Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication system in DSTM communication network and method using the same

A verification method and a verification system technology, applied in the field of address translation, can solve problems such as inefficiency of communication networks

Inactive Publication Date: 2007-06-20
SAMSUNG ELECTRONICS CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when it is desired to communicate in a mobile environment where the terminal is a mobile terminal or in another communication network, the authentication method requires an additional process of sharing secret information with a DHCP server, and thus is very inefficient when applied to a communication network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication system in DSTM communication network and method using the same
  • Authentication system in DSTM communication network and method using the same
  • Authentication system in DSTM communication network and method using the same

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] Hereinafter, exemplary embodiments of the present invention will be described in detail with reference to the accompanying drawings. Throughout the drawings, similar elements are indicated by like reference numerals. For matters related to the present invention and well known in the art, those matters will not be described in detail when it is considered that these descriptions would obscure the clarity and conciseness of the present disclosure. The present invention provides a verification system and method that, in response to a verification request, performs verification through a response process based on a verification message recognizable by a human, rather than an automatic mechanism of the system, to verify a dual protocol stack transition Mechanism (DSTM) node.

[0032] Figure 1 shows the process of a DSTM node obtaining an IPv4 address for communicating with an IPv4 node, and the problem of exhausting the IPv4 address pool of a DSTM server by an attacker of a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Provided are a system and method for allocating an Internet protocol version 4 (IPv4) address through authentication of a dual stack transition mechanism (DSTM) node in a DSTM communication network, DSTM being an IPv4 / IPv6 address translation mechanism. The system and method perform authentication when an IPv4 address is allocated between a DSTM node and the DSTM server in the DSTM communication network. According to the system and method, when the DSTM node requests IPv4 address allocation, the DSTM server authenticates the DSTM node, and then allocates an IPv4 address. Therefore, it is possible to solve a problem of exhaustion of an IPv4 address pool of the DSTM server by a denial of service (DoS) attack, as well as potentially solve a security problem of an IPv4 / IPv6 translation process.

Description

technical field [0001] The present invention relates to the address translation technology of Internet Protocol (IP) version 4 (IPv4) and IP version 6 (IPv6), more particularly, relates to a kind of system and method, be used in DSTM node and DSTM server in DSTM communication network To authenticate the Dual Stack Transition Mechanism (DSTM) nodes when allocating IPv4 addresses between them. Background technique [0002] Currently, the widely accepted network protocol used over the Internet is the Internet Protocol (IP). The IP protocol has been formed through various design modifications, and currently, IPv4 is widely used on the Internet. IPv4 is designed to be relatively simple and flexible, but has disadvantages such as lack of available IP addresses, inefficient routing of IP packets, complexity of various configuration procedures required to drive IP nodes. [0003] In order to improve these deficiencies, IPv6 called Internet Protocol Next Generation (IPng) has been ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/26H04L12/46
CPCH04L63/08H04L63/1441H04L9/32H04L12/28
Inventor 权宅靖金永翰郑守桓崔裁德金善琦
Owner SAMSUNG ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products