Routing protocol reinforcement method based on trusted cryptographic card
A routing protocol and password card technology, applied in the field of routing protocol reinforcement, can solve problems such as increasing network maintenance costs and complex methods, and achieve the effects of avoiding the risk of key theft, preventing theft and tampering, and resisting replay attacks.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0047] The invention proposes that the routing equipment in the communication network integrates a trusted cipher card, uses the trusted cipher card as a built-in trusted root, and combines services such as trusted measurement, safe storage, integrity verification, and data encryption and decryption provided by the trusted cipher module to realize End-to-end entity identity authentication and secure transmission and control of protocol messages between routing devices, realizing functions such as routing protocol data source verification, anti-replay, protocol data integrity verification, and confidentiality protection. Network nodes dynamically maintain the reliability of neighbors. Reliability, relying on the credible recognition rate to dynamically adjust routing to ensure high security and high reliability of the entire communication network. The network diagram is asfigure 1 shown.
[0048] The function realization of the trusted cryptographic card is composed of two part...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com