CN104753671A - Method of interconnection among network entities, device, CYBERnet construction method and device - Google Patents

Method of interconnection among network entities, device, CYBERnet construction method and device Download PDF

Info

Publication number
CN104753671A
CN104753671A CN201310741138.2A CN201310741138A CN104753671A CN 104753671 A CN104753671 A CN 104753671A CN 201310741138 A CN201310741138 A CN 201310741138A CN 104753671 A CN104753671 A CN 104753671A
Authority
CN
China
Prior art keywords
data
entity
network
identification
card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310741138.2A
Other languages
Chinese (zh)
Inventor
南相浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dongfang Information Technology Research Institute (beijing) Co Ltd
Original Assignee
Dongfang Information Technology Research Institute (beijing) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dongfang Information Technology Research Institute (beijing) Co Ltd filed Critical Dongfang Information Technology Research Institute (beijing) Co Ltd
Priority to CN201310741138.2A priority Critical patent/CN104753671A/en
Publication of CN104753671A publication Critical patent/CN104753671A/en
Pending legal-status Critical Current

Links

Abstract

The invention discloses a method of interconnection among network entities, a device, a CYBERnet construction method and a device. The interconnection method comprises steps: before data sending, a communication sender generates an identifier signature, and an entity identifier is promoted to have provability; a data signature is also generated, and data are provided to have provability; a receiver verifies validity of the sender according to the received identifier signature, whether the communication is received is judged according to a verification result, first autonomous control is realized, authenticity and integrity of the data are verified according to the received data signature, whether the data are processed is judged according to the verification result, and second autonomous control is realized. The CYBERnet is realized on the basis of the prior network in the interconnection method, and a CPK card is used for providing an autonomous controllable judging basis for the interconnection method.

