CN107104798A - A kind of information transmitting methods verified based on connectionless communication - Google Patents

A kind of information transmitting methods verified based on connectionless communication Download PDF

Info

Publication number
CN107104798A
CN107104798A CN201710381797.8A CN201710381797A CN107104798A CN 107104798 A CN107104798 A CN 107104798A CN 201710381797 A CN201710381797 A CN 201710381797A CN 107104798 A CN107104798 A CN 107104798A
Authority
CN
China
Prior art keywords
message
checking
key
location
trustworthy location
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710381797.8A
Other languages
Chinese (zh)
Other versions
CN107104798B (en
Inventor
郭铮铮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guo Zhengzheng
Original Assignee
Beijing Dongshi Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Dongshi Technology Co Ltd filed Critical Beijing Dongshi Technology Co Ltd
Publication of CN107104798A publication Critical patent/CN107104798A/en
Application granted granted Critical
Publication of CN107104798B publication Critical patent/CN107104798B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of information transfer system verified based on connectionless communication, the system includes the first equipment, security authentication services end, ustomer premises access equipment and application service end, wherein, first equipment verifies message for producing trustworthy location checking message, and sending the trustworthy location by way of connectionless communication;The user equipment is used to receive the trustworthy location checking message that the first equipment is sent, and user equipment is produced is sent to security authentication services end by first position checking message;The security authentication services end is used to receive first position checking message, extracts the trustworthy location checking message that message includes, verifies the trustworthy location signature of the trustworthy location checking message;The application service end is used for the 3rd location verification message for receiving the transmission of security service end, extracts and verifies that message is verified in first position, if the verification passes, and application service end just pushes correspondence response and follow-up service to corresponding ustomer premises access equipment.

