Safety network time synchronizing method and device

A time synchronization and secure network technology, applied in the field of network security, can solve problems such as attacks and reflection attacks, achieve the effects of time synchronization accuracy assurance, make up for defects and deficiencies, and improve reliability and security

Active Publication Date: 2017-11-24
电信科学技术第五研究所有限公司
View PDF4 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] 2. NTP itself has security loopholes and is easily exploited for NTP attacks
[0008] Under normal circumstances, the client sends a request packet to the server, and the server returns a response packet to the client, but the UDP protocol is connectionless, so the source IP address of the request packet sent by the client is easy to forge. When the source IP address is changed to After the victim's IP address, the response packet returned by the final server will return to the victim's IP, which forms an NTP reflection attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety network time synchronizing method and device
  • Safety network time synchronizing method and device
  • Safety network time synchronizing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] All the features disclosed in this specification, or all disclosed methods or steps in the process, except for mutually exclusive features and / or steps, can be combined in any manner.

[0055] Any feature disclosed in this specification, unless specifically stated, can be replaced by other equivalent or equivalent alternative features. That is, unless otherwise stated, each feature is just one example of a series of equivalent or similar features.

[0056] The present invention proposes a secure network time synchronization method. The method is based on key negotiation, MAC (message authentication code) verification, two-way identity authentication and other mechanisms. On the basis of standard NTP, the security authentication protocol is extended and added, and mutual trust is established. Time synchronization improves the reliability and safety of time synchronization. This method does not change the original NTP perfect algorithm system, and at the same time makes up fo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of network safety, in particular to a safety network time synchronizing method and device. The method comprises the following steps: key agreement: acquiring a session key and a message authentication code by a client side through a session key request and a message authentication code request, and establishing mutual trust between the client side and a server; and time synchronization: implementing safety time synchronization by time synchronizing data frame interaction. The client side transmits a client side key request data frame to a server side; after receiving the client side key request data frame, the server replies a server session key responding frame to the client side; after receiving the server session key responding frame, the client side examines frame formats and contents, and acquires a session key; the client side transmits a client side message authentication code request frame to the server; after receiving the client side message authentication code responding frame of the client side, the server computes a message authentication code according to a session key and message contents and replies a server message authentication code responding frame to the client side; and after receiving the server message authentication code responding frame, the client side examines the frame format and content, and acquires the message authentication code.

Description

Technical field [0001] The invention relates to the field of network security, in particular to a method and device for synchronizing safe network time. Background technique [0002] NTP (Network Time Protocol) is a standard network protocol used for time synchronization in the Internet. Its function is to synchronize the computer time in the network to Coordinated Universal Time (UTC). The design of NTP fully considers the complexity of time synchronization on the Internet. It adopts algorithms such as time filtering, time selection, and clock adjustment. It can not only correct the current time, but also continuously track changes in time, and can automatically adjust even if the network fails. It can also maintain time stability. NTP adopts a client / server architecture, supports a variety of working modes, is simple and flexible to operate, provides strict, practical, and effective mechanisms, and can adapt to Internet environments of various scales, speeds, and connection pa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04J3/06
CPCH04J3/0602H04J3/0635H04J3/0641H04J3/0658
Inventor 王广才刘欢张骏杨楚鹰军王茂凌
Owner 电信科学技术第五研究所有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products