CN1180566C - Method of realizing safe and reliable interconnection between network equipments - Google Patents
Method of realizing safe and reliable interconnection between network equipments Download PDFInfo
- Publication number
- CN1180566C CN1180566C CNB021294534A CN02129453A CN1180566C CN 1180566 C CN1180566 C CN 1180566C CN B021294534 A CNB021294534 A CN B021294534A CN 02129453 A CN02129453 A CN 02129453A CN 1180566 C CN1180566 C CN 1180566C
- Authority
- CN
- China
- Prior art keywords
- access device
- application access
- equipment
- network
- asset management
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Small-Scale Networks (AREA)
Abstract
The present invention discloses a method for realizing the secure and reliable interconnection between network equipment. The present invention is characterized in that when equipment requesting for access registers in a network, a connection authentication cipher key of the equipment is firstly configured; after the registration authentication of the equipment is successful, connected equipment at the opposite end confirms a secure transmission rank and a network resource use right according to the configured connection authentication cipher key for realizing secure data transmission between the equipment. The adoption of the method can ensure and increase the secure reliability of the interconnection and the use of household equipment in a digital family network.
Description
Technical field
The present invention relates to a kind of security mechanism, be meant a kind of implementation method that is applicable to the assurance safe and reliable interconnection between network equipments in digital home network or the minimized office network especially.
Background of invention
Raising along with people's living standard, equipment such as the information equipment in the home-ranges, communication apparatus, amusement equipment, household electrical appliance, automation equipment, guard monitor device increase gradually, simultaneously, because the rapid progress of the flourish and smart machine of personal computer and internet popularizing rapidly in the family, telecom technology, home network is subjected to extensive concern day by day, and people also more show strong for demand simple, flexible and home network reliably.So, proposed much such as: Smart Home (Smart Home), electronic family (Electronic Home, e-Home), the home network notion of digital home (DigitalFamily), network home (Network Home), intelligent family (Intelligent Home).Concretely, home network (Home network) is actual to comprise four layers of implication: 1. the information equipment in the family, communication apparatus, amusement equipment, household electrical appliance, automation equipment, guard monitor device etc. interconnect, resource-sharing, form the home intelligence network system; 2. by gateway and community, Internet connection, realize information exchange with family's external environment condition; 3. the network of the equipment of family and connection thereof should satisfy the primary demand of people's safety, convenience, comfortable, healthy and environmental protection, for people provide body and mind joyful experience; 4. embody the theory that people-oriented, be easy to use, safe and reliable, maintain easily, price is suitable, satisfies the characteristics of life at home.
In view of this, the applicant has proposed a kind of digital family network system in another patent application, as shown in Figure 1, this system mainly is made of gateway 11, an above backbone network equipment 12 and a plurality of control subnet equipment 13, this gateway 11 may further include two parts: link to each other by broadband interface between door gateway 110 and the control gateway 111, door gateway 110 and control gateway 111.Based on this system configuration as can be seen, this digital home network is made up of backbone network and two subnets of control subnet, wherein, be called backbone network by door gateway 110 and the formed network portion of connected housed device, backbone network is mainly used in the interconnection that realizes information equipment, communication apparatus, amusement equipment etc.; And being called the control subnet by control gateway 111 and the formed network portion of connected housed device, the control subnet master is used to realize the interconnection of equipment such as household electrical appliance, automation equipment, guard monitor device.
The core concept of digital home network is exactly: make housed device interconnection and interflow, resource-sharing on the network.So, how to guarantee the equipment operate as normal, guarantee data integrity and confidentiality then seems particularly important.At present, in various communication networks, all have safety certification or secure communication mechanism, traditional information security flow process, shown in step 201 among Fig. 2~205: system reads the password of active user's input earlier or transmits the password in the password territory in the data; Reading safe key then from the inherently safe handling procedure compares with the password of reading; Judge whether password is identical with key,, then enter step 204 operation down-stream if the result is true, promptly identical; If the result is false, promptly different, then enter step 205 interrupt routine or enter recurrent state, wait for and re-enter password or transmission data.
