Centralized safety connection establishing system and method

A technology of secure connection and establishment method, applied in the field of centralized secure connection establishment system, can solve the problems of increased data packet delay, complex topology of wired local area network, complex distribution and update process, etc.

Active Publication Date: 2011-02-02
CHINA IWNCOMM
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This security measure brings a huge computational burden to the switching devices in the LAN, which is easy to cause attackers to attack the switching devices; and the delay of data packets from the sending node to the destination node will also increase, reducing network transmission. efficiency
[0004] The topology of wired LAN is relatively complex, and the number of nodes involved (here, terminals and sw

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Centralized safety connection establishing system and method
  • Centralized safety connection establishing system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0085] In the network, all connection devices have established a secure connection with the core connection device SW-Center in the network through pre-distribution or other security mechanisms, that is, they already have a shared key; all terminal devices only communicate with adjacent The connected devices have established a secure connection through pre-distribution or other security mechanisms, that is, they already have a shared key (the establishment mechanism of the secure connection described here is not limited or defined in the present invention).

[0086] figure 1 Taking the steps of establishing a secure connection between the first terminal device STA-A and the second terminal device STA-B as an example, the specific scheme of the method for establishing a centralized secure connection provided by the present invention is as follows:

[0087] 1) SW Center It is the core connection device in the network. The first connection device SW1 refers to the first connecti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to centralized safety connection establishing system and method. The system comprises a terminal device and a connecting device, wherein the terminal device comprises an initiator terminal device and a receiver terminal device, the connecting device comprises a core connecting device, an initiator connecting device and a receiver connecting device, the initiator connecting device is arranged on a link between the initiator terminal device and the core connecting device, and the receiver connecting device is arranged on a link between the receiver terminal device and the core connecting device. The invention ensures that legal nodes of a local network can be flexibly established and keys among the legal nodes are updated for establishing safety connection among the legal nodes. The invention can be used for flexibly establishing the safety connection among the nodes without distributing static key pairs among the nodes of the local network, can ensure that the data among the nodes can be transmitted secretly through the safety connection among the nodes so that an attacker can not obtain real information even if information stolen by accessing into the networkis ciphertext information.

Description

technical field [0001] The invention relates to the technical field of network communication, in particular to a system and method for establishing a centralized secure connection. Background technique [0002] The wired LAN is generally a broadcast network, and the data sent by one node can be received by other nodes. All nodes on the network share the channel, which brings great security risks to the network. As long as the attacker accesses the network to monitor, he can capture all the data packets on the network. [0003] The local area network LAN defined by the existing national standard GB / T 15629.3 (corresponding to IEEE 802.3 or ISO / IEC 8802-3) does not provide data security methods, which makes it easy for attackers to steal key information. In the field of international research, the IEEE 802.1AE standard developed by IEEE provides a data encryption protocol for protecting Ethernet, and adopts hop-by-hop encryption security measures to realize the safe transmis...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L29/06
Inventor 李琴铁满霞黄振海胡亚楠
Owner CHINA IWNCOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products