WO2018086004A1 - 安全通信的方法、受控装置及设备、遥控装置及设备 - Google Patents

安全通信的方法、受控装置及设备、遥控装置及设备 Download PDF

Info

Publication number
WO2018086004A1
WO2018086004A1 PCT/CN2016/105171 CN2016105171W WO2018086004A1 WO 2018086004 A1 WO2018086004 A1 WO 2018086004A1 CN 2016105171 W CN2016105171 W CN 2016105171W WO 2018086004 A1 WO2018086004 A1 WO 2018086004A1
Authority
WO
WIPO (PCT)
Prior art keywords
remote control
control device
variable
message
preset relationship
Prior art date
Application number
PCT/CN2016/105171
Other languages
English (en)
French (fr)
Inventor
陈少伟
Original Assignee
国民技术股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 国民技术股份有限公司 filed Critical 国民技术股份有限公司
Priority to CN201680010430.9A priority Critical patent/CN107466466B/zh
Priority to PCT/CN2016/105171 priority patent/WO2018086004A1/zh
Publication of WO2018086004A1 publication Critical patent/WO2018086004A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic

Definitions

  • the present invention relates to the field of information security, and in particular, to a method, a controlled device and device, a remote control device and a device for secure communication.
  • the remote control device When the remote control device communicates with the controlled device, it is generally transmitted through a radio frequency signal such as Bluetooth. At this time, the interval of messages sent by the remote control device is very short, generally 7ms.
  • the controlled device should verify the legitimacy of this message within 7ms, and generally cannot be implemented by a complicated protocol such as the traditional three-way handshake; and because of the openness of the radio protocol, it is not a point-to-point transmission, but a broadcast transmission method similar to broadcasting. This allows the controlled device to accept information sent by any RF device in its frequency band. Therefore, if the controlled device cannot authenticate the legitimacy of the remote control device with which it communicates, the legitimacy of the received message cannot be judged; further, the message of the communication is easily intercepted and thus replayed.
  • a current solution is to use a frequency hopping sequence to improve the communication security level.
  • the frequency of each communication is different.
  • the internal frequency hopping sequence preset in the device is used to continuously change the communication frequency for security protection.
  • the hopping sequence is easily acquired by a third party, so it is easy for a third party to find its communication frequency, thereby conducting a malicious message attack and gaining control of the controlled device.
  • the technical problem to be solved by the present invention is to provide a method, a controlled device and a device, a remote control device and a device for secure communication, which can solve the problem that the prior art controlled device is easily attacked by malicious messages.
  • a technical solution adopted by the present invention is to provide a secure communication method, including:
  • the controlled device verifies the remote device identity information and determines whether a first preset relationship is satisfied between the first variable and a second variable stored in the controlled device, the first variable and the first The second variable satisfies the second preset relationship in the initial state before the message is sent, and the first variable should be changed to satisfy the first preset relationship every time the remote control device sends the message;
  • the first variable and the second variable are both count values
  • the first preset relationship means that the first variable is greater than a second variable
  • the second preset relationship is that the first variable is equal to the The second variable.
  • the method further includes:
  • the controlled device replaces the second variable it holds with the first variable.
  • the message is request binding information, and after the determining is that the message is valid, the method includes:
  • the controlled device saves identity information of the remote control device to bind the remote control device;
  • the level information characterizing the priority level of the remote control device is saved.
  • the remote control device is defined as a first remote control device, and the saving of the level information indicating the priority level of the remote control device includes:
  • the controlled device receives the connection request information sent by the second remote control device, the identity information and the level information of the second remote control device are saved in the controlled device, and the connection request information includes the identity information of the remote control device. ;
  • Receiving a connection request of the second remote control device preferentially processing a message of the second remote control device, or disconnecting the first remote control device when a priority level of the second remote control device is higher than the first remote control device Connection, otherwise suspend processing or discarding the connection request information of the second remote control device.
  • the identity information of the remote control device includes the remote control device ID, the remote control device ID and a private key signature value of the first variable, a public key certificate of the remote control device, and the controlled device verifies the remote control device
  • the identity information specifically includes:
  • the message is operation information, and before the controlled device receives the message sent by the remote control device, the method includes:
  • the controlled device receives connection request information sent by the remote control device, the connection request information includes identity information of the remote control device, and the identity information of the remote control device includes the remote control device ID and a private key of the remote control device ID a signature value; the verified device verifying the identity information of the remote control device specifically includes:
  • connection request information If the verification is passed, it is determined that the connection request information is valid, otherwise it is determined to be invalid.
  • the determining, after the determining that the connection request message is valid, includes: the controlled device negotiating with the remote control device to obtain a session key;
  • the operation information is encrypted by a cryptographic algorithm, and the session key is used to encrypt an encryption key used by the cryptographic algorithm, and the session key is obtained by renegotiating each connection.
  • the cryptographic algorithm is a packet ciphering algorithm.
  • Another technical solution adopted by the present invention is to provide a method for secure communication, including:
  • the remote control device sends a message to the controlled device, the message including at least the identity information of the remote control device and the first variable;
  • the identity information of the remote control device is used for verification by the controlled device and determining whether a first preset relationship is satisfied between the first variable and a second variable stored in the controlled device.
  • the first variable and the second variable satisfy a second preset relationship in an initial state before the message is sent, and each time the remote control device sends the message, the first variable should satisfy the first The default relationship changes.
  • the first variable and the second variable are both count values
  • the first preset relationship means that the first variable is greater than a second variable
  • the second preset relationship is that the first variable is equal to the The second variable.
  • the message is request binding information, and the identity information of the remote control device includes the remote control device ID, the remote control device ID and a private key signature value of the first variable, and a public key certificate of the remote control device;
  • the public key certificate is used to verify the validity of the private key signature value.
  • the message is operation information, and before the remote control device sends a message to the controlled device, the method includes:
  • connection request information including identity information of the remote control device, the remote device identity information including the remote control device ID, a private key signature value of the remote control device ID;
  • the private key signature value is used for verification by the controlled device using a pre-saved public key.
  • the method includes:
  • the operation information is encrypted by a cryptographic algorithm, and the session key is used to encrypt an encryption key used by the cryptographic algorithm, and the session key is obtained by renegotiating each connection.
  • a controlled device including:
  • a receiving module configured to receive a message sent by the remote control device, where the message includes at least identity information of the remote control device and a first variable;
  • a verification module configured to verify the remote device identity information and determine whether a first preset relationship is satisfied between the first variable and a second variable stored in the controlled device, the first variable and the first The second variable satisfies the second preset relationship in the initial state before the message is sent, and the first variable should be changed to satisfy the first preset relationship every time the remote control device sends the message;
  • an output module configured to output a verification result, when the verification passes and satisfies the first preset relationship, outputting a valid verification result of the message, and otherwise outputting the verification result that the message is invalid.
  • a remote control device including:
  • a sending module configured to send a message to the controlled device, where the message includes at least identity information of the remote control device and a first variable;
  • the identity information of the remote control device is used for verification by the controlled device and determining whether a first preset relationship is satisfied between the first variable and a second variable stored in the controlled device.
  • the first variable and the second variable satisfy a second preset relationship in an initial state before the message is sent.
  • variable module configured to generate the first variable, so that each time the remote control device sends the message, the first variable changes to satisfy the first preset relationship.
  • a controlled device including:
  • the communication circuit is configured to receive a message sent by a remote control device, where the message includes at least identity information of the remote control device and a first variable;
  • the processor is configured to verify the remote device identity information and determine whether a first preset relationship is satisfied between the first variable and a second variable stored in the controlled device, where the first variable and the The second variable satisfies the second preset relationship in the initial state before the message is sent, and the first variable should be changed to satisfy the first preset relationship every time the remote control device sends the message;
  • a remote control device which includes:
  • the processor is configured to generate the first variable, so that the communication circuit sends the message once, and the first variable all changes to satisfy the first preset relationship;
  • the communication circuit is configured to send a message to the controlled device, the message including at least identity information of the remote control device and a first variable.
