WO2019076032A1 - 一种用于对密钥进行分类存储的方法及系统 - Google Patents

一种用于对密钥进行分类存储的方法及系统 Download PDF

Info

Publication number
WO2019076032A1
WO2019076032A1 PCT/CN2018/085946 CN2018085946W WO2019076032A1 WO 2019076032 A1 WO2019076032 A1 WO 2019076032A1 CN 2018085946 W CN2018085946 W CN 2018085946W WO 2019076032 A1 WO2019076032 A1 WO 2019076032A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
ground
vehicle
key file
new
Prior art date
Application number
PCT/CN2018/085946
Other languages
English (en)
French (fr)
Inventor
麻江帆
周兴韬
杨韬
郑义川
刘木齐
张馨则
Original Assignee
北京全路通信信号研究设计院集团有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京全路通信信号研究设计院集团有限公司 filed Critical 北京全路通信信号研究设计院集团有限公司
Priority to EP18869430.1A priority Critical patent/EP3637671A4/en
Publication of WO2019076032A1 publication Critical patent/WO2019076032A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B61RAILWAYS
    • B61LGUIDING RAILWAY TRAFFIC; ENSURING THE SAFETY OF RAILWAY TRAFFIC
    • B61L15/00Indicators provided on the vehicle or vehicle train for signalling purposes ; On-board control or communication systems
    • B61L15/0018Communication with or on the vehicle or vehicle train
    • B61L15/0027Radio-based, e.g. using GSM-R
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B61RAILWAYS
    • B61LGUIDING RAILWAY TRAFFIC; ENSURING THE SAFETY OF RAILWAY TRAFFIC
    • B61L27/00Central railway traffic control systems; Trackside control; Communication systems specially adapted therefor
    • B61L27/20Trackside control of safe travel of vehicle or vehicle train, e.g. braking curve calculation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/062Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying encryption of the keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • H04W4/42Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for mass transport vehicles, e.g. buses, trains or aircraft

