Method, system, equipment and server for packet authentication

A technology for authenticating messages and registering servers, applied in transmission systems, public keys for secure communications, user identity/authority verification, etc. It can solve the problem of not being able to prevent P2P overlay network attacks, not considering the problem of terminal identification invalidation, invalid passwords, etc. It can prevent the attack of sending malicious packets to the network, reduce the process of message interaction, and reduce the management effect.

Inactive Publication Date: 2009-03-04
HUAWEI TECH CO LTD
View PDF0 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0027] In the process of implementing the present invention, the inventor found that this CPK-based communication connection security authentication technology only authenticates the terminal itself, and considers that the authenticated terminal is always valid, without considering the invalidation of the terminal identification, for example: when the user's If the p

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system, equipment and server for packet authentication
  • Method, system, equipment and server for packet authentication
  • Method, system, equipment and server for packet authentication

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0053] Example 1

[0054] This embodiment provides a method for authenticating a message, including:

[0055] Request the node to fill in the pre-obtained node ID and validity period in the message, sign the filled message with the private key, and send the filled message, which carries the message signature;

[0056] After receiving the message, the terminal node judges that the validity period in the message is legal, calculates the public key of the requesting node according to the node ID and the validity period, and verifies whether the signature is correct with the public key. If it is correct, the message is authenticated.

[0057] The validity period refers to the effective use time of the key (public key and private key) corresponding to each node identification. For example, the use time of the public key and private key with the node identification 123 is specified as 1 year, and it needs to be regenerated after one year. The new public and private keys ensure that the ...

Example Embodiment

[0081] Example 2

[0082] See figure 2 , This embodiment provides a system for authenticating messages, including:

[0083] The request node device 201 is used to fill in the pre-obtained node identification and validity period in the message, sign the filled message with a private key, and send the signed message;

[0084] The terminal node device 202 is configured to, after receiving the message sent by the requesting node device 201, determine that the validity period in the message is legal, calculate the public key of the requesting node device 201 according to the node identifier and the validity period, and use the public key to verify whether the signature is correct, If it is correct, the message is authenticated.

[0085] Wherein, the requesting node device 201 further includes:

[0086] The registration module is used to send registration requests and receive registration response information;

[0087] Correspondingly, the system also includes:

[0088] The registratio...

Example Embodiment

[0093] Example 3

[0094] See image 3 , This embodiment provides a device, including:

[0095] The validity period judging module 301 is used for judging whether the validity period in the message is legal after receiving the message;

[0096]The public key calculation module 302 is configured to calculate the public key of the requesting node according to the node identifier and the validity period in the message after the validity period judgment module 301 determines that the validity period is legal;

[0097] The signature verification module 303 is configured to use the public key calculated by the public key calculation module 302 to verify whether the signature in the message is correct, and if it is correct, the message passes the authentication.

[0098] The equipment includes:

[0099] The node identification judgment unit is used to judge whether the node identification in the message is in the blacklist table. If it is, the message authentication fails; otherwise, the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method, a system, equipment and a server of an authentication message, belonging to the communication field. The method comprises the steps: a solicited-node adds a node identifier and a valid period obtained in advance in a message, then a private key is used for signing on the message after adding and sending the message after filling; and after receiving the message, a terminal node judges whether the valid period is valid or not, a public key of the solicited-node is calculated according to the node identifier and the valid period, and after that, the public key is used for judging whether the verified signature is correct or not, if so, the message passes authentication. The system comprises solicited-node equipment and terminal node equipment. The server comprises a node identifier and valid period generation module, a private key acquisition module and a registered response message transmitting module. The invention calculates the verified message signature of the public key by the node identifier and the valid period, thus simplifying the process of authenticating the message and avoiding the attack to the network by a malicious message.

Description

technical field [0001] The invention relates to the communication field, in particular to a method, system, device and server for authenticating message. Background technique [0002] P2P (Peer to Peer, point-to-point) is a distributed network, network participants share a part of the hardware resources, such as: processing power, storage capacity, network connection capacity or printers, etc., the shared resources need to be shared by The network provides services and content, which can be directly accessed by other peer nodes (Peer), and other nodes do not need to go through intermediate entities when accessing. Each node in the P2P network is not only a provider of resources (services and contents)—Server Server, but also a acquirer of resources (services and contents)—Client. The P2P network breaks the traditional Client / Server (C / S) mode, and the status of each node in the network is equal. [0003] While the distributed structure adopted by the P2P network provides s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/30H04L29/06
Inventor 江兴烽李峰
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products