Resource conflict detection method of resource public key infrastructure based on block chain

A public key infrastructure and resource conflict technology, applied in the field of resource public key infrastructure resource conflict detection, can solve the problems of not considering the comprehensive scheme of CA resource anomaly detection and low detection efficiency, so as to improve its own security and ensure correctness sexual effect

Active Publication Date: 2021-05-28
GUANGZHOU UNIVERSITY
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this method has the advantages of two-way authorization and preventing single point of failure, it is more suitable for the management of Internet resource certificates than the previous two methods. It is the latest technical solution in the field of Internet routing and communication. However, the main disadvantage of this method is Using a one-by-one traversal method, each resource that has been issued and the resource certificate resource to be verified are checked for resource duplication, resource coverage, and resource crossover. The detection efficiency is low; the second is that this method mainly detects RC resource conflicts. Detect ROA resource conflicts; third, this method completely relies on the verification contract deployed on the blockchain, and does not consider a comprehensive solution that combines CA resource anomaly detection with blockchain smart contracts or blockchain chain codes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Resource conflict detection method of resource public key infrastructure based on block chain
  • Resource conflict detection method of resource public key infrastructure based on block chain
  • Resource conflict detection method of resource public key infrastructure based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0083] Such as Figure 4 Shown, the present invention comprises the following steps:

[0084] The first step is to build a blockchain-based resource public key infrastructure system RPKIB, such as figure 1 As shown, RPKIB is composed of a resource issuer, a resource transaction application client, a resource receiver, and a blockchain network.

[0085] The resource issuer and resource receiver are connected to the blockchain network, and the resource transaction application client is installed on the resource issuer or resource receiver. The resource transaction application client performs various operations of the resource certificate and the routing origin authorization ROA as transactions through the blockchain network, and saves the transaction records in the distributed ledger. Distributed ledgers exist in all blockchain nodes.

[0086] Resource Issuer The resource issuer is connected to the blockchain network as a client of the blockchain network.

[0087] A resourc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a resource conflict detection method of a resource public key infrastructure based on a block chain, and aims to improve the detection efficiency of resource conflicts in a resource certificate issuing process. According to the technical scheme, a block chain-based resource public key infrastructure system composed of a resource issuer, a resource transaction application client, a resource receiver and a block chain network is constructed, wherein the resource transaction application client is composed of a resource transaction module, a resource certificate generation module and a display module; a resource transaction structure and a resource tree are constructed; a resource certificate generation module of the resource issuer issues the RC, and performs conflict check on RC resources; the smart contract or chain code of the block chain performs resource conflict check on the RC issuing transaction; a resource certificate generation module of the resource issuer issues ROA, and performs resource conflict check on ROA resources; and the intelligent contract or the chain code performs resource conflict check on the ROA issuing transaction. According to the invention, the self-security of the resource certificate system can be improved, and the detection efficiency is high.

Description

technical field [0001] The invention belongs to the field of network information security, and in particular relates to a method for detecting resource public key infrastructure resource conflicts based on block chains to improve the security of RPKI (Resource Public Key Infrastructure, namely resource public key infrastructure). Background technique [0002] BGP (Border Gateway Protocol, Border Gateway Protocol) is an inter-domain routing protocol in the Internet. However, the traditional BGP protocol is vulnerable to many security threats, and one of the most common BGP attacks is prefix hijacking. By forging the origin AS (Autonomous system, that is, autonomous system, origin AS, that is, the AS that initiated the route advertisement information) in the BGP route advertisement information, the traffic corresponding to these IP address prefixes is intercepted or discarded by the hijacker's AS. Resource Public Key Infrastructure (RPKI) is an infrastructure used to support ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G06Q40/04
CPCH04L9/3263H04L9/3268H04L9/3247G06Q40/04H04L9/50
Inventor 刘亚萍张硕方滨兴郑黄
Owner GUANGZHOU UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products