Definitions

  • the present disclosure relates to the field of information security and, more particularly, to a method and system for classifying and storing keys.
  • the Radio Blocking Center is the core equipment of the Class 3 (C3) train control system of the China Train Control System (CTCS) and meets the overall train control requirements of the C3 train control system.
  • the wireless blocking center generates temporary permission for the train and the line description of the controlled train according to the train status provided by the vehicle subsystem, the ground subsystem, the ground external system, the temporary occupancy speed limit command, the interlocking approach status, and the disaster protection information. Control information such as speed limit, and transmit the above information to the C3 level onboard subsystem through a wireless communication system.
  • the keys of the ground device and the in-vehicle device used by the RBC device are uniformly stored in a single key file.
  • the key configuration data information is obtained from the single key file by file reading for secure communication.
  • an open network between the in-vehicle device and the ground device adopts a device-key management method, and a closed network between the ground device and the ground device, and all ground devices use the same Key.
  • Ground equipment and in-vehicle equipment are different in terms of management rigor and workflow.
  • the key of the new in-vehicle device needs to be generated by the key management department, and the key of the new ground device only needs to inherit the previous key and does not need to be regenerated.
  • the key management method of storing the two keys in a single key file makes the work of key creation and modification more difficult and complicated.
  • the prior art also has the problem that the rigor of the key management method and the different work processes may result in the difficulty and complexity of the unified key creation in the software design.
  • the present invention utilizes a key management method in which a ground device and an in-vehicle device key are separately stored, and separately manages keys with strict key management methods and different workflows, thereby effectively reducing key integration and management difficulty.
  • a method for classifying and storing a key comprising:
  • the device type is a ground device
  • the device type is an in-vehicle device
  • calculating a hash value of the device identifier generating an in-vehicle device key of the new device according to the hash value, and storing the in-vehicle device key in the in-vehicle device key file Medium;
  • ground device key file and the in-vehicle device key file are separately encrypted using a public key, and the encrypted ground device key file and the in-vehicle device key file are stored in the secure storage device.
  • the method further includes encrypting the ground device key file and the in-vehicle device key file separately using a public key, and storing the encrypted ground device key file and the in-vehicle device key file in the In a secure storage device.
  • join message carries the following content related to the new device: device type, device model, software version, and device power consumption.
  • the generating the device identifier for the new device according to the device type includes: when the device type is a ground device, generating a device identifier for identifying the ground device for the new device.
  • the generating the device identifier for the new device according to the device type includes: when the device type is an in-vehicle device, generating a device identifier for identifying the in-vehicle device for the new device.
  • ground areas each have a unique unified root key
  • a correspondence table of the ground area and the unified root key is stored in the secure storage device.
  • the ground device key includes a fixed portion and a derived portion, wherein the fixed portion can be used to identify a ground area where the ground device is located, and the derived portion can identify the ground device.
  • the calculating the hash value of the device identifier includes: calculating a hash value of the device identifier based on MD5 or SHA-1, and generating an in-vehicle device of the new device according to the hash value Key.
  • the private key corresponding to the public key is sent to the wireless blocking center.
  • the method further includes: acquiring, after the wireless occlusion center is activated, the encrypted ground device key file and the in-vehicle device key file from the secure storage device.
  • the wireless occlusion center decrypts the encrypted ground device key file using the private key to obtain a ground device key file, acquires a plurality of ground device keys from the ground device key file, and determines The number of the plurality of ground device keys.
  • the wireless blocking center decrypts the encrypted in-vehicle device key file using the private key to obtain an in-vehicle device key file, acquires a plurality of in-vehicle device keys from the in-vehicle device key file, and determines The number of the plurality of in-vehicle device keys.
  • the wireless blocking center combines the plurality of ground device keys and the plurality of in-vehicle device keys in a cache, and determines a ground device key and an in-vehicle device key required in the current communication scheme. The first quantity.
  • the wireless blocking center according to the second quantity of the device that the communication unit requests to communicate, when the second quantity is equal to the first quantity, the ground device key and the in-vehicle device key required in the current communication scheme are Send to the communication unit.
  • a system for classifying and storing a key comprising:
  • a monitoring unit that monitors join messages sent by new devices that are initially joined to the network
  • An initialization unit configured to determine a device type of the new device based on the join message, and generate a device identifier for the new device according to the device type, where the device type includes: a ground device and an in-vehicle device;
  • a key generation unit when the device type is a ground device, generating a ground device key of the new device according to a unified root key of the ground area where the new device is located, and the device identifier
  • the ground device key is stored in the ground device key file;
  • the in-vehicle device key of the new device is generated according to the device identifier of the new device, and the in-vehicle device key is stored In the in-vehicle device key file;
  • the storage unit stores the ground device key file and the in-vehicle device key file in the secure storage device.
  • system further includes: the storage unit encrypting the ground device key file and the in-vehicle device key file separately using a public key, and encrypting the ground device key file and the in-vehicle device The key file is stored on a secure storage device.
  • join message carries the following content related to the new device: device type, device model, software version, and device power consumption.
  • the initializing unit generating the device identifier for the new device according to the device type includes: when the device type is a ground device, the initializing unit generates a device for identifying the ground device for the new device Identifier.
  • the initializing unit generates the device identifier for the new device according to the device type, and when the device type is an in-vehicle device, the initializing unit generates a device for identifying the in-vehicle device for the new device. Identifier.
  • ground areas each have a unique unified root key
  • a correspondence table of the ground area and the unified root key is stored in the secure storage device.
  • the ground device key includes a fixed portion and a derived portion, wherein the fixed portion can be used to identify a ground area where the ground device is located, and the derived portion can identify the ground device.
  • the key generation unit calculates a hash value of the device identifier, including: calculating a hash value of the device identifier based on MD5 or SHA-1, and generating the new according to the hash value The vehicle's device key for the device.
  • the storage unit encrypts the ground device key file and the in-vehicle device key file respectively using the public key
  • the private key corresponding to the public key is sent to the wireless blocking center.
  • the method further includes the wireless occlusion center acquiring the encrypted ground device key file and the in-vehicle device key file from the secure storage device.
  • the wireless occlusion center decrypts the encrypted ground device key file using the private key to obtain a ground device key file, acquires a plurality of ground device keys from the ground device key file, and determines The number of the plurality of ground device keys.
  • the wireless blocking center decrypts the encrypted in-vehicle device key file using the private key to obtain an in-vehicle device key file, acquires a plurality of in-vehicle device keys from the in-vehicle device key file, and determines The number of the plurality of in-vehicle device keys.
  • the wireless blocking center combines the plurality of ground device keys and the plurality of in-vehicle device keys in a cache, and determines a ground device key and an in-vehicle device key required in the current communication scheme. The first quantity.
  • the wireless blocking center according to the second quantity of the device that the communication unit requests to communicate, when the second quantity is equal to the first quantity, the ground device key and the in-vehicle device key required in the current communication scheme are Send to the communication unit.
  • An advantageous technical effect of adopting the technical solution of the present application is that the difficulty of key integration can be sufficiently reduced, and the key update modification of the in-vehicle device and the ground device can be performed independently.
  • FIG. 2 is a schematic diagram of managing an in-vehicle device key in accordance with a preferred embodiment of the present disclosure
  • FIG. 3 is a schematic diagram of managing a ground device key in accordance with a preferred embodiment of the present disclosure
  • FIG. 4 is a schematic structural diagram of a system for classifying and storing a key according to a preferred embodiment of the present disclosure
  • FIG. 5 is a schematic structural diagram of a method for classifying and managing a key according to a preferred embodiment of the present disclosure
  • FIG. 6 is a schematic structural diagram of a method for classifying and storing a key according to a preferred embodiment of the present disclosure.
  • FIG. 1 is a schematic diagram of key management in the prior art.
  • the key of the vehicle-mounted device needs to generate a new key through the key management department, and the key of the newly added ground device only needs to inherit the previous key and does not need to be regenerated.
  • the key management unit 103 is configured to generate an in-vehicle device key and a ground device key and to store and maintain the generated in-vehicle device key and ground device key.
  • the confidential operator 104 uses the key generation software 106 in the key generation device 105 and generates an in-vehicle device key based on the in-vehicle device number.
  • the secret operator 104 can directly acquire the ground device key of the ground device number using the key generation device 105.
  • the key management unit 103 stores the generated one or more in-vehicle device keys and ground device keys in a single key file.
  • the key management method of uniformly storing the two keys in a single key file results in difficulty and complexity in the key creation and modification.
  • the key management unit 202 acquires an identifier of the in-vehicle device, such as an in-vehicle device number.
  • the secret operator 203 activates the key generation device 204 and runs the key generation software 205 in the key generation device 204.
  • the key generation software 205 calculates a hash value of the device identifier, and generates an in-vehicle device key of the new device according to the hash value.
  • the key generation software 205 calculates a hash value of the device identifier based on MD5 or SHA-1.
  • the key management unit 202 stores the in-vehicle device key in the in-vehicle device key file.
  • FIG. 3 is a schematic diagram of managing 300 a ground device key in accordance with a preferred embodiment of the present disclosure.
  • the present application For a ground device, the present application generates a ground device key of the new device according to a unified root key of the ground area where the new device is located, and the device identifier, and stores the ground device key in a ground device. In the key file. Further, the ground device key of the new device is obtained based on the inheritance of the unified root key. Further, the present application may generate a ground device key capable of identifying its identity for the ground device based on an identifier of the ground device, such as a ground device number.
  • the ground equipment key comprises a fixed portion and a derivative portion, wherein the fixed portion can be used to identify a ground area in which the ground equipment is located, and the derived portion can identify the ground equipment. Further, wherein different ground areas each have a unique unified root key, and a correspondence table of the ground area and the unified root key is stored in the secure storage device.
  • the present application After generating the in-vehicle device key, the present application stores the in-vehicle device key in the in-vehicle device key file.
  • the system 400 monitoring unit can determine the device type of the new device by the detected join message and generate a device identifier for the new device based on the device type.
  • the system 400 When the device type is a ground device, the system 400 generates a ground device key of the new device according to the unified root key and the device identifier of the ground area where the new device is located, and stores the ground device key in the ground device key.
  • the system 400 calculates a hash value of the device identifier, generates an in-vehicle device key of the new device according to the hash value, and stores the in-vehicle device key in the in-vehicle device key.
  • the system 400 encrypts the ground device key file and the in-vehicle device key file, respectively, using a public key, and stores the encrypted ground device key file and the in-vehicle device key file in a secure storage device.
  • the system 400 includes a monitoring unit 401, an initialization unit 402, a key generation unit 403, and a storage unit 404. Further, the monitoring unit 401 monitors the join message sent by the new device that is initially joined to the network.
  • the join message carries the following content related to the new device: device type, device model, software version, and device power consumption. Usually, when a new device joins the network, a join message needs to be sent to notify other devices.
  • the initialization unit 402 determines a device type of the new device based on the join message, and generates a device identifier for the new device according to the device type, where the device type includes: a ground device and an in-vehicle device. Wherein, when the device type is a ground device, the initializing unit generates a device identifier for identifying the ground device for the new device. Wherein, when the device type is an in-vehicle device, the initialization unit generates a device identifier for identifying the in-vehicle device for the new device.
  • the key generation unit 403 when the device type is a ground device, the key generation unit 403 generates a ground device key of the new device according to the unified root key of the ground area where the new device is located and the device identifier. And storing the ground device key in a ground device key file.
  • Each of the different ground areas has a unique unified root key, and a correspondence table of the ground area and the unified root key is stored in the secure storage device.
  • the ground equipment key comprises a fixed portion and a derived portion, wherein the fixed portion can be used to identify a ground area in which the ground equipment is located, and the derived portion is capable of identifying the ground equipment.
  • the key generation unit 403 calculates a hash value of the device identifier, and generates an in-vehicle device key of the new device according to the hash value.
  • the key generation unit calculating the hash value of the device identifier includes calculating a hash value of the device identifier based on MD5 or SHA-1.
  • the key generation unit 403 stores the in-vehicle device key in the in-vehicle device key file.
  • the storage unit 404 separately encrypts the ground device key file and the in-vehicle device key file using a public key, and stores the encrypted ground device key file and the in-vehicle device key file in the secure storage device. After the storage unit encrypts the ground device key file and the in-vehicle device key file respectively using the public key, the private key corresponding to the public key is sent to the wireless blocking center.
  • the wireless occlusion center acquires the encrypted ground device key file and the in-vehicle device key file from the secure storage device.
  • the wireless occlusion center decrypts the encrypted ground device key file using the private key to obtain a ground device key file, acquires a plurality of ground device keys from the ground device key file, and determines the plurality of grounds The number of device keys.
  • the wireless occlusion center decrypts the encrypted in-vehicle device key file using the private key to obtain an in-vehicle device key file, acquires a plurality of in-vehicle device keys from the in-vehicle device key file, and determines the plurality of in-vehicle devices The number of device keys.
  • the wireless occlusion center combines the plurality of ground device keys and the plurality of in-vehicle device keys in a cache and determines a first number of ground device keys and in-vehicle device keys required in the current communication scheme.
  • the wireless blocking center transmits the ground device key and the in-vehicle device key required in the current communication scheme to the communication unit according to the second number of devices that the communication unit requests to communicate, when the second number is equal to the first number. That is, when the number of ground device keys and in-vehicle device keys required in the current communication scheme is equal to the number of devices requesting communication, the ground device key and the in-vehicle device key required in the current communication scheme are transmitted to the communication. unit.
  • FIG. 5 is a schematic structural diagram of a method for classifying and managing a key according to a preferred embodiment of the present disclosure.
  • the wireless occlusion center RBC is activated when it is necessary to process data in the railway system or to use the signal for vehicle control.
  • the wireless occlusion center retrieves the encrypted ground device key file from the secure storage device.
  • the wireless occlusion center decrypts the encrypted ground device key file using the private key to obtain a ground device key file.
  • a plurality of ground device keys are obtained from the ground device key file and the number of the plurality of ground device keys is determined.
  • the wireless occlusion center retrieves the encrypted in-vehicle device key file from the secure storage device.
  • the wireless occlusion center decrypts the encrypted in-vehicle device key file using the private key to obtain an in-vehicle device key file.
  • a plurality of in-vehicle device keys are obtained from the in-vehicle device key file and the number of the plurality of in-vehicle device keys is determined.
  • the wireless blocking center determines the total number of keys, that is, the first number, according to the number of the plurality of in-vehicle device keys and the number of the plurality of ground device keys.
  • the wireless occlusion center combines the plurality of ground device keys and the plurality of in-vehicle device keys in a cache.
  • the wireless blocking center sends the ground device key and the in-vehicle device key required in the current communication scheme according to the second number of devices that the communication unit requests to communicate, when the second number is equal to the first number.
  • the wireless blocking center sends the ground device key and the in-vehicle device key required in the current communication scheme according to the second number of devices that the communication unit requests to communicate, when the second number is equal to the first number.
  • FIG. 6 is a schematic structural diagram of a method 600 for classifying and storing a key according to a preferred embodiment of the present disclosure.
  • the monitoring unit can determine the device type of the new device by the detected join message and generate a device identifier for the new device based on the device type.
  • the method 600 When the device type is a ground device, the method 600 generates a ground device key of the new device according to the unified root key and the device identifier of the ground area where the new device is located, and stores the ground device key in the ground device key
  • the method 600 calculates a hash value of the device identifier, generates an in-vehicle device key of the new device according to the hash value, and stores the in-vehicle device key in the in-vehicle device key.
  • the method 600 encrypts the ground device key file and the in-vehicle device key file separately using a public key, and stores the encrypted ground device key file and the in-vehicle device key file in a secure storage device.
  • step 601 the join message sent by the new device that is initially joined to the network is monitored.
  • the join message carries the following content related to the new device: device type, device model, software version, and device power consumption.
  • a join message needs to be sent to notify other devices.
  • a device type of the new device is determined based on the join message, and a device identifier is generated for the new device according to the device type, wherein the device type includes: a ground device and an in-vehicle device.
  • the device type includes: a ground device and an in-vehicle device.
  • the method 600 when the device type is a ground device, the method 600 generates a device identifier for identifying the ground device for the new device.
  • the device type is an in-vehicle device
  • the method 600 generates a device identifier for identifying the on-board device for the new device.
  • the method 600 when the device type is a ground device, the method 600 generates a ground device secret of the new device according to a unified root key of the ground area where the new device is located and the device identifier.
  • the key stores the ground device key in a ground device key file.
  • Each of the different ground areas has a unique unified root key, and a correspondence table of the ground area and the unified root key is stored in the secure storage device.
  • the ground equipment key comprises a fixed portion and a derived portion, wherein the fixed portion can be used to identify a ground area in which the ground equipment is located, and the derived portion can identify the ground equipment.
  • the method 600 calculates a hash value of the device identifier, and generates an in-vehicle device key of the new device based on the hash value.
  • the key generation unit calculating the hash value of the device identifier includes calculating a hash value of the device identifier based on MD5 or SHA-1.
  • method 600 stores the in-vehicle device key in the in-vehicle device key file.
  • the ground device key file and the in-vehicle device key file are separately encrypted using a public key, and the encrypted ground device key file and the in-vehicle device key file are stored in the secure storage device.
  • the storage unit encrypts the ground device key file and the in-vehicle device key file respectively using the public key, the private key corresponding to the public key is sent to the wireless blocking center.
  • the wireless occlusion center acquires the encrypted ground device key file and the in-vehicle device key file from the secure storage device.
  • the wireless occlusion center decrypts the encrypted ground device key file using the private key to obtain a ground device key file, acquires a plurality of ground device keys from the ground device key file, and determines the plurality of grounds The number of device keys.
  • the wireless occlusion center decrypts the encrypted in-vehicle device key file using the private key to obtain an in-vehicle device key file, acquires a plurality of in-vehicle device keys from the in-vehicle device key file, and determines the plurality of in-vehicle devices The number of device keys.
  • the wireless occlusion center combines the plurality of ground device keys and the plurality of in-vehicle device keys in a cache and determines a first number of ground device keys and in-vehicle device keys required in the current communication scheme.
  • the wireless blocking center transmits the ground device key and the in-vehicle device key required in the current communication scheme to the communication unit according to the second number of devices that the communication unit requests to communicate, when the second number is equal to the first number. That is, when the number of ground device keys and in-vehicle device keys required in the current communication scheme is equal to the number of devices requesting communication, the ground device key and the in-vehicle device key required in the current communication scheme are transmitted to the communication. unit.

