Abstract:
A secure connection method for a network device includes: acquiring a public key operation value of a second device in an out-of-band manner; sending public key information of a first device to the second device; receiving public key information of the second device that is sent by the second device, and decrypting the public key information of the second device by using a private key of the first device, to obtain the public key of the second device; and performing a preset-algorithm operation on the public key of the second device to obtain a copy of the public key operation value of the second device, and after the copy of the public key operation value of the second device matches the public key operation value of the second device, accepting received connection information sent by the second device.
Abstract:
The present invention provides a method and device for setting up a wireless network connection. The second device sets up a connection with the wireless network according to the network configuration information. With the present invention, user participation when a terminal is connected to the wireless network is reduced, and efficiency in setting up a wireless network connection is improved.
Abstract:
A key configuration method includes acquiring, by a configuration device, a public key of a second device, and sending the public key of the second device to a first device, generating, by the first device, a first shared key, and sending information for obtaining the first shared key to the second device using the public key of the second device, or generating, by the first device, a first shared key using the public key of the second device, and sending information for obtaining the first shared key to the second device, and generating, by the second device, the first shared key using a private key of the second device and the information for obtaining the first shared key, where the first shared key is used for a secure connection between the first device and the second device.
Abstract:
Embodiments of the present invention provide a method, device and system for configuring multiple devices, where multiple devices are configured simply and securely in a centralized manner. The method includes: acquiring, by a configuration device, device identity information, configuration password information, and network role attributes of at least two devices needing to be configured on a same wireless local area network WLAN; determining a central node device of the WLAN according to the network role attributes of the at least two devices; and sending device identity information and configuration password information of a non-central node device to the central node device, or sending, by the configuration device, device identity information and configuration password information of the central node device to the non-central node device.
Abstract:
A method and user equipment for discovering a device user to improve security of user identifier information, so that user equipment discover each other securely. The method includes receiving a first message that is sent by a second user equipment and at least includes implicit user identifier information of the second user equipment, obtaining, according to correspondences stored in a first user equipment, a user identifier corresponding to the implicit user identifier information of the second user equipment; and determining, in the user identifier corresponding to the implicit user identifier information of the second user equipment, a user identifier of the second user equipment, to discover a user of the second user equipment. The present disclosure is applicable to the field of communications.
Abstract:
A security authentication method, device, and system are provided. A first device and a second device perform security authentication by using a first mapping key and a second mapping key, where the first mapping key is generated according to an initial key of the first device and a first predetermined algorithm, the second mapping key is generated according to an initial key of the second device and the first predetermined algorithm. A device in embodiments of the present invention performs security authentication by using a mapped initial key, which can increase the difficulty for an attacker to acquire a key, thereby improving security of a wireless network connection.
Abstract:
The present invention provides a method and device for setting up a wireless network connection. The second device sets up a connection with the wireless network according to the network configuration information. With the present invention, user participation when a terminal is connected to the wireless network is reduced, and efficiency in setting up a wireless network connection is improved.