WO2020154865A1 - Progressive ip removal method and system supporting multi-mode identifier network addressing and storage medium - Google Patents

Progressive ip removal method and system supporting multi-mode identifier network addressing and storage medium Download PDF

Info

Publication number
WO2020154865A1
WO2020154865A1 PCT/CN2019/073507 CN2019073507W WO2020154865A1 WO 2020154865 A1 WO2020154865 A1 WO 2020154865A1 CN 2019073507 W CN2019073507 W CN 2019073507W WO 2020154865 A1 WO2020154865 A1 WO 2020154865A1
Authority
WO
WIPO (PCT)
Prior art keywords
network
identity
user
content
identification
Prior art date
Application number
PCT/CN2019/073507
Other languages
French (fr)
Chinese (zh)
Inventor
李挥
邬江兴
张昕淳
兰巨龙
徐恪
陈世胜
魏进武
伊鹏
陆以勤
马军锋
李胜飞
蒲敏谦
张云勇
陈孟尝
朱江
刘文印
韩永祥
侯韩旭
胡嘉伟
李文军
杨昕
王菡
邢凯轩
Original Assignee
北京大学深圳研究生院
国家数字交换系统工程技术研究中心
中国电信股份有限公司深圳分公司
中国联合网络通信有限公司研究院
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京大学深圳研究生院, 国家数字交换系统工程技术研究中心, 中国电信股份有限公司深圳分公司, 中国联合网络通信有限公司研究院 filed Critical 北京大学深圳研究生院
Priority to PCT/CN2019/073507 priority Critical patent/WO2020154865A1/en
Priority to CN201980005057.1A priority patent/CN111373704B/en
Publication of WO2020154865A1 publication Critical patent/WO2020154865A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/54Organization of routing tables
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/74Address processing for routing
    • H04L45/745Address table lookup; Address filtering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • H04L61/4505Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
    • H04L61/4511Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using domain name system [DNS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Definitions

  • the present invention relates to the field of computers, and in particular to a method, system and storage medium for supporting multi-mode identification network addressing to gradually remove IP.
  • the Internet has become an indispensable part of social development. As a carrier of information, it has penetrated into various fields of human life including national politics, economic development, culture, education, and medical health. .
  • the core service of the Internet is the domain name resolution service, which completes the process of mapping between IP addresses and target servers.
  • the Cisco report predicts that the global mobile phone share will be 69% in 2019, and its wireless data traffic will reach 292 billion GB, of which streaming media will account for about 80%.
  • CCN has changed from the traditional focus on server and host IP addresses to just whether the content of the data meets the requirements. Users no longer care about which host provides services. It's about how to get data faster, more accurately, and more efficiently. So in this age when content is king, researchers have devised a content-based network architecture. After several years of development, significant results have been achieved in the CCN architecture and test bed construction. However, due to its subversive network architecture, there are many technical difficulties in its network deployment and large-scale deployment. CCN only builds the overall network from the content as the core, and does not consider the reasonable planning and application of user identification and satellite ground-air identification in the future Internet of Everything era, which leads to the defect of insufficient scalability when facing different business processes. At the same time, the CCN network does not manage the security of the content reasonably, and cannot solve the problems of data leakage in the IP network at this stage.
  • DNS resolution The domain name resolution service is the most important core service of the Internet. Through DNS, users can access the Internet more conveniently, without the need to remember IP addresses that can be directly read by machines but are difficult for humans to understand and remember.
  • the DNS protocol is an application layer protocol, running on top of the UDP protocol, using port number 53.
  • DNS uses a tree-like directory structure to distribute the management of host names among different levels of DNS servers. Through a hierarchical management strategy, the current stage of rapid resolution and access from IP to domain names can be realized.
  • the general structure of Internet host domain name is: host name. third-level domain name. second-level domain name. top-level domain name.
  • the top-level domain name of the Internet is registered and managed by the Internet Network Association Domain Name Registration and Inquiry Committee (ICANN) responsible for network address allocation. It also assigns a unique IP address to each host on the Internet.
  • ICANN Internet Network Association Domain Name Registration and Inquiry Committee
  • the resolution process is roughly as follows: When a DNS user needs to query the name used in the program, it will query the local DNS server to resolve the name. Each query message sent by the user includes 3 pieces of information to specify the question that the server should answer.
  • DNS queries are resolved in a variety of different ways. Users can sometimes answer queries on the spot by using cached information obtained from previous queries.
  • the DNS server can use its own resource record information cache to answer the query, and can also query or contact other DNS servers on behalf of the requesting user to completely resolve the name, and then return the response to the user.
  • DNS domain name management
  • the DNS system is a centralized recursive architecture system, making it vulnerable to DDoS and other network attacks.
  • privacy issues the Internet’s effective privacy protection strategies at this stage have led to serious data theft and abuse.