Description

A kind of information transmitting methods verified based on connectionless communication
Technical field
The present invention relates to computer information technology field, more particularly to a kind of information transmission verified based on connectionless communication Method.
Background technology
For a certain FX in practicality, in order to allow into region device authentication and know between current spatial Relation on attributes is closed on, such as whether shop or position to have approached Delegation management, the checking can not be forged, it is necessary to one Effective supplement is realized to be verified for the secure access based on checking approximated position.GPS information is disclosed information, living in business It can be used for pushed information when being used in dynamic, but because can forge, cannot be used for verifying the space bit residing for equipment Whether be non-repudiation, so cannot also be used to verify in real life if putting.Also have at present and be based on WIFI, bluetooth is determined Position technology, the wireless signal that these technologies are used can be used for pushing, but there is also the scene being forged, such as forge WIFI SSID, or forge bluetooth equipment ID.Therefore for verify current approximated position so as to obtain information whether be authorize power Lack false proof security capabilities in the application scenarios that prestige is sent.
In addition in practicality, people need conveniently to obtain information at the scene, if obtained every time for verifying position Put relation information data obtain will be connected with the communication node network verification password for the object being verified if, will Increase the step of user's input password and operation, it is therefore desirable to one kind can by convenient checking in the case of connectionless communication and The method for obtaining information;This network access connection after password authentification with WIFI equipment such as by communicating or being tested by man-machine interface The complicated connection-oriented communication of communication, etc. can not all reach the facility of connectionless communication after bluetooth equipment connection after card Property.
Need a kind of checking with communication equipment be closely located to relation it is whether legal without concern for specifically reality what The technology of position, so that the third party for obtaining the location verification relation information can not position the actual position of user but can To provide service by shared position recognition result, therefore it is good protection for privacy of user.User can be disclosed Verify current approximated position relation and obtain information and disclose the actual position of oneself without wanting service third party, for hidden Private is a protection well.
The content of the invention
To realize the purpose of the present invention, it is achieved using following technical scheme:
A kind of checking information Transfer Technology based on connectionless communication, including the first equipment, security service end, user terminal are set Standby and application service end.
The trustworthy location checking message includes position code, variable code, trustworthy location signature;The position code Unique correspondence first key and the second key;The first key is stored in the first equipment;Second key is stored in peace In full authentication server;The first key and second key are corresponding relations, i.e., can be tested using second key Whether card information signature is to calculate to produce using first key;Described information signature is the first equipment for including position code The trustworthy location produced is calculated using first key with the information sequence of variable code to sign;The variable code is believed for dynamic change Breath, the variable code that the trustworthy location checking message produced every time includes all is different.
The user equipment receives the trustworthy location checking message that the first equipment is sent, using being stored in user equipment In the 3rd cipher key calculation include receive the trustworthy location checking message information sequence produce information signature;Described 3rd Key and the 4th key are corresponding relations, i.e., can verify whether information signature is using the 3rd using the 4th key Cipher key calculation is produced;First position checking message includes aforementioned messages signature and the trustworthy location verifies message;In practicality, the One location verification message can also include applying identification id, and for the key of mark the 3rd and the 4th key corresponding relation should Use service key identification id;Application service key identification id can be used to inquire about the side of corresponding 4th key at application service end Method checking first position checking information signature;First checking message is sent to security authentication services end.
The security service end preserves the second key;The security service end receives first and verifies message, extracts in message Including the trustworthy location verify message, search corresponding second key using position code, use the second key authentication The trustworthy location signature of the trustworthy location checking message, if passed through, is tested it is assumed that user terminal have received believable position Information is demonstrate,proved, produces and the 3rd checking message is forwarded to application service end, the 3rd location verification message includes being used to verify The information of ustomer premises access equipment and for determine application service end to corresponding ustomer premises access equipment push response and follow-up service letter Breath;
The application service end preserves the 4th key;The application service end receives the first position of security service end forwarding Message is verified, information signature, if the verification passes, application service are verified using the 4th key authentication first corresponding with user terminal End is exactly the corresponding informance that is associated with variable code to the corresponding ustomer premises access equipment pushed information of the 4th key.
A kind of method of compressed signature length is further comprises in the present invention, when the trustworthy location verifies that the length of message surpasses When going out the transmittability of broadcast channel, the 5th key can be used to calculate message M for trustworthy location checking message, the calculating disappears The length for ceasing M is less than the length that trustworthy location is signed, and using message M replace trustworthy location verify signature produce after compression can Believe location verification message;The first equipment produces and sends second place checking message to secure verification servers simultaneously;It is described Second place checking message includes uncompressed trustworthy location and verifies message and message M;The feelings of message are verified in compression trustworthy location Under condition, after security authentication services termination receives first position checking message and second place checking message, first position is used The message M that checking message includes searches corresponding second place checking message;The 6th key is searched using position code to test Message M is demonstrate,proved, that is, extracts the uncompressed trustworthy location checking message that second place checking message includes, uses the 6th cipher key calculation Message authentication code, if the message M that the message authentication code calculated and first position checking message include is equal, checking is logical Cross, continue subsequent treatment, verify that the trustworthy location in message is signed using the second key authentication second place, after being verified, First position checking message is forwarded to application service end;If checking does not pass through, stop flow.
A kind of information transfer system verified based on connectionless communication, the system includes the first equipment, security authentication services End, ustomer premises access equipment and application service end, wherein:
First equipment is used to produce trustworthy location checking message, and it is credible to send by way of connectionless communication this Location verification message;
The user equipment is used to receive the trustworthy location checking message that the first equipment is sent, and calculating includes trusted bit Put the information sequence of checking message and produce first position checking message, first position checking message is sent to peace by user equipment Full service for checking credentials end;
The security authentication services end is used to receive first position checking message, extracts the trustworthy location that the message includes Message is verified, the trustworthy location signature of the trustworthy location checking message is verified, if the verification passes, it is assumed that user equipment connects Trustworthy location checking message is have received, then produces the 3rd location verification message and the 3rd location verification message is forwarded to using clothes Business end, the 3rd location verification message includes being used to verify that message is verified and for certainly in the first position for initiating ustomer premises access equipment Determine the position code from follow-up service to corresponding ustomer premises access equipment and variable code information that application service end pushes response and;
The application service end is used for the 3rd location verification message for receiving the forwarding of security authentication services end, extracts and verifies Message is verified in first position, if the verification passes, and application service end is just pushed and the 3rd location verification message to ustomer premises access equipment Corresponding response and follow-up service.
Described system, wherein:The trustworthy location checking message includes trustworthy location relation information and trustworthy location label Name;When first key and the second key are unsymmetrical key, the trustworthy location relation information includes position code and can Time-varying code, the position code correspondence first key and the second key;When first key and the second key are symmetric keys, institute Stating trustworthy location relation information includes variable code, and the variable code is dynamic-change information;
The first key is stored in the first equipment;Second key is stored in security authentication services end;It is described Trustworthy location signature is that the first equipment calculates generation for the information sequence including trustworthy location relation information using first key Trustworthy location signature.
Described system, wherein:First equipment first judges whether to need to described before trustworthy location checking message is sent Trustworthy location verifies message compression;If the length of the trustworthy location checking message is more than the communication of current first device configuration The maximum of mode sends length, is judged as needing compression, is then configured to the first equipment and the information is compressed;First equipment The trustworthy location checking message after trustworthy location checking message or compression is sent in the way of connectionless communication.
Described system, wherein:When needing compression, the trustworthy location that the first equipment generates after compression as follows is tested Demonstrate,prove message and generation and send second place checking message to security service end:The compression trustworthy location checking of (1) first equipment Message, which is calculated, to be obtained message M, message M length and is less than the length that trustworthy location verifies message, and the first equipment is by generation What the trustworthy location signing messages and other information that message M replaces in trustworthy location checking message were sent up to meeting most greatly enhances Degree, the trustworthy location checking message after thus generation is compressed;(2) first equipment generate the second place checking message, second Location verification message includes the unpressed trustworthy location checking message and correspondence message M, second place checking message generation Afterwards, the first equipment sends second place checking message to secure verification servers.
Described system, wherein:The ustomer premises access equipment receives the trustworthy location checking message that the first equipment is sent Or the trustworthy location checking message after compression, the institute for including receiving using the 3rd cipher key calculation being stored in ustomer premises access equipment The information sequence for stating trustworthy location checking message produces first position checking information signature;The ustomer premises access equipment produces first Checking message is put, first position checking message includes first position and verifies that information signature and the trustworthy location received checking disappear Trustworthy location checking message after breath or compression;First position checking message is sent to security authentication services by ustomer premises access equipment End.
Described system, wherein:The second key is preserved at security authentication services end and the position corresponding to the second key is known Other code, the trustworthy location checking message that the security authentication services end checking first position checking message includes:Do not pressing In the case of contracting trustworthy location checking message, the security service end receives first position checking message, and extracting message includes The trustworthy location checking message, in the case where first key and the second key are unsymmetrical key, use trustworthy location Verify that the position code in message searches corresponding second key, message is verified using trustworthy location described in the second key authentication Trustworthy location signature, if passed through, it is assumed that ustomer premises access equipment have received trustworthy location checking message, then security service end First position checking message is included sending in the 3rd location verification message to application service end, checking does not pass through then termination Reason;In the case where first key and the second key are symmetric key, using the trustworthy location verify message include can Believe that position signature query safe service for checking credentials end is signed with the presence or absence of same trustworthy location, calculating this if there is just checking can The variable code that letter position signature is used verifies whether the variable code that message includes is consistent with the trustworthy location, if unanimously, It is assumed that ustomer premises access equipment have received trustworthy location checking message, then just to extract corresponding second key institute right at security service end The position code answered, then security service end first position is verified that message and corresponding position code and variable code include Send to application service end, verified not by then not producing and sending the 3rd location verification message simultaneously in 3rd location verification message Termination;
