CN104753671A - Method of interconnection among network entities, device, CYBERnet construction method and device - Google Patents
Method of interconnection among network entities, device, CYBERnet construction method and device Download PDFInfo
- Publication number
- CN104753671A CN104753671A CN201310741138.2A CN201310741138A CN104753671A CN 104753671 A CN104753671 A CN 104753671A CN 201310741138 A CN201310741138 A CN 201310741138A CN 104753671 A CN104753671 A CN 104753671A
- Authority
- CN
- China
- Prior art keywords
- data
- entity
- network
- identification
- card
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
The invention discloses a method of interconnection among network entities, a device, a CYBERnet construction method and a device. The interconnection method comprises steps: before data sending, a communication sender generates an identifier signature, and an entity identifier is promoted to have provability; a data signature is also generated, and data are provided to have provability; a receiver verifies validity of the sender according to the received identifier signature, whether the communication is received is judged according to a verification result, first autonomous control is realized, authenticity and integrity of the data are verified according to the received data signature, whether the data are processed is judged according to the verification result, and second autonomous control is realized. The CYBERnet is realized on the basis of the prior network in the interconnection method, and a CPK card is used for providing an autonomous controllable judging basis for the interconnection method.
Description
Technical field
The present invention relates to technical field of the computer network, specifically, relate to construction method and the device of communication initiation between a kind of independently controlled network entity and receiving method and device and Internet (CYBERnet).
Background technology
Network grows up from communication network, such as telecommunication network.In telecommunication network, network realizes network with circuit switched and connects, so its fail safe is higher, but also just because of the network of telecommunication network realizes network connection with circuit switched, therefore, the network of telecommunication network has certain limitation, and it can only realize local area network (LAN).Subsequently, along with the development of science and technology and the demand of network, people develop and have occurred IP network, in an ip network, network realizes network with packet system to connect, thus got through the boundary of local area network (LAN), solve the confinement problems that telecommunication network exists, constitute the internet of connection to global networks.But although existing internet has the performance of connection to global networks, it is only provided in the service of interconnecting between any IP address, but can not provide the service demonstrate,proved mutually and recognize each other.Cause the trouble waters of network thus, injure the existence of internet.
Be only provided in the service of interconnecting between any IP address for internet existing in correlation technique, the service demonstrate,proved mutually and recognize each other but can not be provided, cause the problem that fail safe is lower, not yet propose effective solution at present.
Summary of the invention
The service of interconnecting between any IP address is only provided in for internet existing in correlation technique, the service demonstrate,proved mutually and recognize each other but can not be provided, cause the problem that fail safe is lower, the present invention proposes construction method and the device of communication initiation between a kind of independently controlled network entity and receiving method and device and Internet (CYBERnet), can provide between any entity identification and carry out demonstrate,proving the connection recognized each other mutually, and then expand network size, and effectively raise the fail safe of network, but also the fatal deficiency that the internet of compensate for over does not provide IP address to prove and produces.
Technical scheme of the present invention is achieved in that
According to an aspect of the present invention, provide the communication initiating method between a kind of independently controlled network entity, wherein, there is in network entity Conbined public or double key CPK card, and there is in CPK card entity identification and pre-configured private key.
Communication initiating method between this independently controlled network entity comprises:
Before data transmission, transmit leg, by CPK card, provides entity identification to network side, and according to private key, to entity identification, generating identification is signed, and has to impel the entity identification provided to network side the property demonstrate,proved;
Further, transmit leg, also by the private key in CPK card, to the data that will send, generates data signature, has to impel the data that will send to network side the property demonstrate,proved;
Identification signature, data signature and data are sent to recipient by transmit leg.
Wherein, the entity identification that network entity is corresponding has uniqueness.
Further, the type of the entity identification corresponding to network entity of different network type is identical or different.
According to a further aspect in the invention, provide the communication apparatus for initiating between a kind of independently controlled network entity, wherein, there is in network entity Conbined public or double key CPK card, and there is in CPK card entity identification and pre-configured private key.
