CN101150390A - Fingerprint communication method and system based on trust detection - Google Patents

Fingerprint communication method and system based on trust detection Download PDF

Info

Publication number
CN101150390A
CN101150390A CNA2006101222974A CN200610122297A CN101150390A CN 101150390 A CN101150390 A CN 101150390A CN A2006101222974 A CNA2006101222974 A CN A2006101222974A CN 200610122297 A CN200610122297 A CN 200610122297A CN 101150390 A CN101150390 A CN 101150390A
Authority
CN
China
Prior art keywords
employing fingerprint
module
authentication
management server
edge device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2006101222974A
Other languages
Chinese (zh)
Other versions
CN101150390B (en
Inventor
周卫
张文
陈建芳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN 200610122297 priority Critical patent/CN101150390B/en
Priority to PCT/CN2007/000052 priority patent/WO2008037144A1/en
Publication of CN101150390A publication Critical patent/CN101150390A/en
Application granted granted Critical
Publication of CN101150390B publication Critical patent/CN101150390B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/66Arrangements for connecting between networks having differing types of switching systems, e.g. gateways

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Small-Scale Networks (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

This invention relates to an applied fingerprint communication method and a system, in which, the system includes: a client module used in authenticating with a management server and getting applied fingerprint to identify and cipher the data sent by an appointed applied program, a management server identification sub-module used in idientifying with the client module and generating an applied fingerprint to send it to a border device module and an authentication sub-module, a sub-module of the management server used in routine maintenance, management, configuration, result lookup and report output, a border device module used in identifying and deciphering trust data messages and stopping non-trust and generating alarms, which guarantees that only appointed applied program messages are transmitted in a communication tunnel provided in advance.

Description

Based on trusting employing fingerprint communication means and the system that detects
[technical field]
The present invention relates to a kind of secure communication of network way of realization-a kind of employing fingerprint communication means and system that detects based on trust.
[background technology]
Safety products such as existing fire compartment wall, VPN all will be set up a safe communication tunnel, be that the data message what application program is sent arrives the purpose machine yet but cannot say for sure to demonstrate,prove in this effective secure tunnel; IDS, anti-virus product are individual replenishing to this, must provide knowledge base in advance again to this additional many trouble and infeasible to imprevision threat strick precaution of bringing; This method guarantees in the communication tunnel that provides in advance that by based on trusting employing fingerprint communication means and the system that detects no matter whether it is comparatively safe, the application data message that only transmits appointment is to the purpose machine.
[summary of the invention]
Purpose of the present invention designs a kind of secure communication of network way of realization exactly, by employing fingerprint communication means and the system that detects based on trust, make that using same employing fingerprint to do sign between client computer and edge device guarantees in the communication tunnel that provides in advance with the step of discerning encrypt and decrypt, no matter whether it is comparatively safe, only transmit the application data message of appointment, based on trusting the employing fingerprint communication system that detects, it is characterized in that: comprise client module: be used for management server authentication and obtain employing fingerprint, and identify and encryption etc. with the data that this employing fingerprint sends preassigned application program;
Management server authentication sub module: be used for and the client module authentication, and the generation employing fingerprint is issued edge device module and authentication sub module etc.
Management service management submodule: be used for that regular maintenance, management, configuration, result are checked, report output etc.;
Edge device module: be used to discern and decipher the data message of trust, block the message of non-trust, and produce alarm etc.
Described management server authentication sub module, management service management submodule, edge device module can be one to three module by merger physically all.
Based on trusting the employing fingerprint communication means that detects, it is characterized in that: comprising:
Step 1: client module obtains the employing fingerprint of this time authentication to management server identity verification and request;
Step 2: when having confirmed client identity, management server will produce the employing fingerprint of this authentication at random, and edge device is issued in the IP address of client computer and the employing fingerprint of MAC Address and correspondence, form white list and employing fingerprint table on edge device;
Step 3: accept response when obtaining edge device, server sends back to client module with authentication success signal and this employing fingerprint again, otherwise beams back the authentification failure signal to client module;
Step 4: client module is in the employing fingerprint term of validity, the data message that preassigned application program is sent carries out sending with the employing fingerprint encryption and after marking, the data message that other application programs are sent will be ignored or block, and all application data messages are postponed sending during authenticating;
Step 5: after edge device is received the data message that client computer sends, judge client computer then and deciphering corresponding in white list with the employing fingerprint table with data message, data message after the deciphering is sent to the purpose machine, will not transmit the data message that can't mate with employing fingerprint, and report to the police by setting in advance;
Step 6: edge device will be by specific identification and current to the authentication signal between the management server to client computer.
Before new connection generation or employing fingerprint arrival effective time, client module is incited somebody to action again above step 1 to step 5, the data message that assurance like this has only the application program of appointment to send could be dealt into the purpose machine from client computer, makes the purpose machine not threatened by the network attack of client computer.
Above-mentioned steps one be client module new connection create or old employing fingerprint with the authentication request data message of initiatively initiating when losing efficacy to management server.
Above-mentioned steps two for management server with authentication content and the client identity information contrast of leaving lane database in advance by management service management submodule in, confirm to produce employing fingerprint after the identity.
Above-mentioned steps three shows that clearly edge device receives new employing fingerprint more earlier than client computer.
Above-mentioned steps four, all application data messages are postponed sending during authenticating.
It is special processing to client computer to the authentication signal between the management server that above-mentioned steps six is described special statement edge device.
The present invention has the following advantages:
1, guarantees in the communication tunnel that provides in advance,, only transmit the application data message of appointment no matter whether it is comparatively safe.
2, need not to be concerned about the feature of non-trust content, do not have demands such as feature database upgrading.
3, data message computations amount is little, the efficiency of transmission height.
4, alarm data can carry out the secondary excavation, carries out the more analysis of deep layer.
[description of drawings]
Fig. 1 is that the utility model is based on the structural representation of trusting the employing fingerprint communication system that detects;
Fig. 2 is the client module data flowchart;
Fig. 3 is the data flowchart of management server;
Fig. 4 is the data flowchart of edge device.
[embodiment]
Fig. 1 the present invention is based on the structural representation of trusting the employing fingerprint communication system that detects, and sees Figure of description 1.System of the present invention as described in Figure comprises client module 11, management server 12, and edge device 13,
Client module 11: be used for management server authentication and obtain employing fingerprint, and identify and encryption etc. with the data that this employing fingerprint sends preassigned application program;
Wherein management server 12 comprises management server authentication sub module 121 and management service management submodule 122
Management server authentication sub module 121: be used for and the client module authentication, and the generation employing fingerprint is issued edge device module and authentication sub module etc.;
Management service management submodule 122: be used for that regular maintenance, management, configuration, result are checked, report output etc.;
Edge device module 13: be used to discern and decipher the data message of trust, block the message of non-trust, and produce alarm etc.;
Employing fingerprint is a synonym, is to produce the one piece of data content at random in fact, and is similar with fingerprint in the actual life because its randomness causes its relative uniqueness, and uses at preassigned application program, so use the employing fingerprint code name.
Whether wherein client module 11 will be from operating system bottom layer driving mode data interception message, and can write changes the data message content, and control it and be issued, and can finish the work that client module is born thus.Client computer is which application program is sent with agreement and port from data message from counter the finding of operating system also.
Edge device 13 also will catch data message from the operating system bottom, writing changes data message and whether control transmits.The mode that realizes can drive give out a contract for a project mode, operating system interface, application program of packet capturing and articulate (as the Iptable interface programming of Linux) etc.
Management server 12 includes management server administration module and management server authentication module, can peel off this two modules according to capacity and performance requirement in the practical application, even adds database server and certificate server, also available third-party certificate server.Client module 11 will adopt the tcp data message of encrypting to transmit to the authentication mode between the management server 12, and same management server 12 and 13 of edge devices also will adopt the tcp data message of encrypting to transmit to guarantee content confidentiality, integrality and availability.Management service management 12 modules mainly use Client (C/S) or browser/server pattern (B/S) to carry out operations such as the registration of client user, change, and the latter is more recommended.
Above management server authentication sub module 121, management service management submodule 122, edge device module 13 can be one to three module by merger physically all.
Fig. 2 is the client module data flowchart, as shown in Figure 2, step 1: when client module is intercepted the data message that all application programs are sent, step 2: its data message that whether is the application program of instruction is sent is judged, step 3: if the data message that application program is sent, further judge this connection whether authenticated (promptly whether obtaining employing fingerprint), step 4: whether expire if judge employing fingerprint again, step 5: if do not expire, promptly utilize employing fingerprint that its data message that sends is carried out mark and encryption, and send this data message.
Wherein, if, need not be concerned about then whether it sends or block if what send in the step 2 is not the data message that sends for the application program of appointment;
In the step 3, if this connects not authentication, then get back to step 1, request authentication, then wait for authentication signal, thus eligible access authentication result, step 6: judge whether authentication is passed through, if authentication is passed through, forward step 5 to and its data message is encrypted then sent this data message;
Above-mentioned, then abandon this data message when waiting for that if the overtime and authentication of authentication signal do not pass through.
Fig. 3 is the data flowchart of management server, and as shown in Figure 3, step 1: management server receives authentication request signal, it is authenticated, step 2: judge that whether its authentication is passed through, if pass through, then generates employing fingerprint, then send client computer IP address to edge device, MAC Address and employing fingerprint, step 3: wait for the response of edge device, whether overtime, if not overtime, send authentication success and employing fingerprint to client module.
Wherein, in the step 2 authentication not by or or step 3 in overtime then this management server respond authentification failure.
Fig. 4 is the data flowchart of edge device, as shown in Figure 4, comprise step 1: when edge device is subjected to all data messages, it is judged, whether be the authentication signal of management server, step 2: if not, further judge whether it is white list and the employing fingerprint update signal that management server sends, step 3: the IP address of further judging client computer again, MAC Address whether in white list, if, step 4: judge whether to be consistent with employing fingerprint, utilize the employing fingerprint deciphering, and send to the purpose machine.
Wherein, judge in the step 1 if the authentication signal of management server then is forwarded to management server;
Wherein, in the step 2,, then upgrade the tabulation of white list and employing fingerprint, then send and be updated to function signal to management server if not white list that sends for management server and employing fingerprint update signal;
Wherein, if the IP address of client computer in the step 3, step 4, MAC Address not in white list or with inconsistent this data literary composition newspaper of then not transmitting of employing fingerprint.
The present invention has the following advantages:
1, guarantees in the communication tunnel that provides in advance,, only transmit the application data message of appointment no matter whether it is comparatively safe.
2, need not to be concerned about the feature of non-trust content, do not have demands such as feature database upgrading.
3, data message computations amount is little, the efficiency of transmission height.
4, alarm data can carry out the secondary excavation, carries out the more analysis of deep layer.
The above person only is most preferred embodiment of the present invention, is not to be used to limit the scope of the invention, and all equivalences of being done according to the present patent application claim change or modify, and are all the present invention and contain.

Claims (9)

1. based on trusting the employing fingerprint communication system that detects, it is characterized in that:
Comprise client module: be used for management server authentication and obtain employing fingerprint, and identify and encryption etc. with the data that this employing fingerprint sends preassigned application program;
Management server authentication sub module: be used for and the client module authentication, and the generation employing fingerprint is issued edge device module and authentication sub module etc.;
Management service management submodule: be used for that regular maintenance, management, configuration, result are checked, report output etc.;
Edge device module: be used to discern and decipher the data message of trust, block the message of non-trust, and produce alarm etc.
Network safety event as claimed in claim 1 based on the employing fingerprint communication system that trust to detect,
It is characterized in that: described management server authentication sub module, management service management submodule, edge device module can be one to three module by merger physically all.
3. based on trusting the employing fingerprint communication means that detects, it is characterized in that: comprising:
Step 1: client module obtains the employing fingerprint of this time authentication to management server identity verification and request;
Step 2: when having confirmed client identity, management server will produce the employing fingerprint of this authentication at random, and edge device is issued in the IP address of client computer and the employing fingerprint of MAC Address and correspondence, form white list and employing fingerprint table on edge device;
Step 3: accept response when obtaining edge device, server sends back to client module with authentication success signal and this employing fingerprint again, otherwise beams back the authentification failure signal to client module;
Step 4: client module is in the employing fingerprint term of validity, the data message that preassigned application program is sent carries out sending with the employing fingerprint encryption and after marking, the data message that other application programs are sent will be ignored or block, and all application data messages are postponed sending during authenticating;
Step 5: after edge device is received the data message that client computer sends, judge client computer then and deciphering corresponding in white list with the employing fingerprint table with data message, data message after the deciphering is sent to the purpose machine, will not transmit the data message that can't mate with employing fingerprint, and report to the police by setting in advance;
Step 6: edge device will be by specific identification and current to the authentication signal between the management server to client computer.
4. as claimed in claim 3 based on trusting the employing fingerprint communication means that detects, it is characterized in that: before new connection generation or employing fingerprint arrival effective time, client module is incited somebody to action again above step 1 to step 5, the data message that assurance like this has only the application program of appointment to send could be dealt into the purpose machine from client computer, makes the purpose machine not threatened by the network attack of client computer.
5. as claimed in claim 3 based on the employing fingerprint communication means that trust to detect, it is characterized in that: above-mentioned steps one for client module new connection create or old employing fingerprint with the authentication request data message of initiatively initiating when losing efficacy to management server.
6. as claimed in claim 3 based on trusting the employing fingerprint communication means that detects, it is characterized in that: above-mentioned steps two for management server with authentication content and the client identity information contrast of leaving lane database in advance by management service management submodule in, confirm to produce employing fingerprint after the identity.
7. as claimed in claim 3 based on trusting the employing fingerprint communication means that detects, it is characterized in that: above-mentioned steps three shows that clearly edge device receives new employing fingerprint more earlier than client computer.
8. as claimed in claim 3 based on trusting the employing fingerprint communication means that detects, it is characterized in that: above-mentioned steps four, all application data messages are postponed sending during authenticating.
9. as claimed in claim 3 based on trusting the employing fingerprint communication means that detects, it is characterized in that: it is special processing to client computer to the authentication signal between the management server that above-mentioned steps six is described special statement edge device.
CN 200610122297 2006-09-22 2006-09-22 Fingerprint communication method and system based on trust detection Expired - Fee Related CN101150390B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN 200610122297 CN101150390B (en) 2006-09-22 2006-09-22 Fingerprint communication method and system based on trust detection
PCT/CN2007/000052 WO2008037144A1 (en) 2006-09-22 2007-01-08 Method and system for communication of application fingerprint based on the credit verification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200610122297 CN101150390B (en) 2006-09-22 2006-09-22 Fingerprint communication method and system based on trust detection

Publications (2)

Publication Number Publication Date
CN101150390A true CN101150390A (en) 2008-03-26
CN101150390B CN101150390B (en) 2013-05-08

Family

ID=39229716

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200610122297 Expired - Fee Related CN101150390B (en) 2006-09-22 2006-09-22 Fingerprint communication method and system based on trust detection

Country Status (2)

Country Link
CN (1) CN101150390B (en)
WO (1) WO2008037144A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103106736A (en) * 2012-12-28 2013-05-15 华为软件技术有限公司 Identity authentication method, terminal and server
CN107483514A (en) * 2017-10-13 2017-12-15 北京知道创宇信息技术有限公司 Attack monitoring device and smart machine
CN108141723A (en) * 2015-10-16 2018-06-08 格马尔托股份有限公司 The method for managing application program
CN110933028A (en) * 2019-10-24 2020-03-27 中移(杭州)信息技术有限公司 Message transmission method, device, network equipment and storage medium