Or, in the case of compressing, the second key, security authentication services are preserved in the security authentication services end Termination is received after first position checking message, and the message M that verifying message using first position includes searches corresponding second Put checking message, extract the unpressed trustworthy location checking message in the second place checking message found, using with the One equipment compression algorithm same when calculating and counterpart keys are unpressed trustworthy location checking in second place checking message Message is calculated and obtains message M1, and the message M that verifying message with first position includes is compared, if unanimously, be verified, after Continuous next step processing, otherwise, stopping processing;Continue next step processing, be unsymmetrical key in first key and the second key In the case of, extract the second place checking message in uncompressed trustworthy location checking message, using including position code look into Look for corresponding second key, and the unpressed trusted bit included using the second key authentication correspondence second place checking message The trustworthy location signature that checking message includes is put, after being verified, the position that checking message in the correspondence second place includes is extracted Identification code, variable code are put, first position is verified that message and the position code extracted and variable code are included in the 3rd position Checking message is sent to application service end, and checking is not by producing and sending the 3rd location verification message and termination; In the case that first key and the second key are symmetric key, the uncompressed trustworthy location extracted in second place checking message is tested Demonstrate,prove message, using including sign query safe service for checking credentials end of trustworthy location signed with the presence or absence of same trustworthy location, such as The variable code used during trustworthy location signature and second place checking is just calculated and there is the security authentication services end in fruit Whether the variable code that includes of trustworthy location checking message consistent in message, if unanimously, decide that be verified it is assumed that with Family termination have received trustworthy location checking message and extract the variable code that includes, and security authentication services end extracts corresponding the The corresponding position code of two keys, security authentication services end by first position verify message and extract position code and Variable code, which is included in the 3rd location verification message, to be sent to application service end, is verified not by then not producing and sending the 3rd Put checking message and termination;
The 3rd location verification message includes being used to verify the first position checking message for initiating ustomer premises access equipment and use The position code and variable code of response and follow-up service are pushed to corresponding ustomer premises access equipment in decision application service end Information.
Described system, wherein:Verify ustomer premises access equipment and carry out respective handling in application service end:The application service end Preserve the 4th key;The application service end receives the 3rd location verification message that security authentication services end is sent, and extracts bag The first position checking message included, verifies information signature, such as using the 4th key authentication first position corresponding with user equipment Fruit is verified, position code and pair of variable code association that application service end the 3rd location verification message of extraction includes Information is answered to push response and/or follow-up service to corresponding user equipment.
Described system, wherein:Position code is extracted in application service end from the 3rd location verification message, using clothes Business end is previously stored with the response message corresponding from different position codes or information on services, the content of described information also with The relating to parameters such as variable code, after first position checking information signature is verified, application service end is recognized according to the position The corresponding response message of code inquiry or information on services, and the corresponding response for determining to push to user equipment with reference to variable code And/or follow-up service.
A kind of information transmitting methods verified based on connectionless communication, are comprised the following steps:
First equipment produces trustworthy location checking message, and sends by way of connectionless communication trustworthy location checking Message;
Ustomer premises access equipment receives the trustworthy location checking message that the first equipment is sent, and calculating includes trustworthy location checking The information sequence of message simultaneously produces first position checking message, and first position checking message is sent to safety and tested by ustomer premises access equipment Demonstrate,prove service end;
Security authentication services end receives first position checking message, and the trustworthy location checking that extracting the message includes disappears Breath, verifies the trustworthy location signature of trustworthy location checking message, if passed through, it is assumed that have received can for ustomer premises access equipment Believe location verification message, then produce and the 3rd location verification message is forwarded to application service end, the 3rd location verification disappears Breath includes being used to verify the first position checking message for initiating ustomer premises access equipment and for determining that application service end is used to corresponding Family end equipment pushes the position code and variable code information of response and follow-up service;
Application service end receives the 3rd location verification message that security authentication services end is sent, and extracts first position checking and disappears Breath, checking first position checking message, if the verification passes, application service end just pushes the 3rd location verification to ustomer premises access equipment The corresponding response of message and follow-up service.
Described method, wherein:The trustworthy location checking message includes trustworthy location relation information and trustworthy location label Name;When first key and the second key are unsymmetrical key, the trustworthy location relation information includes position code and can Time-varying code, the position code correspondence first key and the second key;When first key and the second key are symmetric keys, institute Stating trustworthy location relation information includes variable code;The variable code is dynamic-change information;
The first key is stored in the first equipment;Second key is stored in security authentication services end;It is described Trustworthy location signature is that the first equipment calculates generation for the information sequence including trustworthy location relation information using first key Trustworthy location signature.
Described method, wherein:First equipment first judges whether to need to described before trustworthy location checking message is sent Trustworthy location verifies message compression;If the length of the trustworthy location checking message is more than the channel that current first equipment possesses Maximum sends length, is judged as needing compression, then the first equipment is compressed the information;First equipment is with connectionless communication Mode send trustworthy location checking message or compression after trustworthy location checking message.
Described method, wherein:When needing compression, the trustworthy location that the first equipment generates after compression as follows is tested Demonstrate,prove message and generation and send second place checking message to security service end:(1) first equipment is that trustworthy location checking disappears The length that breath compression calculating obtains message M, the message M is less than the length that trustworthy location verifies message, and the first equipment will be generated Message M replace trustworthy location checking message in trustworthy location signing messages and other parts information until meet send Maximum message length, the trustworthy location checking message after thus generation is compressed;(2) first equipment generate the second place checking Message, second place checking message includes the unpressed trustworthy location checking message and correspondence message M, second place checking After message generation, the second place is verified that message is sent to security authentication services end by the first equipment.
Described method, wherein:The ustomer premises access equipment receives the trustworthy location checking message that the first equipment is sent Or the trustworthy location checking message after compression, the institute for including receiving using the 3rd cipher key calculation being stored in ustomer premises access equipment The information sequence for stating trustworthy location checking message produces first position checking information signature;The ustomer premises access equipment produces first Checking message is put, first position checking message includes first position and verifies information signature and the trustworthy location received checking Trustworthy location checking message after message or compression;First position checking message is sent to security authentication services by ustomer premises access equipment End.
Described method, wherein:The second key is preserved at security authentication services end and the position corresponding to the second key is known Other code, the trustworthy location checking message that the security authentication services end checking first position checking message includes:Do not pressing In the case of contracting trustworthy location checking message, the security service end receives first position checking message, and extracting message includes The trustworthy location checking message, in the case where first key and the second key are unsymmetrical key, use trustworthy location Verify that the position code in message searches corresponding second key, message is verified using trustworthy location described in the second key authentication Trustworthy location signature, if the verification passes, it is assumed that user terminal have received trustworthy location checking message, then security service end Produce and send the 3rd location verification message to application service end, the 3rd location verification message is verified including first position Message, corresponding position code and variable code, checking do not pass through then termination;It is symmetrical in first key and the second key In the case of key, the trustworthy location signature query safe service for checking credentials end that verifying message using the trustworthy location includes is It is no to there is same trustworthy location signature, if there is just by checking security service end calculate the trustworthy location sign use can Whether time-varying code is consistent with the trustworthy location checking message received the variable code included, if consistent it is determined that checking is logical Cross, it is assumed that user terminal have received trustworthy location checking message, then just to extract corresponding second key institute right at security service end The position code answered, then security service end first position is verified that message and corresponding position code and variable code include Send to application service end, verified not by then not producing and sending the 3rd location verification message simultaneously in 3rd location verification message Termination;
Or, in the case of compressing, the second key, security authentication services are preserved in the security authentication services end Termination is received after first position checking message, and the message M that verifying message using first position includes searches corresponding second Checking message is put, the uncompressed trustworthy location checking message that the corresponding second place checking message found includes is extracted, The use of algorithm and counterpart keys same when compressing calculating with the first equipment is that the second place verifies unpressed credible in message Location verification message is calculated and obtains message M1, and the message M that verifying message with first position includes is compared, if unanimously, tested Card passes through, and continues next step processing, otherwise, stopping processing;When continuing next step processing, in first key and the second key right and wrong In the case of symmetric key, extract the second place checking message in uncompressed trustworthy location checking message, using including position Put identification code and search corresponding second key, and do not pressed using what the second key authentication correspondence second place checking message included Trustworthy location signature in the trustworthy location checking message of contracting, after being verified, extracts and is wrapped in correspondence second place checking message The position code that includes, variable code, verify that message and the position code extracted and variable code are included the by first position Three location verification message are sent to application service end;Checking is not by producing the 3rd location verification message and termination then; In the case where first key and the second key are symmetric key, the uncompressed trustworthy location in second place checking message is extracted Verify message, using including sign query safe service for checking credentials end of trustworthy location signed with the presence or absence of same trustworthy location, If there is the variable code and the second place used when just calculating trustworthy location signature by the security authentication services end Whether the variable code that trustworthy location checking message includes in checking message is consistent, and decision verification passes through if consistent, just recognizes Determine user terminal to have received trustworthy location checking message and extract the variable code that includes, security authentication services end extracts corresponding the The corresponding position code of two keys, security authentication services end by first position verify message and extract position code and Variable code, which is included in the 3rd location verification message, to be sent to application service end, is verified not by not producing and sending the 3rd position Verify message and termination;
The 3rd location verification message includes being used to verify the first position checking message for initiating ustomer premises access equipment and use The position code and variable code of response and follow-up service are pushed to corresponding ustomer premises access equipment in decision application service end Information.
Described system, wherein:Verify ustomer premises access equipment and carry out respective handling in application service end:The application service end Preserve the 4th key;The application service end receives the 3rd location verification message of security authentication services end forwarding, extracts bag The first position checking message included, message label are verified using the 4th key authentication first position corresponding with ustomer premises access equipment Name, if the verification passes, position code that application verification service end is just included using the 3rd location verification message and can The corresponding informance of time-varying code association pushes response and/or follow-up service to corresponding user equipment.
Described method, wherein:Application verification service end extracts obtained position from the 3rd location verification message Identification code, application verification service end is previously stored with the response message corresponding from different position codes or information on services, The content of described information also with the relating to parameters such as variable code, including first position checking information signature be verified after, should With service for checking credentials end, according to being obtained from the 3rd location verification message, position code inquires about corresponding response message or service is believed Breath, and determine with reference to variable code to the corresponding response of user equipment push and/or follow-up service.
