Method for verifying legal terminal information extension sequence

A technology of information expansion and verification method, which is applied to electrical components, transmission systems, etc., can solve the problems of poor anti-replay attack capability and low authentication efficiency, and achieve the effects of improving survivability, improving resolution accuracy, and reducing correlation

Inactive Publication Date: 2020-10-16
CHINA UNIV OF PETROLEUM (EAST CHINA)
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing terminal information expansion sequence generation algorithm has a strong correlation between the terminal information expansion sequences, and has poor anti-replay attack ability and low authentication efficiency.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for verifying legal terminal information extension sequence
  • Method for verifying legal terminal information extension sequence

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] In order to make the purpose, technology and advantages of the present invention clearer, the present invention will be further described in detail and completely below in conjunction with the accompanying drawings.

[0018] Step (1): The client adopts the anti-replay attack algorithm, and uses the timestamp to generate the terminal information SrcIP.

[0019] In the step (1), using the time stamp to generate the terminal information SrcIP, it is necessary to select a pseudo-random number seed according to the time stamp, so that the generated SrcIP is both time-sensitive and dynamic.

[0020] Step (2): Use the communication content Msg or legal identity authentication information IDMsg to generate the terminal information DstPort through the terminal information expansion algorithm, then perform port discretization on DstPort and determine the other terminal information DstIP through the DstIP selection algorithm.

[0021] In the step (2), the DstPort is discretized an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for verifying a legal terminal information extension sequence, which comprises the following steps of: generating terminal information SrcIP used by a socket data packet by using a timestamp by adopting a replay attack resistance algorithm at a client, and improving the replay attack resistance of the terminal information extension sequence due to the timeliness of the terminal information. The objective of the invention is to improve the viability of a single end information extension data packet in a complex network environment, port discretization is carried out on the end information DstPort, the other end information DstIP is determined through the DstIP selection algorithm, and a receiver only needs to verify the correctness of the DstPort and the DstIP, so that verification of the legal end information extension data packet can be completed. According to the invention, the verification efficiency of the legal end information extension sequence and the capability of filtering invalid data packets are improved, so that the end information extension sequence can better adapt to a complex network environment.

Description

technical field [0001] The invention relates to a method for verifying the extended sequence of legal end information, which aims at realizing the identification and verification of the extended sequence of legal end information in a complex network environment, and belongs to the technical field of network security. Background technique [0002] A network socket (socket) is an interface used to access the underlying network protocol, and is the cornerstone of communication between two different host processes in the network, located between the application layer and the transport layer. The data packet generated by the socket includes source address, source port number, destination address, destination port number, and communication protocol, etc., where the address and port number are used to identify specific services on specific hosts in the network. In the process of using the socket, the communication parties are divided into the server and the client. The server write...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/12H04L63/1466H04L63/168H04L69/162
Inventor 石乐义段鹏飞兰茹徐兴华王夕冉赵东东马荣刘祎豪
Owner CHINA UNIV OF PETROLEUM (EAST CHINA)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products