Unlock instant, AI-driven research and patent intelligence for your innovation.

Policy-based data transmission authentication method

A data transmission and authentication method technology, applied in the field of data transmission, can solve the problems of ineffective identification of equipment and counterfeiting of information attackers, and achieve the effects of reducing the risk of equipment being counterfeited, enhancing security, and strengthening control

Pending Publication Date: 2022-03-29
XUCHANG XJ SOFTWARE TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The strategy in the current isolation device only has pure address information, such as protocol, source MAC, source IP, source port, destination IP, and destination port. methods and isolators are not effective in identifying these counterfeit devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Policy-based data transmission authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in combination with specific embodiments and with reference to the accompanying drawings. It should be understood that these descriptions are exemplary only, and are not intended to limit the scope of the present invention. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concept of the present invention.

[0030] In a specific embodiment, the present invention provides a policy-based data transmission authentication method, and the method of the present invention is applicable to security isolation devices for communication control at two network boundaries.

[0031] Specifically, in the method of the present invention, an authentication module is respectively added to the transmission equipment and the isolation device, an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A strategy-based data transmission authentication method comprises the following steps: step S100, collecting a secret key required by authentication and a fingerprint of a transmission tool, and respectively storing the secret key, the fingerprint and transmission task information needing to pass through an isolation device to an authentication server and a client; step S200, the authentication server authenticates the authentication client, the transmission module and the transmission task information; and step S300, after the strategy control module receives the transmission message, detecting the strategy state corresponding to the message, if the message is valid, forwarding the message, and if the message is invalid, discarding the message. According to the invention, by adding a pair of authentication modules, three-level authentication of an authentication client, a transmission tool and a transmission task is realized, control of a data transmission link and a tool which accord with a strategy is enhanced, passing is allowed only after the authenticated strategy is passed, and network attack behaviors performed by counterfeit equipment information can be effectively resisted.

Description

technical field [0001] The invention relates to the technical field of data transmission, in particular to a policy-based data transmission authentication method. Background technique [0002] The security isolation device is a core device applied to network border protection. It presets the policy of allowing passage, and extracts the address information from the network port packets in real time and compares them with the preset policies. The packets that meet the policies Then the extracted application data is ferried through the isolation card, and those that do not meet the policy are discarded. Identity spoofing is a typical attack on the network. It engages in illegal activities by spoofing the address information of legitimate devices. The strategy in the current isolation device only has pure address information, such as protocol, source MAC, source IP, source port, destination IP, and destination port. Methods and isolators are not effective in identifying these ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62G06F21/64
CPCG06F21/602G06F21/6218G06F21/64
Inventor 窦中山王旭宁罗欣郭宏燕陈豆孟新昊孙航飞付明军
Owner XUCHANG XJ SOFTWARE TECH