  • the present invention provides a method for supporting multi-mode identification network addressing and progressively removing IP, which is characterized in that it includes constructing a network, which is divided into hierarchical network domains from top to bottom, wherein the top-level domain of the network is divided by each country
  • a top-level identity management node government agencies form a global alliance to jointly manage the generation, registration and analysis management of the logo. All network resources in the network will be locked on the blockchain; the first-level domain and the following levels are the corresponding administrative or professional institutions Management, logo management methods, logo registration schemes and consensus algorithms within the domain can be different;
  • Each domain has a corresponding network supervision node.
  • the network supervision node is responsible for user management, logo registration, inter-identity intercommunication and logo routing services in the domain.
  • each network supervision node There are multi-mode identifications for content network identification, spatial geographic location identification, identity information and IP address; the upper and lower domains use network supervision nodes as data access interfaces to achieve hierarchical data transmission; individual users include individual users in the traditional sense and The terminal nodes in the Internet of Things era are network access nodes with mobile characteristics in the network.
  • Enterprise users include government agencies, professional institutions, companies, and organizations with content publishing rights;
  • the network supports network layer routing addressing in which multiple identities including identity, content, geographic location and IP address coexist, and the content identities of all resources in the network are bound to the publisher’s identity.
  • the geographical location identification of the user when logging in to the network and the network resources accessed will be recorded on the blockchain of the network supervision node of the domain for security supervision and data protection
  • the method includes an identity registration step and a network resource request step;
  • the logo registration step includes:
  • Step 1 Register the resource: the network node receives the user's resource registration content, and the network node adds the geospatial location identifier and the identity identifier of the content publisher according to the location node where the content is stored;
  • Step 2 Network node authentication: After the network node in this domain receives the identity registration request transmitted by the user, the network node will review its content and user information, then register the resource identity, and then register the generated identity Request to upload to the upper level domain and add the local identification prefix;
  • Step 3 Identity registration request transmission: After the upper-level network node receives the identity registration request, it will transmit its registration identity message to the controller of its domain according to the set data transmission protocol for subsequent authentication and registration operations;
  • Step 4 Identity verification: After receiving the identity registration request of its subordinate network domain, the network node in the top-level domain will verify the requested data and return the corresponding confirmation signal to the original application node; at the same time, it will adopt the design A distributed storage scheme is set to ensure that all registered logos cannot be tampered with. The original identification information will be stored in the distributed database of the top-level domain. After a set time has passed, the entire network will synchronize the corresponding database. To confirm that the resource identification information between each top-level domain name is equal and unified;
  • the network resource request step includes:
  • Step A query request: send a query request to the nearest network node
  • Step B local identification data query: When the nearest multi-mode network node receives the request from the user, it will distinguish according to the query identification. If it is an IP address, continue the traditional DNS query process, if it is an identity or content identification , Then query the forwarding table, the forwarding table records whether the identification content exists in the local database, if it is, then return the corresponding identification content, otherwise go to step C;
  • Step C request for query transmission: when there is no corresponding identification content in the local database, upload the query request to the upper-level network node. After receiving the query request sent by the next-level network node, follows steps A to B to query. If the corresponding identification content is queried, it will be returned to the corresponding content identification to the next-level network node. Otherwise, the query request will be passed to the upper-level network node until the top-level domain Network node
  • Step D identification query verification and intercommunication: If the top-level domain node finds the related registered identification, it will automatically issue the related shortest path according to the dynamic topology of the existing network. There are many related links on the forwarding line in the network.
  • the modular network node will receive the new forwarding path table and establish a data transmission path through multi-hop routing; if the node in the top-level domain does not find the corresponding identifier, at the same time query the database for other network identifier information corresponding to the identifier, proceed to step E;
  • Step E Issuing the identification request: The network node in the top-level domain will issue the query request to the specified network domain according to the original identification and the first prefix after the conversion, until it reaches the lowest-level network node specified by the query request for local Query; if the corresponding identification content is successfully queried, the corresponding resource content will be passed to the query requester, otherwise, the query error message will be returned.
  • the resources in the network system all have corresponding multiple identifiers to refer to their content name, publisher identity, and spatial geographic location.
  • the identifiers Through the binding and intercommunication between the identifiers, all parties in the network
  • the content publishing and access behavior of the Internet can be effectively controlled and supervised; at the same time, the multi-mode network identity is directly used in the addressing process of the network layer.
  • users Through the dynamic matching and intercommunication technology of the multi-mode identity, users can choose between methods to deal with complex and changeable application requirements and network environments.
  • the addressing process is based on the following three types of identification:
  • Content name-oriented addressing Use hierarchical character strings to identify each resource in the network.
