CN1180566C - Method of realizing safe and reliable interconnection between network equipments - Google Patents

Method of realizing safe and reliable interconnection between network equipments Download PDF

Info

Publication number
CN1180566C
CN1180566C CNB021294534A CN02129453A CN1180566C CN 1180566 C CN1180566 C CN 1180566C CN B021294534 A CNB021294534 A CN B021294534A CN 02129453 A CN02129453 A CN 02129453A CN 1180566 C CN1180566 C CN 1180566C
Authority
CN
China
Prior art keywords
access device
application access
equipment
network
asset management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB021294534A
Other languages
Chinese (zh)
Other versions
CN1479483A (en
Inventor
吴秋新
孟闯
黄景楠
刘向东
庄渭峰
张德魁
罗予晋
任艳频
张渊毅
李明
姜珊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CNB021294534A priority Critical patent/CN1180566C/en
Publication of CN1479483A publication Critical patent/CN1479483A/en
Application granted granted Critical
Publication of CN1180566C publication Critical patent/CN1180566C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Small-Scale Networks (AREA)

Abstract

The present invention discloses a method for realizing the secure and reliable interconnection between network equipment. The present invention is characterized in that when equipment requesting for access registers in a network, a connection authentication cipher key of the equipment is firstly configured; after the registration authentication of the equipment is successful, connected equipment at the opposite end confirms a secure transmission rank and a network resource use right according to the configured connection authentication cipher key for realizing secure data transmission between the equipment. The adoption of the method can ensure and increase the secure reliability of the interconnection and the use of household equipment in a digital family network.

Description

A kind of method that realizes safe and reliable interconnection between network equipments
Technical field
The present invention relates to a kind of security mechanism, be meant a kind of implementation method that is applicable to the assurance safe and reliable interconnection between network equipments in digital home network or the minimized office network especially.
Background of invention
Raising along with people's living standard, equipment such as the information equipment in the home-ranges, communication apparatus, amusement equipment, household electrical appliance, automation equipment, guard monitor device increase gradually, simultaneously, because the rapid progress of the flourish and smart machine of personal computer and internet popularizing rapidly in the family, telecom technology, home network is subjected to extensive concern day by day, and people also more show strong for demand simple, flexible and home network reliably.So, proposed much such as: Smart Home (Smart Home), electronic family (Electronic Home, e-Home), the home network notion of digital home (DigitalFamily), network home (Network Home), intelligent family (Intelligent Home).Concretely, home network (Home network) is actual to comprise four layers of implication: 1. the information equipment in the family, communication apparatus, amusement equipment, household electrical appliance, automation equipment, guard monitor device etc. interconnect, resource-sharing, form the home intelligence network system; 2. by gateway and community, Internet connection, realize information exchange with family's external environment condition; 3. the network of the equipment of family and connection thereof should satisfy the primary demand of people's safety, convenience, comfortable, healthy and environmental protection, for people provide body and mind joyful experience; 4. embody the theory that people-oriented, be easy to use, safe and reliable, maintain easily, price is suitable, satisfies the characteristics of life at home.
In view of this, the applicant has proposed a kind of digital family network system in another patent application, as shown in Figure 1, this system mainly is made of gateway 11, an above backbone network equipment 12 and a plurality of control subnet equipment 13, this gateway 11 may further include two parts: link to each other by broadband interface between door gateway 110 and the control gateway 111, door gateway 110 and control gateway 111.Based on this system configuration as can be seen, this digital home network is made up of backbone network and two subnets of control subnet, wherein, be called backbone network by door gateway 110 and the formed network portion of connected housed device, backbone network is mainly used in the interconnection that realizes information equipment, communication apparatus, amusement equipment etc.; And being called the control subnet by control gateway 111 and the formed network portion of connected housed device, the control subnet master is used to realize the interconnection of equipment such as household electrical appliance, automation equipment, guard monitor device.
The core concept of digital home network is exactly: make housed device interconnection and interflow, resource-sharing on the network.So, how to guarantee the equipment operate as normal, guarantee data integrity and confidentiality then seems particularly important.At present, in various communication networks, all have safety certification or secure communication mechanism, traditional information security flow process, shown in step 201 among Fig. 2~205: system reads the password of active user's input earlier or transmits the password in the password territory in the data; Reading safe key then from the inherently safe handling procedure compares with the password of reading; Judge whether password is identical with key,, then enter step 204 operation down-stream if the result is true, promptly identical; If the result is false, promptly different, then enter step 205 interrupt routine or enter recurrent state, wait for and re-enter password or transmission data.
Generally in the various types of communication network, authentication operations when equipment or user insert or register is absolutely necessary, but transfer of data after inserting or registering and Internet resources use does not then have unified safety assurance, does not all consider the security mechanism that transfer of data and resource are used usually.And the information security issue in the digital home network and other network are not quite alike, what relate generally in home-ranges is the rights of using problem of the legal access and the service of equipment, consider many-sided particular problems such as ease for use of use simultaneously again, so with traditional general secured fashion too simple in some cases, too complicated again in some cases, can't satisfy user's demand, therefore, in home network, also not propose the security mechanism solution that is fit at present.
Summary of the invention
In view of this, main purpose of the present invention is to provide a kind of method that realizes safe and reliable interconnection between network equipments, to guarantee and to improve equipment room interconnection in the network and security reliability when using.
For achieving the above object, technical scheme of the present invention is achieved in that
A kind of method that realizes safe and reliable interconnection between network equipments, this method comprises:
When the application access device is registered, dispose the connection authenticate key of this application access device earlier in network; After the success of this application access device authentication registration, that be connected with this application access device and successfully registration opposite equip. that this application access device arranged determine the safe transmission rank and the Internet resources rights of using of current application access device according to connection authenticate key that is disposed and the logon mode that self is provided with; Needs set up the current application access device of escape way and successfully registration have between the opposite equip. of this application access device and set up the Transport Layer Security passage, realize the secure data transmission of equipment room.
The connection authenticate key of described application access device is by the cipher key configuration hypervisor granting in the asset management device that is attached thereto.In this case, asset management device can allow the registration network equipment thereon to share the same authenticate key that is connected with all, and the Internet resources rights of using of then described definite current application access device are: the current application access device of asset management device mandate uses registered all-network resource; The described escape way of setting up is: serve as that the Transport Layer Security passage is set up in the basis between current application access device and asset management device with the connection authenticate key of sharing directly, realize the secure data transmission of equipment room.
Asset management device also can allow the registration network equipment thereon to share different connection authenticate keys with each, and the Internet resources rights of using of then described definite current application access device are: the current application access device of asset management device mandate uses registered common network resource.This method further comprises: produce same shared connection authenticate key by asset management device between two or more equipment, authorize the private network resource of sharing mutually between the network equipment that has same connection authenticate key separately; The described escape way of setting up is: the shared connection authenticate key with generation is that the Transport Layer Security passage between current application access device and the asset management device is set up on the basis, realizes the secure data transmission of equipment room.
The connection authenticate key of described application access device also can be configured by the application program of equipment self setting, and this layoutprocedure is finished in this locality, or is finished by remote equipment control.So, this method further comprises: when interconnecting between two network equipments, to connect authenticate key, determine transmission security key by the auto-negotiation mode, realize the equipment room secure data transmission.
Method of the present invention can further comprise: asset management device promptly allows this application access device successfully to register after receiving the register requirement of application access device; The Internet resources rights of using of then described definite current application access device are: authorize current application access device to use registered common network resource, and allow equipment room directly to transmit data.
In the such scheme, the network that the application access device inserts can be digital home network, or the minimized office network.
Therefore, the method of realization safe and reliable interconnection between network equipments provided by the present invention, owing to when facility registration, just this equipment is connected the authenticate key setting, and according to the last shared key of determining between this equipment and the asset management device or between two interconnect equipments, further determine the Internet resources rights of using and the safe transmission rank of this equipment, thereby guaranteed the security reliability of LA Management Room communication from registration, interconnection, transfer of data to resource-sharing.
Description of drawings
The domestic network system structural representation that Fig. 1 adopts for the present invention;
Fig. 2 is traditional information security handling process schematic diagram;
Fig. 3 is the housed device register flow path schematic diagram when having asset management device;
Fig. 4 is the housed device register flow path schematic diagram when not having asset management device;
Fig. 5 is the schematic diagram of cipher key configuration process among the present invention;
Fig. 6 is the facility registration flow chart that asset management device and all devices are shared a key;
Fig. 7 is the facility registration flow chart of asset management device logon mode for shared key.
Embodiment
Each housed device in the digital home network is equipped with the level of security of self, comprising: authentication security rank, data transmission security rank and authorizing secure rank.Table 1~table 3 has provided the definition and the explanation thereof of device authentication rank, transfer level and authority levels successively.Wherein, table 1 is a device security level definition table; Table 2 is the data transmission security level definition table of equipment; Table 3 is the authority levels definition list of equipment.
Certification level Value Explanation
Need not authentication ?1 Anonymous
Authentication I ?2 CHAP agreement based on symmetric key
Authentication II ?3 CHAP agreement based on PKI-X.509 certificate mode
Table 1
The data transmission security rank Value Explanation
Plaintext transmission I ?1 No parity check
Plaintext transmission II ?2 Completeness check
The ciphertext transmission ?3 Message authentication, completeness check
Confidential transmissions ?4 Confidentiality, integrality, non-repudiation (signature authentication), preventing playback attack (timestamp)
Table 2
Authority levels Value Explanation
Certificate Authority 1 Safety certification is mandate
The local mandate 2 By local authorization list mandate
The third party authorizes 3 By the aaa server mandate
Table 3
Be example with the device A registration process below, specify the implementation method of safe and reliable interconnection between home network device in conjunction with the accompanying drawings.
In digital home network, all need earlier through safety certification when interconnecting between housed device and the asset management device or between the housed device.Herein, family's asset management device of being mentioned is meant the equipment that facility registration and service index function can be provided in family's network range, such as: door gateway, control gateway or server.As shown in Figure 3, when the home network resource management equipment existed, equipment wanted to add this home network, just must register to asset management device.Asset management device is initiated authentication to this equipment during registration, and authentication is by then this facility registration success.Authenticate key is responsible for by special cipher key configuration hypervisor, and this program can be on asset management device, also can be on other any equipment that interactive capability arranged.
Exist when asset management device but have when a plurality of, for the housed device of applying for the registration of, to judge earlier whether it has disposed the asset management device of appointment, if have, then whether this equipment is by existing the asset management device of appointment in the equipment search procedure Network Search, if exist, then device A is to this asset management device initiating equipment register requirement.If this equipment does not dispose the asset management device of appointment, its first all asset management devices then by existing in the equipment search procedure Network Search, and will self be registered on one of them asset management device that is fit to.
Do not exist under the situation of family's asset management device, as shown in Figure 4, its security mechanism with exist the situation of family's asset management device similar, just equipment and verification process between the asset management device have become the authentication that is connected between the equipment.
For the housed device on the home network, key obtain two kinds of approach: be responsible for the key granting by the cipher key configuration hypervisor that is provided with on the asset management device; Or be configured by the application program of equipment self setting.When having asset management device, normally be responsible for the key granting by the cipher key configuration hypervisor, the cipher key configuration hypervisor can be identical or different to the key of different housed device grantings.This cipher key configuration hypervisor not only is responsible for the configuration of authenticate key between equipment and the asset management device, also is responsible for connecting between the configuration device granting of authenticate key simultaneously.Its layoutprocedure as shown in Figure 5, cipher key configuration hypervisor multicast sends authenticated configuration message, after each equipment is received this message, if judge to lay oneself open to and do not set key state, then respond this message, send the cipher key configuration request, these requests are responded, corresponding secret key is set by the cipher key configuration hypervisor.Generally, equipment all is provided with default key when dispatching from the factory, and configuration manager need be known default key when carrying out cipher key configuration.
And when not having asset management device, the equipment room attachment security is based on private key, the connection authenticate key that is to say equipment room is by consulting between concrete two equipment, the purposes of the connection authenticate key of equipment room is based on this key, set up the transmission security key between two equipment, so that carry out safe transmission.
Among the present invention, when equipment room direct interconnection or asset management device are not initiatively sent out authenticated configuration message in the multicast mode, the configuration of authentication connection authenticate key is the demand according to the user fully, set in advance by man-machine interaction, this layoutprocedure can realize in this locality, also can finish by far-end setting.
Facility registration mainly is an authentication process between equipment and the asset management device to the process of asset management device.Asset management device can be set two kinds of facility registration modes: open (Open) mode and shared key (Shared Key) mode.
When the logon mode of asset management device setting is the Open mode, any to asset management device application for registration equipment, only need to initiate register requirement, all allow registration; And license that all security attributes are the Service Source of public (Public) in the asset management device record; Data transfer between devices is not considered encryption and decryption yet, uses expressly form transmission.
When the logon mode of asset management device setting is Shared Key mode, divide two kinds of situations again:
A kind of is that asset management device allows the equipment of registration to share the same authenticate key Key that is connected with all, as shown in Figure 6.When an equipment is applied for the registration of, confirm by the authentication mechanism of challenge response (CHAP) whether this equipment has cipher key shared Key.If have, then authentication is passed through, and allows registration, and all facilities that succeed in registration all trust each other, and licenses all resources that all were registered.As required, can be that Transport Layer Security (TLS) passage, the secure data transmission between the realization equipment are set up in the basis between the equipment that succeeds in registration with shared key K ey.
Another kind is to allow in the equipment of registration, and different equipment can be shared the different authenticate key Key that are connected with asset management device.When an equipment is applied for the registration of, confirm by the authentication mechanism of challenge response (CHAP) whether this equipment has the key of the equipment correspondence of being declared, if have, then succeed in registration, but do not have direct trusting relationship between all equipment that succeed in registration, only allowing attribute safe in utilization under the general situation is the Service Source of Public.But, can be by effect in the middle of the asset management device, produce to share key K ey, set up between two equipment or the safe trusting relationship between the device cluster, satisfy the equipment of safe trusting relationship can mutual attribute safe in utilization the Service Source that is privately owned (Private).Equipment with safe trusting relationship, as required, the shared key that can utilize asset management device to produce is set up the TLS passage between them, realizes the data security transmission.Need to prove that security mechanism of the present invention can realize based on DSE arithmetic, can realize based on public-key cryptosystem again.Wherein, DSE arithmetic is meant and adds, deciphers the same key of employing; And public-key cryptosystem is meant and adds, deciphers that to adopt different keys, these two kinds of cryptographic systems are two kinds of standard systems that realize secure communication.
Be set to the asset management device of Shared Key mode for security strategy, suppose that device A is the housed device of applying for the registration of, as shown in Figure 7, the safety certification between device A and the asset management device comprises the steps: at least
Step 701~702: device A is sent out login request message to asset management device, after asset management device is received the request of device A, note the relevant information of device A earlier, send registration reply message to device A then, in response message, comprise challenging value (ChallengeValue) and authentication algorithm sign (AuthenticationAlgorithm ID).Wherein, challenging value is by the asset management device picked at random; The type of AuthenticationAlgorithm is as shown in table 4, and table 4 is the table of comparisons of equipment identities identifying algorithm sign with algorithm types.
AuthenticationAlgorithm?ID Algorithm
CHAP-MD5 Challenge response based on hash function MD5
CHAP-SHA Challenge response based on hash function SHA
CHAP-DES Challenge response based on the des encryption algorithm
CHAP-RSA Challenge response based on public key algorithm RSA
CHAP-ECC Challenge response based on elliptic curve cryptography
Table 4
Step 703: after device A receives authentication algorithm identifier ID and ChallengeValue, use the connection authenticate key (Key) of oneself that ChallengeValue is encrypted, the login request message of value (Response), and transmission in response is to asset management device.
Step 704~707: after asset management device receives Response, oneself also utilize the corresponding connection authenticate key Key of ID that declares with device A that ChallengeValue is encrypted, if Response=Encrypt (KeyID, ChallengeValue), then allow this facility registration, simultaneously send the response of succeeding in registration, and perform the environmental condition of connection to device A; If Response ≠ Encrypt (KeyID ChallengeValue), does not then allow this facility registration, sends the response that authority is forbidden to device A simultaneously, and from the asset management device database relevant information of sweep equipment A.
Above-mentioned steps is a facility registration and an overall process that disposes security parameter, though the login request message that is sent in step 703 is identical with the message name of the initial login request message that sends of equipment in the step 701, but wherein contained content difference, contain a sequence number in each registration message, what current execution was described is which of facility registration in step, to distinguish the difference of login request message.

Claims (12)

1, a kind of method that realizes safe and reliable interconnection between network equipments is characterized in that this method comprises:
When the application access device is registered, dispose the connection authenticate key of this application access device earlier in network; After the success of this application access device authentication registration, that be connected with this application access device and successfully registration opposite equip. that this application access device arranged determine the safe transmission rank and the Internet resources rights of using of current application access device according to connection authenticate key that is disposed and the logon mode that self is provided with; Needs set up the current application access device of escape way and successfully registration have between the opposite equip. of this application access device and set up the Transport Layer Security passage, realize the secure data transmission of equipment room.
2, method according to claim 1 is characterized in that, the connection authenticate key of described application access device is by the cipher key configuration hypervisor granting in the asset management device that is attached thereto.
3, method according to claim 2 is characterized in that, asset management device allows the registration network equipment thereon to share the same authenticate key that is connected with all.
4, method according to claim 3 is characterized in that, the Internet resources rights of using of described definite current application access device are: the current application access device of asset management device mandate uses registered all-network resource; The described escape way of setting up is: serve as that the Transport Layer Security passage is set up in the basis between current application access device and asset management device with the connection authenticate key of sharing directly, realize the secure data transmission of equipment room.
5, method according to claim 2 is characterized in that, asset management device allows the registration network equipment thereon to share different connection authenticate keys with each.
6, method according to claim 5 is characterized in that, the Internet resources rights of using of described definite current application access device are: the current application access device of asset management device mandate uses registered common network resource.
7, method according to claim 6, it is characterized in that, this method further comprises: produce same shared connection authenticate key by asset management device between two or more equipment, authorize the private network resource of sharing mutually between the network equipment that has same connection authenticate key separately; The described escape way of setting up is: the shared connection authenticate key with generation is that the Transport Layer Security passage between current application access device and the asset management device is set up on the basis, realizes the secure data transmission of equipment room.
8, method according to claim 1 is characterized in that, the connection authenticate key of described application access device is configured by the application program of equipment self setting.
9, method according to claim 8 is characterized in that, described application access device connects this locality that is configured in of authenticate key to be finished, or is finished by remote equipment control.
10, method according to claim 8 is characterized in that, this method further comprises: when interconnecting between two network equipments, to connect authenticate key, determine transmission security key by the auto-negotiation mode, realize the equipment room secure data transmission.
11, method according to claim 1 is characterized in that, asset management device promptly allows this application access device successfully to register after receiving the register requirement of application access device; The Internet resources rights of using of then described definite current application access device are: authorize current application access device to use registered common network resource, and allow equipment room directly to transmit data.
12, method according to claim 1 is characterized in that: the network of setting the access of application access device is a digital home network, or office network.
CNB021294534A 2002-08-26 2002-08-26 Method of realizing safe and reliable interconnection between network equipments Expired - Fee Related CN1180566C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB021294534A CN1180566C (en) 2002-08-26 2002-08-26 Method of realizing safe and reliable interconnection between network equipments

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB021294534A CN1180566C (en) 2002-08-26 2002-08-26 Method of realizing safe and reliable interconnection between network equipments

Publications (2)

Publication Number Publication Date
CN1479483A CN1479483A (en) 2004-03-03
CN1180566C true CN1180566C (en) 2004-12-15

Family

ID=34144164

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB021294534A Expired - Fee Related CN1180566C (en) 2002-08-26 2002-08-26 Method of realizing safe and reliable interconnection between network equipments

Country Status (1)

Country Link
CN (1) CN1180566C (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100459495C (en) * 2004-08-01 2009-02-04 常志文 Password dynamic enciphering inputmethod of public emipering mode
CN100349434C (en) * 2004-09-29 2007-11-14 中兴通讯股份有限公司 Digital home safety network system
KR100678897B1 (en) * 2004-11-23 2007-02-07 삼성전자주식회사 System and method for making a secure connection between home network devices
CN1703004B (en) * 2005-02-28 2010-08-25 联想(北京)有限公司 Method for implementing network access authentication
CN1863195B (en) * 2005-05-13 2010-04-07 中兴通讯股份有限公司 Family network system with safety registration function and method thereof
CN100452737C (en) * 2005-11-02 2009-01-14 华为技术有限公司 Copyright managing method for digit household network and digital household network system
KR101495722B1 (en) 2008-01-31 2015-02-26 삼성전자주식회사 Method and apparatus for guaranteeing communication security in home network
CN103067166B (en) * 2011-10-19 2017-09-29 海尔集团公司 The stepped mixing encryption method and device of a kind of intelligent home system
CN103838997A (en) * 2012-11-20 2014-06-04 海尔集团公司 Single-chip microcomputer password verification method and device
KR20150138209A (en) * 2013-03-28 2015-12-09 톰슨 라이센싱 Network system comprising a security management server and a home network, and method for including a device in the network system
CN104320376B (en) * 2014-08-28 2018-09-25 无锡天脉聚源传媒科技有限公司 Connection method and the device of cloud and target cloud are initiated in a kind of request

Also Published As

Publication number Publication date
CN1479483A (en) 2004-03-03

Similar Documents

Publication Publication Date Title
CN1905436B (en) Method for ensuring data exchange safety
US5818936A (en) System and method for automically authenticating a user in a distributed network system
US8971537B2 (en) Access control protocol for embedded devices
Tootoonchian et al. Lockr: better privacy for social networks
US6490679B1 (en) Seamless integration of application programs with security key infrastructure
RU2439692C2 (en) Policy-controlled delegation of account data for single registration in network and secured access to network resources
US6128742A (en) Method of authentication based on intersection of password sets
US7213262B1 (en) Method and system for proving membership in a nested group using chains of credentials
US20090199009A1 (en) Systems, methods and computer program products for authorising ad-hoc access
KR20070037581A (en) Anonymous certificates with anonymous certificate show
US7266705B2 (en) Secure transmission of data within a distributed computer system
US20100235625A1 (en) Techniques and architectures for preventing sybil attacks
CN1180566C (en) Method of realizing safe and reliable interconnection between network equipments
CN102984045A (en) Access method of Virtual Private Network and Virtual Private Network client
Benantar The Internet public key infrastructure
US8788825B1 (en) Method and apparatus for key management for various device-server configurations
Wang et al. Anonymous single sign-on schemes transformed from group signatures
CN113329003B (en) Access control method, user equipment and system for Internet of things
KR101165350B1 (en) An Authentication Method of Device Member In Ubiquitous Computing Network
Quercia et al. Tata: Towards anonymous trusted authentication
Fugkeaw et al. A robust single sign-on model based on multi-agent system and PKI
Shin et al. A secure anonymous password-based authentication protocol with control of authentication numbers
Coronado-García et al. An autonomous decentralized system architecture using a software-based secure data field
CN115396085B (en) Method and equipment for negotiating and authenticating based on biological characteristics and third secret key
US11943349B2 (en) Authentication through secure sharing of digital secrets previously established between devices

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20041215

Termination date: 20200826