comprises a server private key and a server public key; then receiving a server public key returned by the server; sending the server public key to the intelligent lock so that the intelligent lock generates an intelligent lock key pair comprising the intelligent lock public key and the intelligent lock private key according to the server public key, and calculating an intelligent lock shared key according to the intelligent lock private key and the server public key; finally, receiving an intelligent lock public key returned by the intelligent lock; and sending the public key of the intelligent lock to the server so that the server can calculate a server shared key equal to the shared key of the intelligent lock according to the private key of the server and the public key of the intelligent lock. According to the method, the device and the system for generating the shared secret key, the private key is not transmitted and is not disclosed to the outside in the whole process, the problem that the shared secret key is leaked when the intelligent door lock is initialized is solved, and the safety is improved.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by the practice of the embodiments of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
Fig. 1 is a schematic diagram illustrating a mobile terminal respectively communicating with an intelligent lock and a server according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating a method of shared key generation provided by a first embodiment of the present invention;
fig. 3 shows a flowchart of a method for shared key generation provided by a second embodiment of the present invention;
fig. 4 is a flowchart illustrating a method of shared key generation according to a third embodiment of the present invention;
fig. 5 shows a timing diagram of a method for shared key generation provided by a fourth embodiment of the present invention;
fig. 6 is a block diagram illustrating a shared key generation apparatus according to a fifth embodiment of the present invention;
fig. 7 is a block diagram illustrating a shared key generation apparatus according to a sixth embodiment of the present invention;
fig. 8 shows a block diagram of an apparatus for generating a shared key according to a seventh embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present invention without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures. Meanwhile, in the description of the present invention, the terms "first", "second", and the like are used only for distinguishing the description, and are not to be construed as indicating or implying relative importance.
Fig. 1 is a schematic diagram of a mobile terminal 100 respectively communicating with an intelligent lock 200 and a server 300 according to an embodiment of the present invention, where the mobile terminal 100 and the intelligent lock 200 are in short-range communication, and the intelligent lock 200 is not networked, and the server 300 is in communication connection with one or more mobile terminals 100 through a network to perform data communication or interaction. The server 300 may be a web server, a database server, or the like. The mobile terminal 100 may be a Personal Computer (PC), a tablet PC, a smart phone, a Personal Digital Assistant (PDA), a wearable device, or other terminals.
First embodiment
Referring to fig. 2, fig. 2 shows a flowchart of a method for generating a shared key according to a first embodiment of the present invention, and the method will be described in detail with respect to the flowchart shown in fig. 2, and includes:
step S110: the mobile terminal sends a near field communication connection request to the intelligent lock so as to establish near field communication connection between the mobile terminal and the intelligent lock, wherein the near field communication connection is Bluetooth connection, NFC connection or ZigBee connection.
In this embodiment, the mobile terminal starts a process of setting a key, and sends a connection request to the smart lock, where the connection request is a close-range connection request, so as to establish a close-range communication connection between the mobile terminal and the smart lock. As a mode, the near field communication connection is a bluetooth connection, an NFC connection, or a ZigBee connection, where the bluetooth connection establishes a general near field wireless interface for a communication environment between fixed devices or mobile devices, and further combines communication and computer technologies, so that mutual communication or operation can be achieved within a near field range without cables or cables interconnecting various devices. The NFC connection can quickly and automatically establish a wireless network, so that the electronic equipment can communicate in a short distance. And ZigBee is mainly applied to point electronic equipment within a short distance range and with low data transmission rate. The intelligent lock and the mobile terminal adopt a close-range connection mode to realize the exchange of secret keys of the intelligent lock without networking.
Step S120: and the mobile terminal acquires the ID of the intelligent lock so that the server generates a server shared key corresponding to the ID of the intelligent lock.
As a mode, after the mobile terminal establishes connection with the smart lock, the mobile terminal sends a smart lock ID request to the smart lock, the smart lock responds to the request and sends a smart lock ID to the mobile terminal, or the mobile terminal scans a barcode or a two-dimensional code attached to the smart lock to obtain the ID of the smart lock.
Step S130: the mobile terminal sends a server public key request carrying an intelligent lock ID to a server, so that the server generates a server secret key pair which corresponds to the intelligent lock ID and comprises a server private key and the server public key.
The mobile terminal and the server are connected through network communication, the mobile terminal sends a server public key request to the server after acquiring the ID of the intelligent lock, and the request carries the ID of the intelligent lock as a mode, so that the server generates a server secret key pair comprising a server private key and a server public key according to the ID of the intelligent lock. In this embodiment, after receiving the request carrying the ID of the intelligent lock, the server obtains a server public key and a server private key corresponding to the intelligent lock through an elliptic encryption algorithm.
Step S140: and the mobile terminal receives the server public key returned by the server.
As a mode, after obtaining a server public key and a server private key, the server stores the server private key, and sends the server public key to the mobile terminal, and the mobile terminal receives the server public key returned by the server.
Step S150: and sending the server public key to the intelligent lock, so that the intelligent lock generates an intelligent lock secret key pair comprising an intelligent lock public key and an intelligent lock private key according to the server public key, and calculating an intelligent lock shared secret key according to the intelligent lock private key and the server public key.
