Unlock instant, AI-driven research and patent intelligence for your innovation.

Fragmented message transmission method and network equipment

A network device and message transmission technology, applied in the field of Internet communication, can solve the problem that the destination device cannot obtain message data, etc., and achieve the effect of improving network security.

Inactive Publication Date: 2016-07-13
ZTE CORP
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The main technical problem to be solved by the present invention is to provide a fragmented message transmission method and network equipment, which can solve the problem that the existing signature encryption method to increase network security will cause the target equipment to fail to obtain the correct signature after de-signature and message reassembly. Technical issues with telegram data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fragmented message transmission method and network equipment
  • Fragmented message transmission method and network equipment
  • Fragmented message transmission method and network equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0059] Considering that the existing signature encryption method is used to increase network security, there will be a technical problem that the destination device cannot obtain correct message data after de-signature and message reassembly; this embodiment provides a fragmented message transmission method, such as figure 1 As shown, it can be applied to the sender of fragmented packets, including the following steps:

[0060] Step 101: When a fragmented packet passing through a network device needs to be signed, obtain a characteristic value of the fragmented packet.

[0061] Specifically, the way to obtain the feature value in this step may include one of the following two:

[0062] The first method is to extract a feature element from the fragmented message, and obtain a feature value of the fragmented message according to the feature element.

[0063] In this manner, the extracted feature elements can be directly used as feature values, or the extracted feature elements ...

Embodiment 2

[0086] This embodiment provides a method for sending fragmented messages, which can be applied to the receiving end of fragmented messages, such as image 3 shown, including the following steps:

[0087] Step 301: When the fragmented message passing through the network device needs to be de-signatured, extract the signature information from the header of the fragmented message.

[0088] When the signature information is stored in the identification field of the message header, this step needs to extract the signature information from the identification field of the fragmented message header.

[0089] Preferably, the method in this embodiment can extract the signature information from the header of the fragmented message after at least two fragmented messages belonging to the same message that need to be de-signatured arrive at the network device; After all the fragmented packets that need to be de-signatured arrive at the network device, the signature information is extracted...

Embodiment 3

[0095] Such as Figure 4 As shown, this embodiment provides a network device, including:

[0096] A message sending and receiving module, configured to receive and send all data messages passing through the network device;

[0097] A policy module, configured to determine whether a packet passing through the network device needs the signature or the de-signature;

[0098] A signature module, configured to store a signature key, and perform the signature on the message that needs to be signed;

[0099] The de-signature module is configured to save the de-signature key, and perform the de-signature on the message that needs to be de-signatured.

[0100] Such as Figure 5 As shown, this embodiment provides a fragmented message transmission method in a network device, including the following steps:

[0101] Step 501: the fragmented message enters the network device;

[0102] Step 502: the message sending and receiving module of the network device sends the allocation message ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a fragmented message transmission method and network equipment. The fragmented message transmission method comprises the following steps of when a fragmented message of the network equipment needs a signature, acquiring a characteristic value of the fragmented message; according to a signing key, signing the characteristic value and storing signature information in a fragmented message head portion; and sending the signed fragmented message. By using the distribution and transmission method of the invention, a technical problem that target equipment after signature decryption and message recombination can not acquire correct message data when an existing signature encryption method is used to increase network safety can be solved.

Description

technical field [0001] The invention relates to the technical field of Internet communication, in particular to a fragmented message transmission method and network equipment. Background technique [0002] With the rapid development of the Internet, more and more attention has been paid to the security of the network. How to ensure that the information in the network is not tampered with or stolen, to ensure the integrity of the data, and to enhance the security of the network is imminent. [0003] Network devices are an important target of Internet attacks, and how to monitor the traffic of network devices has become an important issue. The tampering of the network equipment itself or the spontaneous abnormal message flow can easily cause leakage. There is almost no method for detecting abnormal message flow in the existing technology. It only encrypts the message to prevent leakage, but it cannot completely prevent theft from being cracked and leaked. possibility. At the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L29/06
Inventor 滕荟芸
Owner ZTE CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More