  • multi-mode network nodes have forwarding information tables with names as keys to record each resource. Forwarding port information corresponding to each name; data transmission is carried out in a user-driven manner: the content requester enters the content list into the interest message and sends it to the network; the multi-mode network node records the arrival port of the interest message in the pending In the interest table, and query the forwarding information table to forward the message until it reaches a content holder; by querying the pending interest table, the data packet containing the requested content will be traced back to the request along the arrival path of the interest message
  • the content name-oriented addressing process decouples the data itself and the specific location of the data, providing greater flexibility for the network system;
  • Identity-oriented addressing Identity is used to uniquely refer to a user locally or globally. The user's behavior on the network, including the release and access to network resources, will be subject to the specific authority determined by its identity, and any behavior Identity information that can be traced back to the user;
  • Location information can not only represent geographic location in the real sense, but also virtual location in abstract space. To prevent ambiguity during addressing, the location of two users in this system will not Coincidence occurs; the addressing process for spatial and geographic location is: multi-mode network nodes calculate the geometric distance between each neighbor and the destination, and greedily select the smallest one as the forwarding object.
  • the identity identifier includes the public key, the user's own certificate ID, and the IMEI code of the mobile phone.
  • a security mechanism based on identification and a combination matrix is adopted.
  • the key management agency holds the user’s private key distribution; the public key matrix is held by each network node and is used for data signature authentication; the key management agency uses the user’s identity ID and the private key matrix (r ij ).
  • each identification ID can uniquely generate a string Subscript sequence:
  • GenerateSub(ID) ⁇ i 1 , i 2 ,...i l , j 1 , j 2 ,...j l ⁇
  • GenerateSub(ID) represents the function of generating subscripts from the identity ID, i 1 , i 2 ... i l represent the row coordinates of the matrix, and j 1 , j 2 ... j l represent the column coordinates of the matrix;
  • the private key corresponding to the ID is the sum of the subscript corresponding items in the private key matrix:
  • r ID represents the user's private key, Represents the elements with row coordinates i 1 , i 2 ... i l and column coordinates j 1 , j 2 ... j l in the private key matrix (r ij );
  • the public key corresponding to the ID can be calculated by the verifier through the public key matrix and the identity ID:
  • R ID represents the public key of the user, Represents the elements with row coordinates i 1 , i 2 ... i l and column coordinates j 1 , j 2 ... j l in the public key matrix (R ij );
  • (r ID , R ID ) constitutes a private-public key pair relationship. In this way, not only the one-to-one binding between the identity and the public key is completed, and the supervisability and traceability of network behavior are guaranteed. It also saves the frequent public key request process, and improves the actual performance of the network.
  • the method includes an inter-passing process between name and identity.
  • the name of the content is bound to the identity of the original publisher, and a verifiable extension is adopted. Used to identify network resources, the form is as follows:
  • UniqueID A is the globally unique identity of publisher A. There will be no collision. The user’s public-private key pair is generated from this identity; SubID A is the secondary identity used by A when publishing the content. The same user may have multiple identities; Name is a hierarchical content name; Sig (Name, PrK A ) is A's signature on the content name; when the content is received by the user or cached by the multi-mode network node, its The signature must be verified to ensure its legitimacy; the data structure of the prefix tree is used to support the storage and query operations of names and identities. In the prefix tree, each connection edge of the root node corresponds to a user, and we use global uniqueness The identity identifier UniqueID A is used to refer to each user.
  • Each user node records the entries and spatial location information of the F forwarding information table corresponding to the user.
  • the second layer of the prefix tree represents what each user has Multiple identities, if user A1 is If the resource Name1 is released, its corresponding name node will become the identity
  • the name node will record the signature Sig (Name1, PrK A1 ), as well as the entry and space location information of the forwarding information table corresponding to the name.
  • the name and identity identification can be completed , Or the mutual conversion between multiple identities owned by the same user.
  • the method includes the conversion process between location, name and identity.
  • each user corresponds to a unique real or virtual spatial geographic location identifier, and
  • its location identifier For a certain content name in the network, in order to reduce the routing delay, we set its location identifier to "the position of the nearest node holding the content corresponding to the name", which is calculated and delivered by the upper control node; by setting the corresponding The location information is recorded in the prefix tree, which can complete the interoperability from the name, identity to the spatial geographic location; in order to prevent the location of each user from colliding, we use the spatial geographic location-identity hash table to complete the mapping between them operating.
  • the method includes user management and privacy protection policies.
  • user management and privacy protection policies when all user terminals send identification registration requests in the network, they will bind corresponding identification information to ensure the normal operation of the network.
  • the user uses a specified hash function and adds the user’s identity information to generate an identity certificate.
  • the identity certificate will be the identity proof of the user in the network, and the spatial geographic location identifier will be used as the user’s auxiliary identification information; ,
  • the system will send the user’s public key to the network supervision node, and then the user uses his own identity certificate to sign the identity registration request, and sends it to the network supervision node together with the identity registration request; the network supervision node first uses the same
  • the hash function verifies the legitimacy of the user from the received logo registration request, then decrypts the attached signature according to the user’s public key, compares the two hash values, and if they are the same, it can be confirmed that the signature belongs to the user;
  • the registration request is confirmed by the network supervision node.
  • the system will store the user’s identity certificate in distributed data to ensure that the identification content will be traced and supervised in the future; the system will classify the network content published by the user, and when the user accesses network resources The access authority will be determined based on the identity information of its visitors.
