IPv6 (Internet Protocol Version 6) network node identity security protecting method

A technology for security protection and ipv6 network, applied in the field of IPv6 network, can solve the problem that the identity security of IPv6 network nodes has not been effectively solved, and achieve the effect of protecting privacy and network security and high security

Active Publication Date: 2019-02-15
ANHUI QASKY QUANTUM SCI & TECH CO LTD
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] It can be seen that the identity security of IPv6 network nodes has not been effectively resolved, and the privacy of next-generation network nodes and users is facing severe challenges.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • IPv6 (Internet Protocol Version 6) network node identity security protecting method
  • IPv6 (Internet Protocol Version 6) network node identity security protecting method
  • IPv6 (Internet Protocol Version 6) network node identity security protecting method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The following is based on Figure 1 to Figure 4 The specific embodiment of the present invention is further described:

[0040] figure 1 It is an IPv6 network unicast IP address structure. The IP address has 128 bits, the first 64 bits are the subnet prefix, which will change when accessing different subnets; the last 64 bits are the interface identifier, generally according to the physical address of the node device generate.

[0041]In view of the identity concealment requirement of the unicast IP address of the network node, this embodiment uses the combined operation of MAC+PIN+KEY to generate the last 64 bits of the unicast address (where KEY is the random number below), on the premise of strictly ensuring the identity information of the node Under normal circumstances, it does not affect normal data communication, and it also allows regulatory authorities to identify nodes with authorization.

[0042] see figure 2 , figure 2 Represents a node network connec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an IPv6 (Internet Protocol Version 6) network node identity security protecting method, which comprises the following steps: injecting a group of keys K1 into an initial network entry router of a node A and the node A, and storing, by the node A, a unicast IP address of the initial network entry router; acquiring, by the node A, a temporary sub-net IP address; sending, by the node A, an Internet access request message to a sub-net I router by using the temporary sub-net IP address; acquiring, by the sub-net I router, the key K1 of the initial network entry router; encrypting, by the sub-net I router, a unique PIN code of the sub-net I router and a random number by adopting the key K1, and feeding back to the node A; and decrypting, by the node A, the encrypted cyphertext X by adopting the key K1, and calculating the decrypted correct PIN code, the random number and an MAC (Multi-Access Control) address of the node A to acquire an interface identifier of a globalunicast IP address. According to the IPv6 network node identity security protecting method, the latter 64-bit address of the IPv6 unicast address of the node is obtained by security application and combined calculation, and the identity of an IPv6 network node is effectively hidden.

Description

technical field [0001] The invention relates to the field of IPv6 network technology, in particular to a method for protecting the identity security of IPv6 network nodes. Background technique [0002] With the implementation of the IPv6 development plan and the rapid expansion of the mobile Internet and the Internet of Things, the network environment is undergoing earth-shaking changes. At present, many countries have begun to set up IPv6 root servers, and IPv6 dual-stack transformation and IPv6 wireless networks have been gradually implemented. The mainstream Internet applications already support IPv6 access, user access traffic is increasing rapidly, and the number of new types of node devices connected to the network is growing explosively. More and more information in the real world will be transmitted in the virtual network, but the IPv6 protocol The IP address in the network is fixed and public, and the personal behavior and private information of user nodes are comp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0407H04L63/0876
Inventor 王俊向宏苗春华韩正甫丁东平尹凯王剑宋星星陈红艳金丽束杨宇
Owner ANHUI QASKY QUANTUM SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products