Unlock instant, AI-driven research and patent intelligence for your innovation.

Port hiding method, device and equipment mixed with authentication signal

An authentication and port technology, which is applied in the hidden field of ports mixed with authentication signals, can solve the problems of no active defense capabilities, and achieve the effect of eliminating man-in-the-middle attacks and eavesdropping

Active Publication Date: 2021-08-13
北京天维信通科技股份有限公司
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] For communication between servers, since all trusted IP addresses are known and maintainable, it is very convenient and reliable to use black and white lists as a means of protection, but for those servers that provide services to the Internet, the number of IP addresses is huge And dynamic, the traditional black and white list method can only be used as a means of "remedial action" after being attacked, and has no active defense capability at all

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Port hiding method, device and equipment mixed with authentication signal
  • Port hiding method, device and equipment mixed with authentication signal
  • Port hiding method, device and equipment mixed with authentication signal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] Various exemplary embodiments, features, and aspects of the present disclosure will be described in detail below with reference to the accompanying drawings. The same reference numbers in the figures indicate functionally identical or similar elements. While various aspects of the embodiments are shown in drawings, the drawings are not necessarily drawn to scale unless specifically indicated.

[0057] In addition, the terms "first" and "second" are used for descriptive purposes only, and cannot be interpreted as indicating or implying relative importance or implicitly specifying the quantity of indicated technical features. Thus, a feature defined as "first" and "second" may explicitly or implicitly include one or more of these features. In the description of the present invention, "plurality" means two or more, unless otherwise specifically defined.

[0058] The word "exemplary" is used exclusively herein to mean "serving as an example, embodiment, or illustration." ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses a method, device and device for hiding a port mixed with an authentication signal. The method for hiding a port mixed with an authentication signal includes receiving an authentication data packet sent by a client, obtaining authentication information through the authentication data packet, and The authentication information is sent to the client, waiting to receive the feedback message returned by the client. After receiving the feedback message, it authenticates with the client according to the feedback message, and returns a port closing message to the client when the authentication fails. The port hiding method mixed with authentication signals of the present disclosure can be implemented directly on the exposed transport layer without any tunnel or TLS, and there is no conflict with existing network protocols, service protocols, service codes and configurations. Packet capabilities, targeted malicious attackers, completely eliminate the possibility of eavesdropping on the authentication process itself and man-in-the-middle attacks.

Description

technical field [0001] The present disclosure relates to the technical field of network security, and in particular to a port hiding method, device and equipment mixed with authentication signals. Background technique [0002] The UDP protocol is a transport layer protocol with the same name as the TCP protocol. Due to its lightweight and convenient features, it is used in many fields, from the traditional IPSec, DNS and other protocols to the latest QUIC protocol and various video protocols. Do not open UDP figure. [0003] And because of its convenience, the port scanning for UDP is more convenient and more harmful than the scanning logic for TCP. For servers, blocking access and scanning from untrusted IP address sources through black and white lists has become a mainstream protection method. [0004] For communication between servers, since all trusted IP addresses are known and maintainable, it is very convenient and reliable to use black and white lists as a means of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/08H04L63/1441
Inventor 张新陈睿彧胡嘉祺杨谦谦
Owner 北京天维信通科技股份有限公司