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112989315B (en) * 2021-02-03 2023-03-24 杭州安恒信息安全技术有限公司 Fingerprint generation method, device and equipment for terminal of Internet of things and readable storage medium

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7200230B2 (en) * 2000-04-06 2007-04-03 Macrovision Corporation System and method for controlling and enforcing access rights to encrypted media
CN1191703C (en) * 2001-12-31 2005-03-02 西安西电捷通无线网络通信有限公司 Safe inserting method of wide-band wireless IP system mobile terminal
CN1206607C (en) * 2002-08-19 2005-06-15 英保达股份有限公司 Information storage system fingerprint identification function and its method
CN100334850C (en) * 2003-09-10 2007-08-29 华为技术有限公司 A method for implementing access authentication of wireless local area network
CN1804751A (en) * 2005-01-14 2006-07-19 沈阳上方电子有限公司 Computer security system employing fingerprint authentication to control peripheral equipment

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103106736A (en) * 2012-12-28 2013-05-15 华为软件技术有限公司 Identity authentication method, terminal and server
CN103106736B (en) * 2012-12-28 2016-07-06 华为软件技术有限公司 A kind of identity identifying method, terminal and server
CN108141723A (en) * 2015-10-16 2018-06-08 格马尔托股份有限公司 The method for managing application program
CN108141723B (en) * 2015-10-16 2021-03-12 泰雷兹数字安全法国股份有限公司 Method for managing application program
CN107483514A (en) * 2017-10-13 2017-12-15 北京知道创宇信息技术有限公司 Attack monitoring device and smart machine
CN110933028A (en) * 2019-10-24 2020-03-27 中移(杭州)信息技术有限公司 Message transmission method, device, network equipment and storage medium

Also Published As

Publication number Publication date
WO2008037144A1 (en) 2008-04-03
CN101150390B (en) 2013-05-08

Similar Documents

Publication Publication Date Title
EP2332089B1 (en) Authorization of server operations
CN1685687B (en) Method for determining proximity of target node to source node
US20130268444A1 (en) Three-factor user authentication method for generating otp using iris information and secure mutual authentication system using otp authentication module of wireless communication terminal
US20180324152A1 (en) Securely recognizing mobile devices
CN106452721A (en) Method and system for instruction identification of intelligent device based on identification public key
KR101972110B1 (en) security and device control method for fog computer using blockchain technology
CN101150390B (en) Fingerprint communication method and system based on trust detection
CN1694395A (en) Data authentication method and agent based system
CN101163044A (en) Remote updating method and system for information safety equipment
CN110719203A (en) Operation control method, device and equipment of intelligent household equipment and storage medium
US11323883B2 (en) Pattern driven selective sensor authentication for internet of things
CN110138731B (en) Network anti-attack method based on big data
US20210019451A1 (en) Process and detachable device for using and managing encryption keys
DE60300912D1 (en) Procedure for managing the security of Border Gateway Protocol messages
CN107154854A (en) A kind of unmanned plane instruction is reinforced and discrimination method and system
CN108400967B (en) Authentication method and authentication system
CN114429279A (en) Method and system for tracing vaccine based on encryption technology
CN114124572A (en) Data transmission method, device, equipment and medium based on unidirectional network
JP2002016592A (en) Encryption key management system and encryption key management method
Wu et al. A comprehensive set of security measures for IOT
CN116319949B (en) Session migration method, session migration device, terminal equipment and storage medium
KR101448711B1 (en) security system and security method through communication encryption
CN113315764B (en) ARP attack-preventing data packet sending method and device, router and storage medium
CN112468544B (en) Express data transmission method based on middleware and middleware
CN112543098B (en) Intelligent building mobile equipment authentication system and method based on challenge response mechanism

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20130508

Termination date: 20150922

EXPY Termination of patent right or utility model