CN106789022B - Method, device and system for generating shared key - Google Patents
Method, device and system for generating shared key Download PDFInfo
- Publication number
- CN106789022B CN106789022B CN201611240968.7A CN201611240968A CN106789022B CN 106789022 B CN106789022 B CN 106789022B CN 201611240968 A CN201611240968 A CN 201611240968A CN 106789022 B CN106789022 B CN 106789022B
- Authority
- CN
- China
- Prior art keywords
- server
- intelligent lock
- key
- public key
- mobile terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Lock And Its Accessories (AREA)
- Telephonic Communication Services (AREA)
Abstract
The embodiment of the invention provides a method, a device and a system for generating a shared secret key, and relates to the field of communication. The method comprises the following steps: the mobile terminal sends a server public key request carrying the ID of the intelligent lock to the server so that the server generates a server key pair which corresponds to the ID of the intelligent lock and comprises a server private key and a server public key; receiving a server public key returned by the server; sending the server public key to the intelligent lock so that the intelligent lock generates an intelligent lock key pair comprising the intelligent lock public key and the intelligent lock private key according to the server public key, and calculating an intelligent lock shared key according to the intelligent lock private key and the server public key; receiving an intelligent lock public key returned by the intelligent lock; and sending the public key of the intelligent lock to the server so that the server can calculate a server shared key equal to the shared key of the intelligent lock according to the private key of the server and the public key of the intelligent lock. The method, the device and the system for generating the shared secret key solve the problem that the shared secret key is leaked when the intelligent door lock is initialized, and improve the safety.
Description
Technical Field
The present invention relates to the field of communications, and in particular, to a method, an apparatus, and a system for generating a shared key.
Background
The door opening command of the intelligent door lock is generally transmitted and sent in an encryption mode, so that the server and the intelligent door lock are required to share the same secret key. In the existing scheme, when the lock is initialized, the secret key is obtained from the server side in a plaintext mode and is sent to the intelligent door lock in the plaintext mode, the secret key which is used as the key shared secret key for encryption and decryption in the process is transmitted in the plaintext mode, and potential safety hazards exist.
Disclosure of Invention
In view of this, an object of the embodiments of the present invention is to provide a method, an apparatus, and a system for generating a shared key, so as to solve the problem of leakage of the shared key when initializing an intelligent door lock, and improve security.
The technical scheme of the embodiment provided by the invention is as follows:
in a first aspect, an embodiment of the present invention provides a method for generating a shared key, where the method includes: the method comprises the steps that a mobile terminal sends a server public key request carrying an intelligent lock ID to a server, so that the server generates a server secret key pair which corresponds to the intelligent lock ID and comprises a server private key and the server public key; the mobile terminal receives the server public key returned by the server; sending the server public key to the intelligent lock, so that the intelligent lock generates an intelligent lock secret key pair comprising an intelligent lock public key and an intelligent lock private key according to the server public key, and calculating an intelligent lock shared secret key according to the intelligent lock private key and the server public key; receiving the public key of the intelligent lock returned by the intelligent lock; and sending the public key of the intelligent lock to the server so that the server can calculate a server shared key equal to the shared key of the intelligent lock according to the private key of the server and the public key of the intelligent lock.
In a second aspect, an embodiment of the present invention provides a method for generating a shared key, where the method includes: the server acquires a server public key request carrying an intelligent lock ID sent by the mobile terminal; the server generates a server key pair which comprises a server public key and a server private key and corresponds to the intelligent lock ID according to the intelligent lock ID; the server sends the server public key to the intelligent lock through the mobile terminal, so that the intelligent lock generates an intelligent lock secret key pair comprising an intelligent lock public key and an intelligent lock private key according to the server public key, and an intelligent lock shared secret key is calculated according to the intelligent lock private key and the server public key; and the server receives the intelligent lock public key sent by the intelligent lock through the mobile terminal, and calculates a server shared key equal to the intelligent lock shared key according to the server private key and the intelligent lock public key.
In a third aspect, an embodiment of the present invention provides a method for generating a shared key, where the method includes: the intelligent lock sends a server public key request carrying the intelligent lock ID to a server through a mobile terminal, so that the server generates a server secret key pair which corresponds to the intelligent lock ID and comprises a server private key and the server public key; the intelligent lock receives the server public key returned by the server through the mobile terminal, and generates an intelligent lock secret key pair comprising an intelligent lock private key and an intelligent lock public key according to the server public key; the intelligent lock calculates an intelligent lock shared key according to the intelligent lock private key and the server public key; and the intelligent lock sends the intelligent lock public key to the server through the mobile terminal, so that the server calculates a server shared key equal to the intelligent lock shared key according to the intelligent lock public key and the server private key.
In a fourth aspect, an embodiment of the present invention provides a method for generating a shared key, where the method includes: the mobile terminal sends a server public key request carrying the ID of the intelligent lock to a server; the server receives a server public key request sent by the mobile terminal, and generates a server secret key pair which corresponds to the intelligent lock ID and comprises a server private key and the server public key; the server sends the server public key to the mobile terminal; the mobile terminal receives the server public key and sends the server public key to the intelligent lock; the intelligent lock receives the server public key and generates an intelligent lock secret key pair comprising an intelligent lock private key and an intelligent lock private key according to the server public key; the intelligent lock calculates an intelligent lock shared key according to the intelligent lock private key and the server public key; the intelligent lock sends the public key of the intelligent lock to the mobile terminal; the mobile terminal receives the intelligent lock public key and sends the intelligent lock public key to the server; and the server receives the intelligent lock public key and calculates a server shared key equal to the intelligent lock shared key according to the intelligent lock public key and the server key.