Description

The construction method of interconnected method and device and Internet and device between network entity
Technical field
The present invention relates to technical field of the computer network, specifically, relate to construction method and the device of communication initiation between a kind of independently controlled network entity and receiving method and device and Internet (CYBERnet).
Background technology
Network grows up from communication network, such as telecommunication network.In telecommunication network, network realizes network with circuit switched and connects, so its fail safe is higher, but also just because of the network of telecommunication network realizes network connection with circuit switched, therefore, the network of telecommunication network has certain limitation, and it can only realize local area network (LAN).Subsequently, along with the development of science and technology and the demand of network, people develop and have occurred IP network, in an ip network, network realizes network with packet system to connect, thus got through the boundary of local area network (LAN), solve the confinement problems that telecommunication network exists, constitute the internet of connection to global networks.But although existing internet has the performance of connection to global networks, it is only provided in the service of interconnecting between any IP address, but can not provide the service demonstrate,proved mutually and recognize each other.Cause the trouble waters of network thus, injure the existence of internet.
Be only provided in the service of interconnecting between any IP address for internet existing in correlation technique, the service demonstrate,proved mutually and recognize each other but can not be provided, cause the problem that fail safe is lower, not yet propose effective solution at present.
Summary of the invention
The service of interconnecting between any IP address is only provided in for internet existing in correlation technique, the service demonstrate,proved mutually and recognize each other but can not be provided, cause the problem that fail safe is lower, the present invention proposes construction method and the device of communication initiation between a kind of independently controlled network entity and receiving method and device and Internet (CYBERnet), can provide between any entity identification and carry out demonstrate,proving the connection recognized each other mutually, and then expand network size, and effectively raise the fail safe of network, but also the fatal deficiency that the internet of compensate for over does not provide IP address to prove and produces.
Technical scheme of the present invention is achieved in that
According to an aspect of the present invention, provide the communication initiating method between a kind of independently controlled network entity, wherein, there is in network entity Conbined public or double key CPK card, and there is in CPK card entity identification and pre-configured private key.
Communication initiating method between this independently controlled network entity comprises:
Before data transmission, transmit leg, by CPK card, provides entity identification to network side, and according to private key, to entity identification, generating identification is signed, and has to impel the entity identification provided to network side the property demonstrate,proved;
Further, transmit leg, also by the private key in CPK card, to the data that will send, generates data signature, has to impel the data that will send to network side the property demonstrate,proved;
Identification signature, data signature and data are sent to recipient by transmit leg.
Wherein, the entity identification that network entity is corresponding has uniqueness.
Further, the type of the entity identification corresponding to network entity of different network type is identical or different.
According to a further aspect in the invention, provide the communication apparatus for initiating between a kind of independently controlled network entity, wherein, there is in network entity Conbined public or double key CPK card, and there is in CPK card entity identification and pre-configured private key.
Communication apparatus for initiating between this independently controlled network entity comprises:
First signature blocks, for before data transmission, by CPK card, provides entity identification to network side, and according to private key, to entity identification, generating identification is signed, and has to impel the entity identification provided to network side the property demonstrate,proved;
Second signature blocks, for by the private key in CPK, to the data that will send, generates data signature, has to impel the data that will send to network side the property demonstrate,proved;
Sending module, for being sent to recipient by identification signature, data signature and data.
Wherein, the entity identification that network entity is corresponding has uniqueness.
Further, the type of the entity identification corresponding to network entity of different network type is identical or different.
According to another aspect of the invention, provide the communication receiving method between a kind of independently controlled network entity, wherein, there is in network entity Conbined public or double key CPK card, and there is in CPK card entity identification and pre-configured private key.
Communication receiving method between this independently controlled network entity comprises:
Recipient receives identification signature and the data signature of transmit leg transmission;
Recipient, according to the identification signature received, verifies the legitimacy of transmit leg, and when the result be transmit leg is legal, receives the data that transmit leg sends;
Recipient, according to the data signature received, verifies the integrality of data and authenticity, and when data are by checking, allows the data to receiving to process.
In addition, the communication receiving method between this independently controlled network entity also comprises: when described the result be described transmit leg is illegal, described recipient rejects described data.
Wherein, the entity identification that network entity is corresponding has uniqueness.
Further, the type of the entity identification corresponding to network entity of different network type is identical or different.
In accordance with a further aspect of the present invention, provide the communication receiving device between a kind of independently controlled network entity, wherein, there is in network entity Conbined public or double key CPK card, and there is in CPK card entity identification and pre-configured private key.
Communication receiving device between this independently controlled network entity comprises:
Receiver module, for receiving identification signature and the data signature of transmit leg transmission;
