A security reinforcement method for transmitting key information in a packet transport network

A packet transmission network, a key transmission technology, applied in the field of communication, can solve the problems of increasing the difficulty of information interception and hidden dangers of leaking secrets, and achieve the effects of reducing the possibility of being deciphered, smooth upgrading, and easy implementation

Active Publication Date: 2021-01-05
中国电子科技集団公司第三十四研究所
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to overcome the hidden danger of leaking secrets existing in the process of transmitting the key information of important users in the existing MPLS-TP-based packet transport network PTN, and to design a security reinforcement method for transmitting key information in the packet transport network. The means of security and confidentiality include interleaving, interleaving and encryption technology at the logical level to recombine the data packets before sending them, as well as adopting different transmission paths for sending and receiving at the physical level, which increases the difficulty of information interception and improves the reliability of transmitting key information based on the PTN network. Security and Confidentiality

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security reinforcement method for transmitting key information in a packet transport network
  • A security reinforcement method for transmitting key information in a packet transport network
  • A security reinforcement method for transmitting key information in a packet transport network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention will be described in detail below in conjunction with the accompanying drawings and embodiments.

[0036] The flow of this embodiment of the security hardening method for transmitting key information in the packet transport network is as follows figure 1 As shown, the main steps are as follows:

[0037] Step 1. Determine the transmission path for sending and receiving information

[0038] When the MPLS-TP-based packet transport network PTN network node transmits key information, the sending node initiates a request for key information transmission, and the sending node and the receiving node respectively determine their respective sending direction and receiving direction network path, and the sending direction and The network paths in the receiving direction are different.

[0039] According to the calculation of the equivalent cost multi-path (ECMP) between the two, the set of available routes for information transmission between the sending no...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention is a security strengthening method for transmitting key information in a packet transmission network, and the steps are as follows: 1. Determine different transmission paths for sending and receiving directions of information; 2. The receiving node agrees on key information data interleaving, interleaving and encryption methods; 3. Data Encapsulate to form N data packets and interleave to form n new data packets; 4. The sending and receiving nodes establish network connections; 5. Add MPLS labels and sequence numbers to new data packets; 6. Interleaving and encryption processing; 7. Sending nodes follow the sending direction The path transmits the processed data packet; 8. The receiving node decrypts, deinterleaves, deinterleaves and restores the key information data packet. The data interleaving of the present invention makes a data packet no longer contain complete data segments in an orderly manner, disrupting the information contained in each data packet; even if the transmission link is intercepted by wiretapping data packets, it will not cause data leakage; The physical paths in the sending and receiving directions are different, which effectively enhances the security and confidentiality of key information transmitted over the packet transport network.

Description

technical field [0001] The invention relates to the field of communication, in particular to a safety reinforcement method for transmitting key information in a packet transmission network suitable for MPLS-TP. Background technique [0002] MPLS is Multi-Protocol Label Switching, which is the abbreviation of English Multi-Protocol Label Switching, and TP is the transmission protocol, which is the abbreviation of English Transport Profile. Packet transport network based on MPLS-TP technology, that is, PTN (Packet Transport Network) network is the current mainstream technology adapting to IP-based communication services and packet-based networks. IETF / ITU-T is responsible for the formulation of relevant standards. MPLS-TP technology simplifies and transforms Multi-Protocol Label Switching and Pseudowire (MPLS / PW) technologies, and introduces concepts such as transport network layering, OAM, and linear protection to meet the needs of transport networks. As a connection-oriente...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/707H04L12/723H04L29/06H04L45/24H04L45/50
CPCH04L45/24H04L45/50H04L63/0428
Inventor 丁明吉
Owner 中国电子科技集団公司第三十四研究所
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products