CN103905384A - Embedded inter-terminal session handshake realization method based on security digital certificate - Google Patents

Embedded inter-terminal session handshake realization method based on security digital certificate Download PDF

Info

Publication number
CN103905384A
CN103905384A CN201210574593.3A CN201210574593A CN103905384A CN 103905384 A CN103905384 A CN 103905384A CN 201210574593 A CN201210574593 A CN 201210574593A CN 103905384 A CN103905384 A CN 103905384A
Authority
CN
China
Prior art keywords
session
terminal
certificate
message
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201210574593.3A
Other languages
Chinese (zh)
Other versions
CN103905384B (en
Inventor
王强
孙婉丽
臧宏伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Watchdata Co ltd
Original Assignee
Beijing WatchData System Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing WatchData System Co Ltd filed Critical Beijing WatchData System Co Ltd
Priority to CN201210574593.3A priority Critical patent/CN103905384B/en
Publication of CN103905384A publication Critical patent/CN103905384A/en
Application granted granted Critical
Publication of CN103905384B publication Critical patent/CN103905384B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Computer And Data Communications (AREA)

Abstract

The invention discloses an embedded inter-terminal session handshake realization method based on a security digital certificate. Digital signing is firstly performed on the related session request data by a session request terminal. A session message 1 is organized to be sent to a target terminal to initiate a session request. After validity of a request terminal certificate and a signature of the session message 1 is verified by the target terminal, a new session message 2 is organized to be returned to the request terminal. Then a pre-main session key is generated by the request terminal so that a final session key is obtained, and a new session message 3 is organized to be sent to the target terminal according to the pre-main session key. Finally the pre-main session key is obtained by the target terminal via calculation according to the session message 3, the final session key is generated and negotiation of the session key is completed. Establishment of communication sessions between embedded terminals without limitation of session requestors is realized, and security of the communication process is ensured via digital signing and verification modes.

Description

The implementation method of session handshake between the built-in terminal based on secure digital certificate
Technical field
The present invention relates to the safety verification technical field of terminal session, be specifically related to the implementation method of session handshake between a kind of built-in terminal based on secure digital certificate.
Background technology
Digital certificate is also digital certificates, or is called for short certificate, and in many instances, digital certificate, digital certificates and certificate are all the synonyms of public key certificate X.509, and it meets X.509V3 standard of ITU-T.Certificate is the security mechanism that new development is got up with the formation of PKI, and it realizes discriminating and identification (authentication), integrality, confidentiality and the non-repudiation security service (demand for security) of identity; Digital certificate is the proof of the online identity of each entity in ecommerce, and the identity that its proof entity is stated and the matching relationship of its PKI, bind entity identities and the PKI on certificate mutually; From the mechanism of public key management, digital certificate is the medium of public key system key management, and, in public key system, the distribution of PKI, transmission realize by certificate mechanism.So sometimes also digital certificate is called to public key certificate; Digital certificate is a kind of authoritative electronic document, and it is issued by the third-party institution with authority, credible wilfulness and fairness (CA).Digital certificate is the proof of identification that all kinds of entities (holder/individual, trade company/enterprise, gateway/bank etc.) carry out information interchange and commercial activity on the net, at the links of electronic transaction, the each side of transaction all needs to verify the validity of the other side's certificate, thereby solves mutual trust problem.Briefly, digital certificate is one section of data that comprise subscriber identity information, client public key information and authentication mechanism digital signature.The digital signature of authentication mechanism can be guaranteed the authenticity of certificate information.
On network, information can be through other computers in the transmitting procedure that is arrived destination host by source host.Generally, middle computer can not monitored the information of passing by.But in the time accessing Web bank or carry out credit card trade, the information on network is likely monitored by illegal molecule, thereby cause the leakage of individual privacy.Because Internet and Internet architecture exist some security breaches, always have some people and can intercept and capture and replace the raw information that user sends.Along with the development of ecommerce, people are also more and more higher to the requirement of information security, so Netscape(Netscape) company proposed SSL(ServerSocket Layer) agreement, be intended to reach the object at the upper safety of developing network (Internet), the ground transmission information of maintaining secrecy, this agreement obtains a wide range of applications on Web.SSL security protocol mainly provides the service of three aspects::
Authenticated user and server, make them can be sure of that data will be sent in correct client-server;
Enciphered data is to hide the data that are transmitted;
The integrality of service data, guarantees that data are not changed in transmitting procedure.
But in SSL interaction flow, mutual initiator always sends service request by user end to server, the terminal of initiation session is restricted.In addition, ssl protocol is the part in TCP/IP procotol alternately, at present in the interactive sessions flow process in the limited built-in network terminal of internal memory, also secure digital certificate is not applied to the case in the interactive sessions flow process in built-in network terminal, mutual between built-in terminal, all to develop appointment according to different demands, a not standard.
Summary of the invention
For the defect existing in prior art, the object of the present invention is to provide the implementation method of session handshake between a kind of built-in terminal based on secure digital certificate, realized the communication session of the limited built-in terminal of internal memory by the method.
For achieving the above object, the technical solution used in the present invention is as follows:
An implementation method for session handshake between the built-in terminal based on secure digital certificate, comprises the following steps:
(1) session requesting terminal organizes session message 1 to send to object terminal, initiates a session request; Described session message 1 comprises the digital signature S1 of terminal certificate, session ciphertext EKS1 and the session message 1 of requesting terminal;
(2) object terminal receives session message 1, terminal certificate and the digital signature S1 legitimacy of checking requesting terminal, and organize new session message 2 to return to requesting terminal; Described session message 2 comprises the digital signature S2 of terminal certificate, session ciphertext EKS2 and the session message 2 of object terminal;
(3) requesting terminal receives session message 2, and the terminal certificate of checking object terminal and the legitimacy of digital signature, generate pre-master session key R3, obtains final session key, and organize new session message 3 to send to object terminal according to pre-master session key;
(4) object terminal receives session message 3, and calculates pre-master session key R3 according to session message 3, generates final session key.
Further, the implementation method of session handshake between a kind of built-in terminal based on secure digital certificate as above, in step (1), organize the concrete mode of session message 1 to be:
(1-1) requesting terminal generates session data R1, and session data R1 is encrypted and obtains session ciphertext EKS1;
(1-2) requesting terminal Dui QiSSL version number, terminal certificate and session data R1 carry out digital signature and form signature S1;
(1-3) by the SSL version number of requesting terminal, terminal certificate, session ciphertext EKS1 and signature S1 composition session message 1.
Further, the implementation method of session handshake between a kind of built-in terminal based on secure digital certificate as above, in step (2), organize the concrete mode of session message 2 to be:
(2-1) the session ciphertext EKS1 that object terminal deciphering receives obtains session data R1;
(2-2) object terminal generates session data R2, and session data R2 is encrypted and obtains session ciphertext EKS2;
(2-3) object terminal is carried out digital signature to its SSL version number, terminal certificate, session data R2 and session data R1 and is formed signature S2;
(2-4) by the SSL version number of object terminal, terminal certificate, session ciphertext EKS2 and signature S2 composition session message 2.
Further, the implementation method of session handshake between a kind of built-in terminal based on secure digital certificate as above, described requesting terminal and object terminal are built-in network terminal, and requesting terminal is client, and object terminal is server end or client.
Further, the implementation method of session handshake between a kind of built-in terminal based on secure digital certificate as above, described SSL version number comprises the version of ssl protocol and the cryptographic algorithm of employing.
Further, the implementation method of session handshake between a kind of built-in terminal based on secure digital certificate as above, requesting terminal and object terminal are all used symmetric cryptographic key pre-buried in its terminal to be encrypted and to obtain session ciphertext session data.
Further, the implementation method of session handshake between a kind of built-in terminal based on secure digital certificate as above, in step (2), the concrete mode of the legitimacy of object terminal checking requesting terminal certificate and signature S1 is:
Object terminal receives after session message 1, verifies the legitimacy of requesting terminal certificate by CA certificate chain; Use pre-buried symmetric cryptographic key decrypted session ciphertext EKS1, obtain session data R1; Use the legitimacy of the public key verifications signature S1 of requesting terminal.
Further, the implementation method of session handshake between a kind of built-in terminal based on secure digital certificate as above, the effective status of terminal certificate comprises effective and invalid two states; If the effective status of certificate is effectively, proceed next step, if the effective status of certificate is invalid, the terminal that receives message is returned to the terminal miscue information that sends message, conversation end; When the legitimacy of certifying signature, if it is legal to sign, proceed next step; Illegal if signed, the terminal that receives message is returned to the terminal miscue information that sends message, conversation end.
Further, the implementation method of session handshake between a kind of built-in terminal based on secure digital certificate as above, in step (3), requesting terminal organizes the concrete mode of new session message 3 to be:
Requesting terminal generates pre-master session key R3, and the public key encryption of R3 application target terminal is obtained to session ciphertext M1, the certificate effective status of session ciphertext M1 and object terminal is carried out to digital signature and obtain the S3 that signs, and signature S3 is as session message 3.
Further, the implementation method of session handshake between a kind of built-in terminal based on secure digital certificate as above, in step (4), the concrete mode that object terminal is calculated the final session key of generation according to session message 3 is:
Object terminal receives session message 3, and the PKI deciphering of use requesting terminal obtains session message 3 and obtains ciphertext M1, and the PKI decrypting ciphertext M1 of application target terminal obtains pre-master session key R3, according to pre-master session key, generates final session key.
Further again, the implementation method of session handshake between a kind of built-in terminal based on secure digital certificate as above, described final session key is to calculate and obtain by the combination of pre-master session key R3, requesting terminal session data R1, object terminal session data R2 and count value C being carried out to Hash, and computing formula is:
The final pre-master session key R3+ of session key KCV=Hash(requesting terminal session data R1+ object terminal session data R2+C);
Count value C is along with session establishment flow process adds 1.
Further, the implementation method of session handshake between a kind of built-in terminal based on secure digital certificate as above, the random number that the terminal that requesting terminal session data R1, object terminal session data R2 and pre-master session key R3 are corresponding generation session data generates.
Beneficial effect of the present invention is: method of the present invention has realized the foundation of secured session flow process between the limited intelligent built-in terminal of internal memory, for example hand-held set, intelligent ammeter module etc., the method is not limited between built-in network terminal principal and subordinate or from the handshake session flow process between slave, can initiates the request of setting up communication session by either party; And by introduce the function such as digital certificate signature, checking in session flow process, form and interaction flow to session message are protected, and communication media is not only confined to TCP/IP Internet Transmission, can comprise other wireless transmission.
Accompanying drawing explanation
Fig. 1 is the schematic diagram of SSL one-sided server authentication in shaking hands in prior art;
Fig. 2 is the shake hands schematic diagram of middle two-way authentication of SSL in prior art;
Fig. 3 is the flow chart of the implementation method of session handshake between a kind of built-in terminal based on secure digital certificate of the present invention;
Fig. 4 is the schematic diagram of setting up session handshake in embodiment between built-in terminal.
Embodiment
Below in conjunction with Figure of description and embodiment, the present invention is described in further detail.
Ssl protocol is between ICP/IP protocol and various application layer protocol, for data communication provides safe support.In SSL interactive sessions flow process, interactive sessions is always sent service request by user end to server, and flow process is as follows:
According to different application, SSL is also different to the requirement of certificate, can be folk prescription authentication (such as HTTP, FTP), can be also mutual authentication (such as Web bank).Under normal circumstances, the certificate of server end must possess, and the certificate of client not necessarily.As shown in Figures 1 and 2, Key[s_pub in figure] (message) represent the public key encryption message of server, Key[c_pub] (message) represent the public key encryption message of client.Folk prescription server authentication schematic diagram shown in Fig. 1, in this session flow process, only have server to there is certificate, client is by sending " Hello to server, I ' m client " initiate a session request, server is replied client and server certificate is sent to client, client verifies and obtains server public key to server identity, client is used server public key to encrypt the session key of this session, and the session key after this encryption is sent to server, its private key of server by utilizing is deciphered the information of obtaining and is obtained session key, set up the call of client and server.Shown in Fig. 2 is the schematic diagram of two-way authentication, and in this session flow process, server and client side needs to install digital certificate, and client verifies server, and server is also verified client.
Because intelligent built-in terminal internal memory is limited, also secure digital certificate is not applied in the prior art in the interactive sessions flow process in built-in network terminal, the present invention has proposed the implementation method of session handshake between a kind of built-in terminal based on secure digital certificate just for this problem, the method is by the SSL session handshake agreement after improving, utilize PKI(Public Key Infrastructure, PKIX) secure digital certificate function in system, complete the foundation of secure interactive handshake procedure between built-in terminal.Fig. 3 shows the flow chart of the method, and Fig. 4 shows the schematic diagram of setting up inter-terminal session based on the method, and as can be seen from Figure, the method comprises the following steps:
Step S11: requesting terminal organizes message to send to object terminal, initiates a session request;
Terminal in the present invention is built-in terminal, and the foundation of session flow process is not limited to send service request by user end to server end in existing SSL, can be initiated to set up by either party the request of communication reply.In present embodiment, the terminal of initiation session is called to requesting terminal, another terminal of communication is called to object terminal.First, organize session message 1 to send to object terminal by requesting terminal, to initiate a session request.Wherein, session message 1 comprises the digital signature S1 of terminal certificate, session ciphertext EKS1 and the session message 1 of requesting terminal.In present embodiment, session message 1 is organized in requesting terminal, and to the concrete mode that session message 1 carries out digital signature is:
Generate session data R1 by requesting terminal, session data is encrypted and obtains encrypting ciphertext EKS1; Requesting terminal Dui QiSSL version number, terminal certificate and session data R1 carry out digital signature and form digital signature S1, form session message 1 by SSL version number, terminal certificate, encryption ciphertext EKS1 and the digital signature S1 of requesting terminal.Wherein, session data in present embodiment (comprising that the session data R1 of this step S11 is with the session message in subsequent step) is by the random number that terminal was generated that generates message, and session ciphertext (the session ciphertext in this step and the session ciphertext of subsequent step) is session data to be encrypted and to be obtained by using at the pre-buried symmetric cryptographic key in two terminals of communicating by letter by the generation terminal of message.In this step, in the rear use terminal of requesting terminal generation random number R 1, pre-buried symmetric cryptographic key is encrypted and obtains session ciphertext EKSI session data.SSL version number represents the version of ssl protocol and the cryptographic algorithm of employing.It is as follows that in present embodiment, message 1 detailed step is organized in requesting terminal:
1) requesting terminal A generates random number R 1;
2) use pre-buried symmetric cryptographic key to encrypt and obtain session ciphertext EKS1(R1 random number R 1);
3) obtain requesting terminal version number;
4) obtain the terminal certificate CM of requesting terminal A;
5) version number, terminal certificate CM, R1 are carried out to digital signature and form signature S1;
6) by session ciphertext EKS1 and signature S1 composition session message 1.
Step S12: object terminal receives the message that requesting terminal sends, checking requesting terminal certificate and signature legitimacy, organize new message to send back to requesting terminal;
Object terminal receives after the session message 1 of requesting terminal transmission, first verifies the legitimacy of requesting terminal certificate and digital signature, and organizes new session message 2 to return to requesting terminal.Equally, session message 2 comprises in the digital signature S2 present embodiment of terminal certificate, session ciphertext EKS2 and session message 2 of object terminal and organizes the concrete mode of session message 2 to be:
First object terminal is used pre-buried symmetric cryptographic key to decipher the session ciphertext EKS1 receiving and obtains session data R1; Then object terminal generates session data R2, and session data R2 is encrypted and obtains session ciphertext EKS2; Finally by object terminal, its SSL version number, terminal certificate, session data R2 and session data R1 are carried out to digital signature and form signature S2, by its SSL version number, terminal certificate, session ciphertext EKS2 and digital signature S2 composition session message 2.
The concrete mode of the legitimacy of object terminal checking requesting terminal certificate and signature S1 is:
Object terminal receives after session message 1, verifies the legitimacy of requesting terminal certificate by CA certificate chain, uses its pre-buried symmetric cryptographic key decrypted session ciphertext EKS1, obtains session data R1; Use the legitimacy of the public key verifications signature S1 of requesting terminal.Due to signature, S1 is the digital signature that SSL version number, terminal certificate and session data R1 to requesting terminal carry out, therefore use the public key verifications signature S1 of requesting terminal, corresponding data in related signature data and the session message 1 of SSL version number, terminal certificate and the session data R1 of the requesting terminal that checking is obtained is verified and is compared, if unanimously, illustrate that signature is legal, on the contrary illegal.。Wherein, the validity of the checking certificate CM of requesting terminal main website, verify by CA certificate chain, the effective status of terminal certificate can be divided into effectively and invalid two kinds, (effectively) continues subsequent step if the verification passes, if authentication failed (invalid), the terminal that receives message is returned to the terminal miscue information that sends message, conversation end; When the legitimacy of certifying signature, if it is legal to sign, proceed next step.If it is illegal to sign when certifying signature legitimacy, the terminal that receives message is returned to the terminal miscue information that sends message, conversation end.The detailed step that this step reception session message 1 sends session message 2 is again as follows:
1) object terminal receives session message 1, verification terminal certificate validity; Be verified continuation, otherwise session establishment finishes;
2), after requesting terminal certification authentication is passed through, object terminal is used pre-buried symmetric cryptographic key deciphering EKS1(R1) obtain session data R1;
3) by terminal A PKI decrypted signature S1, the legitimacy of certifying signature S1; Legal if signed, continue, can not connect if do not conform to rule prompting, session establishment finishes;
4) object terminal B generates random number R 2(session data);
5) utilize symmetric key pre-buried in object terminal to encrypt and generate session ciphertext EKS2(R2 random number R 2);
6) terminal certificate Cd, session data R2 and the session data R1 of the SSL version number to object terminal, object terminal B) carry out digital signature and obtain the S2 that signs;
7) by session ciphertext EKS2 and signature 2 composition session messages 2.
Wherein, digital signature in the present invention is all to use the certificate private key of the terminal that sends session message to carry out, be in step S11, to use the certificate private key of requesting terminal to carry out digital signature to obtain the S1 that signs, in step S12, the certificate private key of application target terminal B carries out digital signature and obtains the S2 that signs.
Step S13: requesting terminal receives the new message that object terminal is returned, the effective status of checking object terminal certificate and the legitimacy of its digital signature, generate pre-master session key, generates final session key, and organize new message to send to object terminal;
Step S14: object terminal receives the new message that requesting terminal sends, and deciphers new message and obtains pre-master session key, generates final session key.
Requesting terminal receives after the session message 2 that object terminal returns, first verify the legitimacy of object terminal certificate and signature S2, generate pre-master session key R3, obtain final session key, and organize new session message 3 to send to object terminal according to pre-master session key.Requesting terminal organizes the concrete mode of new session message 3 to be: requesting terminal generates pre-master session key R3, the public key encryption of R3 application target terminal is obtained to session ciphertext M1, the certificate effective status of session ciphertext M1 and object terminal is carried out to digital signature and obtain the S3 that signs, signature S3 sends to object terminal as session message 3.
The concrete mode that object terminal generates final session key according to session message 3 is: object terminal receives session message 3, the PKI deciphering of use requesting terminal obtains session message 3 and obtains ciphertext M1, the PKI decrypting ciphertext M1 of application target terminal obtains pre-master session key R3, according to pre-master session key, generate final session key.
Final session key in present embodiment is to calculate and obtain by the combination of pre-master session key R3, requesting terminal session data R1, object terminal session data R2 and count value C being carried out to Hash, and computing formula is:
The final pre-master session key R3+ of session key KCV=Hash(requesting terminal session data R1+ object terminal session data R2+C);
Count value C is along with the initial value that session establishment flow process adds 1, C can be set as required by user, and in present embodiment, the initial value of C is 00000001.Wherein, the pre-master session key R3 in present embodiment is the same with requesting terminal session data R1 and object terminal session data R2, is the random number that the terminal of corresponding generation session data generates.
In present embodiment, step S13 obtains final session key and organizes the concrete steps of session message 3 as follows:
1) requesting terminal receives session message 2, verifies object terminal B digital certificate validity, returns to the effective status of terminal B digital certificate; If certificate is effective, enter next step; If invalid, session establishment finishes;
2) utilize pre-buried symmetric key decrypted session EKS2 to solve random number R 2;
3) certifying signature S2 legitimacy; Legal if signed, enter next step; If illegal, session establishment finishes;
4) requesting terminal A generates random number R 3, as pre-master session key, uses terminal B PKI Kud to encrypt and obtains ciphertext M1;
5) M1 and object terminal B effective status signature are generated to session message 3;
6) generate final session key, the final pre-master session key R3+ of session key KCV=Hash(random number R 1+ random number R 2+00000001).
The concrete steps that step S14 reception session message 3 generates final session key are as follows:
1) object terminal receives session message 3, the validity of checking S3;
2) utilize object terminal B PKI Kud deciphering M1 to obtain pre-master session key R3;
3) the final pre-master key R3+ of session key KCV=Hash random number R 1+ random number R 2+00000001).
By above 4 steps, complete the negotiation to final session key KCV, set up transfer of data flow process backward.In the method for the invention, not only support the algorithms library that SSL supports, and expanded SM1, SM2, SM3, SM4, SSF33, SCB2 algorithm through the close authentication of state, as shown in the table:
Figure BDA00002654555200101
Can realize in the limited intelligent built-in terminal of internal memory by method of the present invention, for example hand-held set, intelligent ammeter modules etc., copy the SSL interaction flow in http protocol, utilize the secure digital certificate function in PKI system, complete the foundation to terminal room secured session flow process.
Obviously, those skilled in the art can carry out various changes and modification and not depart from the spirit and scope of the present invention the present invention.Like this, if within of the present invention these are revised and modification belongs to the scope of the claims in the present invention and equivalent technology thereof, the present invention is also intended to comprise these changes and modification interior.

Claims (12)

1. an implementation method for session handshake between the built-in terminal based on secure digital certificate, comprises the following steps:
(1) session requesting terminal organizes session message 1 to send to object terminal, initiates a session request; Described session message 1 comprises the digital signature S1 of terminal certificate, session ciphertext EKS1 and the session message 1 of requesting terminal;
(2) object terminal receives session message 1, terminal certificate and the digital signature S1 legitimacy of checking requesting terminal, and organize new session message 2 to return to requesting terminal; Described session message 2 comprises the digital signature S2 of terminal certificate, session ciphertext EKS2 and the session message 2 of object terminal;
(3) requesting terminal receives session message 2, and the terminal certificate of checking object terminal and the legitimacy of digital signature, generate pre-master session key R3, obtains final session key, and organize new session message 3 to send to object terminal according to pre-master session key;
(4) object terminal receives session message 3, and calculates pre-master session key R3 according to session message 3, generates final session key.
2. the implementation method of session handshake between a kind of built-in terminal based on secure digital certificate as described in right 1, is characterized in that: in step (1), organize the concrete mode of session message 1 to be:
(1-1) requesting terminal generates session data R1, and session data R1 is encrypted and obtains session ciphertext EKS1;
(1-2) requesting terminal Dui QiSSL version number, terminal certificate and session data R1 carry out digital signature and form signature S1;
(1-3) by the SSL version number of requesting terminal, terminal certificate, session ciphertext EKS1 and signature S1 composition session message 1.
3. the implementation method of session handshake between a kind of built-in terminal based on secure digital certificate as described in right 2, is characterized in that: in step (2), organize the concrete mode of session message 2 to be:
(2-1) the session ciphertext EKS1 that object terminal deciphering receives obtains session data R1;
(2-2) object terminal generates session data R2, and session data R2 is encrypted and obtains session ciphertext EKS2;
(2-3) object terminal is carried out digital signature to its SSL version number, terminal certificate, session data R2 and session data R1 and is formed signature S2;
(2-4) by the SSL version number of object terminal, terminal certificate, session ciphertext EKS2 and signature S2 composition session message 2.
4. the implementation method of session handshake between a kind of built-in terminal based on secure digital certificate as described in one of claims 1 to 3, it is characterized in that: described requesting terminal and object terminal are built-in network terminal, requesting terminal is client, and object terminal is server end or client.
5. the implementation method of session handshake between a kind of built-in terminal based on secure digital certificate as claimed in claim 4, is characterized in that: described SSL version number comprises the version of ssl protocol and the cryptographic algorithm of employing.
6. the implementation method of session handshake between a kind of built-in terminal based on secure digital certificate as claimed in claim 5, is characterized in that: requesting terminal and object terminal are all used symmetric cryptographic key pre-buried in its terminal to be encrypted and to obtain session ciphertext session data.
7. the implementation method of session handshake between a kind of built-in terminal based on secure digital certificate as claimed in claim 6, is characterized in that: in step (2), the concrete mode of the legitimacy of object terminal checking requesting terminal certificate and signature S1 is:
Object terminal receives after session message 1, verifies the legitimacy of requesting terminal certificate by CA certificate chain; Use pre-buried symmetric cryptographic key decrypted session ciphertext EKS1, obtain session data R1; Use the legitimacy of the public key verifications signature S1 of requesting terminal.
8. the implementation method of session handshake between a kind of built-in terminal based on secure digital certificate as claimed in claim 7, is characterized in that: the effective status of terminal certificate comprises effective and invalid two states; If the effective status of certificate is effectively, proceed next step, if the effective status of certificate is invalid, the terminal that receives message is returned to the terminal miscue information that sends message, conversation end; When the legitimacy of certifying signature, if it is legal to sign, proceed next step; Illegal if signed, the terminal that receives message is returned to the terminal miscue information that sends message, conversation end.
9. the implementation method of session handshake between a kind of built-in terminal based on secure digital certificate as claimed in claim 7, is characterized in that: in step (3), requesting terminal organizes the concrete mode of new session message 3 to be:
Requesting terminal generates pre-master session key R3, and the public key encryption of R3 application target terminal is obtained to session ciphertext M1, the certificate effective status of session ciphertext M1 and object terminal is carried out to digital signature and obtain the S3 that signs, and signature S3 is as session message 3.
10. the implementation method of session handshake between a kind of built-in terminal based on secure digital certificate as claimed in claim 9, is characterized in that: in step (4), the concrete mode that object terminal is calculated the final session key of generation according to session message 3 is:
Object terminal receives session message 3, and the PKI deciphering of use requesting terminal obtains session message 3 and obtains ciphertext M1, and the PKI decrypting ciphertext M1 of application target terminal obtains pre-master session key R3, according to pre-master session key, generates final session key.
The implementation method of session handshake between 11. a kind of built-in terminals based on secure digital certificate as claimed in claim 10, it is characterized in that: described final session key is to calculate and obtain by the combination of pre-master session key R3, requesting terminal session data R1, object terminal session data R2 and count value C being carried out to Hash, and computing formula is:
The final pre-master session key R3+ of session key KCV=Hash(requesting terminal session data R1+ object terminal session data R2+C);
Count value C is along with session establishment flow process adds 1.
The implementation method of session handshake between 12. a kind of built-in terminals based on secure digital certificate as claimed in claim 11, is characterized in that: the random number that the terminal that requesting terminal session data R1, object terminal session data R2 and pre-master session key R3 are corresponding generation session data generates.
CN201210574593.3A 2012-12-26 2012-12-26 The implementation method of session handshake between built-in terminal based on secure digital certificate Expired - Fee Related CN103905384B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210574593.3A CN103905384B (en) 2012-12-26 2012-12-26 The implementation method of session handshake between built-in terminal based on secure digital certificate

