Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, system, mobile terminal and smart home device for negotiating session key

A smart home device and mobile terminal technology, applied in the field of smart home devices and negotiating session keys, can solve problems such as insufficient intelligence, achieve the effects of ensuring communication security, enhancing user experience, and solving network attacks

Active Publication Date: 2021-07-02
FEITIAN TECHNOLOGIES
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Traditional home devices do not need to be connected to the Internet, and of course they are not smart enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system, mobile terminal and smart home device for negotiating session key
  • Method, system, mobile terminal and smart home device for negotiating session key
  • Method, system, mobile terminal and smart home device for negotiating session key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0073] This embodiment provides a method for negotiating a session key, including:

[0074] Step s1: the mobile terminal sends an authentication request to the smart home device;

[0075] Step s2: the smart home device sends its own first data and its own device identification to the mobile terminal;

[0076] In this embodiment, the first data may specifically be a first random number.

[0077] Step s3: the mobile terminal sends the first data and the device identification to the cloud server;

[0078] Step s4: The cloud server acquires an initial key corresponding to the device identifier, encrypts the first data using the initial key to obtain first encrypted data, and sends the first encrypted data to the mobile terminal;

[0079] In this embodiment, the first encrypted data may specifically be an encrypted first random number.

[0080] Step s5: the mobile terminal sends the first encrypted data and its own first public key to the smart home device;

[0081] Step s6: Th...

Embodiment 2

[0158] This embodiment provides a method for negotiating a session key, such as Picture 1-1 , Figure 1-2 , Figure 1-3 shown, including:

[0159] Step 101: After the mobile terminal and the smart home device are successfully connected to the network, the mobile terminal sends an authentication request to the smart home device;

[0160] In this embodiment, after the mobile terminal and the smart home device are successfully connected to a network, the mobile terminal and the smart home device communicate through a wireless network channel.

[0161] Step 102: the smart home device generates a first random number;

[0162] For example: smart home devices generate the first random number: 28 67 FA 12 A3 D8 C7 A5 55 66 28 7838 C7 A5 E7.

[0163] Step 103: the smart home device sends the first random number and its own device MAC address to the mobile terminal;

[0164] Specifically, the smart home device splices the first random number with its own device MAC address, and sen...

Embodiment 3

[0265] This embodiment provides a system for negotiating a session key, such as figure 2 As shown, the system includes: mobile terminals, smart home devices and cloud servers;

[0266] The mobile terminal includes: a first sending module 11, a first receiving module 12, a second sending module 13, a second receiving module 14, a third sending module 15, a third receiving module 16 and a first computing module 17;

[0267] The first sending module 11 is configured to send an authentication request to the smart home device;

[0268] The first receiving module 12 is configured to receive the first data and device identification from the smart home device;

[0269] The second sending module 13 is configured to send the first data and device identification received by the first receiving module 12 to the cloud server;

[0270] The second receiving module 14 is used to receive the first encrypted data from the cloud server;

[0271] The third sending module 15 is configured to s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method, a system, a mobile terminal and a smart home device for negotiating a session key; the system includes: a mobile terminal, a smart home device and a cloud server; The device public key of the home device is operated to obtain the second authority key, and the second authority key is used as the session key with the smart home device; the smart home device uses its own device private key to exchange the first The public key is operated to obtain the first authority key, and the first authority key is used as the session key with the mobile terminal; after the session key is negotiated between the mobile terminal and the smart home device, the session key can be used for encrypted communication, which can Solve the problem of smart home devices being attacked by the network, ensure the communication security between mobile terminals and smart home devices, and enhance user experience.

Description

technical field [0001] The invention relates to the technical field of smart home, in particular to a method and system for negotiating a session key, a mobile terminal and a smart home device. Background technique [0002] At present, with the rapid development of smart devices, more and more traditional home devices are beginning to transform into smart home devices. Such as: smart door locks, smart cameras, smart washing machines, smart water heaters, etc. Traditional home devices don't need to be connected to the Internet, and of course they aren't smart enough. Although various smart home devices have appeared in the prior art, there are still many problems in the field of smart home technology. [0003] In the existing technology, smart home devices are connected to the network, which allows us to enjoy the convenience brought by these smart home devices, but also implies a great privacy security risk in it: a large number of home network cameras are cracked, and we ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/03H04W12/04H04L29/06H04L9/30H04L9/08H04L12/28H04W12/041H04W12/0431
CPCH04L9/0838H04L9/3066H04L63/0442H04L63/06H04W12/02H04W12/04H04L12/2803H04L63/1458
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products