Generally in the various types of communication network, authentication operations when equipment or user insert or register is absolutely necessary, but transfer of data after inserting or registering and Internet resources use does not then have unified safety assurance, does not all consider the security mechanism that transfer of data and resource are used usually.And the information security issue in the digital home network and other network are not quite alike, what relate generally in home-ranges is the rights of using problem of the legal access and the service of equipment, consider many-sided particular problems such as ease for use of use simultaneously again, so with traditional general secured fashion too simple in some cases, too complicated again in some cases, can't satisfy user's demand, therefore, in home network, also not propose the security mechanism solution that is fit at present.
Summary of the invention
In view of this, main purpose of the present invention is to provide a kind of method that realizes safe and reliable interconnection between network equipments, to guarantee and to improve equipment room interconnection in the network and security reliability when using.
For achieving the above object, technical scheme of the present invention is achieved in that
A kind of method that realizes safe and reliable interconnection between network equipments, this method comprises:
When the application access device is registered, dispose the connection authenticate key of this application access device earlier in network; After the success of this application access device authentication registration, that be connected with this application access device and successfully registration opposite equip. that this application access device arranged determine the safe transmission rank and the Internet resources rights of using of current application access device according to connection authenticate key that is disposed and the logon mode that self is provided with; Needs set up the current application access device of escape way and successfully registration have between the opposite equip. of this application access device and set up the Transport Layer Security passage, realize the secure data transmission of equipment room.
The connection authenticate key of described application access device is by the cipher key configuration hypervisor granting in the asset management device that is attached thereto.In this case, asset management device can allow the registration network equipment thereon to share the same authenticate key that is connected with all, and the Internet resources rights of using of then described definite current application access device are: the current application access device of asset management device mandate uses registered all-network resource; The described escape way of setting up is: serve as that the Transport Layer Security passage is set up in the basis between current application access device and asset management device with the connection authenticate key of sharing directly, realize the secure data transmission of equipment room.
Asset management device also can allow the registration network equipment thereon to share different connection authenticate keys with each, and the Internet resources rights of using of then described definite current application access device are: the current application access device of asset management device mandate uses registered common network resource.This method further comprises: produce same shared connection authenticate key by asset management device between two or more equipment, authorize the private network resource of sharing mutually between the network equipment that has same connection authenticate key separately; The described escape way of setting up is: the shared connection authenticate key with generation is that the Transport Layer Security passage between current application access device and the asset management device is set up on the basis, realizes the secure data transmission of equipment room.
The connection authenticate key of described application access device also can be configured by the application program of equipment self setting, and this layoutprocedure is finished in this locality, or is finished by remote equipment control.So, this method further comprises: when interconnecting between two network equipments, to connect authenticate key, determine transmission security key by the auto-negotiation mode, realize the equipment room secure data transmission.
Method of the present invention can further comprise: asset management device promptly allows this application access device successfully to register after receiving the register requirement of application access device; The Internet resources rights of using of then described definite current application access device are: authorize current application access device to use registered common network resource, and allow equipment room directly to transmit data.
In the such scheme, the network that the application access device inserts can be digital home network, or the minimized office network.
Therefore, the method of realization safe and reliable interconnection between network equipments provided by the present invention, owing to when facility registration, just this equipment is connected the authenticate key setting, and according to the last shared key of determining between this equipment and the asset management device or between two interconnect equipments, further determine the Internet resources rights of using and the safe transmission rank of this equipment, thereby guaranteed the security reliability of LA Management Room communication from registration, interconnection, transfer of data to resource-sharing.
Description of drawings
The domestic network system structural representation that Fig. 1 adopts for the present invention;
Fig. 2 is traditional information security handling process schematic diagram;
Fig. 3 is the housed device register flow path schematic diagram when having asset management device;
Fig. 4 is the housed device register flow path schematic diagram when not having asset management device;
Fig. 5 is the schematic diagram of cipher key configuration process among the present invention;
Fig. 6 is the facility registration flow chart that asset management device and all devices are shared a key;
Fig. 7 is the facility registration flow chart of asset management device logon mode for shared key.
Embodiment
Each housed device in the digital home network is equipped with the level of security of self, comprising: authentication security rank, data transmission security rank and authorizing secure rank.Table 1~table 3 has provided the definition and the explanation thereof of device authentication rank, transfer level and authority levels successively.Wherein, table 1 is a device security level definition table; Table 2 is the data transmission security level definition table of equipment; Table 3 is the authority levels definition list of equipment.
Certification level | Value | Explanation |
Need not authentication | ?1 | Anonymous |
Authentication I | ?2 | CHAP agreement based on symmetric key |
Authentication II | ?3 | CHAP agreement based on PKI-X.509 certificate mode |
Table 1
The data transmission security rank | Value | Explanation |
Plaintext transmission I | ?1 | No parity check |
Plaintext transmission II | ?2 | Completeness check |
The ciphertext transmission | ?3 | Message authentication, completeness check |
Confidential transmissions | ?4 | Confidentiality, integrality, non-repudiation (signature authentication), preventing playback attack (timestamp) |
Table 2
Authority levels | Value | Explanation |
Certificate Authority | 1 | Safety certification is mandate |
The local mandate | 2 | By local authorization list mandate |
The third party authorizes | 3 | By the aaa server mandate |
Table 3
Be example with the device A registration process below, specify the implementation method of safe and reliable interconnection between home network device in conjunction with the accompanying drawings.
In digital home network, all need earlier through safety certification when interconnecting between housed device and the asset management device or between the housed device.Herein, family's asset management device of being mentioned is meant the equipment that facility registration and service index function can be provided in family's network range, such as: door gateway, control gateway or server.As shown in Figure 3, when the home network resource management equipment existed, equipment wanted to add this home network, just must register to asset management device.Asset management device is initiated authentication to this equipment during registration, and authentication is by then this facility registration success.Authenticate key is responsible for by special cipher key configuration hypervisor, and this program can be on asset management device, also can be on other any equipment that interactive capability arranged.
Exist when asset management device but have when a plurality of, for the housed device of applying for the registration of, to judge earlier whether it has disposed the asset management device of appointment, if have, then whether this equipment is by existing the asset management device of appointment in the equipment search procedure Network Search, if exist, then device A is to this asset management device initiating equipment register requirement.If this equipment does not dispose the asset management device of appointment, its first all asset management devices then by existing in the equipment search procedure Network Search, and will self be registered on one of them asset management device that is fit to.
Do not exist under the situation of family's asset management device, as shown in Figure 4, its security mechanism with exist the situation of family's asset management device similar, just equipment and verification process between the asset management device have become the authentication that is connected between the equipment.
For the housed device on the home network, key obtain two kinds of approach: be responsible for the key granting by the cipher key configuration hypervisor that is provided with on the asset management device; Or be configured by the application program of equipment self setting.When having asset management device, normally be responsible for the key granting by the cipher key configuration hypervisor, the cipher key configuration hypervisor can be identical or different to the key of different housed device grantings.This cipher key configuration hypervisor not only is responsible for the configuration of authenticate key between equipment and the asset management device, also is responsible for connecting between the configuration device granting of authenticate key simultaneously.Its layoutprocedure as shown in Figure 5, cipher key configuration hypervisor multicast sends authenticated configuration message, after each equipment is received this message, if judge to lay oneself open to and do not set key state, then respond this message, send the cipher key configuration request, these requests are responded, corresponding secret key is set by the cipher key configuration hypervisor.Generally, equipment all is provided with default key when dispatching from the factory, and configuration manager need be known default key when carrying out cipher key configuration.
And when not having asset management device, the equipment room attachment security is based on private key, the connection authenticate key that is to say equipment room is by consulting between concrete two equipment, the purposes of the connection authenticate key of equipment room is based on this key, set up the transmission security key between two equipment, so that carry out safe transmission.
Among the present invention, when equipment room direct interconnection or asset management device are not initiatively sent out authenticated configuration message in the multicast mode, the configuration of authentication connection authenticate key is the demand according to the user fully, set in advance by man-machine interaction, this layoutprocedure can realize in this locality, also can finish by far-end setting.
Facility registration mainly is an authentication process between equipment and the asset management device to the process of asset management device.Asset management device can be set two kinds of facility registration modes: open (Open) mode and shared key (Shared Key) mode.
When the logon mode of asset management device setting is the Open mode, any to asset management device application for registration equipment, only need to initiate register requirement, all allow registration; And license that all security attributes are the Service Source of public (Public) in the asset management device record; Data transfer between devices is not considered encryption and decryption yet, uses expressly form transmission.
When the logon mode of asset management device setting is Shared Key mode, divide two kinds of situations again:
A kind of is that asset management device allows the equipment of registration to share the same authenticate key Key that is connected with all, as shown in Figure 6.When an equipment is applied for the registration of, confirm by the authentication mechanism of challenge response (CHAP) whether this equipment has cipher key shared Key.If have, then authentication is passed through, and allows registration, and all facilities that succeed in registration all trust each other, and licenses all resources that all were registered.As required, can be that Transport Layer Security (TLS) passage, the secure data transmission between the realization equipment are set up in the basis between the equipment that succeeds in registration with shared key K ey.
Another kind is to allow in the equipment of registration, and different equipment can be shared the different authenticate key Key that are connected with asset management device.When an equipment is applied for the registration of, confirm by the authentication mechanism of challenge response (CHAP) whether this equipment has the key of the equipment correspondence of being declared, if have, then succeed in registration, but do not have direct trusting relationship between all equipment that succeed in registration, only allowing attribute safe in utilization under the general situation is the Service Source of Public.But, can be by effect in the middle of the asset management device, produce to share key K ey, set up between two equipment or the safe trusting relationship between the device cluster, satisfy the equipment of safe trusting relationship can mutual attribute safe in utilization the Service Source that is privately owned (Private).Equipment with safe trusting relationship, as required, the shared key that can utilize asset management device to produce is set up the TLS passage between them, realizes the data security transmission.Need to prove that security mechanism of the present invention can realize based on DSE arithmetic, can realize based on public-key cryptosystem again.Wherein, DSE arithmetic is meant and adds, deciphers the same key of employing; And public-key cryptosystem is meant and adds, deciphers that to adopt different keys, these two kinds of cryptographic systems are two kinds of standard systems that realize secure communication.
Be set to the asset management device of Shared Key mode for security strategy, suppose that device A is the housed device of applying for the registration of, as shown in Figure 7, the safety certification between device A and the asset management device comprises the steps: at least
Step 701~702: device A is sent out login request message to asset management device, after asset management device is received the request of device A, note the relevant information of device A earlier, send registration reply message to device A then, in response message, comprise challenging value (ChallengeValue) and authentication algorithm sign (AuthenticationAlgorithm ID).Wherein, challenging value is by the asset management device picked at random; The type of AuthenticationAlgorithm is as shown in table 4, and table 4 is the table of comparisons of equipment identities identifying algorithm sign with algorithm types.
AuthenticationAlgorithm?ID | Algorithm |
CHAP-MD5 | Challenge response based on hash function MD5 |
CHAP-SHA | Challenge response based on hash function SHA |
CHAP-DES | Challenge response based on the des encryption algorithm |
CHAP-RSA | Challenge response based on public key algorithm RSA |
CHAP-ECC | Challenge response based on elliptic curve cryptography |
Table 4
Step 703: after device A receives authentication algorithm identifier ID and ChallengeValue, use the connection authenticate key (Key) of oneself that ChallengeValue is encrypted, the login request message of value (Response), and transmission in response is to asset management device.
Step 704~707: after asset management device receives Response, oneself also utilize the corresponding connection authenticate key Key of ID that declares with device A that ChallengeValue is encrypted, if Response=Encrypt (KeyID, ChallengeValue), then allow this facility registration, simultaneously send the response of succeeding in registration, and perform the environmental condition of connection to device A; If Response ≠ Encrypt (KeyID ChallengeValue), does not then allow this facility registration, sends the response that authority is forbidden to device A simultaneously, and from the asset management device database relevant information of sweep equipment A.
Above-mentioned steps is a facility registration and an overall process that disposes security parameter, though the login request message that is sent in step 703 is identical with the message name of the initial login request message that sends of equipment in the step 701, but wherein contained content difference, contain a sequence number in each registration message, what current execution was described is which of facility registration in step, to distinguish the difference of login request message.
Claims (12)
1, a kind of method that realizes safe and reliable interconnection between network equipments is characterized in that this method comprises:
When the application access device is registered, dispose the connection authenticate key of this application access device earlier in network; After the success of this application access device authentication registration, that be connected with this application access device and successfully registration opposite equip. that this application access device arranged determine the safe transmission rank and the Internet resources rights of using of current application access device according to connection authenticate key that is disposed and the logon mode that self is provided with; Needs set up the current application access device of escape way and successfully registration have between the opposite equip. of this application access device and set up the Transport Layer Security passage, realize the secure data transmission of equipment room.
2, method according to claim 1 is characterized in that, the connection authenticate key of described application access device is by the cipher key configuration hypervisor granting in the asset management device that is attached thereto.
3, method according to claim 2 is characterized in that, asset management device allows the registration network equipment thereon to share the same authenticate key that is connected with all.
4, method according to claim 3 is characterized in that, the Internet resources rights of using of described definite current application access device are: the current application access device of asset management device mandate uses registered all-network resource; The described escape way of setting up is: serve as that the Transport Layer Security passage is set up in the basis between current application access device and asset management device with the connection authenticate key of sharing directly, realize the secure data transmission of equipment room.
5, method according to claim 2 is characterized in that, asset management device allows the registration network equipment thereon to share different connection authenticate keys with each.
6, method according to claim 5 is characterized in that, the Internet resources rights of using of described definite current application access device are: the current application access device of asset management device mandate uses registered common network resource.
7, method according to claim 6, it is characterized in that, this method further comprises: produce same shared connection authenticate key by asset management device between two or more equipment, authorize the private network resource of sharing mutually between the network equipment that has same connection authenticate key separately; The described escape way of setting up is: the shared connection authenticate key with generation is that the Transport Layer Security passage between current application access device and the asset management device is set up on the basis, realizes the secure data transmission of equipment room.
8, method according to claim 1 is characterized in that, the connection authenticate key of described application access device is configured by the application program of equipment self setting.
9, method according to claim 8 is characterized in that, described application access device connects this locality that is configured in of authenticate key to be finished, or is finished by remote equipment control.
10, method according to claim 8 is characterized in that, this method further comprises: when interconnecting between two network equipments, to connect authenticate key, determine transmission security key by the auto-negotiation mode, realize the equipment room secure data transmission.
11, method according to claim 1 is characterized in that, asset management device promptly allows this application access device successfully to register after receiving the register requirement of application access device; The Internet resources rights of using of then described definite current application access device are: authorize current application access device to use registered common network resource, and allow equipment room directly to transmit data.