Communication apparatus for initiating between this independently controlled network entity comprises:
First signature blocks, for before data transmission, by CPK card, provides entity identification to network side, and according to private key, to entity identification, generating identification is signed, and has to impel the entity identification provided to network side the property demonstrate,proved;
Second signature blocks, for by the private key in CPK, to the data that will send, generates data signature, has to impel the data that will send to network side the property demonstrate,proved;
Sending module, for being sent to recipient by identification signature, data signature and data.
Wherein, the entity identification that network entity is corresponding has uniqueness.
Further, the type of the entity identification corresponding to network entity of different network type is identical or different.
According to another aspect of the invention, provide the communication receiving method between a kind of independently controlled network entity, wherein, there is in network entity Conbined public or double key CPK card, and there is in CPK card entity identification and pre-configured private key.
Communication receiving method between this independently controlled network entity comprises:
Recipient receives identification signature and the data signature of transmit leg transmission;
Recipient, according to the identification signature received, verifies the legitimacy of transmit leg, and when the result be transmit leg is legal, receives the data that transmit leg sends;
Recipient, according to the data signature received, verifies the integrality of data and authenticity, and when data are by checking, allows the data to receiving to process.
In addition, the communication receiving method between this independently controlled network entity also comprises: when described the result be described transmit leg is illegal, described recipient rejects described data.
Wherein, the entity identification that network entity is corresponding has uniqueness.
Further, the type of the entity identification corresponding to network entity of different network type is identical or different.
In accordance with a further aspect of the present invention, provide the communication receiving device between a kind of independently controlled network entity, wherein, there is in network entity Conbined public or double key CPK card, and there is in CPK card entity identification and pre-configured private key.
Communication receiving device between this independently controlled network entity comprises:
Receiver module, for receiving identification signature and the data signature of transmit leg transmission;
First authentication module, for according to the described identification signature received, verifies the legal information of described transmit leg, and when the result be described transmit leg is legal, receives the data that described transmit leg sends;
Second authentication module, for according to the data signature received, verifies the integrality of data and authenticity, and when data are by checking, allows the data to receiving to process.
In addition, the first authentication module is also for be transmit leg at the result being illegal, rejection data.
Wherein, the entity identification that network entity is corresponding has uniqueness.
Further, the type of the entity identification corresponding to network entity of different network type is identical or different.
According to another aspect of the invention, provide the construction method of a kind of independently controlled CYBERnet, the communication initiating method between the construction method of this independently controlled CYBERnet comprises by above-mentioned network entity and the communication receiving method between network entity are by multiple network synthesis CYBERnet.
In accordance with a further aspect of the present invention, provide the construction device of a kind of independently controlled CYBERnet, the construction device of this independently controlled CYBERnet comprises the communication receiving device between communicator between above-mentioned network entity and network entity.
The present invention provides entity identification by transmit leg, and by CPK card for entity identification is signed, then identification signature is sent to recipient, recipient is impelled to verify according to the legitimacy of this signature to transmit leg, thus ensure that to only have legal transmit leg could communicate to connect with recipient, achieve the autonomous controllable function of network, effectively raise the fail safe of network, stop illegal access.
In addition, the present invention also needs the data sent to sign by CPK card to transmit leg, making recipient when receiving data, can verify, thus effectively raise the fail safe of data according to the authenticity and integrity of this signature to data.
In addition, the present invention is also by when the mutual card of the entity identification tolerating identical type is recognized each other, the mutual card of compatible dissimilar entity identification is recognized each other, thus make the present invention can either realize the interconnected of identical type network, the interconnected of dissimilar network can be realized again, and then achieve the effect expanding network size.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 be according to the independently controlled network entity of the embodiment of the present invention between the schematic flow sheet of communication initiating method;
Fig. 2 be according to the independently controlled network entity of the embodiment of the present invention between the schematic flow sheet of communication receiving method;
Fig. 3 is the structural representation comprising the CYBERnet of mobile telephone network according to the embodiment of the present invention;
Fig. 4 is the schematic flow sheet of key application according to the CPK card of the embodiment of the present invention and granting;
Fig. 5 be according to the independently controlled network entity of the embodiment of the present invention between the structural representation of communication apparatus for initiating;
Fig. 6 be according to the independently controlled network entity of the embodiment of the present invention between the structural representation of communication receiving device.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, the every other embodiment that those of ordinary skill in the art obtain, all belongs to the scope of protection of the invention.
