CN111130769A - Internet of things terminal encryption method and device - Google Patents

Internet of things terminal encryption method and device Download PDF

Info

Publication number
CN111130769A
CN111130769A CN201911287529.5A CN201911287529A CN111130769A CN 111130769 A CN111130769 A CN 111130769A CN 201911287529 A CN201911287529 A CN 201911287529A CN 111130769 A CN111130769 A CN 111130769A
Authority
CN
China
Prior art keywords
terminal
key
negotiation
random number
public key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911287529.5A
Other languages
Chinese (zh)
Inventor
廖剑锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Jiubaohui Information Technology Co Ltd
Original Assignee
Wuhan Jiubaohui Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Jiubaohui Information Technology Co Ltd filed Critical Wuhan Jiubaohui Information Technology Co Ltd
Priority to CN201911287529.5A priority Critical patent/CN111130769A/en
Publication of CN111130769A publication Critical patent/CN111130769A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Abstract

The invention provides an Internet of things terminal encryption method and device, wherein the method comprises the following steps: after initiating a connection request, the first terminal receives a verification identifier sent by the second terminal, resolves the verification identifier through a pre-stored resolving algorithm and feeds back a resolving result to the second terminal; after the calculation result passes verification, the second terminal sends the public key and the random number of the second terminal to the first terminal; the first terminal generates a first negotiation key through a key negotiation algorithm according to a private key of the first terminal, a public key of the second terminal and the random number; the first terminal sends the own public key and the random number to the second terminal, and the second terminal generates a second negotiation key through a key negotiation algorithm according to the own private key, the public key of the first terminal and the random number; and when the first negotiation key is consistent with the second negotiation key, the negotiation key is used as a session key for encrypted communication. The technical scheme solves the problem of the communication safety of the existing Internet of things terminal, and can ensure the communication safety of the terminal while improving the encryption speed.

Description

Internet of things terminal encryption method and device
Technical Field
The invention relates to the field of Internet of things, in particular to a terminal encryption method and device.
Background
The information required in the monitoring or connection process is collected through various information sensing devices, and the management control technology of specific objects is realized by accessing the internet through network communication, namely the internet of things technology. Based on wireless network, hardware and sensor, etc., it can facilitate information exchange and realize intelligent identification management. In the internet of things system, since hardware devices may be distributed in various places, and the network access environment is complex and is vulnerable to various illegal attacks, it is very necessary to protect the communication security of the internet of things terminal.
At present, in common terminal encryption modes of the internet of things, lightweight encryption algorithms such as symmetric encryption and asymmetric encryption exist, the resource requirement is low, and the encryption requirements can be met based on the lightweight encryption algorithms.
Disclosure of Invention
In view of this, embodiments of the present invention provide an internet of things terminal encryption method and apparatus, so as to solve the problem that it is difficult to improve encryption speed and ensure communication security in the existing terminal encryption communication method.
In a first aspect of the embodiments of the present invention, there is provided an internet of things terminal encryption method, including:
after initiating a connection request to a second terminal, a first terminal receives a verification identifier sent by the second terminal, resolves the verification identifier through a resolving algorithm prestored in the first terminal, and feeds back a resolving result to the second terminal;
if the calculation result passes the verification, the second terminal sends the public key of the second terminal and the random number generated based on the hash algorithm to the first terminal;
the first terminal generates a first negotiation key through a key negotiation algorithm according to a private key of the first terminal, a public key of the second terminal and a random number;
the first terminal sends a self public key and a random number generated based on a hash algorithm to the second terminal, and the second terminal generates a second negotiation key through a key negotiation algorithm according to a self private key, the public key of the first terminal and the random number;
and when the first negotiation key is consistent with the second negotiation key, the negotiation key is used as a session key for encrypted communication.
In a second aspect of the embodiments of the present invention, there is provided an internet of things terminal encryption apparatus, including:
the resolving module is used for receiving the verification identifier sent by the second terminal after the first terminal initiates a connection request to the second terminal, resolving the verification identifier through a resolving algorithm prestored in the first terminal and feeding back a resolving result to the second terminal;
the verification module is used for sending the public key of the second terminal and the random number generated based on the hash algorithm to the first terminal after the calculation result passes the verification;
the first generation module is used for generating a first negotiation key by the first terminal through a key negotiation algorithm according to a private key of the first terminal, a public key of the second terminal and a random number;
the second generation module is used for sending the public key of the first terminal and the random number generated based on the hash algorithm to the second terminal, and the second terminal generates a second negotiation key through a key negotiation algorithm according to the private key of the second terminal, the public key of the first terminal and the random number;
and the communication module is used for carrying out encryption communication by taking the negotiation key as a session key when the first negotiation key is consistent with the second negotiation key.
In the embodiment of the invention, after a terminal initiates a connection request, the terminal receives an authentication identifier sent by a corresponding terminal, the terminal resolves the authentication identifier through a pre-stored algorithm, feeds back a resolving result, after the corresponding terminal passes the resolving result, the terminal sends a self public key and a generated random number to the terminal, the terminal obtains a first negotiation key through a key negotiation algorithm according to a self private key, a public key of the opposite side and the random number, the corresponding terminal also calculates a second negotiation key according to the self private key, the public key of the opposite side and the random number, if the first negotiation key and the second negotiation key are consistent, the negotiation key with consistent authentication is used as a session key for encrypted communication, thereby solving the problem that the existing communication method is difficult to guarantee the security while the encryption speed is improved, based on connection authentication, and key negotiation can guarantee the communication security when the terminal is connected with other terminal devices, simultaneously for simple symmetric encryption and asymmetric encryption, the security is higher, based on the negotiation key, can effectively promote encryption speed, can encrypt the communication with a plurality of equipment moreover, can effectively avoid the key to reveal the problem.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings described below are only some embodiments of the present invention, and those skilled in the art can also obtain other drawings according to the drawings without creative efforts.
Fig. 1 is a schematic flow chart of a terminal encryption method for the internet of things according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of an internet of things terminal encryption device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is obvious that the embodiments described below are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "comprises" and "comprising," when used in this specification and claims, and in the accompanying drawings and figures, are intended to cover non-exclusive inclusions, such that a process, method or system, or apparatus that comprises a list of steps or elements is not limited to the listed steps or elements. In addition, "first" and "second" are used to distinguish different objects, and are not used to describe a specific order.
Referring to fig. 1, fig. 1 is a schematic flow chart of a terminal encryption method for the internet of things according to an embodiment of the present invention, including:
s101, after initiating a connection request to a second terminal, a first terminal receives a verification identifier sent by the second terminal, the verification identifier is resolved through a resolving algorithm prestored in the first terminal, and a resolving result is fed back to the second terminal;
the first terminal and the second terminal can be internet of things terminals, or the first terminal is an internet of things terminal, the second terminal is a mobile terminal, or the first terminal is a mobile terminal and the second terminal is an internet of things terminal. The terminal of the internet of things, namely the equipment for realizing data acquisition and data transmission in the internet of things, can comprise a sensor, a processor and a wireless communication module in the terminal of the internet of things, and the mobile terminal, namely the terminal equipment for data acquisition, receives the terminal equipment of the internet of things, and can perform data processing analysis, such as mobile phones, tablet computers, PCs and other equipment.
The first terminal and the second terminal are stored with verification identification resolving algorithms, when the terminals receive the verification identifications, the verification identifications are resolved to obtain resolving results, and the second terminal can verify the resolving results according to the resolving algorithms of the second terminal.
Preferably, the verification identifier at least includes terminal identity information and a connection password.
S102, if the calculation result passes the verification, the second terminal sends the public key of the second terminal and the random number generated based on the hash algorithm to the first terminal;
preferably, the first terminal and the second terminal generate a negotiation key through a key negotiation algorithm according to a private key of the first terminal, the exchange public key, a calculation result of the verification identifier and the random number.
The first terminal can also generate a first negotiation key through a key negotiation algorithm according to the self private key, the second terminal public key, the calculation result of the verification identifier and the random number.
S103, the first terminal generates a first negotiation key through a key negotiation algorithm according to a self private key, the public key of the second terminal and the random number;
preferably, the second terminal may further generate a second negotiation key through a key negotiation algorithm according to the private key of the second terminal, the public key of the first terminal, the calculation result of the verification identifier, and the random number.
S104, the first terminal sends the own public key and the random number generated based on the hash algorithm to the second terminal, and the second terminal generates a second negotiation key through a key negotiation algorithm according to the own private key, the public key of the first terminal and the random number;
and S105, when the first negotiation key is consistent with the second negotiation key, carrying out encryption communication by taking the negotiation key as a session key.
Compared with the traditional encryption method for the terminal of the internet of things, the encryption method provided by the embodiment is simple in encryption process and high in safety, and based on the verification identification and the key negotiation of the connection, the encryption communication safety of the terminal of the internet of things can be improved, and meanwhile, the encryption speed is improved.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, but should not constitute any limitation to the implementation process of the embodiments of the present invention,
fig. 2 is a schematic structural diagram of a terminal encryption device for internet of things according to a third embodiment of the present invention, where the device includes:
the calculation module 210 is configured to receive a verification identifier sent by a second terminal after a first terminal initiates a connection request to the second terminal, calculate the verification identifier through a calculation algorithm pre-stored in the first terminal, and feed back a calculation result to the second terminal;
preferably, the verification identifier at least includes terminal identity information and a connection password.
The verification module 220 is configured to send the public key of the second terminal and the random number generated based on the hash algorithm to the first terminal if the calculation result passes the verification;
a first generating module 230, configured to generate, by the first terminal, a first negotiation key through a key negotiation algorithm according to a private key of the first terminal, a public key of the second terminal, and a random number;
preferably, the second terminal generates a second negotiation key through a key negotiation algorithm according to a private key of the second terminal, the public key of the first terminal and the random number; further comprising:
and the first terminal and the second terminal respectively generate a negotiation key through a key negotiation algorithm according to the self private key, the exchange public key, the resolving result of the verification identifier and the random number.
A second generating module 240, configured to send, by the first terminal, a public key of the first terminal and a random number generated based on a hash algorithm to the second terminal, where the second terminal generates a second negotiation key through a key negotiation algorithm according to a private key of the second terminal, the public key of the first terminal, and the random number;
a communication module 250, configured to perform encrypted communication by using the negotiation key as a session key when the first negotiation key is consistent with the second negotiation key.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
It will be understood by those skilled in the art that all or part of the steps in the method for implementing the above embodiments may be implemented by a program to instruct associated hardware, where the program may be stored in a computer-readable storage medium, and when the program is executed, the program includes steps S101 to S105, where the storage medium includes, for example: ROM/RAM, magnetic disk, optical disk, etc.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (6)

1. An Internet of things terminal encryption method is characterized by comprising the following steps:
after initiating a connection request to a second terminal, a first terminal receives a verification identifier sent by the second terminal, resolves the verification identifier through a resolving algorithm prestored in the first terminal, and feeds back a resolving result to the second terminal;
if the calculation result passes the verification, the second terminal sends the public key of the second terminal and the random number generated based on the hash algorithm to the first terminal;
the first terminal generates a first negotiation key through a key negotiation algorithm according to a private key of the first terminal, a public key of the second terminal and a random number;
the first terminal sends a self public key and a random number generated based on a hash algorithm to the second terminal, and the second terminal generates a second negotiation key through a key negotiation algorithm according to a self private key, the public key of the first terminal and the random number;
and when the first negotiation key is consistent with the second negotiation key, the negotiation key is used as a session key for encrypted communication.
2. The method according to claim 1, wherein the authentication identifier comprises at least terminal identity information and a connection password.
3. The method according to claim 1, wherein the second terminal generates a second negotiation key through a key negotiation algorithm according to a private key of the second terminal, the public key of the first terminal and a random number; further comprising:
and the first terminal and the second terminal respectively generate a negotiation key through a key negotiation algorithm according to the self private key, the exchange public key, the resolving result of the verification identifier and the random number.
4. The utility model provides a thing networking terminal encryption device which characterized in that includes:
the resolving module is used for receiving the verification identifier sent by the second terminal after the first terminal initiates a connection request to the second terminal, resolving the verification identifier through a resolving algorithm prestored in the first terminal and feeding back a resolving result to the second terminal;
the verification module is used for sending the public key of the second terminal and the random number generated based on the hash algorithm to the first terminal after the calculation result passes the verification;
the first generation module is used for generating a first negotiation key by the first terminal through a key negotiation algorithm according to a private key of the first terminal, a public key of the second terminal and a random number;
the second generation module is used for sending the public key of the first terminal and the random number generated based on the hash algorithm to the second terminal, and the second terminal generates a second negotiation key through a key negotiation algorithm according to the private key of the second terminal, the public key of the first terminal and the random number;
and the communication module is used for carrying out encryption communication by taking the negotiation key as a session key when the first negotiation key is consistent with the second negotiation key.
5. The apparatus according to claim 4, wherein the authentication identifier comprises at least terminal identity information and a connection password.
6. The apparatus according to claim 4, wherein the second terminal generates a second negotiation key through a key negotiation algorithm according to its own private key, the public key of the first terminal, and a random number; further comprising:
and the first terminal and the second terminal respectively generate a negotiation key through a key negotiation algorithm according to the self private key, the exchange public key, the resolving result of the verification identifier and the random number.
CN201911287529.5A 2019-12-14 2019-12-14 Internet of things terminal encryption method and device Pending CN111130769A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911287529.5A CN111130769A (en) 2019-12-14 2019-12-14 Internet of things terminal encryption method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911287529.5A CN111130769A (en) 2019-12-14 2019-12-14 Internet of things terminal encryption method and device

Publications (1)

Publication Number Publication Date
CN111130769A true CN111130769A (en) 2020-05-08

Family

ID=70498863

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911287529.5A Pending CN111130769A (en) 2019-12-14 2019-12-14 Internet of things terminal encryption method and device

Country Status (1)

Country Link
CN (1) CN111130769A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112636906A (en) * 2020-12-11 2021-04-09 海光信息技术股份有限公司 Key agreement method and device
CN112699352A (en) * 2021-03-23 2021-04-23 中国信息通信研究院 Trusted data acquisition terminal identity verification method, computer storage medium and electronic equipment
CN113079022A (en) * 2021-03-31 2021-07-06 郑州信大捷安信息技术股份有限公司 Secure transmission method and system based on SM2 key negotiation mechanism
WO2022062980A1 (en) * 2020-09-23 2022-03-31 歌尔股份有限公司 Communication method and apparatus, and electronic device and storage medium
CN114710359A (en) * 2022-04-15 2022-07-05 辽宁工控科技有限公司 Industrial network dynamic key management method and industrial network encryption communication method

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109495445A (en) * 2018-09-30 2019-03-19 青岛海尔科技有限公司 Identity identifying method, device, terminal, server and medium based on Internet of Things
CN109768982A (en) * 2019-01-23 2019-05-17 深圳市元征科技股份有限公司 A kind of encrypted transmission method and device based on Internet of Things

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109495445A (en) * 2018-09-30 2019-03-19 青岛海尔科技有限公司 Identity identifying method, device, terminal, server and medium based on Internet of Things
CN109768982A (en) * 2019-01-23 2019-05-17 深圳市元征科技股份有限公司 A kind of encrypted transmission method and device based on Internet of Things

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022062980A1 (en) * 2020-09-23 2022-03-31 歌尔股份有限公司 Communication method and apparatus, and electronic device and storage medium
CN112636906A (en) * 2020-12-11 2021-04-09 海光信息技术股份有限公司 Key agreement method and device
CN112699352A (en) * 2021-03-23 2021-04-23 中国信息通信研究院 Trusted data acquisition terminal identity verification method, computer storage medium and electronic equipment
CN112699352B (en) * 2021-03-23 2021-06-18 中国信息通信研究院 Trusted data acquisition terminal identity verification method, computer storage medium and electronic equipment
CN113079022A (en) * 2021-03-31 2021-07-06 郑州信大捷安信息技术股份有限公司 Secure transmission method and system based on SM2 key negotiation mechanism
CN113079022B (en) * 2021-03-31 2022-02-18 郑州信大捷安信息技术股份有限公司 Secure transmission method and system based on SM2 key negotiation mechanism
CN114710359A (en) * 2022-04-15 2022-07-05 辽宁工控科技有限公司 Industrial network dynamic key management method and industrial network encryption communication method
CN114710359B (en) * 2022-04-15 2024-02-06 沈阳邦粹科技有限公司 Industrial network dynamic key management method and industrial network encryption communication method

Similar Documents

Publication Publication Date Title
US10812969B2 (en) System and method for configuring a wireless device for wireless network access
US11743726B2 (en) Access method and system of internet of things equipment based on 5G, and storage medium
Chaudhry et al. Securing demand response management: A certificate-based access control in smart grid edge computing infrastructure
CN107770182B (en) Data storage method of home gateway and home gateway
US10841784B2 (en) Authentication and key agreement in communication network
CN107454079B (en) Lightweight equipment authentication and shared key negotiation method based on Internet of things platform
CN111130769A (en) Internet of things terminal encryption method and device
CN110336774B (en) Mixed encryption and decryption method, equipment and system
US9843579B2 (en) Dynamically generated SSID
CN107637039B (en) System for performing owner transfer and method and system for transferring ownership of device
WO2019153701A1 (en) Method and apparatus for obtaining device identification
EP3700124B1 (en) Security authentication method, configuration method, and related device
US10680835B2 (en) Secure authentication of remote equipment
CN104145465A (en) Group based bootstrapping in machine type communication
EP2924944B1 (en) Network authentication
CN105553666B (en) Intelligent power terminal safety authentication system and method
CN113099443A (en) Equipment authentication method, device, equipment and system
CN105635062A (en) Network access equipment verification method and device
CN112769568B (en) Security authentication communication system and method in fog computing environment and Internet of things equipment
CN113572765B (en) Lightweight identity authentication key negotiation method for resource-limited terminal
CN113473458B (en) Device access method, data transmission method and computer readable storage medium
CN112566119A (en) Terminal authentication method and device, computer equipment and storage medium
WO2018222132A3 (en) Network authentication method, network device and core network device
Erroutbi et al. Secure and lightweight HMAC mutual authentication protocol for communication between IoT devices and fog nodes
WO2017020530A1 (en) Enhanced wlan certificate authentication method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200508

RJ01 Rejection of invention patent application after publication