  • the present invention verifies the remote device identity information and determines whether the first variable is satisfied between the first variable and the second variable stored in the controlled device. The relationship is determined, when the verification passes and the first preset relationship is satisfied, it is determined that the message is valid, otherwise it is determined that the message is invalid. Since the first variable and the second variable satisfy the second preset relationship in an initial state before the message is sent, each time the remote control device sends the message, the first variable should be satisfied.
  • the invention can prevent the controlled device from receiving the received message and solve the problem that the controlled device is vulnerable to the replay attack.
  • FIG. 1 is a flow chart of an embodiment of a method for secure communication of the present invention
  • FIG. 2 is a flow chart of still another embodiment of a method for secure communication of the present invention.
  • Figure 3 is a schematic illustration of an embodiment of a controlled device of the present invention.
  • FIG. 4 is a schematic diagram of an embodiment of a remote control device of the present invention.
  • Figure 5 is a schematic diagram of an embodiment of a controlled device of the present invention.
  • FIG. 6 is a schematic diagram of an embodiment of a remote control device of the present invention.
  • the controlled device When the controlled device communicates with the remote control device, it is generally transmitted by radio frequency signals. Since the radio frequency signal is transmitted in a similar broadcast manner, the controlled device can receive all the information in the same frequency band, and the controlled device is easily attacked by malicious attacks. Therefore, a certain authentication method can be used to judge whether the remote control device is legal and prevent illegal impersonation attacks, but the controlled device still has the risk of being replayed.
  • a replay attack is when an attacker resends data that has been received by the device to deceive the device. The data sent by the replay attack is the data sent by the legitimate remote control device. It cannot be identified by the authentication method. Therefore, it is necessary to use a certain method to identify whether the data has been received.
  • an embodiment of a method for secure communication includes the following steps:
  • the controlled device receives a message sent by the remote control device, where the message includes at least the identity information of the remote control device and the first variable;
  • the identity information of the remote control device is information capable of characterizing the unique identity of the remote control device, and the first variable is a count value for recording the number of times the remote control device sends the same type of message.
  • the controlled device A receives the message a sent by the remote control device B, and the message a includes at least the ID number of B, the signature value obtained by signing the ID number with the private key of B, and the first variable, if A
  • the first time the message is sent for example, the request binding information, the first variable in the request binding information is 1, and the next time the binding is requested, the first variable is 2, and so on.
  • the type of the message in the embodiment of the present invention is not limited.
  • the controlled device first performs a communication connection with the remote control device before receiving the message sent by the remote control device.
  • the controlled device receives connection request information sent by the remote control device, the connection request information includes identity information of the remote control device, and the identity information of the remote control device includes the remote control device ID and a private key of the remote control device ID Signature value
  • the controlled device verifies the remote device identity information and determines whether a first preset relationship is satisfied between the first variable and a second variable stored in the controlled device.
  • the first variable and the second variable satisfy a second preset relationship in an initial state before the message is sent, and the first variable should be satisfied every time the remote control device sends the message.
  • the first preset relationship changes;
  • the first variable and the second variable are both count values
  • the first preset relationship means that the first variable is greater than a second variable
  • the second preset relationship refers to the first The variable is equal to the second variable
  • the first variable stored in B is the same as the second variable stored in A, for example, all 0, and when B sends a message to A, the first variable is incremented by 1.
  • the first variable 1 in the message received by B is greater than the second variable 0, and the first preset relationship is satisfied, and it is determined that the message is valid, otherwise it is determined to be invalid.
  • the identity information of the remote control device when the message is request binding information, includes the remote control device ID, the remote control device ID, and a private key signature value of the first variable, the remote control
  • the public key certificate of the device; the verified device verifying the identity information of the remote device specifically includes:
  • the controlled device and the remote control device are built with a unique public-private key pair and a unique device ID, and both are signed by the manufacturer's private key, and a unique public key certificate is built in;
  • the key certificate contains the device's public key and device identity information and is signed by the manufacturer to bind the device identity information to the device public key.
  • the controlled device acquires a public key of the remote control device from a public key certificate of the remote control device, and then uses the public key to verify the private key signature value, so that an ID of the remote control device can be obtained.
  • the first variable is the same as the data in the sent request binding information, and the verification passes, otherwise the verification fails, and the binding is rejected.
  • the controlled device first implements a communication connection with the remote control device before receiving the operation message.
  • the controlled device receives the connection request information sent by the remote control device, where the connection request information includes the identity information of the remote control device, and the verified device verifying the identity information of the remote control device specifically includes:
  • the specific verification process is similar to the verification process of the above request binding information, and details are not described herein again.
  • the determining, after the determining that the connection request message is valid, includes: the controlled device negotiating with the remote control device to obtain a session key;
  • the operation information is encrypted by a cryptographic algorithm, and the session key is used to encrypt an encryption key used by the cryptographic algorithm, and the session key is renegotiated each time it is connected.
  • the cryptographic algorithm is a packet cipher algorithm.
  • the session key is obtained through negotiation and cannot be obtained by a third party, the operation information cannot be forged and only a replay attack can be performed.
  • a and B negotiate to obtain a session key, and the negotiation process adopts an SM2 key negotiation mechanism, and then A receives the operation information sent by B through the AES block cipher algorithm. Encrypted, the encryption key used by the cryptographic algorithm is encrypted by the session key.
  • the method further includes:
  • the controlled device replaces the second variable it holds with the first variable.
  • the controlled device A verifies the identity information passing through the remote device B and the first variable 2 is greater than the second variable 1, the first preset relationship is satisfied, and A will change its saved second variable to 2.
  • the verification passes and the first preset relationship is satisfied, it indicates that the identity information of the remote control device is legal and the operation information is not information that has been received before, and thus can effectively combat the replay attack.
  • the determining is that the message is valid, and includes:
  • the controlled device saves identity information of the remote control device to bind the remote control device
  • the level information is used when the controlled device binds the plurality of remote control devices, and the different remote control devices are used to control the priority level of the controlled device.
  • the priority of the first remote control device is higher than that of the remote control device.
  • the information of the post-binding remote control device saved in the controlled device is managed, and the first remote control device bound by the controlled device is ensured to be legally safe, that is, the remote control device with the highest priority is ensured to be secure. Therefore, when the subsequently bound remote control device is used for a malicious attack, the remote control device with the highest priority can be deleted by using the remote control device with the highest priority, thereby solving the problem that the legitimate remote control device is used for malicious attacks, and improving Communication security.
  • the first remote control device and the second remote control device are defined, wherein the first remote control device has successfully implemented the binding with the controlled device, and the level of the priority level of the remote control device will be characterized. After the information is saved, it includes:
  • the controlled device receives the connection request information sent by the second remote control device, the identity information and the level information of the second remote control device are saved in the controlled device, and the connection request information includes the remote control device Identity Information;
  • the remote control device A is bound to the controlled device C earlier than the remote control device B, the priority of A is higher than B.
  • C will preferentially process the information of A or directly disconnect B. If B is found to be a malicious attacker, A can delete the information of B stored in C, so that B can no longer control C, thus preventing malicious attacks.
  • the controlled device receives the message sent by the remote control device, verifies the remote device identity information, and determines whether the first variable meets the first preset between the first variable and the second variable stored in the controlled device. The relationship is determined to be valid when the verification passes and the first preset relationship is satisfied, otherwise it is determined to be invalid. Since the first variable and the second variable satisfy the second preset relationship in an initial state before the message is sent, each time the remote control device sends the message, the first variable should be satisfied.
  • Determining the first preset relationship change when the verification passes and satisfies the first preset relationship, indicating that the identity of the remote control device is legal and the message is not a message that the controlled device has received, so by this method Otherwise, it indicates that the message is a message that the controlled device has received, which may belong to the case of a replay attack, and the message is not processed, regardless of whether the identity of the remote control device is legal, and the present invention can avoid receiving the controlled device. A message that has been received to solve the problem that the controlled device is vulnerable to replay attacks.
