CN114221771B - Deep learning-oriented security token transmission and verification acceleration method and device - Google Patents

Deep learning-oriented security token transmission and verification acceleration method and device Download PDF

Info

Publication number
CN114221771B
CN114221771B CN202111458776.4A CN202111458776A CN114221771B CN 114221771 B CN114221771 B CN 114221771B CN 202111458776 A CN202111458776 A CN 202111458776A CN 114221771 B CN114221771 B CN 114221771B
Authority
CN
China
Prior art keywords
security token
fpga
verification
transmission
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111458776.4A
Other languages
Chinese (zh)
Other versions
CN114221771A (en
Inventor
请求不公布姓名
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Jianjiao Technology Service Co ltd
Original Assignee
Shanghai Jianjiao Technology Service Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Jianjiao Technology Service Co ltd filed Critical Shanghai Jianjiao Technology Service Co ltd
Priority to CN202111458776.4A priority Critical patent/CN114221771B/en
Publication of CN114221771A publication Critical patent/CN114221771A/en
Application granted granted Critical
Publication of CN114221771B publication Critical patent/CN114221771B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • G06F7/588Random number generators, i.e. based on natural stochastic processes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computational Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Pure & Applied Mathematics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a deep learning-oriented security token transmission and verification acceleration method and device. The method adopts an FPGA chip to realize the following steps: generating a security token based on the random memory sequence of the FPGA; completing the transmission of the security token by using a network bypass channel; and carrying out validity check on the security token. The invention can reduce the possibility of data leakage and tampering.

