Unlock instant, AI-driven research and patent intelligence for your innovation.

Real user identity-oriented host moving method

A technology of user identity and user identity information, applied in the field of host mobile oriented to real user identity, to prevent identifier forgery

Active Publication Date: 2015-03-04
TSINGHUA UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the acquisition, dissemination, and maintenance of host identifiers are very different from IP addresses, and it is impossible to directly use source address verification technology to verify identifiers.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Real user identity-oriented host moving method
  • Real user identity-oriented host moving method
  • Real user identity-oriented host moving method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The implementation of the present invention will be described in detail below in conjunction with the accompanying drawings and examples, so as to fully understand and implement the process of how to apply technical means to solve technical problems and achieve technical effects in the present invention. It should be noted that, as long as there is no conflict, each embodiment and each feature in each embodiment of the present invention can be combined with each other, and the formed technical solutions are all within the protection scope of the present invention.

[0026] In addition, the steps shown in the flow diagrams of the figures may be performed in a computer system, such as a set of computer-executable instructions, and, although a logical order is shown in the flow diagrams, in some cases, the sequence may be different. The steps shown or described are performed in the order herein.

[0027] It should be noted that, in the embodiment of the present invention, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a real user identity-oriented host moving method. The method comprises the following steps that: when accessing a first network from an off-line state, a host interacts with an identifier server in the first network to verify whether the user identity of the host is legal or not, and if the user identity of the host is legal, the identifier server in the first network generates a host identifier by using user identity information and generates an Internet protocol version 6 (IPv6) address of the host in the first network based on the host identifier; and when moving from the first network to a second network, the host interacts with an identifier server in the second network to verify whether the user identity and the host identifier are legal or not, and if the user identity and the host identifier are legal, the identifier server in the second network generates the IPv6 address of the host in the second network based on the host identifier. According to the method, the problem of insufficient security of the IPv6 address in the prior art is solved by embedding the identifier which is generated by using the user identity information into the IPv6 address, and the identifier is prevented from being forged.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a host mobile method oriented to real user identities. Background technique [0002] At present, there is a kind of technology that supports host mobility in the Internet. By assigning relatively constant identifiers to terminal hosts to maintain the continuity of transport layer sessions, and maintaining the mapping from identifiers to IP addresses in the network, IP address-based data transmission. [0003] However, in this type of method, the user can achieve the purpose of forging his own identity by forging the source identifier, which makes this type of mobility method have certain security problems. [0004] The Identifier-Locator Network Protocol (ILNP) method uses the last 64 bits of the IPv6 address as the host identifier, but this method lacks a corresponding security mechanism to ensure the validity of the identifier. Users can generate arbitrary identifiers on...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 毕军王优孙雅媛姚广高凯朱树永张宝宝
Owner TSINGHUA UNIV