CN109150902B - Encryption device based on home gateway system and encryption method thereof - Google Patents

Encryption device based on home gateway system and encryption method thereof Download PDF

Info

Publication number
CN109150902B
CN109150902B CN201811112828.0A CN201811112828A CN109150902B CN 109150902 B CN109150902 B CN 109150902B CN 201811112828 A CN201811112828 A CN 201811112828A CN 109150902 B CN109150902 B CN 109150902B
Authority
CN
China
Prior art keywords
encryption
data
key
module
result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811112828.0A
Other languages
Chinese (zh)
Other versions
CN109150902A (en
Inventor
张立江
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Weiping Information Security Evaluation Technology Co.,Ltd.
Original Assignee
Shandong Weiping Information Security Evaluation Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Weiping Information Security Evaluation Technology Co ltd filed Critical Shandong Weiping Information Security Evaluation Technology Co ltd
Priority to CN201811112828.0A priority Critical patent/CN109150902B/en
Publication of CN109150902A publication Critical patent/CN109150902A/en
Application granted granted Critical
Publication of CN109150902B publication Critical patent/CN109150902B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention discloses an encryption device based on a home gateway system, which comprises an internal data transmission module, a data transmission module and a data transmission module, wherein the internal data transmission module is used for internal data transmission of a home network; the external data transmission module is used for data transmission between the home network and the external network; the first-stage encryption module extracts a key from the key management module and encrypts data in the home network; the second-stage encryption module is used for generating a secret key according to an encryption result of the first-stage encryption module and encrypting data between the home network and the external network; and the key management module is used for managing the key. The invention can improve the defects of the prior art and improve the data transmission safety of the home gateway.