Abstract

本公开涉及一种用于对密钥进行分类存储的方法,包括:监测初次加入网络的新设备所发送的加入消息;基于所述加入消息确定所述新设备的设备类型,根据所述设备类型为所述新设备生成设备标识符;并基于设备类型确定密钥。还公开了一种用于对密钥进行分类存储的系统。

Description

一种用于对密钥进行分类存储的方法及系统
本申请要求于2017年10月20日递交的中国专利申请第201711004627.4号的优先权,在此全文引用上述中国专利申请公开的内容以作为本申请的一部分。
技术领域
本公开涉及信息安全领域,并且更具体地,涉及一种用于对密钥进行分类存储的方法及系统。
背景技术
无线闭塞中心(RBC,Radio Blocking Center)是中国列车运行控制系统(CTCS,Chinese Train Control System)第3级(C3)列车控制系统的核心设备,并且满足C3列控系统总体列车控制要求。无线闭塞中心根据车载子系统、地面子系统、地面外部系统等提供的列车状态、轨道占用临时限速命令、联锁进路状态以及灾害防护等信息产生对所控制列车的行车许可及线路描述临时限速等控制的信息,并且通过无线通信系统将上述信息传输给C3级车载子系统。
在现有的RBC技术方案中,RBC设备所使用的地面设备和车载设备的密钥统一存放在单个密钥文件中。在RBC设备中的主机软件初始化过程中,通过文件读取方式从所述单个密钥文件中获得密钥配置数据信息以用于安全通信。
在现有的RBC技术方案中,车载设备和地面设备之间为开放网络,采用了一设备一密钥的管理方式,而在地面设备和地面设备之间为封闭网络,所有地面设备均使用相同的密钥。地面设备和车载设备在管理方式上的严格程度和工作流程均不同。新增车载设备的密钥需要通过密钥管理部门生成新密钥,而新增地面设备的密钥则只需要继承以往的密钥,不需要重新生成。将两种密钥统一存放在单一密钥文件中的密钥管理方式导致密钥制作和修改的工作难度和复杂度较大。此外,现有技术还存在软件设计时未考虑密钥管理方式的严格程度和工作流程不同会导致统一化密钥制作的工作难度和复杂度较大的问题。
发明内容
本申请利用地面设备和车载设备密钥分开存储的密钥管理方式,对密钥管理方式严格程度和工作流程不同的密钥分别进行管理,有效降低密钥的集成和管理难度。
根据本公开的一个方面,提供一种用于对密钥进行分类存储的方法,所述方法包括:
监测初次加入网络的新设备所发送的加入消息;
基于所述加入消息确定所述新设备的设备类型,根据所述设备类型为所述新设备生成设备标识符,其中所述设备类型包括:地面设备和车载设备;
当所述设备类型为地面设备时,根据所述新设备所处的地面区域的统一根密钥和所述设备标识符来生成所述新设备的地面设备密钥,将所述地面设备密钥存储在地面设备密钥文件中;
当所述设备类型为车载设备时,计算所述设备标识符的哈希值,根据所述哈希值生成所述新设备的车载设备密钥,将车载设备密钥存储在车载设备密钥文件中;以及
使用公钥对所述地面设备密钥文件和车载设备密钥文件分别进行加密,并且将经过加密的地面设备密钥文件和车载设备密钥文件存储在安全存储设备中。
进一步地,所述的方法,还包括,使用公钥对所述地面设备密钥文件和车载设备密钥文件分别进行加密,并且将经过加密的地面设备密钥文件和车载设备密钥文件存储在安全存储设备中。
进一步地,所述加入消息携带与所述新设备相关的以下内容:设备类型、设备型号、软件版本以及设备功耗。
进一步地,所述根据所述设备类型为所述新设备生成设备标识符包括:当所述设备类型为地面设备时,为所述新设备生成用于标识地面设备的设备标识符。
进一步地,所述根据所述设备类型为所述新设备生成设备标识符包括:当所述设备类型为车载设备时,为所述新设备生成用于标识车载设备的设备标识符。
进一步地,其中不同的地面区域均具有唯一的统一根密钥,并且在所述安全存储设备中存储地面区域与统一根密钥的对应表。
进一步地,所述地面设备密钥包括固定部分和派生部分,其中所 述固定部分能够用于标识所述地面设备所处的地面区域,并且所述派生部分能够标识所述地面设备。
进一步地,所述计算所述设备标识符的哈希值包括:基于MD5或SHA-1来计算所述设备标识符的哈希值,并根据所述哈希值生成所述新设备的车载设备密钥。
进一步地,在使用公钥对所述地面设备密钥文件和车载设备密钥文件分别进行加密之后,将与所述公钥相对应的私钥发送给无线闭塞中心。
进一步地,还包括,在无线闭塞中心启动后,从所述安全存储设备获取经过加密的地面设备密钥文件和车载设备密钥文件。
进一步地,所述无线闭塞中心使用所述私钥对经过加密的地面设备密钥文件进行解密以获得地面设备密钥文件,从所述地面设备密钥文件中获取多个地面设备密钥并且确定所述多个地面设备密钥的数量。
进一步地,所述无线闭塞中心使用所述私钥对经过加密的车载设备密钥文件进行解密以获得车载设备密钥文件,从所述车载设备密钥文件中获取多个车载设备密钥并且确定所述多个车载设备密钥的数量。
进一步地,所述无线闭塞中心将所述多个地面设备密钥和多个车载设备密钥合并存储在缓存中,并且确定在当前通信方案中所需要的地面设备密钥和车载设备密钥的第一数量。
进一步地,所述无线闭塞中心根据通信单元所发送的请求通信的设备的第二数量,当第二数量等于第一数量时,将当前通信方案中所需要的地面设备密钥和车载设备密钥发送给通信单元。
根据本公开的另一方面,提供一种用于对密钥进行分类存储的系统,所述系统包括:
监测单元,监测初次加入网络的新设备所发送的加入消息;
初始化单元,基于所述加入消息确定所述新设备的设备类型,根据所述设备类型为所述新设备生成设备标识符,其中所述设备类型包括:地面设备和车载设备;
密钥生成单元,当所述设备类型为地面设备时,根据所述新设备所处的地面区域的统一根密钥和所述设备标识符来生成所述新设备的地面设备密钥,将所述地面设备密钥存储在地面设备密钥文件中;当所述设备类型为车载设备时,根据所述新设备的设备标识符生成所 述新设备的车载设备密钥,将车载设备密钥存储在车载设备密钥文件中;以及
存储单元,将地面设备密钥文件和车载设备密钥文件存储在安全存储设备中。
进一步地,所述的系统,还包括:所述存储单元,使用公钥对所述地面设备密钥文件和车载设备密钥文件分别进行加密,并且将经过加密的地面设备密钥文件和车载设备密钥文件存储在安全存储设备中。
进一步地,所述加入消息携带与所述新设备相关的以下内容:设备类型、设备型号、软件版本以及设备功耗。
进一步地,所述初始化单元根据所述设备类型为所述新设备生成设备标识符包括:当所述设备类型为地面设备时,所述初始化单元为所述新设备生成用于标识地面设备的设备标识符。
进一步地,所述初始化单元根据所述设备类型为所述新设备生成设备标识符包括:当所述设备类型为车载设备时,所述初始化单元为所述新设备生成用于标识车载设备的设备标识符。
进一步地,其中不同的地面区域均具有唯一的统一根密钥,并且在所述安全存储设备中存储地面区域与统一根密钥的对应表。
进一步地,所述地面设备密钥包括固定部分和派生部分,其中所述固定部分能够用于标识所述地面设备所处的地面区域,并且所述派生部分能够标识所述地面设备。