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210574593.3A CN103905384B (en) 2012-12-26 2012-12-26 The implementation method of session handshake between built-in terminal based on secure digital certificate

Publications (2)

Publication Number Publication Date
CN103905384A true CN103905384A (en) 2014-07-02
CN103905384B CN103905384B (en) 2017-11-24

Family

ID=50996540

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210574593.3A Expired - Fee Related CN103905384B (en) 2012-12-26 2012-12-26 The implementation method of session handshake between built-in terminal based on secure digital certificate

Country Status (1)

Country Link
CN (1) CN103905384B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104394123A (en) * 2014-11-06 2015-03-04 成都卫士通信息产业股份有限公司 A data encryption transmission system and method based on an HTTP
CN104917753A (en) * 2015-05-04 2015-09-16 北京奇艺世纪科技有限公司 Method and system for communication based on symmetric keys
CN105306493A (en) * 2015-11-26 2016-02-03 北京奇虎科技有限公司 Method and system for implementing IPC (IP Camera) service based on encryption mechanism
CN107707508A (en) * 2016-08-09 2018-02-16 中兴通讯股份有限公司 Applied business recognition methods and device
CN109343515A (en) * 2018-11-30 2019-02-15 深圳市元征科技股份有限公司 Car fault diagnosis method, system, equipment and computer readable storage medium
CN109391618A (en) * 2018-10-18 2019-02-26 平安科技(深圳)有限公司 A kind of method for building up and system of communication link
CN109740321A (en) * 2018-12-25 2019-05-10 北京深思数盾科技股份有限公司 Revoke method, encryption equipment and the vendor server of encryption equipment administrator lock
CN110099063A (en) * 2019-05-08 2019-08-06 杭州健康在线信息技术有限公司 A kind of generation method of meeting registration voucher
CN112861156A (en) * 2021-02-26 2021-05-28 上海升途智能***有限公司 Secure communication method and device for display data, electronic equipment and storage medium
CN113259096A (en) * 2021-04-27 2021-08-13 江南信安(北京)科技有限公司 Key online negotiation method and system suitable for communication environment of Internet of things
CN115426344A (en) * 2022-08-29 2022-12-02 高翔水表有限公司 Instrument remote communication control method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101127604A (en) * 2007-09-25 2008-02-20 中兴通讯股份有限公司 Information secure transmission method and system
US20090210712A1 (en) * 2008-02-19 2009-08-20 Nicolas Fort Method for server-side detection of man-in-the-middle attacks
CN101567784A (en) * 2008-04-21 2009-10-28 成都市华为赛门铁克科技有限公司 Method, system and equipment for acquiring key
CN101860548A (en) * 2010-06-17 2010-10-13 北京握奇数据***有限公司 Method, device and system for verifying data signature
CN102065125A (en) * 2010-11-18 2011-05-18 广州致远电子有限公司 Method for realizing embedded secure socket layer virtual private network (SSL VPN)

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101127604A (en) * 2007-09-25 2008-02-20 中兴通讯股份有限公司 Information secure transmission method and system
US20090210712A1 (en) * 2008-02-19 2009-08-20 Nicolas Fort Method for server-side detection of man-in-the-middle attacks
CN101567784A (en) * 2008-04-21 2009-10-28 成都市华为赛门铁克科技有限公司 Method, system and equipment for acquiring key
CN101860548A (en) * 2010-06-17 2010-10-13 北京握奇数据***有限公司 Method, device and system for verifying data signature
CN102065125A (en) * 2010-11-18 2011-05-18 广州致远电子有限公司 Method for realizing embedded secure socket layer virtual private network (SSL VPN)