  • still another embodiment of the method for secure communication of the present invention includes the following steps:
  • the remote control device sends a message to the controlled device, where the message includes at least the identity information of the remote control device and the first variable;
  • the identity information of the remote control device is information capable of characterizing the unique identity of the remote control device, and the first variable is a count value for recording the number of times the remote control device sends the same type of message.
  • the remote control device B sends a message a to the controlled device A, where the message a includes at least the ID number of B, the signature value obtained by signing the ID number with the private key of B, and the first variable, if the message is The binding information is requested, and the first variable in the request binding information is 2, and the next time the binding is requested, the first variable is 3, and so on.
  • the identity information of the remote control device is used for verification by the controlled device, and the first variable is used to determine whether a first preset relationship is satisfied between a second variable stored in the controlled device.
  • the first variable and the second variable satisfy a second preset relationship in an initial state before the message is sent, and each time the remote control device sends the message, the first variable should be satisfied.
  • the first preset relationship changes.
  • the first variable and the second variable are both count values
  • the first preset relationship means that the first variable is greater than a second variable
  • the second preset relationship refers to the first The variable is equal to the second variable
  • the first variable stored in B is the same as the second variable stored in A, for example, 2, and when B sends a message to A, the first variable is incremented by 1.
  • the first variable 3 in the message received by B is greater than the second variable 2, and satisfies the first preset relationship.
  • the remote control device accepts the identity verification of the controlled device and accepts the determination of the relationship between the first variable and the second variable by the controlled device;
  • the identity information of the remote control device includes the remote control device ID, the remote control device ID, and a private key of the first variable.
  • a signature value a public key certificate of the remote control device; the public key certificate is used to verify the validity of the private key signature value.
  • the method when the message is the operation information, before the remote control device sends the message to the controlled device, the method includes:
  • connection request information including identity information of the remote control device, the remote device identity information including the remote control device ID, a private key signature value of the remote control device ID;
  • the private key signature value is used for verification by the controlled device using a pre-saved public key.
  • the method includes:
  • the operation information is encrypted by a cryptographic algorithm
  • the session key is used to encrypt an encryption key used by the cryptographic algorithm
  • the session key is Both are renegotiated when connected.
  • the remote control device sends the connection request information to the controlled device before sending the message, and the remote control device negotiates with the controlled device to obtain a session after the connection is successful. Key; then encrypting the operation information by using a cryptographic algorithm, encrypting the encryption key used by the cryptographic algorithm with the session key, and finally transmitting the operation information.
  • the operation information includes the remote control device ID, the first variable, and the operation instruction; the cryptographic algorithm may be any packet encryption algorithm, which is not specifically limited herein.
  • the remote control device sends a message to the controlled device, accepts the identity verification of the controlled device, and determines the relationship between the first variable and the second variable by the controlled device. Since the first variable and the second variable satisfy the second preset relationship in an initial state before the message is sent, each time the remote control device sends the message, the first variable should be satisfied. Determining a first preset relationship change, when the remote control device passes verification and the first preset relationship is satisfied between the first variable and the second variable, indicating that the identity of the remote control device is legal and the message The message is not received by the controlled device, so in this way, the present invention can prevent the controlled device from receiving the received message and solve the problem that the controlled device is vulnerable to the replay attack.
  • FIG. 3 is a schematic diagram of an embodiment of the controlled device 30 of the present invention.
  • the controlled device 30 includes a communication module 301, a verification module 302, and an output module 303.
  • the communication module 301 is configured to receive a message sent by the remote control device
  • the message includes at least identity information of the remote control device and a first variable
  • the verification module 302 is configured to verify the remote device identity information and determine whether the first variable is satisfied between the first variable and the second variable stored in the controlled device 30;
  • the first variable and the second variable satisfy a second preset relationship in an initial state before the message is sent, and the first variable should be satisfied every time the remote control device sends the message.
  • the first preset relationship changes;
  • the output module 303 is configured to output a verification result. When the verification passes and the first preset relationship is satisfied, the verification result that the message is valid is output, otherwise the verification result that the message is invalid is output.
  • the communication module 301 is connected to the verification module 302, and the verification module 302 is connected to the output module 303.
  • the communication module 301 receives the message sent by the remote control device, and transmits the message to the verification module 302.
  • the verification module 302 verifies the remote device identity information and determines the first variable and Whether the first preset relationship is satisfied between the second variables stored in the controlled device 30, and transmitting the verification result and the determination result to the output module 303; the output module 303 outputs according to the received information Validation results.
  • FIG. 4 is a schematic diagram of an embodiment of a remote control device 40 according to the present invention.
  • the remote control device 40 includes: a communication module 401 and a variable module 402 connected to each other.
  • the communication module 401 is configured to send a message to the controlled device
  • the message includes at least identity information of the remote control device 40 and a first variable; the identity information of the remote control device 40 is used for verification by the controlled device and determining the first variable and the controlled Whether the first preset relationship is satisfied between the second variables stored in the device, and the first variable and the second variable satisfy the second preset relationship in an initial state before the message is sent.
  • the variable module 402 is configured to generate the first variable, so that each time the remote control device 40 sends the message, the first variable changes to satisfy the first preset relationship.
  • variable module 402 transmits the first variable generated by the first variable to the communication module 401 after the remote control device 40 sends the message to the communication module 401; the communication module The 401 generates the message after receiving the first variable and sends the message to the controlled device.
  • FIG. 5 is a schematic diagram of an embodiment of the controlled device 50 of the present invention.
  • the controlled device 50 includes: a communication circuit 501 and a processor 502 connected to each other.
  • the communication circuit 501 is configured to receive a message sent by the remote control device
  • the message includes at least identity information of the remote control device and a first variable
  • the processor 502 is configured to verify the remote device identity information and determine whether a first preset relationship is satisfied between the first variable and a second variable stored in the controlled device 50, the first variable and The second variable satisfies a second preset relationship in an initial state before the message is sent, and the first variable should satisfy the change of the first preset relationship every time the remote control device sends the message.
  • the verification passes and the first preset relationship is satisfied, the verification result that the message is valid is output, otherwise the verification result that the message is invalid is output.
  • the communication circuit 501 receives the message sent by the remote control device, and transmits the message to the processor 502; the processor 502 verifies the remote device identity information and determines the first variable and Whether the first preset relationship is satisfied between the second variables stored in the controlled device 50, and when the verification passes and the first preset relationship is satisfied, the verification result that the message is valid is output, otherwise the message is invalid. Validation results.
  • FIG. 6 is a schematic diagram of an embodiment of a remote control device 60 according to the present invention.
  • the remote control device 60 includes: a communication circuit 601 and a processor 602 connected to each other.
  • the communication circuit 601 is configured to send a message to the controlled device
  • the message includes at least the identity information of the remote control device 60 and the first variable;
  • the processor 602 is configured to generate the first variable, so that each time the remote control device 60 sends the message, the first variable changes to satisfy the first preset relationship.
  • the processor 602 transmits, to the communication circuit 601, the first variable generated after the first variable is changed to the first preset relationship, before the remote control device 60 sends the message; the communication circuit The 601 generates the message after receiving the first variable and sends the message to the controlled device.
  • the invention verifies the remote device identity information after receiving the message sent by the remote device, and determines whether the first preset relationship is satisfied between the first variable and the second variable, because the first variable and the first variable
  • the second variable satisfies a second preset relationship in an initial state before the message is sent, and each time the remote control device sends the message, the first variable should change to satisfy the first preset relationship.
  • the verification passes and satisfies the first preset relationship, it indicates that the identity of the remote control device is legal and the message is not a message that the controlled device has received, so by this method, the present invention can avoid receiving the controlled device.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Selective Calling Equipment (AREA)
  • Telephonic Communication Services (AREA)

