Anti-replaying method and device based on time

An anti-replay and time technology, applied in electrical components, transmission systems, etc., can solve problems such as message packet loss, and achieve the effect of avoiding false packet loss

Active Publication Date: 2014-10-08
NEW H3C TECH CO LTD
View PDF7 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] In view of this, the present application provides a time-based anti-replay method and device, which are used to solve th...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-replaying method and device based on time
  • Anti-replaying method and device based on time
  • Anti-replaying method and device based on time

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The technical solutions of the present invention will be described in detail below with reference to the accompanying drawings.

[0043] figure 1 A flow chart of the steps of a time-based anti-replay method provided by an embodiment of the present invention. The steps in this embodiment are described with the network device at the receiving end as the main body of the steps, and the sending end and the receiving end are transmitted through an IPsec tunnel. data message, the method includes:

[0044] Step 101, receiving the data message based on IPSec encapsulation sent by the sending end, recording the local absolute time stamp T2 of the receiving end at the time when the data message is received, and carrying the time stamp of the time when the data message is sent by the sending end in the data message The sender's local absolute timestamp T1;

[0045]This embodiment uses the AH header of the IPSec protocol and / or the sequence number (Sequence Number) field in the E...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an anti-replaying method and device based on time. The anti-replaying method and device are based on an IPSec protocol, timestamps are carried in a field of an original serial number when IPSec encapsulation is carried out at a sending end, a receiving end determines whether messages are replayed messages or not by combining local time and an anti-replaying time window on the basis of the timestamps in the messages, and time synchronization does not need to be maintained by the sending end and the receiving end through a time synchronization protocol. The anti-replaying method and device based on the time can effectively avoid packet losses by mistake under the conditions that the packet sending speed of the sending end is high and the messages are sent in a multi-core parallel sending mode.

Description

technical field [0001] The invention relates to the anti-replay technology of Internet protocol messages, in particular to a time-based anti-replay method and device. Background technique [0002] Internet Protocol Security (Internet Protocol Security, IPSec) protocol is a three-layer tunnel encryption protocol formulated by IETF. This protocol provides a complete set of architecture for network data security on the IP layer. It provides security services such as data confidentiality, data integrity, data source authentication, and anti-replay (Anti-Replay) for data transmitted on the Internet. [0003] Traditional IPsec VPN adopts end-to-end technology. When a data packet is intercepted by a third party, an attacker can decipher the intercepted packet and then replay the same packet to gain illegal access by forging an identity. [0004] The IPSec protocol implements anti-replay detection through a network authentication header (Authentication Header, AH) and a sequence nu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
Inventor 宋晓欢
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products