Description

Deep learning-oriented security token transmission and verification acceleration method and device
Technical Field
The invention relates to the technical field of data security, in particular to a deep learning-oriented security token transmission and verification acceleration method and device.
Background
With the advent and wide application of cloud computing technology, the original resource sharing mode is converted into a forward resource consumption mode due to the characteristics of cross-domain, heterogeneous and the like. Among cloud resource consumers, not only are a large number of users using cloud resources for a long period of time, but also some dynamic temporary users occasionally access cloud resources. In order to ensure data security, an agent is usually embedded in cloud resources, and the agent authenticates the dynamic temporary users through an identity authentication system in the institution, and then provides dynamic security tokens for the dynamic temporary users, so that the temporary users can access specific cloud resource services in the validity period by using the dynamic security tokens. However, the conventional computer architecture is required for the transmission and verification of the security token at present, and the data is easy to leak and tamper because the data needs to pass through a plurality of devices such as a network card, a memory, a CPU and the like.
Disclosure of Invention
The invention aims to solve the technical problem of providing a deep learning-oriented security token transmission and verification acceleration method and device, which can reduce the possibility of data leakage and tampering.
The technical scheme adopted for solving the technical problems is as follows: the method for transmitting and checking the security token oriented to deep learning is provided, and the following steps are realized by adopting an FPGA chip:
generating a security token based on the random memory sequence of the FPGA;
completing the transmission of the security token by using a network bypass channel;
and carrying out validity check on the security token.
The generation of the security token based on the random memory sequence of the FPGA specifically comprises the following substeps:
generating a true random number which is not less than a preset bit based on the random memory sequence of the FPGA;
registering a digital public key of the FPGA with a public key center based on the true random number;
solidifying a digital private key by a logic gate array circuit of the FPGA based on the true random number;
solidifying a security token generation algorithm by using a logic gate array circuit of the FPGA;
and generating a unique security token based on the digital private key by calling the security token generation algorithm.
The method for completing the transmission of the security token by using the network bypass channel specifically comprises the following substeps:
solidifying a network bypass transmission protocol by using a logic gate array circuit of the FPGA;
and carrying out interactive transmission of the security signaling at a preset rate through a bypass channel of the network link, and ensuring that the security token encapsulated and transferred in the security signaling is complete and effective through the network bypass transmission protocol.
The verification of the validity of the security token specifically comprises the following substeps:
solidifying a validity checking algorithm by using a logic gate array circuit of the FPGA;
the digital public key synchronization of all FPGA nodes in the network is ensured to be issued by the public key center through a network bypass transmission protocol;
and verifying the security tokens from FPGA nodes of other networks by adopting the validity verification algorithm based on the digital public keys which are synchronized locally.
The deep learning-oriented security token transmission and verification acceleration method further comprises the step of recovering and destroying the security token, and specifically comprises the following steps: the FPGA sets the effective life cycle of the security token; and for the security token needing to be recovered in advance before the effective lifetime is reached, synchronizing each FPGA node in the network in a broadcast mode through a network bypass channel, and carrying out local verification and elimination by each FPGA node before the effective lifetime of the security token is reached.
The technical scheme adopted for solving the technical problems is as follows: the utility model provides a security token transmission and check-up accelerating device towards deep learning, adopts the FPGA chip to realize, includes:
the security token generation module is used for generating a security token based on the random memory sequence of the FPGA;
the transmission module is used for completing the transmission of the security token by utilizing a network bypass channel;
and the verification module is used for verifying the validity of the security token.
The security token generation module comprises:
the true random number generation unit is used for generating true random numbers with not less than preset bits based on the random memory sequence of the FPGA;
a digital public key registration unit for registering the digital public key of the FPGA with a public key center based on the true random number;
the digital private key solidifying unit is used for solidifying the digital private key based on the true random number by a logic gate array circuit of the FPGA;
the security token algorithm generating unit is used for solidifying the security token generating algorithm by using the logic gate array circuit of the FPGA;
and the security token generation unit is used for generating a unique security token based on the digital private key by calling the security token generation algorithm.
The transmission module includes:
the network bypass transmission protocol solidifying unit is used for solidifying the network bypass transmission protocol by using the logic gate array circuit of the FPGA;
and the interactive transmission unit is used for carrying out interactive transmission of the security signaling at a preset rate through a bypass channel of the network link, and ensuring that the security token encapsulated and transferred in the security signaling is complete and effective through the network bypass transmission protocol.
The verification module comprises:
the verification algorithm solidifying unit is used for solidifying a validity verification algorithm by using a logic gate array circuit of the FPGA;
the digital public key synchronization unit is used for ensuring that the public key center distributes digital public key synchronization of all FPGA nodes in the network through a network bypass transmission protocol;
and the verification unit is used for verifying the security tokens from the FPGA nodes of other networks by adopting the validity verification algorithm based on the digital public keys which are synchronized locally.
The deep learning-oriented security token transmission and verification acceleration device further comprises a recovery destruction module, wherein the recovery destruction module receives synchronous information through a network bypass channel for the security token needing to be recovered in advance before the effective life period is reached, and performs local verification and elimination before the effective life period of the security token is reached.
