Method, equipment and network system for synchronizing clock

A technology of clock synchronization and clock server, which is applied in the field of communication, can solve the problems of being vulnerable to attacks and the difficulty of sharing keys to ensure security, so as to achieve the effect of not being easy to attack and improving security performance

Active Publication Date: 2009-05-20
HUAWEI TECH CO LTD
View PDF0 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011]The control port of the clock server is exposed to all terminals and is vulnerable to attack; the clock server and the termi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, equipment and network system for synchronizing clock
  • Method, equipment and network system for synchronizing clock
  • Method, equipment and network system for synchronizing clock

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0111] In this embodiment, when the clock server is deployed in a trusted network and the home gateway is in routing mode, the clock synchronization message is transmitted between the terminal and the clock server through a non-secure path, and the control message is transmitted through a secure path. see Figure 5 , Figure 5 Embodiment 1 of the present invention provides a schematic flowchart of transmitting a clock synchronization message through a non-secure path and a control message through a secure path between a terminal and a clock server. Such as Figure 5As shown, the dotted line represents the change of the service message address when the terminal and the clock server transmit the clock synchronization message through the non-secure path; the solid line represents the change of the service message address when the terminal and the clock server control the message through the secure path. SIP means source IP, DIP means target IP; SPort means source port, DPort me...

Embodiment 2

[0120] see Figure 6 , Figure 6 It is a schematic flowchart of a method for realizing clock synchronization security provided by Embodiment 2 of the present invention. Such as Figure 6 As shown, in this embodiment, the clock synchronization message is sent in a unicast manner, the dotted line indicates the process performed on the non-secure path, and the solid line indicates the process performed on the secure path. The process of this embodiment may include:

[0121] (1) The terminal establishes a security path with the security gateway, thereby realizing the establishment of a security path between the terminal and the clock server.

[0122] Wherein, the security path between the clock server and the terminal can be established by adding a logical interface, such as an IPSec tunnel; or by adding a physical link, such as a dedicated signaling link. In this embodiment, an IPSec tunnel is taken as an example to establish a secure path between the terminal and the clock s...

Embodiment 3

[0183] see Figure 7 , Figure 7 It is a flowchart of a method for implementing clock synchronization provided by Embodiment 3 of the present invention. Such as Figure 7 As shown, in this embodiment, the clock synchronization message is sent in a multicast manner, the dotted line indicates the process performed on the non-secure path, and the solid line indicates the process performed on the secure path. The process of this embodiment may include:

[0184] (1) The terminal establishes a security path with the security gateway, thereby realizing the establishment of a security path between the terminal and the clock server.

[0185] Wherein, the security path between the clock server and the terminal can be established by adding a logical interface, such as an IPSec tunnel; or by adding a physical link, such as a dedicated signaling link. In this embodiment, an IPSec tunnel is taken as an example to establish a secure path between the terminal and the clock server.

[018...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a method for clock synchronization, equipment and a network system thereof. The method comprises the following steps: a clock server and a terminal establish a security path and a non-security path; the security path and the non-security path are subjected to association; the clock server and the terminal carry out control information interaction through the security path; and the clock server sends a clock synchronization message to the terminal through the non-security path. The method, the equipment and the network system provided by the embodiment can realize clock synchronization and further improve the security performance of the clock server.

Description

technical field [0001] The present invention relates to the technical field of communication, in particular to a clock synchronization method, equipment and network system. Background technique [0002] The 1588 protocol is a precision clock synchronization protocol standard for network measurement and control systems. 1588 protocol messages can be divided into two categories: event messages and general messages. Among them, the general message does not need a time stamp, and is used for sending including clock information and configuration management information; the event message carries a time stamp, and is used for sending time and frequency information. In addition, there are two modes of sending 1588 protocol messages, unicast and multicast, and different sending modes specify different sending addresses and ports. [0003] The 1588 protocol is an adaptive network clock synchronization protocol, which can automatically complete the clock hierarchy division and recons...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L7/00H04L9/08H04L12/56H04L29/06
CPCH04J3/0667H04L63/18H04L69/14H04L29/06088
Inventor 吕欣岩聂爽何纲
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products