Method for setting security authentication in precision time protocol (PTP)
A technology of security authentication and equipment, which is applied in the field of computer communication, can solve problems such as service failure, lack of security mechanism in protocols, and time synchronization disruption, so as to achieve the effect of ensuring communication security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0030] The technical solutions of the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings of the present invention.
[0031] The method for setting security authentication in PTP proposed by the present invention defines a key for both the time synchronization source (Master) and the time synchronization device (Slave) in advance, and the key will not be transmitted on the network. When the time synchronization source publishes synchronization information, an authentication field is added, which contains an MD5 (Message-Digest Algorithm 5, information digest algorithm fifth edition) value, and the MD5 value is the MD5 value of the sender, which is determined by the PTP The result value of the "logical AND" operation between the sequenceID field in the message and the key key. Table 1 shows the format of a common PTP packet header:
[0032] Table 1 PTP header format
[0033]
[0034] Such as im...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com