CN105554744A - Safety protection method for positioning node - Google Patents

Safety protection method for positioning node Download PDF

Info

Publication number
CN105554744A
CN105554744A CN201510936258.7A CN201510936258A CN105554744A CN 105554744 A CN105554744 A CN 105554744A CN 201510936258 A CN201510936258 A CN 201510936258A CN 105554744 A CN105554744 A CN 105554744A
Authority
CN
China
Prior art keywords
secret key
identifier
location node
key1
random secret
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510936258.7A
Other languages
Chinese (zh)
Other versions
CN105554744B (en
Inventor
袁协
张宇
谢飞鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SUZHOU SEEKOY ELECTRONIC TECHNOLOGY Co Ltd
Original Assignee
SUZHOU SEEKOY ELECTRONIC TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SUZHOU SEEKOY ELECTRONIC TECHNOLOGY Co Ltd filed Critical SUZHOU SEEKOY ELECTRONIC TECHNOLOGY Co Ltd
Priority to CN201510936258.7A priority Critical patent/CN105554744B/en
Publication of CN105554744A publication Critical patent/CN105554744A/en
Application granted granted Critical
Publication of CN105554744B publication Critical patent/CN105554744B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Position Fixing By Use Of Radio Waves (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a safety protection method for a positioning node. The safety protection method comprises the following steps: intercepting N digits of broadcast data of the positioning node to serve as a random key, and marking the random key as a key1, wherein the random key1 varies in real time, and the digits are generated randomly once the random key1 varies; calculating a real ID number of the positioning node and the random key1 according to a preset rule to obtain an encrypted ID number; and broadcasting the encrypted ID number and the random key1 in the broadcast data. Through adoption of the safety protection method for the positioning node, an ID of the node varies continuously, so that the ID of the node is prevented from being counterfeited and used without permission. Moreover, an accurate time synchronization relationship between the positioning node and a terminal is not needed in the encryption way, so that the stability of an encryption system is enhanced, and the encryption way has a wide market prospect on the popularization of the safety protection method for the positioning node.