Abstract

本发明公开了一种安全通信的方法、受控装置及设备、遥控装置及设备,该安全通信的方法中,受控设备接收遥控设备发送的消息,验证所述遥控设备身份信息并判断所述第一变量与所述受控设备中储存的第二变量之间是否满足第一预设关系,当验证通过并且满足第一预设关系时,判定为所述消息有效,否则判定为所述消息无效。通过上述方法,本发明能够避免受控设备接收已经接收过的消息,解决受控设备容易受到重放攻击的问题。

Description

安全通信的方法、受控装置及设备、遥控装置及设备
【技术领域】
本发明涉及信息安全领域,特别是涉及一种安全通信的方法、受控装置及设备、遥控装置及设备。
【背景技术】
遥控设备与受控设备进行通讯时,一般通过蓝牙等射频信号进行传输。此时,遥控设备发送的消息间隔非常短,一般是7ms。受控设备要在7ms内鉴定此消息的合法性,一般不能通过传统的三次握手等复杂的协议来实现;而且由于射频协议的开放性,并不是点对点的传输,而是类似于广播的传输方式,使得受控设备可以接受在其频段内任何射频设备发送的信息。因此,若受控设备无法认证与其进行通讯的遥控设备的合法性,就不能判断接收到的消息的合法性;进一步,通讯的消息容易被截取从而被重放攻击。
目前存在的一种解决方法是采用跳频序列来提高通讯安全等级,每次通讯的频率都不一样,通过设备中预置的内部跳频序列来不断变化通讯频率进行安全性保护。但是该跳频序列很容易被第三方获取,因此第三方很容易就可以找到其通讯频率,从而进行恶意消息攻击,获取受控设备的控制权。
【发明内容】
本发明主要解决的技术问题是提供一种安全通信的方法、受控装置及设备、遥控装置及设备,能够解决现有技术受控设备容易被进行恶意消息攻击的问题。
为解决上述技术问题,本发明采用的一个技术方案是:提供一种安全通信方法,包括:
受控设备接收遥控设备发送的消息,所述消息至少包括所述遥控设备的身份信息以及第一变量;
所述受控设备验证所述遥控设备身份信息并判断所述第一变量与所述受控设备中储存的第二变量之间是否满足第一预设关系,所述第一变量和所述第二变量在所述消息发送前的初始状态下满足第二预设关系,所述遥控设备每发送一次所述消息,所述第一变量均应该向满足所述第一预设关系变化;
当验证通过并且满足第一预设关系时,判定为所述消息有效,否则判定为所述消息无效。
其中,所述第一变量和第二变量均是计数值,所述第一预设关系指所述第一变量大于第二变量,所述第二预设关系指所述第一变量等于所述第二变量。
其中,当验证通过并且满足所述第一预设关系时,所述方法进一步包括:
所述受控设备将其保存的所述第二变量替换为所述第一变量。
其中,所述消息是请求绑定信息,所述判定为所述消息有效后,包括:
所述受控设备将所述遥控设备的身份信息保存以绑定所述遥控设备;
将表征所述遥控设备的优先级别的等级信息保存。
其中,定义所述遥控设备为第一遥控设备,所述将表征所述遥控设备的优先级别的等级信息保存后包括:
所述受控设备接收第二遥控设备发送的连接请求信息,所述第二遥控设备的身份信息及等级信息已保存在所述受控设备,所述连接请求信息包括所述遥控设备的身份信息;
通过所述第一遥控设备和所述第二遥控设备的等级信息,判断两者优先级别高低;
在所述第二遥控设备的优先级别高于所述第一遥控设备时,接受所述第二遥控设备的连接请求,优先处理所述第二遥控设备的消息或断开所述第一遥控设备的连接,否则暂缓处理或丢弃所述第二遥控设备的连接请求信息。
其中,所述遥控设备的身份信息包括所述遥控设备ID、所述遥控设备ID和第一变量的私钥签名值、所述遥控设备的公钥证书;所述受控设备验证所述遥控设备身份信息具体包括:
从所述遥控设备的公钥证书中获取所述遥控设备的公钥;
利用所述公钥验证所述私钥签名值的合法性。
其中,所述消息是操作信息,所述受控设备接收遥控设备发送消息前,包括:
所述受控设备接收遥控设备发送的连接请求信息,所述连接请求信息包括所述遥控设备的身份信息,所述遥控设备的身份信息包括所述遥控设备ID、所述遥控设备ID的私钥签名值;所述受控设备验证所述遥控设备的身份信息具体包括:
利用所述受控设备预先保存的公钥验证所述私钥签名值的合法性;
若验证通过,则判定为所述连接请求信息有效,否则判定为无效。
其中,所述判定为所述连接请求消息有效后包括:所述受控设备与所述遥控设备协商以得到会话密钥;
其中,所述操作信息是通过密码算法加密的,所述会话密钥用于对所述密码算法采用的加密密钥进行加密,所述会话密钥在每次连接时均重新协商而得到。
其中,所述密码算法是分组加密算法。
为解决上述技术问题,本发明采用的另一个技术方案是:提供一种安全通信的方法,包括:
遥控设备向受控设备发送消息,所述消息至少包括所述遥控设备的身份信息以及第一变量;
其中,所述遥控设备的身份信息用于被所述受控设备进行验证并判断所述第一变量与所述受控设备中储存的第二变量之间是否满足第一预设关系,所述第一变量和所述第二变量在所述消息发送前的初始状态下满足第二预设关系,所述遥控设备每发送一次所述消息,所述第一变量均应该向满足所述第一预设关系变化。
其中,所述第一变量和第二变量均是计数值,所述第一预设关系指所述第一变量大于第二变量,所述第二预设关系指所述第一变量等于所述第二变量。
其中,所述消息是请求绑定信息,所述遥控设备的身份信息包括所述遥控设备ID、所述遥控设备ID和第一变量的私钥签名值、所述遥控设备的公钥证书;所述公钥证书用于验证所述私钥签名值的合法性。
其中,所述消息是操作信息,所述遥控设备向所述受控设备发送消息前,包括:
向所述受控设备发送连接请求信息,所述连接请求信息包括所述遥控设备的身份信息,所述遥控设备身份信息包括所述遥控设备ID、所述遥控设备ID的私钥签名值;所述私钥签名值用于被所述受控设备利用预先保存的公钥进行验证。
其中,所述遥控设备向所述受控设备发送消息后,包括:
与所述受控设备协商以得到会话密钥;
其中,所述操作信息是通过密码算法加密的,所述会话密钥用于对所述密码算法采用的加密密钥进行加密,所述会话密钥在每次连接时均重新协商而得到。
为解决上述技术问题,本发明采用的又一个技术方案是:提供一种受控装置,包括:
接收模块,用于接收所述遥控设备发送的消息,所述消息至少包括所述遥控设备的身份信息以及第一变量;
验证模块,用于验证所述遥控设备身份信息并判断所述第一变量与所述受控设备中储存的第二变量之间是否满足第一预设关系,所述第一变量和所述第二变量在所述消息发送前的初始状态下满足第二预设关系,所述遥控设备每发送一次所述消息,所述第一变量均应该向满足所述第一预设关系变化;
输出模块,用于输出验证结果,当验证通过并且满足第一预设关系时,输出所述消息有效的验证结果,否则输出所述消息无效的验证结果。
为解决上述技术问题,本发明采用的又一个技术方案是:提供一种遥控装置,包括:
发送模块,用于向所述受控设备发送消息,所述消息至少包括所述遥控设备的身份信息以及第一变量;
其中,所述遥控设备的身份信息用于被所述受控设备进行验证并判断所述第一变量与所述受控设备中储存的第二变量之间是否满足第一预设关系,所述第一变量和所述第二变量在所述消息发送前的初始状态下满足第二预设关系。
变量模块,用于生成所述第一变量,使所述遥控设备每发送一次所述消息,所述第一变量均向满足所述第一预设关系变化。
为解决上述技术问题,本发明采用的又一个技术方案是:提供一种受控设备,包括:
相互连接的通信电路和处理器;
所述通信电路,用于接收遥控设备发送的消息,所述消息至少包括所述遥控设备的身份信息以及第一变量;
所述处理器,用于验证所述遥控设备身份信息并判断所述第一变量与所述受控设备中储存的第二变量之间是否满足第一预设关系,所述第一变量和所述第二变量在所述消息发送前的初始状态下满足第二预设关系,所述遥控设备每发送一次所述消息,所述第一变量均应该向满足所述第一预设关系变化;
当验证通过并且满足第一预设关系时,输出所述消息有效的验证结果,否则输出所述消息无效的验证结果。
为解决上述技术问题,本发明采用的又一个技术方案是:提供一种遥控设备,其特征在于,包括:
相互连接的通信电路和处理器;
所述处理器用于生成所述第一变量,使所述通信电路每发送一次所述消息,所述第一变量均向满足所述第一预设关系变化;
所述通信电路用于向所述受控设备发送消息,所述消息至少包括所述遥控设备的身份信息以及第一变量。
