Trusted authentication and safe access control method of MPLS network

A technology of secure access and control methods, applied in the field of network communication, can solve problems such as PPPoE inapplicability and network bottlenecks, and achieve high flexibility and processing speed, good application prospects, and good compatibility

Inactive Publication Date: 2013-06-19
QINGHAI NORMAL UNIV +1
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 3) After the authentication is passed, the PPPoE service flow still needs to be unpacked, identified, encapsulated and forwarded by the BRAS device, which may easily cause network bottlenecks
Therefore, PPPoE is not suitable for high-speed enterprise networks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted authentication and safe access control method of MPLS network
  • Trusted authentication and safe access control method of MPLS network
  • Trusted authentication and safe access control method of MPLS network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the purpose, implementation and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0034] see figure 1 , introduces the IP address pair short signature principle of the method of the present invention. PKG generates private key S for trusted end nodes ID and authentication information P ID . figure 1 IP in pair It is the message to be signed: the result string after concatenating the source and destination IP address pairs of this communication and performing AND operation with a random value. Authentication information is sent to the LER for use in the signature verification process.

[0035] see Figure 2 to Figure 3 , introduces the signature information encapsulation of the method of the present invention. The method consists of the following two phases:

[0036](1) Traditional signature verification needs to be performed by the destina...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a trusted authentication and safe access control method of an MPLS network, which realizes the trusted authentication and safe access control of the MPLS network and improves the credibility of Internet backbone. The method comprises four parts as follows: microcode implementation of digital short signature, microcode implementation of IP head signature option format, microcode implementation of signature verification based on IP address pair and TCAM design of signature information table. The method comprises the following steps that: the terminal node signs for source target IP address pair and packages signature associated information in the option field of the IP head; and verification of the signature is implemented through microcode design on a network processor, wherein the signature information table stores and searches based on TCAM technology. The invention is adapted to access control to MPLS backbone networks by various wire park networks, government affairs networks, campus networks and network terminal nodes such as wireless Mesh and WLAN. As an effective and practical technical scheme, the method has good application prospect.

Description

technical field [0001] The present invention generally relates to the field of network communication technologies, and more specifically relates to trusted access control of MPLS backbone networks by terminal nodes in various wired campus networks, government affairs networks, campus networks, enterprise networks, wireless WLANs, and wireless Mesh networks. Ways to improve the trustworthiness of the Internet. Background technique [0002] With the development of Internet technology, people's demand and dependence on the application of information networks are constantly increasing, and the accompanying information security threats are also increasing. The threats to a single host in the past have developed into attacks on network infrastructure, and most network security incidents are caused by vulnerable user terminals and "out of control" network usage behaviors. The reason why virus intrusion, Trojan implantation, denial of service attack, address theft, DHCP spoofing an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/12H04L9/32
Inventor 杜秀娟金志刚杜秀菊黄科军
Owner QINGHAI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products