According to embodiments of the invention, provide the communication initiating method between a kind of independently controlled network entity, wherein, there is in network entity Conbined public or double key CPK card, and there is in CPK card entity identification and pre-configured private key.
As shown in Figure 1, comprise according to the communication initiating method between the independently controlled network entity of the embodiment of the present invention:
Step S101, before data transmission, transmit leg, by CPK card, provides entity identification to network side, and according to private key, to entity identification, generating identification is signed, and has to impel the entity identification provided to network side the property demonstrate,proved;
Step S103, transmit leg also by the private key in CPK card, to the data that will send, generate data signature, with impel to will network side send data there is the property demonstrate,proved;
Step S105, identification signature, data signature and data are sent to recipient by transmit leg.
Wherein, the entity identification that network entity is corresponding has uniqueness.
Further, the type of the entity identification corresponding to network entity of different network type is identical or different.
According to embodiments of the invention, provide the communication receiving method between a kind of independently controlled network entity, wherein, there is in network entity Conbined public or double key CPK card, and there is in CPK card entity identification and pre-configured private key.
As shown in Figure 2, comprise according to the communication receiving method between the independently controlled network entity of the embodiment of the present invention:
Step S201, recipient receives identification signature and the data signature of transmit leg transmission;
Step S203, recipient, according to the identification signature received, verifies the legitimacy of transmit leg, and when the result be transmit leg is legal, receives the data that transmit leg sends;
Step S205, recipient, according to the data signature received, verifies the integrality of data and authenticity, and when data are by checking, allows the data to receiving to process.
In addition, the communication receiving method between this independently controlled network entity also comprises: when described the result be described transmit leg is illegal, described recipient rejects described data.
Wherein, the entity identification that network entity is corresponding has uniqueness.
Further, the type of the entity identification corresponding to network entity of different network type is identical or different.
In such scheme, the checking of identification signature, can be recipient and the distinguishing rule whether accepting this communication is provided, realize the first independently controlled of recipient, and the checking of digital signature, then can be recipient and the distinguishing rule whether processing this secondary data is provided, realize the second independently controlled of recipient.
Be described in detail (wherein to the technical scheme in such scheme of the present invention CPK principle below, for convenience of description, with Alice representative mark, Alice can be telephone number, the user name of internet, No. ID, the Bank Account Number of antifalsification label of telephone network, also can be IP address etc.).
In above-mentioned network, each entity in network possesses CPK card, and CPK card is then made up of CPK Conbined public or double key and Truth Value Logic.CPK Conbined public or double key is the public key system based on mark, and for each entity provides private key, operation principle is as follows:
CPK card produces PKI and private key, by the generation σ of private key according to mark
1mark, the generation σ of PKI
2mark, so the private key generative process of Alice is:
HASH(Alice)→σ
1(r
i,j)→alice
The PKI generative process of Alice is then:
HASH(Alice)→σ
2(R
i,j)→ALICE
Wherein, due to σ
2(R
i,j) be disclosed in, PKI can be calculated by anyone, and private key is then provided by CPK card, and wherein, the key management scale of CPK card is greater than 10**48.
In addition, in CPK card, the authentication protocol of CPK card comprises digital signature protocol, data encryption protocol, password replacing agreement, cryptographic key protection agreement etc.Authentication protocol realizes on Truth Value Logic basis, and Truth Value Logic provides the method for proof differentiated in advance, for realization event occur before first accomplish independently controlledly to provide distinguishing rule.
