CN110177116A - Intelligence melts the safety data transmission method and device of mark network - Google Patents

Intelligence melts the safety data transmission method and device of mark network Download PDF

Info

Publication number
CN110177116A
CN110177116A CN201910496313.3A CN201910496313A CN110177116A CN 110177116 A CN110177116 A CN 110177116A CN 201910496313 A CN201910496313 A CN 201910496313A CN 110177116 A CN110177116 A CN 110177116A
Authority
CN
China
Prior art keywords
data packet
obscure
cipher mode
flag bit
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910496313.3A
Other languages
Chinese (zh)
Other versions
CN110177116B (en
Inventor
权伟
张宏科
刘明远
石金玉
刘刚
于成晓
秦媛媛
覃帅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jiaotong University
Original Assignee
Beijing Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jiaotong University filed Critical Beijing Jiaotong University
Priority to CN201910496313.3A priority Critical patent/CN110177116B/en
Publication of CN110177116A publication Critical patent/CN110177116A/en
Priority to PCT/CN2020/094554 priority patent/WO2020248906A1/en
Application granted granted Critical
Publication of CN110177116B publication Critical patent/CN110177116B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention provides safety data transmission methods and device that a kind of intelligence melts mark network.When recipient receives the data packet from sender, cipher mode flag bit is parsed, judges cipher mode;Decipherment algorithm in encryption rule database is inquired according to cipher mode flag bit, ciphertext data, it checks and updates whether flag bit reaches threshold value, if the value for reaching threshold value using timestamp operation in receiver system time and data packet selects new cipher mode as seed, and cipher mode is returned to sender;After sender receives new cipher mode, with new cipher mode encryption data and send.Encryption policy of obscuring in the present invention supports user to define and can constantly change that safety is higher;Replay Attack can be prevented based on timestamp;With the seed of the time difference of receiving-transmitting sides alternatively algorithm, receiving-transmitting sides do not need to synchronize.