进一步地,所述密钥生成单元计算所述设备标识符的哈希值包括:基于MD5或SHA-1来计算所述设备标识符的哈希值,并根据所述哈希值生成所述新设备的车载设备密钥。
进一步地,在所述存储单元使用公钥对所述地面设备密钥文件和车载设备密钥文件分别进行加密之后,将与所述公钥相对应的私钥发送给无线闭塞中心。
进一步地,还包括,无线闭塞中心从所述安全存储设备获取经过加密的地面设备密钥文件和车载设备密钥文件。
进一步地,所述无线闭塞中心使用所述私钥对经过加密的地面设备密钥文件进行解密以获得地面设备密钥文件,从所述地面设备密钥文件中获取多个地面设备密钥并且确定所述多个地面设备密钥的数量。
进一步地,所述无线闭塞中心使用所述私钥对经过加密的车载设 备密钥文件进行解密以获得车载设备密钥文件,从所述车载设备密钥文件中获取多个车载设备密钥并且确定所述多个车载设备密钥的数量。
进一步地,所述无线闭塞中心将所述多个地面设备密钥和多个车载设备密钥合并存储在缓存中,并且确定在当前通信方案中所需要的地面设备密钥和车载设备密钥的第一数量。
进一步地,所述无线闭塞中心根据通信单元所发送的请求通信的设备的第二数量,当第二数量等于第一数量时,将当前通信方案中所需要的地面设备密钥和车载设备密钥发送给通信单元。
采用本申请技术方案的有益技术效果是能够充分降低密钥集成难度,并且能够使得车载设备和地面设备的密钥更新修改可独立进行。
附图说明
通过参考下面的附图,可以更为完整地理解本公开的示例性实施方式:
图1为现有技术中进行密钥管理的示意图;
图2为根据本公开优选实施方式的对车载设备密钥进行管理的示意图;
图3为根据本公开优选实施方式的对地面设备密钥进行管理的示意图;
图4为根据本公开优选实施方式的对密钥进行分类存储的系统的结构示意图;
图5为根据本公开优选实施方式的对密钥进行分类管理的方法的结构示意图;以及
图6为根据本公开优选实施方式的对密钥进行分类存储的方法的结构示意图。
具体实施方式
现在参考附图介绍本公开的示例性实施方式,然而,本公开可以用许多不同的形式来实施,并且不局限于此处描述的实施例,提供这些实施例是为了详尽地且完全地公开本公开,并且向所属技术领域的技术人员充分传达本公开的范围。对于表示在附图中的示例性实施方式中的术语并不是对本公开的限定。在附图中,相同的单元/元件使 用相同的附图标记。
除非另有说明,此处使用的术语(包括科技术语)对所属技术领域的技术人员具有通常的理解含义。另外,可以理解的是,以通常使用的词典限定的术语,应当被理解为与其相关领域的语境具有一致的含义,而不应该被理解为理想化的或过于正式的意义。
图1为现有技术中进行密钥管理的示意图。在现有技术中,增车载设备的密钥需要通过密钥管理部门生成新密钥,而新增地面设备的密钥则只需要继承以往的密钥,不需要重新生成。如图1所示,密钥管理单元103用于生成车载设备密钥和地面设备密钥并且能够对所生成的车载设备密钥和地面设备密钥进行存储和维护。其中,当将车载设备编号输入到密钥管理单元103中时,涉密操作人员104使用密钥生成设备105中的密钥生成软件106并且基于所述车载设备编号来生成车载设备密钥。其中,当将地面设备编号输入到密钥管理单元103中时,涉密操作人员104使用密钥生成设备105能够直接获取所述地面设备编号的地面设备密钥。密钥管理单元103将所生成的一个或多个车载设备密钥和地面设备密钥存储在单个密钥文件中。但是这种将两种密钥统一存放在单个密钥文件中的密钥管理方式导致密钥制作和修改的工作难度和复杂度较大。
图2为根据本公开优选实施方式的对车载设备密钥进行管理的示意图。针对于车载设备,密钥管理单元202获取车载设备的标识符,例如车载设备编号。涉密操作人员203启动密钥生成设备204并且在所述密钥生成设备204中运行密钥生成软件205。进一步地,密钥生成软件205计算所述设备标识符的哈希值,根据所述哈希值生成所述新设备的车载设备密钥。进一步地,密钥生成软件205基于MD5或SHA-1来计算所述设备标识符的哈希值。在生成车载设备密钥后,密钥管理单元202将车载设备密钥存储在车载设备密钥文件中。
图3为根据本公开优选实施方式的对地面设备密钥进行管理300的示意图。对于地面设备,本申请根据所述新设备所处的地面区域的统一根密钥和所述设备标识符来生成所述新设备的地面设备密钥,将所述地面设备密钥存储在地面设备密钥文件中。进一步地,基于对统一根密钥的继承来获取新设备的地面设备密钥。进一步地,本申请可以根据地面设备的标识符,例如地面设备编号,为地面设备生成能够识别其身份的地面设备密钥。为此,所述地面设备密钥包括固定部分和派生部分,其中所述固定部分能够用于标识所述地面设备所处的地 面区域,并且所述派生部分能够标识所述地面设备。进一步地,其中不同的地面区域均具有唯一的统一根密钥,并且在所述安全存储设备中存储地面区域与统一根密钥的对应表。在生成车载设备密钥后,本申请将车载设备密钥存储在车载设备密钥文件中。
图4为根据本公开优选实施方式的对密钥进行分类存储的系统400的结构示意图。系统400监测单元能够所监测到的加入消息确定所述新设备的设备类型并且根据所述设备类型为所述新设备生成设备标识符。当设备类型为地面设备时,系统400根据新设备所处的地面区域的统一根密钥和设备标识符来生成新设备的地面设备密钥,将所述地面设备密钥存储在地面设备密钥文件中;当设备类型为车载设备时,系统400计算所述设备标识符的哈希值,根据哈希值生成所述新设备的车载设备密钥,将车载设备密钥存储在车载设备密钥文件中。系统400使用公钥对所述地面设备密钥文件和车载设备密钥文件分别进行加密,并且将经过加密的地面设备密钥文件和车载设备密钥文件存储在安全存储设备中。
如图4所示,系统400包括:监测单元401、初始化单元402、密钥生成单元403以及存储单元404。进一步地,监测单元401监测初次加入网络的新设备所发送的加入消息。其中,加入消息携带与所述新设备相关的以下内容:设备类型、设备型号、软件版本以及设备功耗。通常,当新设备加入网络时,需要发送加入消息以通知其它设备。
进一步地,初始化单元402基于所述加入消息确定所述新设备的设备类型,根据所述设备类型为所述新设备生成设备标识符,其中所述设备类型包括:地面设备和车载设备。其中,当所述设备类型为地面设备时,所述初始化单元为所述新设备生成用于标识地面设备的设备标识符。其中,当所述设备类型为车载设备时,所述初始化单元为所述新设备生成用于标识车载设备的设备标识符。
进一步地,当所述设备类型为地面设备时,密钥生成单元403根据所述新设备所处的地面区域的统一根密钥和所述设备标识符来生成所述新设备的地面设备密钥,将所述地面设备密钥存储在地面设备密钥文件中。其中不同的地面区域均具有唯一的统一根密钥,并且在所述安全存储设备中存储地面区域与统一根密钥的对应表。其中地面设备密钥包括固定部分和派生部分,其中所述固定部分能够用于标识所述地面设备所处的地面区域,并且所述派生部分能够标识所述地面 设备。
