Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Mapping updating authentication method among credible regions in separation mechanism networks

A technology of mapping update authentication and separation mechanism network, applied in the field of computer security, can solve problems such as failure to provide identity authentication, platform tampering virus infection, security defects, etc.

Active Publication Date: 2013-06-05
SHIJIAZHUANG TIEDAO UNIV
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this scheme is that the attacker can launch a brute force attack and find a matching signing key by trial and error
(3) The return routing test mechanism does not actually provide identity authentication, but only so-called reachability, and the service it provides to prevent message forgery is relatively fragile
Although the above solutions provide a certain degree of security, they cannot solve threats from within the network, such as platform tampering, virus infection, etc., and there are certain flaws in security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mapping updating authentication method among credible regions in separation mechanism networks
  • Mapping updating authentication method among credible regions in separation mechanism networks
  • Mapping updating authentication method among credible regions in separation mechanism networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] Such as figure 1 In the embodiment shown, the trusted inter-domain mapping update authentication model framework is as follows figure 1 shown.

[0068] In the above model, all domains have only one public AC and Privacy-CA. The access switch router ASR (Access Switch Router) is a trusted access switch router embedded with a TPM chip, the MN is a mobile terminal, and the IMS is a trusted mapping server, which is used to store the mapping relationship of terminals in the domain. In the local domain, the MN accesses the network through the ASR. The connection between the local domain and the foreign domain is realized by the General Switch Router (GSR).

[0069] AC is responsible for verifying the identities of terminals, routers, and mapping servers, and issuing passports for mapping servers. Privacy-CA is responsible for verifying the IMS platform and distributing AIK platform certificates to it.

[0070] Assume that the mobile terminal MN from the ASR 2 move to AS...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a mapping updating authentication method among credible regions in separation mechanism networks, and belongs to the technical field of computer safety. By means of credible computing technology, the mapping updating authentication method not only can verify the identity of a mapping server, but also guarantees integrity of a mapping server platform and credibility of the identity of the platform, and effectively guarantees safety during mapping updating processes. The mapping updating authentication method comprehensively utilizes dependable computing, encryption, signature and other information security technology, guarantees the integrity of the mapping server platform, the credibility of the identity of the mapping server platform, and confidentiality of a mapping relation, and can effectively prevent replay attack, forgery attack and impersonation attack.

Description

technical field [0001] The invention relates to the technical field of computer security, in particular to a trusted inter-domain mapping update authentication method in a separation mechanism network. Background technique [0002] In the separation mechanism network, when a terminal accesses the network, it must first go through the access authentication process. Only the authenticated terminal can be assigned a routing identifier, and then the mapping relationship between the access identifier and the routing identifier can be established. When the terminal switches between domains, the new access switching router will assign a new mapping relationship <AID to the MN (Mobile Node) MN , nRID MN >, in order to avoid triangular routing, it is necessary to send a mapping update message, that is, to notify the access switch router connected to the corresponding CN (Corresponding Node) of the new mapping relationship. The mapping update message needs to be sent by the ma...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 郑丽娟祁建刚胡迎新赵永斌张庆海钟谦
Owner SHIJIAZHUANG TIEDAO UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products