Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for verifying source address

A verification method and source address technology, applied in the field of network communication, can solve problems such as replay attacks and low source address verification security

Inactive Publication Date: 2011-01-05
THE PLA INFORMATION ENG UNIV
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the embodiment of the present application is to provide a source address verification method and system to solve the problem in the prior art that the source address verification security is not high and is vulnerable to replay attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for verifying source address
  • Method and system for verifying source address
  • Method and system for verifying source address

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0082] see figure 1 , which is the flow chart of the first embodiment of the source address verification method of this application:

[0083] Step 101: The host registers with the private key generation center PKG through the MAC address.

[0084] Before step 101, further, the PKG runs the initial setting algorithm to obtain the system public parameters, the master public key and the master private key, and saves the master private key in the trusted platform module TPM; the security gateway is initialized, by communicating with the PKG communication obtains the master public key and system public parameters.

[0085] Specifically, the host sends a registration request containing the MAC address to the PKG, and the PKG generates a random number for the host, and stores the correspondence between the MAC address and the random number in a static list, and the PKG returns the random number, master public key, and system public parameters to the host.

[0086] Step 102: Obtain...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a method and a system for verifying a source address. The method comprises the following steps that: a host registers in a private key generation centre PKG through an MAC address; a host public key and a host private key are acquired by interacting parameters with the PKG; an identity code-based IP address is generated according to the host public key and the IP address serves as the source address of the host; the host generates the authentication information of the source address according to the host private key and a conversation key and carries the authentication information in a data packet sent to a security gateway; and the security gateway verifies the source address according to the authentication information in the data packet. In the embodiment of the invention, a code system access to a sub-network is established by adopting an identity-based code mechanism, so that the dependence on the PKI is avoided; and the authentication information of the source address is added into each data packet, so that the source address is prevented from being distorted. Through a stream authentication method, the verification security and verification efficiency of the source address are improved.

Description

technical field [0001] The present application relates to the technical field of network communication, in particular to a source address verification method and system. Background technique [0002] Devices in the existing Internet usually forward packets based on the destination address of the packet, but do not check the source address. Therefore, the source address is frequently forged, which becomes the root of many network attacks. In order to overcome the defect that the source address is easy to be forged, the source address can be verified in the following way in the prior art: a security gateway is set at the border of the access subnet, and the data packets sent by each host to the outside of the access subnet are To pass the source address verification of this security gateway, when the host wants to access the Internet, it first authenticates to the security gateway; the host generates a session key and sends the session key to the security gateway through a key...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/12H04L12/56H04L9/32
Inventor 贾洪勇陈越邵婧谭鹏许窦睿彧
Owner THE PLA INFORMATION ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products