Description

A kind of safety protecting method of location node
Technical field
The present invention relates to electronic information field, particularly relate to a kind of safety protecting method of location node.
Background technology
Be difficult to the indoor environment covered in satellite navigation system, the demand of location-based service is day by day urgent.The time of people more than 80% is in indoor environment, and along with the development of social modernization's construction, heavy construction increasing, the demand of indoor location service just constantly increases.The fields such as security monitoring, business and personal-location services, the management of large stadium pipe, special population monitoring all need to use indoor positioning information accurately, and particularly when tackling the emergent scenes such as emergency evacuation, indoor positioning information seems particularly important especially.Along with the demand of indoor location service is day by day urgent, location-based service is just starting to be changed to indoor and outdoor seamless navigation by outdoor navigation.
China cellphone subscriber reaches 1,000,000,000, and the number of users relevant to location-based service is more than 500,000,000, and development is swift and violent.The indoor positioning market capturing cellphone subscriber becomes the hot spot for competition in location-based service.
IBeacon is the localizer beacon node that Apple releases, and mobile phone can measure iBeacon(bluetooth) receiving intensity of node, thus determine the position of oneself.Utilize iBeacon node can carry out Mobile Telephone Gps, favor information pushes, a series of services such as member's integration acquisition.And how to ensure that the fail safe of iBeacon node becomes the important ring in bluetooth positioning service.
Current beaconing nodes realizes the identification of identity by broadcast oneself No. ID, and mobile phone is positioned by the signal strength signal intensity accepting different node.No. ID of iBeacon broadcast is made up of " UUID "+" marjor "+" minor " three part.Disclosed in the agreement of iBeacon is, Android mobile phone can scan the complete id information of on-the-spot all nodes, therefore there are at least following three aspect safety applications problems, limits the universal of its application:
(1) businessman A disposes iBeacon node, position navigation, B can No. ID of scan node, and the node then utilizing A to dispose when not needing hardware to drop into positions navigation Service equally, at this moment iBeacon actual deployment side A be unwilling to see;
(2) businessman A disposes iBeacon node, carries out pushing based on favor information, and rival B can No. ID of scan node, thus counterfeit go out the node of a collection of same ID dispose at market A, cause the navigation system of businessman A to fall into chaos completely;
(3) businessman A disposes iBeacon node, carry out location-based favor information propelling movement, member's integration etc. movable (as have to shop preferential, increase integration etc. to shop).B can No. ID of scan node, thus the node of the counterfeit a collection of same ID of going out is sold, for malicious acts such as brush integrations.
Therefore, how to carry out dynamic encryption to No. ID and become the major issue ensureing that beaconing nodes is believed safely.
Summary of the invention
The technical problem that the present invention mainly solves is to provide a kind of safety protecting method of location node, by in the broadcast data of location node, intercept wherein N position as random secret key and real-time change, the ID of node is constantly changed, cannot by counterfeit and rub use, in addition, this cipher mode does not need location node and terminal to have precise time synchronized relation, make the stability of encryption system stronger, have market prospects widely the popularizing of safety protecting method of location node.
For solving the problems of the technologies described above, the invention provides a kind of safety protecting method of location node, comprising the following steps:
In the broadcast data of location node, intercept wherein N position as random secret key, be designated as key1, described random secret key key1 real-time change, during each change, digits produces at random, then carry out computing with described random secret key key1 according to preset rules by true No. ID of described location node, obtain No. ID after encrypting, in broadcast data, broadcast No. ID and random secret key key1 after encryption.
In a preferred embodiment of the present invention, the preset rules of described random secret key key1 and described true No. ID makes XOR respectively for presetting position.
In a preferred embodiment of the present invention, be provided with the secret key of user and be designated as key2, by true No. ID of described location node, described random secret key key1, the secret key key2 three of described user carry out computing according to preset rules, obtain No. ID after encrypting, in broadcast data, broadcast No. ID and random secret key key1 after encryption.
In a preferred embodiment of the present invention, described preset rules is:
(1) by described true No. ID, described random secret key key1 and the secret key key2 of described user is converted to binary sequence;
(2) everybody of described random secret key key1 and the secret key key2 of described user is carried out XOR and obtain key3;
(3) everybody of described key3 and described true No. ID is carried out XOR and obtain after encrypting No. ID.
In a preferred embodiment of the present invention, time interval Stochastic choice within the scope of prefixed time interval of the real-time change of described random secret key key1.
In a preferred embodiment of the present invention, described prefixed time interval scope comprises 1 day, 3 days, 5 days.
In a preferred embodiment of the present invention, described location node is iBeacon node, No. ID of described iBeacon node comprises UUID identifier, Major identifier and Minor identifier, described UUID identifier comprises 16 bytes, namely 128, described Major identifier comprises 2 bytes, namely 16, described Minor identifier comprises 2 bytes, namely 16.
In a preferred embodiment of the present invention, described random secret key key1 extracts some compositions respectively from described Major identifier and described Minor identifier, and the remaining bit of described Major identifier and described Minor identifier is encrypted.
In a preferred embodiment of the present invention, some positions that described random secret key key1 extracts from described Major identifier are first 6, some positions that described random secret key key1 extracts from described Minor identifier are first 4, and latter 10 of described Major identifier are encrypted with latter 12 of described Minor identifier.
In a preferred embodiment of the present invention, decrypting end is decrypted process with the described random secret key key1 received to No. ID after the described encryption received according to known deciphering rule, obtains real No. ID.
The invention has the beneficial effects as follows: the safety protecting method of location node of the present invention makes the ID of node constantly change, cannot by counterfeit and rub use, in addition, this cipher mode does not need location node and terminal to have precise time synchronized relation, make the stability of encryption system stronger, have market prospects widely the popularizing of safety protecting method of location node.
Embodiment
Be clearly and completely described to the technical scheme in the embodiment of the present invention below, obviously, described embodiment is only a part of embodiment of the present invention, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making other embodiments all obtained under creative work prerequisite, belong to the scope of protection of the invention.
The embodiment of the present invention comprises:
A safety protecting method for location node, comprises the following steps:
In the broadcast data of location node, intercept wherein N position as random secret key, be designated as key1, described random secret key key1 real-time change, during each change, digits produces at random, the ID of node is constantly changed, then computing cannot be carried out with described random secret key key1 according to preset rules by true No. ID of described location node with rubbing to use by counterfeit, obtain No. ID after encrypting, No. ID and random secret key key1 after encryption is broadcasted in broadcast data, this cipher mode does not need location node and terminal to have precise time synchronized relation, make the stability of encryption system stronger.
Preferably, the preset rules of described random secret key key1 and described true No. ID makes XOR respectively for presetting position.
Preferably, be provided with the secret key of user and be designated as key2, by true No. ID of described location node, described random secret key key1, the secret key key2 three of described user carry out computing according to preset rules, obtains No. ID after encrypting, broadcast in broadcast data No. ID after encryption with random secret key key1.
Preferably, described preset rules is:
(1) by described true No. ID, described random secret key key1 and the secret key key2 of described user is converted to binary sequence;
(2) everybody of described random secret key key1 and the secret key key2 of described user is carried out XOR and obtain key3;
(3) everybody of described key3 and described true No. ID is carried out XOR and obtain after encrypting No. ID.
Preferably, the time interval of the real-time change of described random secret key key1 Stochastic choice within the scope of prefixed time interval.
Preferably, described prefixed time interval scope comprises 1 day, 3 days, 5 days, and the ID transformation period of each node is irregular, and the difficulty that cracks of encryption system is significantly increased.
Preferably, described location node is iBeacon node, No. ID of described iBeacon node comprises UUID identifier, Major identifier and Minor identifier, described UUID identifier comprises 16 bytes, namely 128, described Major identifier comprises 2 bytes, namely 16, described Minor identifier comprises 2 bytes, namely 16.
Preferably, described random secret key key1 extracts some compositions respectively from described Major identifier and described Minor identifier, and the remaining bit of described Major identifier and described Minor identifier is encrypted.
Preferably, some positions that described random secret key key1 extracts from described Major identifier are first 6, some positions that described random secret key key1 extracts from described Minor identifier are first 4, totally 10, latter 10 of described Major identifier are encrypted totally with latter 12 (22) of described Minor identifier.
Preferably, decrypting end is decrypted process with the described random secret key key1 received to No. ID after the described encryption received according to known deciphering rule, obtains real No. ID.
The decryption method being provided with the encryption method of user's secret key key2 is: decrypting end is decrypted process according to known exposition rule, user secret key key2 and the described random secret key key1 that receives to No. ID after the described encryption received, and obtains real No. ID.
The beneficial effect of the safety protecting method of location node of the present invention is:
By in the broadcast data of location node, intercept wherein N position as random secret key and real-time change, the ID of node is constantly changed, cannot by counterfeit and rub use, in addition, this cipher mode does not need location node and terminal to have precise time synchronized relation, makes the stability of encryption system stronger.
The foregoing is only embodiments of the invention; not thereby the scope of the claims of the present invention is limited; every utilize description of the present invention to do equivalent structure or equivalent flow process conversion; or be directly or indirectly used in other relevant technical field, be all in like manner included in scope of patent protection of the present invention.