本发明的有益效果是:区别于现有技术的情况,本发明验证所述遥控设备身份信息并判断所述第一变量与所述受控设备中储存的第二变量之间是否满足第一预设关系,当验证通过并且满足第一预设关系时,判定为所述消息有效,否则判定为所述消息无效。由于所述第一变量和所述第二变量在所述消息发送前的初始状态下满足第二预设关系,所述遥控设备每发送一次所述消息,所述第一变量均应该向满足所述第一预设关系变化,当验证通过且满足第一预设关系时,则表明所述遥控设备的身份合法且所述消息不是所述受控设备已经接收过的消息,因此通过这种方法,本发明可以避免受控设备接收已经接收过的消息,解决受控设备容易受到重放攻击的问题。
【附图说明】
图1是本发明安全通信的方法一实施方式的流程图;
图2是本发明安全通信的方法又一实施方式的流程图;
图3是本发明受控装置一实施方式的示意图;
图4是本发明遥控装置一实施方式的示意图;
图5是本发明受控设备一实施方式的示意图;
图6是本发明遥控设备一实施方式的示意图。
【具体实施方式】
为使本领域的技术人员更好地理解本发明的技术方案,下面结合附图和具体实施方式对本发明所提供的安全通信的方法、受控装置及设备、遥控装置及设备做进一步详细描述。
受控设备与遥控设备通信时,一般通过射频信号进行传输,而由于射频信号是采用类似广播的形式传输的,受控设备可以接收相同频段内的所有信息,导致受控设备容易被进行恶意攻击,因此可以采用一定的认证方法判断遥控设备是否合法,防止非法冒名攻击,但受控设备仍然存在被重放攻击的风险。重放攻击是指攻击者重新发送一次设备已经接收过的数据,以达到欺骗设备的目的。重放攻击发送的数据是合法遥控设备发送过的数据,采用认证方法无法识别出来,因此需要采用一定的方法识别数据是否已经被接收。
请参阅图1,本发明安全通信的方法一实施方式,包括以下步骤:
S101:受控设备接收遥控设备发送的消息,所述消息至少包括所述遥控设备的身份信息以及第一变量;
其中,所述遥控设备的身份信息是能够表征所述遥控设备唯一身份的信息,所述第一变量是计数值,用于记录所述遥控设备发送同类型消息的次数。
例如,受控设备A收到遥控设备B发送的消息a,所述消息a中至少包括B的ID号、利用B的私钥对所述ID号签名得到的签名值以及第一变量,若A是首次发送该类型消息,比如请求绑定信息,则该请求绑定信息中的第一变量为1,下次请求绑定时,该第一变量则为2,依次类推。
本发明实施方式中的所述消息种类不限,当所述消息是操作信息时,所述受控设备接收遥控设备发送消息前,先与遥控设备实现通信连接。连接过程中, 所述受控设备接收遥控设备发送的连接请求信息,所述连接请求信息包括所述遥控设备的身份信息,所述遥控设备的身份信息包括所述遥控设备ID、所述遥控设备ID的私钥签名值;
S102:所述受控设备验证所述遥控设备身份信息并判断所述第一变量与所述受控设备中储存的第二变量之间是否满足第一预设关系;
其中,所述第一变量和所述第二变量在所述消息发送前的初始状态下满足第二预设关系,所述遥控设备每发送一次所述消息,所述第一变量均应该向满足所述第一预设关系变化;
在一个具体应用中,所述第一变量和第二变量均是计数值,所述第一预设关系指所述第一变量大于第二变量,所述第二预设关系指所述第一变量等于所述第二变量。
例如,遥控设备B向受控设备A发送消息前,B中存储的第一变量与A中存储的第二变量相同,比如都是0,当B向A发送消息时会将第一变量加1后发送给A,则B接收到的消息中第一变量1大于第二变量0,满足第一预设关系,判定为该消息有效,否则判定为无效。
在又一个具体应用中,当所述消息是请求绑定信息时,所述遥控设备的身份信息包括所述遥控设备ID、所述遥控设备ID和第一变量的私钥签名值、所述遥控设备的公钥证书;所述受控设备验证所述遥控设备身份信息具体包括:
1)从所述遥控设备的公钥证书中获取所述遥控设备的公钥;
2)利用所述公钥验证所述私钥签名值的合法性。
其中,所述受控设备和所述遥控设备出厂时都内置了唯一的公私钥对以及唯一的设备ID,并且都经过厂家的私钥签名,还都内置了唯一的公钥证书;所述公钥证书内包含设备的公钥及设备身份信息并经过厂家签名,用于将设备身份信息与设备公钥进行绑定。
具体地,所述受控设备从所述遥控设备的公钥证书中获取所述遥控设备的公钥,再利用所述公钥验证所述私钥签名值,可以得到所述遥控设备的ID和第一变量且与所述发送的请求绑定信息中的数据相同,则验证通过,否则验证失败,拒绝绑定。
同样地,当所述消息是操作消息时,所述受控设备接收所述操作消息前,先与遥控设备实现通信连接。连接过程中,所述受控设备接收遥控设备发送的连接请求信息,所述连接请求信息包括所述遥控设备的身份信息,所述受控设备验证所述遥控设备的身份信息具体包括:
1)利用所述受控设备预先保存的公钥验证所述私钥签名值的合法性;
2)若验证通过,则判定为所述连接请求信息有效,否则判定为无效。
其中,具体验证过程与上述请求绑定信息的验证过程类似,此处不再赘述。
其中,所述判定为所述连接请求消息有效后包括:所述受控设备与所述遥控设备协商以得到会话密钥;
其中,所述操作信息是通过密码算法加密的,所述会话密钥用于对所述密码算法采用的加密密钥进行加密,所述会话密钥在每次连接时均重新协商而得到,所述密码算法是分组加密算法。
具体地,由于所述会话密钥是经过协商得到的,第三方无法获取,因此所述操作信息无法伪造,只能进行重放攻击。
例如,受控设备A与遥控设备B连接成功后,A与B协商得到会话密钥,所述协商过程采用SM2密钥协商机制,之后A接受到B发送的操作信息都是通过AES分组密码算法加密的,所述密码算法采用的加密密钥通过所述会话密钥进行加密。
S103:当验证通过并且满足第一预设关系时,判定为所述消息有效,否则判定为所述消息无效。
其中,当验证通过并且满足第一预设关系时,所述方法进一步包括:
所述受控设备将其保存的所述第二变量替换为所述第一变量。
例如,当受控设备A验证通过遥控设备B的身份信息并且第一变量2大于第二变量1时,满足第一预设关系,A会将其保存的第二变量变为2。
具体地,当验证通过并且满足第一预设关系时,表明所述遥控设备的身份信息合法且所述操作信息并不是之前已经接收过的信息,因此能够有效对抗重放攻击。
其中,当所述消息是请求绑定信息时,所述判定为所述消息有效后,包括:
1)所述受控设备将所述遥控设备的身份信息保存以绑定所述遥控设备;
2)将表征所述遥控设备的优先级别的等级信息保存。
其中,所述等级信息用于受控设备绑定多台遥控设备时区分不同遥控设备控制所述受控设备的优先级别,先绑定的遥控设备优先级高于后绑定的遥控设备,可以管理所述受控设备中保存的后绑定遥控设备的信息,并且确保所述受控设备绑定的第一台遥控设备是合法安全的,即确保优先级别最高的遥控设备是安全的。因此,当后续绑定的遥控设备被用于恶意攻击时,都可以用所述优先级别最高的遥控设备删除所述后续绑定的遥控设备,从而解决合法遥控设备并用于恶意攻击的问题,提高通信安全。
具体地,为方便说明,定义第一遥控设备和第二遥控设备,其中第一遥控设备已经成功实现与受控设备之间的绑定,则所述将表征所述遥控设备的优先级别的等级信息保存后包括:
1)所述受控设备接收第二遥控设备发送的连接请求信息,所述第二遥控设备的身份信息及等级信息已保存在所述受控设备,所述连接请求信息包括所述遥控设备的身份信息;
2)通过所述第一遥控设备和所述第二遥控设备的等级信息,判断两者优先级别高低;
3)在所述第二遥控设备的优先级别高于所述第一遥控设备时,接受所述第二遥控设备的连接请求,优先处理所述第二遥控设备的消息或断开所述第一遥控设备的连接,否则暂缓处理或丢弃所述第二遥控设备的连接请求信息。
例如,遥控设备A比遥控设备B更早绑定受控设备C,则A的优先级别比B高,当A与B同时向C发送信息时,C会优先处理A的信息或者直接断开B的连接;若发现B为恶意攻击者,A可以删除C中存储的B的信息,使B无法再控制C,从而防止了恶意攻击。
在上述实施方式中,受控设备接收遥控设备发送的消息,验证所述遥控设备身份信息并判断所述第一变量与所述受控设备中储存的第二变量之间是否满足第一预设关系,当验证通过且满足第一预设关系时,判定为所述信息有效,否则判定为无效。由于所述第一变量和所述第二变量在所述消息发送前的初始状态下满足第二预设关系,所述遥控设备每发送一次所述消息,所述第一变量均应该向满足所述第一预设关系变化,当验证通过且满足第一预设关系时,则表明所述遥控设备的身份合法且所述消息不是所述受控设备已经接收过的消息,因此通过这种方法;否则,表明所述消息是所述受控设备已经接收过的消息,可能属于重放攻击的情况,消息不予处理,而不管所述遥控设备身份是否合法,本发明可以避免受控设备接收已经接收过的消息,解决受控设备容易受到重放攻击的问题。