Advantageous effects
Due to the adoption of the technical scheme, compared with the prior art, the invention has the following advantages and positive effects: the invention completes the generation, transmission and verification of the security token by using the FPGA, and as all data are processed and stored in the FPGA, the data are prevented from passing through a plurality of devices such as a network card, a memory, a CPU and the like, thereby reducing the possibility of data leakage and tampering.
Drawings
Fig. 1 is a flow chart of a first embodiment of the present invention.
Detailed Description
The invention will be further illustrated with reference to specific examples. It is to be understood that these examples are illustrative of the present invention and are not intended to limit the scope of the present invention. Further, it is understood that various changes and modifications may be made by those skilled in the art after reading the teachings of the present invention, and such equivalents are intended to fall within the scope of the claims appended hereto.
The first embodiment of the invention relates to a deep learning-oriented security token transmission and verification acceleration method, which is implemented by adopting an FPGA chip as shown in fig. 1, and comprises the following steps:
and step 1, generating a security token based on the random memory sequence of the FPGA. The method specifically comprises the following steps: step 1a, generating a true random number of not less than 4096 bits based on a random memory sequence of the FPGA; step 1b, registering a digital public key of the FPGA with a public key center based on the true random number; step 1c, solidifying a digital private key by a logic gate array circuit of the FPGA based on the true random number; step 1d, solidifying a security token generation algorithm by using a logic gate array circuit of the FPGA; and step 1e, generating a unique security token based on the digital private key by calling the security token generation algorithm.
And 2, completing the transmission of the security token by using a network bypass channel. The method specifically comprises the following steps: step 2a, solidifying a network bypass transmission protocol by using a logic gate array circuit of the FPGA; step 2b, carrying out interactive transmission of security signaling at a rate not exceeding 1Mbps through a bypass channel of the network link; and 2c, ensuring that the security token encapsulated and transferred in the security signaling is complete and effective through the network bypass transmission protocol.
And 3, carrying out validity verification on the security token. The method specifically comprises the following steps: step 3a, solidifying a validity checking algorithm by using a logic gate array circuit of the FPGA; step 3b, ensuring that a public key center issues digital public key synchronization of all FPGA nodes in a network through a network bypass transmission protocol; and 3c, checking the security tokens from FPGA nodes of other networks by adopting the validity checking algorithm based on the digital public keys which are synchronized locally.
And 4, recycling and destroying the security token. The method comprises the following steps: step 4a, the FPGA sets the effective life cycle of the security token; and 4b, synchronizing the security tokens needing to be recovered in advance before the effective life time is reached to each FPGA node in the network in a broadcast mode through a network bypass channel, and carrying out local verification and elimination by each FPGA node before the effective life time of the security tokens is reached.
It is easy to find that the method and the device complete the generation, transmission, verification and recovery destruction of the security token by using the FPGA, and as all data are processed and stored in the FPGA, the data are prevented from being required to pass through a plurality of devices such as a network card, a memory and a CPU, and the possibility of data leakage and tampering is reduced.
The second embodiment of the invention relates to a deep learning-oriented security token transmission and verification acceleration device, which is realized by adopting an FPGA chip and comprises: the security token generation module is used for generating a security token based on the random memory sequence of the FPGA; the transmission module is used for completing the transmission of the security token by utilizing a network bypass channel; and the verification module is used for verifying the validity of the security token.
The security token generation module comprises: the true random number generation unit is used for generating true random numbers with not less than preset bits based on the random memory sequence of the FPGA; a digital public key registration unit for registering the digital public key of the FPGA with a public key center based on the true random number; the digital private key solidifying unit is used for solidifying the digital private key based on the true random number by a logic gate array circuit of the FPGA; the security token algorithm generating unit is used for solidifying the security token generating algorithm by using the logic gate array circuit of the FPGA; and the security token generation unit is used for generating a unique security token based on the digital private key by calling the security token generation algorithm.
The transmission module includes: the network bypass transmission protocol solidifying unit is used for solidifying the network bypass transmission protocol by using the logic gate array circuit of the FPGA; and the interactive transmission unit is used for carrying out interactive transmission of the security signaling at a preset rate through a bypass channel of the network link, and ensuring that the security token encapsulated and transferred in the security signaling is complete and effective through the network bypass transmission protocol.
The verification module comprises: the verification algorithm solidifying unit is used for solidifying a validity verification algorithm by using a logic gate array circuit of the FPGA; the digital public key synchronization unit is used for ensuring that the public key center distributes digital public key synchronization of all FPGA nodes in the network through a network bypass transmission protocol; and the verification unit is used for verifying the security tokens from the FPGA nodes of other networks by adopting the validity verification algorithm based on the digital public keys which are synchronized locally.
The deep learning-oriented security token transmission and verification acceleration device further comprises a recovery destruction module, wherein the recovery destruction module receives synchronous information through a network bypass channel for the security token needing to be recovered in advance before the effective life period is reached, and performs local verification and elimination before the effective life period of the security token is reached.

Claims (4)

1. The deep learning-oriented security token transmission and verification acceleration method is characterized by comprising the following steps of:
generating a security token based on the random memory sequence of the FPGA specifically comprises the following steps:
generating a true random number which is not less than a preset bit based on the random memory sequence of the FPGA;
registering a digital public key of the FPGA with a public key center based on the true random number;
solidifying a digital private key by a logic gate array circuit of the FPGA based on the true random number;
solidifying a security token generation algorithm by using a logic gate array circuit of the FPGA;
generating a unique security token based on the digital private key by invoking the security token generation algorithm;
the method for completing the transmission of the security token by using the network bypass channel specifically comprises the following steps:
solidifying a network bypass transmission protocol by using a logic gate array circuit of the FPGA;
interactive transmission of security signaling is carried out at a preset rate through a bypass channel of a network link, and the integrity and effectiveness of the security token encapsulated and transferred in the security signaling are ensured through the network bypass transmission protocol;
the validity verification of the security token specifically comprises the following steps:
solidifying a validity checking algorithm by using a logic gate array circuit of the FPGA;
the digital public key synchronization of all FPGA nodes in the network is ensured to be issued by the public key center through a network bypass transmission protocol; and verifying the security tokens from FPGA nodes of other networks by adopting the validity verification algorithm based on the digital public keys which are synchronized locally.
2. The deep learning oriented security token transmission and verification acceleration method of claim 1, further comprising the step of reclaiming and destroying the security token, in particular: the FPGA sets the effective life cycle of the security token; and for the security token needing to be recovered in advance before the effective lifetime is reached, synchronizing each FPGA node in the network in a broadcast mode through a network bypass channel, and carrying out local verification and elimination by each FPGA node before the effective lifetime of the security token is reached.
3. The deep learning-oriented security token transmission and verification acceleration device is characterized by being realized by adopting an FPGA chip, and comprises:
the security token generation module is used for generating a security token based on the random memory sequence of the FPGA; the security token generation module comprises:
the true random number generation unit is used for generating true random numbers with not less than preset bits based on the random memory sequence of the FPGA;
a digital public key registration unit for registering the digital public key of the FPGA with a public key center based on the true random number;
the digital private key solidifying unit is used for solidifying the digital private key based on the true random number by a logic gate array circuit of the FPGA;
the security token algorithm generating unit is used for solidifying the security token generating algorithm by using the logic gate array circuit of the FPGA; a security token generation unit for generating a unique security token based on the digital private key by calling the security token generation algorithm;
the transmission module is used for completing the transmission of the security token by utilizing a network bypass channel; the transmission module includes:
the network bypass transmission protocol solidifying unit is used for solidifying the network bypass transmission protocol by using the logic gate array circuit of the FPGA;
the interactive transmission unit is used for carrying out interactive transmission of the security signaling at a preset rate through a bypass channel of a network link, and ensuring that the security token encapsulated and transferred in the security signaling is complete and effective through the network bypass transmission protocol;
the verification module is used for verifying the validity of the security token; the verification module comprises:
the verification algorithm solidifying unit is used for solidifying a validity verification algorithm by using a logic gate array circuit of the FPGA;
the digital public key synchronization unit is used for ensuring that the public key center distributes digital public key synchronization of all FPGA nodes in the network through a network bypass transmission protocol;
and the verification unit is used for verifying the security tokens from the FPGA nodes of other networks by adopting the validity verification algorithm based on the digital public keys which are synchronized locally.
4. The deep learning oriented security token transmission and verification acceleration device of claim 3, further comprising a recycling destruction module, wherein the recycling destruction module receives synchronization information through a network bypass channel for a security token that needs to be recycled in advance before the effective lifetime is reached, and performs local verification and elimination before the effective lifetime of the security token is reached.
CN202111458776.4A 2021-12-02 2021-12-02 Deep learning-oriented security token transmission and verification acceleration method and device Active CN114221771B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111458776.4A CN114221771B (en) 2021-12-02 2021-12-02 Deep learning-oriented security token transmission and verification acceleration method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111458776.4A CN114221771B (en) 2021-12-02 2021-12-02 Deep learning-oriented security token transmission and verification acceleration method and device

Publications (2)

Publication Number Publication Date
CN114221771A CN114221771A (en) 2022-03-22
CN114221771B true CN114221771B (en) 2024-01-30

Family

ID=80699405

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111458776.4A Active CN114221771B (en) 2021-12-02 2021-12-02 Deep learning-oriented security token transmission and verification acceleration method and device

Country Status (1)

Country Link
CN (1) CN114221771B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103220280A (en) * 2013-04-03 2013-07-24 天地融科技股份有限公司 Dynamic password token and data transmission method and system for dynamic password token
GB201510528D0 (en) * 2015-06-16 2015-07-29 Provost Fellows Foundation Scholars & The Other Members O Board Of The College Of The Holy & Undiv T Digital token exchange system
WO2017167771A1 (en) * 2016-03-29 2017-10-05 Koninklijke Philips N.V. Handshake protocols for identity-based key material and certificates
CN111371556A (en) * 2020-02-21 2020-07-03 运易通科技有限公司 Block link point accounting method, device, equipment and storage medium
CN112560067A (en) * 2020-12-25 2021-03-26 平安普惠企业管理有限公司 Access method, device and equipment based on token authority verification and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103220280A (en) * 2013-04-03 2013-07-24 天地融科技股份有限公司 Dynamic password token and data transmission method and system for dynamic password token
GB201510528D0 (en) * 2015-06-16 2015-07-29 Provost Fellows Foundation Scholars & The Other Members O Board Of The College Of The Holy & Undiv T Digital token exchange system
WO2017167771A1 (en) * 2016-03-29 2017-10-05 Koninklijke Philips N.V. Handshake protocols for identity-based key material and certificates
CN111371556A (en) * 2020-02-21 2020-07-03 运易通科技有限公司 Block link point accounting method, device, equipment and storage medium
CN112560067A (en) * 2020-12-25 2021-03-26 平安普惠企业管理有限公司 Access method, device and equipment based on token authority verification and storage medium

Also Published As

Publication number Publication date
CN114221771A (en) 2022-03-22

Similar Documents

Publication Publication Date Title
CN109274505B (en) Anonymous electronic election method based on block chain technology
CN111726226B (en) Signature system, signature method, first server and storage medium
CN103078744B (en) Public key-based bidirectional radio frequency identification authorization method
CN109257346B (en) Concealed transmission system based on block chain
CN105912618A (en) Block chain based charging pile charging transaction communication method and device
CN1799018A (en) Securing access to an application service based on a proximity token
CN109815051A (en) The data processing method and system of block chain
US9338003B2 (en) Secure modules using unique identification elements
CN105812366A (en) Server, anti-crawler system and anti-crawler verification method
CN109936620B (en) Block chain-based storage method, device, system and storage medium
CN113378148A (en) Internet of things equipment identity authentication system and method based on block chain
CN115442047A (en) Electronic signature method and system for business management file
US20210184854A1 (en) Device validation using tokens
Al-madani et al. IoT data security via blockchain technology and service-centric networking
CN109831479A (en) The data processing method and system of block chain
CN113822675A (en) Block chain based message processing method, device, equipment and storage medium
CN100476844C (en) Method for realizing binding function between electronic key and computer
CN114221771B (en) Deep learning-oriented security token transmission and verification acceleration method and device
CN103198526B (en) The concurrent operations method of the multiple board units of roadside unit process
CN112926983A (en) Block chain-based deposit certificate transaction encryption system and method
CN109698839B (en) Desensitization data comparison method and device based on asymmetric algorithm
CN106254341A (en) Data fingerprint extracting method and system for centralized electronic data safety system
CN113938496B (en) Block chain network method and system based on Internet of things equipment
CN115766023A (en) Encryption algorithm-based vehicle cross-functional domain secret key and certificate dynamic updating system
CN116132058A (en) Block chain consensus method, apparatus, device and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant