Unlock instant, AI-driven research and patent intelligence for your innovation.

Self-trusted network address and secret key distributing method based on address (public key)

A technology for network address and key distribution, applied in the field of trusted and secure network infrastructure, to solve problems such as incompatibility and inheritance of genes

Active Publication Date: 2013-11-27
NAT UNIV OF DEFENSE TECH
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the introduction of self-verification identification needs to change the TCP / IP network architecture, and change the original hierarchical IP address to a flat non-semantic address, which cannot be compatible with and inherit the successful genes of the existing Internet

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Self-trusted network address and secret key distributing method based on address (public key)
  • Self-trusted network address and secret key distributing method based on address (public key)
  • Self-trusted network address and secret key distributing method based on address (public key)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0059] A self-trust network address and key distribution method based on the address or public key of the present invention, its core idea is that the network IP address is the corresponding public key of the IP address, thereby naturally completing the binding of the IP address and its public key Then through the hierarchical security IP address private key generation and distribution mechanism, the binding of the IP address and its private key is completed.

[0060] First layer a complete network IP address. Traditional IPv4 addresses are composed of address prefixes and suffixes of different levels, which can be directly mapped to the levels proposed by the present invention, and the relationship between the two levels is also the same. IPv6 addresses are long and are usually divided into several segments such as subnet prefix, Qo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a self-trusted network and secret key distributing method based on an address (public key). The self-trusted network and secret key distributing method based on the address (public key) includes the following steps that firstly, a network address digital authorization mechanism NANA completes initialization of a trust system; secondly, a network zone registration mechanism NARA of a zone sub-network applies to the NANA for an address and a corresponding secret key and the network address and the corresponding secret key are distributed to the zone sub-network; thirdly, a network autonomous zone managing mechanism NASA of an autonomous zone sub-network applies to the superior network zone registration mechanism NARA for an address and a corresponding secret key and the network address and the corresponding secret key are distributed to the autonomous zone sub-network; fourthly, a base layer network node applies to the superior network autonomous zone managing mechanism NASA for an address and a corresponding key. The NASA distributes the network address and the corresponding secret key to the network node by means of a sub-layer network address secret key managing protocol. The self-trusted network and secret key distributing method based on the address (public key) has the advantages that the principle is simple, realization and popularization are easy, changing of an existing IP address lexeme is unnecessary, and binding of the third party is unnecessary.

Description

technical field [0001] The present invention mainly relates to the field of trusted and secure network infrastructure, and specifically refers to a self-trusted network address and key distribution method based on addresses, that is, public keys. A certain system, and trusted and secure distribution of network addresses and their private keys. Background technique [0002] After more than 40 years of development, the Internet (Internet) has changed from a small scientific research network that only connected several universities in the United States at the beginning of its birth to an information communication network covering the world today, and has become an information society that integrates information collection, transmission, storage and processing. It provides an indispensable link and platform for the production of human society, public life, government management and business exchanges. [0003] Although computing technology, communication technology, and applica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/12H04L9/00
Inventor 王小峰苏金树胡晓峰吴纯青黄杰虞万荣彭伟陶静时向泉
Owner NAT UNIV OF DEFENSE TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More