请参阅图2,本发明安全通信的方法又一实施方式,包括以下步骤:
S201:遥控设备向受控设备发送消息,所述消息至少包括所述遥控设备的身份信息以及第一变量;
其中,所述遥控设备的身份信息是能够表征所述遥控设备唯一身份的信息,所述第一变量是计数值,用于记录所述遥控设备发送同类型消息的次数。
例如,遥控设备B向受控设备A发送消息a,所述消息a中至少包括B的ID号、利用B的私钥对所述ID号签名得到的签名值以及第一变量,若该消息是请求绑定信息,该请求绑定信息中的第一变量为2,则下次请求绑定时,该第一变量则为3,依次类推。
其中,所述遥控设备的身份信息用于被所述受控设备进行验证,所述第一变量被用于判断与所述受控设备中储存的第二变量之间是否满足第一预设关系,所述第一变量和所述第二变量在所述消息发送前的初始状态下满足第二预设关系,所述遥控设备每发送一次所述消息,所述第一变量均应该向满足所述第一预设关系变化。
在一个具体应用中,所述第一变量和第二变量均是计数值,所述第一预设关系指所述第一变量大于第二变量,所述第二预设关系指所述第一变量等于所述第二变量。
例如,遥控设备B向受控设备A发送消息前,B中存储的第一变量与A中存储的第二变量相同,比如都是2,当B向A发送消息时会将第一变量加1后发送给A,则B接收到的消息中第一变量3大于第二变量2,满足第一预设关系。
S202:所述遥控设备接受所述受控设备的身份验证及接受所述受控设备对第一变量和第二变量之间关系的判断;
本发明实施方式中的所述消息种类不限,当所述消息是请求绑定信息时,所述遥控设备的身份信息包括所述遥控设备ID、所述遥控设备ID和第一变量的私钥签名值、所述遥控设备的公钥证书;所述公钥证书用于验证所述私钥签名值的合法性。
在又一个具体应用中,当所述消息是操作信息时,所述遥控设备向所述受控设备发送消息前,包括:
向所述受控设备发送连接请求信息,所述连接请求信息包括所述遥控设备的身份信息,所述遥控设备身份信息包括所述遥控设备ID、所述遥控设备ID的私钥签名值;所述私钥签名值用于被所述受控设备利用预先保存的公钥进行验证。
其中,所述遥控设备向所述受控设备发送连接请求消息后,包括:
与所述受控设备协商以得到会话密钥;
其中,当所述消息是操作信息时,所述操作信息是通过密码算法加密的,所述会话密钥用于对所述密码算法采用的加密密钥进行加密,所述会话密钥在每次连接时均重新协商而得到。
具体地,当所述消息是操作信息时,所述遥控设备发送所述消息前,先向所述受控设备发送连接请求信息,连接成功后所述遥控设备与所述受控设备协商得到会话密钥;然后利用密码算法加密所述操作信息,利用所述会话密钥加密所述密码算法采用的加密密钥,最后发送所述操作信息。其中,所述操作信息包括所述遥控设备ID、第一变量和操作指令;所述密码算法可以是任一分组加密算法,此处不做具体限定。
在上述实施方式中,遥控设备向受控设备发送消息,接受所述受控设备的身份验证及所述受控设备对第一变量和第二变量之间关系的判断。由于所述第一变量和所述第二变量在所述消息发送前的初始状态下满足第二预设关系,所述遥控设备每发送一次所述消息,所述第一变量均应该向满足所述第一预设关系变化,当所述遥控设备通过验证且所述第一变量和所述第二变量之间满足第一预设关系时,则表明所述遥控设备的身份合法且所述消息不是所述受控设备已经接收过的消息,因此通过这种方法,本发明可以避免受控设备接收已经接收过的消息,解决受控设备容易受到重放攻击的问题。
请参阅图3,图3是本发明受控装置30一实施方式的示意图,如图3所示,所述受控装置30包括:通信模块301、验证模块302和输出模块303。
所述通信模块301用于接收遥控装置发送的消息;
其中,所述消息至少包括所述遥控装置的身份信息以及第一变量;
所述验证模块302用于验证所述遥控装置身份信息并判断所述第一变量与所述受控装置30中储存的第二变量之间是否满足第一预设关系;
其中,所述第一变量和所述第二变量在所述消息发送前的初始状态下满足第二预设关系,所述遥控装置每发送一次所述消息,所述第一变量均应该向满足所述第一预设关系变化;
所述输出模块303用于输出验证结果,当验证通过并且满足第一预设关系时,输出所述消息有效的验证结果,否则输出所述消息无效的验证结果。
其中,所述通信模块301与所述验证模块302连接,所述验证模块302与所述输出模块303连接。
具体地,所述通信模块301接收所述遥控装置发送的消息,并将所述消息传输给所述验证模块302;所述验证模块302验证所述遥控装置身份信息并判断所述第一变量与所述受控装置30中储存的第二变量之间是否满足第一预设关系,并将所述验证结果和判断结果传输给所述输出模块303;所述输出模块303根据接收到的信息输出验证结果。
请参阅图4,图4是本发明遥控装置40一实施方式的示意图,如图4所示,所述遥控装置40包括:相互连接的通信模块401和变量模块402。
所述通信模块401用于向受控装置发送消息;
其中,所述消息至少包括所述遥控装置40的身份信息以及第一变量;所述遥控装置40的身份信息用于被所述受控装置进行验证并判断所述第一变量与所述受控装置中储存的第二变量之间是否满足第一预设关系,所述第一变量和所述第二变量在所述消息发送前的初始状态下满足第二预设关系。
所述变量模块402用于生成所述第一变量,使所述遥控装置40每发送一次所述消息,所述第一变量均向满足所述第一预设关系变化。
具体地,所述变量模块402在所述遥控装置40每发送一次消息前,将第一变量向满足所述第一预设关系变化后生成的第一变量传输给通信模块401;所述通信模块401接收到所述第一变量后生成所述消息并将所述消息发送给所述受控装置。
请参阅图5,图5是本发明受控设备50一实施方式的示意图,如图5所示,所述受控设备50包括:相互连接的通信电路501和处理器502。
所述通信电路501用于接收遥控设备发送的消息;
其中,所述消息至少包括所述遥控设备的身份信息以及第一变量;
所述处理器502用于验证所述遥控设备身份信息并判断所述第一变量与所述受控设备50中储存的第二变量之间是否满足第一预设关系,所述第一变量和所述第二变量在所述消息发送前的初始状态下满足第二预设关系,所述遥控设备每发送一次所述消息,所述第一变量均应该向满足所述第一预设关系变化,当验证通过并且满足第一预设关系时,输出所述消息有效的验证结果,否则输出所述消息无效的验证结果。
具体地,所述通信电路501接收所述遥控设备发送的消息,并将所述消息传输给所述处理器502;所述处理器502验证所述遥控设备身份信息并判断所述第一变量与所述受控设备50中储存的第二变量之间是否满足第一预设关系,当验证通过并且满足第一预设关系时,输出所述消息有效的验证结果,否则输出所述消息无效的验证结果。
请参阅图6,图6是本发明遥控设备60一实施方式的示意图,如图6所示,所述遥控设备60包括:相互连接的通信电路601和处理器602。
所述通信电路601用于向受控设备发送消息;
其中,所述消息至少包括所述遥控设备60的身份信息以及第一变量;
所述处理器602用于生成所述第一变量,使所述遥控设备60每发送一次所述消息,所述第一变量均向满足所述第一预设关系变化。
具体地,所述处理器602在所述遥控设备60每发送一次消息前,将第一变量向满足所述第一预设关系变化后生成的第一变量传输给通信电路601;所述通信电路601接收到所述第一变量后生成所述消息并将所述消息发送给所述受控设备。
本发明通过在受控设备接收遥控设备发送的消息后,验证所述遥控设备身份信息并判断第一变量与第二变量之间是否满足第一预设关系,由于所述第一变量和所述第二变量在所述消息发送前的初始状态下满足第二预设关系,所述遥控设备每发送一次所述消息,所述第一变量均应该向满足所述第一预设关系变化,当验证通过且满足第一预设关系时,则表明所述遥控设备的身份合法且所述消息不是所述受控设备已经接收过的消息,因此通过这种方法,本发明可以避免受控设备接收已经接收过的消息,解决受控设备容易受到重放攻击的问题。
以上所述仅为本发明的实施方式,并非因此限制本发明的专利范围,凡是利用本发明说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本发明的专利保护范围内。

