Security assurance method and security management server of host identity tag
A technology for managing server and host identification, applied in the direction of digital transmission systems, electrical components, transmission systems, etc., can solve the problems of reduced security, HIT security, and security cannot be guaranteed, and achieve the effect of safe use guarantee
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0023] Such as figure 1 As shown, this embodiment provides a security guarantee method for host identification tags, including:
[0024] Step 101: Record the validity period of the HIT in the security management server.
[0025] Step 102: Record the security status of the HIT in the security management server.
[0026] Step 103: query the security management server for the validity period of the HIT of the peer host that needs to communicate and / or the security status of the HIT of the peer host that needs to communicate, and confirm whether it is communicating with the peer host that needs to communicate. .
[0027] In step 103, when communication is needed, query the security management server for the validity period of the HIT of the peer host that needs to communicate and / or the security status of the HIT of the peer host that needs to communicate, and the peer that needs to communicate The validity period of the HIT of the host and / or the security status of the HIT of the opposi...
Embodiment 2
[0033] This embodiment provides a method for ensuring the security of a host identification label, which records the validity period of HIT and / or the security status of HIT by extending a DNS resource record (DNS Resource Record, DNSRR) on a DNS (Domain Name Server, domain name server) server. It also provides a query mechanism for the validity period of the HIT and / or the security status of the HIT. Preferably, the HIP Resource Record (HIP Resource Record, HIP RR) can be extended or redefined in the DNS RR. Such as figure 2 As shown in 201, the original types of HIP RR include: HIT length, public key (HI) algorithm, public key (HI) length, HIT, public key (HI), and convergence point server and other resource record types. Preferably, on the basis of the original resource record type in the HIP RR, the validity period of the HIT and / or the security status of the HIT may be increased, and the resource record type may be added to the DNS RR. The expanded resource record types ...
Embodiment 3
[0048] The method for ensuring the security of the host identification label provided in this embodiment is based on a Hierarchical Routing Architecture (Hierarchical Routing Architecture, HRA). The management domain in the HRA has a server ID-Server that is responsible for registering the host ID HI. The ID-Server is responsible for the registration and maintenance of the host ID. The ID-Server can be used to manage and maintain the validity period and / or HIT of the HIT. The security status of HIT and provide query service of HIT validity period and / or HIT security status.
[0049] Such as Figure 4 As shown, the security guarantee method of the host identification tag provided in this embodiment includes:
[0050] Step 401: Record the validity period of the HIT in the ID-Server.
[0051] In step 401, if the public key (HI) itself has a validity period, the validity period of the HIT should not exceed the validity period of the public key (HI); since the host may deliberately delay...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com