Secure data transmission method and device for Zhirong identification network
A technology for identifying network and security data, which is applied in the field of computer network communication, can solve the problems of being unable to dynamically update and effectively guarantee the security of Zhirong identification network, and achieve the effect of preventing replay attacks and high security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0052] The actual sending and receiving process is a duplex process. In order to express clearly, the sending end A and receiving end B described below are only a single sending and receiving description. figure 1 It is a schematic diagram of the implementation principle of the secure data transmission method of the Zhirong identification network described in the embodiment of the present invention, figure 2 It is a schematic diagram of the processing flow of a secure data transmission method for a smart identification network provided by an embodiment of the present invention, including the following steps.
[0053] Step S210: When the receiving party receives the data packet from the sender, by analyzing the data packet, the obfuscation encryption mode flag and update flag in the data packet are obtained, and the obfuscation encryption mode of the data packet is judged according to the obfuscation encryption mode flag;
[0054] Step S220: Query the encryption rule database ...
Embodiment 2
[0089] Figure 7 It is a schematic diagram of an application scenario of an obfuscated transmission method for a smart identification network provided by an embodiment of the present invention, as shown in Figure 7 As shown, A and B are users, C and D are confusing transmission devices, and W1, W2 and W3 are transmission links. Using a multi-path transmission mechanism, if the multi-path transmission mechanism is directly applied to a heterogeneous and asymmetric network environment, serious out-of-order and cache blocking phenomena will occur. The state-based obfuscated transmission device stores route selection information and labels in the obfuscated encryption policy database, and can change the transmission path in real time according to the network status. While alleviating network congestion, it can also effectively improve user experience quality. In the Zhirong network environment, it is necessary to ensure the real-time and security of user communication. In order ...
Embodiment 3
[0091] This embodiment describes the application description of the obfuscated transmission device in the policy update phase. First of all, two sources are provided for the generation of obfuscation and forwarding strategies: when the device is initialized, the basic permutation matrix and round-robin routing strategy are provided in the obfuscation encryption strategy database. In addition, the device supports user-defined obfuscation encryption strategies. The device provides An obfuscated encrypted policy database that stores user-defined policies. Two methods are also provided for importing the user obfuscation encryption policy database: online import by the controller and manual import by the user. Afterwards, when the user initiates a communication request for the first time, the device will judge whether this communication is the first communication, if so, first exchange the user obfuscation encryption strategy database information of both parties, find the intersect...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