First authentication module, for according to the described identification signature received, verifies the legal information of described transmit leg, and when the result be described transmit leg is legal, receives the data that described transmit leg sends;
Second authentication module, for according to the data signature received, verifies the integrality of data and authenticity, and when data are by checking, allows the data to receiving to process.
In addition, the first authentication module is also for be transmit leg at the result being illegal, rejection data.
Wherein, the entity identification that network entity is corresponding has uniqueness.
Further, the type of the entity identification corresponding to network entity of different network type is identical or different.
According to another aspect of the invention, provide the construction method of a kind of independently controlled CYBERnet, the communication initiating method between the construction method of this independently controlled CYBERnet comprises by above-mentioned network entity and the communication receiving method between network entity are by multiple network synthesis CYBERnet.
In accordance with a further aspect of the present invention, provide the construction device of a kind of independently controlled CYBERnet, the construction device of this independently controlled CYBERnet comprises the communication receiving device between communicator between above-mentioned network entity and network entity.
The present invention provides entity identification by transmit leg, and by CPK card for entity identification is signed, then identification signature is sent to recipient, recipient is impelled to verify according to the legitimacy of this signature to transmit leg, thus ensure that to only have legal transmit leg could communicate to connect with recipient, achieve the autonomous controllable function of network, effectively raise the fail safe of network, stop illegal access.
In addition, the present invention also needs the data sent to sign by CPK card to transmit leg, making recipient when receiving data, can verify, thus effectively raise the fail safe of data according to the authenticity and integrity of this signature to data.
In addition, the present invention is also by when the mutual card of the entity identification tolerating identical type is recognized each other, the mutual card of compatible dissimilar entity identification is recognized each other, thus make the present invention can either realize the interconnected of identical type network, the interconnected of dissimilar network can be realized again, and then achieve the effect expanding network size.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 be according to the independently controlled network entity of the embodiment of the present invention between the schematic flow sheet of communication initiating method;
Fig. 2 be according to the independently controlled network entity of the embodiment of the present invention between the schematic flow sheet of communication receiving method;
Fig. 3 is the structural representation comprising the CYBERnet of mobile telephone network according to the embodiment of the present invention;
Fig. 4 is the schematic flow sheet of key application according to the CPK card of the embodiment of the present invention and granting;
Fig. 5 be according to the independently controlled network entity of the embodiment of the present invention between the structural representation of communication apparatus for initiating;
Fig. 6 be according to the independently controlled network entity of the embodiment of the present invention between the structural representation of communication receiving device.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, the every other embodiment that those of ordinary skill in the art obtain, all belongs to the scope of protection of the invention.
According to embodiments of the invention, provide the communication initiating method between a kind of independently controlled network entity, wherein, there is in network entity Conbined public or double key CPK card, and there is in CPK card entity identification and pre-configured private key.
As shown in Figure 1, comprise according to the communication initiating method between the independently controlled network entity of the embodiment of the present invention:
Step S101, before data transmission, transmit leg, by CPK card, provides entity identification to network side, and according to private key, to entity identification, generating identification is signed, and has to impel the entity identification provided to network side the property demonstrate,proved;
Step S103, transmit leg also by the private key in CPK card, to the data that will send, generate data signature, with impel to will network side send data there is the property demonstrate,proved;
Step S105, identification signature, data signature and data are sent to recipient by transmit leg.
Wherein, the entity identification that network entity is corresponding has uniqueness.
Further, the type of the entity identification corresponding to network entity of different network type is identical or different.
According to embodiments of the invention, provide the communication receiving method between a kind of independently controlled network entity, wherein, there is in network entity Conbined public or double key CPK card, and there is in CPK card entity identification and pre-configured private key.
As shown in Figure 2, comprise according to the communication receiving method between the independently controlled network entity of the embodiment of the present invention:
Step S201, recipient receives identification signature and the data signature of transmit leg transmission;
Step S203, recipient, according to the identification signature received, verifies the legitimacy of transmit leg, and when the result be transmit leg is legal, receives the data that transmit leg sends;
Step S205, recipient, according to the data signature received, verifies the integrality of data and authenticity, and when data are by checking, allows the data to receiving to process.
In addition, the communication receiving method between this independently controlled network entity also comprises: when described the result be described transmit leg is illegal, described recipient rejects described data.
Wherein, the entity identification that network entity is corresponding has uniqueness.
Further, the type of the entity identification corresponding to network entity of different network type is identical or different.
In such scheme, the checking of identification signature, can be recipient and the distinguishing rule whether accepting this communication is provided, realize the first independently controlled of recipient, and the checking of digital signature, then can be recipient and the distinguishing rule whether processing this secondary data is provided, realize the second independently controlled of recipient.
Be described in detail (wherein to the technical scheme in such scheme of the present invention CPK principle below, for convenience of description, with Alice representative mark, Alice can be telephone number, the user name of internet, No. ID, the Bank Account Number of antifalsification label of telephone network, also can be IP address etc.).
In above-mentioned network, each entity in network possesses CPK card, and CPK card is then made up of CPK Conbined public or double key and Truth Value Logic.CPK Conbined public or double key is the public key system based on mark, and for each entity provides private key, operation principle is as follows:
CPK card produces PKI and private key, by the generation σ of private key according to mark 1mark, the generation σ of PKI 2mark, so the private key generative process of Alice is:
HASH(Alice)→σ 1(r i,j)→alice
The PKI generative process of Alice is then:
HASH(Alice)→σ 2(R i,j)→ALICE
Wherein, due to σ 2(R i,j) be disclosed in, PKI can be calculated by anyone, and private key is then provided by CPK card, and wherein, the key management scale of CPK card is greater than 10**48.
In addition, in CPK card, the authentication protocol of CPK card comprises digital signature protocol, data encryption protocol, password replacing agreement, cryptographic key protection agreement etc.Authentication protocol realizes on Truth Value Logic basis, and Truth Value Logic provides the method for proof differentiated in advance, for realization event occur before first accomplish independently controlledly to provide distinguishing rule.
In Truth Value Logic, an entity is divided into two parts, and namely identify (identity) and body (body), formula is as follows:
entity=identity+body
Wherein, Truth Value Logic is made up of two proof procedures, and namely identify discrimination process and body discrimination process, formula is as follows:
AUTH(entity)=AUTH(ID)∩AUTH(body)
In Truth Value Logic, mark authenticity proves that AUTH (ID) is the signature of mark to preset time.
SIG alice(time)=(s 1,c 1)=sign 1
Identify the checking of authenticity then:
VER ALICE(time,s 1)=c 1
Wherein, if c 1=c 1', then prove that the Alice in this moment is true.Because mark discriminating independently can carry out before body event occurs, therefore can be described as " differentiating in advance ".
From above-mentioned, CPK card can provide mark authenticity to prove, also can verify the authenticity of mark simultaneously, therefore, when being realized the connection that the mutual card between mark is recognized each other by CPK card, transmit leg just needs the evidence providing mark authenticity, and recipient then needs the evidence verifying transmitting side marking authenticity.Idiographic flow is as follows:
Transmit leg provides the flow process of the evidence of mark authenticity as follows:
The evidence of mark authenticity is identification signature, and identification signature identifies (Alice) to the signature of time (time), that is:
SIG alice(time)=(s 1,c 1)=sign 1
Transmit leg is after the evidence with mark authenticity, and need evidence to send to recipient, the mode of transmission can be sent by the mode of message, such as:
Msg 1:Alice→Bob:{Alice,time,sign 1}
And wherein, about the form of mark authenticity proof, then comprise following content:
Show card square mark: as Alice
The signature time: as 2013.09.05.13.25.01
Show card side's signed codevector: as sign 1(signature length is no more than 3OByte)
When recipient receives the mark authenticity proof of transmit leg transmission, recipient starts to verify mark authenticity proof, and checking flow process is as follows:
VER ALICE(time,s 1)=c 1
Wherein, if c 1=c 1', then prove mark Alice(telephone number) be true, otherwise be false.
In addition, according to embodiments of the invention, additionally provide the construction method of a kind of independently controlled CYBERnet, the communication initiating method between the construction method of this independently controlled CYBERnet comprises by above-mentioned network entity and the communication receiving method between network entity are by multiple network synthesis CYBERnet.
In such scheme, due to autonomous controlled CYBERnet due to be by above-mentioned network entity between communication initiating method and network entity between communication receiving method multiple network is synthesized a network, therefore, alternatively, above-mentioned CYBERnet is on existing network basis, with CPK card build.Wherein, existing network comprises internet, mobile telephone network, Internet of Things, satellite network, anti-counterfeiting mesh etc.
Corresponding, autonomous controlled CYBERnet after above-mentioned structure is the logical network system that the mutual card between any mark can be provided to recognize each other connection, wherein, the mutual card comprised between similar mark recognizes each other connection, also the mutual card comprised between inhomogeneity mark recognizes each other connection, and wherein, the mutual card between the mark belonging to heterogeneous networks recognizes each other that to connect be CPK card realization by having distinct interface, such as, the terminal adapted CPK-Ukey card of internet; Adapted CPK-SIM card in the terminal phone of wireless network; Adapted CPK-IC card in ATM in bank, concentrates adapted CPK-NCF card etc. at false proof generic validation.In like manner, on the link layer of communication, CPK-IP realizes the proof of the IP address between Internet Router; CPK-VoIP realizes the proof of the VoIP address of wireless network.
In addition, in such scheme, autonomous controlled CYBERnet is the boundary having broken information network space and internet of things space on the basis of entity identification, constitute larger new network space, such as, comprise the information networks such as communication network, internet, mobile telephone network, satellite network, also comprise the non-information networks such as Internet of Things, anti-counterfeiting mesh, Sensor Network.
Just for the connection demonstrate,proved of mobile telephone network mobile phone, such scheme is described below.
Fig. 3 is the structural representation of the CYBERnet comprising mobile telephone network, as can be seen from Figure 3, each mobile phone is all configured with CPK card, is can be implemented between any entity identification by CPK card and set up and can demonstrate,prove connection, such as, realize between mobile telephone network and Internet of Things demonstrate,proving connection etc.
When practical application, for mobile phone, CPK card can realize in SIM card, also can realize in TF card, certainly, also according to the demand of reality, can realize in the miscellaneous part on mobile phone.