In a fifth aspect, an embodiment of the present invention provides an apparatus for generating a shared key, where the apparatus includes: the system comprises a first request sending module, a second request sending module and a third request sending module, wherein the first request sending module is used for sending a server public key request carrying an intelligent lock ID to a server so that the server generates a server secret key pair which corresponds to the intelligent lock ID and comprises a server private key and the server public key; the first public key receiving module is used for receiving the server public key returned by the server; the first public key sending module is used for sending the server public key to the intelligent lock so that the intelligent lock generates an intelligent lock secret key pair comprising an intelligent lock public key and an intelligent lock private key according to the server public key, and an intelligent lock shared secret key is calculated according to the intelligent lock private key and the server public key; the second public key receiving module is used for receiving the public key of the intelligent lock returned by the intelligent lock; and the second public key sending module is used for sending the intelligent lock public key to the server so that the server can calculate a server shared key equal to the intelligent lock shared key according to the server private key and the intelligent lock public key.
In a sixth aspect, an embodiment of the present invention provides an apparatus for generating a shared key, where the apparatus includes: the request acquisition module is used for acquiring a server public key request carrying an intelligent lock ID sent by the mobile terminal; the first data generation module is used for generating a server key pair which corresponds to the ID of the intelligent lock and comprises a server public key and a server private key according to the ID of the intelligent lock; the third public key sending module is used for sending the server public key to the intelligent lock through the mobile terminal so that the intelligent lock generates an intelligent lock secret key pair comprising an intelligent lock public key and an intelligent lock private key according to the server public key, and an intelligent lock shared secret key is calculated according to the intelligent lock private key and the server public key; and the third public key receiving module is used for receiving the intelligent lock public key sent by the intelligent lock through the mobile terminal and calculating a server shared key equal to the intelligent lock shared key according to the server private key and the intelligent lock public key.
In a seventh aspect, an embodiment of the present invention provides an apparatus for generating a shared key, where the apparatus includes: a third request sending module, configured to send, by a mobile terminal, a server public key request carrying the intelligent lock ID to a server, so that the server generates a server private key pair including a server private key and the server public key, where the server private key pair corresponds to the intelligent lock ID; the fourth public key receiving module is used for receiving the server public key returned by the server through the mobile terminal and generating an intelligent lock secret key pair comprising an intelligent lock private key and an intelligent lock public key according to the server public key; the key calculation module is used for calculating an intelligent lock shared key according to the intelligent lock private key and the server public key; and the fourth public key sending module is used for sending the intelligent lock public key to the server through the mobile terminal so that the server can calculate a server shared key equal to the intelligent lock shared key according to the intelligent lock public key and the server private key.
In an eighth aspect, an embodiment of the present invention provides a system for generating a shared key, where the system includes an intelligent lock, a mobile terminal, and a server, where: the mobile terminal is used for sending a server public key request carrying the ID of the intelligent lock to the server; the server is used for receiving a server public key request sent by the mobile terminal and generating a server secret key pair which corresponds to the intelligent lock ID and comprises a server private key and the server public key; the server is used for sending the server public key to the mobile terminal; the mobile terminal is used for receiving the server public key and sending the server public key to the intelligent lock; the intelligent lock is used for receiving the server public key and generating an intelligent lock secret key pair comprising an intelligent lock private key and an intelligent lock private key according to the server public key; the intelligent lock is used for calculating an intelligent lock shared key according to the intelligent lock private key and the server public key; the intelligent lock is used for sending the public key of the intelligent lock to the mobile terminal; the mobile terminal is used for receiving the intelligent lock public key and sending the intelligent lock public key to the server; and the server is used for receiving the intelligent lock public key and calculating a server shared key equal to the intelligent lock shared key according to the intelligent lock public key and the server key.
The method, the device and the system for generating the shared key provided by the embodiment of the invention firstly send a server public key request carrying the ID of the intelligent lock to the server through the mobile terminal so that the server generates a server key pair which corresponds to the ID of the intelligent lock and comprises a server private key and a server public key; then receiving a server public key returned by the server; sending the server public key to the intelligent lock so that the intelligent lock generates an intelligent lock key pair comprising the intelligent lock public key and the intelligent lock private key according to the server public key, and calculating an intelligent lock shared key according to the intelligent lock private key and the server public key; finally, receiving an intelligent lock public key returned by the intelligent lock; and sending the public key of the intelligent lock to the server so that the server can calculate a server shared key equal to the shared key of the intelligent lock according to the private key of the server and the public key of the intelligent lock. According to the method, the device and the system for generating the shared secret key, the private key is not transmitted and is not disclosed to the outside in the whole process, the problem that the shared secret key is leaked when the intelligent door lock is initialized is solved, and the safety is improved.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by the practice of the embodiments of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
Fig. 1 is a schematic diagram illustrating a mobile terminal respectively communicating with an intelligent lock and a server according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating a method of shared key generation provided by a first embodiment of the present invention;
fig. 3 shows a flowchart of a method for shared key generation provided by a second embodiment of the present invention;
fig. 4 is a flowchart illustrating a method of shared key generation according to a third embodiment of the present invention;
fig. 5 shows a timing diagram of a method for shared key generation provided by a fourth embodiment of the present invention;
fig. 6 is a block diagram illustrating a shared key generation apparatus according to a fifth embodiment of the present invention;
fig. 7 is a block diagram illustrating a shared key generation apparatus according to a sixth embodiment of the present invention;
fig. 8 shows a block diagram of an apparatus for generating a shared key according to a seventh embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present invention without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures. Meanwhile, in the description of the present invention, the terms "first", "second", and the like are used only for distinguishing the description, and are not to be construed as indicating or implying relative importance.
Fig. 1 is a schematic diagram of a mobile terminal 100 respectively communicating with an intelligent lock 200 and a server 300 according to an embodiment of the present invention, where the mobile terminal 100 and the intelligent lock 200 are in short-range communication, and the intelligent lock 200 is not networked, and the server 300 is in communication connection with one or more mobile terminals 100 through a network to perform data communication or interaction. The server 300 may be a web server, a database server, or the like. The mobile terminal 100 may be a Personal Computer (PC), a tablet PC, a smart phone, a Personal Digital Assistant (PDA), a wearable device, or other terminals.
First embodiment
Referring to fig. 2, fig. 2 shows a flowchart of a method for generating a shared key according to a first embodiment of the present invention, and the method will be described in detail with respect to the flowchart shown in fig. 2, and includes:
step S110: the mobile terminal sends a near field communication connection request to the intelligent lock so as to establish near field communication connection between the mobile terminal and the intelligent lock, wherein the near field communication connection is Bluetooth connection, NFC connection or ZigBee connection.
In this embodiment, the mobile terminal starts a process of setting a key, and sends a connection request to the smart lock, where the connection request is a close-range connection request, so as to establish a close-range communication connection between the mobile terminal and the smart lock. As a mode, the near field communication connection is a bluetooth connection, an NFC connection, or a ZigBee connection, where the bluetooth connection establishes a general near field wireless interface for a communication environment between fixed devices or mobile devices, and further combines communication and computer technologies, so that mutual communication or operation can be achieved within a near field range without cables or cables interconnecting various devices. The NFC connection can quickly and automatically establish a wireless network, so that the electronic equipment can communicate in a short distance. And ZigBee is mainly applied to point electronic equipment within a short distance range and with low data transmission rate. The intelligent lock and the mobile terminal adopt a close-range connection mode to realize the exchange of secret keys of the intelligent lock without networking.
Step S120: and the mobile terminal acquires the ID of the intelligent lock so that the server generates a server shared key corresponding to the ID of the intelligent lock.
As a mode, after the mobile terminal establishes connection with the smart lock, the mobile terminal sends a smart lock ID request to the smart lock, the smart lock responds to the request and sends a smart lock ID to the mobile terminal, or the mobile terminal scans a barcode or a two-dimensional code attached to the smart lock to obtain the ID of the smart lock.
Step S130: the mobile terminal sends a server public key request carrying an intelligent lock ID to a server, so that the server generates a server secret key pair which corresponds to the intelligent lock ID and comprises a server private key and the server public key.
The mobile terminal and the server are connected through network communication, the mobile terminal sends a server public key request to the server after acquiring the ID of the intelligent lock, and the request carries the ID of the intelligent lock as a mode, so that the server generates a server secret key pair comprising a server private key and a server public key according to the ID of the intelligent lock. In this embodiment, after receiving the request carrying the ID of the intelligent lock, the server obtains a server public key and a server private key corresponding to the intelligent lock through an elliptic encryption algorithm.
Step S140: and the mobile terminal receives the server public key returned by the server.
As a mode, after obtaining a server public key and a server private key, the server stores the server private key, and sends the server public key to the mobile terminal, and the mobile terminal receives the server public key returned by the server.
Step S150: and sending the server public key to the intelligent lock, so that the intelligent lock generates an intelligent lock secret key pair comprising an intelligent lock public key and an intelligent lock private key according to the server public key, and calculating an intelligent lock shared secret key according to the intelligent lock private key and the server public key.
The mobile terminal sends a server public key returned by the server to the intelligent lock, the intelligent lock receives the server public key, and generates an intelligent lock secret key pair comprising the intelligent lock public key and the intelligent lock private key according to the server public key. The intelligent lock and the server are preset with a public parameter, after the intelligent lock generates an intelligent lock private key, the intelligent lock calculates according to an elliptic encryption algorithm, the intelligent lock private key, a server public key and the preset public parameter to obtain an intelligent lock shared key, and the shared key is stored.
Step S160: and receiving the intelligent lock public key returned by the intelligent lock.
As a mode, after obtaining the private key of the intelligent lock and the public key of the intelligent lock, the intelligent lock stores the private key of the intelligent lock and sends the public key of the intelligent lock to the mobile terminal, and the mobile terminal receives the public key of the intelligent lock.
Step S170: and sending the public key of the intelligent lock to the server so that the server can calculate a server shared key equal to the shared key of the intelligent lock according to the private key of the server and the public key of the intelligent lock.
In this embodiment, the mobile terminal sends the smart lock public key returned by the smart lock to the server, where the server receives the smart lock public key, where the smart lock and the server have a preset public parameter, the server calculates the smart lock shared key according to the elliptic encryption algorithm, the smart lock public key, the server private key, and the preset public parameter, and finally the server shared key calculated by the server is equal to the smart lock shared key calculated by the smart lock. In the whole shared key generation process, the shared key is not transmitted, so that the safety of command transmission between the server and the intelligent lock is ensured.
The method for generating a shared key provided by the first embodiment of the present invention first sends a server public key request carrying an intelligent lock ID to a server through a mobile terminal, so that the server generates a server key pair including a server private key and a server public key corresponding to the intelligent lock ID; then receiving a server public key returned by the server; sending the server public key to the intelligent lock so that the intelligent lock generates an intelligent lock key pair comprising the intelligent lock public key and the intelligent lock private key according to the server public key, and calculating an intelligent lock shared key according to the intelligent lock private key and the server public key; finally, receiving an intelligent lock public key returned by the intelligent lock; and sending the public key of the intelligent lock to the server so that the server can calculate a server shared key equal to the shared key of the intelligent lock according to the private key of the server and the public key of the intelligent lock. In the method for generating the shared secret key, the private key is not transmitted in the whole process and is not disclosed to the outside, so that the problem of leakage of the shared secret key when the intelligent door lock is initialized is solved, and the safety is improved.
Second embodiment
Referring to fig. 3, fig. 3 shows a flowchart of a method for generating a shared key according to a second embodiment of the present invention, which will be described in detail below with respect to the flowchart shown in fig. 3, wherein, as in the first embodiment, a close-range communication connection is established between the mobile terminal and the smart lock, the close-range communication connection includes a bluetooth connection, an NFC connection, or a ZigBee connection, etc. to implement that the smart lock does not network and performs key exchange, and the method includes:
step S210: and the server acquires a server public key request carrying the ID of the intelligent lock sent by the mobile terminal.
In this embodiment, the mobile terminal and the server are connected through network communication, after a close-range connection is established between the mobile terminal and the intelligent lock, the mobile terminal sends an intelligent lock ID request to the intelligent lock, the intelligent lock responds to the request and sends an intelligent lock ID to the mobile terminal, or the mobile terminal scans a bar code or a two-dimensional code attached to the intelligent lock to obtain the ID of the intelligent lock, a server public key request carrying the intelligent lock ID is sent to the server, and the server obtains the server public key request.