One kind checking equipment, including:Mainframe computer system, subscriber side telecommunications module, trustworthy location checking message calculates mould Block and trustworthy location checking message compression module;Wherein:
The mainframe computer system is used to manage the first equipment, storage key and calculated;
The subscriber side telecommunications module is used to send trustworthy location checking message to ustomer premises access equipment;
The trustworthy location checking message computing module is used to calculate using first key based on trustworthy location relation information Generation trustworthy location, which is signed and produces trustworthy location, verifies message;
The trustworthy location checking message compression module is used to produce the need for the transmittability according to user side communication interface Trustworthy location checking message after raw compression.
Described equipment, wherein:The trustworthy location checking message includes trustworthy location relation information and trustworthy location label Name;When first key and the second key are unsymmetrical key, the trustworthy location relation information includes position code and can Time-varying code, the position code correspondence first key and the second key;When first key and the second key are symmetric keys, institute Stating trustworthy location relation information includes variable code;The first key is stored in the first equipment;Second key is stored in In security authentication services end;The trustworthy location signature is the first equipment for including the information sequence of trustworthy location relation information The trustworthy location produced is calculated using first key to sign.
Described equipment, wherein:Wherein position code corresponds to actual place and the device object of the first deployed with devices.
Described equipment, wherein:Trustworthy location checking message compression module is using preset algorithm and key to trusted bit Put checking message and calculate length of the length less than trustworthy location checking message for obtaining correspondence message M, the message M, trusted bit Put checking message compression module by the message M of generation replace trustworthy location signing messages in trustworthy location checking message and its He sends the channel maximum length that message allows at partial information until meeting, and realizes the compression that message is verified to trustworthy location, Trustworthy location checking message after generation compression.
Described equipment, wherein:Trustworthy location checking message compression module generation second place checking message, the second place Verify that message includes the unpressed trustworthy location checking message and correspondence message M;After second place checking message generation, the The second place is verified that message is sent to security authentication services end by one equipment.
Brief description of the drawings
Accompanying drawing described herein is used for providing a further understanding of the present invention, constitutes the part of the present invention, this hair Bright schematic description and description is used to explain the present invention, does not constitute inappropriate limitation of the present invention.In the accompanying drawings:
If Fig. 1 is for service for checking credentials schematic diagram in position in the embodiment of the present invention.
If Fig. 2 is for the first equipment schematic diagram in the embodiment of the present invention.
If Fig. 3 is for security service end schematic diagram in the embodiment of the present invention.
If Fig. 4 is for application service end schematic diagram in the embodiment of the present invention.
If Fig. 5 is for the method schematic diagram of compression trustworthy location checking message in the embodiment of the present invention.
If Fig. 6 is for service for checking credentials schematic flow sheet in position in the embodiment of the present invention.
Embodiment
The preferred embodiments of the present invention are illustrated below in conjunction with Figure of description, it will be appreciated that described herein Preferred embodiment is merely to illustrate and explain the present invention, and is not intended to limit the present invention, and in the case where not conflicting, this hair The feature in embodiment and embodiment in bright can be mutually combined.
Implement example 1;
If Fig. 1 is for a kind of checking information transmission system schematic diagram based on connectionless communication in the embodiment of the present invention. The system includes the first equipment, security authentication services end, ustomer premises access equipment and application service end.
The connectionless communication, which refers to the first equipment, to be used to send the communication mode that trustworthy location verifies message, is specially in hair Before sending the message, do not set up IP layers of communication connection in advance, but use just and sound common signal channel that communicating pair configures or Broadcast channel and physical layer frame carrying, and follow relevant communication protocol and directly transmit mode with receive information;Specifically, communication Both sides include sender of communications and communication receiver, just and sound common signal channel or broadcast that sender of communications is configured in communicating pair Relevant communication protocol is followed on channel and physical layer frame carrying and sends information, and communication receiver passes through the public affairs that are configured in communicating pair The communication party that relevant communication protocol parses carrying information is received and followed on fair common signal channel or broadcast channel and physical layer frame Formula;The broadcast channel and physical layer frame and the communication protocol regulation of relevant bearer including but not limited to generally used in radio communication Data packet format communication mode;In the WIFI radio communications for such as obeying the standards of IEEE 802.11, Beacon frame are used The SSID of transmission is exactly signified a kind of connectionless communication in the present invention, and sender of communications does not set up IP layers of communication link with recipient Connect, SSID information is directly sent in Beacon frame carryings, recipient intercepts Beacon frame and logical according to what is followed Letter protocol analysis data are so as to realize the reception of SSID information.
First equipment produces trustworthy location checking message (S101);The trustworthy location checking message includes trusted bit Put relation information, trustworthy location signature;First equipment is by connectionless communication, the Beacon broadcasted in such as WIFI radio communications Frame sends trustworthy location checking message;Or the short distance of Quick Response Code and sound wave can also be used close to the side of user equipment Formula transmission trustworthy location checking message;The SSID in the Beacon frame of WIFI broadcast can be used preferably in practicality (Service Set Identifier) field verifies message to transmit trustworthy location;
The first key is securely held in the first equipment and for recognizing the first equipment;First equipment is for bag The information sequence for including trustworthy location relation information calculates generation trustworthy location signature using first key;When first key and second When key is unsymmetrical key, the trustworthy location relation information includes position code and variable code, the position code Correspondence first key and the second key;When first key and the second key are symmetric keys, the trustworthy location relation information Including variable code;The variable code is dynamic-change information.
Position code can be marking arrangement in practicality, or infield position and space distribution identification Number;Directly place/equipment that marking arrangement is disposed can also be carried out using the identifier of equipment;The variable code is believed for dynamic change Breath, the variable code that the trustworthy location checking message produced every time includes can be different, and the variable code can be based on The fixed cycle change of time, can use the algorithm that pre-sets and it is synchronous with security service end change, can be with common portion Relevance in the multimedia equipment of administration and change;The trustworthy location checking message can be produced upon receiving a request, Can also persistently it be produced according to the fixed cycle;As variable code can use the own time of the first equipment;NTP can also be used to assist The time synchronization information obtained is discussed as variable code;Can also be and the system disposed jointly in it is consistent between other network nodes The regular dynamic-change information of negotiation;First equipment can be according to the connectionless channel for sending trustworthy location checking message Communication capacity is configured to whether verify the method and flow of message using the trustworthy location sent after compression, is specifically shown in implementation example Description in 2.
The user equipment receives the trustworthy location checking message (S102) that the first equipment is sent;Using being stored in use The 3rd cipher key calculation in the equipment of family is included before the compression that receives or trustworthy location verifies the information sequence of message after compression Row produce first position checking information signature;In practicality, optionally, user equipment can also apply application service identification id The information such as service key identification id are included in first position checking message, and wherein application service key identification id can be in application Service end is used for recognizing for verifying that the 4th key of information signature is verified in first position;First of the user equipment generation Put the trustworthy location checking message that checking message includes first position checking information signature and received;User equipment is by first position Checking message is sent to security authentication services end.
The security authentication services end preserves the second key;The security authentication services end receives first position checking message (S103) trustworthy location checking message that message includes, is extracted;Verified using trustworthy location described in the second key authentication The trustworthy location signature of message, if passed through, it is assumed that user terminal have received trustworthy location checking message, specific verification method It is described in detail, repeats no more in example 6;Verify that trustworthy location checking message passes through rear, the 3rd location verification of security service end generation Message simultaneously sends the 3rd location verification message to application service end, and the 3rd location verification message includes being used to verify initiation Ustomer premises access equipment first position checking message and for determine application service end to corresponding ustomer premises access equipment push response and The position code and variable code information of follow-up service.
The application service end preserves the 4th key;The application service end receives the 3rd position that security service end is sent Verify message (S104);Information signature is verified in the first position included using the 4th key authentication corresponding with ustomer premises access equipment, If the verification passes, the corresponding informance that application service end is just associated using the position code included with variable code is to the 4th key Corresponding ustomer premises access equipment pushes response and follow-up service;In practicality, message is verified in the first position included by verifying, can It is which user terminal with the user terminal for confirming follow-up push response and service, thus determines to push correspondence response with after The enough information of this process of continuous service.
Position code and variable code are extracted in application service end from the 3rd location verification message, and application service end is advance The response message or information on services for being stored with corresponding from different position codes, the content of described information is also with variable code etc. Relating to parameters, after first position checking information signature is verified, phase is inquired about in application service end according to the position code The response message or information on services answered, and determine with reference to variable code to the corresponding response of user equipment push and/or follow-up clothes It is engaged in (S105).
Implement example 2;
If Fig. 2 is for the first equipment schematic diagram in the embodiment of the present invention.
First equipment sends trustworthy location checking message for connectionless communication mode, can wirelessly connect in practicality Mouth broadcast channel sends trustworthy location checking message, and it is substantially a kind of equipment for providing trustworthy location checking message, including: Mainframe computer system, subscriber side telecommunications module, trustworthy location checking message computing module and trustworthy location checking message compression mould Block;The mainframe computer system is used to manage the first equipment, stores key, and calculating, decryption is encrypted and calculates;The user side Communication module is used to send trustworthy location checking message to ustomer premises access equipment;The trustworthy location checking message computing module is based on Trustworthy location relation information using first key calculate produce trustworthy location sign and produce trustworthy location verify message, it is described can Believe that location verification message includes trustworthy location relation information and trustworthy location is signed;When first key and the second key are asymmetric During key, the trustworthy location relation information includes position code and variable code, the position code correspondence first key With the second key;When first key and the second key are symmetric keys, the trustworthy location relation information includes variable code;Make The method for calculating information signature with first key can be based on asymmetric key, can also be based on symmetric key algorithm;Based on not Symmetric key can use business public algorithm such as RSA;When being signed using asymmetric key calculation message, obtained signature is long Degree will exceed 32 character upper limits of transmission maximum capacity of WIFI SSID broadcast channels, so being accomplished by using certain method Compression;The algorithm of compression includes calculating hash function, using symmetric key algorithm, can use and calculate message MAC value Algorithm, such as hmac algorithm;The specific method of compression is as follows:
