CN-122028035-A - 5G message-oriented secure encryption transmission method
Abstract
The application discloses a 5G message-oriented secure encryption transmission method, which comprises the steps of solving the problem of rigidification of a traditional encryption scheme by constructing a dynamic perception and self-adaptive protection system, firstly collecting user historical behavior data to establish a baseline model, capturing current behavior data in real time to calculate abnormal scores and dividing risk intervals, dynamically adjusting encryption intensity and isolation strategies based on the scores to construct an independent security domain for each message to realize end-to-end protection, generating a personalized security strategy for each receiver aiming at a one-to-many transmission scene, adopting a dynamic group key technology to realize intra-group differential isolation, innovatively matching the security strategy with real-time risks through a behavior driving mechanism, automatically strengthening protection when abnormality is detected, rapidly recovering standard strategies when risks fall back, effectively balancing the security intensity and the transmission efficiency, and remarkably improving the security capability of 5G messages under a complex network environment.
Inventors
- HUANG ZHIMING
- XIONG XU
- SHI HONGBING
- LIN SHITAO
- ZHAO FENG
- WEN SHUQIN
- GUO FENG
Assignees
- 上海仁微电子科技股份有限公司
Dates
- Publication Date
- 20260512
- Application Date
- 20260415
Claims (10)
- 1. A 5G message oriented secure encryption transmission method, comprising: S1, collecting multi-dimensional behavior data of a user history, and converting the multi-dimensional behavior data into quantifiable indexes by adopting a quantification model to serve as a user behavior baseline model; S2, comparing the current multidimensional behavior data of the user with a user behavior baseline model when the message is transmitted by capturing in real time, calculating a behavior anomaly score value, and dividing a risk interval for the current behavior data according to the behavior anomaly score value; S3, dynamically adjusting encryption and isolation information strategy information according to the behavior anomaly score, and automatically switching corresponding risk strategies; s4, constructing an independent security domain for each message, and generating security domain configuration according to the abnormal behavior score before the message is sent, wherein the security domain flows along with the message in transmission to dynamically adapt to a network path; s5, in a one-to-many transmission scene, taking a user for message mutual transmission as an interaction group, independently calculating a behavior index for each information receiver to generate a personalized behavior anomaly score, and carrying out intra-group differential isolation by adopting a dynamic group key derivation technology; and S6, when the information distribution is carried out in the group, the coordinator monitors abnormal behavior in the group and adjusts the risk strategy according to the abnormal behavior.
- 2. The method for secure encrypted transmission according to claim 1, wherein the calculating the behavior anomaly score comprises capturing current operation data in real time when a user initiates a 5G message transmission request, comparing the real-time data with corresponding indexes in a user behavior baseline model, and calculating the behavior anomaly score according to a calculation formula of , For the current information transmission frequency, Is the transmit frequency baseline value that is to be used, Is a time period deviation coefficient and is used for calculating the time period deviation coefficient, Is the degree of contact anomaly, and alpha, beta and gamma are weight coefficients.
- 3. The method for secure encrypted transmission of 5G messages according to claim 2, wherein the user behavior baseline model comprises quantifying multi-dimensional behavior data based on user history, wherein the quantifiable indicators comprise a sending frequency baseline value, a time period deviation coefficient and a contact anomaly, and wherein the user behavior baseline model is constructed according to the quantifiable indicators.
- 4. The method for transmitting 5G message-oriented secure encryption of claim 1, wherein the generating the security domain configuration based on the abnormal behavior score before the message is sent comprises constructing an independent security domain for the message after determining the security policy applicable to the current message, encapsulating the message content and metadata in the dynamic security domain of the security container, entering the transmission process together with the message after the security domain is constructed, entering the final stage by the control logic of the security domain when the message arrives at the receiving end, unlocking the security domain only after the receiving end passes the verification of the security domain, allowing the receiving end to decrypt and read the encrypted message content, and triggering the self-destruction mechanism immediately if the verification fails or an unauthorized illegal access attempt is made, so that the message content is irretrievably disabled.
- 5. The method for transmitting 5G message-oriented secure encryption of claim 4, wherein the security policy specifically comprises mapping a continuous behavior anomaly score to discrete risk levels according to a preset policy mapping rule, defining explicit security policy parameters for each level, implementing message level overall isolation mainly covering encryption strength and low risk, adopting AES-128 algorithm at low risk, upgrading to AES-256 algorithm at risk, enabling more complex addition at high risk, completing primary authentication at risk, adding secondary biometric authentication at risk, enabling continuous authentication mode at risk, and verifying each message.
- 6. The secure encryption transmission method for 5G messages according to claim 1, wherein the secure domain configuration is generated according to the behavioral anomaly score before the messages are sent, further comprising S41, deploying a quantum random number generator compatible sensor in a 5G network physical layer, collecting quantum noise parameters at millisecond frequency and quantifying the quantum noise parameters into a quantifiable index quantum noise index QNI, S42, fusing the quantum noise index with the behavioral anomaly score, judging the secure domain configuration as a high risk topology change event when the equivalent quantum noise index is abnormally increased and the behavioral anomaly score value is increased, S43, calculating a topology boundary elasticity score of the high risk topology change event based on the quantum noise index and the topology change event, dynamically adjusting a secure domain boundary based on a boundary elasticity threshold, S44, triggering boundary adjustment when the degree of topology change exceeds a degree threshold, taking a primary boundary range and an adjusted boundary range as a boundary gap, S45, and calculating an independent boundary elasticity score and a boundary adjustment coefficient for each receiver and adjusting the boundary when the topology change degree exceeds the degree threshold.
- 7. The method for secure encrypted transmission according to claim 6, wherein said quantum noise figure QNI comprises a channel phase fluctuation value And photon counting deviation, wherein the quantum noise index calculation formula is as follows: Wherein, the The calculation of the quantum noise figure QNI is normalized to a range of 0 to 1 for the historical photon count standard deviation, and when its value is greater than 0.7, it indicates that a topology mutation occurs.
- 8. The method for transmitting 5G message-oriented secure encryption of claim 7, wherein the quantum noise figure is abnormally increased, specifically, the abnormal increase is judged by a fixed 100 millisecond time window, and the abnormal increase is judged when the quantum noise figure change quantity delta QNI= |current QNI-historical QNI| is equal to or larger than 0.3 or the change rate of delta QNI within 100 seconds is equal to or larger than 3/s.
- 9. The 5G message oriented secure encryption transmission method of claim 6, wherein the boundary gap comprises the steps of deploying probes in a security domain gap area, monitoring cross-domain message flow, abnormal access times and strategy difference rate in real time, calculating correlation between gap risks and external attacks through regression analysis, generating gap state portraits and triggering adjustment instructions, calculating gap risk indexes based on the trigger adjustment instructions, dynamically adjusting gap width and depth based on the gap risk indexes, dividing subfields of the boundary according to the gap risk indexes and message sensitivity, generating quantitative splitting rules of the number, the azimuth and the size of the subfields, performing geometric division of the gap area, independently calculating the gap risk indexes for subfields of each receiver in one-to-many transmission, and realizing cooperative regulation of group inter-gap through a coordinator.
- 10. The method for 5G message oriented secure encryption transmission of claim 9 wherein said geometrically partitioning of the gap region comprises initializing a sub-domain partitioning parameter based on real-time computed gap risk index and message sensitivity data, recording the number of sub-domains as The calculation formula is as follows: , wherein, Is the total number of messages in the current domain, Determining the distribution rule of the sub-domain azimuth, and setting the total azimuth as K, wherein the calculation formula of the azimuth number distributed on the core domain side is as follows: edge domain side number of bits Calculating the proportion of the size of the subdomain according to the proportional relation between the size of the subdomain and the sensitivity of the message, wherein the calculation formula is as follows: , wherein, Is the total area of the gap region, The method comprises the steps of integrating all parameters to carry out geometric division, and mapping the number, the azimuth and the size rules of the subdomains to specific coordinates to form the geometric layout of the gap region.
