Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A security verification method and device for a message into a label

A technology for entering tags and messages, applied to electrical components, transmission systems, etc., can solve problems such as the inability to prevent equipment impacts, and the inability of LSR to identify the legitimacy of tags, so as to achieve simple configuration, prevent network attacks, and achieve simple effects

Active Publication Date: 2018-01-09
NEW H3C TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] The embodiment of the present application provides a method and device for security verification of a message into a label, which solves the problem that the LSR in the existing solution cannot identify the validity of the label and cannot prevent malicious attack messages from impacting the device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security verification method and device for a message into a label
  • A security verification method and device for a message into a label
  • A security verification method and device for a message into a label

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to solve the problem in the prior art solution that the LSR cannot identify the validity of the label and prevent malicious attack packets from impacting the equipment, this application proposes a security verification method for packets entering labels.

[0032] Such as image 3 As shown, it is a schematic flow diagram of a security verification method for a message into a label proposed in the embodiment of the present application. The method is applied in an MPLS network and specifically includes the following steps:

[0033] In step S301, the LSR receives a message carrying an incoming label.

[0034] When this step occurs, depending on whether the source validity check function of the incoming label is enabled on the LSR, there will be the following two situations:

[0035] Case 1: the LSR has currently enabled the source validity checking function of the incoming label, and then performs the subsequent step S302.

[0036] It should be noted that the spe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An embodiment of the invention discloses a security verification method and equipment for an incoming label of a message. According to the technical scheme provided by the embodiment of the invention, on the basis that the conventional MPLS (multi-protocol label switching) network application and the protocol of the MPLS are not affected, as for a message carrying the incoming label, an LSR (label switching router) compares the information of the port actually receiving message with the information of the ingress port corresponding to the incoming label to perform source validity check according to the corresponding relation of a prestored incoming label and an ingress port, so that network equipment attack for the MPLS service can be prevented, the processing scheme is simple in configuration and simple to implement, potential network attack behaviors for the MPLS network can be prevented, and the equipment operates more securely.

Description

technical field [0001] The present application relates to the field of communication technology, and in particular to a method and device for verifying the security of a message into a label. Background technique [0002] MPLS (Multi-protocol Label Switching, Multi-protocol Label Switching) is a backbone network technology widely used at present. MPLS introduces the concept of connection-oriented label switching on the connectionless IP (Internet Protocol, Internet Protocol) network, combines the third-layer routing technology and the second-layer switching technology, and gives full play to the flexibility of IP routing and the second-layer The simplicity of the exchange. In an MPLS network, devices forward packets based on short and fixed-length labels, which saves the cumbersome process of searching the IP routing table and provides a high-speed and efficient way for data transmission in the backbone network. [0003] Such as figure 1 As shown, it is a schematic struct...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 李树奎
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products