  • the method includes the step of personal user accessing the network.
  • the step of personal user accessing the network when the user accesses the network system through the traditional Internet, the network node will record the MAC address of the user terminal as an identity identifier Stored in the network, it will also record the spatial geographic location of the user terminal in the form of three-dimensional coordinates. For mobile phone users, the IMEI code of the mobile phone will be recorded as part of the identity authentication information at the same time.
  • Corresponding gateway equipment is installed at the border of the, to ensure that users can access Internet resources through a variety of network identifiers; when users access the network through the new network identifier, relevant identity information will be stored in the user’s local node, including but not limited to the user’s fingerprint , Iris and other biological information with traceable user identity, the identity information is only stored locally in the user node to generate user signatures, and is not transmitted in the multi-mode identity network; at the same time, the identity of the individual user is identified with various content identifications published In combination, its identity is used as an addressing identifier for the network content, which facilitates other nodes in the network to directly address network resources through user identifiers, and improves the efficiency of network resource query.
  • the method includes the step of enterprise user accessing the network.
  • the enterprise user will bind the identity identification code issued by the government or professional organization as the identity identifier to log on to the network, and the The network resources will also be bound to their corporate identity information, and the network resources issued by corporate users and the spatial geographic location identification of the server will be recorded on the blockchain of the network supervision node in the domain for security supervision and data protection.
  • the present invention also provides a system supporting multi-mode identification network addressing progressively IP, including: a memory, a processor, and a computer program stored on the memory, the computer program is configured to be called by the processor Implement the steps of the method described in the present invention.
  • the present invention also provides a computer-readable storage medium that stores a computer program, and the computer program is configured to implement the steps of the method of the present invention when called by a processor.
  • the present invention proposes a new network multi-mode identification generation management and routing addressing system that integrates blockchain, and uses multi-mode identification dynamic adaptation and intercommunication technology to break through the existing network IP layer fineness The performance and security bottlenecks of the waist; the use of distributed blockchain consensus algorithms to achieve the original wish of Internet co-management and co-governance All network resources of the network will be locked on the blockchain to ensure that the network resources are authentic and not tampered with; high-performance, low-overhead distributed storage technology is used to realize the security and non-tampering of multi-mode identification routing;
  • the introduction of user real-name registration and network login management strategies combined with biometric identity information and signature strategies for privacy protection are introduced to reduce system management costs and improve the privacy and security of access node information.
  • Figure 1 is a diagram of the overall architecture of the present invention.
  • Figure 2 is a schematic diagram of the security mechanism based on the identity identification and the combined matrix of the present invention.
  • Figure 3 is a schematic diagram of the data structure of the prefix tree of the present invention.
  • Multi-mode identification network a network where multiple routing identifications coexist.
  • the coexistence of multiple routes refers to the establishment of a network routing process that satisfies various constraint attributes based on a specific addressing mode (polymorphic addressing). It mainly supports the coexistence of multiple network architectures to meet the needs of multiple application services.
  • SDN Software Defined Network
  • CCN Content-Centric Networking
  • data network named data network.
  • the name is used as the network routing identifier, and the content is cached through multi-mode network nodes, so that data transmission is faster and the retrieval efficiency of content can be improved.
  • the present invention discloses a method for supporting multi-mode identification network addressing to gradually remove IP.
  • Figure 1 shows the overall network architecture of the present invention.
  • the entire new multi-mode identification network system is divided into hierarchical network domains from top to bottom. .
  • the top-level domains of the network are managed by the government agencies of various countries as the top-level identity management nodes, and they jointly maintain an alliance chain to reach a consensus of the entire network and realize the original wish of Internet co-management and co-governance. All network resources on the network will be locked on the blockchain to ensure that the network resources are authentic and not tampered with.
  • the first-level domains and other domains are managed by corresponding countries and professional institutions.
  • the logo management methods, logo registration schemes and consensus algorithms in their domains can be different, and their specific implementation details can also be different.
  • Low coupling is used to ensure the security between systems And to realize the particularity and customization between each level.
  • the upper and lower domains use network supervisory nodes as data access interfaces to realize hierarchical data transmission.
  • the power of Internet management and control is handed over to Internet participants all over the world, and is no longer monopolized by an independent organization. It realizes multilateral co-management, co-governance and sharing of cyberspace in the post-IP era, and equality and openness.
  • Each domain has a corresponding network supervision node, which is mainly responsible for services such as user management, identity registration, identity conversion and identity routing in the domain.
  • each network supervision node has content-oriented network identity, spatial geographic location identity, identity information and IP address And other multi-mode logos.
  • Individual users include individual users in the traditional sense and terminal nodes in the Internet of Things era that have mobile network access nodes in the network.
  • Enterprise users include government agencies, professional organizations, companies, and websites with content publishing rights and other organizations.
  • the new network supports network layer routing addressing where multiple identifiers such as identity identifiers, content identifiers, spatial geographic location identifiers, and IP address identifiers coexist.
  • the content identifiers of all resources in its network will be bound to the identity of the publisher.