Method one calculates hash value message M for trustworthy location checking message, such as uses SHA1 algorithms;Method two makes It is that trustworthy location checking message calculating message authentication code obtains message M with the 5th key in the first equipment is stored in;Institute in implementation State the 5th key be used for compress purpose, be not the first equipment of unique identification, the 6th key use corresponding with the 5th key Trustworthy location before corresponding compression, which is obtained, in reduction verifies message;The trustworthy location verifies message compression module according to user side The need for the transmittability of communication interface produce compression after trustworthy location checking message, and send the second place checking message to Security authentication services end;The hash algorithm of same length is compared with message authentication code algorithm, due to having used key, message authentication Code algorithm is more difficult to Brute Force;Exemplified by application method two, in specific implementation, trustworthy location checking message compression module uses storage The 5th key calculate message M for trustworthy location checking message, the length of the message M is less than the length of trustworthy location checking information Degree, trustworthy location verifies that the message M of generation is replaced the trustworthy location in trustworthy location checking message and signed by message compression module Information and other partial informations send the maximum length allowed until meeting message;Thus the trustworthy location checking message generated Length may conform to the limitation of channel maximal bit length, the compression that message is verified to trustworthy location be realized, after generation compression Trustworthy location verifies message;The authentication code algorithm for calculating message M can be the various commercial public algorithm such as HMAC;Trustworthy location Verify that message compression module generates the second place checking message, second place checking message includes described unpressed credible Location verification message and correspondingly calculate obtained message M;After second place checking message generation, the first equipment tests the second place Message is demonstrate,proved to send to security authentication services end.
First equipment described in implementation can using device id as position code, using the system time of the first equipment as Variable code provides service;First equipment is calculated using the first key preserved and time-based fixed period of change is produced and sent out Trustworthy location is sent to verify message;First equipment uses the 5th key compression trustworthy location checking message preserved.
Implement example 3;
If Fig. 3 is for security authentication services end schematic diagram in the embodiment of the present invention.
The security authentication services end preserves the second key, for verifying information authentication and the to the first position received Two location verification message, verify the trustworthy location checking message included, are produced after being verified and send the 3rd location verification and disappear Breath;
The security authentication services end receives first and verifies message, verifies that the trustworthy location verifies the trustworthy location of message Signature, if passed through, it is assumed that user terminal have received trustworthy location checking message, produces and sends the 3rd location verification message To application service end.Specifically:
The trustworthy location checking message that the security authentication services end checking first position checking message includes;Do not pressing In the case of contracting trustworthy location checking message:The security authentication services end receives first position checking message, extracts in message Including the trustworthy location verify message;In the case where first key and the second key are unsymmetrical key, security service End is configured so that position code searches corresponding second key, and message is verified using trustworthy location described in the second key authentication Trustworthy location signature, if passed through, it is assumed that user terminal have received trustworthy location checking message, then security service end is by the One location verification message, which is included in the 3rd location verification message, to be sent to application service end, and checking does not pass through then termination; The algorithm that asymmetric signature is calculated in implementation can business public key RSA signature algorithm, or ECC signature algorithms;
In the case where first key and the second key are symmetric key, the security service end is configured so that and first The synchronous variable code of equipment and the second cipher key calculation trustworthy location signature, and security service end preserves the position corresponding to the second key Put identification code;Security service end will can be used to the corresponding trustworthy location signature of the first equipment for verifying using the second key according to can The rule or presetting method of time-varying code configuration, which calculate to complete to preserve, to be used to verify;Disappeared using the first position checking that is included in received The trustworthy location signature query safe service for checking credentials end in trustworthy location checking message in breath can with the presence or absence of same Believe position signature, tested if there is the variable code and the trustworthy location received that just checking calculating trustworthy location signature is used Whether the variable code that card message includes is consistent, if passed through, it is assumed that user terminal have received trustworthy location checking message, then The position code corresponding to corresponding second key is just extracted at security service end, then security service end disappears first position checking Breath and corresponding position code and variable code, which are included in the 3rd location verification message, to be sent to application service end, is verified obstructed Cross, do not produce and send the 3rd location verification message and termination;
In the case of compressing, security authentication services termination is received after first position checking message, uses first The message M that putting checking message includes searches corresponding second place checking message;Extract the corresponding second place found The uncompressed trustworthy location checking message that checking message includes, using compressed with the first equipment calculate when same algorithm and right Answer key to be calculated for unpressed trustworthy location checking message in second place checking message and obtain message M1, tested with first position The message M that card message includes compares, if unanimously, be verified, and continues next step processing, otherwise, stopping processing;
In implementation during second place checking message is searched, if due to Network Packet Loss or delay cause the Two location verification message are not received, and are not found corresponding second place checking message, can be taken in setting threshold time The mode inside inquired about again ensures reliability, if final do not find corresponding second place checking message, just terminates checking Process;If finding corresponding second place checking message, extracting the corresponding second place checking message found includes Uncompressed trustworthy location checking message, using compressed with the first equipment calculate when same algorithm and counterpart keys be second Put unpressed trustworthy location checking message calculating in checking message and obtain message M1, verify what message included with first position Message M compares, if unanimously, be verified, and continues next step processing, otherwise, stopping processing;, in implementation, security service end Corresponding method when being used in the compression of the first equipment, used here as, safety corresponding with the foregoing method for using the 5th key compression Service end is configured to the 6th key corresponding with the 5th key of storage;Security service end using the 6th key for it is unpressed can Letter location verification message compression, which is calculated, obtains message M1, and the message M that message M1 is verified into message with first position includes is compared, If consistent, continue next step processing, otherwise, stopping processing;If compressed using the method for one-way hash function, such as in practicality Using SHA1 algorithm, then corresponding security service end is obtained to unpressed trustworthy location checking message using SHA1 Hash calculations Compared to message M1, the message M that verifying message with first position includes, if unanimously, continue next step processing, otherwise, stop Only handle;Continue next step processing, in the case where first key and the second key are unsymmetrical key, tested using the second place The position code that includes of trustworthy location checking message that card message includes searches corresponding second key, and using this Trustworthy location signature in the unpressed trustworthy location checking message that two key authentication second places checking message includes, is tested After card passes through, the position code that checking message in the correspondence second place includes, variable code, by the 3rd location verification message are extracted Send to application service end, the 3rd location verification message include first position verify message and the position code extracted with And variable code;Checking is not by producing the 3rd location verification message and termination then;It is in first key and the second key In the case of symmetric key, extract the second place checking message in uncompressed trustworthy location checking message, using including can Whether letter position signature query safe service for checking credentials end, which has, has same trustworthy location signature, if there is just verifying the peace Full service end calculates trustworthy location in the variable code used during trustworthy location signature and second place checking message and verified Whether the variable code that message includes is consistent, if passed through, it is assumed that user terminal have received trustworthy location checking message and carry Take including variable code, and the corresponding position code of corresponding second key is extracted at security service end, and security service end is by the One location verification message and the position code extracted and variable code, which are included in the 3rd location verification message, to be sent to application Service end, checking is not by producing and sending the 3rd location verification message and termination;.
Implement example 4;
If Fig. 4 is for application service end schematic diagram in the embodiment of the present invention.
The application service end stores station location marker information and the home position that the trustworthy location checking message includes The corresponding relation of spatial information, the position code correspond to the first deployed with devices actual place object, including equipment or Space, including indoor or outdoors;The application service end is received produces after security service end checking trustworthy location checking message The 3rd raw location verification message, using the 4th key authentication user terminal of preservation, matches somebody with somebody confidence by rear use variable code correspondence Breath is responded or information is pushed.The information of push can be network address, video etc.;Response can be subsequent transaction flow circle Face etc..Specifically:
Verify ustomer premises access equipment and carry out respective handling in application service end:The application service end receives security service end hair The 3rd location verification message sent, information signature is verified using corresponding 4th key authentication first position, if the verification passes, The corresponding informance that application service end is just associated using variable code pushes response and follow-up service to corresponding user equipment;Implement In, user terminal can include application service key ID in generation first position checking message to be used to recognize the 4th key of correspondence, is answered It can verify that message includes application service key ID according to first position with service end, search corresponding 4th key.It is preferred that , application service end can extract position code and variable code from the 3rd location verification message, and application server is prestored Have the response message corresponding from different position codes or an information on services, the content of described information also with the parameter such as variable code It is relevant, if variable code can be the time;Application service end using position code variable code determine corresponding response message or Information on services;The first position checking message that the 3rd location verification message includes is being extracted, the 4th key authentication of correspondence is used First checking information signature is by rear, and application service end can be inquired about with obtaining position code in the 3rd location verification message Inquire about corresponding response message or information on services, and with reference to variable code determine to relative user equipment push corresponding response and Follow-up service;The contents list that shop needs to push such as is found out using the position code in shop, feels to work as using variable code The particular content is pushed to the corresponding user terminal of the 4th key by the particular content of preceding period, application service end.
Implement example 5;
If Fig. 5 is the method schematic diagram of compression trustworthy location checking message in the embodiment of the present invention.
Due to compatibility in practicality, general agreement limitation, different communication mode, the information that channel can be transmitted is limited 's;As WIFI SSID maximums can transmit the information of 32 bytes;Bluetooth iBeacon can transmit the information of 30 bytes, trusted bit The length of checking message is put considerably beyond the transmittability of channel;If using being transmitted several times, synchronization and group certainly will be related to The challenge of bag.It is specific that signing messages is produced after RSA 2048bit key signatures for 2048bit as used, add the time With positional information 256bit, then once transmitting all information at least needs 288 bytes, if coming wide using WIFI SSID In the case of broadcasting the information, the message length that SSID singles can be transmitted is 32 characters, i.e. 256bit information capacity, if It is divided into if being transmitted several times, it is repeatedly just excessively poor in the reliability for one-way transmission of eating dishes without rice or wine in the case of no synchronization mechanism, be Improve reliability and the situation of broadcast message is successfully captured by recipient, optimal information is once to send, be so accomplished by pressure Contracting;There are two schemes optional.
Scheme 1:Sent using after compression algorithm;Scheme 2:Sent using multiple burst;Preferably using transmission after compression It is preferably method.Specific method can use one-way hash function method, message authentication code etc., such as using the side of message authentication code Method, then calculate message authentication code to trustworthy location checking message using the 5th key preserved in the first equipment, have very in practicality Many commercialization algorithm combinations, are obtained 160bit information after such as HMAC-SHA1 compressions, are obtained after being compressed using HMAC-SHA256 256bit information;Such as use after HMAC-SHA256 compression algorithms, obtain 256bit message M, replace credible using message M Trustworthy location signature and other parts information in location verification message is until meet the maximum capacity of channel transmission;In this calculation In method method case, message M just replaces all trustworthy locations to verify that message digit is sent in WIFI SSID information;In practicality The middle rational compression algorithm used is all the algorithm with one-way hash function, is produced using foregoing SHA1 or HMAC-SHA1 The raw message M uniquely recognizes the trustworthy location checking message before compression.
Idiographic flow is as follows:When the trustworthy location verifies that the length of message exceeds the transmittability of broadcast channel, such as Using the method for message authentication code, then message is calculated to trustworthy location checking message using the 5th key preserved in the first equipment Authentication code obtains message M, and replaces the trustworthy location being included in trustworthy location checking message to sign and other using message M Partial information is until meet the maximum capacity of channel transmission, and the trustworthy location after generation compression verifies message;While the first equipment Produce second place checking message and the second place is verified that message is sent to security authentication services end;The second place checking Message includes unpressed trustworthy location and verifies message and message M;First position checking is received in security authentication services termination to disappear After breath, the message M that verifying message using first position includes searches the corresponding second place and verifies message;Extract correspondence second The unpressed trustworthy location checking message that location verification message includes;The 6th key preserved using security service end is to The uncompressed trustworthy location checking message that two location verification message include is close using the algorithm same with the first equipment and correspondence Key calculates and obtains message M1, and be used herein as HMAC-SHA256 and the 6th cipher key calculation in example arrives message M1, by M1 and first The message M that location verification message includes compares, if unanimously, be verified, and continues next step processing, otherwise, at stopping Reason;Using this process, complete to verify compression of the message in the transmission of connectionless communication interface for trustworthy location.
Implement example 6;
If Fig. 6 is that the information transferring method flow based on connectionless authentication implemented by present system is illustrated Figure.
The first equipment produces trustworthy location checking message S601 in implementation;The trustworthy location checking message includes trusted bit Put relation information and trustworthy location signature;When first key and the second key are unsymmetrical key, the trustworthy location relation Information includes position code and variable code, the position code correspondence first key and the second key;When first key and When second key is symmetric key, the trustworthy location relation information includes variable code;The variable code is dynamic-change information; Position code (code is code set in advance, the attribute for recognizing the first equipment, includes the physical location of deployment, space, Facility, and other related information defined in business application scene), variable code is (when can be the system of the first equipment Between etc. variable information);The first key is stored in the first equipment;Second key is stored in secure verification servers In;If using the method with key, then related the 5th key preservation in compression trustworthy location checking message is practical In the first equipment, related the 6th key is stored in secure verification servers;The first key and described second Key is corresponding relation, i.e., can verify whether trustworthy location signature is to calculate to produce using first key using second key It is raw;The trustworthy location signature is that the first equipment uses first key meter for the information sequence including trustworthy location relation information Calculate the trustworthy location signature produced;The variable code is dynamic-change information, is wrapped in the trustworthy location checking message produced every time The variable code included changes according to preset rule or algorithm, and such as variable code can be that local clock regularly changes, alterable Can also be with;The trustworthy location checking message can be produced upon receiving a request, can also persistently be produced according to the fixed cycle It is raw.
Transmission energy of the equipment of step S602 first based on the connectionless communication for sending trustworthy location checking message Power judges whether to need to verify message compression to the trustworthy location;Work as if the length of the trustworthy location checking message is more than The maximum transmission length that preceding first equipment possesses, is judged as needing compression;As using if realizing connectionless communication based on WIFI The method that WIFI broadcast channel transmissions SSID can be used, this method can transmit 32 characters, the i.e. information of 256bit bit lengths, If trustworthy location checking message has exceeded this length, it is necessary to compress;Here the mode of connectionless communication can include but It is not limited to WIFI broadcast channels, Bluetooth broadcast channel;In addition to broadcast channel, trustworthy location checking message can also pass through first Equipment is converted to Quick Response Code expression, realizes that trustworthy location verifies the transmission of message by way of ustomer premises access equipment is scanned;With two Tie up code table and reach analogy, trustworthy location checking message can be converted to information of acoustic wave stream transmission etc.;As used two dimension in practicality Code, it is possible to meet length requirement, avoiding the need for compression (can be tested trustworthy location by the Quick Response Code converting member of the first equipment Card message is converted to 2 D code information);The connectionless communication, which refers to when the first equipment sends message to user equipment, to be not required to Connection is first set up, but while using communicating pair shared with just and sound communication protocol and channel transmission message, including but The mode for being not limited by broadcast sends data, if user equipment within the scope of information is received with regard to information can be received.
Trustworthy location checking message after the generation compression of the equipment of step S603 first, and produce and sent out to security service end The second place is sent to verify message:In the use-case using HMAC-SHA256, (1) first equipment is using the 5th key of storage Trustworthy location checking message calculates message M, the message M length of the length less than trustworthy location checking information, the first equipment The trustworthy location signing messages and other parts the message M of generation replaced in trustworthy location checking message are permitted until meeting channel Perhaps maximum transmitted ability, the length of trustworthy location checking message may conform to the high specific speciality of channel after the compression thus generated The limitation of degree, realizes the compression that message is verified to trustworthy location, the trustworthy location checking message after generation compression;(2) first Equipment generates the second place checking message, and second place checking message includes the unpressed trustworthy location checking message With message M, while the second place is verified after message generation, the second place is verified message to security authentication services end by the first equipment Send.
The trustworthy location that the equipment of step S604 first is sent after trustworthy location checking message or compression with connectionless communication is tested Demonstrate,prove message;In addition, the first equipment can also be disappeared using the method transmission trustworthy location checking of Quick Response Code or information of acoustic wave stream Breath;WIFI broadcast channel can be used in practicality (as used SSID to transmit);Bluetooth broadcast channel sends above-mentioned message.
Step 605 user equipment produces first position checking message:The user equipment receives the institute that the first equipment is sent The trustworthy location checking message after trustworthy location checking message or compression is stated, the 3rd key meter preserved in a user device is used The information sequence for calculating the trustworthy location checking message after the trustworthy location checking message for including receiving or compression produces the One location verification information signature;The first position checking message includes application service key identification id, application service identification id; Optionally, it can include producing the timestamp that message is verified in first position;The user equipment produces first position checking message, First position checking message includes first position and verifies information signature and the trustworthy location received checking message (trustworthy location Checking message can be the message after origination message or compression);
First position checking message is sent to security authentication services end by step S606 user equipmenies;
Security authentication services end checking first position checking message described in step S607;In no compression trustworthy location checking In the case of message, application method is as follows:The second key and corresponding position code are preserved in the security service end, Second key is used to verify information authentication to the trustworthy location that the first position checking message received includes:The peace Full service end receives first position checking message, the trustworthy location checking message that message includes is extracted, in system configuration In the case of being unsymmetrical key for first key and the second key, verify that the position in message is recognized using the trustworthy location Code searches corresponding second key, and the trustworthy location for verifying message using trustworthy location described in the second key authentication is signed, if Pass through, it is assumed that user terminal have received effective trustworthy location checking message, then security service end produces and tests the 3rd position Card message is forwarded to application service end, and checking does not pass through then termination;The 3rd location verification message includes first position Verify message, position code and variable code;In the case where first key and the second key are symmetric key, using it is described can The trustworthy location signature query safe service for checking credentials end that letter location verification message includes whether there is same trustworthy location label Name, variable code and the trustworthy location received that trustworthy location signature is used are calculated if there is just checking security service end Whether the variable code that checking message includes is consistent, if passed through, it is assumed that user terminal have received trustworthy location checking message, Then the position code corresponding to corresponding second key is just extracted at security service end, then security service end is by the 3rd location verification Sent in message to application service end, checking is not by then producing and sending the 3rd location verification message and termination;Institute State the 3rd location verification message and verify message and corresponding position code and variable code including first position;
In the case of compressing, various methods can be used in practicality, such as one-way hash function, message authentication code is calculated Method etc.;Message authentication code algorithm is such as used, the second key and the 6th key, the first equipment are preserved in the security authentication services end Preserve first key and the 5th key;Security authentication services termination is received after first position checking message, is tested using first position The message M that card message includes searches corresponding second place checking message;Extracting correspondence second place checking message includes Unpressed trustworthy location checking message, the 6th key preserved using security service end and HMAC-SHA256 algorithms are calculated The unpressed trustworthy location checking message that second place checking message includes obtains message M1, and M1 and first position are verified The message M that message includes compares, if unanimously, continuing next step processing, otherwise, stopping processing;Continue next step processing, In the case where first key and the second key are unsymmetrical key, the position that message includes is verified using unpressed trustworthy location Put identification code and search corresponding second key, and do not pressed using what the second key authentication correspondence second place checking message included Trustworthy location signature in the trustworthy location checking message of contracting, after being verified, extracts and is wrapped in correspondence second place checking message The position code included, variable code produces and the 3rd location verification message is forwarded into application service end, the 3rd position is tested Demonstrate,proving message includes position code and variable code that message and extraction are verified in first position;Checking is not by producing and sending 3rd location verification message and termination;In the case where first key and the second key are symmetric key, second is extracted Put the uncompressed trustworthy location checking message in checking message, using including trustworthy location sign query safe service for checking credentials end Whether have and there is same trustworthy location signature, during if there is just verifying that the security service end calculates trustworthy location signature The variable code used verifies whether the variable code that trustworthy location checking message includes in message is consistent with the second place, such as Fruit passes through, it is assumed that user terminal have received trustworthy location checking message and extract the variable code included, and security service end is carried The corresponding position code of corresponding second key is taken, first position is verified that message and the position extracted are recognized by security service end Code and variable code, which are included in the 3rd location verification message, to be sent to application service end, and checking is not by producing and sending the Three location verification message and termination;
The 3rd location verification message includes being used to verify the first position checking message for initiating ustomer premises access equipment and use The position code and variable code of response and follow-up service are pushed to corresponding ustomer premises access equipment in decision application service end Information.
Verify ustomer premises access equipment and carry out respective handling in step S608 application services end:Preserve in the application service end Four keys;The application service end receives the 3rd location verification message that security authentication services end is sent, and extracts first included Location verification message, the 4th key corresponding with user equipment is searched using application service key identification id, and close using the 4th Key checking first position checking information signature, if the verification passes, then verifies that ustomer premises access equipment passes through, application service end is just used Including the corresponding informance that is associated with variable code of position code to corresponding user equipment push response and follow-up service;If Checking does not pass through, and is handled with regard to stopping.It is preferred that, application service end can obtain position identification from the 3rd location verification message is extracted Code, application server is previously stored with the response message corresponding from different position codes or information on services, described information Content also with the relating to parameters such as variable code, it is practical in variable code can be the first equipment system time, tested in first position After card information signature is verified, application service end can be according to the position code obtained from first location verification message Corresponding response message or information on services, and the system time of the first equipment with reference to represented by variable code are inquired about, is set to user It is standby to push corresponding response and follow-up service;The context number for pre-entering or defining is can also be using variable code.
Step S609 application services end pushes corresponding response and follow-up service to relative user equipment.