Description

Intelligence melts the safety data transmission method and device of mark network
Technical field
The present invention relates to the secure data biographies that mark network is melted in computer network communication technology field more particularly to a kind of intelligence Transmission method and device.
Background technique
Intelligence melts the mark network system by dynamic sensing network state and intelligent Matching demand for services, and then selects reasonable Network group and its internal component provide the service of wisdom.Meanwhile it is multiple by introducing behavior matching, behavior cluster, network The mechanism such as miscellaneous behavior game decision realize the dynamic adaptation and cooperative scheduling of resource, increase substantially network resource utilization, Network energy consumption etc. is reduced, user experience is obviously improved.The safety that intelligence melts mark network is particularly important.
Current most of safety obscure complexity of the safety of Encryption Algorithm dependent on big number Factorization, so RSA (Ron Rivest, Adi Shamir and Leonard Adleman) etc. obscures the larger threat that cipher mode faces and is derived from meter The constantly improve and factoring algorithm of calculation ability is continuously improved, and wherein the raising of computing capability includes due to computer network The distributed computation ability that the numerous computers of networking caused by development carries out improves and the raising of supercomputer computing capability, long Key be safe within a very long time.But the cipher mode of obscuring of the data packet in existing internet is mostly static state , it can not dynamically update, can not effectively guarantee that intelligence melts the safety of mark network.
Summary of the invention
The embodiment provides safety data transmission methods and device that a kind of intelligence melts mark network, existing to overcome There is the problem of technology.
To achieve the goals above, this invention takes following technical solutions.
According to an aspect of the invention, there is provided a kind of intelligence melts the safety data transmission method of mark network, comprising:
Step S110: when receiver equipment is received from after obscuring encrypted data packet of method, apparatus is sent, to described Data packet is parsed, and the value obscured cipher mode flag bit and update flag bit in the data packet is obtained;
Step S120: the receiver equipment obscures the value inquiry encryption rule data of cipher mode flag bit according to Library obtains decipherment algorithm, carries out data deciphering processing to the data packet using the decipherment algorithm, is indicated according to the update The value of position judges whether obscure cipher mode update, if so, thening follow the steps S130;
Step S130: the receiver equipment is made with the value of timestamp operation in receiver system time and the data packet New cipher mode of obscuring is selected for seed, and the new cipher mode of obscuring is returned into described sender equipment;
Step S140: the receiver equipment receive it is described it is new obscure cipher mode after, according to it is described it is new obscure plus Close mode obscures encrypted packet, and transmission obscures encrypted data packet and gives described sender equipment.
Preferably, the data packet include update flag bit, confirmation update flag bit, obscure cipher mode flag bit and Timestamp;Described to obscure flag bit using 14 bit lengths, what flag data packet used obscures cipher mode, obscures cipher mode The value of flag bit maps each other with the encryption policy of obscuring obscured in encryption policy database.
Preferably, the timestamp uses 32 bit lengths, for the time of flag data packet, the timestamp conduct The seed of strategy selection operator.
Preferably, the update flag bit uses 1 bit length, and when the update flag bit is 1, encryption is obscured in update Mode does not update when the update flag bit is 0 and obscures cipher mode;
The confirmation updates flag bit and uses 1 bit length, when it is 1 that the confirmation, which updates flag bit, indicates to have confirmed that Cipher mode is obscured in update, and when it is 0 that the confirmation, which updates flag bit, expression, which does not update, obscures cipher mode.
Preferably, before the step S110 further include:
It sends method, apparatus to initiate to communicate for the first time, comprising obscuring in the payload for the data packet that described sender equipment is sent Cipher mode database information;
Receiver equipment receives the data packet that described sender equipment initiates communication for the first time, extracts obscuring in data packet and adds Close mode database information and proofread it is local obscure cipher mode database, it is total to obtain described sender equipment, receiver equipment The response data packet is sent to described by obscuring encryption policy database information and being encapsulated in response data packet with maintenance Send method, apparatus;
After described sender equipment receives the response data packet, the described sender in the response data packet is extracted What equipment, receiver equipment were safeguarded jointly obscures encryption policy database information and one kind is therefrom selected to obscure encryption policy, institute State send method, apparatus by it is selected obscure encryption policy and be encapsulated in tactful confirmation request data packet and be sent to recipient set It is standby;
After the receiver equipment receives the tactful confirmation request data packet of described sender equipment, extracts and store institute Stating transmission, method, apparatus is selected obscures encryption policy, confirms response data packet to described sender equipment sending strategy;
It is true according to both sides after described sender equipment receives the strategy confirmation response data packet that the receiver equipment returns The encryption policy of obscuring recognized obscures encrypted packet, and sends and obscure encrypted data packet to the receiver equipment.
According to another aspect of the present invention, the safety data transmission device that a kind of intelligence melts mark network is provided, comprising: Data packet handing module, computing module, obscures encryption policy database module and controller at clock module;
The data packet handing module, for carrying out obscuring encryption to data packet according to the cipher mode of obscuring of setting, Flag bit will be updated, confirmation updates flag bit, obscures cipher mode flag bit and timestamp is encapsulated into data packet, according to data The status information of packet determines when the update for initiating to obscure Encryption Algorithm request;The data packet received is parsed, is received The control information that controller issues, to update packet processing strategie and encapsulation format;
The clock module, for providing clock information;
The computing module, for carrying out operation to data, by carrying out modular arithmetic to random number, selection updates mark Timestamp is supplied to data packet handing module from Clock Extraction timestamp by the value of position;
Described obscures encryption policy database module, for obscuring encryption policy by database purchase and obscuring encryption Tactful label etc.;The control information that controller issues is received, obscures encryption policy database to update;
The controller, for issuing control information to data packet handing module, to update packet processing strategie and encapsulating Format is filled, obscuring forwarding strategy and be handed down to and obscuring encryption policy database module for data packet is generated, to obscuring encryption policy Database issues control information, obscures encryption policy database to update.
