Identity legality detection method and device for host and identity detection equipment

A detection method and legality technology, applied in the field of Internet security, can solve problems such as low reliability

Active Publication Date: 2019-05-21
GLOBAL ENERGY INTERCONNECTION RES INST CO LTD +2
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Therefore, the technical problem to be solved by the present invention is to solve the problem in the prior art that the reliability of host identity legality identification with IP address or MAC address is low, and to provide a host identity based on clock skew rate Legitimacy detection method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity legality detection method and device for host and identity detection equipment
  • Identity legality detection method and device for host and identity detection equipment
  • Identity legality detection method and device for host and identity detection equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] This embodiment provides a method for detecting the legality of the identity of the host, such as figure 1shown. It should be noted that the steps shown in the flowcharts of the accompanying drawings may be performed in a computer system, such as a set of computer-executable instructions, and that although a logical order is shown in the flowcharts, in some cases, The steps shown or described may be performed in an order different than here. The process includes the following steps:

[0032] Step S100, acquiring the time offsets of the host to be detected at several moments. In this embodiment, at least two time offsets of the host to be detected need to be acquired. Specifically, the number of time offsets of the host to be detected to be acquired is represented by character n (n≥2).

[0033] In a specific example, such as figure 2 As shown, step S100 includes the following steps:

[0034] Step S110, acquire the sending time of a TCP packet received by the host t...

Embodiment 2

[0065] In this embodiment, a device for detecting the legitimacy of an identity of a host is provided, and the device is used to implement the above-mentioned embodiment 1 and its preferred implementation modes, and what has already been described will not be repeated. As used below, the term "module" may be a combination of software and / or hardware that realizes a predetermined function. Although the devices described in the following embodiments are preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.

[0066] This embodiment provides a dynamic verification code generation device, such as Figure 6 As shown, it includes: a time offset acquisition module 100 , a time offset rate calculation module 200 and a legality detection module 300 .

[0067] Among them, the time offset acquisition module 100 is used to acquire the time offset of the host to be detected at several moments; the time...

Embodiment 3

[0072] An embodiment of the present invention provides an identity detection device, such as Figure 7 As shown, the identity detection device may include: at least one processor 701 , such as a CPU (Central Processing Unit, central processing unit), at least one communication interface 703 , memory 704 , and at least one communication bus 702 . Wherein, the communication bus 702 is used to realize connection and communication between these components. Wherein, the communication interface 703 may include a display screen (Display) and a keyboard (Keyboard), and the optional communication interface 703 may also include a standard wired interface and a wireless interface. The memory 704 may be a high-speed RAM memory (Random Access Memory, volatile random access memory), or a non-volatile memory (non-volatile memory), such as at least one disk memory. Optionally, the memory 704 may also be at least one storage device located away from the aforementioned processor 701 . The app...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity legality detection method and device of a host and identity detection equipment. The identity legality detection method of the host comprises the following steps: acquiring time offsets of a to-be-detected host at a plurality of moments; Obtaining the time migration rate of the to-be-detected host according to the plurality of moments and the time migration corresponding to each moment; And detecting the identity legality of the to-be-detected host according to the time migration rate. The clock oscillation frequencies of different hosts are different. eachhost on the network has a unique one; Fixed clock offset rate, the clock offset rate of the host and the position of the host are increased; The IP address, the network topology and the measurement time are irrelevant, and certain stability is achieved, so that the identity legality of the host is detected through the clock offset rate of the host, and the problem that in the prior art, the reliability is low when the identity legality of the host is recognized through the IP address or the MAC address can be solved.

Description

technical field [0001] The invention relates to the technical field of Internet security, in particular to a host identity legality detection method, a host identity legality detection device, a host detection device and a computer-readable storage medium. Background technique [0002] With the continuous development of computer networks, the security of network equipment has been widely concerned by people. Access control technology restricts illegal users' access to key resources by allowing authorized subjects to access certain objects while refusing to provide services to unauthorized subjects, preventing damage caused by malicious users' intrusion or legitimate users' inadvertent operations , is one of the main means to ensure the security of information systems, and it is also an important way to protect the security of network resources. [0003] At present, the commonly used access control technology is the network layer access control mechanism based on IP address ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/44
Inventor 陈伟石聪聪高先周张小建蔡宇翔杨如侠费稼轩陈磊章锐黄秀丽冯谷高鹏范杰郭骞王齐沈文王向群于鹏飞姚启桂俞庚申潘丹上官霞
Owner GLOBAL ENERGY INTERCONNECTION RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products