In Truth Value Logic, an entity is divided into two parts, and namely identify (identity) and body (body), formula is as follows:
entity=identity+body
Wherein, Truth Value Logic is made up of two proof procedures, and namely identify discrimination process and body discrimination process, formula is as follows:
AUTH(entity)=AUTH(ID)∩AUTH(body)
In Truth Value Logic, mark authenticity proves that AUTH (ID) is the signature of mark to preset time.
SIG
alice(time)=(s
1,c
1)=sign
1
Identify the checking of authenticity then:
VER
ALICE(time,s
1)=c
1’
Wherein, if c
1=c
1', then prove that the Alice in this moment is true.Because mark discriminating independently can carry out before body event occurs, therefore can be described as " differentiating in advance ".
From above-mentioned, CPK card can provide mark authenticity to prove, also can verify the authenticity of mark simultaneously, therefore, when being realized the connection that the mutual card between mark is recognized each other by CPK card, transmit leg just needs the evidence providing mark authenticity, and recipient then needs the evidence verifying transmitting side marking authenticity.Idiographic flow is as follows:
Transmit leg provides the flow process of the evidence of mark authenticity as follows:
The evidence of mark authenticity is identification signature, and identification signature identifies (Alice) to the signature of time (time), that is:
SIG
alice(time)=(s
1,c
1)=sign
1
Transmit leg is after the evidence with mark authenticity, and need evidence to send to recipient, the mode of transmission can be sent by the mode of message, such as:
Msg
1:Alice→Bob:{Alice,time,sign
1}
And wherein, about the form of mark authenticity proof, then comprise following content:
Show card square mark: as Alice |
The signature time: as 2013.09.05.13.25.01 |
Show card side's signed codevector: as sign 1(signature length is no more than 3OByte) |
When recipient receives the mark authenticity proof of transmit leg transmission, recipient starts to verify mark authenticity proof, and checking flow process is as follows:
VER
ALICE(time,s
1)=c
1’
Wherein, if c
1=c
1', then prove mark Alice(telephone number) be true, otherwise be false.
In addition, according to embodiments of the invention, additionally provide the construction method of a kind of independently controlled CYBERnet, the communication initiating method between the construction method of this independently controlled CYBERnet comprises by above-mentioned network entity and the communication receiving method between network entity are by multiple network synthesis CYBERnet.
In such scheme, due to autonomous controlled CYBERnet due to be by above-mentioned network entity between communication initiating method and network entity between communication receiving method multiple network is synthesized a network, therefore, alternatively, above-mentioned CYBERnet is on existing network basis, with CPK card build.Wherein, existing network comprises internet, mobile telephone network, Internet of Things, satellite network, anti-counterfeiting mesh etc.
Corresponding, autonomous controlled CYBERnet after above-mentioned structure is the logical network system that the mutual card between any mark can be provided to recognize each other connection, wherein, the mutual card comprised between similar mark recognizes each other connection, also the mutual card comprised between inhomogeneity mark recognizes each other connection, and wherein, the mutual card between the mark belonging to heterogeneous networks recognizes each other that to connect be CPK card realization by having distinct interface, such as, the terminal adapted CPK-Ukey card of internet; Adapted CPK-SIM card in the terminal phone of wireless network; Adapted CPK-IC card in ATM in bank, concentrates adapted CPK-NCF card etc. at false proof generic validation.In like manner, on the link layer of communication, CPK-IP realizes the proof of the IP address between Internet Router; CPK-VoIP realizes the proof of the VoIP address of wireless network.
In addition, in such scheme, autonomous controlled CYBERnet is the boundary having broken information network space and internet of things space on the basis of entity identification, constitute larger new network space, such as, comprise the information networks such as communication network, internet, mobile telephone network, satellite network, also comprise the non-information networks such as Internet of Things, anti-counterfeiting mesh, Sensor Network.
Just for the connection demonstrate,proved of mobile telephone network mobile phone, such scheme is described below.
Fig. 3 is the structural representation of the CYBERnet comprising mobile telephone network, as can be seen from Figure 3, each mobile phone is all configured with CPK card, is can be implemented between any entity identification by CPK card and set up and can demonstrate,prove connection, such as, realize between mobile telephone network and Internet of Things demonstrate,proving connection etc.
When practical application, for mobile phone, CPK card can realize in SIM card, also can realize in TF card, certainly, also according to the demand of reality, can realize in the miscellaneous part on mobile phone.
In addition, when practical application, be no matter for independent network entity between mutual card interconnect scheme, or for by this autonomous controlled CYBERnet of building of card interconnect scheme mutually, can demonstrate,prove in network development process in realization, the Private key management of CPK card is only a step of most critical.When practical application, the equipment such as KMC, secret generating machine, key application machine can be set up to realize distribution and the application of private key, wherein, KMC can be positioned over website, key application machine is then positioned over site, communication between website and site is undertaken by cryptochannel, cryptochannel is then be hidden in each CPK card, when producing chip, define UID at random just can to each chip, and allot private key, this private key is only for the cryptochannel of key distribution.
The distribution of key can be described as automatically to be carried out on the basis that CPK card has had entity identification, as the Bank Account Number in the telephone number in CPK-SIM card, CPK-IC card, Internet user's name etc. in CPK-Ukey, the application of private key is to the whole automation of distribution, without the need to human intervention, the crime possibility produced due to human intervention can be prevented like this.
Concrete, the distribution of key and the flow process of application can be as shown in Figure 4, in the diagram, the site operating personnel KMC be responsible for by being positioned over website issues site card to each site, and each site receive site card after, key application machine is opened by means of site card, and check in CPK card with or without mark, if not, the existing definition mark of follow procedure, then according to key application machine, the application form of private key for user is proposed to website by key passage, after the secret generating machine of website receives application form, generate private key, and beam back site by key passage, site is after receiving private key simultaneously, be written in the CPK card of user.
When practical application, the dominant right of the key management in above-mentioned flow process can be placed in outlet, each site can be taken into account by each outlet, the distribution of key does not change the SIM card of mobile operation site and the marketing model of bank agency IC-card, the distribution of key is solved in the lump when marketing SIM card or IC-card, do not need to manage separately, adapt to the demand of public's key management.
Corresponding, according to embodiments of the invention, additionally provide the communication apparatus for initiating between a kind of independently controlled network entity, wherein, there is in network entity Conbined public or double key CPK card, and there is in CPK card entity identification and pre-configured private key.
As shown in Figure 5, comprise according to the communication apparatus for initiating between the independently controlled network entity of the embodiment of the present invention:
First signature blocks 51, for before data transmission, by CPK card, provides entity identification to network side, and according to private key, to entity identification, generating identification is signed, and has to impel the entity identification provided to network side the property demonstrate,proved;
Second signature blocks 52, for by the private key in CPK, to the data that will send, generates data signature, to impel to the data that send of network side having the property demonstrate,proved;
Sending module 53, for being sent to recipient by identification signature, data signature and data.
Wherein, the entity identification that network entity is corresponding has uniqueness.
Further, the type of the entity identification corresponding to network entity of different network type is identical or different.
Corresponding, according to embodiments of the invention, additionally provide the communication receiving device between a kind of independently controlled network entity, wherein, there is in network entity Conbined public or double key CPK card, and there is in CPK card entity identification and pre-configured private key.
As shown in Figure 6, comprise according to the communication receiving device between the independently controlled network entity of the embodiment of the present invention:
Receiver module 61, for receiving identification signature and the data signature of transmit leg transmission;
First authentication module 62, for according to the described identification signature received, verifies the legal information of described transmit leg, and when the result be described transmit leg is legal, receives the data that described transmit leg sends;
Second authentication module 63, for according to the data signature received, verifies the integrality of data and authenticity, and when data are by checking, allows the data to receiving to process.
In addition, the first authentication module 61 is also for be transmit leg at the result being illegal, rejection data.
Wherein, the entity identification that network entity is corresponding has uniqueness.