Preferably, the device further include:
Status information processing module, for handling data packet status information, the timestamp information of preprocessed data packet is determined Whether equipment should actively be initiated to obscure the request of Encryption Algorithm update.
Preferably, the device includes: transmission method, apparatus and receiver equipment, working method are full duplex mode, In communication process, both of which is supported in the initiation of more new strategy: user initiates the status information with equipment according to data packet manually Selection automatically initiates.
Preferably, when described device is to send method, apparatus, the data packet handing module, specifically for transmission Data packet is packaged: according to obscure in encryption policy database it is specified obscure cipher mode data packet obscure plus It is close, flag bit will be updated, confirmation updates flag bit, obscures cipher mode flag bit and timestamp is encapsulated into data packet, according to The status information of data packet determines when initiate to obscure the update request of Encryption Algorithm;It is fixed according to the certain flag bit fields of data packet The parsing sequence and content of adopted data packet header, for the data packet that receiver equipment is sent, with the analysis mode appointed Cipher mode flag bit is obscured in parsing, cipher mode is obscured according to obscuring in encryption policy database, to next group of data packet It carries out obscuring encryption;The control information that controller issues is received, to update packet processing strategie and encapsulation format;
When described device is receiver equipment, the data packet handing module comes from sender specifically for receiving Equipment obscure encrypted data packet after, the data packet is parsed, obtains in the data packet and obscures encryption side Formula flag bit and the value for updating flag bit are obtained according to the value inquiry encryption rule database for obscuring cipher mode flag bit Decipherment algorithm carries out data deciphering processing to the data packet using the decipherment algorithm, according to the value for updating flag bit Judge whether obscure cipher mode update, if it is, with the time in receiver system time and the data packet The value for stabbing operation selects new cipher mode of obscuring as seed, and the new cipher mode of obscuring is returned to the transmission Method, apparatus;The control information that controller issues is received, to update packet processing strategie and encapsulation format.
Preferably, the data packet handing module in described sender equipment, specifically for being initiated for the first time when transmission method, apparatus When communication, comprising obscuring cipher mode database information in the payload of the data packet of transmission;
Data packet handing module in the receiver equipment initiates to lead to for the first time specifically for receiving described sender equipment The data packet of letter extracts obscuring cipher mode database information and proofreading in data packet and locally obscures cipher mode database, Obtain described sender equipment, receiver equipment is safeguarded jointly obscures encryption policy database information and be encapsulated in response data The response data packet is sent to described sender equipment by Bao Zhong;
Data packet handing module in described sender equipment extracts after receiving the response data packet What the described sender equipment in the response data packet, receiver equipment were safeguarded jointly obscures encryption policy database information simultaneously Therefrom one kind is selected to obscure encryption policy, obscures encryption policy by selected and be encapsulated in tactful confirmation request data packet concurrently Give receiver equipment;
Data packet handing module in the receiver equipment, specifically for receiving the strategy of described sender equipment really After recognizing request data package, extracts and store that described sender equipment is selected to obscure encryption policy, to described sender equipment Sending strategy confirms response data packet;
Data packet handing module in described sender equipment, the strategy returned specifically for receiving the receiver equipment After confirming response data packet, encrypted packet is obscured according to the encryption policy of obscuring of both sides' confirmation, and send obscure it is encrypted Data packet gives the receiver equipment.
As can be seen from the technical scheme provided by the above-mentioned embodiment of the present invention, the intelligence of inventive embodiments melts mark network Encryption policy of obscuring in safety data transmission scheme supports user to define and can constantly change that safety is higher.Based on when Between stamp state change come decide whether update obscure encryption policy, Replay Attack can be prevented.With with the receiver system time and The seed of the value of timestamp operation alternatively algorithm, receiving-transmitting sides do not need to synchronize in data packet.
The additional aspect of the present invention and advantage will be set forth in part in the description, these will become from the following description Obviously, or practice through the invention is recognized.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, required use in being described below to embodiment Attached drawing be briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for this For the those of ordinary skill of field, without creative efforts, it can also be obtained according to these attached drawings others Attached drawing.
Fig. 1 is that the realization principle for the safety data transmission method that a kind of intelligence provided in an embodiment of the present invention melts mark network is shown It is intended to.
Fig. 2 is that the process flow for the safety data transmission method that a kind of intelligence provided in an embodiment of the present invention melts mark network is shown It is intended to.
Fig. 3 is the encryption policy confirmation obscured in transmission data that a kind of intelligence provided in an embodiment of the present invention melts mark network The realization principle schematic diagram of method.
Fig. 4 is the encryption policy confirmation obscured in transmission data that a kind of intelligence provided in an embodiment of the present invention melts mark network The processing flow schematic diagram of method.
Fig. 5 be a kind of intelligence provided in an embodiment of the present invention melt mark network safety data transmission method in data inclusion Structure schematic diagram.
Fig. 6 is the structural representation for the safety data transmission device that a kind of intelligence provided in an embodiment of the present invention melts mark network Figure.
Fig. 7 is the application scenarios signal for obscuring transmission method that a kind of intelligence provided in an embodiment of the present invention melts mark network Figure.
Specific embodiment
Embodiments of the present invention are described below in detail, the example of the embodiment is shown in the accompanying drawings, wherein from beginning Same or similar element or element with the same or similar functions are indicated to same or similar label eventually.Below by ginseng The embodiment for examining attached drawing description is exemplary, and for explaining only the invention, and is not construed as limiting the claims.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singular " one " used herein, " one It is a ", " described " and "the" may also comprise plural form.It is to be further understood that being arranged used in specification of the invention Diction " comprising " refer to that there are the feature, integer, step, operation, element and/or component, but it is not excluded that in the presence of or addition Other one or more features, integer, step, operation, element, component and/or their group.It should be understood that when we claim member Part is " connected " or when " coupled " to another element, it can be directly connected or coupled to other elements, or there may also be Intermediary element.In addition, " connection " used herein or " coupling " may include being wirelessly connected or coupling.Wording used herein "and/or" includes one or more associated any cells for listing item and all combinations.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art Language and scientific term) there is meaning identical with the general understanding of those of ordinary skill in fields of the present invention.Should also Understand, those terms such as defined in the general dictionary, which should be understood that, to be had and the meaning in the context of the prior art The consistent meaning of justice, and unless defined as here, it will not be explained in an idealized or overly formal meaning.
In order to facilitate understanding of embodiments of the present invention, it is done by taking several specific embodiments as an example below in conjunction with attached drawing further Explanation, and each embodiment does not constitute the restriction to the embodiment of the present invention.
Embodiment one
Actual transmitting-receiving process is the process of duplex, is only to state clear transmitting terminal A and receiving end B as described below The description of single transmitting-receiving.Fig. 1 is that the realization for the safety data transmission method that intelligence described in the embodiment of the present invention melts mark network is former Schematic diagram is managed, Fig. 2 is the process flow for the safety data transmission method that a kind of intelligence provided in an embodiment of the present invention melts mark network Schematic diagram includes the following steps.
Step S210: it when recipient receives the data packet from sender, by parsing data packet, obtains in data packet Obscure cipher mode flag bit and update flag bit, obscure encryption side according to obscure that cipher mode flag bit judges data packet Formula;
Step S220: decipherment algorithm is obtained according to cipher mode flag bit inquiry encryption rule database is obscured, decrypts number According to inspection updates whether flag bit is the threshold value set, and S130 is carried out if reaching threshold value, and above-mentioned threshold value expression is mixed The cipher mode that confuses updates;If not up to threshold value, process terminates;
The value of above-mentioned update flag bit is set to 1 by communication host is automated randomized according to network environment, double to more new traffic Side obscures cipher mode.It supports in addition, updating flag bit by setting and the user setting of sending instructions under controller.User setting is excellent First grade is arranged higher than controller, and controller setting priority is higher than automated randomized set.
Updating flag bit can be by the setting that sends instructions under controller.Controller sends more new command, client computer to client computer Flag bit will be updated and be set as 1.
Updating flag bit can be by user setting.It provides user after function generation emergency and updates to obscure manually and add The ability of close strategy can be 1 by user setting.
Step S230: recipient is selected newly using the value of timestamp operation in receiver system time and data packet as seed Obscure cipher mode, and new cipher mode of obscuring is returned into sender;The value of above-mentioned operation can be receiver system Difference in time and data packet between timestamp.
Step S240: sender obscures cipher mode flag bit, setting update according to the cipher mode setting of obscuring received Flag bit is arranged timestamp, obscures transmission data with new cipher mode of obscuring.
Actual transmitting-receiving process is the process of duplex, is only to state clear transmitting terminal A and receiving end B as described below The description of single transmitting-receiving.Fig. 3 is the encryption obscured in transmission data that a kind of intelligence provided in an embodiment of the present invention melts mark network The realization principle schematic diagram of tactful confirmation method, Fig. 4 be the intelligence of the embodiment of the present invention melt mark network obscure transmission data in Encryption policy confirmation method processing flow schematic diagram, comprising the following steps:
Step S410: sender A initiates to communicate for the first time.Comprising obscuring in the payload for the data packet that sender A is sent Cipher mode database information.
Step S420: recipient B receives the data packet that sender A initiates communication for the first time, extracts obscuring in data packet and adds Close mode database information and proofread it is local obscure cipher mode database, obtain that A, B safeguard jointly obscures encryption policy number According to library information.The encryption policy database information of obscuring that A, B are safeguarded jointly is encapsulated in response data packet, by above-mentioned number of responses Sender A is sent to according to packet.
Step S430: after sender A receives above-mentioned response data packet, response data packet is parsed, it is total to obtain A, B Encryption policy database information is obscured with maintenance, and determine coded communication obscures encryption policy set, and therefrom selects one kind Obscure encryption policy.Sender A obscures selected encryption policy and is encapsulated in tactful confirmation request data packet, by above-mentioned plan Slightly confirmation request data packet is sent to recipient B.
Step S440: recipient B receives the tactful confirmation request data packet of sender A, to tactful confirmation request data Packet is parsed, and obtains that sender A is selected to obscure encryption policy.Recipient B by it is above-mentioned obscure encryption policy and be stored in post In storage, response data packet is confirmed to sender's A sending strategy.
After step S450: sender A receives the strategy confirmation response data packet of recipient B return, according to both sides' confirmation Obscure encryption policy encapsulated data packet, both sides start to carry out coded communication shown in Fig. 2.
Encapsulation format
Fig. 5 be a kind of intelligence provided in an embodiment of the present invention melt mark network safety data transmission method in data inclusion Structure schematic diagram, as shown in figure 5, data packet using update flag bit, confirmation update flag bit, obscure cipher mode flag bit and when Between stab data packet be marked.It updates flag bit and uses 1 bit length, when updating flag bit is 1, encryption side is obscured in update Formula does not update when update flag bit is 0 and obscures cipher mode.Confirmation updates flag bit and uses 1 bit length, when confirmation updates It when flag bit is 1, indicates to have confirmed that cipher mode is obscured in update, when it is 0 that confirmation, which updates flag bit, expression, which does not update to obscure, to be added Close mode.Flag bit is obscured using 14 bit lengths, and indicate use obscures cipher mode.Obscure the value of cipher mode flag bit It is mapped each other with the encryption policy of obscuring obscured in encryption policy database.Timestamp uses 32 bit lengths, is used to reference numerals According to the time of packet, the seed of strategy selection operator can be used as, which includes but is not limited to the shape for using extension header Formula is realized.
