Security reinforcement method for transporting key information in packet transport network

A packet transmission network, a key transmission technology, applied in the field of communication, can solve the hidden dangers of leaking secrets, increase the difficulty of information interception, etc., achieve smooth upgrades, reduce the possibility of being deciphered, and achieve the effect of small changes

Active Publication Date: 2017-09-05
NO 34 RES INST OF CHINA ELECTRONICS TECH GRP
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to overcome the hidden danger of leaking secrets existing in the process of transmitting the key information of important users in the existing MPLS-TP-based packet transport network PTN, and to design a security reinforcement method for transmitting key information in the packet transport network. The means of security and confidentiality include interleaving, interleaving and encryption technology at the logical level to recombine the data packets before sending them, as well as adopting different transmission paths for sending and receiving at the physical level, which increases the difficulty of information interception and improves the reliability of transmitting key information based on the PTN network. Security and Confidentiality

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security reinforcement method for transporting key information in packet transport network
  • Security reinforcement method for transporting key information in packet transport network
  • Security reinforcement method for transporting key information in packet transport network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention will be described in detail below in conjunction with the accompanying drawings and embodiments.

[0036] The flow of this embodiment of the security hardening method for transmitting key information in the packet transport network is as follows figure 1 As shown, the main steps are as follows:

[0037] Step 1. Determine the transmission path for sending and receiving information

[0038] When the MPLS-TP-based packet transport network PTN network node transmits key information, the sending node initiates a request for key information transmission, and the sending node and the receiving node respectively determine their respective sending direction and receiving direction network path, and the sending direction and The network paths in the receiving direction are different.

[0039] According to the calculation of the equivalent cost multi-path (ECMP) between the two, the set of available routes for information transmission between the sending no...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security reinforcement method for transporting key information in a packet transport network. The method comprises the following steps of 1, determining different transporting paths in information sending and receiving directions; 2, appointing key information interleaving, interweaving and encryption modes by receiving nodes; 3, packaging data to form N data packets and carrying out interleaving to form n new data packets; 4, establishing network connection by sending and receiving nodes; 5, adding MPLS (Multi-Protocol Label Switching) labels and sequence numbers to new data packets; 6, carrying out interweaving and encryption; 7, transporting processed data packets by the sending nodes according to the path of the sending direction; and 8, carrying out decryption, de-interleaving and de-interleaving by the receiving node, thereby restoring the key information data packets. According to the method, through data interleaving, one data packet no longer orderly contains complete data segments and the information contained in the data packets are disordered, even if a transmission link is eavesdropped and the data packets are intercepted, the data is not leaked; and the physical paths of the sending and receiving directions are different, so the security and confidentiality of transmitting the key information in the packet transport network are effectively reinforced.

Description

technical field [0001] The invention relates to the field of communication, in particular to a safety reinforcement method for transmitting key information in a packet transmission network suitable for MPLS-TP. Background technique [0002] MPLS is Multi-Protocol Label Switching, which is the abbreviation of English Multi-Protocol Label Switching, and TP is the transmission protocol, which is the abbreviation of English Transport Profile. Packet transport network based on MPLS-TP technology, that is, PTN (Packet Transport Network) network is the current mainstream technology adapting to IP-based communication services and packet-based networks. IETF / ITU-T is responsible for the formulation of relevant standards. MPLS-TP technology simplifies and transforms Multi-Protocol Label Switching and Pseudowire (MPLS / PW) technologies, and introduces concepts such as transport network layering, OAM, and linear protection to meet the needs of transport networks. As a connection-oriente...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/707H04L12/723H04L29/06H04L45/24H04L45/50
CPCH04L45/24H04L45/50H04L63/0428
Inventor 丁明吉
Owner NO 34 RES INST OF CHINA ELECTRONICS TECH GRP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products