-
公开(公告)号:US10003966B2
公开(公告)日:2018-06-19
申请号:US15139749
申请日:2016-04-27
发明人: Gaokun Pang , Zhiming Ding , Su Lu
CPC分类号: H04W12/04 , H04L9/002 , H04L9/0825 , H04L9/0827 , H04L9/0841 , H04L9/0863 , H04L9/3226 , H04L63/0428 , H04L63/061 , H04L63/18 , H04L2209/805 , H04L2463/062 , H04W4/80 , H04W12/003 , H04W12/06 , H04W76/14
摘要: A key configuration method includes acquiring, by a first device, a public key of a second device through a secure medium; sending, by the first device, information used for obtaining a shared key to the second device; and obtaining, by the second device, a shared key using a private key of the second device and the information that is used for obtaining a shared key. The first device obtains the shared key using the information used for obtaining a shared key or using a private key of the first device. The present disclosure ensures that the public key of the second device reaches the first device, avoids that an attacker masquerades as the second device to establish a secure connection with the first device, so that the attacker cannot listen to a message between the first device and the second device.
-
公开(公告)号:US10097524B2
公开(公告)日:2018-10-09
申请号:US15106871
申请日:2013-12-31
发明人: Xiaoxian Li , Zhiming Ding , Gaokun Pang , Su Lu
IPC分类号: H04L29/00 , H04L29/06 , H04L12/24 , G06F21/42 , H04W4/80 , H04L29/08 , H04L9/08 , H04W4/00 , H04W12/02 , H04W84/12
摘要: A network configuration method, including acquiring a public key operation value of a second device in an out-of-band manner, acquiring a public key copy of the second device that is sent by the second device and that is used to perform key exchange, performing an operation of the preset algorithm on the public key copy of the second device, to obtain a public key operation value copy of the second device, and generating a first exchange key according to a private key that is used by the first device to perform key exchange and the acquired public key copy of the second device after the public key operation value copy of the second device matches the public key operation value of the second device, and hence the method simplifies a network configuration process.
-