当所述设备类型为车载设备时,密钥生成单元403计算所述设备标识符的哈希值,根据所述哈希值生成所述新设备的车载设备密钥。所述密钥生成单元计算所述设备标识符的哈希值包括:基于MD5或SHA-1来计算所述设备标识符的哈希值。在生成车载设备密钥后,密钥生成单元403将车载设备密钥存储在车载设备密钥文件中。
进一步地,存储单元404使用公钥对所述地面设备密钥文件和车载设备密钥文件分别进行加密,并且将经过加密的地面设备密钥文件和车载设备密钥文件存储在安全存储设备中。在所述存储单元使用公钥对所述地面设备密钥文件和车载设备密钥文件分别进行加密之后,将与所述公钥相对应的私钥发送给无线闭塞中心。
无线闭塞中心从所述安全存储设备获取经过加密的地面设备密钥文件和车载设备密钥文件。无线闭塞中心使用所述私钥对经过加密的地面设备密钥文件进行解密以获得地面设备密钥文件,从所述地面设备密钥文件中获取多个地面设备密钥并且确定所述多个地面设备密钥的数量。无线闭塞中心使用所述私钥对经过加密的车载设备密钥文件进行解密以获得车载设备密钥文件,从所述车载设备密钥文件中获取多个车载设备密钥并且确定所述多个车载设备密钥的数量。无线闭塞中心将所述多个地面设备密钥和多个车载设备密钥合并存储在缓存中,并且确定在当前通信方案中所需要的地面设备密钥和车载设备密钥的第一数量。无线闭塞中心根据通信单元所发送的请求通信的设备的第二数量,当第二数量等于第一数量时,将当前通信方案中所需要的地面设备密钥和车载设备密钥发送给通信单元。即,在当前通信方案中所需要的地面设备密钥和车载设备密钥的数量等于请求通信的设备的数量时,将当前通信方案中所需要的地面设备密钥和车载设备密钥发送给通信单元。
图5为根据本公开优选实施方式的对密钥进行分类管理的方法的结构示意图。在需要对铁路系统中的数据进行处理或者利用信号进行车辆控制时,启动无线闭塞中心RBC。在步骤501,无线闭塞中心从所述安全存储设备获取经过加密的地面设备密钥文件。在步骤502,无线闭塞中心使用私钥对经过加密的地面设备密钥文件进行解密以获得地面设备密钥文件。在步骤503,从所述地面设备密钥文件中获取多个地面设备密钥并且确定所述多个地面设备密钥的数量。
在步骤504,无线闭塞中心从所述安全存储设备获取经过加密的 车载设备密钥文件。在步骤505,无线闭塞中心使用所述私钥对经过加密的车载设备密钥文件进行解密以获得车载设备密钥文件。在步骤506,从所述车载设备密钥文件中获取多个车载设备密钥并且确定所述多个车载设备密钥的数量。
在步骤507,无线闭塞中心将根据所述多个车载设备密钥的数量和所述多个地面设备密钥的数量确定密钥总数,即第一数量
在步骤508,无线闭塞中心将所述多个地面设备密钥和多个车载设备密钥合并存储在缓存中。
在步骤509,无线闭塞中心根据通信单元所发送的请求通信的设备的第二数量,当第二数量等于第一数量时,将当前通信方案中所需要的地面设备密钥和车载设备密钥发送给通信单元。即,在当前通信方案中所需要的地面设备密钥和车载设备密钥的数量等于请求通信的设备的数量时,将当前通信方案中所需要的地面设备密钥和车载设备密钥发送给通信单元。
图6为根据本公开优选实施方式的对密钥进行分类存储的方法600的结构示意图。方法600监测单元能够所监测到的加入消息确定所述新设备的设备类型并且根据所述设备类型为所述新设备生成设备标识符。当设备类型为地面设备时,方法600根据新设备所处的地面区域的统一根密钥和设备标识符来生成新设备的地面设备密钥,将所述地面设备密钥存储在地面设备密钥文件中;当设备类型为车载设备时,方法600计算所述设备标识符的哈希值,根据哈希值生成所述新设备的车载设备密钥,将车载设备密钥存储在车载设备密钥文件中。方法600使用公钥对所述地面设备密钥文件和车载设备密钥文件分别进行加密,并且将经过加密的地面设备密钥文件和车载设备密钥文件存储在安全存储设备中。
如图6所示,方法600从步骤601处开始。在步骤601,监测初次加入网络的新设备所发送的加入消息。其中,加入消息携带与所述新设备相关的以下内容:设备类型、设备型号、软件版本以及设备功耗。通常,当新设备加入网络时,需要发送加入消息以通知其它设备。
在步骤602,基于所述加入消息确定所述新设备的设备类型,根据所述设备类型为所述新设备生成设备标识符,其中所述设备类型包括:地面设备和车载设备。其中,当所述设备类型为地面设备时,方法600为所述新设备生成用于标识地面设备的设备标识符。其中,当所述设备类型为车载设备时,方法600为所述新设备生成用于标识车 载设备的设备标识符。
在步骤603,进一步地,当所述设备类型为地面设备时,方法600根据所述新设备所处的地面区域的统一根密钥和所述设备标识符来生成所述新设备的地面设备密钥,将所述地面设备密钥存储在地面设备密钥文件中。其中不同的地面区域均具有唯一的统一根密钥,并且在所述安全存储设备中存储地面区域与统一根密钥的对应表。其中地面设备密钥包括固定部分和派生部分,其中所述固定部分能够用于标识所述地面设备所处的地面区域,并且所述派生部分能够标识所述地面设备。
在步骤604,当所述设备类型为车载设备时,方法600计算所述设备标识符的哈希值,根据所述哈希值生成所述新设备的车载设备密钥。所述密钥生成单元计算所述设备标识符的哈希值包括:基于MD5或SHA-1来计算所述设备标识符的哈希值。在生成车载设备密钥后,方法600将车载设备密钥存储在车载设备密钥文件中。
在步骤605,使用公钥对所述地面设备密钥文件和车载设备密钥文件分别进行加密,并且将经过加密的地面设备密钥文件和车载设备密钥文件存储在安全存储设备中。在所述存储单元使用公钥对所述地面设备密钥文件和车载设备密钥文件分别进行加密之后,将与所述公钥相对应的私钥发送给无线闭塞中心。
无线闭塞中心从所述安全存储设备获取经过加密的地面设备密钥文件和车载设备密钥文件。无线闭塞中心使用所述私钥对经过加密的地面设备密钥文件进行解密以获得地面设备密钥文件,从所述地面设备密钥文件中获取多个地面设备密钥并且确定所述多个地面设备密钥的数量。无线闭塞中心使用所述私钥对经过加密的车载设备密钥文件进行解密以获得车载设备密钥文件,从所述车载设备密钥文件中获取多个车载设备密钥并且确定所述多个车载设备密钥的数量。无线闭塞中心将所述多个地面设备密钥和多个车载设备密钥合并存储在缓存中,并且确定在当前通信方案中所需要的地面设备密钥和车载设备密钥的第一数量。无线闭塞中心根据通信单元所发送的请求通信的设备的第二数量,当第二数量等于第一数量时,将当前通信方案中所需要的地面设备密钥和车载设备密钥发送给通信单元。即,在当前通信方案中所需要的地面设备密钥和车载设备密钥的数量等于请求通信的设备的数量时,将当前通信方案中所需要的地面设备密钥和车载设备密钥发送给通信单元。
已经通过参考少量实施方式描述了本公开。然而,本领域技术人员所公知的,正如附带的专利权利要求所限定的,除了本公开以上公开的其他的实施例等同地落在本公开的范围内。
通常地,在权利要求中使用的所有术语都根据他们在技术领域的通常含义被解释,除非在其中被另外明确地定义。所有的参考“一个/所述/该[装置、组件等]”都被开放地解释为所述装置、组件等中的至少一个实例,除非另外明确地说明。这里公开的任何方法的步骤都没必要以公开的准确的顺序运行,除非明确地说明。