Description

Encryption device based on home gateway system and encryption method thereof
Technical Field
The invention relates to the technical field of network communication safety, in particular to an encryption device based on a home gateway system and an encryption method thereof.
Background
With the development of network technology, more and more concepts of smart home are appearing in people's daily life. In the face of increasingly complicated smart home products, a common way to perform integrated management on the smart home products is to adopt a home gateway technology. The home gateway can network various household appliances and equipment in a home, and provide various rich, diversified, personalized, convenient, comfortable, safe and efficient services for people through the network. Data transmission of smart home products needs to pass through the home gateway, so the data security of the home gateway is very important.
Disclosure of Invention
The technical problem to be solved by the invention is to provide an encryption device based on a home gateway system and an encryption method thereof, which can solve the defects of the prior art and improve the security of home gateway data transmission.
In order to solve the technical problems, the technical scheme adopted by the invention is as follows.
An encryption device based on a home gateway system comprises,
the internal data transmission module is used for transmitting the internal data of the home network;
the external data transmission module is used for data transmission between the home network and the external network;
the first-stage encryption module extracts a key from the key management module and encrypts data in the home network;
the second-stage encryption module is used for generating a secret key according to an encryption result of the first-stage encryption module and encrypting data between the home network and the external network;
and the key management module is used for managing the key.
An encryption method of the encryption device based on the home gateway system includes the following steps:
the data inside the network is encrypted by the encryption device,
after receiving data to be sent, the internal data transmission module establishes communication connection with the first-level encryption module; the first-stage encryption module extracts a key from the key management module and encrypts data in the home network; the key management module updates the key database according to the key access condition;
the encryption of data between the networks is carried out,
after receiving data to be sent, the external data transmission module establishes communication connection with the second-season encryption module; generating a key according to the encryption result of the first-stage encryption module, and encrypting data between the home network and the external network; and the key management module updates the key database according to the key generation condition.
Preferably, in the process of encrypting data in the network, the data sensitivity is in direct proportion to the data encryption priority.
Preferably, the data is decomposed before being encrypted, comprising the steps of,
A. the dimension D of the decomposition is set up,
Figure BDA0001809634160000021
wherein T is the historical average value of the total amount of data, K is the data category amount,
Figure BDA0001809634160000022
represents rounding up;
B. establishing a functional relation between the data sensitivity S and each dimension sensitivity component S,
Figure BDA0001809634160000023
wherein f is a correlation function of each dimension sensitivity component s and each dimension data consistency u;
C. decomposing the data according to the sensitivity component s of each dimension;
and after the data are decomposed, the decomposed data are encrypted and then are processed.
Preferably, the key management module updating the key database based on the key access comprises the steps of,
A. establishing an associated data set using keys of different data components in the same data;
B. when the same key is taken again, it is guaranteed that it is not used simultaneously with all other keys in the existing associated data set.
Preferably, in the inter-network data encryption process, the association degree between the data to be encrypted and the encryption result of the first-level encryption module for generating the key is in direct proportion to the data encryption priority.
Preferably, the generating of the key according to the encryption result of the first-level encryption module includes the steps of,
A. selecting an encryption result linearly related to the data to be encrypted as standby data;
B. respectively calculating an encryption result and a hash value of a key used for obtaining the encryption result;
C. b, normalizing the hash value calculated in the step B, wherein the processing result is used as a first variable of the secret key;
D. combining the transmission path addresses of the encryption results of the first-stage encryption module, and then performing normalization processing, wherein the processing result is used as a second variable of the secret key;
E. and respectively carrying out Fourier-Mellin transformation on the first variable and the second variable of the key to obtain corresponding feature matrixes, and extracting feature vectors which are linearly independent from each other in the feature matrixes to form the key.
Preferably, the existing key is twice encrypted using the newly generated key, and the encrypted result is substituted for the existing key.
Adopt the beneficial effect that above-mentioned technical scheme brought to lie in: the invention specially designs a set of data encryption system aiming at the data transmission characteristics of the home gateway. The system is divided into two parts, which are specially corresponding to internal data and external data. For internal data, a one-time encryption mode is adopted due to high security. By decomposing and encrypting the data, the encryption operation amount can be effectively reduced. For external data, a key is generated by using an encryption result of the first-stage encryption module, and the key security is improved by using the uncertainty of the encryption result, so that the encryption level of the external data is improved. The key is generated through the hash value of the encryption process parameter and the data transmission path address, the reliability of the key is improved by using a double random mode, and the data source is safe and reliable and has strong stability. In the encryption process, the security of the secret key can be effectively improved by updating the secret key database in two stages, and the security of the encryption process is greatly improved under the condition of not increasing the number of the secret keys.
Drawings
FIG. 1 is a system schematic of one embodiment of the present invention.
In the figure: 1. an internal data transmission module; 2. an external data transmission module; 3. a first-level encryption module; 4. a second level encryption module; 5. and a key management module.
Detailed Description
The standard parts used in the invention can be purchased from the market, the special-shaped parts can be customized according to the description and the description of the attached drawings, and the specific connection mode of each part adopts the conventional means of mature bolts, rivets, welding, sticking and the like in the prior art, and the detailed description is not repeated.
Referring to fig. 1, one embodiment of the present invention includes,
the internal data transmission module 1 is used for transmitting data inside the home network;
the external data transmission module 2 is used for data transmission between the home network and the external network;
the first-stage encryption module 3 extracts a key from the key management module 5 and encrypts data in the home network;
the second-stage encryption module 4 generates a key according to the encryption result of the first-stage encryption module 3, and encrypts data between the home network and the external network;
and the key management module 5 is used for managing the key.
An encryption method of the encryption device based on the home gateway system includes the following steps:
the data inside the network is encrypted by the encryption device,
after receiving data to be sent, the internal data transmission module 1 establishes communication connection with the first-level encryption module 3; the first-stage encryption module 3 extracts a key from the key management module 5 and encrypts data in the home network; the key management module 5 updates the key database according to the key access condition;
the encryption of data between the networks is carried out,
after receiving data to be sent, the external data transmission module 2 establishes communication connection with the second-season encryption module 4; generating a key according to the encryption result of the first-stage encryption module 3, and encrypting data between the home network and the external network; the key management module 5 updates the key database according to the key generation condition.
In the process of encrypting data in the network, the data sensitivity is in direct proportion to the data encryption priority.
The method for decomposing the data before encryption comprises the following steps,
A. the dimension D of the decomposition is set up,
Figure BDA0001809634160000051
wherein T is the historical average value of the total amount of data, K is the data category amount,
Figure BDA0001809634160000052
represents rounding up;
B. establishing a functional relation between the data sensitivity S and each dimension sensitivity component S,
Figure BDA0001809634160000053
wherein f is a correlation function of each dimension sensitivity component s and each dimension data consistency u;
C. decomposing the data according to the sensitivity component s of each dimension;
and after the data are decomposed, the decomposed data are encrypted and then are processed.
The updating of the key database by the key management module 5 in response to a key access comprises the following steps,
A. establishing an associated data set using keys of different data components in the same data;
B. when the same key is taken again, it is guaranteed that it is not used simultaneously with all other keys in the existing associated data set.
In the inter-network data encryption process, the association degree of the data to be encrypted and the encryption result of the first-stage encryption module 3 for generating the key is in direct proportion to the data encryption priority.
Generating a key based on the encryption result of the first-stage encryption module 3 includes the steps of,
A. selecting an encryption result linearly related to the data to be encrypted as standby data;
B. respectively calculating an encryption result and a hash value of a key used for obtaining the encryption result;
C. b, normalizing the hash value calculated in the step B, wherein the processing result is used as a first variable of the secret key;
D. combining the transmission path addresses of the encryption result of the first-stage encryption module 3, and then performing normalization processing, wherein the processing result is used as a second variable of the secret key;
E. Fourier-Mellin transformation is respectively carried out on the first variable and the second variable of the key to obtain corresponding feature matrixes, and feature vectors which are linearly independent of each other in the feature matrixes are extracted to form the key;
the key is generated by splicing the feature vectors, the feature vectors are randomly and repeatedly spliced in the splicing process, and feature marking is carried out on the repeatedly spliced positions. Through repeated splicing, the number of the keys can be increased, more importantly, the keys can be subjected to security detection through the characteristic marks of repeated splicing, and the keys are prevented from being tampered.
And performing secondary encryption on the existing key by using the newly generated key, and replacing the existing key by using the encrypted result.
In the description of the present invention, it is to be understood that the terms "longitudinal", "lateral", "upper", "lower", "front", "rear", "left", "right", "vertical", "horizontal", "top", "bottom", "inner", "outer", and the like, indicate orientations or positional relationships based on those shown in the drawings, are merely for convenience of description of the present invention, and do not indicate or imply that the referenced devices or elements must have a particular orientation, be constructed and operated in a particular orientation, and thus, are not to be construed as limiting the present invention.
The foregoing shows and describes the general principles and broad features of the present invention and advantages thereof. It will be understood by those skilled in the art that the present invention is not limited to the embodiments described above, which are described in the specification and illustrated only to illustrate the principle of the present invention, but that various changes and modifications may be made therein without departing from the spirit and scope of the present invention, which fall within the scope of the invention as claimed. The scope of the invention is defined by the appended claims and equivalents thereof.