Further, the type of the entity identification corresponding to network entity of different network type is identical or different.
Corresponding, according to embodiments of the invention, additionally provide the construction device of a kind of independently controlled CYBERnet, the construction device of this independently controlled CYBERnet comprises the communication receiving device between communicator between above-mentioned network entity and network entity.
In sum, by means of technique scheme of the present invention, entity identification is provided by transmit leg, and by CPK card for entity identification is signed, then identification signature is sent to recipient, impel recipient to verify according to the legitimacy of this signature to transmit leg, thus ensure that to only have legal transmit leg could communicate to connect with recipient, achieve the autonomous controllable function of network, effectively raise the fail safe of network, stop illegal access.
In addition, the present invention also needs the data sent to sign by CPK card to transmit leg, making recipient when receiving data, can verify, thus effectively raise the fail safe of data according to the authenticity and integrity of this signature to data.
In addition, the present invention is also by when the mutual card of the entity identification tolerating identical type is recognized each other, the mutual card of compatible dissimilar entity identification is recognized each other, thus make the present invention can either realize the interconnected of identical type network, the interconnected of dissimilar network can be realized again, and then achieve the effect expanding network size.
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (16)
1. the communication initiating method between autonomous controlled network entity, is characterized in that, has Conbined public or double key CPK card in described network entity, and has entity identification and pre-configured private key in described CPK card; Described communication initiating method comprises:
Before data transmission, transmit leg, by described CPK card, provides described entity identification to network side, and according to described private key, to described entity identification, generating identification is signed, and has to impel the described entity identification provided to network side the property demonstrate,proved;
Further, described transmit leg, also by the private key in described CPK card, to the data that will send, generates data signature, has to impel the data that will send to network side the property demonstrate,proved;
Described identification signature, described data signature and described data are sent to recipient by described transmit leg.
2. communication initiating method according to claim 1, is characterized in that, the entity identification that described network entity is corresponding has uniqueness.
3. communication initiating method according to claim 1, is characterized in that, the type of the entity identification corresponding to the network entity of different network type is identical or different.
4. the communication apparatus for initiating between autonomous controlled network entity, is characterized in that, has Conbined public or double key CPK card in described network entity, and has entity identification and pre-configured private key in described CPK card; Described communication apparatus for initiating comprises:
First signature blocks, for before data transmission, by described CPK card, provides described entity identification to network side, and according to described private key, to described entity identification, generating identification is signed, and has to impel the described entity identification provided to network side the property demonstrate,proved;
Second signature blocks, for by the private key in described CPK, to the data that will send, generates data signature, has to impel the data that will send to network side the property demonstrate,proved;
Sending module, for being sent to recipient by described identification signature, described data signature and described data.
5. communication apparatus for initiating according to claim 4, is characterized in that, the entity identification that described network entity is corresponding has uniqueness.
6. communication apparatus for initiating according to claim 4, is characterized in that, the type of the entity identification corresponding to the network entity of different network type is identical or different.
7. the communication receiving method between autonomous controlled network entity, is characterized in that, has Conbined public or double key CPK card in described network entity, and has entity identification and pre-configured private key in described CPK card; Described communication receiving method comprises:
Recipient receives identification signature and the data signature of transmit leg transmission;
Described recipient, according to the described identification signature received, verifies the legitimacy of described transmit leg, and when the result be described transmit leg is legal, receives the data that described transmit leg sends;
Described recipient, according to the described data signature received, verifies the integrality of described data and authenticity, and when described data are by checking, allows the described data to receiving to process.
8. communication receiving method according to claim 7, is characterized in that, comprise further:
When described the result be described transmit leg is illegal, described recipient rejects described data.
9. the communication receiving method according to claim 7 or 8, is characterized in that, the entity identification that described network entity is corresponding has uniqueness.
10. the communication receiving method according to claim 7 or 8, is characterized in that, the type of the entity identification corresponding to the network entity of different network type is identical or different.
Communication receiving device between 11. 1 kinds of autonomous controlled network entities, is characterized in that, has Conbined public or double key CPK card in described network entity, and has entity identification and pre-configured private key in described CPK card; Described communication receiving device comprises:
Receiver module, for receiving identification signature and the data signature of transmit leg transmission;
First authentication module, for according to the described identification signature received, verifies the legal information of described transmit leg, and when the result be described transmit leg is legal, receives the data that described transmit leg sends;
Second authentication module, for according to the described data signature received, verifies the integrality of described data and authenticity, and when described data are by checking, allows the described data to receiving to process.
12. communication receiving devices according to claim 11, is characterized in that, described first authentication module is also for be described transmit leg at described the result being illegal, reject described data.
13. communication receiving devices according to claim 11 or 12, it is characterized in that, the entity identification that described network entity is corresponding has uniqueness.
14. communication receiving devices according to claim 11 or 12, it is characterized in that, the type of the entity identification corresponding to the network entity of different network type is identical or different.
The construction method of 15. 1 kinds of autonomous controlled Internet CYBERnet, it is characterized in that, comprising: by the communication receiving method between the network entity in the communication initiating method between the network entity in claims 1 to 3 described in any one and claim 7 to 10 described in any one, multiple group of networks is synthesized described CYBERnet.
The construction device of 16. 1 kinds of autonomous controlled Internet CYBERnet, it is characterized in that, comprising: the communication receiving device between the network entity in the communication apparatus for initiating between the network entity in claim 4 to 6 described in any one and claim 11 to 14 described in any one.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310741138.2A CN104753671A (en) | 2013-12-27 | 2013-12-27 | Method of interconnection among network entities, device, CYBERnet construction method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310741138.2A CN104753671A (en) | 2013-12-27 | 2013-12-27 | Method of interconnection among network entities, device, CYBERnet construction method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104753671A true CN104753671A (en) | 2015-07-01 |
Family
ID=53592832
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310741138.2A Pending CN104753671A (en) | 2013-12-27 | 2013-12-27 | Method of interconnection among network entities, device, CYBERnet construction method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104753671A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107733654A (en) * | 2017-10-10 | 2018-02-23 | 北京虎符信息技术有限公司 | A kind of smart machine based on combination key, cryptographic key distribution method |
CN108012268A (en) * | 2017-12-08 | 2018-05-08 | 北京虎符信息技术有限公司 | A kind of mobile phone terminal SIM card and the method for safe handling App, medium |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1829150A (en) * | 2006-04-10 | 2006-09-06 | 北京易恒信认证科技有限公司 | Gateway identification device and method based on CPK |
CN1832403A (en) * | 2006-04-24 | 2006-09-13 | 北京易恒信认证科技有限公司 | CPK credibility authorization system |
CN1851726A (en) * | 2006-06-06 | 2006-10-25 | 北京易恒信认证科技有限公司 | CPK based digital copyright authentication protection system and method |
CN1859091A (en) * | 2006-06-06 | 2006-11-08 | 南相浩 | Credible link safety verifying system and method based on CPK |
CN101378315A (en) * | 2007-08-27 | 2009-03-04 | 华为技术有限公司 | Method, system, equipment and server for packet authentication |
CN101488853A (en) * | 2009-01-15 | 2009-07-22 | 赵建国 | Cross-certification method based on seed key management |
CN101594229A (en) * | 2009-06-30 | 2009-12-02 | 华南理工大学 | A kind of trusted network connection system and method based on combined public key |
CN104065558A (en) * | 2013-03-20 | 2014-09-24 | 东方斯泰克信息技术研究院(北京)有限公司 | Sending and accepting methods and sending and accepting devices for email |
CN104469750A (en) * | 2013-09-13 | 2015-03-25 | 东方斯泰克信息技术研究院(北京)有限公司 | Autonomous controllable mobile internet business method and device |
-
2013
- 2013-12-27 CN CN201310741138.2A patent/CN104753671A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1829150A (en) * | 2006-04-10 | 2006-09-06 | 北京易恒信认证科技有限公司 | Gateway identification device and method based on CPK |
CN1832403A (en) * | 2006-04-24 | 2006-09-13 | 北京易恒信认证科技有限公司 | CPK credibility authorization system |
CN1851726A (en) * | 2006-06-06 | 2006-10-25 | 北京易恒信认证科技有限公司 | CPK based digital copyright authentication protection system and method |
CN1859091A (en) * | 2006-06-06 | 2006-11-08 | 南相浩 | Credible link safety verifying system and method based on CPK |
CN101378315A (en) * | 2007-08-27 | 2009-03-04 | 华为技术有限公司 | Method, system, equipment and server for packet authentication |
CN101488853A (en) * | 2009-01-15 | 2009-07-22 | 赵建国 | Cross-certification method based on seed key management |
CN101594229A (en) * | 2009-06-30 | 2009-12-02 | 华南理工大学 | A kind of trusted network connection system and method based on combined public key |
CN104065558A (en) * | 2013-03-20 | 2014-09-24 | 东方斯泰克信息技术研究院(北京)有限公司 | Sending and accepting methods and sending and accepting devices for email |
CN104469750A (en) * | 2013-09-13 | 2015-03-25 | 东方斯泰克信息技术研究院(北京)有限公司 | Autonomous controllable mobile internet business method and device |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107733654A (en) * | 2017-10-10 | 2018-02-23 | 北京虎符信息技术有限公司 | A kind of smart machine based on combination key, cryptographic key distribution method |
CN107733654B (en) * | 2017-10-10 | 2021-02-05 | 北京虎符信息技术有限公司 | Intelligent equipment firmware updating and official user certificate distribution method based on combined key |
CN108012268A (en) * | 2017-12-08 | 2018-05-08 | 北京虎符信息技术有限公司 | A kind of mobile phone terminal SIM card and the method for safe handling App, medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113256290B (en) | Decentralized encrypted communication and transaction system | |
CN106789090A (en) | Public key infrastructure system and semi-random participating certificate endorsement method based on block chain | |
CN107248994A (en) | A kind of method for sending information, processing method and processing device | |
CN102547688B (en) | Virtual-dedicated-channel-based establishment method for high-credibility mobile security communication channel | |
CN101547095A (en) | Application service management system and management method based on digital certificate | |
CN101808142B (en) | Method and device for realizing trusted network connection through router or switch | |
CN109687965A (en) | The real name identification method of subscriber identity information in a kind of protection network | |
CN107172074A (en) | A kind of method for sending information, processing method and processing device | |
CN101960814A (en) | IP address delegation | |
CN101814991B (en) | Mutual authentication method and system based on identity | |
CN109257346A (en) | Hided transmission system based on block chain | |
CN102196423A (en) | Safety data transferring method and system | |
CN101547096B (en) | Net-meeting system and management method thereof based on digital certificate | |
CN105357186A (en) | Secondary authentication method based on out-of-band authentication and enhanced OTP (One-time Password) mechanism | |
CN113301022A (en) | Internet of things equipment identity security authentication method based on block chain and fog calculation | |
CN106603512B (en) | A kind of authentic authentication method of the Intermediate System-Intermediate System based on SDN framework | |
CN101296482A (en) | Method, base station, relay station and relay communication system implementing message authentication | |
CN1829150B (en) | Gateway identification device and method based on CPK | |
CN105162592B (en) | A kind of method and system of certification wearable device | |
CN107248997A (en) | Authentication method based on smart card under environment of multi-server | |
CN104753671A (en) | Method of interconnection among network entities, device, CYBERnet construction method and device | |
CN101299752B (en) | Method for establishing cipher protocol security based on trustful greenness | |
CN101668292B (en) | WAPI roaming access authentication method, system and access site (AS) server thereof | |
CN106060807A (en) | Message transmission method applicable to circuit domain encrypted communication | |
CN104469750A (en) | Autonomous controllable mobile internet business method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20150701 |