Claims (10)

1. a safety protecting method for location node, is characterized in that, comprises the following steps:
In the broadcast data of location node, intercept wherein N position as random secret key, be designated as key1, described random secret key key1 real-time change, during each change, digits produces at random, then carry out computing with described random secret key key1 according to preset rules by true No. ID of described location node, obtain No. ID after encrypting, in broadcast data, broadcast No. ID and random secret key key1 after encryption.
2. the safety protecting method of location node according to claim 1, is characterized in that, the preset rules of described random secret key key1 and described true No. ID makes XOR respectively for presetting position.
3. the safety protecting method of location node according to claim 1, it is characterized in that, be provided with the secret key of user and be designated as key2, by true No. ID of described location node, described random secret key key1, the secret key key2 three of described user carry out computing according to preset rules, obtain No. ID after encrypting, in broadcast data, broadcast No. ID and random secret key key1 after encryption.
4. the safety protecting method of location node according to claim 3, is characterized in that, described preset rules is:
(1) by described true No. ID, described random secret key key1 and the secret key key2 of described user is converted to binary sequence;
(2) everybody of described random secret key key1 and the secret key key2 of described user is carried out XOR and obtain key3;
(3) everybody of described key3 and described true No. ID is carried out XOR and obtain after encrypting No. ID.
5. the safety protecting method of location node according to claim 1, is characterized in that, time interval Stochastic choice within the scope of prefixed time interval of the real-time change of described random secret key key1.
6. the safety protecting method of location node according to claim 5, is characterized in that, described prefixed time interval scope comprises 1 day, 3 days, 5 days.
7. the safety protecting method of location node according to claim 1, it is characterized in that, described location node is iBeacon node, No. ID of described iBeacon node comprises UUID identifier, Major identifier and Minor identifier, and described UUID identifier comprises 16 bytes, namely 128, described Major identifier comprises 2 bytes, namely 16, described Minor identifier comprises 2 bytes, namely 16.
8. the safety protecting method of location node according to claim 7, it is characterized in that, described random secret key key1 extracts some compositions respectively from described Major identifier and described Minor identifier, and the remaining bit of described Major identifier and described Minor identifier is encrypted.
9. the safety protecting method of location node according to claim 8, it is characterized in that, some positions that described random secret key key1 extracts from described Major identifier are first 6, some positions that described random secret key key1 extracts from described Minor identifier are first 4, and latter 10 of described Major identifier are encrypted with latter 12 of described Minor identifier.
10. the safety protecting method of location node according to claim 1, it is characterized in that, decrypting end is decrypted process with the described random secret key key1 received to No. ID after the described encryption received according to known deciphering rule, obtains real No. ID.
CN201510936258.7A 2015-12-16 2015-12-16 A kind of safety protecting method of positioning node Active CN105554744B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510936258.7A CN105554744B (en) 2015-12-16 2015-12-16 A kind of safety protecting method of positioning node