  • the spatial information identifiers and network resources accessed when users log on to the network will be recorded on the blockchain of the network supervision node of the domain for use Security supervision and data protection.
  • the network is for content identification and identity identification.
  • Information publishers pursuing high-credibility services will publish their information on the new logo, which will naturally lead to the de-IPization of network traffic and systems.
  • the present invention includes the user access network process, specifically including the steps of individual users accessing the network and enterprise users accessing the network.
  • the IP identification is not used as the main routing identification in this network.
  • the network node When a user accesses the network system through the traditional Internet, the network node will record the MAC address of the user terminal as an identification and store it in the network in the form of cn/guangdong/shenzhen/44-8A-5B-85-58-D2.
  • the spatial geographic location identifier of the user terminal will be recorded in the form of three-dimensional spatial coordinates.
  • the IMEI code of the mobile phone will be recorded as part of the identity authentication information.
  • Corresponding gateway equipment is provided at the boundary of each network domain to ensure that users can access Internet resources through multiple network identifiers.
  • Bind the specific identity of an individual user with the various content identities that it publishes, and its identity is used as an addressing identifier for the network content, which facilitates the other nodes in the network to directly route and address network resources through the user’s identity, improving The efficiency of network resource query.
  • Enterprise users will bind the ID code issued by the government or professional organization as their identity to log on to the network, and the network resources they publish will also be bound to their corporate identity information.
  • the network resources issued by the enterprise users and the spatial information identification of the server will be recorded on the blockchain of the network supervision node of the domain for security supervision and data protection.
  • the present invention includes a network routing scheme, which includes an identification registration step and a network resource request step.
  • the logo registration step includes:
  • Step 1 Register resources: The network node receives the user's resource registration content, that is, in the network, any resource that can be routed must be registered with the network node before being accessed by other network devices. So the user must first register the content named "/pku/movie/hello.mkv" to any network node. Claim its ownership of the content. At the same time, the network node will add the geospatial location identifier and the identity identifier of the content publisher according to the location node where the content is stored.
  • Step 2 Network node authentication: After the network node in this domain receives the identity registration request transmitted by the user, the network node will review its content and user information (review includes manual review or automatic review, and automatic review can use blocks Chain smart contract), then register the resource identifier, and then upload the generated identifier registration request to the upper-level domain and add the local identifier prefix;
  • Step 3 Identity registration request transmission: After the upper-level network node receives the identity registration request, it will transmit its registration identity message to the controller of its domain according to the set data transmission protocol for subsequent authentication and registration operations;
  • Step 4 Identity verification: After receiving the identity registration request of its subordinate network domain, the network node in the top-level domain will verify the requested data and return the corresponding confirmation signal to the original application node; at the same time, it will adopt the design A distributed storage scheme is set to ensure that all registered logos cannot be tampered with. The original identification information will be stored in the distributed database of the top-level domain. After a set time has passed, the entire network will synchronize the corresponding database. To confirm that the resource identification information between each top-level domain name is equal and unified.
  • the network resource request step includes:
  • Step A query request: send a query request to the nearest network node; when the requested content has been registered on the network, the client can use the corresponding uniform resource identifier to obtain the required network resources.
  • Step B local identification data query: When the nearest multi-mode network node receives the request from the user, it will distinguish according to the query identification. If it is an IP address, continue the traditional DNS query process, if it is an identity or content identification , Then query the forwarding table, the forwarding table records whether the identification content exists in the local database, if it is, then return the corresponding identification content, otherwise go to step C;
  • Step C request for query transmission: when there is no corresponding identification content in the local database, upload the query request to the upper-level network node. After receiving the query request sent by the next-level network node, follows steps A to B to query. If the corresponding identification content is queried, it will be returned to the corresponding content identification to the next-level network node. Otherwise, the query request will be passed to the upper-level network node until the top-level domain Network node
  • Step D identification query verification and intercommunication: If the top-level domain node finds the related registered identification, it will automatically issue the related shortest path according to the dynamic topology of the existing network. There are many related links on the forwarding line in the network.
  • the modular network node will receive the new forwarding path table and establish a data transmission path through multi-hop routing; if the node in the top-level domain does not find the corresponding identifier, at the same time query the database for other network identifier information corresponding to the identifier, proceed to step E;
  • Step E Issuing the identification request: The network node in the top-level domain will issue the query request to the specified network domain according to the original identification and the first prefix after the conversion, until it reaches the lowest-level network node specified by the query request for local Query; if the corresponding identification content is successfully queried, the corresponding resource content will be passed to the query requester, otherwise, the query error message will be returned.
  • Multi-mode identification network addressing
  • the resources in the new network system have a variety of corresponding identifiers to refer to their content name, publisher identity, network location and other information.
  • the content release and access of all parties in the network Behavior can be effectively controlled and supervised.
  • the user can choose between multiple addressing methods to cope with complex and changeable applications.
  • Demands and network environment have improved the stability and adaptability of the system, and made it possible for us to design more innovative intelligent addressing strategies in the future.
  • the addressing process is mainly based on the following three identifiers (with the advancement of technology, it can be extended to include other identifiers):
  • Multi-mode network nodes Similar to Named Data Networking (NDN), we use hierarchical strings to identify each resource in the network, like "com/ndn/pku/document/01.pdf" .
  • FIB forwarding information table
  • the data transmission is carried out in a user-driven manner: the content requester enters the content list into the Interest message and sends it to the network; the multi-mode network node records the arrival port of the interest message in the pending interest table (Pending Information).
  • the name-oriented addressing process decouples the data itself and the specific location of the data, which provides greater flexibility for the network system. At the same time, the name can convey richer information, effectively solving the semantic overload of the IP address. problem.
  • Identity-oriented addressing Identity is used to uniquely refer to a user locally or globally. Commonly used identities include public keys, user IDs, IMEI codes of mobile phones, and so on. The user’s behavior on the network, including the release and access to network resources, will be subject to the specific authority determined by his identity, and any behavior can be traced back to the user’s identity information, thereby improving the network’s supervisability and eliminating The breeding ground for wrongdoing.
  • spatial geographic location can not only represent geographic location in a realistic sense, such as Beidou satellite system or GPS global positioning location information, but also represent virtual locations in abstract space, such as mapping the network to geometric space The mathematical coordinates obtained by the back node. In order to prevent ambiguity in the addressing process, the positions of the two users in this system will not overlap.
  • the location-oriented addressing process is generally based on distance calculation, that is, multi-mode network nodes calculate the geometric distance between each neighbor and the destination, and greedily select the smallest one as the forwarding object. Because this method has very small storage occupation and computational overhead, location-oriented addressing can effectively deal with the expansion of the routing table when the network is large, thereby improving the scalability of the network.
  • the name-oriented addressing process separates the data from the specific location, providing greater flexibility and scalability; but in contrast, the unbinding of data and location also introduces certain security risks.
  • the existing content center network architecture usually uses "verifiable names" for the data request process, that is, each name must include the publisher's public key acquisition method, and the publisher's signature on the name and content .
  • each name must include the publisher's public key acquisition method, and the publisher's signature on the name and content .
  • its signature must first be verified to ensure the integrity, safety and reliability of its name and content.
  • this system adopts a public and private key generation scheme based on identification and a combination matrix.
  • the brief description of the scheme is as follows:
  • ECC Elliptic Curve Cryptography
  • the private key matrix is only held by the key management agency and used for the user's private key distribution; while the public key matrix is held by each network node and used for data signature authentication.
  • the key management agency generates the user’s private key r ID through the user’s identity ID and private key matrix (r ij ).
  • the private key generation process can be implemented in the following ways: based on an encryption chip and In cryptographic operations, each identification ID can uniquely generate a sequence of subscripts:
  • GenerateSub(ID) ⁇ i 1 , i 2 ,...i l , j 1 , j 2 ,...j l ⁇
  • GenerateSub(ID) represents the function of generating subscripts from the identity ID, i 1 , i 2 ... i l represent the row coordinates of the matrix, and j 1 , j 2 ... j l represent the column coordinates of the matrix;
  • the private key corresponding to the ID is the sum of the subscript corresponding items in the private key matrix:
  • r ID represents the user's private key, Represents the elements with row coordinates i 1 , i 2 ... i l and column coordinates j 1 , j 2 ... j l in the private key matrix (r ij );
  • the public key corresponding to the ID can be calculated by the verifier through the public key matrix and the identity ID:
  • R ID represents the public key of the user, Represents the elements with row coordinates i 1 , i 2 ... i l and column coordinates j 1 , j 2 ... j l in the public key matrix (R ij );
  • UniqueID A is the globally unique identity of publisher A. There will be no collision. The user’s public-private key pair is generated from this identity; SubID A is the secondary identity used by A when publishing the content. The same user may have multiple identities; Name is a hierarchical content name; Sig (Name, PrK A ) is A's signature on the content name. Before the content is received by the user or cached by the multi-mode network node, based on the above-mentioned security mechanism, its signature must be verified to ensure its legality. As a result, any resource in the network can be traced back to its original publisher, ensuring the supervision of publishing behavior and the security of network transmission.
  • the identity can be regarded as a special form of the extension name, that is, the content name is empty. Therefore, we use the prefix tree as a data structure to support the storage and query operations of the name and identity. :
  • Figure 3 is an example of a prefix tree with component granularity.
  • Each connection edge of the root node corresponds to a user.
  • Each user node records the FIB entry and spatial location information corresponding to the user.
  • the second level of the tree represents the multiple identities owned by each user. If user A1 is If the resource Name1 is released, its corresponding name node will become the identity
  • the name node will record the signature Sig (Name1, PrK A1 ), as well as the FIB entry and space location information corresponding to the name.
  • the prefix tree compresses and merges the same prefix information, thereby reducing storage overhead; 2.
  • the nature of the prefix tree determines that it naturally supports the longest prefix matching (Longest Prefix Matching, LPM) query mode, consistent with the matching mode of the name in the FIB; 3.
  • LPM Longest Prefix Matching
  • each user corresponds to a unique real or virtual spatial location identifier.
  • its location identifier For a certain name in the network, in order to reduce the routing delay, we set its location identifier to "hold the name The nearest node location of the corresponding content is calculated and delivered by the upper control node.
  • the system will send the user's public key to the network supervision node. Then the user signs the identity registration request with his own identity certificate and sends it to the network supervision node together with the identity registration request.
  • the network supervision node first uses the same hash function as the user to verify the legitimacy of the user from the received identification registration request, and then decrypts the additional signature according to the user's public key.
  • the system will store the user's identity certificate in the distributed data to ensure the traceability and supervision of the logo content in the future.
  • the system requires that all logos must be registered before they can be routed in the network and the identity information of the publisher must be added when the logo is registered, which can effectively reduce the spread of illegal network content on the network.
  • the new network system will introduce rights management strategies.
  • the system will classify the network content posted by users. When users access network resources, they will determine their access permissions based on the identity information of their visitors, such as restricting the daily online time and game time of specific groups such as students. Online content classification can effectively protect the physical and mental health of minors and promote the development of reasonable and compliant Internet content.
  • the present invention discloses a system that supports multi-mode identification network addressing and progressive IP, including: a memory, a processor, and a computer program stored on the memory, and the computer program is configured to be implemented when called by the processor The steps of the method of the present invention.
  • the present invention also discloses a computer-readable storage medium, the computer-readable storage medium stores a computer program, and the computer program is configured to implement the steps of the method of the present invention when called by a processor.
  • the domain name resolution service is no longer provided by the specific 13 servers and their affiliated mirror servers.
  • the power of Internet management and control is handed over to Internet participants all over the world, and is no longer monopolized by an independent organization. It realizes multilateral co-management, co-governance and sharing of cyberspace in the post-IP era, and equality and openness.
  • the multi-mode identity network realizes global co-management through decentralized blockchain technology, which prevents country domain names from being erased by specific countries and improves the security of the national network.
  • all parties’ published content and access behaviors are effectively protected and managed, and their access to the network cannot be denied, which reduces the country’s network supervision costs.
  • the new multi-mode identity network improves the overall addressing efficiency of the network by introducing multiple network identities, especially identity identities that naturally support mobility. Reduce the operation and maintenance costs of network service providers due to mobile users in traditional networks. At the same time, the security of the network has been greatly improved, effectively reducing the network security risks of ISPs.
  • the enterprise user will bind the identity identification code issued by the government or professional organization as the identity mark to log in to the network, and the network resources issued by it will also bind its corporate identity information. Since its content is locked on the blockchain, the risk of tampering by hackers is avoided.
  • the individual user will bind the corresponding biometric identity information and other identity authentication information as an identity identifier to log in to the network, and the network resources it publishes will also bind its identity information.
  • the spatial information identification and network resources accessed by individual users when they log on to the network will be recorded on the blockchain of the network supervision node in the domain for security supervision and data protection.
  • the network supervision node will refuse to register, delete and punish violating network resources and malicious users in the network. Compared with the privacy and security problems of traditional IP networks, this network system has good privacy protection and security.
  • the new multi-mode identity network introduces a hierarchical management mechanism while identity registration.
  • the content they visit is subject to effective management in accordance with local government regulations. Reduce the possibility of minors indulging in the Internet and effectively purify minors’ online environment.
  • the network will pay more attention to the network resource itself or the user itself rather than the storage location of traditional network resources. It avoids the performance problem of the traditional IP network and greatly improves the efficiency of network resource transmission.
  • each identification can uniquely generate the key pair of the elliptic curve encryption algorithm . Therefore, only relying on the public key matrix and the identity of the issuer, the recipient of the data can calculate its public key, thereby completing its signature verification.
  • This mechanism not only binds the identity identifier to the cryptographic information, which is conducive to identity-oriented network management; it also eliminates the frequent public key distribution and request process, and improves the efficiency of network utilization.
  • An addressing strategy that supports multi-mode network identification is proposed. Through the mutual conversion between name identification, identity identification and spatial location identification, users can flexibly choose the most suitable addressing method to cope with complex and changeable network environments And actual demand, thereby enhancing the adaptability of the system. At the same time, the binding of the network resource name and the original publisher's identity improves the supervisability and traceability of network behavior, and ensures the safety and reliability of network transmission.
  • a gradual deployment expansion plan for a smooth transition of the network is proposed, which can support the existing DNS domain name resolution system without changing the system architecture. Users can access the network in a variety of ways and gradually replace it. Existing domain name resolution system.

