Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secret key generation method and system, storage medium and electronic device

A key and dynamic key technology, applied in the field of communication, can solve the problems of low key security, inability to identify the server, and reduced communication security.

Pending Publication Date: 2021-03-26
SUNWAVE COMM
View PDF16 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Wherein, in the process of dynamically updating the key between the Bluetooth master device and the Bluetooth slave device (such as step S101), since the key is directly sent in the network, when there is a hacker device in the network, the key is easily The hacker device intercepts and cracks (such as step S102), thereby causing the hacker device to pretend to be a Bluetooth slave device, and uses the cracked key to report false data to the Bluetooth master device (such as step S103), and the server cannot distinguish There are hacking devices, which greatly reduces the security of communication
and, if figure 2 As shown, the hacker device can also listen to and crack the key of the Bluetooth slave device (as in step S202) during the key dynamic update process between the Bluetooth master device and the Bluetooth slave device (as in step S202), thereby hacking the device Use the cracked key to impersonate the Bluetooth master device to update the key for the Bluetooth slave device (such as step S203), so that the Bluetooth slave device will mistransfer data to the hacker device (such as step S204), reducing the security of communication
[0003] Aiming at the technical problem of low key security in related technologies, no effective technical solution has been proposed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret key generation method and system, storage medium and electronic device
  • Secret key generation method and system, storage medium and electronic device
  • Secret key generation method and system, storage medium and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Hereinafter, the present invention will be described in detail with reference to the drawings and examples. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0029] It should be noted that the terms "first" and "second" in the description and claims of the present invention and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence.

[0030] The embodiment of the present invention provides a method for generating a key, image 3 It is an application environment diagram of a method for generating a key according to an embodiment of the present invention, wherein, taking the master device as a Bluetooth master device and the slave device as a Bluetooth slave device as an example, the Bluetooth slave device 1 and the Bluetooth slave device 2 respectively pre-store The fixed key m1 and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a secret key generation method and system, a storage medium and an electronic device, and the method comprises the steps: transmitting an updating request to a server, the updating request being used for requesting the server to update an original root sequence corresponding to target slave equipment; sending a target updating instruction is sent to the target slave equipment, wherein the target updating instruction comprises an encrypted first root sequence, the first root sequence is obtained after the server responds to the updating request to update the original rootsequence, the target updating instruction is used for indicating the target slave equipment to update the original root sequence stored in the target slave equipment into the first root sequence, andthe first root sequence is used for generating a dynamic key; and receiving first data sent by the target slave equipment, the first data being obtained by encrypting a new dynamic key, and the new dynamic key being generated by the target slave equipment according to a key generation algorithm stored in the target slave equipment and the first root sequence. According to the invention, the technical problem of low security of the secret key in the prior art is solved.

Description

technical field [0001] The present invention relates to the technical field of communications, and in particular, to a method and system for generating a key, a storage medium, and an electronic device. Background technique [0002] In related technologies, in a multi-device management application scenario where there are master devices and slave devices, such as figure 1 As shown, taking the master device as a Bluetooth master device and the slave device as a Bluetooth slave device as an example, the Bluetooth master device is used to manage the Bluetooth slave devices. After the dynamic key update is completed between the Bluetooth master device and the Bluetooth slave device, the Bluetooth slave device uses the updated key to encrypt the data to be uploaded to the Bluetooth master device. Wherein, in the process of dynamically updating the key between the Bluetooth master device and the Bluetooth slave device (such as step S101), since the key is directly sent in the net...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04W4/80H04W12/041
CPCH04W4/80H04L9/0861
Inventor 张小龙王剑侠蒋旭晨陈威宇
Owner SUNWAVE COMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products