Self-representation secure routing authorization method based on identity, namely, public key

A self-representation and routing technology, applied in the field of trusted and secure network infrastructure, can solve problems such as prefix hijacking, and achieve the effect of simple principle, easy implementation and promotion

Active Publication Date: 2015-12-09
NAT UNIV OF DEFENSE TECH
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by the present invention lies in: Aiming at the technical problems existing in the prior art, the present invention provides an easy-to-deploy inter-domain routing security mechanism, realizes source authentication and path authentication of inter-domain routing, and solves the problem of traditional inter-domain routing mechanism Unavoidable prefix hijacking problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Self-representation secure routing authorization method based on identity, namely, public key
  • Self-representation secure routing authorization method based on identity, namely, public key
  • Self-representation secure routing authorization method based on identity, namely, public key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The present invention will be further described below in conjunction with the accompanying drawings and specific preferred embodiments, but the protection scope of the present invention is not limited thereby.

[0046] An identification of the present invention is a self-expression security routing authorization method of a public key, which is based on a self-trusted network address system and a self-trusted routing identification system, through a hierarchical security IP address private key generation and distribution mechanism, Complete the binding of IP addresses and private keys, and complete the deployment of routers through hierarchical authentication methods to realize the binding of routing resource identifiers and corresponding private keys. The owner of the network address signs its address with the private key of the network address, and the advertiser of the router signs its routing path, and the peer router extracts the public key of the routing resource i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a self-representation secure routing authorization method based on an identity, namely, a public key. The method comprises the following steps: S1, publishing a public security parameter, and starting a trusted root; S2, constructing a self-trusted address system; S3, constructing a self-trusted routing identity system; S4, signing and issuing an address authorization certificate to an NASA (Network Autonomous System Authority) by an address owner, and assigning a deployed routing announcer to announce address reachable information by the NASA; S5, signing and issuing a path authentication certificate by the routing announcer, and announcing routing update carrying the path authentication certificate and the address authorization certificate to a peer route; and S6, receiving the routing update by a peer routing announcer, verifying the address authorization certificate and the path authentication certificate issued and signed by each announcer on a routing path, and determining the validity of the routing update. The self-representation secure routing authorization method is simple in principle and easy for deployment; source authentication and path authentication of inter-domain routing can be realized; and the problem of inevitable prefix hijacking in a conventional inter-domain routing mechanism can be solved effectively.

Description

technical field [0001] The present invention relates to the field of trusted and secure network infrastructure, in particular to a self-expressive security routing mechanism constructed using a self-trusted network address that is a public key as an address and a self-trusted routing resource identifier that is a public key as an identifier. In the case of routing mechanism, a secure routing strategy is constructed to solve the source authentication and path authentication problems of inter-domain routing. Background technique [0002] With the in-depth development and wide application of information technology, the Internet (Internet) has penetrated into every corner of people's lives. According to the statistics of China Internet Network Information Center as of June 30, 2014, the number of Internet users in my country has reached 632 million, the number of accessible websites has reached 2.73 million, and the international export bandwidth is nearly 4 million megabits per...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/701
CPCH04L45/00H04L63/0428H04L63/08H04L63/164
Inventor 王小峰苏金树王宝生陈培鑫胡晓峰吴纯青彭伟赵锋周寰
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products