CN105141637A - Transmission encryption method taking flows as granularity - Google Patents

Transmission encryption method taking flows as granularity Download PDF

Info

Publication number
CN105141637A
CN105141637A CN201510619566.7A CN201510619566A CN105141637A CN 105141637 A CN105141637 A CN 105141637A CN 201510619566 A CN201510619566 A CN 201510619566A CN 105141637 A CN105141637 A CN 105141637A
Authority
CN
China
Prior art keywords
encryption
packet
type
granularity
analysis
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510619566.7A
Other languages
Chinese (zh)
Inventor
张杨杨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Railway Engineering Equipment Group Co Ltd CREG
Original Assignee
China Railway Engineering Equipment Group Co Ltd CREG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Railway Engineering Equipment Group Co Ltd CREG filed Critical China Railway Engineering Equipment Group Co Ltd CREG
Priority to CN201510619566.7A priority Critical patent/CN105141637A/en
Publication of CN105141637A publication Critical patent/CN105141637A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Abstract

The invention discloses a transmission encryption method taking flows as granularity. The method comprises steps that a user makes an encryption strategy as required; a business flow management module carries out type analysis on data packages, obtain the application type and business type of the data packages; the business flow management module puts different types of the data packages into different type queues; a data encryption module judges whether to encrypt the data packages according to the encryption strategies and carries out encryption operation on to-be-encrypted queues; and receiving and sending data packages. According to the invention, all modules are dynamically loaded on a terminal in an LKM manner, which will not cause problems on original functions of the operation system; based on current type identification method, application distinguishing is carried out on all data packages on the terminal, business analysis are then carried out on the data packages and encryption communication taking flows as granularity is carried out on each type of business flow of each application, so granularity is quite fine, way of encryption is quite flexible, data safety is taken into consideration and transmission efficiency is increased.

Description

A kind of take stream as the Transmission Encryption method of granularity
Technical field
The present invention relates to the technical field of transfer of data encryption, being specifically related to a kind of take stream as the Transmission Encryption method of granularity.
Background technology
In recent years, universal along with network all standing and access terminals, a large amount of data transmit intercommunication between network.Often add in the middle of these data and carry many sensitive informations, just need to carry out fail safe protection to these data acquisition corresponding manners.At present, a lot of ripe cryptographic algorithm and cipher mode is had to be widely used, and the cryptographic means often taked is all be encrypted the total data of application, this will cause many non-sensitive category informations also to need encrypted, improve the fail safe of overall transfer but be reduction of efficiency of transmission.Different Business Streams is related in the middle of a usual business, such as perhaps audio frequency, video, text etc., only have voice data to comprise key message, just there is no need also to be encrypted video and text, for the user demand under this scene, existing scheme can not solve this problem.
Existing cipher mode is not supported to flow the Transmission Encryption for granularity, but is encrypted all business datums, although this mode improves fail safe be reduction of efficiency of transmission.Application number is the Chinese invention patent application " a kind of intelligent network services recognition methods based on positive transfer study " of 201310433157.9, disclose and utilize deep-packet detection method (DeepPacketInspection, DPI) detection method with based on stream feature (is also called the degree of depth/dynamic flow and detects Deep/DynamicFlowInspection, DFI) method of parallel detection detects Network, identifies, thus the recognition efficiency that improve Network, but do not relate to concrete cipher mode.
Summary of the invention
In order to solve the problems of the technologies described above, the invention provides a kind of take stream as the Transmission Encryption method of granularity, can carry out traffic differentiation, and be subdivided into different Business Streams to different application, is only encrypted specific stream.
In order to achieve the above object, technical scheme of the present invention is: a kind of take stream as the Transmission Encryption method of granularity, and its step is as follows:
Step one: user formulates encryption policy according to demand;
Step 2: service flow management module carries out type analysis to packet, obtains application type and the type of service of packet;
Step 3: dissimilar packet is put into different class queues by service flow management module;
Step 4: data encryption module, according to encryption policy, judges whether to need to be encrypted packet, is encrypted operation to needing the queue of encryption;
Step 5: sending and receiving packet.
Described service flow management module is used for carrying out type analysis to packet, and according to type, packet is put into corresponding transmit queue; Service flow management module loads in an operating system with LKM form, and it is kernel state, can adjoint system self-starting.
Described service flow management module comprises type identification unit and queue maintenance unit; Described type identification unit is used for catching analysis to packet, and type identification unit comprises applied business flow analysis unit and type of service analytic unit; Described applied business flow analysis unit carries out application type analysis by the Hook Function of mount point to packet; Described type of service analytic unit carries out type of service analysis by existing kind identification method to packet; Described queue maintenance unit is used for packet to deposit according to different queues.
Described data encryption module loads in an operating system with LKM form, and it is kernel state, can adjoint system self-starting; According to encryption policy, data encryption module for identifying encryption policy, and judges that different queues is the need of encryption, and adopt the cryptographic algorithm of existing maturation to be encrypted packet Business Stream.
Described data encryption module comprises DEU data encryption unit, and DEU data encryption unit adopts cryptographic algorithm to carry out data encryption to needing the queue of encryption
The invention has the beneficial effects as follows: all modules be with LKM form dynamic load in the terminals such as mobile phone, PC and various access terminals, the problem of any compatibility can not be caused to operating system original function; The present invention is based on existing kind identification method and application division is carried out to packets all in terminal, again business diagnosis is carried out to packet, then carry out flowing the coded communication for granularity to each type service stream of each application, granularity is more careful, cipher mode is more flexible, not only take into account data security, also improve efficiency of transmission simultaneously.
Accompanying drawing explanation
Fig. 1 is the flow chart of the whole transfer of data encryption of the present invention.
The concrete schematic diagram of Transmission Encryption of Fig. 2 to be the present invention with stream be granularity.
Embodiment
In order to make technical problem to be solved by this invention, technical scheme and beneficial effect clearly understand, below in conjunction with embodiment, the present invention will be described in detail.It should be noted that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
Take stream as a Transmission Encryption method for granularity, its step is as follows:
Step one: user formulates encryption policy according to demand.
User formulates suitable encryption policy according to the actual demand of oneself, is namely that the video to which application, audio frequency, file or one or more in other are encrypted.The encryption policy formulated can be operated by the operation interface form of graphical interfaces, facilitates user to select the Business Stream of certain type certain applied to be encrypted communication.Encryption policy passes to kernel state by process communication machine from the User space of operating system after specifying.
Step 2: service flow management module carries out type analysis to packet, obtains application type and the type of service of packet.
Service flow management module is used for carrying out type analysis to packet, and according to type, packet is put into corresponding transmit queue.Service flow management module is with LKM(LoadableKernelModule) form loads in an operating system, and it is kernel state, can adjoint system self-starting.During specific works, add corresponding Hook Function in service flow management module based on the mount point under Netfilter framework, just can catch analysis to packet automatically.The five-tuple information of packet can unique identification Business Stream.All packets that service flow management module sends for the machine carry out analysis operation, can check its five-tuple information, i.e. source IP address, object IP address, source port number, destination slogan, protocol type, by Hash computing, the ID entrance of locator data bag, thus identify the type of packet.
Service flow management module comprises type identification unit and queue maintenance unit.Type identification unit is used for catching analysis to packet, comprises applied business flow analysis unit and type of service analytic unit.Applied business flow analysis unit is used for carrying out application type analysis to packet, is realized by the Hook Function of mount point, and namely identifying this packet is belong to which kind of application, and such as packet is QQ, a sudden peal of thunder, FTP etc.By the subsequent treatment that the Business Stream of a certain application can be encrypted by applied business flow analysis unit simultaneously.Type of service analytic unit carries out type of service analysis to packet, can based on existing kind identification method, and such as DPI, L7 method of identification etc. carry out type of service analysis to packet, identify packet be video, audio frequency, file or other.Queue maintenance unit is used for packet to deposit according to different queues.Dissimilar packet is divided into different Business Streams by type identification unit, and can be encrypted operation to video, audio frequency, file or other one or more in an application, make granularity more careful, follow-up cipher mode is more flexible.
Step 3: dissimilar packet is put into different class queues by service flow management module.
The queue maintenance unit of service flow management module is used for packet to deposit according to different queues.The application type of the packet that queue maintenance unit identifies according to type identification unit and type of service, the packet of different application is left in different list of applications, the packet of different service types puts into the type porch of business flow list, is gone by packet carry in the class queues of correspondence.Different types of service can be preset, such as video, audio frequency, file and other, be then the queue of every type setting data bag.The way of realization of data link table can be adopted, packet is put into the packet of corresponding types.
As shown in Figure 2, first judge whether packet belongs in the list of application APPTable existed, if existed, the type porch of business flow list FlowTable is then navigated to according to the type of service of packet, if there is no, then application belonging to this packet is added in list of application APPTable, finally packet carry is gone in the type chained list queue QueueList of correspondence.Particularly, first, judge the application type belonging to packet, after determining application type, judge type of service belonging to this packet, it should be noted that, a corresponding packet chained list after each type of service, list structure can adopt the conventional chained list type in data structure, such as single-track link table, and the packet that each type of service has judged will after the chained list that directly carry is corresponding.
Step 4: data encryption module, according to encryption policy, judges whether to need to be encrypted packet, is encrypted operation to needing the queue of encryption.
Encryption operates type of service, namely first determines which kind of type is encryption type, after having determined, is encrypted judgement to the packet that type identification completes, if namely it belongs to this encryption type, is then encrypted it, otherwise disregards.Such as, encryption policy is be that the packet of video is all encrypted by type, then after packet is identified as video by type identification unit, be then encrypted operation to this packet.
Data encryption module loads in an operating system with LKM form, and it is kernel state, can adjoint system self-starting.According to encryption policy, data encryption module for identifying encryption policy, and judges that different queues is the need of encryption, and adopt the cryptographic algorithm of existing maturation to be encrypted packet Business Stream.Data encryption module comprises DEU data encryption unit, DEU data encryption unit is used for needing the queue of encryption to carry out data encryption, adopt the cryptographic algorithm of existing comparative maturity, such as MD5(MessageDigestAlgorithm), DES(DataEncryptionStandard) etc. DEA data encryption is carried out to queue.
Above-mentioned is the flow process of transmitting terminal, after receiving terminal receives data, first can judge whether to encrypt, if so, then first be decrypted process to packet, otherwise disregard.Such as, can add field at data packet header and carry out encryption through DEU data encryption unit in order to indicate this packet, receiving terminal only needs the packet judging to receive whether to comprise this flag bit.
Queue scheduling can be dispatched the packet of each queue successively, and than if any three class queues, then each queue first sends out two successively, then sends out three successively, increases successively, guarantees that often taking turns all types of packet all can have transmitting-receiving to operate.
Step 5: sending and receiving packet.
For the packet that will send, judgement can be encrypted according to its type of service, for the packet needing encryption, be then encrypted to operate and be positioned in queue and wait for that scheduling sends, described class queues is then directly put into for the packet without the need to encryption and waits for that scheduling sends.Wherein, all packets all can add tag mark, and after receiving packet for receiving terminal, can judge whether to be decrypted operation according to this flag bit, when such as tag is 1, receiving terminal can be decrypted, and is that the words of 0 are then disregarded.For receiving terminal, after receiving packet, display judges that tag identifies, if be 1, be then decrypted process and then returned to operating system protocol stack and process, if be 0, then disregard, direct delivery operation system.Namely achieve the transmitting-receiving of packet at transmitting terminal and receiving terminal, realize being encrypted operation in transport process to corresponding packet simultaneously, protect its fail safe.
Instantiation:
Various equipment for surfing the net terminal such as mobile phone, computer etc. such as, carry out service communication, this application comprises the type of service of multiple video, audio frequency, text etc., the type identification unit of service flow management module carries out type identification to this application, different packet carries gets in different data type queues by queue maintenance unit, then according to the encryption policy that user is arranged, data encryption module judges that this traffic flow types is the need of encryption, if needed, then by DEU data encryption unit, this packet is encrypted, otherwise does not need; Finally carry out the transmitting-receiving of packet.
The above; be only the present invention's preferably embodiment, but protection scope of the present invention is not limited thereto, is anyly familiar with those skilled in the art in the technical scope that the present invention discloses; the change that can expect easily or replacement, all should be encompassed within protection scope of the present invention.

Claims (5)

1. be a Transmission Encryption method for granularity with stream, it is characterized in that, its step is as follows:
Step one: user formulates encryption policy according to demand;
Step 2: service flow management module carries out type analysis to packet, obtains application type and the type of service of packet;
Step 3: dissimilar packet is put into different class queues by service flow management module;
Step 4: data encryption module, according to encryption policy, judges whether to need to be encrypted packet, is encrypted operation to needing the queue of encryption;
Step 5: sending and receiving packet.
2. according to claim 1 take stream as the Transmission Encryption method of granularity, it is characterized in that, described service flow management module is used for carrying out type analysis to packet, and according to type, packet is put into corresponding transmit queue; Service flow management module loads in an operating system with LKM form, and it is kernel state, can adjoint system self-starting.
3. according to claim 2 take stream as the Transmission Encryption method of granularity, and it is characterized in that, described service flow management module comprises type identification unit and queue maintenance unit; Described type identification unit is used for catching analysis to packet, and type identification unit comprises applied business flow analysis unit and type of service analytic unit; Described applied business flow analysis unit carries out application type analysis by the Hook Function of mount point to packet; Described type of service analytic unit carries out type of service analysis by existing kind identification method to packet; Described queue maintenance unit is used for packet to deposit according to different queues.
4. according to claim 1 take stream as the Transmission Encryption method of granularity, it is characterized in that, described data encryption module loads in an operating system with LKM form, and it is kernel state, can adjoint system self-starting; According to encryption policy, data encryption module for identifying encryption policy, and judges that different queues is the need of encryption, and adopt the cryptographic algorithm of existing maturation to be encrypted packet Business Stream.
5. according to claim 1 take stream as the Transmission Encryption method of granularity, and it is characterized in that, described data encryption module comprises DEU data encryption unit, and DEU data encryption unit adopts cryptographic algorithm to carry out data encryption to needing the queue of encryption.
CN201510619566.7A 2015-09-25 2015-09-25 Transmission encryption method taking flows as granularity Pending CN105141637A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510619566.7A CN105141637A (en) 2015-09-25 2015-09-25 Transmission encryption method taking flows as granularity

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510619566.7A CN105141637A (en) 2015-09-25 2015-09-25 Transmission encryption method taking flows as granularity

Publications (1)

Publication Number Publication Date
CN105141637A true CN105141637A (en) 2015-12-09

Family

ID=54726844

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510619566.7A Pending CN105141637A (en) 2015-09-25 2015-09-25 Transmission encryption method taking flows as granularity

Country Status (1)

Country Link
CN (1) CN105141637A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105871520A (en) * 2015-12-31 2016-08-17 乐视网信息技术(北京)股份有限公司 Data transmission method and device
CN106131148A (en) * 2016-06-29 2016-11-16 宁波市由乐讯通讯科技有限公司 A kind of Intelligent sliding moved end and service device end message carry out the method and system synchronized
CN106131147A (en) * 2016-06-29 2016-11-16 宁波市由乐讯通讯科技有限公司 A kind of mobile terminal and server end message carry out the method and system synchronized
CN106657009A (en) * 2016-11-14 2017-05-10 平安科技(深圳)有限公司 Resource packet encryption method, resource packet decryption method and devices
WO2018137202A1 (en) * 2017-01-25 2018-08-02 华为技术有限公司 Method, apparatus, and system for transmitting data
CN108848071A (en) * 2018-05-30 2018-11-20 深圳市元征科技股份有限公司 A kind of data transmission method, system and equipment and storage medium
CN111163058A (en) * 2019-12-09 2020-05-15 京信通信系统(中国)有限公司 DPDK data encryption processing method, device and network equipment
CN114401139A (en) * 2022-01-14 2022-04-26 京东方科技集团股份有限公司 Method and apparatus for processing data samples at an edge computing device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7441267B1 (en) * 2003-03-19 2008-10-21 Bbn Technologies Corp. Method and apparatus for controlling the flow of data across a network interface
CN101488847A (en) * 2008-01-18 2009-07-22 华为技术有限公司 Method, apparatus and system for data ciphering
CN101547196A (en) * 2008-12-26 2009-09-30 华为技术有限公司 Methods and devices for encrypting shooting and decrypting playing of network multimedia conference
CN102857341A (en) * 2011-06-28 2013-01-02 联芯科技有限公司 Communication method for encrypted call
CN104468252A (en) * 2013-09-23 2015-03-25 重庆康拜因科技有限公司 Intelligent network service identification method based on positive transfer learning