Claims (28)

  1. 一种用于对密钥进行分类存储的方法,所述方法包括:
    监测初次加入网络的新设备所发送的加入消息;
    基于所述加入消息确定所述新设备的设备类型,根据所述设备类型为所述新设备生成设备标识符,其中所述设备类型包括:地面设备和车载设备;
    当所述设备类型为地面设备时,根据所述新设备所处的地面区域的统一根密钥和所述设备标识符来生成所述新设备的地面设备密钥,将所述地面设备密钥存储在地面设备密钥文件中;
    当所述设备类型为车载设备时,根据所述新设备的设备标识符生成所述新设备的车载设备密钥,将车载设备密钥存储在车载设备密钥文件中;以及
    将地面设备密钥文件和车载设备密钥文件存储在安全存储设备中。
  2. 根据权利要求1所述的方法,还包括,使用公钥对所述地面设备密钥文件和车载设备密钥文件分别进行加密,并且将经过加密的地面设备密钥文件和车载设备密钥文件存储在安全存储设备中。
  3. 根据权利要求1-2任一所述的方法,所述加入消息携带与所述新设备相关的以下内容:设备类型、设备型号、软件版本以及设备功耗。
  4. 根据权利要求1-3任一所述的方法,所述根据所述设备类型为所述新设备生成设备标识符包括:当所述设备类型为地面设备时,为所述新设备生成用于标识地面设备的设备标识符。
  5. 根据权利要求1-4任一所述的方法,所述根据所述设备类型为所述新设备生成设备标识符包括:当所述设备类型为车载设备时,为所述新设备生成用于标识车载设备的设备标识符。
  6. 根据权利要求1-5任一所述的方法,其中不同的地面区域均具有唯一的统一根密钥,并且在所述安全存储设备中存储地面区域与统一根密钥的对应表。
  7. 根据权利要求1-6任一所述的方法,所述地面设备密钥包括固定部分和派生部分,其中所述固定部分能够用于标识所述地面设备所处的地面区域,并且所述派生部分能够标识所述地面设备。
  8. 根据权利要求1-7任一所述的方法,包括:基于MD5或SHA-1 来计算所述设备标识符的哈希值,并根据所述哈希值生成所述新设备的车载设备密钥。
  9. 根据权利要求1-8任一所述的方法,在使用公钥对所述地面设备密钥文件和车载设备密钥文件分别进行加密之后,将与所述公钥相对应的私钥发送给无线闭塞中心。
  10. 根据权利要求1-9任一所述的方法,还包括,在无线闭塞中心启动后,从所述安全存储设备获取经过加密的地面设备密钥文件和车载设备密钥文件。
  11. 根据权利要求1-10任一所述的方法,所述无线闭塞中心使用所述私钥对经过加密的地面设备密钥文件进行解密以获得地面设备密钥文件,从所述地面设备密钥文件中获取多个地面设备密钥并且确定所述多个地面设备密钥的数量。
  12. 根据权利要求1-11任一所述的方法,所述无线闭塞中心使用所述私钥对经过加密的车载设备密钥文件进行解密以获得车载设备密钥文件,从所述车载设备密钥文件中获取多个车载设备密钥并且确定所述多个车载设备密钥的数量。
  13. 根据权利要求1-12任一所述的方法,所述无线闭塞中心将所述多个地面设备密钥和多个车载设备密钥合并存储在缓存中,并且确定在当前通信方案中所需要的地面设备密钥和车载设备密钥的第一数量。
  14. 根据权利要求1-13任一所述的方法,所述无线闭塞中心根据通信单元所发送的请求通信的设备的第二数量,当第二数量等于第一数量时,将当前通信方案中所需要的地面设备密钥和车载设备密钥发送给通信单元。
  15. 一种用于对密钥进行分类存储的系统,所述系统包括:
    监测单元,监测初次加入网络的新设备所发送的加入消息;
    初始化单元,基于所述加入消息确定所述新设备的设备类型,根据所述设备类型为所述新设备生成设备标识符,其中所述设备类型包括:地面设备和车载设备;
    密钥生成单元,当所述设备类型为地面设备时,根据所述新设备所处的地面区域的统一根密钥和所述设备标识符来生成所述新设备的地面设备密钥,将所述地面设备密钥存储在地面设备密钥文件中;当所述设备类型为车载设备时,根据所述新设备的设备标识符生成所述新设备的车载设备密钥,将车载设备密钥存储在车载设备密钥文件 中;以及
    存储单元,将地面设备密钥文件和车载设备密钥文件存储在安全存储设备中。
  16. 根据权利要求15所述的系统,还包括:所述存储单元,使用公钥对所述地面设备密钥文件和车载设备密钥文件分别进行加密,并且将经过加密的地面设备密钥文件和车载设备密钥文件存储在安全存储设备中。
  17. 根据权利要求15-16任一所述的系统,所述加入消息携带与所述新设备相关的以下内容:设备类型、设备型号、软件版本以及设备功耗。
  18. 根据权利要求15-17任一所述的系统,所述初始化单元根据所述设备类型为所述新设备生成设备标识符包括:当所述设备类型为地面设备时,所述初始化单元为所述新设备生成用于标识地面设备的设备标识符。
  19. 根据权利要求15-18任一所述的系统,所述初始化单元根据所述设备类型为所述新设备生成设备标识符包括:当所述设备类型为车载设备时,所述初始化单元为所述新设备生成用于标识车载设备的设备标识符。
  20. 根据权利要求15-19任一所述的系统,其中不同的地面区域均具有唯一的统一根密钥,并且在所述安全存储设备中存储地面区域与统一根密钥的对应表。
  21. 根据权利要求15-20任一所述的系统,所述地面设备密钥包括固定部分和派生部分,其中所述固定部分能够用于标识所述地面设备所处的地面区域,并且所述派生部分能够标识所述地面设备。
  22. 根据权利要求15-21任一所述的系统,所述密钥生成单元计算所述设备标识符的哈希值包括:基于MD5或SHA-1来计算所述设备标识符的哈希值,并根据所述哈希值生成所述新设备的车载设备密钥。
  23. 根据权利要求15-22任一所述的系统,在所述存储单元使用公钥对所述地面设备密钥文件和车载设备密钥文件分别进行加密之后,将与所述公钥相对应的私钥发送给无线闭塞中心。
  24. 根据权利要求15-23任一所述的系统,还包括,无线闭塞中心从所述安全存储设备获取经过加密的地面设备密钥文件和车载设备密钥文件。
  25. 根据权利要求15-24任一所述的系统,所述无线闭塞中心使用所述私钥对经过加密的地面设备密钥文件进行解密以获得地面设备密钥文件,从所述地面设备密钥文件中获取多个地面设备密钥并且确定所述多个地面设备密钥的数量。
  26. 根据权利要求15-25任一所述的系统,所述无线闭塞中心使用所述私钥对经过加密的车载设备密钥文件进行解密以获得车载设备密钥文件,从所述车载设备密钥文件中获取多个车载设备密钥并且确定所述多个车载设备密钥的数量。
  27. 根据权利要求15-26任一所述的系统,所述无线闭塞中心将所述多个地面设备密钥和多个车载设备密钥合并存储在缓存中,并且确定在当前通信方案中所需要的地面设备密钥和车载设备密钥的第一数量。
  28. 根据权利要求15-27任一所述的系统,所述无线闭塞中心根据通信单元所发送的请求通信的设备的第二数量,当第二数量等于第一数量时,将当前通信方案中所需要的地面设备密钥和车载设备密钥发送给通信单元。
PCT/CN2018/085946 2017-10-20 2018-05-08 一种用于对密钥进行分类存储的方法及系统 WO2019076032A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP18869430.1A EP3637671A4 (en) 2017-10-20 2018-05-08 CLASSIFIED KEY STORAGE PROCESS AND SYSTEM