Step S220: and the server generates a server key pair which corresponds to the ID of the intelligent lock and comprises a server public key and a server private key according to the ID of the intelligent lock.
And the server generates a server key pair comprising a server private key and a server public key according to the acquired intelligent lock ID. In this embodiment, after receiving the request carrying the ID of the intelligent lock, the server obtains a server public key and a server private key corresponding to the intelligent lock through an elliptic encryption algorithm.
Step S230: and the server sends the server public key to the intelligent lock through the mobile terminal, so that the intelligent lock generates an intelligent lock secret key pair comprising an intelligent lock public key and an intelligent lock private key according to the server public key, and an intelligent lock shared secret key is calculated according to the intelligent lock private key and the server public key.
In an implementation manner of this embodiment, the server stores the server private key, and sends the server public key to the smart lock through the mobile terminal, and the smart lock receives the server public key and generates a smart lock key pair including the smart lock public key and the smart lock private key according to the server public key. After the intelligent lock generates the intelligent lock private key, the intelligent lock calculates the intelligent lock shared key through an elliptic encryption algorithm according to the server public key and the intelligent lock private key, and the shared key is stored.
Step S240: and the server receives the intelligent lock public key sent by the intelligent lock through the mobile terminal, and calculates a server shared key equal to the intelligent lock shared key according to the server private key and the intelligent lock public key.
And the server receives the intelligent lock public key and calculates a server shared key according to the intelligent lock public key and the server private key through an elliptic encryption algorithm, wherein the server shared key calculated by the server is equal to the intelligent lock shared key calculated by the intelligent lock. In the whole shared key generation process, the shared key is not transmitted, so that the safety of command transmission between the server and the intelligent lock is ensured.
The method for generating the shared key provided by the second embodiment of the invention firstly obtains a server public key request carrying an intelligent lock ID sent by a mobile terminal through a server; generating a server key pair which corresponds to the intelligent lock ID and comprises a server public key and a server private key according to the intelligent lock ID; then the server public key is sent to the intelligent lock through the mobile terminal, so that the intelligent lock generates an intelligent lock secret key pair comprising an intelligent lock public key and an intelligent lock private key according to the server public key, and an intelligent lock shared secret key is calculated according to the intelligent lock private key and the server public key; and finally, receiving the public key of the intelligent lock sent by the intelligent lock through the mobile terminal, and calculating a server shared key equal to the intelligent lock shared key according to the server private key and the public key of the intelligent lock. In the method for generating the shared secret key, the private key is not transmitted in the whole process and is not disclosed to the outside, so that the problem of leakage of the shared secret key when the intelligent door lock is initialized is solved, and the safety is improved.
Third embodiment
Referring to fig. 4, fig. 4 shows a flowchart of a method for generating a shared key according to a third embodiment of the present invention, which will be described in detail with reference to the flowchart shown in fig. 4, wherein, as in the first embodiment, the mobile terminal and the smart lock establish a close-range communication connection, the close-range communication connection includes a bluetooth connection, an NFC connection, or a ZigBee connection, etc., so as to enable the smart lock to exchange keys without networking, the method includes:
step S310: and the intelligent lock sends a server public key request carrying the ID of the intelligent lock to a server through a mobile terminal, so that the server generates a server secret key pair which corresponds to the ID of the intelligent lock and comprises a server private key and the server public key.
In this embodiment, after the mobile terminal and the server establish a close-range connection, the mobile terminal sends an intelligent lock ID request to the intelligent lock, the intelligent lock responds to the request and sends the intelligent lock ID to the mobile terminal, or the mobile terminal scans a barcode or a two-dimensional code attached to the intelligent lock to obtain the intelligent lock ID, sends a server public key request carrying the intelligent lock ID to the server, and the server generates a server secret key pair including a server private key and a server public key according to the obtained intelligent lock ID. In this embodiment, after receiving the request carrying the ID of the intelligent lock, the server obtains a server public key and a server private key corresponding to the intelligent lock through an elliptic encryption algorithm.
Step S320: and the intelligent lock receives the server public key returned by the server through the mobile terminal, and generates an intelligent lock secret key pair comprising an intelligent lock private key and an intelligent lock public key according to the server public key.
In an implementation manner of this embodiment, the server stores the server private key, and sends the server public key to the smart lock through the mobile terminal, and the smart lock receives the server public key and generates a smart lock key pair including the smart lock public key and the smart lock private key according to the server public key.
Step S330: and the intelligent lock calculates an intelligent lock shared key according to the intelligent lock private key and the server public key.
After the intelligent lock generates the intelligent lock private key, the intelligent lock calculates the intelligent lock shared key through an elliptic encryption algorithm according to the server public key and the intelligent lock private key, and the shared key is stored.
Step S340: and the intelligent lock sends the intelligent lock public key to the server through the mobile terminal, so that the server calculates a server shared key equal to the intelligent lock shared key according to the intelligent lock public key and the server private key.
In this embodiment, after obtaining the private key of the smart lock and the public key of the smart lock, the smart lock stores the private key of the smart lock, and sends the public key of the smart lock to the server through the mobile terminal, and the server receives the public key of the smart lock and calculates a server shared key according to the public key of the smart lock and the private key of the server through an elliptic encryption algorithm, wherein the server shared key calculated by the server is equal to the intelligent lock shared key calculated by the smart lock. In the whole shared key generation process, the shared key is not transmitted, so that the safety of command transmission between the server and the intelligent lock is ensured.
The method for generating a shared key according to the third embodiment of the present invention first sends a server public key request carrying the ID of the smart lock to a server through the smart lock via a mobile terminal, such that the server generates a server key pair comprising a server private key and the server public key corresponding to the smart lock ID, the intelligent lock receives the server public key returned by the server through the mobile terminal, generating an intelligent lock key pair comprising an intelligent lock private key and an intelligent lock public key according to the server public key, then, an intelligent lock shared key is calculated according to the intelligent lock private key and the server public key, and finally the intelligent lock public key is sent to the server through the mobile terminal, and the server calculates a server shared secret key equal to the intelligent lock shared secret key according to the intelligent lock public key and the server private key. In the method for generating the shared secret key, the private key is not transmitted in the whole process and is not disclosed to the outside, so that the problem of leakage of the shared secret key when the intelligent door lock is initialized is solved, and the safety is improved.
Fourth embodiment
Referring to fig. 5, fig. 5 shows a timing diagram of a method for key generation according to a fourth embodiment of the present invention, which will be described in detail below with respect to the flow shown in fig. 5, wherein, as in the first embodiment, a close-range communication connection is established between the mobile terminal and the smart lock, the close-range communication connection includes a bluetooth connection, an NFC connection, or a ZigBee connection, etc. to implement that the smart lock does not perform networking for key exchange, and the method includes:
step S410: and the mobile terminal sends a server public key request carrying the intelligent lock ID to the server.
In the implementation, a near field communication connection is established between the mobile terminal and the intelligent lock, the mobile terminal sends an intelligent lock ID request to the intelligent lock, the intelligent lock responds to the request and sends the intelligent lock ID to the mobile terminal, or the mobile terminal scans a bar code or a two-dimensional code attached to the intelligent lock, and after the intelligent lock ID is obtained, a server public key request carrying the intelligent lock ID is sent to the server.
Step S420: and the server receives a server public key request sent by the mobile terminal and generates a server secret key pair which corresponds to the intelligent lock ID and comprises a server private key and the server public key.
As one mode, the server receives a request sent by the mobile terminal, and generates a server key pair including a server private key and a server public key according to the acquired smart lock ID. In this embodiment, after receiving the request carrying the ID of the intelligent lock, the server obtains a server public key and a server private key corresponding to the intelligent lock through an elliptic encryption algorithm.
Step S430: and the server sends the server public key to the mobile terminal.
After the server generates a server private key and a server public key, the server stores the server private key and sends the server public key to the mobile terminal.
Step S440: and the mobile terminal receives the server public key and sends the server public key to the intelligent lock.
And the mobile terminal receives the server public key sent by the server and sends the server public key to the intelligent lock.
Step S450: and the intelligent lock receives the server public key and generates an intelligent lock secret key pair comprising an intelligent lock private key and an intelligent lock private key according to the server public key.
As one mode, the smart lock receives a server public key sent by the mobile terminal, and generates a smart lock key pair including a smart lock public key and a smart lock private key according to the server public key, where the smart lock generates the smart lock private key and the smart lock public key according to an elliptic encryption algorithm and the obtained server public key.
Step S460: and the intelligent lock calculates an intelligent lock shared key according to the intelligent lock private key and the server public key.
After the intelligent lock generates the intelligent lock private key, the intelligent lock calculates the intelligent lock shared key through an elliptic encryption algorithm according to the server public key and the intelligent lock private key, and the shared key is stored.
Step S470: and the intelligent lock sends the public key of the intelligent lock to the mobile terminal.
In this embodiment, after obtaining the private key of the intelligent lock and the public key of the intelligent lock, the intelligent lock stores the private key of the intelligent lock, and sends the public key of the intelligent lock to the mobile terminal through the mobile terminal.
Step S480: and the mobile terminal receives the intelligent lock public key and sends the intelligent lock public key to the server.
And the mobile terminal receives the intelligent lock public key sent by the intelligent lock and sends the intelligent lock public key to the server.
Step S490: and the server receives the intelligent lock public key and calculates a server shared key equal to the intelligent lock shared key according to the intelligent lock public key and the server key.
And the server receives the intelligent lock public key and calculates a server shared key according to the intelligent lock public key and the server private key through an elliptic encryption algorithm, wherein the server shared key calculated by the server is equal to the intelligent lock shared key calculated by the intelligent lock. In the whole shared key generation process, the shared key is not transmitted, so that the safety of command transmission between the server and the intelligent lock is ensured.
The fourth embodiment of the present invention provides a method for generating a shared key, wherein a mobile terminal sends a server public key request carrying an intelligent lock ID to a server, the server receives the server public key request sent by the mobile terminal, generates a server private key pair corresponding to the intelligent lock ID and comprising a server private key and the server public key, sends the server public key to the mobile terminal, the mobile terminal receives the server public key, sends the server public key to the intelligent lock, the intelligent lock receives the server public key, generates an intelligent lock key pair comprising an intelligent lock private key and an intelligent lock private key according to the server public key, calculates an intelligent lock shared key according to the intelligent lock private key and the server public key, sends the intelligent lock public key to the mobile terminal, and finally the mobile terminal receives the intelligent lock public key, and sending the intelligent lock public key to the server, receiving the intelligent lock public key by the server, and calculating a server shared key equal to the intelligent lock shared key according to the intelligent lock public key and the server key. In the method for generating the shared secret key, the private key is not transmitted in the whole process and is not disclosed to the outside, so that the problem of leakage of the shared secret key when the intelligent door lock is initialized is solved, and the safety is improved.
Fifth embodiment
Referring to fig. 6, fig. 6 shows a block diagram of a device for generating a shared key according to a fifth embodiment of the present invention, and the block diagram of the structure shown in fig. 6 will be described below, where the device is applied to a mobile terminal 100, and the device includes a second request sending module 110, a data obtaining module 120, a first request sending module 130, a first public key receiving module 140, a first public key sending module 150, a second public key receiving module 160, and a second public key sending module 170, where:
a second request sending module 110, configured to send a close-range communication connection request to the smart lock, so as to establish a close-range communication connection between the mobile terminal and the smart lock, where the close-range communication connection is a bluetooth connection, an NFC connection, or a ZigBee connection. A data obtaining module 120, configured to obtain the smart lock ID, so that the server generates a server shared key corresponding to the smart lock ID. The first request sending module 130 is configured to send a server public key request carrying an intelligent lock ID to a server, so that the server generates a server key pair including a server private key and the server public key, where the server key pair corresponds to the intelligent lock ID. A first public key receiving module 140, configured to receive the server public key returned by the server. The first public key sending module 150 is configured to send the server public key to the smart lock, so that the smart lock generates a smart lock key pair including a smart lock public key and a smart lock private key according to the server public key, and calculates a smart lock shared key according to the smart lock private key and the server public key. And the second public key receiving module 160 is configured to receive the public key of the smart lock returned by the smart lock. And a second public key sending module 170, configured to send the public key of the smart lock to the server, so that the server calculates a server shared key equal to the shared key of the smart lock according to the server private key and the public key of the smart lock.
