Unlock instant, AI-driven research and patent intelligence for your innovation.

Secure data transmission method and device for Zhirong identification network

A technology for identifying network and security data, which is applied in the field of computer network communication, can solve the problems of being unable to dynamically update and effectively guarantee the security of Zhirong identification network, and achieve the effect of preventing replay attacks and high security

Active Publication Date: 2020-07-14
BEIJING JIAOTONG UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the obfuscation and encryption methods of data packets in the existing Internet are mostly static, which cannot be updated dynamically, and cannot effectively guarantee the security of Zhirong identification network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure data transmission method and device for Zhirong identification network
  • Secure data transmission method and device for Zhirong identification network
  • Secure data transmission method and device for Zhirong identification network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] The actual sending and receiving process is a duplex process. In order to express clearly, the sending end A and receiving end B described below are only a single sending and receiving description. figure 1 It is a schematic diagram of the implementation principle of the secure data transmission method of the Zhirong identification network described in the embodiment of the present invention, figure 2 It is a schematic diagram of the processing flow of a secure data transmission method for a smart identification network provided by an embodiment of the present invention, including the following steps.

[0053] Step S210: When the receiving party receives the data packet from the sender, by analyzing the data packet, the obfuscation encryption mode flag and update flag in the data packet are obtained, and the obfuscation encryption mode of the data packet is judged according to the obfuscation encryption mode flag;

[0054] Step S220: Query the encryption rule database ...

Embodiment 2

[0089] Figure 7 It is a schematic diagram of an application scenario of an obfuscated transmission method for a smart identification network provided by an embodiment of the present invention, as shown in Figure 7 As shown, A and B are users, C and D are confusing transmission devices, and W1, W2 and W3 are transmission links. Using a multi-path transmission mechanism, if the multi-path transmission mechanism is directly applied to a heterogeneous and asymmetric network environment, serious out-of-order and cache blocking phenomena will occur. The state-based obfuscated transmission device stores route selection information and labels in the obfuscated encryption policy database, and can change the transmission path in real time according to the network status. While alleviating network congestion, it can also effectively improve user experience quality. In the Zhirong network environment, it is necessary to ensure the real-time and security of user communication. In order ...

Embodiment 3

[0091] This embodiment describes the application description of the obfuscated transmission device in the policy update phase. First of all, two sources are provided for the generation of obfuscation and forwarding strategies: when the device is initialized, the basic permutation matrix and round-robin routing strategy are provided in the obfuscation encryption strategy database. In addition, the device supports user-defined obfuscation encryption strategies. The device provides An obfuscated encrypted policy database that stores user-defined policies. Two methods are also provided for importing the user obfuscation encryption policy database: online import by the controller and manual import by the user. Afterwards, when the user initiates a communication request for the first time, the device will judge whether this communication is the first communication, if so, first exchange the user obfuscation encryption strategy database information of both parties, find the intersect...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a secure data transmission method and device for an intelligent identification network. When the receiver receives the data packet from the sender, it parses the encryption mode flag and judges the encryption method; queries the decryption algorithm in the encryption rule database according to the encryption mode flag, decrypts the data, checks whether the update flag reaches the threshold, and if it reaches the threshold Use the receiver's system time and the value calculated by the timestamp in the data packet as a seed to select a new encryption method, and return the encryption method to the sender; after receiving the new encryption method, the sender encrypts the data with the new encryption method and sends . The obfuscation encryption strategy in the present invention supports user definition and can be continuously changed, and has higher security; based on the time stamp, replay attacks can be prevented; the time difference between the sending and receiving parties is used as the seed value of the selection algorithm, and the sending and receiving parties do not need to be synchronized.

Description

technical field [0001] The present invention relates to the technical field of computer network communication, in particular to a secure data transmission method and device for an intelligent identification network. Background technique [0002] The Zhirong identification network system dynamically perceives the network status and intelligently matches service requirements, and then selects reasonable network groups and their internal components to provide intelligent services. At the same time, through the introduction of mechanisms such as behavior matching, behavior clustering, and network complex behavior game decision-making, dynamic adaptation and collaborative scheduling of resources are realized, which greatly improves the utilization rate of network resources, reduces network energy consumption, and significantly improves user experience. The security of Zhirong identification network is particularly important. [0003] At present, the security of most security obf...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/045H04L63/1441H04L63/205
Inventor 权伟张宏科刘明远石金玉刘刚于成晓秦媛媛覃帅
Owner BEIJING JIAOTONG UNIV