A resource conflict detection method based on blockchain-based resource public key infrastructure

A public key infrastructure and resource conflict technology, which is applied in the detection field of resource public key infrastructure resource conflicts, can solve the problems of low detection efficiency and failure to consider the comprehensive scheme of CA resource anomaly detection, so as to ensure correctness and improve self-security sexual effect

Active Publication Date: 2022-04-01
GUANGZHOU UNIVERSITY
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this method has the advantages of two-way authorization and preventing single point of failure, it is more suitable for the management of Internet resource certificates than the previous two methods. It is the latest technical solution in the field of Internet routing and communication. However, the main disadvantage of this method is Using a one-by-one traversal method, each resource that has been issued and the resource certificate resource to be verified are checked for resource duplication, resource coverage, and resource crossover. The detection efficiency is low; the second is that this method mainly detects RC resource conflicts. Detect ROA resource conflicts; third, this method completely relies on the verification contract deployed on the blockchain, and does not consider a comprehensive solution that combines CA resource anomaly detection with blockchain smart contracts or blockchain chain codes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A resource conflict detection method based on blockchain-based resource public key infrastructure
  • A resource conflict detection method based on blockchain-based resource public key infrastructure
  • A resource conflict detection method based on blockchain-based resource public key infrastructure

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0083] Such as Figure 4 Shown, the present invention comprises the following steps:

[0084] The first step is to build a blockchain-based resource public key infrastructure system RPKIB, such as figure 1 As shown, RPKIB is composed of a resource issuer, a resource transaction application client, a resource receiver, and a blockchain network.

[0085] The resource issuer and resource receiver are connected to the blockchain network, and the resource transaction application client is installed on the resource issuer or resource receiver. The resource transaction application client performs various operations of the resource certificate and the routing origin authorization ROA as transactions through the blockchain network, and saves the transaction records in the distributed ledger. Distributed ledgers exist in all blockchain nodes.

[0086] Resource Issuer The resource issuer is connected to the blockchain network as a client of the blockchain network.

[0087] A resourc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a resource conflict detection method based on a blockchain-based resource public key infrastructure, and aims to improve the detection efficiency of resource conflicts in the resource certificate issuance process. The technical solution is to build a blockchain-based resource public key infrastructure system consisting of a resource issuer, a resource transaction application client, a resource receiver, and a blockchain network. The resource transaction application client is generated by a resource transaction module and a resource certificate Composition of modules and display modules; construction of resource transaction structure and resource tree; resource issuer's resource certificate generation module issues RC, and checks conflicts on RC resources; blockchain smart contracts or chain codes perform resource conflict checks on transactions issued by RCs; The resource certificate generation module of the resource issuer issues ROA, and checks resource conflicts on ROA resources; smart contracts or chain codes check resource conflicts on ROA issuance transactions. The invention can improve the self-security of the resource certificate system and has high detection efficiency.

Description

technical field [0001] The invention belongs to the field of network information security, and in particular relates to a method for detecting resource public key infrastructure resource conflicts based on block chains to improve the security of RPKI (Resource Public Key Infrastructure, namely resource public key infrastructure). Background technique [0002] BGP (Border Gateway Protocol, Border Gateway Protocol) is an inter-domain routing protocol in the Internet. However, the traditional BGP protocol is vulnerable to many security threats, and one of the most common BGP attacks is prefix hijacking. By forging the origin AS (Autonomous system, that is, autonomous system, origin AS, that is, the AS that initiated the route advertisement information) in the BGP route advertisement information, the traffic corresponding to these IP address prefixes is intercepted or discarded by the hijacker's AS. Resource Public Key Infrastructure (RPKI) is an infrastructure used to support ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32G06Q40/04
CPCH04L9/3263H04L9/3268H04L9/3247G06Q40/04H04L9/50
Inventor 刘亚萍张硕方滨兴郑黄
Owner GUANGZHOU UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products