Claims (20)

  1. 一种安全通信的方法,其特征在于,包括:
    受控设备接收遥控设备发送的消息,所述消息至少包括所述遥控设备的身份信息以及第一变量;
    所述受控设备验证所述遥控设备身份信息并判断所述第一变量与所述受控设备中储存的第二变量之间是否满足第一预设关系,所述第一变量和所述第二变量在所述消息发送前的初始状态下满足第二预设关系,所述遥控设备每发送一次所述消息,所述第一变量均应该向满足所述第一预设关系变化;
    当验证通过并且满足第一预设关系时,判定为所述消息有效,否则判定为所述消息无效。
  2. 根据权利要求1所述的方法,其特征在于,
    所述第一变量和第二变量均是计数值,所述第一预设关系指所述第一变量大于第二变量,所述第二预设关系指所述第一变量等于所述第二变量。
  3. 根据权利要求1所述的方法,其特征在于,当验证通过并且满足所述第一预设关系时,所述方法进一步包括:
    所述受控设备将其保存的所述第二变量替换为所述第一变量。
  4. 根据权利要求1至3任一项所述的方法,其特征在于,所述消息是请求绑定信息,所述判定为所述消息有效后,包括:
    所述受控设备将所述遥控设备的身份信息保存以绑定所述遥控设备;
    将表征所述遥控设备的优先级别的等级信息保存。
  5. 根据权利要求4所述的方法,其特征在于,
    定义所述遥控设备为第一遥控设备,所述将表征所述遥控设备的优先级别的等级信息保存后包括:
    所述受控设备接收第二遥控设备发送的连接请求信息,所述第二遥控设备的身份信息及等级信息已保存在所述受控设备,所述连接请求信息包括所述遥控设备的身份信息;
    通过所述第一遥控设备和所述第二遥控设备的等级信息,判断两者优先级别高低;
    在所述第二遥控设备的优先级别高于所述第一遥控设备时,接受所述第二遥控设备的连接请求,优先处理所述第二遥控设备的消息或断开所述第一遥控设备的连接,否则暂缓处理或丢弃所述第二遥控设备的连接请求信息。
  6. 根据权利要求4所述的方法,其特征在于,所述遥控设备的身份信息包括所述遥控设备ID、所述遥控设备ID和第一变量的私钥签名值、所述遥控设备的公钥证书;所述受控设备验证所述遥控设备身份信息具体包括:
    从所述遥控设备的公钥证书中获取所述遥控设备的公钥;
    利用所述公钥验证所述私钥签名值的合法性。
  7. 根据权利要求1至3任一项所述的方法,其特征在于,所述消息是操作信息。
  8. 根据权利要求7所述的方法,其特征在于,
    所述受控设备接收遥控设备发送消息前,包括:
    所述受控设备接收遥控设备发送的连接请求信息,所述连接请求信息包括所述遥控设备的身份信息,所述遥控设备的身份信息包括所述遥控设备ID、所述遥控设备ID的私钥签名值;所述受控设备验证所述遥控设备的身份信息具体包括:
    利用所述受控设备预先保存的公钥验证所述私钥签名值的合法性;
    若验证通过,则判定为所述连接请求信息有效,否则判定为无效。
  9. 根据权利要求8所述的方法,其特征在于,
    所述判定为所述连接请求消息有效后包括:所述受控设备与所述遥控设备协商以得到会话密钥;
    其中,所述操作信息是通过密码算法加密的,所述会话密钥用于对所述密码算法采用的加密密钥进行加密,所述会话密钥在每次连接时均重新协商而得到。
  10. 根据权利要求9的方法,其特征在于,
    所述密码算法是分组加密算法。
  11. 一种安全通信的方法,其特征在于,包括:
    遥控设备向受控设备发送消息,所述消息至少包括所述遥控设备的身份信息以及第一变量;
    其中,所述遥控设备的身份信息用于被所述受控设备进行验证并判断所述第一变量与所述受控设备中储存的第二变量之间是否满足第一预设关系,所述第一变量和所述第二变量在所述消息发送前的初始状态下满足第二预设关系,所述遥控设备每发送一次所述消息,所述第一变量均应该向满足所述第一预设关系变化。
  12. 根据权利要求11所述的方法,其特征在于,
    所述第一变量和第二变量均是计数值,所述第一预设关系指所述第一变量大于第二变量,所述第二预设关系指所述第一变量等于所述第二变量。
  13. 根据权利要求11所述的方法,其特征在于,所述消息是请求绑定信息,所述遥控设备的身份信息包括所述遥控设备ID、所述遥控设备ID和第一变量的私钥签名值、所述遥控设备的公钥证书;所述公钥证书用于验证所述私钥签名值的合法性。
  14. 根据权利要求11或12所述的方法,其特征在于,所述消息是操作信息。
  15. 根据权利要求14所述的方法,其特征在于,
    所述遥控设备向所述受控设备发送消息前,包括:
    向所述受控设备发送连接请求信息,所述连接请求信息包括所述遥控设备的身份信息,所述遥控设备身份信息包括所述遥控设备ID、所述遥控设备ID的私钥签名值;所述私钥签名值用于被所述受控设备利用预先保存的公钥进行验证。
  16. 根据权利要求15所述的方法,其特征在于,
    所述遥控设备向所述受控设备发送消息后,包括:
    与所述受控设备协商以得到会话密钥;
    其中,所述操作信息是通过密码算法加密的,所述会话密钥用于对所述密码算法采用的加密密钥进行加密,所述会话密钥在每次连接时均重新协商而得到。
  17. 一种受控装置,其特征在于,包括:
    通信模块,用于接收所述遥控设备发送的消息,所述消息至少包括所述遥控设备的身份信息以及第一变量;
    验证模块,用于验证所述遥控设备身份信息并判断所述第一变量与所述受控设备中储存的第二变量之间是否满足第一预设关系,所述第一变量和所述第二变量在所述消息发送前的初始状态下满足第二预设关系,所述遥控设备每发送一次所述消息,所述第一变量均应该向满足所述第一预设关系变化;
    输出模块,用于输出验证结果,当验证通过并且满足第一预设关系时,输出所述消息有效的验证结果,否则输出所述消息无效的验证结果。
  18. 一种遥控装置,其特征在于,包括:
    相互连接的通信模块和变量模块;
    所述通信模块,用于向所述受控设备发送消息,所述消息至少包括所述遥控设备的身份信息以及第一变量;
    其中,所述遥控设备的身份信息用于被所述受控设备进行验证并判断所述第一变量与所述受控设备中储存的第二变量之间是否满足第一预设关系,所述第一变量和所述第二变量在所述消息发送前的初始状态下满足第二预设关系。
    所述变量模块,用于生成所述第一变量,使所述遥控设备每发送一次所述消息,所述第一变量均向满足所述第一预设关系变化。
  19. 一种受控设备,其特征在于,包括:
    相互连接的通信电路和处理器;
    所述通信电路,用于接收遥控设备发送的消息,所述消息至少包括所述遥控设备的身份信息以及第一变量;
    所述处理器,用于验证所述遥控设备身份信息并判断所述第一变量与所述受控设备中储存的第二变量之间是否满足第一预设关系,所述第一变量和所述第二变量在所述消息发送前的初始状态下满足第二预设关系,所述遥控设备每发送一次所述消息,所述第一变量均应该向满足所述第一预设关系变化,当验证通过并且满足第一预设关系时,输出所述消息有效的验证结果,否则输出所述消息无效的验证结果。
  20. 一种遥控设备,其特征在于,包括:
    相互连接的通信电路和处理器;
    所述处理器,用于生成所述第一变量,使所述通信电路每发送一次所述消息,所述第一变量均向满足所述第一预设关系变化;
    所述通信电路,用于向所述受控设备发送消息,所述消息至少包括所述遥控设备的身份信息以及第一变量。
PCT/CN2016/105171 2016-11-09 2016-11-09 安全通信的方法、受控装置及设备、遥控装置及设备 WO2018086004A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201680010430.9A CN107466466B (zh) 2016-11-09 2016-11-09 安全通信的方法、受控装置及设备、遥控装置及设备
PCT/CN2016/105171 WO2018086004A1 (zh) 2016-11-09 2016-11-09 安全通信的方法、受控装置及设备、遥控装置及设备

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/105171 WO2018086004A1 (zh) 2016-11-09 2016-11-09 安全通信的方法、受控装置及设备、遥控装置及设备

Publications (1)

Publication Number Publication Date
WO2018086004A1 true WO2018086004A1 (zh) 2018-05-17

Family

ID=60545133

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/105171 WO2018086004A1 (zh) 2016-11-09 2016-11-09 安全通信的方法、受控装置及设备、遥控装置及设备

Country Status (2)

Country Link
CN (1) CN107466466B (zh)
WO (1) WO2018086004A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108809645A (zh) * 2018-07-24 2018-11-13 南方电网科学研究院有限责任公司 密钥协商的方法、装置及配电自动化系统
CN109361682B (zh) * 2018-11-12 2021-06-29 深圳鳍源科技有限公司 一种通信方法、装置、设备及存储介质

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009065356A1 (fr) * 2007-11-19 2009-05-28 Huawei Technologies Co., Ltd. Procédé, système et dispositif de réseau pour une authentification mutuelle
CN102223630A (zh) * 2010-04-14 2011-10-19 国民技术股份有限公司 一种遥控系统及方法
CN103544830A (zh) * 2012-07-11 2014-01-29 上海曜铂信息科技有限公司 红外遥控装置的智能配对方法
CN104580464A (zh) * 2015-01-08 2015-04-29 珠海格力电器股份有限公司 智能家居设备的控制方法、装置和系统
CN104717762A (zh) * 2013-12-13 2015-06-17 上海科勒电子科技有限公司 一种无线通信装置的配对方法、主端及从端
CN105704837A (zh) * 2014-11-28 2016-06-22 华为终端(东莞)有限公司 一种用于建立无线连接的方法及设备

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009065356A1 (fr) * 2007-11-19 2009-05-28 Huawei Technologies Co., Ltd. Procédé, système et dispositif de réseau pour une authentification mutuelle
CN102223630A (zh) * 2010-04-14 2011-10-19 国民技术股份有限公司 一种遥控系统及方法
CN103544830A (zh) * 2012-07-11 2014-01-29 上海曜铂信息科技有限公司 红外遥控装置的智能配对方法
CN104717762A (zh) * 2013-12-13 2015-06-17 上海科勒电子科技有限公司 一种无线通信装置的配对方法、主端及从端
CN105704837A (zh) * 2014-11-28 2016-06-22 华为终端(东莞)有限公司 一种用于建立无线连接的方法及设备
CN104580464A (zh) * 2015-01-08 2015-04-29 珠海格力电器股份有限公司 智能家居设备的控制方法、装置和系统

Also Published As

Publication number Publication date
CN107466466A (zh) 2017-12-12
CN107466466B (zh) 2020-05-05

Similar Documents

Publication Publication Date Title
WO2021095998A1 (en) A trusted computing method and system
WO2014069783A1 (ko) 패스워드 기반 인증 방법 및 이를 수행하기 위한 장치
WO2020147383A1 (zh) 基于区块链系统的流程审批方法、装置、系统及非易失性存储介质
US6249867B1 (en) Method for transferring sensitive information using initially unsecured communication
WO2014044065A1 (zh) 智能手机便携式热点安全接入的方法及系统
WO2014175538A1 (ko) Puf 기반 하드웨어 otp 제공 장치 및 이를 이용한 2-factor 인증 방법
WO2018151390A1 (ko) 사물 인터넷 장치
WO2019132272A1 (ko) 블록체인 기반의 서비스로서의 아이디
WO2014063455A1 (zh) 即时通信方法和系统
WO2013086758A1 (zh) 以太网加密认证系统及加密认证方法
WO2018098886A1 (zh) 一种开启车门的方法、移动终端、车载终端及系统
CN110300287B (zh) 一种公共安全视频监控联网摄像头接入认证方法
WO2012149717A1 (zh) 基于tcm或tpm的license动态管理方法、装置及系统
WO2018000674A1 (zh) 网络连接方法、网络连接装置和终端
WO2020186775A1 (zh) 业务数据提供方法、装置、设备及计算机可读存储介质
WO2023120906A1 (ko) 펌웨어를 수신하는 방법 및 펌웨어를 전송하는 방법
WO2016206530A1 (zh) 一种高级安全的移动支付方法、装置及系统
JP2024051151A (ja) 暗号通信システム、セキュアエレメント、デバイス及び暗号通信方法
WO2019132270A1 (ko) Nfv 환경에서 보안 통신 방법 및 그 시스템
WO2019182377A1 (ko) 블록체인 기반 암호화폐의 트랜잭션에 이용되는 주소 정보 생성 방법, 전자 장치 및 컴퓨터 판독 가능한 기록 매체
WO2017111483A1 (ko) 생체 정보 기반 인증 장치, 이와 연동하는 제어 서버 및 어플리케이션 서버, 그리고 이들의 동작 방법
JP2016522637A (ja) 共有秘密を含意するセキュア化されたデータチャネル認証
WO2017016272A1 (zh) 一种虚拟资源数据的处理方法、装置及系统
WO2018086004A1 (zh) 安全通信的方法、受控装置及设备、遥控装置及设备
WO2020032351A1 (ko) 익명 디지털 아이덴티티 수립 방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16921362

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16921362

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 11/09/2019)

122 Ep: pct application non-entry in european phase

Ref document number: 16921362

Country of ref document: EP

Kind code of ref document: A1