The mobile terminal sends a server public key returned by the server to the intelligent lock, the intelligent lock receives the server public key, and generates an intelligent lock secret key pair comprising the intelligent lock public key and the intelligent lock private key according to the server public key. The intelligent lock and the server are preset with a public parameter, after the intelligent lock generates an intelligent lock private key, the intelligent lock calculates according to an elliptic encryption algorithm, the intelligent lock private key, a server public key and the preset public parameter to obtain an intelligent lock shared key, and the shared key is stored.
Step S160: and receiving the intelligent lock public key returned by the intelligent lock.
As a mode, after obtaining the private key of the intelligent lock and the public key of the intelligent lock, the intelligent lock stores the private key of the intelligent lock and sends the public key of the intelligent lock to the mobile terminal, and the mobile terminal receives the public key of the intelligent lock.
Step S170: and sending the public key of the intelligent lock to the server so that the server can calculate a server shared key equal to the shared key of the intelligent lock according to the private key of the server and the public key of the intelligent lock.
In this embodiment, the mobile terminal sends the smart lock public key returned by the smart lock to the server, where the server receives the smart lock public key, where the smart lock and the server have a preset public parameter, the server calculates the smart lock shared key according to the elliptic encryption algorithm, the smart lock public key, the server private key, and the preset public parameter, and finally the server shared key calculated by the server is equal to the smart lock shared key calculated by the smart lock. In the whole shared key generation process, the shared key is not transmitted, so that the safety of command transmission between the server and the intelligent lock is ensured.
The method for generating a shared key provided by the first embodiment of the present invention first sends a server public key request carrying an intelligent lock ID to a server through a mobile terminal, so that the server generates a server key pair including a server private key and a server public key corresponding to the intelligent lock ID; then receiving a server public key returned by the server; sending the server public key to the intelligent lock so that the intelligent lock generates an intelligent lock key pair comprising the intelligent lock public key and the intelligent lock private key according to the server public key, and calculating an intelligent lock shared key according to the intelligent lock private key and the server public key; finally, receiving an intelligent lock public key returned by the intelligent lock; and sending the public key of the intelligent lock to the server so that the server can calculate a server shared key equal to the shared key of the intelligent lock according to the private key of the server and the public key of the intelligent lock. In the method for generating the shared secret key, the private key is not transmitted in the whole process and is not disclosed to the outside, so that the problem of leakage of the shared secret key when the intelligent door lock is initialized is solved, and the safety is improved.
Second embodiment
Referring to fig. 3, fig. 3 shows a flowchart of a method for generating a shared key according to a second embodiment of the present invention, which will be described in detail below with respect to the flowchart shown in fig. 3, wherein, as in the first embodiment, a close-range communication connection is established between the mobile terminal and the smart lock, the close-range communication connection includes a bluetooth connection, an NFC connection, or a ZigBee connection, etc. to implement that the smart lock does not network and performs key exchange, and the method includes:
step S210: and the server acquires a server public key request carrying the ID of the intelligent lock sent by the mobile terminal.
In this embodiment, the mobile terminal and the server are connected through network communication, after a close-range connection is established between the mobile terminal and the intelligent lock, the mobile terminal sends an intelligent lock ID request to the intelligent lock, the intelligent lock responds to the request and sends an intelligent lock ID to the mobile terminal, or the mobile terminal scans a bar code or a two-dimensional code attached to the intelligent lock to obtain the ID of the intelligent lock, a server public key request carrying the intelligent lock ID is sent to the server, and the server obtains the server public key request.
Step S220: and the server generates a server key pair which corresponds to the ID of the intelligent lock and comprises a server public key and a server private key according to the ID of the intelligent lock.
And the server generates a server key pair comprising a server private key and a server public key according to the acquired intelligent lock ID. In this embodiment, after receiving the request carrying the ID of the intelligent lock, the server obtains a server public key and a server private key corresponding to the intelligent lock through an elliptic encryption algorithm.
Step S230: and the server sends the server public key to the intelligent lock through the mobile terminal, so that the intelligent lock generates an intelligent lock secret key pair comprising an intelligent lock public key and an intelligent lock private key according to the server public key, and an intelligent lock shared secret key is calculated according to the intelligent lock private key and the server public key.
In an implementation manner of this embodiment, the server stores the server private key, and sends the server public key to the smart lock through the mobile terminal, and the smart lock receives the server public key and generates a smart lock key pair including the smart lock public key and the smart lock private key according to the server public key. After the intelligent lock generates the intelligent lock private key, the intelligent lock calculates the intelligent lock shared key through an elliptic encryption algorithm according to the server public key and the intelligent lock private key, and the shared key is stored.
Step S240: and the server receives the intelligent lock public key sent by the intelligent lock through the mobile terminal, and calculates a server shared key equal to the intelligent lock shared key according to the server private key and the intelligent lock public key.
And the server receives the intelligent lock public key and calculates a server shared key according to the intelligent lock public key and the server private key through an elliptic encryption algorithm, wherein the server shared key calculated by the server is equal to the intelligent lock shared key calculated by the intelligent lock. In the whole shared key generation process, the shared key is not transmitted, so that the safety of command transmission between the server and the intelligent lock is ensured.
The method for generating the shared key provided by the second embodiment of the invention firstly obtains a server public key request carrying an intelligent lock ID sent by a mobile terminal through a server; generating a server key pair which corresponds to the intelligent lock ID and comprises a server public key and a server private key according to the intelligent lock ID; then the server public key is sent to the intelligent lock through the mobile terminal, so that the intelligent lock generates an intelligent lock secret key pair comprising an intelligent lock public key and an intelligent lock private key according to the server public key, and an intelligent lock shared secret key is calculated according to the intelligent lock private key and the server public key; and finally, receiving the public key of the intelligent lock sent by the intelligent lock through the mobile terminal, and calculating a server shared key equal to the intelligent lock shared key according to the server private key and the public key of the intelligent lock. In the method for generating the shared secret key, the private key is not transmitted in the whole process and is not disclosed to the outside, so that the problem of leakage of the shared secret key when the intelligent door lock is initialized is solved, and the safety is improved.
Third embodiment
Referring to fig. 4, fig. 4 shows a flowchart of a method for generating a shared key according to a third embodiment of the present invention, which will be described in detail with reference to the flowchart shown in fig. 4, wherein, as in the first embodiment, the mobile terminal and the smart lock establish a close-range communication connection, the close-range communication connection includes a bluetooth connection, an NFC connection, or a ZigBee connection, etc., so as to enable the smart lock to exchange keys without networking, the method includes:
step S310: and the intelligent lock sends a server public key request carrying the ID of the intelligent lock to a server through a mobile terminal, so that the server generates a server secret key pair which corresponds to the ID of the intelligent lock and comprises a server private key and the server public key.
In this embodiment, after the mobile terminal and the server establish a close-range connection, the mobile terminal sends an intelligent lock ID request to the intelligent lock, the intelligent lock responds to the request and sends the intelligent lock ID to the mobile terminal, or the mobile terminal scans a barcode or a two-dimensional code attached to the intelligent lock to obtain the intelligent lock ID, sends a server public key request carrying the intelligent lock ID to the server, and the server generates a server secret key pair including a server private key and a server public key according to the obtained intelligent lock ID. In this embodiment, after receiving the request carrying the ID of the intelligent lock, the server obtains a server public key and a server private key corresponding to the intelligent lock through an elliptic encryption algorithm.
Step S320: and the intelligent lock receives the server public key returned by the server through the mobile terminal, and generates an intelligent lock secret key pair comprising an intelligent lock private key and an intelligent lock public key according to the server public key.
In an implementation manner of this embodiment, the server stores the server private key, and sends the server public key to the smart lock through the mobile terminal, and the smart lock receives the server public key and generates a smart lock key pair including the smart lock public key and the smart lock private key according to the server public key.
Step S330: and the intelligent lock calculates an intelligent lock shared key according to the intelligent lock private key and the server public key.
After the intelligent lock generates the intelligent lock private key, the intelligent lock calculates the intelligent lock shared key through an elliptic encryption algorithm according to the server public key and the intelligent lock private key, and the shared key is stored.
Step S340: and the intelligent lock sends the intelligent lock public key to the server through the mobile terminal, so that the server calculates a server shared key equal to the intelligent lock shared key according to the intelligent lock public key and the server private key.
In this embodiment, after obtaining the private key of the smart lock and the public key of the smart lock, the smart lock stores the private key of the smart lock, and sends the public key of the smart lock to the server through the mobile terminal, and the server receives the public key of the smart lock and calculates a server shared key according to the public key of the smart lock and the private key of the server through an elliptic encryption algorithm, wherein the server shared key calculated by the server is equal to the intelligent lock shared key calculated by the smart lock. In the whole shared key generation process, the shared key is not transmitted, so that the safety of command transmission between the server and the intelligent lock is ensured.
The method for generating a shared key according to the third embodiment of the present invention first sends a server public key request carrying the ID of the smart lock to a server through the smart lock via a mobile terminal, such that the server generates a server key pair comprising a server private key and the server public key corresponding to the smart lock ID, the intelligent lock receives the server public key returned by the server through the mobile terminal, generating an intelligent lock key pair comprising an intelligent lock private key and an intelligent lock public key according to the server public key, then, an intelligent lock shared key is calculated according to the intelligent lock private key and the server public key, and finally the intelligent lock public key is sent to the server through the mobile terminal, and the server calculates a server shared secret key equal to the intelligent lock shared secret key according to the intelligent lock public key and the server private key. In the method for generating the shared secret key, the private key is not transmitted in the whole process and is not disclosed to the outside, so that the problem of leakage of the shared secret key when the intelligent door lock is initialized is solved, and the safety is improved.
Fourth embodiment
Referring to fig. 5, fig. 5 shows a timing diagram of a method for key generation according to a fourth embodiment of the present invention, which will be described in detail below with respect to the flow shown in fig. 5, wherein, as in the first embodiment, a close-range communication connection is established between the mobile terminal and the smart lock, the close-range communication connection includes a bluetooth connection, an NFC connection, or a ZigBee connection, etc. to implement that the smart lock does not perform networking for key exchange, and the method includes:
step S410: and the mobile terminal sends a server public key request carrying the intelligent lock ID to the server.
In the implementation, a near field communication connection is established between the mobile terminal and the intelligent lock, the mobile terminal sends an intelligent lock ID request to the intelligent lock, the intelligent lock responds to the request and sends the intelligent lock ID to the mobile terminal, or the mobile terminal scans a bar code or a two-dimensional code attached to the intelligent lock, and after the intelligent lock ID is obtained, a server public key request carrying the intelligent lock ID is sent to the server.
Step S420: and the server receives a server public key request sent by the mobile terminal and generates a server secret key pair which corresponds to the intelligent lock ID and comprises a server private key and the server public key.
As one mode, the server receives a request sent by the mobile terminal, and generates a server key pair including a server private key and a server public key according to the acquired smart lock ID. In this embodiment, after receiving the request carrying the ID of the intelligent lock, the server obtains a server public key and a server private key corresponding to the intelligent lock through an elliptic encryption algorithm.
Step S430: and the server sends the server public key to the mobile terminal.
After the server generates a server private key and a server public key, the server stores the server private key and sends the server public key to the mobile terminal.
Step S440: and the mobile terminal receives the server public key and sends the server public key to the intelligent lock.
And the mobile terminal receives the server public key sent by the server and sends the server public key to the intelligent lock.
Step S450: and the intelligent lock receives the server public key and generates an intelligent lock secret key pair comprising an intelligent lock private key and an intelligent lock private key according to the server public key.
As one mode, the smart lock receives a server public key sent by the mobile terminal, and generates a smart lock key pair including a smart lock public key and a smart lock private key according to the server public key, where the smart lock generates the smart lock private key and the smart lock public key according to an elliptic encryption algorithm and the obtained server public key.
Step S460: and the intelligent lock calculates an intelligent lock shared key according to the intelligent lock private key and the server public key.
After the intelligent lock generates the intelligent lock private key, the intelligent lock calculates the intelligent lock shared key through an elliptic encryption algorithm according to the server public key and the intelligent lock private key, and the shared key is stored.
Step S470: and the intelligent lock sends the public key of the intelligent lock to the mobile terminal.
In this embodiment, after obtaining the private key of the intelligent lock and the public key of the intelligent lock, the intelligent lock stores the private key of the intelligent lock, and sends the public key of the intelligent lock to the mobile terminal through the mobile terminal.
Step S480: and the mobile terminal receives the intelligent lock public key and sends the intelligent lock public key to the server.
And the mobile terminal receives the intelligent lock public key sent by the intelligent lock and sends the intelligent lock public key to the server.
Step S490: and the server receives the intelligent lock public key and calculates a server shared key equal to the intelligent lock shared key according to the intelligent lock public key and the server key.
And the server receives the intelligent lock public key and calculates a server shared key according to the intelligent lock public key and the server private key through an elliptic encryption algorithm, wherein the server shared key calculated by the server is equal to the intelligent lock shared key calculated by the intelligent lock. In the whole shared key generation process, the shared key is not transmitted, so that the safety of command transmission between the server and the intelligent lock is ensured.
The fourth embodiment of the present invention provides a method for generating a shared key, wherein a mobile terminal sends a server public key request carrying an intelligent lock ID to a server, the server receives the server public key request sent by the mobile terminal, generates a server private key pair corresponding to the intelligent lock ID and comprising a server private key and the server public key, sends the server public key to the mobile terminal, the mobile terminal receives the server public key, sends the server public key to the intelligent lock, the intelligent lock receives the server public key, generates an intelligent lock key pair comprising an intelligent lock private key and an intelligent lock private key according to the server public key, calculates an intelligent lock shared key according to the intelligent lock private key and the server public key, sends the intelligent lock public key to the mobile terminal, and finally the mobile terminal receives the intelligent lock public key, and sending the intelligent lock public key to the server, receiving the intelligent lock public key by the server, and calculating a server shared key equal to the intelligent lock shared key according to the intelligent lock public key and the server key. In the method for generating the shared secret key, the private key is not transmitted in the whole process and is not disclosed to the outside, so that the problem of leakage of the shared secret key when the intelligent door lock is initialized is solved, and the safety is improved.
Fifth embodiment
Referring to fig. 6, fig. 6 shows a block diagram of a device for generating a shared key according to a fifth embodiment of the present invention, and the block diagram of the structure shown in fig. 6 will be described below, where the device is applied to a mobile terminal 100, and the device includes a second request sending module 110, a data obtaining module 120, a first request sending module 130, a first public key receiving module 140, a first public key sending module 150, a second public key receiving module 160, and a second public key sending module 170, where:
a second request sending module 110, configured to send a close-range communication connection request to the smart lock, so as to establish a close-range communication connection between the mobile terminal and the smart lock, where the close-range communication connection is a bluetooth connection, an NFC connection, or a ZigBee connection. A data obtaining module 120, configured to obtain the smart lock ID, so that the server generates a server shared key corresponding to the smart lock ID. The first request sending module 130 is configured to send a server public key request carrying an intelligent lock ID to a server, so that the server generates a server key pair including a server private key and the server public key, where the server key pair corresponds to the intelligent lock ID. A first public key receiving module 140, configured to receive the server public key returned by the server. The first public key sending module 150 is configured to send the server public key to the smart lock, so that the smart lock generates a smart lock key pair including a smart lock public key and a smart lock private key according to the server public key, and calculates a smart lock shared key according to the smart lock private key and the server public key. And the second public key receiving module 160 is configured to receive the public key of the smart lock returned by the smart lock. And a second public key sending module 170, configured to send the public key of the smart lock to the server, so that the server calculates a server shared key equal to the shared key of the smart lock according to the server private key and the public key of the smart lock.
In this embodiment, please refer to the contents described in the embodiments shown in fig. 1 to fig. 5 for the process of implementing each function of each functional module of the shared key generating device, which is not described herein again.
Sixth embodiment
Referring to fig. 7, fig. 7 shows a block diagram of an apparatus for generating a shared key according to a sixth embodiment of the present invention, and the block diagram shown in fig. 7 will be described below, where the apparatus is applied to a server 300, and the apparatus includes a request obtaining module 310, a first data generating module 320, a third public key sending module 330, and a third public key receiving module 340, where:
the request obtaining module 310 is configured to obtain a server public key request carrying an intelligent lock ID sent by a mobile terminal. The first data generating module 320 is configured to generate a server key pair including a server public key and a server private key corresponding to the intelligent lock ID according to the intelligent lock ID. A third public key sending module 330, configured to send the server public key to the smart lock through the mobile terminal, so that the smart lock generates a smart lock key pair including a smart lock public key and a smart lock private key according to the server public key, and calculates a smart lock shared key according to the smart lock private key and the server public key. The third public key receiving module 340 is configured to receive the public key of the intelligent lock sent by the mobile terminal, and calculate a server shared key equal to the intelligent lock shared key according to the server private key and the public key of the intelligent lock.
In this embodiment, please refer to the contents described in the embodiments shown in fig. 1 to fig. 5 for the process of implementing each function of each functional module of the shared key generating device, which is not described herein again.
Seventh embodiment
Referring to fig. 8, fig. 8 shows a block diagram of a device for generating a shared key according to a seventh embodiment of the present invention, and the block diagram of the structure shown in fig. 8 will be described below, where the device is applied to a smart lock 200, and the device includes a third request sending module 210, a fourth public key receiving module 220, a key calculating module 230, and a fourth public key sending module 240, where:
a third request sending module 210, configured to send, by the mobile terminal, a server public key request carrying the ID of the intelligent lock to a server, so that the server generates a server private key pair including a server private key and the server public key corresponding to the ID of the intelligent lock. A fourth public key receiving module 220, configured to receive the server public key returned by the server through the mobile terminal, and generate an intelligent lock key pair including an intelligent lock private key and an intelligent lock public key according to the server public key. And a key calculation module 230, configured to calculate a shared key of the smart lock according to the private key of the smart lock and the public key of the server. A fourth public key sending module 240, configured to send the public key of the smart lock to the server through the mobile terminal, so that the server calculates a server shared key equal to the shared key of the smart lock according to the public key of the smart lock and the server private key.
In this embodiment, please refer to the contents described in the embodiments shown in fig. 1 to fig. 5 for the process of implementing each function of each functional module of the shared key generating device, which is not described herein again.
Eighth embodiment
The present embodiment further provides a system for generating a shared key, where the system includes an intelligent lock, a mobile terminal, and a server, where:
the mobile terminal is used for sending a server public key request carrying the ID of the intelligent lock to the server; the server is used for receiving a server public key request sent by the mobile terminal and generating a server secret key pair which corresponds to the intelligent lock ID and comprises a server private key and the server public key; the server is used for sending the server public key to the mobile terminal; the mobile terminal is used for receiving the server public key and sending the server public key to the intelligent lock; the intelligent lock is used for receiving the server public key and generating an intelligent lock secret key pair comprising an intelligent lock private key and an intelligent lock private key according to the server public key; the intelligent lock is used for calculating an intelligent lock shared key according to the intelligent lock private key and the server public key; the intelligent lock is used for sending the public key of the intelligent lock to the mobile terminal; the mobile terminal is used for receiving the intelligent lock public key and sending the intelligent lock public key to the server; and the server is used for receiving the intelligent lock public key and calculating a server shared key equal to the intelligent lock shared key according to the intelligent lock public key and the server key.
In summary, the method, the apparatus, and the system for generating a shared key provided in the embodiments of the present invention first send a server public key request carrying an intelligent lock ID to a server through a mobile terminal, so that the server generates a server key pair including a server private key and a server public key corresponding to the intelligent lock ID; then receiving a server public key returned by the server; sending the server public key to the intelligent lock so that the intelligent lock generates an intelligent lock key pair comprising the intelligent lock public key and the intelligent lock private key according to the server public key, and calculating an intelligent lock shared key according to the intelligent lock private key and the server public key; finally, receiving an intelligent lock public key returned by the intelligent lock; and sending the public key of the intelligent lock to the server so that the server can calculate a server shared key equal to the shared key of the intelligent lock according to the private key of the server and the public key of the intelligent lock. According to the method, the device and the system for generating the shared secret key, the private key is not transmitted and is not disclosed to the outside in the whole process, the problem that the shared secret key is leaked when the intelligent door lock is initialized is solved, and the safety is improved.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method can be implemented in other ways. The apparatus embodiments described above are merely illustrative, and for example, the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, the functional modules in the embodiments of the present invention may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes. It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention. It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.

Claims (10)

1. A method of shared key generation, the method comprising:
the method comprises the steps that a mobile terminal sends a server public key request carrying an intelligent lock ID to a server, so that the server generates a server secret key pair which corresponds to the intelligent lock ID and comprises a server private key and the server public key;
the mobile terminal receives the server public key returned by the server;
sending the server public key to the intelligent lock, so that the intelligent lock generates an intelligent lock secret key pair comprising an intelligent lock public key and an intelligent lock private key according to the server public key, and the intelligent lock calculates an intelligent lock shared secret key according to the intelligent lock private key and the server public key;
receiving the public key of the intelligent lock returned by the intelligent lock;
and sending the public key of the intelligent lock to the server so that the server can calculate a server shared key equal to the shared key of the intelligent lock according to the private key of the server and the public key of the intelligent lock.
2. The method of claim 1, wherein before the mobile terminal sending the server public key request with the smart lock ID to the server, the method further comprises:
the mobile terminal sends a near field communication connection request to the intelligent lock so as to establish near field communication connection between the mobile terminal and the intelligent lock, wherein the near field communication connection is Bluetooth connection, NFC connection or ZigBee connection;
and the mobile terminal acquires the ID of the intelligent lock so that the server generates a server shared key corresponding to the ID of the intelligent lock.
3. A method of shared key generation, the method comprising:
the server acquires a server public key request carrying an intelligent lock ID sent by the mobile terminal;
the server generates a server key pair which comprises a server public key and a server private key and corresponds to the intelligent lock ID according to the intelligent lock ID;
the server sends the server public key to the intelligent lock through the mobile terminal, so that the intelligent lock generates an intelligent lock secret key pair comprising an intelligent lock public key and an intelligent lock private key according to the server public key, and the intelligent lock calculates an intelligent lock shared secret key according to the intelligent lock private key and the server public key;
and the server receives the intelligent lock public key sent by the intelligent lock through the mobile terminal, and calculates a server shared key equal to the intelligent lock shared key according to the server private key and the intelligent lock public key.
4. A method of shared key generation, the method comprising:
the intelligent lock sends a server public key request carrying the intelligent lock ID to a server through a mobile terminal, so that the server generates a server secret key pair which corresponds to the intelligent lock ID and comprises a server private key and the server public key;
the intelligent lock receives the server public key returned by the server through the mobile terminal, and generates an intelligent lock secret key pair comprising an intelligent lock private key and an intelligent lock public key according to the server public key;
the intelligent lock calculates an intelligent lock shared key according to the intelligent lock private key and the server public key;
and the intelligent lock sends the intelligent lock public key to the server through the mobile terminal, so that the server calculates a server shared key equal to the intelligent lock shared key according to the intelligent lock public key and the server private key.
5. A method of shared key generation, the method comprising:
the mobile terminal sends a server public key request carrying the ID of the intelligent lock to a server;
the server receives a server public key request sent by the mobile terminal, and generates a server secret key pair which corresponds to the intelligent lock ID and comprises a server private key and the server public key;
the server sends the server public key to the mobile terminal;
the mobile terminal receives the server public key and sends the server public key to the intelligent lock;
the intelligent lock receives the server public key and generates an intelligent lock secret key pair comprising an intelligent lock private key and an intelligent lock private key according to the server public key;
the intelligent lock calculates an intelligent lock shared key according to the intelligent lock private key and the server public key;
the intelligent lock sends the public key of the intelligent lock to the mobile terminal;
the mobile terminal receives the intelligent lock public key and sends the intelligent lock public key to the server;
and the server receives the intelligent lock public key and calculates a server shared key equal to the intelligent lock shared key according to the intelligent lock public key and the server key.
6. An apparatus for generating a shared key, applied to a mobile terminal, the apparatus comprising:
the system comprises a first request sending module, a second request sending module and a third request sending module, wherein the first request sending module is used for sending a server public key request carrying an intelligent lock ID to a server so that the server generates a server secret key pair which corresponds to the intelligent lock ID and comprises a server private key and the server public key;
the first public key receiving module is used for receiving the server public key returned by the server;
the first public key sending module is used for sending the server public key to the intelligent lock, so that the intelligent lock generates an intelligent lock secret key pair comprising an intelligent lock public key and an intelligent lock private key according to the server public key, and the intelligent lock calculates an intelligent lock shared secret key according to the intelligent lock private key and the server public key;
the second public key receiving module is used for receiving the public key of the intelligent lock returned by the intelligent lock;
and the second public key sending module is used for sending the intelligent lock public key to the server so that the server can calculate a server shared key equal to the intelligent lock shared key according to the server private key and the intelligent lock public key.
7. The apparatus of shared key generation of claim 6, further comprising:
the second request sending module is used for sending a near field communication connection request to the intelligent lock so as to establish a near field communication connection between the mobile terminal and the intelligent lock, wherein the near field communication connection is a Bluetooth connection, an NFC connection or a ZigBee connection;
and the data acquisition module is used for acquiring the ID of the intelligent lock so as to enable the server to generate a server shared key corresponding to the ID of the intelligent lock.
8. An apparatus for shared key generation, applied to a server, the apparatus comprising:
the request acquisition module is used for acquiring a server public key request carrying an intelligent lock ID sent by the mobile terminal;
the first data generation module is used for generating a server key pair which corresponds to the ID of the intelligent lock and comprises a server public key and a server private key according to the ID of the intelligent lock;
the third public key sending module is used for sending the server public key to the intelligent lock through the mobile terminal, so that the intelligent lock generates an intelligent lock secret key pair comprising an intelligent lock public key and an intelligent lock private key according to the server public key, and the intelligent lock calculates an intelligent lock shared secret key according to the intelligent lock private key and the server public key;
and the third public key receiving module is used for receiving the intelligent lock public key sent by the intelligent lock through the mobile terminal and calculating a server shared key equal to the intelligent lock shared key according to the server private key and the intelligent lock public key.
9. An apparatus for generating a shared key, applied to a smart lock, the apparatus comprising:
a third request sending module, configured to send, by a mobile terminal, a server public key request carrying the intelligent lock ID to a server, so that the server generates a server private key pair including a server private key and the server public key, where the server private key pair corresponds to the intelligent lock ID;
the fourth public key receiving module is used for receiving the server public key returned by the server through the mobile terminal and generating an intelligent lock secret key pair comprising an intelligent lock private key and an intelligent lock public key according to the server public key;
the key calculation module is used for calculating an intelligent lock shared key according to the intelligent lock private key and the server public key;
and the fourth public key sending module is used for sending the intelligent lock public key to the server through the mobile terminal so that the server can calculate a server shared key equal to the intelligent lock shared key according to the intelligent lock public key and the server private key.
10. A system for shared key generation, the system comprising a smart lock, a mobile terminal, and a server, wherein:
the mobile terminal is used for sending a server public key request carrying the ID of the intelligent lock to the server;
the server is used for receiving a server public key request sent by the mobile terminal and generating a server secret key pair which corresponds to the intelligent lock ID and comprises a server private key and the server public key;
the server is used for sending the server public key to the mobile terminal;
the mobile terminal is used for receiving the server public key and sending the server public key to the intelligent lock;
the intelligent lock is used for receiving the server public key and generating an intelligent lock secret key pair comprising an intelligent lock private key and an intelligent lock private key according to the server public key;
the intelligent lock is used for calculating an intelligent lock shared key according to the intelligent lock private key and the server public key;
the intelligent lock is used for sending the public key of the intelligent lock to the mobile terminal;
the mobile terminal is used for receiving the intelligent lock public key and sending the intelligent lock public key to the server;
and the server is used for receiving the intelligent lock public key and calculating a server shared key equal to the intelligent lock shared key according to the intelligent lock public key and the server key.
CN201611240968.7A 2016-12-28 2016-12-28 Method, device and system for generating shared key Expired - Fee Related CN106789022B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611240968.7A CN106789022B (en) 2016-12-28 2016-12-28 Method, device and system for generating shared key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611240968.7A CN106789022B (en) 2016-12-28 2016-12-28 Method, device and system for generating shared key

Publications (2)

Publication Number Publication Date
CN106789022A CN106789022A (en) 2017-05-31
CN106789022B true CN106789022B (en) 2021-03-09

Family

ID=58923514

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611240968.7A Expired - Fee Related CN106789022B (en) 2016-12-28 2016-12-28 Method, device and system for generating shared key

Country Status (1)

Country Link
CN (1) CN106789022B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107426176B (en) * 2017-06-12 2020-02-18 东南大学 Safe underwater transmission method supporting confusion and zero knowledge
CN107945350A (en) * 2017-12-21 2018-04-20 美的集团股份有限公司 Door lock communication system and method based on safety chip
CN108122316B (en) * 2017-12-21 2020-02-04 美智光电科技有限公司 Door lock communication system and method based on security chip
CN109068321B (en) * 2018-07-19 2021-07-02 飞天诚信科技股份有限公司 Method and system for negotiating session key, mobile terminal and intelligent household equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1079565A2 (en) * 1999-08-25 2001-02-28 Dew Engineering and Development Limited Method of securely establishing a secure communication link via an unsecured communication network
CN104980928A (en) * 2014-04-03 2015-10-14 华为终端有限公司 Method, equipment and system used for establishing secure connection
CN105141568A (en) * 2014-05-28 2015-12-09 腾讯科技(深圳)有限公司 Safe communication channel establishment method and system, client and server
CN105915344A (en) * 2016-04-15 2016-08-31 重庆金瓯科技发展有限责任公司 Electronic key sharing service system for house renting
CN106127079A (en) * 2016-07-15 2016-11-16 中电长城网际系统应用有限公司 A kind of data sharing method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1079565A2 (en) * 1999-08-25 2001-02-28 Dew Engineering and Development Limited Method of securely establishing a secure communication link via an unsecured communication network
CN104980928A (en) * 2014-04-03 2015-10-14 华为终端有限公司 Method, equipment and system used for establishing secure connection
CN105141568A (en) * 2014-05-28 2015-12-09 腾讯科技(深圳)有限公司 Safe communication channel establishment method and system, client and server
CN105915344A (en) * 2016-04-15 2016-08-31 重庆金瓯科技发展有限责任公司 Electronic key sharing service system for house renting
CN106127079A (en) * 2016-07-15 2016-11-16 中电长城网际系统应用有限公司 A kind of data sharing method and device

Also Published As

Publication number Publication date
CN106789022A (en) 2017-05-31

Similar Documents

Publication Publication Date Title
US10972908B2 (en) Wireless network connection method, apparatus, and system
CN113364760A (en) Data encryption processing method and device, computer equipment and storage medium
CN109448195B (en) Authentication method and device for vehicle virtual key
CN106789022B (en) Method, device and system for generating shared key
KR101929699B1 (en) GPRS system key enforcement method, SGSN device, UE, HLR / HSS, and GPRS system
CN103581153A (en) Encryption method and device in system of Internet of Things
CN105978693B (en) A kind of method and system of terminal association
CN116488919B (en) Data processing method, communication node and storage medium
CN104980899A (en) Communication method and system for mobile terminal, mobile terminal and server
CN110351316A (en) A kind of remote software upgrade method and device
CN104144174B (en) Protect method, user equipment and the server of privacy of user data
KR101379711B1 (en) Method for file encryption and decryption using telephone number
CN114429223B (en) Heterogeneous model building method and device
CN104052654A (en) Method and system for achieving chatting online
US20150156173A1 (en) Communication system utilizing fingerprint information and use thereof
CN109525612B (en) Multi-terminal message encryption transmission method and system
CN112040464A (en) Method for realizing information safety transmission of mobile terminal based on Bluetooth and quantum encryption technology
CN109327475B (en) Multi-layer identity authentication method, device, equipment and storage medium
CN104994160B (en) Document transmission method and relevant apparatus and Transmission system
CN106067875B (en) Intelligent terminal encryption method and system
CN110611668A (en) Freely-configurable Internet of things monitoring method and device, storage medium and equipment
CN113852624A (en) Data cross-network transmission method, device and computer medium thereof
KR101625554B1 (en) System and method for authentication and key agreement
CN111083681A (en) Near field communication data encryption method, terminal device and vehicle
CN106357595A (en) Encryption method and encryption system based on SIM card

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20210309

Termination date: 20211228

CF01 Termination of patent right due to non-payment of annual fee