Method for setting security authentication in precision time protocol (PTP)

A technology of security authentication and equipment, which is applied in the field of computer communication, can solve problems such as service failure, lack of security mechanism in protocols, and time synchronization disruption, so as to achieve the effect of ensuring communication security

Inactive Publication Date: 2012-11-28
SUZHOU CENTEC COMM CO LTD
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the v2 version considers the basic process of precise time transmission in Ethernet, the protocol lacks an effective security mechanism. When attacked by malicious messages, the time synchronization function will be affected, and related services will fail on a large scal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for setting security authentication in precision time protocol (PTP)
  • Method for setting security authentication in precision time protocol (PTP)
  • Method for setting security authentication in precision time protocol (PTP)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The technical solutions of the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings of the present invention.

[0031] The method for setting security authentication in PTP proposed by the present invention defines a key for both the time synchronization source (Master) and the time synchronization device (Slave) in advance, and the key will not be transmitted on the network. When the time synchronization source publishes synchronization information, an authentication field is added, which contains an MD5 (Message-Digest Algorithm 5, information digest algorithm fifth edition) value, and the MD5 value is the MD5 value of the sender, which is determined by the PTP The result value of the "logical AND" operation between the sequenceID field in the message and the key key. Table 1 shows the format of a common PTP packet header:

[0032] Table 1 PTP header format

[0033]

[0034] Such as im...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for setting security authentication in a precision time protocol (PTP). The method comprises the following steps of: setting keys on a time synchronous source and time synchronous equipment in advance, and adding an identity authentication field in the transmitted PTP message when the time synchronous source transmits synchronous information to the time synchronous equipment, wherein the field comprises a first MD5 value, and the MD5 value consists of a sequence ID field and key logic operation; performing corresponding logic operation on the sequence ID field in the message and a locally preset key when the time synchronous equipment receives the PTP message to obtain a second MD5 value; comparing the two MD5 values, passing the PTP authentication if the PTP messages are the same, otherwise discarding the messages. Thus, the communication safety of PTP is guaranteed, so that equipment for operating the PTP is hardly influenced by hostile attack from an internet.

Description

technical field [0001] The invention relates to the technical field of computer communication, in particular to a method for setting safety authentication in PTP of computer network data communication technology. Background technique [0002] PTP (Precision Time Protocol, precise clock synchronization protocol) is a time synchronization protocol, the synchronization source election mechanism specified in it is as follows: [0003] When the PTP-enabled interface receives an Announce packet, it parses the Announce packet to obtain information related to synchronization source election, such as the time synchronization quality and time synchronization priority in the Announce packet. [0004] After obtaining this information, compare it with the time synchronization quality and time synchronization priority of the device where the interface is located, and take the one with the best time synchronization quality among all received messages as the synchronization source. If it is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
Inventor 龚海东
Owner SUZHOU CENTEC COMM CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products