Source-tracing method and system for anonymous communication

An anonymous communication and node technology, which is applied in the traceability method and system field of anonymous communication, can solve problems such as invalid IP address traceability, and achieve the effect of ensuring authenticity and validity

Inactive Publication Date: 2011-05-04
ZTE CORP
View PDF2 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0017] The technical problem to be solved by the present invention is to provide a traceability method and system for anonymous communication, to solve the proble

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Source-tracing method and system for anonymous communication
  • Source-tracing method and system for anonymous communication
  • Source-tracing method and system for anonymous communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] There are many network architectures based on the separation of identity and location. figure 1 It is a schematic network topology diagram of an identity identification and location separation architecture according to an embodiment of the present invention, which shows key network elements / functional entities of the system architecture related to the present invention.

[0058] Such as figure 1 As shown, in the architecture based on identity and location separation described in this embodiment (hereinafter referred to as this architecture), the network is divided into an access network and a backbone network. The access network is located at the edge of the backbone network and is responsible for the access of all terminals. The backbone network is responsible for the routing of different terminals accessed through the access network. An Access Service Node (ASN for short) is located at the boundary between the backbone network and the access network, and interfaces w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a source-tracing method for anonymous communication, which comprises the following steps of: sending a source-tracing inquiring request to an accessed access node by a node, and carrying an anonymous identity identifier in the source-tracing inquiring request; after the source-tracing inquiring request is received by the access node, inquiring a corresponding true identity identifier according to the anonymous identity identifier; and sending the inquired true identity identifier to the node. The invention considers that an IP (Internet Protocol) address can be dynamically allocated and can be juggled, and the source tracing of the IP address can not represent the positioning to a user; an AID (Application Identifier) is the true identity of the user, and wherever the user is located, the AID is unique, and the positioning to the AID is the positioning to the user; and an RID (Relative Identifier) is the position identifier of the user, an edge router accessed to the user is also identified, and the position of the user is inquired when the RID is positioned.

Description

technical field [0001] The present invention relates to the technical field of communication, in particular to a source tracing method and system for anonymous communication. Background technique [0002] At present, the IP address in the TCP / IP (Transmission Control Protocol / Internet Internet Protocol) protocol widely used on the Internet has dual functions. The identity of the interface. At the beginning of the TCP / IP protocol design, the movement of the host was not considered. However, when the host mobile becomes more and more common, the semantic overload defect of this IP address becomes more and more obvious. When the IP address of the host changes, not only the route will change, but also the identity of the communication terminal host will change, which will lead to an increasingly heavy routing load, and the change of the host identity will lead to interruption of applications and connections. [0003] The purpose of proposing the separation of identity identif...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06
CPCH04L61/45H04L67/535
Inventor 孙翼舟
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products