Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

80 results about "Anti-replay" patented technology

Anti-replay is a sub-protocol of IPsec that is part of Internet Engineering Task Force (IETF). The main goal of anti-replay is to avoid hackers injecting or making changes in packets that travel from a source to a destination. Anti-replay protocol uses a unidirectional security association in order to establish a secure connection between two nodes in the network. Once a secure connection is established, the anti-replay protocol uses packet sequence numbers to defeat replay attacks as follows: When the source sends a message, it adds a sequence number to its packet; the sequence number starts at 0 and is incremented by 1 for each subsequent packet. The destination maintains a 'sliding window' record of the sequence numbers of validated received packets; it rejects all packets which have a sequence number which is lower than the lowest in the sliding window (i.e. too old) or already appears in the sliding window (i.e. duplicates/replays). Accepted packets, once validated, update the sliding window (displacing the lowest sequence number out of the window if it was already full).

Anti-replay-attack system for industrial wireless network

The invention provides an anti-replay-attack system for an industrial wireless network, which introduces a third-party detection mechanism in order to reduce system resource consumption. The industrial wireless network comprises a gateway, a router, field equipment and network security manager. The anti-replay-attack system for the industrial wireless network comprises a third-party detection module used for detecting whether intrusion data packets and replay attack data packets exist in the industrial wireless network or not and sending detection results to the network security manager, and the network security manager compares the system resource consumption caused by replay attacks with resource consumption brought by using an anti-replay-attack means to determine whether the anti-replay-attack means is used, thereby effectively preventing the anti-replay-attack means from bringing more system resource consumption than the replay attacks, and two time stamps of creation time and sending time are added in the data packet by a sender, so that the certainty and uniqueness of messages can be ensured; a receiver detection mechanism is adopted, and the data packets of the replay attacks are judged and discarded by a receiver so as to solve the problems of ID authentication and the like.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

Anti-tamper and anti-replay method in support of REST API

InactiveCN107453878ASolve malicious tampering request parametersSolve the problem of using the stolen API to perform replay attacksKey distribution for secure communicationUser identity/authority verificationTimestampAnti-replay
The invention discloses an anti-tamper and anti-replay method in support of REST API. The method includes the following steps: 1. an API invocation end applying access authority and secret key for performing signing to an API server; 2. the API invocation end generating invocation timestamp and random number, ranking request parameters in a lexicographic order, in combination with system request headers, performing signing with the applied secret key; 3. the server detecting the identity of the API invocation person, determining whether the API invocation person has invocation authority; 4. the server using the same secret key to sign request parameters and system request headers in accordance with same rules, comparing whether the signatures are the same, and preventing the parameters from being tampered; 5. the server determining the API invocation timestamp, and determining timeout; and 6. the server re-determining random number. According to the invention, the API invocation person only needs to strictly save the secret key, and attacker does not need to forge the signature and the parameters in the request process are unable to be tampered, thus achieving safe access to API.
Owner:SICHUAN CHANGHONG ELECTRIC CO LTD

Multi-case dynamic remote certification method based on TPM

The invention discloses a TPM-based multi-instance dynamic remote attestation method which belongs to the field of information security technology. The method comprises the steps as follows: a) an RAI instance is started: the TPM measures the RAI instance and issues an initial attestation certificate for the RAI instance; the remote relying party of the RAI instance obtains and authenticates the initial attestation certificate, if the authentication is passed, the link between the RAI instance and the remote relying party of the RAI instance is established; b) if the component of the RAI instance is updated, the TPM re-measures the RAI instance and issues an updating attestation certificate; the remote relying party of the RAI instance obtains and authenticates the updating attestation certificate; if the authentication is passed, the link is maintained; and c) the step b) is repeated until the RAI instance is closed and the link is disconnected; meanwhile, all the attestation steps of a plurality of RAI instances intersperse with each other for forming a TPM attestation chain. Compared with the remote attestation methods of other trusted computing platforms, the method is characterized by the dynamic attestation of platform status, the concurrent attestations of multiple network programs, and anti-replay attack, etc.
Owner:INST OF SOFTWARE - CHINESE ACAD OF SCI

Systems and methods for distribution of selected authentication information for a network of devices

A system for facilitating distribution of authentication information for a network of devices to be authenticated is provided. The system comprises: an authentication module configured to obtain an identity-proofing confidence score, based on data about identity-proofing of a user obtained from an authentication service system, wherein the data about identity-proofing comprises a type of identity document of the user and a presentation method used for verifying the user's identity by the authentication service system; and an insurance module in communication with the authentication module, configured to generate a plurality of security levels for the user, wherein each of the plurality of security levels is generated based on the identity-proofing confidence score and a credential authentication confidence score that is (1) obtained with aid of at least one device from the network of devices, and (2) determined based on a credential to be used for a transaction and a presence of an anti-replay feature about the at least one device, wherein a display is configured to show a plurality of coverage plans associated with the plurality of security levels to the user for selection, such that the authentication service system performed credential authentication according to a selected coverage plan.
Owner:TRUSONA INC

Method of safety access of power distribution wireless terminal

InactiveCN109194656ATo achieve the purpose of anti-replay attackImprove timelinessTransmissionPrimary stationConfidentiality
The present invention discloses a method of safety access of a power distribution wireless terminal based on a domestic commercial cryptographic algorithm. The method comprises the following steps of:1) prior to interaction of a power distribution wireless terminal and safety access data, performing two-way identity authentication and key negotiation; 2) when the power distribution wireless terminal and a safety access gateway perform normal data communication, performing message filling of the original data of the communication, and employing a domestic symmetric encryption algorithm to encrypt the original data and the filled message; and 3) after the encrypted message is received, performing decryption of the ciphertext data based on the domestic symmetric encryption algorithm to checkthe decrypted original data and the filled message. The method of safety access of the power distribution wireless terminal can achieve the purpose of anti-replay attack; attackers cannot obtain symmetrical encryption keys and cannot decrypt the ciphertext transmission data so as not to perform eavesdropping or tampering of the sensitive interaction information between the power distribution wireless terminal and a master station so as to achieve confidentiality and integrity protection of the sensitive interaction information.
Owner:STATE GRID CORP OF CHINA +3
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products