Fragmented message transmission method and network equipment
A network device and message transmission technology, applied in the field of Internet communication, can solve the problem that the destination device cannot obtain message data, etc., and achieve the effect of improving network security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0059] Considering that the existing signature encryption method is used to increase network security, there will be a technical problem that the destination device cannot obtain correct message data after de-signature and message reassembly; this embodiment provides a fragmented message transmission method, such as figure 1 As shown, it can be applied to the sender of fragmented packets, including the following steps:
[0060] Step 101: When a fragmented packet passing through a network device needs to be signed, obtain a characteristic value of the fragmented packet.
[0061] Specifically, the way to obtain the feature value in this step may include one of the following two:
[0062] The first method is to extract a feature element from the fragmented message, and obtain a feature value of the fragmented message according to the feature element.
[0063] In this manner, the extracted feature elements can be directly used as feature values, or the extracted feature elements ...
Embodiment 2
[0086] This embodiment provides a method for sending fragmented messages, which can be applied to the receiving end of fragmented messages, such as image 3 shown, including the following steps:
[0087] Step 301: When the fragmented message passing through the network device needs to be de-signatured, extract the signature information from the header of the fragmented message.
[0088] When the signature information is stored in the identification field of the message header, this step needs to extract the signature information from the identification field of the fragmented message header.
[0089] Preferably, the method in this embodiment can extract the signature information from the header of the fragmented message after at least two fragmented messages belonging to the same message that need to be de-signatured arrive at the network device; After all the fragmented packets that need to be de-signatured arrive at the network device, the signature information is extracted...
Embodiment 3
[0095] Such as Figure 4 As shown, this embodiment provides a network device, including:
[0096] A message sending and receiving module, configured to receive and send all data messages passing through the network device;
[0097] A policy module, configured to determine whether a packet passing through the network device needs the signature or the de-signature;
[0098] A signature module, configured to store a signature key, and perform the signature on the message that needs to be signed;
[0099] The de-signature module is configured to save the de-signature key, and perform the de-signature on the message that needs to be de-signatured.
[0100] Such as Figure 5 As shown, this embodiment provides a fragmented message transmission method in a network device, including the following steps:
[0101] Step 501: the fragmented message enters the network device;
[0102] Step 502: the message sending and receiving module of the network device sends the allocation message ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com
