Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Host identity legitimacy detection method, detection device and identity detection equipment

A detection method and legal technology, applied in the field of Internet security, can solve problems such as low reliability

Active Publication Date: 2021-06-22
GLOBAL ENERGY INTERCONNECTION RES INST CO LTD +2
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Therefore, the technical problem to be solved by the present invention is to solve the problem in the prior art that the reliability of host identity legality identification with IP address or MAC address is low, and to provide a host identity based on clock skew rate Legitimacy detection method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Host identity legitimacy detection method, detection device and identity detection equipment
  • Host identity legitimacy detection method, detection device and identity detection equipment
  • Host identity legitimacy detection method, detection device and identity detection equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] This embodiment provides a method for detecting the legality of the identity of the host, such as figure 1shown. It should be noted that the steps shown in the flowcharts of the accompanying drawings may be performed in a computer system, such as a set of computer-executable instructions, and that although a logical order is shown in the flowcharts, in some cases, The steps shown or described may be performed in an order different than here. The process includes the following steps:

[0032] Step S100, acquiring the time offsets of the host to be detected at several moments. In this embodiment, at least two time offsets of the host to be detected need to be acquired. Specifically, the number of time offsets of the host to be detected to be acquired is represented by character n (n≥2).

[0033] In a specific example, such as figure 2 As shown, step S100 includes the following steps:

[0034] Step S110, acquire the sending time of a TCP packet received by the host t...

Embodiment 2

[0065] In this embodiment, a device for detecting the legitimacy of an identity of a host is provided, and the device is used to implement the above-mentioned embodiment 1 and its preferred implementation modes, and what has already been described will not be repeated. As used below, the term "module" may be a combination of software and / or hardware that realizes a predetermined function. Although the devices described in the following embodiments are preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.

[0066] This embodiment provides a dynamic verification code generation device, such as Figure 6 As shown, it includes: a time offset acquisition module 100 , a time offset rate calculation module 200 and a legality detection module 300 .

[0067] Among them, the time offset acquisition module 100 is used to acquire the time offset of the host to be detected at several moments; the time...

Embodiment 3

[0072] An embodiment of the present invention provides an identity detection device, such as Figure 7 As shown, the identity detection device may include: at least one processor 701 , such as a CPU (Central Processing Unit, central processing unit), at least one communication interface 703 , memory 704 , and at least one communication bus 702 . Wherein, the communication bus 702 is used to realize connection and communication between these components. Wherein, the communication interface 703 may include a display screen (Display) and a keyboard (Keyboard), and the optional communication interface 703 may also include a standard wired interface and a wireless interface. The memory 704 may be a high-speed RAM memory (Random Access Memory, volatile random access memory), or a non-volatile memory (non-volatile memory), such as at least one disk memory. Optionally, the memory 704 may also be at least one storage device located away from the aforementioned processor 701 . The app...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a host identity legality detection method, a detection device and an identity detection device, wherein the host identity legality detection method includes the following steps: acquiring the time offset of several moments of the host to be detected; The corresponding time offset obtains the time offset rate of the host to be detected; the identity legitimacy of the host to be detected is detected according to the time offset rate. Because the clock oscillation frequency of different hosts is different, each host on the network has a unique and fixed clock skew rate, and the clock skew rate of the host has nothing to do with the host's location, IP address, network topology and measurement time , has a certain stability. Therefore, detecting the legality of the host's identity through the clock skew rate of the host can solve the problem in the prior art that the reliability of identifying the legality of the host's identity with the IP address or MAC address is relatively low. low problem.

Description

technical field [0001] The invention relates to the technical field of Internet security, in particular to a host identity legality detection method, a host identity legality detection device, a host detection device and a computer-readable storage medium. Background technique [0002] With the continuous development of computer networks, the security of network equipment has been widely concerned by people. Access control technology restricts illegal users' access to key resources by allowing authorized subjects to access certain objects while refusing to provide services to unauthorized subjects, preventing damage caused by malicious users' intrusion or legitimate users' inadvertent operations , is one of the main means to ensure the security of information systems, and it is also an important way to protect the security of network resources. [0003] At present, the commonly used access control technology is the network layer access control mechanism based on IP address ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F21/44
Inventor 陈伟石聪聪高先周张小建蔡宇翔杨如侠费稼轩陈磊章锐黄秀丽冯谷高鹏范杰郭骞王齐沈文王向群于鹏飞姚启桂俞庚申潘丹上官霞
Owner GLOBAL ENERGY INTERCONNECTION RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products