Link layer communication encryption method and system
Technical Field
The invention relates to a link layer communication encryption method and system, and belongs to the technical field of data encryption.
Background
The network communication encryption method is a mechanism for encrypting data in the network transmission process, and mainly encrypts and decrypts the data between two communication nodes, so that the safety of the data in the transmission process is ensured. The TCP/IP network model describes a hierarchical structure of data transmission in a network, and when data is transmitted from a sender to a receiver, the data undergoes a plurality of hierarchical encapsulation and decapsulation processes, so for the TCP/IP network model, a few communication encryption methods are proposed, the main stream includes SSL protocol and IPSec protocol, and for an application layer, a transmission layer and a network layer, communication encryption and security protection between a terminal and a service system and between subnets are realized, which has been fully and widely applied in various industries. However, along with the extension of service scenes and the improvement of security requirements, a breakthrough is needed to be made on the traditional communication encryption mechanism in the market, a communication encryption method based on a link layer is realized, transparent encryption of an upper protocol is realized, multiple network environments are supported, existing network equipment and topology are compatible, and the security protection level of service data in the network transmission process is further improved.
The existing network communication encryption construction process relates to three types of entities of a terminal, a security gateway and a service system, the channel construction process is shown in figure 2,
The SSLVPN is taken as an example, the specific communication encryption process is that an SSLVPN module of a ① terminal performs identity authentication, a password suite and session key negotiation with an SSLVPN gateway, after authentication is successful, the SSLVPN gateway issues a virtual address and service system route configuration, the ② terminal SSLVPN module adds a virtual network card for the terminal and modifies a target IP to serve as a next hop gateway of a service system as a virtual address, the SSLVPN module is convenient for reading data from the virtual network card to realize encryption, ③ when the data are uploaded, a service APP sends the data with the target IP serving as the service system to an operating system, the operating system sends the data to the virtual network card according to the route, the ④ SSLVPN module polls the virtual network card to obtain service plaintext data, encrypts the original network layer data and adds a new IP header to the operating system, the operating system sends the new IP header to the physical network card according to the route, the new target IP is the SSLVPN gateway address, the data received by the ⑤ SSLVPN gateway is decrypted to obtain the original IP data, and the original IP data is sent to the designated service system according to the original target IP address.
The existing communication encryption technology and method improves the security of terminal and service communication in a certain program, but has the following defects:
(1) The network layer data security protection can only be realized, namely the IP message head in the service communication process is still visible, the network information of the intranet service system can not be completely hidden, and the risk of attack after sniffing exists;
(2) The IPSecVPN requires devices in the sub-network to modify the configuration of the routing gateway again to realize data forwarding, and has higher capability of configuring the user network.
Disclosure of Invention
The technical problem to be solved by the invention is to provide a link layer communication encryption method, which is designed by link layer encryption, so that the information hiding of an intranet network is ensured, and the intranet service system and equipment are not attacked.
The invention designs a link layer communication encryption method, which is based on a data link created by a service terminal through a terminal side link encryption gateway, a service side link encryption gateway and a service system in turn, and performs the following steps for a data frame uploaded to the terminal side link encryption gateway by the service terminal:
Step A, a terminal side link encryption gateway receives a data frame from a service terminal, performs equipment authentication on the service terminal corresponding to the data frame, contacts the service side link encryption gateway, performs identity authentication of the service terminal corresponding to the data frame, and enters the step B in a state that the equipment authentication and the identity authentication pass currently;
b, the terminal side link encryption gateway calls the session key corresponding to the last successful identity authentication state, encrypts and encapsulates the data frame, sends the data frame to the service side link encryption gateway, and the service side link encryption gateway calls the session key corresponding to the last successful identity authentication state to analyze and decrypt the data frame and forwards the data frame to the corresponding service system to inquire, so as to obtain a feedback result data frame and forwards the service side link encryption gateway, and then enters the step C;
and C, calling a session key corresponding to the last successful identity authentication state by the service side link encryption gateway, encrypting and packaging the received feedback result data frame, sending the data frame to the terminal side link encryption gateway, and calling the session key corresponding to the last successful identity authentication state by the terminal side link encryption gateway to analyze and decrypt, and forwarding the data frame to the service terminal.
In the step A, the terminal side link encryption gateway executes equipment authentication according to preset legal MAC to judge whether the source MAC corresponding to the received data frame is legal, if so, the equipment authentication is currently passed, contacts the terminal side link encryption gateway to execute the identity authentication of the service terminal corresponding to the data frame, otherwise, the equipment authentication is not currently passed, and the data frame is discarded.
In the step A, based on the current passing of equipment authentication, a terminal side link encryption gateway judges whether the identity authentication is successful or not if the service terminal corresponding to the data frame is successfully authenticated, if so, the terminal side encryption gateway further judges whether the current time is within a preset authentication validity period from the last successful time of the identity authentication of the service terminal, if so, the identity authentication is currently passed, the step B is entered, otherwise, the identity authentication is not currently passed, the terminal side link encryption gateway is contacted, the identity authentication of the service terminal corresponding to the data frame is executed, if the identity authentication is successful, namely, the identity authentication is currently passed, the step B is entered, if the identity authentication is failed, the data frame is discarded, the terminal side link encryption gateway judges that the identity authentication is not currently passed if the identity authentication is not successfully passed by the service terminal corresponding to the data frame, the service terminal corresponding to the data frame is executed, if the identity authentication is successful, namely, the identity authentication is currently passed, the step B is entered, and the data frame is discarded if the identity authentication is failed.
In the step A, the terminal side link encryption gateway contacts the service side link encryption gateway according to the following steps, and performs the identity authentication of the service terminal corresponding to the data frame;
step A1. Terminal side link encryption gateway is based on And its preparation methodCorresponding root keyIn combination with the current timestampService terminals in data frames、ECB key derivation function using standard national secret SM1The following formula is adopted:
obtaining basic session key of terminal side link encryption gateway corresponding to service terminal Then enter step A2;
Step A2, the terminal side link encryption gateway generates a preset byte random number And combined with basic session keysKey derivation functions of standard national secret SM1 are respectively appliedHMAC function of SM3 standard national densityThe following formula is adopted:
Obtaining authentication materials corresponding to a terminal side link encryption gateway Session key material authentication codeThen enter step A3;
Step A3. Terminal side link encryption gateway is based on Basic session keyRandom numberService terminals in data framesECB key derivation function using standard national secret SM1The following formula is adopted:
Obtaining session keys for a terminal-side link encryption gateway Then enter step A4;
Step A4. Terminal side Link encryption gateway with the same Authentication material corresponding to terminal side chain encryption gatewaySession key material authentication codeAnd service terminals in data framesConstructing identity authentication request data and adding service terminalsFor source IP, service terminalsUpdating a message header to construct an identity authentication request message for the source MAC and the service side link encryption gateway which provide virtual IP addresses as destination IP and the MAC of the service system, transmitting the identity authentication request message to the service side link encryption gateway along a data link between the terminal side link encryption gateway and the service side link encryption gateway, and then entering the step A5;
Step A5, the service side link encryption gateway receives the identity authentication request message and analyzes the identity authentication request message to obtain the terminal side link encryption gateway Service terminal、In combination with the current time stampECB key derivation function using standard national secret SM1The following formula is adopted:
obtaining basic session key of service side link encryption gateway corresponding to service terminal Wherein, the method comprises the steps of, wherein,Indicating that the service side link encryption gateway knows the terminal side link encryption gatewayCorresponding root key and applying base session keyFor authentication materialDecrypting to obtain random numberTerminal side link encryption gateway time stampTerminal side link encryption gatewayService terminalService terminalJudging the current time stampWhether or not to be located on the selfIf the preset authentication process is valid, the step A6 is entered; otherwise, the identity authentication is unsuccessful, and the data frame is discarded;
step A6. Service side Link encryption gateway targets basic Session Key Random numberCurrent timestampTerminal side link encryption gatewayService terminalService terminalHMAC function using standard national density SM3The following formula is adopted:
obtaining a session key material authentication code corresponding to a service side link encryption gateway And judgeAnd (3) withIf the key is consistent, the service side chain encryption gateway applies the ECB key derivation function of the standard national encryption SM1The following formula is adopted:
Obtaining session key of service side link encryption gateway Step A7 is then entered, otherwise, the identity authentication fails;
Step A7. Service side chain encryption gateway application session key Encrypting the identity authentication success message and the identity authentication success time to construct identity authentication success data, and adding the MAC of the service system and the service terminal by taking the virtual IP of the service side gateway as the source IP and the MAC of the service system as the source MACFor purpose IP, service terminalsUpdating a message header for the source MAC, constructing an identity authentication success message, transmitting a data link between the service side link encryption gateway and the terminal side link encryption gateway to the terminal side link encryption gateway, and then entering the step A8;
step A8. Terminal side Link encryption gateway application Session Key Decrypting the identity authentication success message to obtain an identity authentication success message and the identity authentication success time, namely the identity authentication success.
In the step B, the service side link encryption gateway analyzes the encrypted message from the terminal side link encryption gateway, executes equipment authentication according to preset legal MAC to judge whether the source MAC is legal or not, if the source MAC is legal, further judges whether the identity authentication of the corresponding service terminal is successful or not, if yes, the service side link encryption gateway further calls the session key in the successful state of the latest identity authentication to decrypt, otherwise, the encrypted message is discarded, and if the source MAC is illegal, the encrypted message is discarded.
In the step B, the terminal side link encryption gateway firstly calls the session key corresponding to the last successful identity authentication state, encrypts the IP header, the target network transmission protocol header and the application data in the data frame to form encrypted application data, and then adds the service terminal based on the Ethernet headerFor source IP, service terminalsThe virtual IP address provided by the source MAC and the service side link encryption gateway is the target IP, and the MAC of the service system is the target MAC, so that a message header is formed; finally generating a check code related to the message header and the encrypted application data, packaging the message header, the encrypted application data and the check code to form an encrypted message, and sending the encrypted message to a business side link encryption gateway; the service side link encryption gateway analyzes the received encrypted message to obtain encrypted application data, then calls a session key corresponding to the last successful identity authentication state to decrypt the encrypted application data to obtain a data frame, and encapsulates and forwards a corresponding service system to inquire;
in the step C, the service side link encryption gateway invokes the session key corresponding to the successful state of the latest identity authentication, encrypts the received feedback result data frame to form encrypted feedback data, and then adds the virtual IP of the service side gateway as the source IP, the MAC of the service system as the source MAC and the service terminal based on the Ethernet header For purpose IP, service terminalsAnd finally generating a check code related to the message header and the encrypted feedback data, packaging the message header, the encrypted feedback data and the check code to form an encrypted feedback message, sending the encrypted feedback message to a terminal side link encryption gateway, analyzing the received encrypted feedback message by the terminal side link encryption gateway to obtain the encrypted feedback data, then calling a session key corresponding to the last successful identity authentication state to decrypt the encrypted feedback data to obtain a feedback result data frame, and packaging a forwarding service terminal.
In view of the foregoing, the present invention further provides a system for encrypting link layer communications, which is configured to modularly design a gateway under link layer encryption, so as to efficiently implement the design method and ensure security and efficiency of data.
The invention designs a system of a link layer communication encryption method, which is based on a data link created by a service terminal sequentially passing through a terminal side link encryption gateway, a service side link encryption gateway and a service system, wherein the structure of the terminal side link encryption gateway is the same as that of the service side link encryption gateway, and the terminal side link encryption gateway and the service side link encryption gateway respectively comprise a data capturing module, a data analyzing module, a device authentication module, an identity authentication module, a data encryption and decryption module, a device authentication library, a hardware encryption module and a data sending module;
In the terminal side link encryption gateway, the data capture module is used for polling the network card to receive the data frame and the encryption feedback message on the buffer queue; the data analysis module is used for analyzing the data frames and the encrypted feedback messages received by the data capture module; the device authentication library consists of preset legal MAC, the device authentication module is used for carrying out source MAC authentication on a data frame from a service terminal according to the preset legal MAC in the device authentication library, the identity authentication module is used for realizing identity authentication on the service terminal by contacting the identity authentication module in the service side link encryption gateway through the data transmission module and the data acquisition module according to the hardware password module, the data encryption and decryption module is used for encrypting the data frame and decrypting the encrypted feedback message according to the hardware password module, and the data transmission module is used for transmitting the encrypted message and the feedback result data frame;
The system comprises a service side link encryption gateway, a data acquisition module, a data analysis module, a data transmission module and a data transmission module, wherein the service side link encryption gateway is used for polling a network card to receive feedback result data frames and encrypted messages on a buffer queue, the data analysis module is used for analyzing the feedback result data frames and the encrypted messages received by the data acquisition module, the device authentication library is composed of preset legal MAC (media access control) s, the device authentication module is used for authenticating source MAC (media access control) s of the encrypted messages from the terminal side link encryption gateway according to the preset legal MAC s in the device authentication library, the identity authentication module is used for judging whether the identity authentication of a service terminal is successful or not currently according to a hardware password module, the data encryption and decryption module is used for encrypting the feedback result data frames and decrypting the encrypted messages according to the hardware password module, and the data transmission module is used for transmitting the encrypted feedback messages and the data frames.
Compared with the prior art, the link layer communication encryption method and system have the following technical effects:
The invention designs a link layer communication encryption method and a link layer communication encryption system, which are designed according to the invention, aiming at the situation that a terminal side link encryption gateway and a service side link encryption gateway are used between a service terminal and a service system, on the basis of equipment authentication, identity authentication and session key negotiation are integrally designed and applied, so that a lightweight security authentication mechanism is realized when security authentication is realized, and a lower session key is applied between the terminal side link encryption gateway and the service side link encryption gateway, namely, a dynamic session key is generated for each accessed service terminal, thereby enhancing the security of data communication and transmission.
Drawings
FIG. 1 is a schematic diagram of a system application architecture of a link layer communication encryption method according to the present invention;
FIG. 2 is a schematic diagram of an application of the link layer communication encryption method of the present invention;
FIG. 3 is a schematic diagram of message construction in the link layer communication encryption method according to the present invention;
fig. 4 is a schematic diagram of an encryption gateway module in a system of the link layer communication encryption method according to the present invention.
Detailed Description
The following describes the embodiments of the present invention in further detail with reference to the drawings.
Aiming at the defects in the prior art, the invention has the following design ideas:
(1) Designing a link layer identity authentication and key negotiation mechanism, carrying out security authentication based on terminal communication information, completing key negotiation and generating a session key;
(2) Designing a link layer encryption communication mechanism, carrying out safe encryption on communication data at a link layer, shielding protocol differences between a network layer and a transmission layer, and simultaneously realizing hiding of network information of equipment in a local area network to prevent malicious sniffing;
(3) A link layer communication encryption system is provided, which comprises a terminal, a link encryption gateway and a service system, wherein the link encryption gateway is connected in series between the terminal and the service system to realize the security authentication and encryption of the communication data between the terminal and the service system, and simultaneously provide data filtering and access control to resist various forms of network attacks.
Regarding the design concept, the present invention designs a link layer communication encryption method, as shown in fig. 1, based on a data link created by a service terminal sequentially passing through a terminal side link encryption gateway, a service side link encryption gateway, and a service system, for a data frame uploaded by the service terminal to the terminal side link encryption gateway, in practical application, as shown in fig. 2, using TCP connection as an example, in a three-way handshake process under TCP connection, adding device authentication and identity authentication, specifically executing the following step a, and then further executing the steps B to C to perform data communication.
And step A, the terminal side link encryption gateway receives the data frames from the service terminals in the buffer queue by polling the network card, performs equipment authentication on the service terminals corresponding to the data frames, contacts the service side link encryption gateway, performs identity authentication on the service terminals corresponding to the data frames, and enters the step B in a state that the equipment authentication and the identity authentication pass currently.
In the step A, regarding whether the equipment authentication and the identity authentication pass or not, in practical application, regarding the equipment authentication, the terminal side link encryption gateway performs the equipment authentication to judge whether the source MAC corresponding to the received data frame is legal or not according to preset legal MAC, if so, the equipment authentication passes currently, contacts the terminal side link encryption gateway to perform the identity authentication of the service terminal corresponding to the data frame, otherwise, the equipment authentication does not pass currently, and discards the data frame.
Regarding identity authentication, based on the fact that equipment authentication is currently passed, a terminal side link encryption gateway judges whether the service terminal corresponding to a data frame is successfully authenticated, if the current time is within a preset authentication validity period from the last authentication success time of the service terminal, the identity authentication is currently passed, and then step B is entered, otherwise, the identity authentication is not currently passed, the service side link encryption gateway is contacted, the identity authentication of the service terminal corresponding to the data frame is executed, the identity authentication is successful, namely, the identity authentication is currently passed, then step B is entered, the identity authentication is failed, then the data frame is discarded, and the terminal side link encryption gateway judges that the identity authentication is not currently passed, and then the service side link encryption gateway is contacted, and then the identity authentication of the service terminal corresponding to the data frame is executed, and then the identity authentication is successful, namely, the identity authentication is currently passed, then step B is entered, and then the identity authentication is failed, and then the data frame is discarded.
In actual implementation, the terminal side link encryption gateway specifically contacts the service side link encryption gateway according to the following steps A1 to A8, and performs identity authentication of the service terminal corresponding to the data frame.
Step A1. Terminal side link encryption gateway is based onAnd its preparation methodCorresponding root keyIn combination with the current timestampService terminals in data frames、ECB key derivation function using standard national secret SM1The following formula is adopted:
obtaining basic session key of terminal side link encryption gateway corresponding to service terminal Step A2 is then entered.
Step A2, the terminal side link encryption gateway generates a preset byte random numberAnd combined with basic session keysKey derivation functions of standard national secret SM1 are respectively appliedHMAC function of SM3 standard national densityThe following formula is adopted:
Obtaining authentication materials corresponding to a terminal side link encryption gateway Session key material authentication codeThen step A3 is entered.
Step A3. Terminal side link encryption gateway is based onBasic session keyRandom numberService terminals in data framesECB key derivation function using standard national secret SM1The following formula is adopted:
Obtaining session keys for a terminal-side link encryption gateway Step A4 is then entered.
Step A4. Terminal side Link encryption gateway with the sameAuthentication material corresponding to terminal side chain encryption gatewaySession key material authentication codeAnd service terminals in data framesConstructing identity authentication request data and adding service terminalsFor source IP, service terminalsAnd (3) updating a message header to construct an identity authentication request message for the source MAC and the service side link encryption gateway, wherein the virtual IP address provided by the service side link encryption gateway is the destination IP, and the MAC of the service system is the destination MAC, transmitting the identity authentication request message to the service side link encryption gateway along a data link between the terminal side link encryption gateway and the service side link encryption gateway, and then entering the step A5.
Step A5, the service side link encryption gateway receives the identity authentication request message and analyzes the identity authentication request message to obtain the terminal side link encryption gatewayService terminal、In combination with the current time stampECB key derivation function using standard national secret SM1The following formula is adopted:
obtaining basic session key of service side link encryption gateway corresponding to service terminal Wherein, the method comprises the steps of, wherein,Indicating that the service side link encryption gateway knows the terminal side link encryption gatewayCorresponding root key and applying base session keyFor authentication materialDecrypting to obtain random numberTerminal side link encryption gateway time stampTerminal side link encryption gatewayService terminalService terminalJudging the current time stampWhether or not to be located on the selfAnd (3) if the authentication is within the valid period of the preset authentication process, the step A6 is started, otherwise, the identity authentication is unsuccessful, and the data frame is discarded.
Step A6. Service side Link encryption gateway targets basic Session KeyRandom numberCurrent timestampTerminal side link encryption gatewayService terminalService terminalHMAC function using standard national density SM3The following formula is adopted:
obtaining a session key material authentication code corresponding to a service side link encryption gateway And judgeAnd (3) withIf the key is consistent, the service side chain encryption gateway applies the ECB key derivation function of the standard national encryption SM1The following formula is adopted:
Obtaining session key of service side link encryption gateway And then, entering a step A7, otherwise, failing the identity authentication.
Step A7. Service side chain encryption gateway application session keyEncrypting the identity authentication success message and the identity authentication success time to construct identity authentication success data, and adding the MAC of the service system and the service terminal by taking the virtual IP of the service side gateway as the source IP and the MAC of the service system as the source MACFor purpose IP, service terminalsAnd (3) for the source MAC, updating a message header, constructing an identity authentication success message, transmitting a data link between the service side link encryption gateway and the terminal side link encryption gateway to the terminal side link encryption gateway, and then entering the step A8.
Step A8. Terminal side Link encryption gateway application Session KeyDecrypting the identity authentication success message to obtain an identity authentication success message and the identity authentication success time, namely the identity authentication success.
Step B, the terminal side link encryption gateway firstly calls the session key corresponding to the last successful identity authentication state, encrypts the IP header, the target network transmission protocol header and the application data in the data frame to form encrypted application data, and then adds the service terminal based on the Ethernet header as shown in figure 3For source IP, service terminalsAnd finally generating check codes related to the message header and the encrypted application data, packaging the message header, the encrypted application data and the check codes to form an encrypted message, and sending the encrypted message to the service side link encryption gateway.
The service side link encryption gateway analyzes the encrypted message from the terminal side link encryption gateway to obtain source MAC and encrypted application data, performs equipment authentication according to preset legal MAC to judge whether the source MAC is legal, if the source MAC is legal, further judges whether the identity authentication of the corresponding service terminal is successful or not, if yes, the service side link encryption gateway further calls a session key corresponding to the last successful identity authentication state to decrypt the encrypted application data to obtain a data frame, packages and transmits a corresponding service system to inquire, obtains a feedback result data frame, transmits the service side link encryption gateway, and then enters the step C, otherwise discards the encrypted message, and if the source MAC is not legal, discards the encrypted message.
Step C, the service side link encryption gateway calls the session key corresponding to the last successful identity authentication state, encrypts the received feedback result data frame to form encrypted feedback data, and adds the virtual IP of the service side gateway as the source IP, the MAC of the service system as the source MAC and the service terminal based on the Ethernet headerFor purpose IP, service terminalsAnd finally generating a check code related to the message header and the encrypted feedback data, packaging the message header, the encrypted feedback data and the check code to form an encrypted feedback message, sending the encrypted feedback message to a terminal side link encryption gateway, analyzing the received encrypted feedback message by the terminal side link encryption gateway to obtain the encrypted feedback data, then calling a session key corresponding to the last successful identity authentication state to decrypt the encrypted feedback data to obtain a feedback result data frame, and packaging a forwarding service terminal.
In practical application, the method further designs a corresponding system, based on a data link created by the service terminal through the terminal side link encryption gateway, the service side link encryption gateway and the service system in sequence, wherein the structure of the terminal side link encryption gateway is the same as that of the service side link encryption gateway, and as shown in fig. 4, the terminal side link encryption gateway and the service side link encryption gateway respectively comprise a data capturing module, a data analyzing module, a device authentication module, an identity authentication module, a data encryption and decryption module, a device authentication library, a hardware password module and a data sending module.
The system comprises a terminal side link encryption gateway, a data acquisition module, a data analysis module, a data transmission module, a data encryption and decryption module, a data transmission module and a data transmission module, wherein the terminal side link encryption gateway is used for polling a network card to receive data frames and encrypted feedback messages on a buffer queue, the data analysis module is used for analyzing the data frames and the encrypted feedback messages received by the data acquisition module, the device authentication library is composed of preset legal MAC, the device authentication module is used for authenticating source MAC of the data frames from a service terminal according to the preset legal MAC in the device authentication library, the identity authentication module is used for realizing identity authentication of the service terminal by contacting the identity authentication module in the service side link encryption gateway through the data transmission module and the data acquisition module according to a hardware password module, the data encryption and decryption module is used for encrypting the data frames and decrypting the encrypted feedback messages, and the data transmission module is used for transmitting the encrypted messages and the feedback result data frames.
The system comprises a service side link encryption gateway, a data acquisition module, a data analysis module, a data transmission module and a data transmission module, wherein the service side link encryption gateway is used for polling a network card to receive feedback result data frames and encrypted messages on a buffer queue, the data analysis module is used for analyzing the feedback result data frames and the encrypted messages received by the data acquisition module, the device authentication library is composed of preset legal MAC (media access control) s, the device authentication module is used for authenticating source MAC (media access control) s of the encrypted messages from the terminal side link encryption gateway according to the preset legal MAC s in the device authentication library, the identity authentication module is used for judging whether the identity authentication of a service terminal is successful or not currently according to a hardware password module, the data encryption and decryption module is used for encrypting the feedback result data frames and decrypting the encrypted messages according to the hardware password module, and the data transmission module is used for transmitting the encrypted feedback messages and the data frames.
In the design application, the encryption gateway adopts an active data packet capturing mode, so that network topologies of a terminal side and a service side are not changed, the encryption gateway realizes safety authentication and binding of a terminal and a service system server based on an MAC address, safety and reliability of access equipment are ensured, and meanwhile, the terminal side encryption gateway and the service side encryption gateway perform identity authentication to generate a dynamic session key to realize link data safety encryption, conceal communication information such as IP and the like, and prevent malicious users from sniffing and tampering the network.
The invention designs a terminal side link encryption gateway and a service side link encryption gateway between a service terminal and a service system, designs and applies identity authentication and session key negotiation to the whole based on equipment authentication, obtains a lower session key between the terminal side link encryption gateway and the service side link encryption gateway while realizing security authentication, namely, realizes a lightweight security authentication mechanism, generates a dynamic session key for each accessed service terminal, enhances the security of data communication and transmission, encrypts service terminal communication data at a link layer, ensures that intranet network information is hidden, realizes that intranet service systems and equipment are not attacked, and ensures that malicious users cannot carry out directional attack on the gateway without configuring actual IP and MAC.
The embodiments of the present invention have been described in detail with reference to the drawings, but the present invention is not limited to the above embodiments, and various changes can be made within the knowledge of those skilled in the art without departing from the spirit of the present invention.