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510936258.7A CN105554744B (en) 2015-12-16 2015-12-16 A kind of safety protecting method of positioning node

Publications (2)

Publication Number Publication Date
CN105554744A true CN105554744A (en) 2016-05-04
CN105554744B CN105554744B (en) 2019-04-09

Family

ID=55833631

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510936258.7A Active CN105554744B (en) 2015-12-16 2015-12-16 A kind of safety protecting method of positioning node

Country Status (1)

Country Link
CN (1) CN105554744B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106056867A (en) * 2016-06-30 2016-10-26 北京奇虎科技有限公司 Monitoring method and apparatus
CN106407794A (en) * 2016-11-16 2017-02-15 杭州微飞胜科技有限公司 Method for preventing beaconing devices from being forged or copied
CN111342916A (en) * 2020-04-13 2020-06-26 北京智源人工智能研究院 Personnel management and control method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103326853A (en) * 2012-03-22 2013-09-25 中兴通讯股份有限公司 Method and device for upgrading secret key
CN103929297A (en) * 2014-04-17 2014-07-16 福建联迪商用设备有限公司 Communication method, encryption method and device for POS and mobile terminal and POS
WO2014121294A1 (en) * 2013-02-04 2014-08-07 Shopkick, Inc. Presence detection using bluetooth and hybrid-mode transmitters
CN104980918A (en) * 2014-04-04 2015-10-14 阿里巴巴集团控股有限公司 Beacon data transmission method, beacon data transmission device, method of providing service based on beacon and device of providing service based on beacon

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103326853A (en) * 2012-03-22 2013-09-25 中兴通讯股份有限公司 Method and device for upgrading secret key
WO2014121294A1 (en) * 2013-02-04 2014-08-07 Shopkick, Inc. Presence detection using bluetooth and hybrid-mode transmitters
CN104980918A (en) * 2014-04-04 2015-10-14 阿里巴巴集团控股有限公司 Beacon data transmission method, beacon data transmission device, method of providing service based on beacon and device of providing service based on beacon
CN103929297A (en) * 2014-04-17 2014-07-16 福建联迪商用设备有限公司 Communication method, encryption method and device for POS and mobile terminal and POS

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106056867A (en) * 2016-06-30 2016-10-26 北京奇虎科技有限公司 Monitoring method and apparatus
CN106407794A (en) * 2016-11-16 2017-02-15 杭州微飞胜科技有限公司 Method for preventing beaconing devices from being forged or copied
CN106407794B (en) * 2016-11-16 2019-04-02 杭州微飞胜科技有限公司 A method of prevent beacon equipment to be forged or replicate
CN111342916A (en) * 2020-04-13 2020-06-26 北京智源人工智能研究院 Personnel management and control method and system

Also Published As

Publication number Publication date
CN105554744B (en) 2019-04-09

Similar Documents

Publication Publication Date Title
CA2887761C (en) Systems and methods of ambiguity envelope encryption scheme and applications
CN104202295B (en) Security protection system and its implementation based on beaconing nodes
Xiao et al. Proximity-based security techniques for mobile users in wireless networks
CN100488305C (en) Method of network access indentifying and authorizing and method of updating authorizing key
CN105100112B (en) RFID cluster label ownership transfer methods based on cloud storage
Choudhury et al. Enhancing user identity privacy in LTE
CN102026178B (en) User identity protection method based on public-key mechanism
CN103618995A (en) Position privacy protection method based on dynamic pseudonyms
CN101800943B (en) Multicasting key negotiation method and system suitable for group calling system
CN105554744A (en) Safety protection method for positioning node
CN101228766A (en) Exchange of key material
CN104871579A (en) Security management method and apparatus for group communication in mobile communication system
CN103037306A (en) Privacy protection method based on location service in scene of Internet of Things (IOT)
CN101917272A (en) Secret communication method and system among neighboring user terminals
CN101299888B (en) Cryptographic key generation method, switching method, mobile management entity and customer equipment
CN105142136A (en) Method for preventing counterfeit base attack
CN102045716A (en) Method and system for safe configuration of station (STA) in wireless local area network (WLAN)
CO2021015669A2 (en) Handling multiple authentication procedures in 5g
Zidek et al. Bellrock: Anonymous proximity beacons from personal devices
CN105407479A (en) Information recognition method, information gateway, SIM card, and system
Muthana et al. Analysis of user identity privacy in LTE and proposed solution
CN104243153A (en) Method for spotting equipment user, and user equipment
Ghafghazi et al. Enhancing the privacy of LTE-based public safety networks
CN204180276U (en) A kind of location node with encryption function
CN103200563A (en) Subliminal channel hiding communication method based on authentication code

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant