A network configuration method, related device and system

A technology for network configuration and configuration information, applied in the field of communication, can solve the problems of being unable to resist active attacks, low universality, and high requirements for terminal processing capabilities

Active Publication Date: 2019-04-19
HUAWEI DEVICE CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, the PIN method requires manual input of a PIN code, which is cumbersome and not very secure. Although the PBC method is simple to operate, it cannot resist active attacks. The NFC method requires all devices to have an NFC interface, which is less universal
In addition, WPS uses M1-M8 8 messages for verification. The messages are numerous and complex, and the processing capability of the terminal is also high, so the configuration efficiency is low; other channels) bandwidth is limited, and the interaction messages during the configuration process are numerous and complex, or the content of the interaction messages is too large, which will also lead to low configuration efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network configuration method, related device and system
  • A network configuration method, related device and system
  • A network configuration method, related device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0239]Step S300: The second device uses the public key used by the second device to perform the key exchange to perform the operation of the preset algorithm to obtain the operation value of the public key of the second device, which is obtained by the first device in an out-of-band manner;

[0240] Specifically, the second device holds its own public-private key pair, that is, the second device private key (assumed to be a Key second device) and the second device public key (assumed to be a PKey second device); The operation algorithm performed by the key can refer to figure 1 The operation algorithm described in step S100 in the embodiment will not be repeated here; it can be understood that the operation value of the second device public key (assumed to be the operation value of the second device PKey) in the embodiment of the present invention can also be calculated by the above algorithm The obtained public key operation derivative value (assumed to be the Pkey second dev...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the present invention discloses a network configuration method, including: acquiring the public key operation value of the second device in an out-of-band manner, and the public key operation value of the second device is preset by using the public key used by the second device to perform key exchange The result obtained from the operation of the algorithm; generate the public key information of the first device according to the public key used by the first device to perform key exchange, and send the public key information of the first device to the second device, so that the second device can Device public key information Obtain the public key of the first device; obtain the copy of the second device’s public key sent by the second device for key exchange; perform a preset algorithm on the copy of the second device’s public key to obtain the second device A copy of the operation value of the public key; when the copy of the operation value of the public key of the second device matches the operation value of the public key of the second device, generate the second device according to the private key used by the first device to perform key exchange and the obtained copy of the public key of the second device An exchange key for handling configuration information between the first device and the second device. The invention simplifies the network configuration process.

Description

technical field [0001] The present invention relates to the communication field, in particular to a network configuration method, a related device and a system. Background technique [0002] Wireless Fidelity (Wireless Fidelity, Wi-Fi) is a widely used wireless communication technology. It has the advantages of fast deployment, convenient use and high transmission rate. It is widely used in various industries. The access points of Wi-Fi networks are all over the world. Hotels, cafes, schools, hospitals and other places, it can be said that Wi-Fi is ubiquitous in life. [0003] Although Wi-Fi networks are becoming more and more popular, due to the complexity of Wi-Fi network settings, equipment manufacturers still have to invest a lot of support costs to help users establish Wi-Fi networks and solve problems during use. Among those users who have successfully set up a wireless network, 60%-70% still have not configured any security parameters, and the network is vulnerable t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04W4/80
CPCH04L63/06H04L41/0806H04L67/34G06F21/42H04L63/0435H04L63/0823H04L63/12H04W12/02H04W84/12H04L2463/062H04L9/0844H04L9/3215H04W4/80H04W12/50H04L41/344H04L63/0428H04L9/0816H04L63/061
Inventor 李小仙丁志明庞高昆陆苏
Owner HUAWEI DEVICE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products