Verification method and verification device

A verification method and a technology of a verification device, which are applied in the field of verification methods and verification devices for business chains, can solve problems such as difficulty in ensuring the integrity of business chain paths, and achieve the effects of ensuring integrity and avoiding security risks

Active Publication Date: 2017-05-03
CHINA MOBILE COMM GRP CO LTD
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The purpose of the present invention is to provide a verification method and a verification device, which are used to solve the technical problem in the prior art that it is difficult to ensure the integrity of the service chain path in an open cloud environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method and verification device
  • Verification method and verification device
  • Verification method and verification device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, specific embodiments will be described in detail below with reference to the accompanying drawings.

[0069] see figure 2 As mentioned above, the embodiment of the present invention provides a verification method, including:

[0070] S201: Receive a first message including service chain path information and verification label information;

[0071] S202: Verify whether the service path of the first message has been tampered with according to the verification tag information and the service chain path information, and obtain a verification result;

[0072] S203: Process the first message according to the verification result.

[0073] The verification method of the embodiment of the present invention can prevent the service path of the message between the user equipment and the application platform from being tampered with, so that it can be transmitt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

comprises the following steps of: receiving a first message including the business chain path information and the verification label information ; verifying whether the business path of the first message is tampered or not according to the verification label information and the business chain path information and obtaining a verification result; and processing the first message according to the verification result. By means of the scheme provided by the invention, the effect that the messages between the user equipment and the application platform can be transmitted according to the information of the business chain path which has not been tampered can be ensured, and the problem that the message is transmitted do not through a business driver of the selected business chain or through a business driver that is not in the selected business chain is avoided; therefore, the integrality of the business chain path can be ensured even though in an open cloud environment, the message is forwarded and processed according to the set business path is ensured, and the potential security risks are avoided.

Description

technical field [0001] The invention relates to the technical field of network and information security, in particular to a verification method and a verification device for a business chain. Background technique [0002] In the prior art, in order to cope with the rapid development of data traffic, multiple service enablers, such as URL filters, video optimizers, and protocol optimizers, are often deployed between user equipment and application platforms to filter data traffic , optimization and security, and enhance user experience, reduce bandwidth pressure and provide value-added services. [0003] Among them, in the same service, multiple service enablers through which data passes form a service chain. The current service chain, including the service chain composed of static service enablers and the service chain composed of dynamic and programmable service function SF instances (also called service enablers), is often tampered by attackers The business chain rule, th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0807
Inventor 庄小君左敏
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products