Description
5G message-oriented secure encryption transmission method Technical Field The invention relates to the technical field of communication, in particular to a 5G message-oriented secure encryption transmission method. Background With the rapid popularization of 5G networks, 5G messages are used as key communication carriers for supporting innovative applications such as augmented reality, internet of things and the like, and transmission security faces unprecedented challenges. The traditional encryption method mainly adopts a static strategy, and is difficult to deal with the problem of security clearance caused by the dynamic topology change of the 5G network. In a multi-tenant cloud environment, a fixed-boundary security model cannot achieve fine-grained isolation at the message level, and lacks an effective perception mechanism of user behavior anomalies. When the scenes such as base station switching and edge node elastic expansion are faced, the prior art is difficult to adjust the security policy in time, and a protection blind area is easy to form. Meanwhile, the traditional scheme lacks personalized processing capability for group communication, and cannot distinguish risk characteristics of different receivers in the group, so that security strategies either affect efficiency in an excessively conservative manner or generate leakage risk in an excessively loose manner. This static protection mode is severely mismatched with the highly dynamic nature of 5G networks, and there is a need to introduce a new security framework that can sense risk in real time and automatically adjust. The application of current micro-isolation techniques in 5G messaging still has significant limitations. On the one hand, the existing security domain boundary adjustment mechanism lacks quantitative index support, and cannot establish an accurate corresponding relation between risk and protection intensity. On the other hand, uncertainty (such as quantum noise, signal fluctuation and the like) of a network physical layer lacks monitoring capability, and security risks possibly caused by topology mutation are difficult to predict in time. In a one-to-many transmission scenario, it is difficult for the existing scheme to implement differential protection for each receiver, and the group key management mechanism is stiff and cannot adapt to the dynamically changing threat environment. In addition, the risk assessment of the safety clearance by the traditional method mainly depends on post analysis, and transient attacks are difficult to respond in time. Because of the lack of behavior baseline modeling and real-time anomaly detection capabilities, the system cannot accurately identify potential threats, and cannot realize accurate dynamic adjustment of security policies. These drawbacks lead to the fact that existing schemes perform poorly in balancing security and transmission efficiency, and it is difficult to meet the high standard security requirements of the 5G age for message transmission. Disclosure of Invention The application provides a 5G message-oriented secure encryption transmission method, which optimizes resource expenditure while ensuring high security, ensures message transmission efficiency in high real-time scenes such as medical emergency, financial transaction and the like and achieves excellent balance of security and performance through a dynamic security domain and a differential isolation technology. The application provides a 5G message-oriented secure encryption transmission method, which comprises the following steps: S1, collecting multi-dimensional behavior data of a user history, and converting the multi-dimensional behavior data into quantifiable indexes by adopting a quantification model to serve as a user behavior baseline model; S2, comparing the current multidimensional behavior data of the user with a user behavior baseline model when the message is transmitted by capturing in real time, calculating a behavior anomaly score value, and dividing a risk interval for the current behavior data according to the behavior anomaly score value; S3, dynamically adjusting encryption and isolation information strategy information according to the behavior anomaly score, and automatically switching corresponding risk strategies; s4, constructing an independent security domain for each message, and generating security domain configuration according to the abnormal behavior score before the message is sent, wherein the security domain flows along with the message in transmission to dynamically adapt to a network path; s5, in a one-to-many transmission scene, taking a user for message mutual transmission as an interaction group, independently calculating a behavior index for each information receiver to generate a personalized behavior anomaly score, and carrying out intra-group differential isolation by adopting a dynamic group key derivation technology; and S6, when the information distribution is carried