12, method according to claim 1 is characterized in that: the network of setting the access of application access device is a digital home network, or office network.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB021294534A CN1180566C (en) | 2002-08-26 | 2002-08-26 | Method of realizing safe and reliable interconnection between network equipments |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB021294534A CN1180566C (en) | 2002-08-26 | 2002-08-26 | Method of realizing safe and reliable interconnection between network equipments |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1479483A CN1479483A (en) | 2004-03-03 |
CN1180566C true CN1180566C (en) | 2004-12-15 |
Family
ID=34144164
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB021294534A Expired - Fee Related CN1180566C (en) | 2002-08-26 | 2002-08-26 | Method of realizing safe and reliable interconnection between network equipments |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1180566C (en) |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100459495C (en) * | 2004-08-01 | 2009-02-04 | 常志文 | Password dynamic enciphering inputmethod of public emipering mode |
CN100349434C (en) * | 2004-09-29 | 2007-11-14 | 中兴通讯股份有限公司 | Digital home safety network system |
KR100678897B1 (en) * | 2004-11-23 | 2007-02-07 | 삼성전자주식회사 | System and method for making a secure connection between home network devices |
CN1703004B (en) * | 2005-02-28 | 2010-08-25 | 联想(北京)有限公司 | Method for implementing network access authentication |
CN1863195B (en) * | 2005-05-13 | 2010-04-07 | 中兴通讯股份有限公司 | Family network system with safety registration function and method thereof |
CN100452737C (en) * | 2005-11-02 | 2009-01-14 | 华为技术有限公司 | Copyright managing method for digit household network and digital household network system |
KR101495722B1 (en) | 2008-01-31 | 2015-02-26 | 삼성전자주식회사 | Method and apparatus for guaranteeing communication security in home network |
CN103067166B (en) * | 2011-10-19 | 2017-09-29 | 海尔集团公司 | The stepped mixing encryption method and device of a kind of intelligent home system |
CN103838997A (en) * | 2012-11-20 | 2014-06-04 | 海尔集团公司 | Single-chip microcomputer password verification method and device |
EP2979420B1 (en) * | 2013-03-28 | 2019-07-03 | InterDigital CE Patent Holdings | Network system comprising a security management server and a home network, and method for including a device in the network system |
CN104320376B (en) * | 2014-08-28 | 2018-09-25 | 无锡天脉聚源传媒科技有限公司 | Connection method and the device of cloud and target cloud are initiated in a kind of request |
-
2002
- 2002-08-26 CN CNB021294534A patent/CN1180566C/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
CN1479483A (en) | 2004-03-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1905436B (en) | Method for ensuring data exchange safety | |
US5818936A (en) | System and method for automically authenticating a user in a distributed network system | |
US8971537B2 (en) | Access control protocol for embedded devices | |
Tootoonchian et al. | Lockr: better privacy for social networks | |
US6490679B1 (en) | Seamless integration of application programs with security key infrastructure | |
RU2439692C2 (en) | Policy-controlled delegation of account data for single registration in network and secured access to network resources | |
US7213262B1 (en) | Method and system for proving membership in a nested group using chains of credentials | |
KR20070037581A (en) | Anonymous certificates with anonymous certificate show | |
CN1180566C (en) | Method of realizing safe and reliable interconnection between network equipments | |
CN102984045A (en) | Access method of Virtual Private Network and Virtual Private Network client | |
US8788825B1 (en) | Method and apparatus for key management for various device-server configurations | |
CN113329003B (en) | Access control method, user equipment and system for Internet of things | |
KR101165350B1 (en) | An Authentication Method of Device Member In Ubiquitous Computing Network | |
Quercia et al. | Tata: Towards anonymous trusted authentication | |
Fugkeaw et al. | Multi-Application Authentication based on Multi-Agent System. | |
Fugkeaw et al. | A robust single sign-on model based on multi-agent system and PKI | |
Shin et al. | A secure anonymous password-based authentication protocol with control of authentication numbers | |
CN114900300B (en) | Cloud service temporary login key authentication method, device, equipment and storage medium | |
WO2024178929A1 (en) | Method, apparatus and system for accessing group | |
Coronado-García et al. | An autonomous decentralized system architecture using a software-based secure data field | |
CN115396085B (en) | Method and equipment for negotiating and authenticating based on biological characteristics and third secret key | |
US11943349B2 (en) | Authentication through secure sharing of digital secrets previously established between devices | |
Hwang et al. | Anonymity-based authenticated key agreement with full binding property | |
Long et al. | An Improved Needham-Schroeder Session Key Distribution Protocol for In-Vehicle CAN Network | |
Zhang et al. | A permission‐combination scalable access control model for Internet of things |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20041215 Termination date: 20200826 |