In addition, when practical application, be no matter for independent network entity between mutual card interconnect scheme, or for by this autonomous controlled CYBERnet of building of card interconnect scheme mutually, can demonstrate,prove in network development process in realization, the Private key management of CPK card is only a step of most critical.When practical application, the equipment such as KMC, secret generating machine, key application machine can be set up to realize distribution and the application of private key, wherein, KMC can be positioned over website, key application machine is then positioned over site, communication between website and site is undertaken by cryptochannel, cryptochannel is then be hidden in each CPK card, when producing chip, define UID at random just can to each chip, and allot private key, this private key is only for the cryptochannel of key distribution.
The distribution of key can be described as automatically to be carried out on the basis that CPK card has had entity identification, as the Bank Account Number in the telephone number in CPK-SIM card, CPK-IC card, Internet user's name etc. in CPK-Ukey, the application of private key is to the whole automation of distribution, without the need to human intervention, the crime possibility produced due to human intervention can be prevented like this.
Concrete, the distribution of key and the flow process of application can be as shown in Figure 4, in the diagram, the site operating personnel KMC be responsible for by being positioned over website issues site card to each site, and each site receive site card after, key application machine is opened by means of site card, and check in CPK card with or without mark, if not, the existing definition mark of follow procedure, then according to key application machine, the application form of private key for user is proposed to website by key passage, after the secret generating machine of website receives application form, generate private key, and beam back site by key passage, site is after receiving private key simultaneously, be written in the CPK card of user.
When practical application, the dominant right of the key management in above-mentioned flow process can be placed in outlet, each site can be taken into account by each outlet, the distribution of key does not change the SIM card of mobile operation site and the marketing model of bank agency IC-card, the distribution of key is solved in the lump when marketing SIM card or IC-card, do not need to manage separately, adapt to the demand of public's key management.
Corresponding, according to embodiments of the invention, additionally provide the communication apparatus for initiating between a kind of independently controlled network entity, wherein, there is in network entity Conbined public or double key CPK card, and there is in CPK card entity identification and pre-configured private key.
As shown in Figure 5, comprise according to the communication apparatus for initiating between the independently controlled network entity of the embodiment of the present invention:
First signature blocks 51, for before data transmission, by CPK card, provides entity identification to network side, and according to private key, to entity identification, generating identification is signed, and has to impel the entity identification provided to network side the property demonstrate,proved;
Second signature blocks 52, for by the private key in CPK, to the data that will send, generates data signature, to impel to the data that send of network side having the property demonstrate,proved;
Sending module 53, for being sent to recipient by identification signature, data signature and data.
Wherein, the entity identification that network entity is corresponding has uniqueness.
Further, the type of the entity identification corresponding to network entity of different network type is identical or different.
Corresponding, according to embodiments of the invention, additionally provide the communication receiving device between a kind of independently controlled network entity, wherein, there is in network entity Conbined public or double key CPK card, and there is in CPK card entity identification and pre-configured private key.
As shown in Figure 6, comprise according to the communication receiving device between the independently controlled network entity of the embodiment of the present invention:
Receiver module 61, for receiving identification signature and the data signature of transmit leg transmission;
First authentication module 62, for according to the described identification signature received, verifies the legal information of described transmit leg, and when the result be described transmit leg is legal, receives the data that described transmit leg sends;
Second authentication module 63, for according to the data signature received, verifies the integrality of data and authenticity, and when data are by checking, allows the data to receiving to process.
In addition, the first authentication module 61 is also for be transmit leg at the result being illegal, rejection data.
Wherein, the entity identification that network entity is corresponding has uniqueness.
Further, the type of the entity identification corresponding to network entity of different network type is identical or different.
Corresponding, according to embodiments of the invention, additionally provide the construction device of a kind of independently controlled CYBERnet, the construction device of this independently controlled CYBERnet comprises the communication receiving device between communicator between above-mentioned network entity and network entity.
In sum, by means of technique scheme of the present invention, entity identification is provided by transmit leg, and by CPK card for entity identification is signed, then identification signature is sent to recipient, impel recipient to verify according to the legitimacy of this signature to transmit leg, thus ensure that to only have legal transmit leg could communicate to connect with recipient, achieve the autonomous controllable function of network, effectively raise the fail safe of network, stop illegal access.
In addition, the present invention also needs the data sent to sign by CPK card to transmit leg, making recipient when receiving data, can verify, thus effectively raise the fail safe of data according to the authenticity and integrity of this signature to data.
In addition, the present invention is also by when the mutual card of the entity identification tolerating identical type is recognized each other, the mutual card of compatible dissimilar entity identification is recognized each other, thus make the present invention can either realize the interconnected of identical type network, the interconnected of dissimilar network can be realized again, and then achieve the effect expanding network size.
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (16)