Claims (10)

1. it is a kind of based on connectionless communication verify the information transfer system, the system include the first equipment, security authentication services end, Ustomer premises access equipment and application service end, it is characterised in that:
First equipment is used to produce trustworthy location checking message, and sends by way of connectionless communication the trustworthy location Verify message;
The user equipment is used to receive the trustworthy location checking message that the first equipment is sent, and calculating includes trustworthy location and tested Demonstrate,prove the information sequence of message and produce first position checking message, first position checking message is sent to safety and tested by user equipment Demonstrate,prove service end;
The security authentication services end is used to receive first position checking message, extracts the trustworthy location checking that the message includes Message, verifies the trustworthy location signature of the trustworthy location checking message, if the verification passes, it is assumed that user equipment is received Trustworthy location checking message, then produce the 3rd location verification message and the 3rd location verification message be forwarded into application service End, the 3rd location verification message includes being used to verify the first position checking message for initiating ustomer premises access equipment and for determining Application service end pushes the position code and variable code information of response and follow-up service to corresponding ustomer premises access equipment;
The application service end is used for the 3rd location verification message for receiving the forwarding of security authentication services end, extracts and verifies first Location verification message, if the verification passes, application service end just push corresponding with the 3rd location verification message to ustomer premises access equipment Response and follow-up service.
2. system according to claim 1, it is characterised in that:The trustworthy location checking message includes trustworthy location relation Information and trustworthy location signature;When first key and the second key are unsymmetrical key, the trustworthy location relation information bag Include position code and variable code, the position code correspondence first key and the second key;When first key and second close When key is symmetric key, the trustworthy location relation information includes variable code, and the variable code is dynamic-change information;
The first key is stored in the first equipment;Second key is stored in security authentication services end;It is described credible Position signature is the first equipment calculated for the information sequence including trustworthy location relation information using first key produce can Believe position signature.
3. system according to claim 1 or 2, it is characterised in that:First equipment is before trustworthy location checking message is sent First judge whether to need to verify message compression to the trustworthy location;Work as if the length of the trustworthy location checking message is more than The maximum of the communication mode of preceding first device configuration sends length, is judged as needing compression, is then configured to the first equipment to this Information is compressed;First equipment sends the trustworthy location after trustworthy location checking message or compression in the way of connectionless communication Verify message.
4. system according to claim 3, it is characterised in that:When needing compression, the first equipment is generated as follows Trustworthy location after compression verifies message and generation and sends second place checking message to security service end:(1) first sets The length that standby compression trustworthy location checking message calculating obtains message M, the message M is less than the length that trustworthy location verifies message Degree, the first equipment replaces the message M of generation trustworthy location signing messages and other information in trustworthy location checking message Until the maximum length sent is met, the trustworthy location checking message after thus generation is compressed;(2) first equipment generation described the Two location verification message, second place checking message includes the unpressed trustworthy location checking message and correspondence message M, the After the generation of two location verification message, the first equipment sends second place checking message to secure verification servers.
5. the system according to claim 3 or 4, it is characterised in that:The ustomer premises access equipment receives what the first equipment was sent Trustworthy location checking message after the trustworthy location checking message or compression, it is close using the be stored in ustomer premises access equipment the 3rd The information sequence that key calculates the trustworthy location checking message for including receiving produces first position checking information signature;It is described Ustomer premises access equipment produces first position checking message, and first position checking message includes first position checking information signature and received The trustworthy location checking message or compression after trustworthy location checking message;Message is verified in first position by ustomer premises access equipment It is sent to security authentication services end.
6. system according to claim 5, it is characterised in that:Preserve the second key and correspond in security authentication services end The position code of second key, the trustworthy location that the security authentication services end checking first position checking message includes is tested Demonstrate,prove message:In the case of no compression trustworthy location checking message, the security service end receives first position checking message, The trustworthy location checking message that message includes is extracted, is the situation of unsymmetrical key in first key and the second key Under, verify that the position code in message searches corresponding second key using trustworthy location, using described in the second key authentication The trustworthy location signature of trustworthy location checking message, if passed through, it is assumed that ustomer premises access equipment have received trustworthy location checking Message, then security service end by first position checking message include sent in the 3rd location verification message to application service end, Checking does not pass through then termination;In the case where first key and the second key are symmetric key, the trustworthy location is used The trustworthy location signature query safe service for checking credentials end that checking message includes is signed with the presence or absence of same trustworthy location, if The variable code included in the presence of variable code and trustworthy location checking message that just checking calculating trustworthy location signature is used It is whether consistent, if unanimously, it is assumed that ustomer premises access equipment have received trustworthy location checking message, then security service end is just extracted Position code corresponding to corresponding second key, then security service end first position is verified that message and corresponding position are known Other code and variable code, which are included in the 3rd location verification message, to be sent to application service end, is verified not by then not producing and sending 3rd location verification message and termination;
Or, in the case of compressing, the second key, security authentication services termination are preserved in the security authentication services end Receive after first position checking message, the message M that verifying message using first position includes searches the corresponding second place and tested Message is demonstrate,proved, the unpressed trustworthy location checking message in the second place checking message found is extracted, is set using with first Standby compression algorithm same when calculating and counterpart keys are unpressed trustworthy location checking message in second place checking message Calculating obtains message M1, and the message M that verifying message with first position includes is compared, if unanimously, be verified, under continuation The processing of one step, otherwise, stopping processing;Continue next step processing, be the situation of unsymmetrical key in first key and the second key Under, extract the second place checking message in uncompressed trustworthy location checking message, using including position code search pair The second key answered, and tested using the second key authentication unpressed trustworthy location that correspondingly checking message in the second place includes The trustworthy location signature that card message includes, after being verified, the position that extracting correspondence second place checking message includes is known Other code, variable code, verify that message and the position code extracted and variable code are included in the 3rd location verification by first position Message is sent to application service end, and checking is not by producing and sending the 3rd location verification message and termination;First In the case that key and the second key are symmetric key, the uncompressed trustworthy location checking extracted in second place checking message disappears Breath, using including sign query safe service for checking credentials end of trustworthy location signed with the presence or absence of same trustworthy location, if deposited The variable code used during trustworthy location signature and second place checking message are just calculated at the security authentication services end Whether the variable code that middle trustworthy location checking message includes is consistent, if unanimously, deciding that and being verified it is assumed that user terminal It has received trustworthy location checking message and extract the variable code that includes, and to extract corresponding second close at security authentication services end The corresponding position code of key, security authentication services end message and the position code extracted are verified into and variable in first position Code, which is included in the 3rd location verification message, to be sent to application service end, and checking is not tested by then not producing and sending the 3rd position Demonstrate,prove message and termination;
The 3rd location verification message includes being used to verify the first position checking message for initiating ustomer premises access equipment and for certainly Determine the position code from follow-up service to corresponding ustomer premises access equipment and variable code information that application service end pushes response and.
7. system according to claim 6, it is characterised in that:Verify ustomer premises access equipment and carry out corresponding position in application service end Reason:Preserve the 4th key in the application service end;The application service end receives the 3rd that security authentication services end is sent Checking message is put, the first position checking message included is extracted, uses the 4th key authentication first corresponding with user equipment Checking information signature is put, if the verification passes, the position code that the 3rd location verification message includes is extracted at application service end And the corresponding informance of variable code association pushes response and/or follow-up service to corresponding user equipment.
8. system according to claim 7, it is characterised in that:Extracted from the 3rd location verification message at application service end Position code, application service end is previously stored with the response message corresponding from different position codes or information on services, The content of described information also with the relating to parameters such as variable code, after first position checking information signature is verified, application service Corresponding response message or information on services are inquired about in end according to the position code, and determine with reference to variable code to user equipment The corresponding response and/or follow-up service pushed.
9. a kind of information transmitting methods verified based on connectionless communication, it is characterised in that comprise the following steps:
First equipment produces trustworthy location checking message, and sends by way of connectionless communication trustworthy location checking and disappear Breath;
Ustomer premises access equipment receives the trustworthy location checking message that the first equipment is sent, and calculating includes trustworthy location checking message Information sequence and produce first position checking message, ustomer premises access equipment by first position checking message be sent to safety verification take Business end;
Security authentication services end receives first position checking message, extracts the trustworthy location checking message that the message includes, tests The trustworthy location signature of the trustworthy location checking message is demonstrate,proved, if passed through, it is assumed that ustomer premises access equipment have received trusted bit Checking message is put, then produces and the 3rd location verification message is forwarded to application service end, the 3rd location verification message package Include for verifying that message is verified and for determining application service end to corresponding user terminal in the first position of initiation ustomer premises access equipment Equipment pushes the position code and variable code information of response and follow-up service;
Application service end receives the 3rd location verification message that security authentication services end is sent, and extracts first position checking message, First position checking message is verified, if the verification passes, application service end just pushes the 3rd location verification to ustomer premises access equipment and disappeared Cease corresponding response and follow-up service.
10. method according to claim 9, it is characterised in that:The trustworthy location checking message is closed including trustworthy location It is information and trustworthy location signature;When first key and the second key are unsymmetrical key, the trustworthy location relation information Including position code and variable code, the position code correspondence first key and the second key;When first key and second When key is symmetric key, the trustworthy location relation information includes variable code;The variable code is dynamic-change information;
The first key is stored in the first equipment;Second key is stored in security authentication services end;It is described credible Position signature is the first equipment calculated for the information sequence including trustworthy location relation information using first key produce can Believe position signature.
CN201710381797.8A 2017-04-28 2017-05-26 Information transmission method based on connectionless communication verification Expired - Fee Related CN107104798B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710293410 2017-04-28
CN2017102934103 2017-04-28