In this embodiment, please refer to the contents described in the embodiments shown in fig. 1 to fig. 5 for the process of implementing each function of each functional module of the shared key generating device, which is not described herein again.
Sixth embodiment
Referring to fig. 7, fig. 7 shows a block diagram of an apparatus for generating a shared key according to a sixth embodiment of the present invention, and the block diagram shown in fig. 7 will be described below, where the apparatus is applied to a server 300, and the apparatus includes a request obtaining module 310, a first data generating module 320, a third public key sending module 330, and a third public key receiving module 340, where:
the request obtaining module 310 is configured to obtain a server public key request carrying an intelligent lock ID sent by a mobile terminal. The first data generating module 320 is configured to generate a server key pair including a server public key and a server private key corresponding to the intelligent lock ID according to the intelligent lock ID. A third public key sending module 330, configured to send the server public key to the smart lock through the mobile terminal, so that the smart lock generates a smart lock key pair including a smart lock public key and a smart lock private key according to the server public key, and calculates a smart lock shared key according to the smart lock private key and the server public key. The third public key receiving module 340 is configured to receive the public key of the intelligent lock sent by the mobile terminal, and calculate a server shared key equal to the intelligent lock shared key according to the server private key and the public key of the intelligent lock.
In this embodiment, please refer to the contents described in the embodiments shown in fig. 1 to fig. 5 for the process of implementing each function of each functional module of the shared key generating device, which is not described herein again.
Seventh embodiment
Referring to fig. 8, fig. 8 shows a block diagram of a device for generating a shared key according to a seventh embodiment of the present invention, and the block diagram of the structure shown in fig. 8 will be described below, where the device is applied to a smart lock 200, and the device includes a third request sending module 210, a fourth public key receiving module 220, a key calculating module 230, and a fourth public key sending module 240, where:
a third request sending module 210, configured to send, by the mobile terminal, a server public key request carrying the ID of the intelligent lock to a server, so that the server generates a server private key pair including a server private key and the server public key corresponding to the ID of the intelligent lock. A fourth public key receiving module 220, configured to receive the server public key returned by the server through the mobile terminal, and generate an intelligent lock key pair including an intelligent lock private key and an intelligent lock public key according to the server public key. And a key calculation module 230, configured to calculate a shared key of the smart lock according to the private key of the smart lock and the public key of the server. A fourth public key sending module 240, configured to send the public key of the smart lock to the server through the mobile terminal, so that the server calculates a server shared key equal to the shared key of the smart lock according to the public key of the smart lock and the server private key.
In this embodiment, please refer to the contents described in the embodiments shown in fig. 1 to fig. 5 for the process of implementing each function of each functional module of the shared key generating device, which is not described herein again.
Eighth embodiment
The present embodiment further provides a system for generating a shared key, where the system includes an intelligent lock, a mobile terminal, and a server, where:
the mobile terminal is used for sending a server public key request carrying the ID of the intelligent lock to the server; the server is used for receiving a server public key request sent by the mobile terminal and generating a server secret key pair which corresponds to the intelligent lock ID and comprises a server private key and the server public key; the server is used for sending the server public key to the mobile terminal; the mobile terminal is used for receiving the server public key and sending the server public key to the intelligent lock; the intelligent lock is used for receiving the server public key and generating an intelligent lock secret key pair comprising an intelligent lock private key and an intelligent lock private key according to the server public key; the intelligent lock is used for calculating an intelligent lock shared key according to the intelligent lock private key and the server public key; the intelligent lock is used for sending the public key of the intelligent lock to the mobile terminal; the mobile terminal is used for receiving the intelligent lock public key and sending the intelligent lock public key to the server; and the server is used for receiving the intelligent lock public key and calculating a server shared key equal to the intelligent lock shared key according to the intelligent lock public key and the server key.
In summary, the method, the apparatus, and the system for generating a shared key provided in the embodiments of the present invention first send a server public key request carrying an intelligent lock ID to a server through a mobile terminal, so that the server generates a server key pair including a server private key and a server public key corresponding to the intelligent lock ID; then receiving a server public key returned by the server; sending the server public key to the intelligent lock so that the intelligent lock generates an intelligent lock key pair comprising the intelligent lock public key and the intelligent lock private key according to the server public key, and calculating an intelligent lock shared key according to the intelligent lock private key and the server public key; finally, receiving an intelligent lock public key returned by the intelligent lock; and sending the public key of the intelligent lock to the server so that the server can calculate a server shared key equal to the shared key of the intelligent lock according to the private key of the server and the public key of the intelligent lock. According to the method, the device and the system for generating the shared secret key, the private key is not transmitted and is not disclosed to the outside in the whole process, the problem that the shared secret key is leaked when the intelligent door lock is initialized is solved, and the safety is improved.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method can be implemented in other ways. The apparatus embodiments described above are merely illustrative, and for example, the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, the functional modules in the embodiments of the present invention may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes. It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention. It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
Claims (10)
1. A method of shared key generation, the method comprising:
the method comprises the steps that a mobile terminal sends a server public key request carrying an intelligent lock ID to a server, so that the server generates a server secret key pair which corresponds to the intelligent lock ID and comprises a server private key and the server public key;
the mobile terminal receives the server public key returned by the server;
sending the server public key to the intelligent lock, so that the intelligent lock generates an intelligent lock secret key pair comprising an intelligent lock public key and an intelligent lock private key according to the server public key, and the intelligent lock calculates an intelligent lock shared secret key according to the intelligent lock private key and the server public key;
receiving the public key of the intelligent lock returned by the intelligent lock;
and sending the public key of the intelligent lock to the server so that the server can calculate a server shared key equal to the shared key of the intelligent lock according to the private key of the server and the public key of the intelligent lock.
2. The method of claim 1, wherein before the mobile terminal sending the server public key request with the smart lock ID to the server, the method further comprises:
the mobile terminal sends a near field communication connection request to the intelligent lock so as to establish near field communication connection between the mobile terminal and the intelligent lock, wherein the near field communication connection is Bluetooth connection, NFC connection or ZigBee connection;
and the mobile terminal acquires the ID of the intelligent lock so that the server generates a server shared key corresponding to the ID of the intelligent lock.
3. A method of shared key generation, the method comprising:
the server acquires a server public key request carrying an intelligent lock ID sent by the mobile terminal;
the server generates a server key pair which comprises a server public key and a server private key and corresponds to the intelligent lock ID according to the intelligent lock ID;
the server sends the server public key to the intelligent lock through the mobile terminal, so that the intelligent lock generates an intelligent lock secret key pair comprising an intelligent lock public key and an intelligent lock private key according to the server public key, and the intelligent lock calculates an intelligent lock shared secret key according to the intelligent lock private key and the server public key;
and the server receives the intelligent lock public key sent by the intelligent lock through the mobile terminal, and calculates a server shared key equal to the intelligent lock shared key according to the server private key and the intelligent lock public key.
4. A method of shared key generation, the method comprising:
the intelligent lock sends a server public key request carrying the intelligent lock ID to a server through a mobile terminal, so that the server generates a server secret key pair which corresponds to the intelligent lock ID and comprises a server private key and the server public key;
the intelligent lock receives the server public key returned by the server through the mobile terminal, and generates an intelligent lock secret key pair comprising an intelligent lock private key and an intelligent lock public key according to the server public key;
the intelligent lock calculates an intelligent lock shared key according to the intelligent lock private key and the server public key;
and the intelligent lock sends the intelligent lock public key to the server through the mobile terminal, so that the server calculates a server shared key equal to the intelligent lock shared key according to the intelligent lock public key and the server private key.
5. A method of shared key generation, the method comprising:
the mobile terminal sends a server public key request carrying the ID of the intelligent lock to a server;
the server receives a server public key request sent by the mobile terminal, and generates a server secret key pair which corresponds to the intelligent lock ID and comprises a server private key and the server public key;
the server sends the server public key to the mobile terminal;
the mobile terminal receives the server public key and sends the server public key to the intelligent lock;
the intelligent lock receives the server public key and generates an intelligent lock secret key pair comprising an intelligent lock private key and an intelligent lock private key according to the server public key;
the intelligent lock calculates an intelligent lock shared key according to the intelligent lock private key and the server public key;
the intelligent lock sends the public key of the intelligent lock to the mobile terminal;
the mobile terminal receives the intelligent lock public key and sends the intelligent lock public key to the server;
and the server receives the intelligent lock public key and calculates a server shared key equal to the intelligent lock shared key according to the intelligent lock public key and the server key.
6. An apparatus for generating a shared key, applied to a mobile terminal, the apparatus comprising:
the system comprises a first request sending module, a second request sending module and a third request sending module, wherein the first request sending module is used for sending a server public key request carrying an intelligent lock ID to a server so that the server generates a server secret key pair which corresponds to the intelligent lock ID and comprises a server private key and the server public key;
the first public key receiving module is used for receiving the server public key returned by the server;
the first public key sending module is used for sending the server public key to the intelligent lock, so that the intelligent lock generates an intelligent lock secret key pair comprising an intelligent lock public key and an intelligent lock private key according to the server public key, and the intelligent lock calculates an intelligent lock shared secret key according to the intelligent lock private key and the server public key;
the second public key receiving module is used for receiving the public key of the intelligent lock returned by the intelligent lock;
and the second public key sending module is used for sending the intelligent lock public key to the server so that the server can calculate a server shared key equal to the intelligent lock shared key according to the server private key and the intelligent lock public key.
7. The apparatus of shared key generation of claim 6, further comprising:
the second request sending module is used for sending a near field communication connection request to the intelligent lock so as to establish a near field communication connection between the mobile terminal and the intelligent lock, wherein the near field communication connection is a Bluetooth connection, an NFC connection or a ZigBee connection;
and the data acquisition module is used for acquiring the ID of the intelligent lock so as to enable the server to generate a server shared key corresponding to the ID of the intelligent lock.
8. An apparatus for shared key generation, applied to a server, the apparatus comprising:
the request acquisition module is used for acquiring a server public key request carrying an intelligent lock ID sent by the mobile terminal;
the first data generation module is used for generating a server key pair which corresponds to the ID of the intelligent lock and comprises a server public key and a server private key according to the ID of the intelligent lock;
the third public key sending module is used for sending the server public key to the intelligent lock through the mobile terminal, so that the intelligent lock generates an intelligent lock secret key pair comprising an intelligent lock public key and an intelligent lock private key according to the server public key, and the intelligent lock calculates an intelligent lock shared secret key according to the intelligent lock private key and the server public key;
and the third public key receiving module is used for receiving the intelligent lock public key sent by the intelligent lock through the mobile terminal and calculating a server shared key equal to the intelligent lock shared key according to the server private key and the intelligent lock public key.
9. An apparatus for generating a shared key, applied to a smart lock, the apparatus comprising:
a third request sending module, configured to send, by a mobile terminal, a server public key request carrying the intelligent lock ID to a server, so that the server generates a server private key pair including a server private key and the server public key, where the server private key pair corresponds to the intelligent lock ID;
the fourth public key receiving module is used for receiving the server public key returned by the server through the mobile terminal and generating an intelligent lock secret key pair comprising an intelligent lock private key and an intelligent lock public key according to the server public key;
the key calculation module is used for calculating an intelligent lock shared key according to the intelligent lock private key and the server public key;
and the fourth public key sending module is used for sending the intelligent lock public key to the server through the mobile terminal so that the server can calculate a server shared key equal to the intelligent lock shared key according to the intelligent lock public key and the server private key.
10. A system for shared key generation, the system comprising a smart lock, a mobile terminal, and a server, wherein:
the mobile terminal is used for sending a server public key request carrying the ID of the intelligent lock to the server;
the server is used for receiving a server public key request sent by the mobile terminal and generating a server secret key pair which corresponds to the intelligent lock ID and comprises a server private key and the server public key;
the server is used for sending the server public key to the mobile terminal;
the mobile terminal is used for receiving the server public key and sending the server public key to the intelligent lock;
the intelligent lock is used for receiving the server public key and generating an intelligent lock secret key pair comprising an intelligent lock private key and an intelligent lock private key according to the server public key;
the intelligent lock is used for calculating an intelligent lock shared key according to the intelligent lock private key and the server public key;
the intelligent lock is used for sending the public key of the intelligent lock to the mobile terminal;
the mobile terminal is used for receiving the intelligent lock public key and sending the intelligent lock public key to the server;
and the server is used for receiving the intelligent lock public key and calculating a server shared key equal to the intelligent lock shared key according to the intelligent lock public key and the server key.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611240968.7A CN106789022B (en) | 2016-12-28 | 2016-12-28 | Method, device and system for generating shared key |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611240968.7A CN106789022B (en) | 2016-12-28 | 2016-12-28 | Method, device and system for generating shared key |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106789022A CN106789022A (en) | 2017-05-31 |
CN106789022B true CN106789022B (en) | 2021-03-09 |
Family
ID=58923514
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611240968.7A Expired - Fee Related CN106789022B (en) | 2016-12-28 | 2016-12-28 | Method, device and system for generating shared key |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106789022B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107426176B (en) * | 2017-06-12 | 2020-02-18 | 东南大学 | Safe underwater transmission method supporting confusion and zero knowledge |
CN107945350A (en) * | 2017-12-21 | 2018-04-20 | 美的集团股份有限公司 | Door lock communication system and method based on safety chip |
CN108122316B (en) * | 2017-12-21 | 2020-02-04 | 美智光电科技有限公司 | Door lock communication system and method based on security chip |
CN109068321B (en) * | 2018-07-19 | 2021-07-02 | 飞天诚信科技股份有限公司 | Method and system for negotiating session key, mobile terminal and intelligent household equipment |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1079565A2 (en) * | 1999-08-25 | 2001-02-28 | Dew Engineering and Development Limited | Method of securely establishing a secure communication link via an unsecured communication network |
CN104980928A (en) * | 2014-04-03 | 2015-10-14 | 华为终端有限公司 | Method, equipment and system used for establishing secure connection |
CN105141568A (en) * | 2014-05-28 | 2015-12-09 | 腾讯科技(深圳)有限公司 | Safe communication channel establishment method and system, client and server |
CN105915344A (en) * | 2016-04-15 | 2016-08-31 | 重庆金瓯科技发展有限责任公司 | Electronic key sharing service system for house renting |
CN106127079A (en) * | 2016-07-15 | 2016-11-16 | 中电长城网际系统应用有限公司 | A kind of data sharing method and device |
-
2016
- 2016-12-28 CN CN201611240968.7A patent/CN106789022B/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1079565A2 (en) * | 1999-08-25 | 2001-02-28 | Dew Engineering and Development Limited | Method of securely establishing a secure communication link via an unsecured communication network |
CN104980928A (en) * | 2014-04-03 | 2015-10-14 | 华为终端有限公司 | Method, equipment and system used for establishing secure connection |
CN105141568A (en) * | 2014-05-28 | 2015-12-09 | 腾讯科技(深圳)有限公司 | Safe communication channel establishment method and system, client and server |
CN105915344A (en) * | 2016-04-15 | 2016-08-31 | 重庆金瓯科技发展有限责任公司 | Electronic key sharing service system for house renting |
CN106127079A (en) * | 2016-07-15 | 2016-11-16 | 中电长城网际系统应用有限公司 | A kind of data sharing method and device |
Also Published As
Publication number | Publication date |
---|---|
CN106789022A (en) | 2017-05-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10972908B2 (en) | Wireless network connection method, apparatus, and system | |
CN113364760A (en) | Data encryption processing method and device, computer equipment and storage medium | |
CN109448195B (en) | Authentication method and device for vehicle virtual key | |
CN106789022B (en) | Method, device and system for generating shared key | |
KR101929699B1 (en) | GPRS system key enforcement method, SGSN device, UE, HLR / HSS, and GPRS system | |
CN103581153A (en) | Encryption method and device in system of Internet of Things | |
CN105978693B (en) | A kind of method and system of terminal association | |
CN116488919B (en) | Data processing method, communication node and storage medium | |
CN104980899A (en) | Communication method and system for mobile terminal, mobile terminal and server | |
CN110351316A (en) | A kind of remote software upgrade method and device | |
CN104144174B (en) | Protect method, user equipment and the server of privacy of user data | |
KR101379711B1 (en) | Method for file encryption and decryption using telephone number | |
CN114429223B (en) | Heterogeneous model building method and device | |
CN104052654A (en) | Method and system for achieving chatting online | |
US20150156173A1 (en) | Communication system utilizing fingerprint information and use thereof | |
CN109525612B (en) | Multi-terminal message encryption transmission method and system | |
CN112040464A (en) | Method for realizing information safety transmission of mobile terminal based on Bluetooth and quantum encryption technology | |
CN109327475B (en) | Multi-layer identity authentication method, device, equipment and storage medium | |
CN104994160B (en) | Document transmission method and relevant apparatus and Transmission system | |
CN106067875B (en) | Intelligent terminal encryption method and system | |
CN110611668A (en) | Freely-configurable Internet of things monitoring method and device, storage medium and equipment | |
CN113852624A (en) | Data cross-network transmission method, device and computer medium thereof | |
KR101625554B1 (en) | System and method for authentication and key agreement | |
CN111083681A (en) | Near field communication data encryption method, terminal device and vehicle | |
CN106357595A (en) | Encryption method and encryption system based on SIM card |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20210309 Termination date: 20211228 |
|
CF01 | Termination of patent right due to non-payment of annual fee |