Claims (4)

1. An encryption method of an encryption device based on a home gateway system, the encryption device based on the home gateway system comprising,
the internal data transmission module (1) is used for transmitting data inside the home network;
the external data transmission module (2) is used for data transmission between the home network and the external network;
the first-stage encryption module (3) extracts a key in the key management module (5) and encrypts data in the home network;
the second-stage encryption module (4) generates a key according to the encryption result of the first-stage encryption module (3) and encrypts data between the home network and the external network;
a key management module (5) for managing keys;
the method is characterized by comprising the following steps:
the method for decomposing the data before encryption comprises the following steps,
A. the dimension D of the decomposition is set up,
Figure FDA0002725564330000011
wherein T is the historical average value of the total amount of data, K is the data category amount,
Figure FDA0002725564330000012
represents rounding up;
B. establishing a functional relation between the data sensitivity S and each dimension sensitivity component S,
Figure FDA0002725564330000013
wherein f is a correlation function of each dimension sensitivity component s and each dimension data consistency u;
C. decomposing the data according to the sensitivity component s of each dimension;
after the data are decomposed, the decomposed data are encrypted and then are encrypted;
the data inside the network is encrypted by the encryption device,
after receiving data to be sent, the internal data transmission module (1) establishes communication connection with the first-level encryption module (3); the first-stage encryption module (3) extracts a key from the key management module (5) and encrypts data inside the home network; the key management module (5) updates the key database according to the key use condition; in the process of encrypting data in the network, the data sensitivity is in direct proportion to the data encryption priority;
the encryption of data between the networks is carried out,
after receiving data to be sent, the external data transmission module (2) establishes communication connection with the second-season encryption module (4); generating a key according to the encryption result of the first-stage encryption module (3) to encrypt data between the home network and the external network; the key management module (5) updates the key database according to the key generation condition;
the generation of the key from the result of the encryption by the first-level encryption module (3) comprises the following steps,
A. selecting an encryption result linearly related to the data to be encrypted as standby data;
B. respectively calculating an encryption result and a hash value of a key used for obtaining the encryption result;
C. b, normalizing the hash value calculated in the step B, wherein the processing result is used as a first variable of the secret key;
D. combining the transmission path addresses of the encryption result of the first-stage encryption module (3), and then performing normalization processing, wherein the processing result is used as a second variable of the secret key;
E. and respectively carrying out Fourier-Mellin transformation on the first variable and the second variable of the key to obtain corresponding feature matrixes, and extracting feature vectors which are linearly independent from each other in the feature matrixes to form the key.
2. The encryption method of an encryption device based on a home gateway system according to claim 1, wherein: the key management module (5) updating the key database according to the key access situation comprises the following steps,
A. establishing an associated data set using keys of different data components in the same data;
B. when the same key is taken again, it is guaranteed that it is not used simultaneously with all other keys in the existing associated data set.
3. The encryption method of an encryption device based on a home gateway system according to claim 1, wherein: in the process of data encryption between networks, the association degree of data to be encrypted and the encryption result of the first-stage encryption module (3) for generating the key is in direct proportion to the data encryption priority.
4. The encryption method of an encryption device based on a home gateway system according to claim 3, wherein: and performing secondary encryption on the existing key by using the newly generated key, and replacing the existing key by using the encrypted result.
CN201811112828.0A 2018-09-25 2018-09-25 Encryption device based on home gateway system and encryption method thereof Active CN109150902B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811112828.0A CN109150902B (en) 2018-09-25 2018-09-25 Encryption device based on home gateway system and encryption method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811112828.0A CN109150902B (en) 2018-09-25 2018-09-25 Encryption device based on home gateway system and encryption method thereof

Publications (2)

Publication Number Publication Date
CN109150902A CN109150902A (en) 2019-01-04
CN109150902B true CN109150902B (en) 2021-03-30

Family

ID=64823279

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811112828.0A Active CN109150902B (en) 2018-09-25 2018-09-25 Encryption device based on home gateway system and encryption method thereof

Country Status (1)

Country Link
CN (1) CN109150902B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115440107B (en) * 2022-10-26 2024-07-23 北京千种幻影科技有限公司 Intelligent driving training system and method for deaf-mute based on VR virtual reality

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101247391A (en) * 2007-12-28 2008-08-20 上海电力学院 OPC safety proxy system and proxy method thereof
CN102710628A (en) * 2012-05-25 2012-10-03 东莞中山大学研究院 Home-gateway based cloud security encryption method and system
CN103067166A (en) * 2011-10-19 2013-04-24 海尔集团公司 Grading mixing encryption method and device of intelligent family system
CN107018070A (en) * 2016-01-28 2017-08-04 南水北调中线干线工程建设管理局 A kind of isomery multimode gateway equipment and its transmission method and application

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106416172B (en) * 2014-03-24 2020-03-27 诺基亚技术有限公司 Method and apparatus for content management

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101247391A (en) * 2007-12-28 2008-08-20 上海电力学院 OPC safety proxy system and proxy method thereof
CN103067166A (en) * 2011-10-19 2013-04-24 海尔集团公司 Grading mixing encryption method and device of intelligent family system
CN102710628A (en) * 2012-05-25 2012-10-03 东莞中山大学研究院 Home-gateway based cloud security encryption method and system
CN107018070A (en) * 2016-01-28 2017-08-04 南水北调中线干线工程建设管理局 A kind of isomery multimode gateway equipment and its transmission method and application

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
构建融合智慧物业、智慧家庭安防、 智能家居功能的家庭网关系统;秦永春;《中国有线电视》;20180627(第5期);全文 *

Also Published As

Publication number Publication date
CN109150902A (en) 2019-01-04

Similar Documents

Publication Publication Date Title
CN108428141B (en) Food traceability information management system based on ERP system and block chain
CN101465735B (en) Network user identification verification method, server and client terminal
CN102572314B (en) Image sensor and payment authentication method
CN104486075B (en) A kind of verification method of intelligent substation ICD model file digital signature
CN103838875B (en) A kind of information acquisition system and its method based on Quick Response Code
CN104580246B (en) Dynamic and intelligent safe key is produced and managing and control system and method under WiFi environment
CN104574593A (en) Virtual key based on Bluetooth communication as well as anti-theft lock system and application method thereof
CN103905469B (en) Security control system and method applied to smart grid wireless sensing network and cloud computing
CN102571357A (en) Signature realization method and signature realization device
CN111431841B (en) Internet of things security sensing system and Internet of things data security transmission method
EP3972315B1 (en) Network device identification
CN105512518A (en) Cipher algorithm identification method and system based on only-ciphertext
CN106650478A (en) Data operation management device and method
CN113704780A (en) Model-driven-based power distribution network user side information adaptive encryption method
CN117056961A (en) Privacy information retrieval method and computer readable storage medium
CN109150902B (en) Encryption device based on home gateway system and encryption method thereof
CN115277040B (en) Medical health data storage and sharing method and system based on blockchain technology
CN112272090B (en) Key generation method and device
CN115776413B (en) Iris encryption-based data transmission method and system
CN102158856A (en) Mobile terminal identification code authentication system and method, server and terminal
CN108696865A (en) A kind of radio sensing network node safety certifying method
CN105872013A (en) Cloud computing system
CN115643085A (en) Internet of things equipment safety protection method and system
CN102291716A (en) Wireless Internet surfing card client and mobile terminal
CN112839044B (en) Audio processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20210309

Address after: Room 202, 2nd floor, Qilu Software Park building, south head, Xinyu Road, high tech Zone, Jinan City, Shandong Province

Applicant after: Shandong Weiping Information Security Evaluation Technology Co.,Ltd.

Address before: 110326 huaniubao village, Hutai Town, Xinmin City, Shenyang City, Liaoning Province

Applicant before: Zhang Lijiang

GR01 Patent grant
GR01 Patent grant