The embodiment of the present invention also proposed the safety data transmission device that a kind of intelligence melts mark network, which is based on shape State obscures transmitting device, has programmability, can flexibly define, update forwarding strategy, obscures encryption policy, Packet analyzing Strategy.The safety data transmission device that above-mentioned intelligence melts mark network includes but is not limited to data packet handing module, at status information Reason module, computing module, obscures encryption policy database, controller at clock module.The device can be sender and recipient Two opposite equip.s.
Fig. 6 is the structural representation for the safety data transmission device that a kind of intelligence provided in an embodiment of the present invention melts mark network Figure, which can be two opposite equip.s of sender and recipient.Equipment function itself does not have difference, working method Quan Shuan Work mode, in communication process, an equipment is both transmitting terminal and receiving end.In communication process, the initiation of more new strategy Support both of which: user initiates manually and equipment is automatically initiated according to the selection of the status information of data packet.It is updated at second Under mode, the request for when initiating policy update is determined by the equipment for most starting to initiate communication request, and policy update request is initiated Afterwards, the more new strategy of data packet and obscure encryption policy and can't come into force, but confirmation should be received until requesting party It comes into force after information.
Data packet is obscured forwarding strategy and should be generated by controller is unified, this equipment can pass through online upgrading or local The mode upgraded manually caches the forwarding strategy of obscuring of data packet, it is generally the case that will cache and a variety of obscures in equipment Forwarding strategy, to guarantee the demand that can be updated in data packet treatment process with implementation strategy.
Communicating pair should exchange local access vector cache library information when communicating for the first time, find strategy by the exchange of the information The policy intersection in library is cached, to provide range of choice for update tactful in next communication process.
The major function of this equipment is the processing realized to data packet, include but is not limited to have certain operational capability and Storage capacity, operational capability are embodied in the processing to status information and data packet addressing repeating process to address field Processing and data packet parsing, storage capacity is embodied in the storage to status information and obscures and forwarding strategy information Storage, in order to guarantee the reading and processing speed of data, which should be stored in register and memory, specifically, deposit Policy information used in present communications should be stored in device, and all plans for obscuring forwarding strategy of equipment support are stored in memory Slightly information.
Each functions of modules of transmitting terminal A is as follows:
Data packet handing module: including but is not limited to be packaged to the data packet of transmission: according to obscuring encryption policy number Data packet is carried out to obscure encryption according to the cipher mode of obscuring in library, flag bit will be updated, confirmation updates flag bit, obscures encryption Mode flag bit and timestamp are encapsulated into data packet, while data packet handing module can should be believed by the state of data packet Breath determines that the update request for when initiating to obscure Encryption Algorithm, the request should at least support user actively initiation and equipment autonomously Initiate both of which.
Including but not limited to Packet analyzing function: data packet handing module should have flexibility for the parsing of data packet, can Flexibly to define the parsing sequence and content of data packet header according to the certain flag bit fields of data packet, while should have again The compatibility of data is exchanged with traditional equipment.It is mixed with the analysis mode parsing appointed for the data packet that recipient B is sent Confuse cipher mode flag bit, obscures cipher mode according to obscuring in encryption policy database, mixes to next group of data packet Confuse encryption.The control information that controller issues should be additionally received, to update packet processing strategie and encapsulation format.
Clock module: clock information is provided.
Computing module: operation is carried out to data.Including but not limited to by carrying out modular arithmetic to random number, selection updates mark Timestamp is supplied to data packet handing module from Clock Extraction timestamp by the value of will position.
Status information processing module: this equipment should have the ability of processing data packet status information, including but not limited in advance It handles the timestamp information of data packet, dynamic sensing network state, determine whether equipment should actively initiate to obscure Encryption Algorithm more New request etc..
Obscure encryption policy database: including but not limited to storage obscures encryption policy and obscures encryption policy label etc.; The control information that controller issues is received, encryption policy database is more obscured.
Controller: including but not limited to controller issues control information to data packet handing module, updates packet processing strategie With encapsulation format.Controller issues control information to encryption policy database is obscured, and encryption policy database is obscured in update.
Each functions of modules of receiving end B is as follows:
Data packet handing module: including but is not limited to Packet analyzing function: cipher mode flag bit is obscured in parsing, according to obscuring Cipher mode is obscured in encryption policy database, and data packet is parsed.Judge to update whether flag bit reaches threshold value.Packet It includes but is not limited to encapsulation function: needing to update sender when obscuring cipher mode, cipher mode zone bit information envelope will be obscured It is attached in data packet, is sent to sender A.The control information that controller issues is received, packet processing strategie and encapsulation lattice are updated Formula.
Clock module: provide clock information, computing module judgement to be updated when obscuring cipher mode, mentioned from clock module System clock is taken, as operation seed.
Computing module: operation is carried out to data.Including but not limited to according to packet time stamp and system clock carry out and Or modular arithmetic;Obscure obscuring cipher mode and cipher mode will be obscured in encryption policy database according to operation result to provide Give data packet handing module.
Obscure encryption policy database: including but not limited to storage obscures encryption policy and obscures encryption policy label etc.. Encryption policy is obscured to computing module and the offer of data packet handing module.The control information that controller issues is received, more obscures and adds Close policy database.
Controller: including but not limited to controller issues control information to data packet handing module, updates packet processing strategie With encapsulation format.Controller issues control information to encryption policy database is obscured, and encryption policy database is obscured in update.
Status information processing module: this equipment should have the ability of processing data packet status information, including but not limited in advance It handles the timestamp information of data packet, dynamic sensing network state, determine whether equipment should actively initiate to obscure Encryption Algorithm more New request etc..
Embodiment two
Fig. 7 is the application scenarios signal for obscuring transmission method that a kind of intelligence provided in an embodiment of the present invention melts mark network Figure, as shown in fig. 7, A, B are user, C, D are to obscure transmitting device, W1, W2, and W3 is transmission link.Using multi-path transmission machine System, if multi-path transmission mechanism is directly applied in isomery and asymmetric network environment, it will serious random ordering occur And caching choking phenomenon.Transmitting device of obscuring based on state stores route selection information and mark in obscuring encryption policy database Number, transmission path can be changed according to network state in real time, while alleviating network congestion, can also effectively promote user's body The amount of checking the quality.In the case where intelligence melts network environment, need to guarantee the real-time and safety of user's communication, in order to guarantee transmission safety, intelligence Melt using across agreement transmission in mark network, it can be across IPV4, IPV6, mark network protocol transmission.Obscure transmitting device to exist Obscure and stores protocol selection information and label in encryption policy database.Obscure transmitting device according to state change Path selection and Data pack protocol selection.
Embodiment three:
This embodiment describes obscure transmitting device in the application description in policy update stage.First against obscuring and forward The generation of strategy provides two sources: when device initialization, obscuring and provides basic displacement square in encryption policy database Battle array and repeating query routing policy, furthermore the present apparatus supports user is customized to obscure encryption policy, and device provides storage user and makes by oneself Adopted strategy obscures encryption policy database.The importing for obscuring encryption policy database for user also provides two ways: Controller imports online and user manually imports.Later, when user initiates communication request for the first time, it is logical which judges this Whether letter is to communicate for the first time, if the user for exchanging both sides first is then needed to obscure encryption policy database information, is found double Side obscures encryption policy database information intersection, then selects one kind to obscure encryption policy first by communication initiator, concurrently Rise strategy request, receive other side return tactful confirmation message after, start formally using consult obscure encryption policy into Row encrypted transmission.The initiator of communication needs to safeguard the status information of the data packet of this communication simultaneously, when status information reaches When a certain specified threshold value, the update request for obscuring encryption policy is initiated, after receiving the update confirmation message of other side, formally Coded communication is carried out using new encryption policy of obscuring.The threshold value mentioned in text can be stated according to the actual situation by user, if not having Having display statement, then system uses default value automatically.
Example IV
This embodiment describes obscure the update description to encryption policy is obscured of transmitting device in case of emergency.This reality The final purpose of experiment device is to realize the secret communication of user, although present apparatus itself does not provide the function of any network sweep, But user can apply for opening the permission of compatible third party's tool.It please notes that the present apparatus does not provide and distinguishes third party's plug-in security Property function, but provide user to open after emergency occurs for the function and update the ability for obscuring encryption policy manually.
Specifically, user can apply for opening the permission of compatible third party's tool, such as certain network sweep tools, use Artificial intelligence analyzes network state, and user is assisted to find the monitored risk of network, when user determines that oneself is monitored It can be requested manually to the update that peer user initiates to obscure encryption policy afterwards, while can be fixed in the case where communicating continual situation The threshold value that adopted policy update is initiated, to improve the rank of communication security.
In conclusion the intelligence of the embodiment of the present invention, which is melted in the safety data transmission scheme of mark network, obscures encryption policy It supports user to define and can constantly change, safety is higher.Added based on flag bit variation is updated to decide whether to update to obscure Close strategy obscures encryption according to the random selection of timestamp state is a variety of using aliasing strategy database maintenance aliasing strategy information Mode, it is difficult to crack.It can prevent Replay Attack.Using the value of timestamp operation in receiver system time and data packet as choosing The seed of algorithm is selected, receiving-transmitting sides do not need to synchronize.
Status information processing module carries out dynamic sensing to network environment in system.Encryption policy is obscured according to network environment By the automated randomized update of communication host, flexibly cipher mode can also be carried out more using offer controller and user's control strategy Newly.Encapsulation, Packet analyzing rule can neatly be converted.
Those of ordinary skill in the art will appreciate that: attached drawing is the schematic diagram of one embodiment, module in attached drawing or Process is not necessarily implemented necessary to the present invention.
As seen through the above description of the embodiments, those skilled in the art can be understood that the present invention can It realizes by means of software and necessary general hardware platform.Based on this understanding, technical solution of the present invention essence On in other words the part that contributes to existing technology can be embodied in the form of software products, the computer software product It can store in storage medium, such as ROM/RAM, magnetic disk, CD, including some instructions are used so that a computer equipment (can be personal computer, server or the network equipment etc.) executes the certain of each embodiment or embodiment of the invention Method described in part.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for device or For system embodiment, since it is substantially similar to the method embodiment, so describing fairly simple, related place is referring to method The part of embodiment illustrates.Apparatus and system embodiment described above is only schematical, wherein the conduct The unit of separate part description may or may not be physically separated, component shown as a unit can be or Person may not be physical unit, it can and it is in one place, or may be distributed over multiple network units.It can root According to actual need that some or all of the modules therein is selected to achieve the purpose of the solution of this embodiment.Ordinary skill Personnel can understand and implement without creative efforts.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto, In the technical scope disclosed by the present invention, any changes or substitutions that can be easily thought of by anyone skilled in the art, It should be covered by the protection scope of the present invention.Therefore, protection scope of the present invention should be with scope of protection of the claims Subject to.

Claims (10)

1. the safety data transmission method that a kind of intelligence melts mark network characterized by comprising
Step S110: when receiver equipment is received from after obscuring encrypted data packet of method, apparatus is sent, to the data Packet is parsed, and the value obscured cipher mode flag bit and update flag bit in the data packet is obtained;
Step S120: the value inquiry encryption rule database that the receiver equipment obscures cipher mode flag bit according to obtains To decipherment algorithm, data deciphering processing is carried out to the data packet using the decipherment algorithm, according to the update flag bit Value judges whether obscure cipher mode update, if so, thening follow the steps S130;
Step S130: the receiver equipment is using the value of timestamp operation in receiver system time and the data packet as kind Son selects new cipher mode of obscuring, and the new cipher mode of obscuring is returned to described sender equipment;
Step S140: the receiver equipment receive it is described it is new obscure cipher mode after, new obscure encryption side according to described Formula obscures encrypted packet, and transmission obscures encrypted data packet and gives described sender equipment.
2. the method according to claim 1, wherein the data packet includes updating flag bit, confirmation update Flag bit obscures cipher mode flag bit and timestamp;Described to obscure flag bit using 14 bit lengths, flag data packet uses Obscure cipher mode, obscure the value of cipher mode flag bit and obscure in encryption policy database and obscure encryption policy each other Mapping.
3. according to the method described in claim 2, it is characterized in that, the timestamp uses 32 bit lengths, for marking The time of data packet, seed of the timestamp as strategy selection operator.
4. according to the method described in claim 2, it is characterized in that, the update flag bit use 1 bit length, when it is described more When new flag bit is 1, cipher mode is obscured in update, when the update flag bit is 0, does not update and obscures cipher mode;
The confirmation updates flag bit and uses 1 bit length, and when it is 1 that the confirmation, which updates flag bit, expression has confirmed that update Obscure cipher mode, when it is 0 that the confirmation, which updates flag bit, expression, which does not update, obscures cipher mode.
5. method according to any one of claims 1 to 4, which is characterized in that before the step S110 further include:
It sends method, apparatus to initiate to communicate for the first time, comprising obscuring encryption in the payload for the data packet that described sender equipment is sent Mode database information;
Receiver equipment receives the data packet that described sender equipment initiates communication for the first time, extracts in data packet and obscures encryption side Formula database information and proofread it is local obscure cipher mode database, obtain described sender equipment, receiver equipment is tieed up jointly Obscuring encryption policy database information and being encapsulated in response data packet for shield, is sent to the transmission for the response data packet Method, apparatus;
After described sender equipment receives the response data packet, the described sender extracted in the response data packet is set What standby, receiver equipment was safeguarded jointly obscures encryption policy database information and one kind is therefrom selected to obscure encryption policy, described Method, apparatus is sent to obscure encryption policy by selected and be encapsulated in tactful confirmation request data packet and be sent to receiver equipment;
After the receiver equipment receives the tactful confirmation request data packet of described sender equipment, extracts and store the hair It send method, apparatus is selected to obscure encryption policy, confirms response data packet to described sender equipment sending strategy;
After described sender equipment receives the strategy confirmation response data packet that the receiver equipment returns, according to both sides' confirmation Obscure encryption policy and obscure encrypted packet, and sends and obscure encrypted data packet to the receiver equipment.
6. the safety data transmission device that a kind of intelligence melts mark network characterized by comprising data packet handing module, clock Module, computing module obscure encryption policy database module and controller;
The data packet handing module will more for carrying out obscuring encryption to data packet according to the cipher mode of obscuring of setting New flag bit, confirmation update flag bit, obscure cipher mode flag bit and timestamp is encapsulated into data packet, according to data packet Status information determines when the update for initiating to obscure Encryption Algorithm request;The data packet received is parsed, control is received The control information that device issues, to update packet processing strategie and encapsulation format;
The clock module, for providing clock information;
The computing module, for carrying out operation to data, by carrying out modular arithmetic to random number, selection updates flag bit Value, from Clock Extraction timestamp, is supplied to data packet handing module for timestamp;
Described obscures encryption policy database module, for obscuring encryption policy by database purchase and obscuring encryption policy Label etc.;The control information that controller issues is received, obscures encryption policy database to update;
The controller, for issuing control information to data packet handing module, to update packet processing strategie and encapsulation lattice Formula generates obscuring forwarding strategy and be handed down to and obscuring encryption policy database module for data packet, to obscuring encryption policy data Library issues control information, obscures encryption policy database to update.
7. device according to claim 6, which is characterized in that the device further include:
Status information processing module, for handling data packet status information, the timestamp information of preprocessed data packet determines equipment Whether should actively initiate to obscure the request that Encryption Algorithm updates.
8. device according to claim 6 or 7, which is characterized in that the device includes: to send method, apparatus and recipient Equipment, working method is full duplex mode, and in communication process, both of which is supported in the initiation of more new strategy: user sends out manually It rises and equipment is automatically initiated according to the selection of the status information of data packet.
9. device according to claim 8, which is characterized in that when described device is to send method, apparatus, the data Packet handing module, specifically for being packaged to the data packet of transmission: specified mixed in encryption policy database according to obscuring The cipher mode that confuses carries out data packet to obscure encryption, will update flag bit, confirmation updates flag bit, obscures cipher mode flag bit It is encapsulated into data packet with timestamp, determines that the update for when initiating to obscure Encryption Algorithm is asked according to the status information of data packet It asks;The parsing sequence and content that data packet header is defined according to the certain flag bit fields of data packet, send out receiver equipment The data packet sent obscures cipher mode flag bit with the analysis mode parsing appointed, according to obscuring in encryption policy database Obscure cipher mode, next group of data packet is carried out obscuring encryption;The control information that controller issues is received, to update at packet Reason strategy and encapsulation format;
When described device is receiver equipment, the data packet handing module sends method, apparatus specifically for receiving to come from Obscure encrypted data packet after, the data packet is parsed, obtains in the data packet and obscures cipher mode mark Will position and the value for updating flag bit are decrypted according to the value inquiry encryption rule database for obscuring cipher mode flag bit Algorithm carries out data deciphering processing to the data packet using the decipherment algorithm, is judged according to the value for updating flag bit Whether carry out obscuring cipher mode update, if it is, transporting with timestamp in receiver system time and the data packet The value of calculation as seed selection it is new obscure cipher mode, and by it is described it is new obscure cipher mode and return to described sender set It is standby;The control information that controller issues is received, to update packet processing strategie and encapsulation format.
10. device according to claim 9, it is characterised in that:
Data packet handing module in described sender equipment is specifically used for sending out when transmission method, apparatus initiates communication for the first time Comprising obscuring cipher mode database information in the payload for the data packet sent;
Data packet handing module in the receiver equipment initiates communication specifically for receiving described sender equipment for the first time Data packet extracts obscuring cipher mode database information and proofreading in data packet and locally obscures cipher mode database, obtains What described sender equipment, receiver equipment were safeguarded jointly obscures encryption policy database information and is encapsulated in response data packet In, the response data packet is sent to described sender equipment;
Data packet handing module in described sender equipment, after receiving the response data packet, described in extraction What the described sender equipment in response data packet, receiver equipment were safeguarded jointly obscure encryption policy database information and therefrom It selects one kind to obscure encryption policy, obscures encryption policy by selected and be encapsulated in tactful confirmation request data packet and be sent to Receiver equipment;
Data packet handing module in the receiver equipment, the strategy confirmation specifically for receiving described sender equipment are asked It after seeking data packet, extracts and stores that described sender equipment is selected to obscure encryption policy, sent to described sender equipment Strategy confirmation response data packet;
Data packet handing module in described sender equipment confirms specifically for receiving the strategy that the receiver equipment returns After response data packet, encrypted packet is obscured according to the encryption policy of obscuring of both sides' confirmation, and send and obscure encrypted data It wraps to the receiver equipment.
CN201910496313.3A 2019-06-10 2019-06-10 Secure data transmission method and device for intelligent identification network Active CN110177116B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201910496313.3A CN110177116B (en) 2019-06-10 2019-06-10 Secure data transmission method and device for intelligent identification network
PCT/CN2020/094554 WO2020248906A1 (en) 2019-06-10 2020-06-05 Secure data transmission method and apparatus for intelligent fusion identification network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910496313.3A CN110177116B (en) 2019-06-10 2019-06-10 Secure data transmission method and device for intelligent identification network

Publications (2)

Publication Number Publication Date
CN110177116A true CN110177116A (en) 2019-08-27
CN110177116B CN110177116B (en) 2020-07-14

Family

ID=67698086

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910496313.3A Active CN110177116B (en) 2019-06-10 2019-06-10 Secure data transmission method and device for intelligent identification network

Country Status (2)

Country Link
CN (1) CN110177116B (en)
WO (1) WO2020248906A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020248906A1 (en) * 2019-06-10 2020-12-17 北京交通大学 Secure data transmission method and apparatus for intelligent fusion identification network
CN114205814A (en) * 2021-12-03 2022-03-18 中国联合网络通信集团有限公司 Data transmission method, device and system, electronic equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103516702A (en) * 2012-06-29 2014-01-15 北京新媒传信科技有限公司 Symmetrical encryption method and system and central server
CN106452764A (en) * 2016-12-02 2017-02-22 武汉理工大学 Method for automatically updating identification private key and password system
CN106452787A (en) * 2016-10-13 2017-02-22 广东欧珀移动通信有限公司 Data verification method and device
US20170277775A1 (en) * 2012-10-30 2017-09-28 FHOOSH, Inc. Systems and methods for secure storage of user information in a user profile
CN108965302A (en) * 2018-07-24 2018-12-07 苏州科达科技股份有限公司 Media data transmission system, method, apparatus and storage medium
CN109409033A (en) * 2018-09-11 2019-03-01 平安科技(深圳)有限公司 Code encryption method, apparatus, computer installation and storage medium

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7835520B2 (en) * 2003-02-20 2010-11-16 Zoran Corporation Unique identifier per chip for digital audio/video data encryption/decryption in personal video recorders
CN106789054A (en) * 2016-12-23 2017-05-31 携程旅游网络技术(上海)有限公司 The update method and system of dynamic encryption and decryption algorithm
CN109241760A (en) * 2018-09-28 2019-01-18 北京北信源信息安全技术有限公司 Data ciphering method, decryption method, encryption device and decryption device
CN110177116B (en) * 2019-06-10 2020-07-14 北京交通大学 Secure data transmission method and device for intelligent identification network

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103516702A (en) * 2012-06-29 2014-01-15 北京新媒传信科技有限公司 Symmetrical encryption method and system and central server
US20170277775A1 (en) * 2012-10-30 2017-09-28 FHOOSH, Inc. Systems and methods for secure storage of user information in a user profile
CN106452787A (en) * 2016-10-13 2017-02-22 广东欧珀移动通信有限公司 Data verification method and device
CN106452764A (en) * 2016-12-02 2017-02-22 武汉理工大学 Method for automatically updating identification private key and password system
CN108965302A (en) * 2018-07-24 2018-12-07 苏州科达科技股份有限公司 Media data transmission system, method, apparatus and storage medium
CN109409033A (en) * 2018-09-11 2019-03-01 平安科技(深圳)有限公司 Code encryption method, apparatus, computer installation and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张宏科等: "智融标识网络基础研究", 《电子学报》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020248906A1 (en) * 2019-06-10 2020-12-17 北京交通大学 Secure data transmission method and apparatus for intelligent fusion identification network
CN114205814A (en) * 2021-12-03 2022-03-18 中国联合网络通信集团有限公司 Data transmission method, device and system, electronic equipment and storage medium
CN114205814B (en) * 2021-12-03 2023-11-21 中国联合网络通信集团有限公司 Data transmission method, device and system, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN110177116B (en) 2020-07-14
WO2020248906A1 (en) 2020-12-17

Similar Documents

Publication Publication Date Title
CN101300806B (en) System and method for processing secure transmissions
CN106713320A (en) Terminal data transmission method and device
CN110535647A (en) Believable data transmission method, system, electronic equipment, storage medium
CN100591076C (en) Method and apparatus for providing transaction-level security
CN104322001A (en) Transport layer security traffic control using service name identification
CN108270882A (en) The analysis method and device of domain name, storage medium, electronic device
CN103746815B (en) Safety communicating method and device
CN101304310B (en) Method for reinforcing network SSL service
CN100580652C (en) Method and device for fiber-optical channel public transmission secret protection
CN1685687A (en) Secure proximity verification of a node on a network
CN105262737B (en) A method of based on defending against DDOS attack for jump channel pattern
CN104662839B (en) The link identification in multiple domains
CN108063712A (en) The sending method and device of a kind of network request
Recabarren et al. Tithonus: A bitcoin based censorship resilient system
CN102761494A (en) IKE (Internet Key Exchange) negotiation processing method and device
CN107690783A (en) A kind of data transmission method, Centralized Controller, forwarding surface equipment and communicator
CN110177116A (en) Intelligence melts the safety data transmission method and device of mark network
CN110225049A (en) Data transmission method, client and server
CN110011892A (en) A kind of communication means and relevant apparatus of Virtual Private Network
CN110519052A (en) Data interactive method and device based on Internet of Things operating system
CN107659400A (en) A kind of quantum secret communication method and device based on mark identification
CN107276996A (en) The transmission method and system of a kind of journal file
CN109936566A (en) A kind of data transmission method system, device and computer readable storage medium
CN104462994B (en) A kind of data encryption and decryption oprerations method
CN110290151A (en) File transmitting method, device and read/write memory medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20190827

Assignee: HENAN QUNZHI INFORMATION TECHNOLOGY CO.,LTD.

Assignor: Beijing Jiaotong University

Contract record no.: X2021990000779

Denomination of invention: Secure data transmission method and device of Zhirong identification network

Granted publication date: 20200714

License type: Common License

Record date: 20211209

EE01 Entry into force of recordation of patent licensing contract