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7441267B1 (en) * 2003-03-19 2008-10-21 Bbn Technologies Corp. Method and apparatus for controlling the flow of data across a network interface
US20090013175A1 (en) * 2003-03-19 2009-01-08 Brig Barnum Elliott Method and apparatus for controlling the flow of data across a network interface
CN101488847A (en) * 2008-01-18 2009-07-22 华为技术有限公司 Method, apparatus and system for data ciphering
CN101547196A (en) * 2008-12-26 2009-09-30 华为技术有限公司 Methods and devices for encrypting shooting and decrypting playing of network multimedia conference
CN102857341A (en) * 2011-06-28 2013-01-02 联芯科技有限公司 Communication method for encrypted call
CN104468252A (en) * 2013-09-23 2015-03-25 重庆康拜因科技有限公司 Intelligent network service identification method based on positive transfer learning

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105871520A (en) * 2015-12-31 2016-08-17 乐视网信息技术(北京)股份有限公司 Data transmission method and device
CN106131148A (en) * 2016-06-29 2016-11-16 宁波市由乐讯通讯科技有限公司 A kind of Intelligent sliding moved end and service device end message carry out the method and system synchronized
CN106131147A (en) * 2016-06-29 2016-11-16 宁波市由乐讯通讯科技有限公司 A kind of mobile terminal and server end message carry out the method and system synchronized
CN106657009A (en) * 2016-11-14 2017-05-10 平安科技(深圳)有限公司 Resource packet encryption method, resource packet decryption method and devices
WO2018137202A1 (en) * 2017-01-25 2018-08-02 华为技术有限公司 Method, apparatus, and system for transmitting data
CN108848071A (en) * 2018-05-30 2018-11-20 深圳市元征科技股份有限公司 A kind of data transmission method, system and equipment and storage medium
CN111163058A (en) * 2019-12-09 2020-05-15 京信通信系统(中国)有限公司 DPDK data encryption processing method, device and network equipment
CN111163058B (en) * 2019-12-09 2021-11-02 京信网络系统股份有限公司 DPDK data encryption processing method, device and network equipment
CN114401139A (en) * 2022-01-14 2022-04-26 京东方科技集团股份有限公司 Method and apparatus for processing data samples at an edge computing device

Similar Documents

Publication Publication Date Title
CN105141637A (en) Transmission encryption method taking flows as granularity
CN107342952B (en) Service link selection control method and equipment
CN111556136B (en) Data interaction method between internal containers of power edge Internet of things agent
CN101309273B (en) Method and device for generating safety alliance
CN103491648B (en) Communication means and system based on WIFI
CN101964749A (en) Message retransmission method and system based on multi-core architecture
CN108040019B (en) Message forwarding method and device
US9503380B2 (en) Communication apparatus, communication method, and computer readable medium
CN103346980B (en) A kind of business scheduling method, device and the network equipment
CN104038505A (en) Method and device for preventing IPSec (internet protocol security) replaying
CN107579925A (en) Message forwarding method and device
CN104320782A (en) WiFi signal blocking system and method
US20110123064A1 (en) Method for monitoring a picture or multimedia video pictures in a communication system
CN107547430A (en) A kind of file transmitting method and device
CN102739665B (en) Method for realizing network virtual security domain
CN115484047A (en) Method, device, equipment and storage medium for identifying flooding attack in cloud platform
CN104283801A (en) Method and system for processing service data
CN102647345A (en) Load sharing method and system for IPSEC (Internet Protocol Security) data message
CN101355585B (en) System and method for protecting information of distributed architecture data communication equipment
CN110417687A (en) A kind of message sends and receives method and device
EP1704491A1 (en) A method and systems for resource bunlding in a communications network
CN100542094C (en) A kind of statistical method of Internet protocol message
CN108366002B (en) Multifunctional computer network monitoring system
CN104702505B (en) A kind of message transmitting method and node
CN109145620A (en) Data flow diversion processing method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20151209