Publications (2)

Publication Number Publication Date
CN107104798A true CN107104798A (en) 2017-08-29
CN107104798B CN107104798B (en) 2020-03-03

Family

ID=59670028

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710381797.8A Expired - Fee Related CN107104798B (en) 2017-04-28 2017-05-26 Information transmission method based on connectionless communication verification

Country Status (1)

Country Link
CN (1) CN107104798B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110380842A (en) * 2019-08-08 2019-10-25 北方工业大学 CAN bus message endorsement method, device and system suitable for wisdom net connection automobile

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101378565A (en) * 2008-09-22 2009-03-04 中兴通讯股份有限公司 Method and system for providing business guide information based on user position
CN103813311A (en) * 2014-03-06 2014-05-21 福建师范大学 Position information privacy protecting method
CN104584670A (en) * 2012-08-23 2015-04-29 交互数字专利控股公司 Method and apparatus for performing device-to-device discovery
CN105594236A (en) * 2013-09-26 2016-05-18 Gh9有限会社 Low-power-consumption short-range radio communication system
WO2016142225A1 (en) * 2015-03-09 2016-09-15 Philips Lighting Holding B.V. Detection of falsification of mobile terminal location
WO2016207018A1 (en) * 2015-06-23 2016-12-29 Philips Lighting Holding B.V. System for protecting location information

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101378565A (en) * 2008-09-22 2009-03-04 中兴通讯股份有限公司 Method and system for providing business guide information based on user position
CN104584670A (en) * 2012-08-23 2015-04-29 交互数字专利控股公司 Method and apparatus for performing device-to-device discovery
CN105594236A (en) * 2013-09-26 2016-05-18 Gh9有限会社 Low-power-consumption short-range radio communication system
CN103813311A (en) * 2014-03-06 2014-05-21 福建师范大学 Position information privacy protecting method
WO2016142225A1 (en) * 2015-03-09 2016-09-15 Philips Lighting Holding B.V. Detection of falsification of mobile terminal location
WO2016207018A1 (en) * 2015-06-23 2016-12-29 Philips Lighting Holding B.V. System for protecting location information

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
贾金营: "移动计算环境下基于位置服务的位置隐私保护技术研究", 《中国博士学位论文全文数据库 信息科技辑》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110380842A (en) * 2019-08-08 2019-10-25 北方工业大学 CAN bus message endorsement method, device and system suitable for wisdom net connection automobile

Also Published As

Publication number Publication date
CN107104798B (en) 2020-03-03

Similar Documents

Publication Publication Date Title
US8225094B2 (en) Device authentication in a PKI
CN1835436B (en) General power authentication frame and method of realizing power auttientication
CN101867530B (en) Things-internet gateway system based on virtual machine and data interactive method
CN102006294B (en) IP multimedia subsystem (IMS) multimedia communication method and system as well as terminal and IMS core network
CN100373991C (en) Enciphered consulating method for speech-sound communication in grouped network
CN100571124C (en) Prevent the method for Replay Attack and guarantee the unduplicated method of message SN
CN102045210B (en) End-to-end session key consultation method and system for supporting lawful interception
CN105827408A (en) Timestamp technique-based industrial network security transmission method
CN105577680A (en) Key generation method, encrypted data analyzing method, devices and key managing center
US8996858B2 (en) Systems and methods for utilizing IMS data security mechanisms in a circuit switched network
JP2010538533A (en) Method and system for communication using extended sequence numbers
CN104735747A (en) Information transferring and receiving method and internet-of-things equipment
CN1921682B (en) Method for enhancing key negotiation in universal identifying framework
CN110784865A (en) Network distribution method and terminal of Internet of things equipment, Internet of things equipment and network distribution system
CN102256249A (en) Identity authentication method and equipment applied to wireless network
CN101163003A (en) System and method for authenticating network for terminal when SIM card use UMTS terminal and UMTS system
MX2022006548A (en) Methods and devices for establishing secure communication for applications.
WO2017185872A1 (en) Short message processing method, device, and system, and storage medium
EP1180315A1 (en) Integrity protection method for radio network signaling
CN106878324A (en) Short message authentication method, short message certification server and terminal
US8130953B2 (en) Security protection for data communication
CN104883372A (en) Anti-cheating and anti-attack data transmission method based on wireless Ad Hoc network
CN101399603A (en) Resynchronization method, authentication method and device
JP3792648B2 (en) Wireless LAN high-speed authentication method and high-speed authentication method
CN107104798A (en) A kind of information transmitting methods verified based on connectionless communication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
TA01 Transfer of patent application right

Effective date of registration: 20170822

Address after: 100107 Beijing Chaoyang District Wankexingyuan 4 Building 805

Applicant after: Guo Zhengzheng

Address before: 100084 Beijing Zhongguancun East Road, No. 1, building No. 8, ground floor, No. CB108-018, No.

Applicant before: BEIJING DONGSHI TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200303

CF01 Termination of patent right due to non-payment of annual fee