1. the communication initiating method between autonomous controlled network entity, is characterized in that, has Conbined public or double key CPK card in described network entity, and has entity identification and pre-configured private key in described CPK card; Described communication initiating method comprises:
Before data transmission, transmit leg, by described CPK card, provides described entity identification to network side, and according to described private key, to described entity identification, generating identification is signed, and has to impel the described entity identification provided to network side the property demonstrate,proved;
Further, described transmit leg, also by the private key in described CPK card, to the data that will send, generates data signature, has to impel the data that will send to network side the property demonstrate,proved;
Described identification signature, described data signature and described data are sent to recipient by described transmit leg.
2. communication initiating method according to claim 1, is characterized in that, the entity identification that described network entity is corresponding has uniqueness.
3. communication initiating method according to claim 1, is characterized in that, the type of the entity identification corresponding to the network entity of different network type is identical or different.
4. the communication apparatus for initiating between autonomous controlled network entity, is characterized in that, has Conbined public or double key CPK card in described network entity, and has entity identification and pre-configured private key in described CPK card; Described communication apparatus for initiating comprises:
First signature blocks, for before data transmission, by described CPK card, provides described entity identification to network side, and according to described private key, to described entity identification, generating identification is signed, and has to impel the described entity identification provided to network side the property demonstrate,proved;
Second signature blocks, for by the private key in described CPK, to the data that will send, generates data signature, has to impel the data that will send to network side the property demonstrate,proved;
Sending module, for being sent to recipient by described identification signature, described data signature and described data.
5. communication apparatus for initiating according to claim 4, is characterized in that, the entity identification that described network entity is corresponding has uniqueness.
6. communication apparatus for initiating according to claim 4, is characterized in that, the type of the entity identification corresponding to the network entity of different network type is identical or different.
7. the communication receiving method between autonomous controlled network entity, is characterized in that, has Conbined public or double key CPK card in described network entity, and has entity identification and pre-configured private key in described CPK card; Described communication receiving method comprises:
Recipient receives identification signature and the data signature of transmit leg transmission;
Described recipient, according to the described identification signature received, verifies the legitimacy of described transmit leg, and when the result be described transmit leg is legal, receives the data that described transmit leg sends;
Described recipient, according to the described data signature received, verifies the integrality of described data and authenticity, and when described data are by checking, allows the described data to receiving to process.
8. communication receiving method according to claim 7, is characterized in that, comprise further:
When described the result be described transmit leg is illegal, described recipient rejects described data.
9. the communication receiving method according to claim 7 or 8, is characterized in that, the entity identification that described network entity is corresponding has uniqueness.
10. the communication receiving method according to claim 7 or 8, is characterized in that, the type of the entity identification corresponding to the network entity of different network type is identical or different.
Communication receiving device between 11. 1 kinds of autonomous controlled network entities, is characterized in that, has Conbined public or double key CPK card in described network entity, and has entity identification and pre-configured private key in described CPK card; Described communication receiving device comprises:
Receiver module, for receiving identification signature and the data signature of transmit leg transmission;
First authentication module, for according to the described identification signature received, verifies the legal information of described transmit leg, and when the result be described transmit leg is legal, receives the data that described transmit leg sends;
Second authentication module, for according to the described data signature received, verifies the integrality of described data and authenticity, and when described data are by checking, allows the described data to receiving to process.
12. communication receiving devices according to claim 11, is characterized in that, described first authentication module is also for be described transmit leg at described the result being illegal, reject described data.
13. communication receiving devices according to claim 11 or 12, it is characterized in that, the entity identification that described network entity is corresponding has uniqueness.
14. communication receiving devices according to claim 11 or 12, it is characterized in that, the type of the entity identification corresponding to the network entity of different network type is identical or different.
The construction method of 15. 1 kinds of autonomous controlled Internet CYBERnet, it is characterized in that, comprising: by the communication receiving method between the network entity in the communication initiating method between the network entity in claims 1 to 3 described in any one and claim 7 to 10 described in any one, multiple group of networks is synthesized described CYBERnet.
The construction device of 16. 1 kinds of autonomous controlled Internet CYBERnet, it is characterized in that, comprising: the communication receiving device between the network entity in the communication apparatus for initiating between the network entity in claim 4 to 6 described in any one and claim 11 to 14 described in any one.
CN201310741138.2A 2013-12-27 2013-12-27 Method of interconnection among network entities, device, CYBERnet construction method and device Pending CN104753671A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310741138.2A CN104753671A (en) 2013-12-27 2013-12-27 Method of interconnection among network entities, device, CYBERnet construction method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310741138.2A CN104753671A (en) 2013-12-27 2013-12-27 Method of interconnection among network entities, device, CYBERnet construction method and device

Publications (1)

Publication Number Publication Date
CN104753671A true CN104753671A (en) 2015-07-01

Family

ID=53592832

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310741138.2A Pending CN104753671A (en) 2013-12-27 2013-12-27 Method of interconnection among network entities, device, CYBERnet construction method and device

Country Status (1)

Country Link
CN (1) CN104753671A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107733654A (en) * 2017-10-10 2018-02-23 北京虎符信息技术有限公司 A kind of smart machine based on combination key, cryptographic key distribution method
CN108012268A (en) * 2017-12-08 2018-05-08 北京虎符信息技术有限公司 A kind of mobile phone terminal SIM card and the method for safe handling App, medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1829150A (en) * 2006-04-10 2006-09-06 北京易恒信认证科技有限公司 Gateway identification device and method based on CPK
CN1832403A (en) * 2006-04-24 2006-09-13 北京易恒信认证科技有限公司 CPK credibility authorization system
CN1851726A (en) * 2006-06-06 2006-10-25 北京易恒信认证科技有限公司 CPK based digital copyright authentication protection system and method
CN1859091A (en) * 2006-06-06 2006-11-08 南相浩 Credible link safety verifying system and method based on CPK
CN101378315A (en) * 2007-08-27 2009-03-04 华为技术有限公司 Method, system, equipment and server for packet authentication
CN101488853A (en) * 2009-01-15 2009-07-22 赵建国 Cross-certification method based on seed key management
CN101594229A (en) * 2009-06-30 2009-12-02 华南理工大学 A kind of trusted network connection system and method based on combined public key
CN104065558A (en) * 2013-03-20 2014-09-24 东方斯泰克信息技术研究院(北京)有限公司 Sending and accepting methods and sending and accepting devices for email
CN104469750A (en) * 2013-09-13 2015-03-25 东方斯泰克信息技术研究院(北京)有限公司 Autonomous controllable mobile internet business method and device

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1829150A (en) * 2006-04-10 2006-09-06 北京易恒信认证科技有限公司 Gateway identification device and method based on CPK
CN1832403A (en) * 2006-04-24 2006-09-13 北京易恒信认证科技有限公司 CPK credibility authorization system
CN1851726A (en) * 2006-06-06 2006-10-25 北京易恒信认证科技有限公司 CPK based digital copyright authentication protection system and method
CN1859091A (en) * 2006-06-06 2006-11-08 南相浩 Credible link safety verifying system and method based on CPK
CN101378315A (en) * 2007-08-27 2009-03-04 华为技术有限公司 Method, system, equipment and server for packet authentication
CN101488853A (en) * 2009-01-15 2009-07-22 赵建国 Cross-certification method based on seed key management
CN101594229A (en) * 2009-06-30 2009-12-02 华南理工大学 A kind of trusted network connection system and method based on combined public key
CN104065558A (en) * 2013-03-20 2014-09-24 东方斯泰克信息技术研究院(北京)有限公司 Sending and accepting methods and sending and accepting devices for email
CN104469750A (en) * 2013-09-13 2015-03-25 东方斯泰克信息技术研究院(北京)有限公司 Autonomous controllable mobile internet business method and device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107733654A (en) * 2017-10-10 2018-02-23 北京虎符信息技术有限公司 A kind of smart machine based on combination key, cryptographic key distribution method
CN107733654B (en) * 2017-10-10 2021-02-05 北京虎符信息技术有限公司 Intelligent equipment firmware updating and official user certificate distribution method based on combined key
CN108012268A (en) * 2017-12-08 2018-05-08 北京虎符信息技术有限公司 A kind of mobile phone terminal SIM card and the method for safe handling App, medium

Similar Documents

Publication Publication Date Title
CN113256290B (en) Decentralized encrypted communication and transaction system
CN106789090A (en) Public key infrastructure system and semi-random participating certificate endorsement method based on block chain
CN107248994A (en) A kind of method for sending information, processing method and processing device
CN102547688B (en) Virtual-dedicated-channel-based establishment method for high-credibility mobile security communication channel
CN101547095A (en) Application service management system and management method based on digital certificate
CN101808142B (en) Method and device for realizing trusted network connection through router or switch
CN109687965A (en) The real name identification method of subscriber identity information in a kind of protection network
CN107172074A (en) A kind of method for sending information, processing method and processing device
CN101960814A (en) IP address delegation
CN101814991B (en) Mutual authentication method and system based on identity
CN109257346A (en) Hided transmission system based on block chain
CN102196423A (en) Safety data transferring method and system
CN101547096B (en) Net-meeting system and management method thereof based on digital certificate
CN105357186A (en) Secondary authentication method based on out-of-band authentication and enhanced OTP (One-time Password) mechanism
CN113301022A (en) Internet of things equipment identity security authentication method based on block chain and fog calculation
CN106603512B (en) A kind of authentic authentication method of the Intermediate System-Intermediate System based on SDN framework
CN101296482A (en) Method, base station, relay station and relay communication system implementing message authentication
CN1829150B (en) Gateway identification device and method based on CPK
CN105162592B (en) A kind of method and system of certification wearable device
CN107248997A (en) Authentication method based on smart card under environment of multi-server
CN104753671A (en) Method of interconnection among network entities, device, CYBERnet construction method and device
CN101299752B (en) Method for establishing cipher protocol security based on trustful greenness
CN101668292B (en) WAPI roaming access authentication method, system and access site (AS) server thereof
CN106060807A (en) Message transmission method applicable to circuit domain encrypted communication
CN104469750A (en) Autonomous controllable mobile internet business method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20150701