Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

80 results about "Anti-replay" patented technology

Anti-replay is a sub-protocol of IPsec that is part of Internet Engineering Task Force (IETF). The main goal of anti-replay is to avoid hackers injecting or making changes in packets that travel from a source to a destination. Anti-replay protocol uses a unidirectional security association in order to establish a secure connection between two nodes in the network. Once a secure connection is established, the anti-replay protocol uses packet sequence numbers to defeat replay attacks as follows: When the source sends a message, it adds a sequence number to its packet; the sequence number starts at 0 and is incremented by 1 for each subsequent packet. The destination maintains a 'sliding window' record of the sequence numbers of validated received packets; it rejects all packets which have a sequence number which is lower than the lowest in the sliding window (i.e. too old) or already appears in the sliding window (i.e. duplicates/replays). Accepted packets, once validated, update the sliding window (displacing the lowest sequence number out of the window if it was already full).

Method and apparatus for preserving data in a system implementing Diffserv and IPsec protocol

An improved method is described for providing Differentiated Services (Diffserv) traffic to a node in a network that implements a security method that discards duplicate packets received at the node. The method includes the step of identifying at least two service levels to be provided to received traffic and assigning separate sequential sequence numbers and different anti-replay bitmasks to each of the service levels. The anti-replay bitmask indicates the sequence numbers of packets that have been previously received at the node that should be compared against a received packet to determine whether a duplicate packet has been received. Such an arrangement reduces the possibility that traffic having lower priority is dropped as a security measure.
Owner:RPX CLEARINGHOUSE

Anti-replay-attack system for industrial wireless network

The invention provides an anti-replay-attack system for an industrial wireless network, which introduces a third-party detection mechanism in order to reduce system resource consumption. The industrial wireless network comprises a gateway, a router, field equipment and network security manager. The anti-replay-attack system for the industrial wireless network comprises a third-party detection module used for detecting whether intrusion data packets and replay attack data packets exist in the industrial wireless network or not and sending detection results to the network security manager, and the network security manager compares the system resource consumption caused by replay attacks with resource consumption brought by using an anti-replay-attack means to determine whether the anti-replay-attack means is used, thereby effectively preventing the anti-replay-attack means from bringing more system resource consumption than the replay attacks, and two time stamps of creation time and sending time are added in the data packet by a sender, so that the certainty and uniqueness of messages can be ensured; a receiver detection mechanism is adopted, and the data packets of the replay attacks are judged and discarded by a receiver so as to solve the problems of ID authentication and the like.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

Method for implementing IPSEC resistance of replay aggression

ActiveCN101471784APerfect anti-replay attack functionAvoid technical difficulties that severely degrade performanceSecuring communicationSlide windowLocking mechanism
The invention provides a method for realizing IPSec anti-replay attack, wherein, a plurality of sliding-windows are utilized to distinguish whether a received message is new in a system providing the IPSec service. For a multi-core architecture, the IPSec anti-replay attack function is perfected by utilizing the multi-sliding window technique, thereby avoiding the technical problem that system performance decreases badly caused by single sliding windows and lock mechanism. In the method, the message with specific type is dispatched to an appointed IPSec processing unit through a pretreatment module according to a plaintext serial-number on an IPSec message header, thereby leading the anti-replay attack detection to be more accurate.
Owner:BEIJING TOPSEC NETWORK SECURITY TECH

Anti-tamper and anti-replay method in support of REST API

InactiveCN107453878ASolve malicious tampering request parametersSolve the problem of using the stolen API to perform replay attacksKey distribution for secure communicationUser identity/authority verificationTimestampAnti-replay
The invention discloses an anti-tamper and anti-replay method in support of REST API. The method includes the following steps: 1. an API invocation end applying access authority and secret key for performing signing to an API server; 2. the API invocation end generating invocation timestamp and random number, ranking request parameters in a lexicographic order, in combination with system request headers, performing signing with the applied secret key; 3. the server detecting the identity of the API invocation person, determining whether the API invocation person has invocation authority; 4. the server using the same secret key to sign request parameters and system request headers in accordance with same rules, comparing whether the signatures are the same, and preventing the parameters from being tampered; 5. the server determining the API invocation timestamp, and determining timeout; and 6. the server re-determining random number. According to the invention, the API invocation person only needs to strictly save the secret key, and attacker does not need to forge the signature and the parameters in the request process are unable to be tampered, thus achieving safe access to API.
Owner:SICHUAN CHANGHONG ELECTRIC CO LTD

