PTP protocol key distribution method and apparatus thereof

A PTP protocol and key technology, applied in key distribution, can solve problems such as poor flexibility and no support for authentication methods, and achieve the effect of enhanced security

Active Publication Date: 2012-07-18
ALCATEL LUCENT SHANGHAI BELL CO LTD +1
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In addition, Appendix K of the PTP protocol only supports the fixed authentication method based on challenge-response, and does not support other authentication methods, so the flexibility is poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • PTP protocol key distribution method and apparatus thereof
  • PTP protocol key distribution method and apparatus thereof
  • PTP protocol key distribution method and apparatus thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0026] figure 1 A schematic diagram of an application scenario according to a specific embodiment of the present invention is shown. exist figure 1 In , a domain 10 and a plurality of network nodes 21, 22, 23, etc. in it are shown, wherein a domain control device is introduced as an automatic distribution device of the PTP protocol key. A domain is usually an application range in the network. Entities within this range have allowed access rights, but entities in this domain will be controlled by domain rights and cannot be accessed. A domain is a relatively strict management mode, and domains and domain control devices are usually used to implement centralized management and security control, which is very necessary for network security.

[0027] figure 2 A flow chart of a method for issuing PTP protocol keys to network nodes in the domai...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention brings forward a technical scheme of automatic distribution of a precision timing protocol (PTP) key and on the basis of the technical scheme, a novel encryption method is brought forward. Domain control equipment is introduced to verify whether a network node in a domain is a valid node in the domain or not; and if the network node is the valid node in the domain, a key used for a PTP protocol is sent to the network node. According to the method and the apparatus thereof, access authentication of PTP network nodes of various forms as well as automatic configuration and dynamic sending of a PTP key are supported, so that security of the key is substantially enhanced. In addition, a signcryption encryption algorithm is employed; therefore, for each PTP message, not only can message source authentication, message integrity authentication, and protection on confidentiality and replaying of messages be provided, but also the sending network node can be tracked; therefore, security is substantially enhanced.

Description

technical field [0001] The present invention relates to the PTP protocol, in particular to encryption in the PTP protocol. Background technique [0002] In distributed systems, clock synchronization is an essential technique for many applications. Among them, the most typical clock synchronization protocol is the IEEE1588 protocol, which is also called the PTP protocol (Precision Timing Protocol). The main principle of the PTP protocol is to periodically correct and synchronize the clocks of all nodes in the network through a synchronization signal, so that the distributed system can achieve accurate synchronization. The advantage of the PTP protocol based on the master-slave clock mode is that it is simple and easy to implement, but more and more studies have shown that the PTP protocol is vulnerable to malicious attacks or failures. A typical example is tampering with malicious master clocks such as Byzantine or Babbling idiot Time can do nothing. [0003] The PTP proto...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08H04L29/06
CPCH04L9/3073H04J3/06H04L63/0892H04L63/06H04L63/0428H04L9/3252H04L2209/72H04L9/08H04L9/32
Inventor 姚亦峰
Owner ALCATEL LUCENT SHANGHAI BELL CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products