Abstract:
A method includes: securely obtaining, by a first device, a first public key estimated value of a second device in an out-of-band manner; encrypting an asymmetric encryption public key by using the first public key estimated value; sending the encrypted asymmetric encryption public key to the second device; receiving an encrypted first key-exchange public key sent by the second device; decrypting the encrypted first key-exchange public key by using an asymmetric encryption private key; performing an operation based on the decrypted first key-exchange public key, to obtain a second public key estimated value; and when the first public key estimated value is consistent with the second public key estimated value, determining that the decrypted first key-exchange public key is correct, generating a shared key by using a key-exchange private key and the first key-exchange public key, and establishing a secure connection to the second device by using the shared key.
Abstract:
A key configuration method includes acquiring, by a first device, a public key of a second device through a secure medium; sending, by the first device, information used for obtaining a shared key to the second device; and obtaining, by the second device, a shared key using a private key of the second device and the information that is used for obtaining a shared key. The first device obtains the shared key using the information used for obtaining a shared key or using a private key of the first device. The present disclosure ensures that the public key of the second device reaches the first device, avoids that an attacker masquerades as the second device to establish a secure connection with the first device, so that the attacker cannot listen to a message between the first device and the second device.
Abstract:
A method for configuring a wireless device includes acquiring, by a third device, information about a first device, sharing a first key with the first device, and sending a first trigger message to the first device, where the first trigger message includes information about the third device; and acquiring, by the third device, information about a second device, sharing a second key with the second device, and sending a second trigger message to the second device, where the second trigger message includes the information about the third device and the information about the first device, such that the second device negotiates, according to the information about the third device and the information about the first device and based on authentication of the third device, with the first device to generate a third key, and establishes a connection between the first device and the second device using the third key.
Abstract:
Embodiments of the present invention provide a device association method, apparatus, and system, where the method includes: receiving a broadcast frame or a configuration response frame that includes access identification information generated by a first device and that is sent by a second device; and identifying the second device according to the access identification information and associating with the second device. In the embodiments of the present invention, the first device identifies a matched second device according to the access identification information, and then may directly associate with the second device, thereby avoiding a process of selecting a correct second device from multiple second devices, simplifying a process for the first device to join a WLAN in which the second device is located, and also making an operation by a user simpler.
Abstract:
A method, related device, and system for configuring a wireless local area network device are provided. A configuration device obtains working channel information of a wireless local area network. The working channel information is used to indicate a working channel of the wireless local area network. The configuration device receives a configuration instruction sent by an access point. The configuration instruction is received through the working channel according to the working channel information. The configuration instruction is sent after the access point receives a configuration request of an application terminal, and the configuration instruction is used to instruct the configuration device to send configuration information. The configuration device sends the configuration information through the working channel information, so that the application terminal performs network configuration with the access point according to the configuration information.
Abstract:
A security authentication method, device, and system are provided. A first device and a second device perform security authentication by using a first mapping key and a second mapping key, where the first mapping key is generated according to an initial key of the first device and a first predetermined algorithm, the second mapping key is generated according to an initial key of the second device and the first predetermined algorithm. A device in embodiments of the present invention performs security authentication by using a mapped initial key, which can increase the difficulty for an attacker to acquire a key, thereby improving security of a wireless network connection.
Abstract:
A method and a device for establishing a connection. The method includes the steps of: obtaining, by a group member device of a wireless device group, information about a to-be-connected device and then sending the information to a group owner device of the wireless device group, and/or transmitting, by the group member device, information about the group owner device to the to-be-connected device, where the information about the to-be-connected device and/or the information about the group owner device is used by the to-be-connected device and the group owner device to discover each other; and enabling, by the group member device, the to-be-connected device and the group owner device to share a first password, wherein the first password is used by the to-be-connected device and the group owner device to establish a connection after the to-be-connected device and the group owner device discover each other.
Abstract:
A method and a device for establishing a connection. The method includes the steps of: obtaining, by a group member device of a wireless device group, information about a to-be-connected device and then sending the information to a group owner device of the wireless device group, and/or transmitting, by the group member device, information about the group owner device to the to-be-connected device, where the information about the to-be-connected device and/or the information about the group owner device is used by the to-be-connected device and the group owner device to discover each other; and enabling, by the group member device, the to-be-connected device and the group owner device to share a first password, wherein the first password is used by the to-be-connected device and the group owner device to establish a connection after the to-be-connected device and the group owner device discover each other.
Abstract:
A secure connection method for a network device includes: acquiring a public key operation value of a second device in an out-of-band manner; sending public key information of a first device to the second device; receiving public key information of the second device that is sent by the second device, and decrypting the public key information of the second device by using a private key of the first device, to obtain the public key of the second device; and performing a preset-algorithm operation on the public key of the second device to obtain a copy of the public key operation value of the second device, and after the copy of the public key operation value of the second device matches the public key operation value of the second device, accepting received connection information sent by the second device.
Abstract:
A method, related device, and system for configuring a wireless local area network device are provided. A configuration device obtains working channel information of a wireless local area network. The working channel information is used to indicate a working channel of the wireless local area network. The configuration device receives a configuration instruction sent by an access point. The configuration instruction is received through the working channel according to the working channel information. The configuration instruction is sent after the access point receives a configuration request of an application terminal, and the configuration instruction is used to instruct the configuration device to send configuration information. The configuration device sends the configuration information through the working channel information, so that the application terminal performs network configuration with the access point according to the configuration information.