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201711004627.4A CN107968707B (zh) 2017-10-20 2017-10-20 一种用于对密钥进行分类存储的方法及系统
CN201711004627.4 2017-10-20

Publications (1)

Publication Number Publication Date
WO2019076032A1 true WO2019076032A1 (zh) 2019-04-25

Family

ID=61999733

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/085946 WO2019076032A1 (zh) 2017-10-20 2018-05-08 一种用于对密钥进行分类存储的方法及系统

Country Status (3)

Country Link
EP (1) EP3637671A4 (zh)
CN (1) CN107968707B (zh)
WO (1) WO2019076032A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114423003A (zh) * 2021-12-29 2022-04-29 中国航空工业集团公司西安飞机设计研究所 一种飞机密钥综合管理方法及系统
CN115988488A (zh) * 2023-03-21 2023-04-18 北京全路通信信号研究设计院集团有限公司 一种在线集中更新车载密钥的方法及装置

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107968707B (zh) * 2017-10-20 2020-11-24 北京全路通信信号研究设计院集团有限公司 一种用于对密钥进行分类存储的方法及系统

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009027380A1 (de) * 2007-08-27 2009-03-05 Siemens Aktiengesellschaft Verfahren zum etcs-online-schlüsselmanagement
EP2039583A1 (en) * 2007-09-18 2009-03-25 Hitachi Ltd. Railway radio control system
CN102170450A (zh) * 2011-05-16 2011-08-31 北京和利时系统工程有限公司 列车运行控制系统的密钥处理方法、装置及系统
CN102238004A (zh) * 2011-05-16 2011-11-09 北京全路通信信号研究设计院有限公司 C3系统的密钥管理系统
CN105142137A (zh) * 2015-07-27 2015-12-09 北京交通大学 城市轨道交通系统车地无线通信认证密钥配置系统及方法
CN107968707A (zh) * 2017-10-20 2018-04-27 北京全路通信信号研究设计院集团有限公司 一种用于对密钥进行分类存储的方法及系统

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7418737B2 (en) * 2001-06-13 2008-08-26 Mcafee, Inc. Encrypted data file transmission
JP4701748B2 (ja) * 2005-02-25 2011-06-15 ソニー株式会社 情報処理装置、情報記録媒体製造装置、情報記録媒体、および方法、並びにコンピュータ・プログラム
JP5590953B2 (ja) * 2010-04-15 2014-09-17 三菱電機株式会社 鍵生成装置及びデータ提供装置及び端末装置及びプログラム
JP5367917B2 (ja) * 2011-01-25 2013-12-11 三洋電機株式会社 車載器

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009027380A1 (de) * 2007-08-27 2009-03-05 Siemens Aktiengesellschaft Verfahren zum etcs-online-schlüsselmanagement
EP2039583A1 (en) * 2007-09-18 2009-03-25 Hitachi Ltd. Railway radio control system
CN102170450A (zh) * 2011-05-16 2011-08-31 北京和利时系统工程有限公司 列车运行控制系统的密钥处理方法、装置及系统
CN102238004A (zh) * 2011-05-16 2011-11-09 北京全路通信信号研究设计院有限公司 C3系统的密钥管理系统
CN105142137A (zh) * 2015-07-27 2015-12-09 北京交通大学 城市轨道交通系统车地无线通信认证密钥配置系统及方法
CN107968707A (zh) * 2017-10-20 2018-04-27 北京全路通信信号研究设计院集团有限公司 一种用于对密钥进行分类存储的方法及系统

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3637671A4 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114423003A (zh) * 2021-12-29 2022-04-29 中国航空工业集团公司西安飞机设计研究所 一种飞机密钥综合管理方法及系统
CN114423003B (zh) * 2021-12-29 2024-01-30 中国航空工业集团公司西安飞机设计研究所 一种飞机密钥综合管理方法及系统
CN115988488A (zh) * 2023-03-21 2023-04-18 北京全路通信信号研究设计院集团有限公司 一种在线集中更新车载密钥的方法及装置
CN115988488B (zh) * 2023-03-21 2023-06-30 北京全路通信信号研究设计院集团有限公司 一种在线集中更新车载密钥的方法及装置

Also Published As

Publication number Publication date
EP3637671A1 (en) 2020-04-15
CN107968707A (zh) 2018-04-27
EP3637671A4 (en) 2021-02-24
CN107968707B (zh) 2020-11-24

Similar Documents

Publication Publication Date Title
US11108753B2 (en) Securing files using per-file key encryption
WO2015103986A1 (zh) 一种车联网系统中的消息证书获取方法和设备
US9767299B2 (en) Secure cloud data sharing
JP6154413B2 (ja) ルート証明書の無効化
US9166893B2 (en) Methods, apparatus and systems for monitoring locations of data within a network service
CN105184935B (zh) 一种可微信分享密码的蓝牙智能锁系统
CN108292250A (zh) 用于促进分布式数据备份的方法和装置
US11190363B2 (en) Cryptographic methods and systems using activation codes for digital certificate revocation
WO2022127064A1 (zh) 一种车辆数字钥匙分配管理方法和装置
WO2018010474A1 (zh) 一种车联网终端之间安全通信的方法及装置
CN104584509A (zh) 一种共享数据的访问控制方法、装置及系统
CN104392405A (zh) 电子病历安全系统
WO2019076032A1 (zh) 一种用于对密钥进行分类存储的方法及系统
KR101220160B1 (ko) 모바일 클라우드 환경에서 안전한 프록시 재암호화 기반의 데이터 관리 방법
JPWO2018070242A1 (ja) 車載ゲートウェイ、鍵管理装置
JP2021511743A (ja) Iotサービスを実施するための方法、アプリケーションサーバ、iot装置および媒体
KR20210129742A (ko) 자율주행차 원격 제어용 암호적 안전 메커니즘
KR101568871B1 (ko) 멀티캐스트 통신방식을 적용한 바이탈 제어 시스템의 암호화 방법
JP6049914B2 (ja) 暗号システム、鍵生成装置及び再暗号化装置
WO2016040381A1 (en) Process for secure document exchange
KR20210128418A (ko) 리소스 요청 방법, 기기 및 저장매체
CN110830253A (zh) 密钥管理方法、装置、服务器、系统及存储介质
US20190354610A1 (en) Storage device and block chain enabled communication
WO2021237542A1 (zh) 数据处理、加密、解密方法、设备和存储介质
CN103906050A (zh) 基于移动终端的wpki安全监控方法和系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18869430

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2018869430

Country of ref document: EP

Effective date: 20200107

NENP Non-entry into the national phase

Ref country code: DE