Anti-replay method for unicast and multicast ipsec

A method for managing a packet in a communication system between two or more endpoints, a sender and one or more recipients, comprises receiving a first packet comprising a source identifier that uniquely identifies a sender of the first packet and a current source time assigned to the first packet by the sender, determining a received time for the first packet, retrieving a cached source time assigned by the sender to a second packet that was received prior to receiving the first packet, and determining whether to discard or process the first packet based on the current source time, the received time, and the cached source time. The current source time, the received time, and the cached time, in addition to predetermined parameters such as a maximum age and an anti-replay window allows a recipient to determine whether to process or discard a packet.
Owner:MOTOROLA SOLUTIONS INC

Multi-case dynamic remote certification method based on TPM

The invention discloses a TPM-based multi-instance dynamic remote attestation method which belongs to the field of information security technology. The method comprises the steps as follows: a) an RAI instance is started: the TPM measures the RAI instance and issues an initial attestation certificate for the RAI instance; the remote relying party of the RAI instance obtains and authenticates the initial attestation certificate, if the authentication is passed, the link between the RAI instance and the remote relying party of the RAI instance is established; b) if the component of the RAI instance is updated, the TPM re-measures the RAI instance and issues an updating attestation certificate; the remote relying party of the RAI instance obtains and authenticates the updating attestation certificate; if the authentication is passed, the link is maintained; and c) the step b) is repeated until the RAI instance is closed and the link is disconnected; meanwhile, all the attestation steps of a plurality of RAI instances intersperse with each other for forming a TPM attestation chain. Compared with the remote attestation methods of other trusted computing platforms, the method is characterized by the dynamic attestation of platform status, the concurrent attestations of multiple network programs, and anti-replay attack, etc.
Owner:INST OF SOFTWARE - CHINESE ACAD OF SCI

Systems and methods for distribution of selected authentication information for a network of devices

A system for facilitating distribution of authentication information for a network of devices to be authenticated is provided. The system comprises: an authentication module configured to obtain an identity-proofing confidence score, based on data about identity-proofing of a user obtained from an authentication service system, wherein the data about identity-proofing comprises a type of identity document of the user and a presentation method used for verifying the user's identity by the authentication service system; and an insurance module in communication with the authentication module, configured to generate a plurality of security levels for the user, wherein each of the plurality of security levels is generated based on the identity-proofing confidence score and a credential authentication confidence score that is (1) obtained with aid of at least one device from the network of devices, and (2) determined based on a credential to be used for a transaction and a presence of an anti-replay feature about the at least one device, wherein a display is configured to show a plurality of coverage plans associated with the plurality of security levels to the user for selection, such that the authentication service system performed credential authentication according to a selected coverage plan.
Owner:TRUSONA INC

Credible inter-domain rapid authentication method on basis of separation mechanism network

InactiveCN102355663AImpossible to decryptImpossible to tamper withSecurity arrangementAnonymityInter-domain
The invention relates to a credible inter-domain rapid authentication method on the basis of a separation mechanism network for solving the problem of rapid authentication when a terminal in the separation mechanism network is subjected to inter-domain switching. In the method, a novel protocol is provided for realizing the rapid authentication when the terminal is subjected to inter-domain switching; and when the identity of a user is authenticated, the identity authentication of a terminal platform and the integrity check of the terminal platform are realized. In the method, when the terminal is subjected to inter-domain switching, an authentication center of a home domain does not need to participate again and an authentication center of a local domain can authenticate the mobile terminal by a Ticket. The method can resist the anti-replay attack, so that the credibility, safety, anonymity, anonymity of the identity of the user and untraceability of the identity of the user of the platform are ensured.
Owner:BEIJING JIAOTONG UNIV

Method of safety access of power distribution wireless terminal

InactiveCN109194656ATo achieve the purpose of anti-replay attackImprove timelinessTransmissionPrimary stationConfidentiality
The present invention discloses a method of safety access of a power distribution wireless terminal based on a domestic commercial cryptographic algorithm. The method comprises the following steps of:1) prior to interaction of a power distribution wireless terminal and safety access data, performing two-way identity authentication and key negotiation; 2) when the power distribution wireless terminal and a safety access gateway perform normal data communication, performing message filling of the original data of the communication, and employing a domestic symmetric encryption algorithm to encrypt the original data and the filled message; and 3) after the encrypted message is received, performing decryption of the ciphertext data based on the domestic symmetric encryption algorithm to checkthe decrypted original data and the filled message. The method of safety access of the power distribution wireless terminal can achieve the purpose of anti-replay attack; attackers cannot obtain symmetrical encryption keys and cannot decrypt the ciphertext transmission data so as not to perform eavesdropping or tampering of the sensitive interaction information between the power distribution wireless terminal and a master station so as to achieve confidentiality and integrity protection of the sensitive interaction information.
Owner:STATE GRID CORP OF CHINA +3
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products