Safety access system and method for guaranteeing source address authenticity by using token mechanism
A technology of secure access and source address, which is applied in the field of network security and can solve problems such as source address forgery
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0053] Embodiment 1: use the identity information hash value to construct a 128-bit access address, use a 128-bit IPv6 address as a routing address, and realize the separation of user identity and location. in:
[0054] (1) The access address structure is:
[0055] The access address is 128 bits, and the attribution prefix is issued by the local network admission server, and the hash value of the identity information is selected by the user. The definition of each field of the access address:
[0056] Home prefix: 24 bits, the home domain prefix of the terminal. According to the geographical location of the management domain, the access address attribution prefix of each domain is allocated to improve the efficiency of access address search. The home prefix is convenient for the terminal to move to a new access network, and the access router notifies the mapping server in the home domain of the terminal in time to update the mapping relationship between the terminal's ...
Embodiment 2
[0060] Embodiment 2: To realize the secure access system of the present invention, it is necessary to deploy an admission server in the access network of the "Address Separation Mapping" network, install the software of the access negotiation module and the data packet verification module on the access router, and Install the access client software on the terminal:
[0061] (1) Admission server: save the table for the terminal when the terminal accesses for the first time; publish its own public key for the terminal to query; assign a token that marks the identity of the terminal; the admission server They can query each other; the admission negotiation control module and the token distribution module are installed in the admission server;
[0062] The admission negotiation control module installed in the admission server is responsible for receiving and processing the terminal's access request. When verifying that the terminal's access address requests access for the first t...
Embodiment 3
[0066] Embodiment 3: realize the secure access method of the invention by defining a specific message format, that is, define the load in the secure access method of the invention into a specific message, and use the secure access of the message in embodiment 2 The interaction in the system specifically implements the secure access method.
[0067] The present invention deploys the admission server in the access network, installs the software of the access negotiation module and the data packet verification module on the access router, installs the access client software on the terminal, and designs security for access Access method to guarantee the authenticity of the source address in the address separation mapping network. Such as image 3 as shown, image 3 Terminal A in access network 1 communicates with terminal C in access network 2, combining figure 2 , the secure access method is as follows:
[0068] Step 1: Terminal A in access network 1 selects a public key-pri...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 