Message chain terminal protocol stack construction method, message chain terminal protocol stack analysis method, message chain terminal protocol stack analysis device and message chain terminal protocol stack terminal

A terminal protocol, message chain technology, applied in the computer field, can solve problems such as low efficiency and lack of endogenous security mechanisms

Pending Publication Date: 2022-03-01
BEIJING INFORMATION SCI & TECH UNIV
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The traditional TCP / IP network transmission mode lacks a built-in security mechanism. Generally, additional security enhancement technologies such as IPSec are used to solve network layer security problems. However, IPSec needs to perform packet-by-packet signature and authentication on transmitted packets, which has low efficiency. The chain network transmission model solves this kind of problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Message chain terminal protocol stack construction method, message chain terminal protocol stack analysis method, message chain terminal protocol stack analysis device and message chain terminal protocol stack terminal
  • Message chain terminal protocol stack construction method, message chain terminal protocol stack analysis method, message chain terminal protocol stack analysis device and message chain terminal protocol stack terminal
  • Message chain terminal protocol stack construction method, message chain terminal protocol stack analysis method, message chain terminal protocol stack analysis device and message chain terminal protocol stack terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0043] figure 1 A flowchart showing a method for constructing a message chain terminal protocol stack provided by an embodiment of the present invention, figure 2 The flow chart of the message chain terminal protocol stack construction method provided by the embodiment of the present invention, combined with figure 1 and figure 2 , the message chain terminal protocol stack construction method provided by the embodiment of the p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a message chain terminal protocol stack construction method, a message chain terminal protocol stack analysis method, a message chain terminal protocol stack analysis device and a terminal.The construction method comprises the steps that a preset format of a message header of a message is obtained, and the preset format of an internet layer message header at least comprises a source SUI, a target SUI, a message chain newest node value and a serial number, or a source SEI, a target SEI, a message chain newest node value and a serial number; the method comprises the following steps: calculating a message chain latest node value corresponding to a current transmission message by using a message chain construction method, packaging the message chain latest node value and a corresponding serial number in an internet layer protocol data packet, and constructing an internet layer message; and the latest node value of the message chain and the serial number are compared and verified to ensure that the transmitted message sequence has the functions of packet loss retransmission and chain type synchronization.

Description

technical field [0001] The present invention relates to the field of computers, in particular to a method for constructing a message chain terminal protocol stack, an analysis method, a device and a terminal. Background technique [0002] The message chain is a security method for network data transmission proposed by the research team of Professor Jiang Wenbao of Beijing Information Science and Technology University. It follows the network transmission mode of the message chain protocol standard and becomes a chain network transmission mode. The traditional TCP / IP network transmission mode lacks a built-in security mechanism. Generally, additional security enhancement technologies such as IPSec are used to solve network layer security problems. However, IPSec needs to perform packet-by-packet signature and authentication on transmitted packets, which has low efficiency. The chain network transmission model solves this kind of problem. [0003] In order to support the chain...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L69/22H04L69/325
CPCH04L69/22H04L69/325
Inventor 韩明轩蒋文保
Owner BEIJING INFORMATION SCI & TECH UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products