Unlock instant, AI-driven research and patent intelligence for your innovation.

A five-tuple authentication method for messages

An authentication method and quintuple technology, applied in the field of communication, can solve problems such as reduced processing efficiency, waste of system resources, and disallowing new authentication, and achieve the effect of improving efficiency

Active Publication Date: 2018-12-07
BEIJING ZUOJIANG TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The existing quintuple authentication method does not allow new authentication to be carried out when a quintuple authentication is performed, and the external RAM needs to be read multiple times in the quintuple authentication. Due to hardware limitations, the read result needs to wait for several cycles to obtain. At this time, the internal logic is idle, and the external RAM bus is also idle, and the new authentication request cannot be responded to, resulting in a waste of system resources and a decrease in processing efficiency.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A five-tuple authentication method for messages
  • A five-tuple authentication method for messages

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] In order to make the purpose, content, and advantages of the present invention clearer, the specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0014] figure 1 Shown is the system block diagram of the quintuple authentication method of the message of the present invention, figure 2 Shown is the flowchart of the five-tuple authentication method of the message, such as figure 1 as well as figure 2 As shown, there are 7 modules in the system corresponding to the quintuple authentication method of the message of the present invention, and the input module 1 is used to read the quintuple to be authenticated and generate a corresponding ID value. Authentication module 2 is used to authenticate the input quintuple. RAM3 is used as an external memory for storing authentication content. RFIFO4 is used to store the ID value of the five-tuple corresponding to the r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a message quintuple authentication method, wherein the method includes the steps of: reading information of a quintuple , and setting a unique ID value of the read quintuple according to an order; reading authentication information corresponding to one quintuple to be authenticated from an RAM, matching the quintuple to be authenticated with a corresponding ID value and performing authentication, and storing an authentication result in a state table; and searching an quintuple to be output in the state table through the ID value, and reading the authentication result of the authenticated quintuple. The message quintuple authentication method solves the problem that other quintuple authentication cannot be handled in an authentication process, and improves the quintuple authentication efficiency without the waste of resources.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a method for authenticating quintuples of messages. Background technique [0002] In network security, it is necessary to verify the legitimacy of the message by authenticating the five-tuple of the input message. No matter which authentication algorithm is required to read back data from the external RAM for comparison operations, the authentication result can be finally obtained. The entire authentication process It cannot be interrupted. At this time, even if a new message arrives and needs to perform quintuple authentication, it must wait until the previous quintuple authentication is completed. [0003] The existing quintuple authentication method does not allow new authentication to be carried out when a quintuple authentication is performed, and the external RAM needs to be read multiple times in the quintuple authentication. Due to hardware limitations, the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/08
Inventor 纪雪莲邱东伟于洪涛
Owner BEIJING ZUOJIANG TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More