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
《张梅等》: "《基于PKI的SSL协议的描述及安全性分析》", 《微计算机信息》 *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104394123A (en) * 2014-11-06 2015-03-04 成都卫士通信息产业股份有限公司 A data encryption transmission system and method based on an HTTP
CN104917753A (en) * 2015-05-04 2015-09-16 北京奇艺世纪科技有限公司 Method and system for communication based on symmetric keys
CN104917753B (en) * 2015-05-04 2018-07-10 北京奇艺世纪科技有限公司 A kind of method and system to be communicated based on symmetric key
CN105306493A (en) * 2015-11-26 2016-02-03 北京奇虎科技有限公司 Method and system for implementing IPC (IP Camera) service based on encryption mechanism
CN105306493B (en) * 2015-11-26 2019-02-15 北京奇虎科技有限公司 IPC service implementing method and system based on encryption mechanism
CN107707508A (en) * 2016-08-09 2018-02-16 中兴通讯股份有限公司 Applied business recognition methods and device
CN109391618B (en) * 2018-10-18 2021-09-03 平安科技(深圳)有限公司 Method and system for establishing communication link
CN109391618A (en) * 2018-10-18 2019-02-26 平安科技(深圳)有限公司 A kind of method for building up and system of communication link
CN109343515A (en) * 2018-11-30 2019-02-15 深圳市元征科技股份有限公司 Car fault diagnosis method, system, equipment and computer readable storage medium
CN109740321A (en) * 2018-12-25 2019-05-10 北京深思数盾科技股份有限公司 Revoke method, encryption equipment and the vendor server of encryption equipment administrator lock
CN110099063A (en) * 2019-05-08 2019-08-06 杭州健康在线信息技术有限公司 A kind of generation method of meeting registration voucher
CN110099063B (en) * 2019-05-08 2020-05-26 杭州健康在线信息技术有限公司 Method for generating conference registration certificate
CN112861156A (en) * 2021-02-26 2021-05-28 上海升途智能***有限公司 Secure communication method and device for display data, electronic equipment and storage medium
CN113259096A (en) * 2021-04-27 2021-08-13 江南信安(北京)科技有限公司 Key online negotiation method and system suitable for communication environment of Internet of things
CN115426344A (en) * 2022-08-29 2022-12-02 高翔水表有限公司 Instrument remote communication control method

Also Published As

Publication number Publication date
CN103905384B (en) 2017-11-24

Similar Documents

Publication Publication Date Title
CN111083131B (en) Lightweight identity authentication method for power Internet of things sensing terminal
US20220224551A1 (en) Mutual authentication of confidential communication
US9794249B1 (en) Using a digital certificate with multiple cryptosystems
CN103905384B (en) The implementation method of session handshake between built-in terminal based on secure digital certificate
CN102594558B (en) Anonymous digital certificate system and verification method of trustable computing environment
US6839841B1 (en) Self-generation of certificates using secure microprocessor in a device for transferring digital information
US7366905B2 (en) Method and system for user generated keys and certificates
CN101212293B (en) Identity authentication method and system
US20020038420A1 (en) Method for efficient public key based certification for mobile and desktop environments
US20050216736A1 (en) System and method for combining user and platform authentication in negotiated channel security protocols
CN107105060A (en) A kind of method for realizing electric automobile information security
CN1980121B (en) Electronic signing mobile terminal, system and method
CN108243166A (en) A kind of identity identifying method and system based on USBKey
WO2000045241A2 (en) Self-generation of certificates using a secure microprocessor in a device for transferring digital information
CN102404347A (en) Mobile internet access authentication method based on public key infrastructure
CN104901935A (en) Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem)
WO2015158172A1 (en) User identity identification card
CN105610773A (en) Communication encryption method of electric energy meter remote meter reading
CN114036539A (en) Safety auditable Internet of things data sharing system and method based on block chain
CN103684798A (en) Authentication system used in distributed user service
CN114331456A (en) Communication method, device, system and readable storage medium
CN110611679A (en) Data transmission method, device, equipment and system
GB2543359A (en) Methods and apparatus for secure communication
CN115174277B (en) Data communication and file exchange method based on block chain
CN113676330B (en) Digital certificate application system and method based on secondary secret key

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 100102 Beijing city Chaoyang District Wangjing Lize Park No. 101 Qiming International Building 7

Patentee after: BEIJING WATCHDATA Co.,Ltd.

Address before: 100102 Beijing city Chaoyang District Wangjing Lize Park No. 101 Qiming International Building 7

Patentee before: BEIJING WATCH DATA SYSTEM Co.,Ltd.

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20171124

Termination date: 20211226