Abstract

The present invention provides a progressive IP removal method and system supporting multi-mode identifier network addressing and a storage medium. In the present invention, a novel network multi-mode identifier generation management and routing addressing system incorporating a blockchain is provided, and the performance and security bottleneck of existing networks completely dependent on the IP layer are eliminated by means of dynamic multi-mode identifier adaptation and interworking technology. Collective Internet management and governance is achieved by means of a distributed blockchain consensus algorithm. All network resources of a network are locked and stored in the blockchain, thereby ensuring that the network resources are authentic and reliable and cannot be tampered with. Secure and tamper-proof multi-mode identification addressing is achieved by means of efficient and low-overhead distributed storage technology. In addition, a user real-name registration and network login management policy incorporating biometric information and a signature policy for privacy protection are used, thereby reducing system management costs, and improving the privacy security of access node information.

Description

一种支持多模标识网络寻址渐进去IP的方法、系统及存储介质Method, system and storage medium for supporting multi-mode identification network addressing and progressively removing IP 技术领域Technical field
本发明涉及计算机领域,尤其涉及一种支持多模标识网络寻址渐进去IP的方法、系统及存储介质。The present invention relates to the field of computers, and in particular to a method, system and storage medium for supporting multi-mode identification network addressing to gradually remove IP.
背景技术Background technique
随着当今互联网技术的日益革新,互联网已经成为社会发展不可缺失的一环,其作为信息的一种载体,已经渗透到包括国家政治、经济发展、文化教育、医疗卫生等人类生活的各种领域。其互联网最为核心的服务为域名解析服务,即完成IP地址与目标服务器之间相互映射的过程。然而,随着5G移动技术蓬勃发展、数据存储设备成本降低、新应用场景拓展的背景下,互联网上的信息正成指数级的膨胀。思科公司报告预计2019年全球手机份额为69%,其无线数据流量将到达2920亿GB,而这其中流媒体将占比约80%。同时,其网络信息来源呈现出多元化的发展趋势,用户不再关心内容的存储位置而更在乎内容信息的本身。这意味着传统基于IP的互联网正面临着前所未有的巨大挑战,由于IP地址与身份的过载特性,传统互联网中数据内容对路由层完全透明。因此现阶段中互联网中重复传输了许多同样内容,造成了网络资源以及能源的浪费,成为了制约网络性能发展的一大痛点。With the increasing innovation of today's Internet technology, the Internet has become an indispensable part of social development. As a carrier of information, it has penetrated into various fields of human life including national politics, economic development, culture, education, and medical health. . The core service of the Internet is the domain name resolution service, which completes the process of mapping between IP addresses and target servers. However, with the vigorous development of 5G mobile technology, the reduction of data storage equipment costs, and the expansion of new application scenarios, information on the Internet is exponentially expanding. The Cisco report predicts that the global mobile phone share will be 69% in 2019, and its wireless data traffic will reach 292 billion GB, of which streaming media will account for about 80%. At the same time, its network information sources are showing a diversified development trend, and users no longer care about the storage location of the content but care more about the content information itself. This means that the traditional IP-based Internet is facing unprecedented challenges. Due to the overload characteristics of IP addresses and identities, the data content in the traditional Internet is completely transparent to the routing layer. Therefore, in the current stage, many of the same content is repeatedly transmitted on the Internet, causing a waste of network resources and energy, and becoming a major pain point that restricts the development of network performance.
不仅如此,传统网络也存在着监管不善、安全性能弱等严重威胁社会发展的问题。同时,DNS域名解析系统本身的安全问题也不容忽视,2010年1月12日百度域名被劫持,导致多个地区在长达4小时内无法正常访问百度,有的地区在24小时后才恢复正常。Not only that, but traditional networks also have problems that seriously threaten social development, such as poor supervision and weak security performance. At the same time, the security problems of the DNS domain name resolution system itself cannot be ignored. On January 12, 2010, the Baidu domain name was hijacked, causing many regions to be unable to access Baidu normally for up to 4 hours, and some regions only returned to normal after 24 hours .
针对互联网存在的上述诸多安全问题以及性能痛点,越来越多的国内外科研机构及公司将研发的重点放在了新型网络体系架构上,在众多新提出的网络体系中,以天生支持内容推送以及订阅的内容中心网络CCN最引人注目。In response to the many security problems and performance pain points of the Internet, more and more domestic and foreign scientific research institutions and companies have focused their research and development on the new network architecture. In many newly proposed network systems, they naturally support content delivery. And the subscribed content center network CCN is the most eye-catching.
CCN从传统关注服务器和主机IP地址.转变为只关心数据的内容是否符合要求。用户不再关心由哪一台主机提供服务。而是关心如何更快、更准确和更高效地获取数据。于是在这个内容为王道的年代,科研人员设想出了一种以内容为基础的网络体系结构。经过这几年的发展,CCN体系 结构以及测试床搭建上取得了显著的成果,但由于其颠覆式的网络体系架构导致其布网以及大规模部署时存在许多技术难题。CCN只从内容为核心构建整体网络,并未考虑未来万物互联时代对用户身份标识以及卫星地空标识的合理规划以及应用,导致其在面对不同业务流程时存在扩展性不足的缺陷。同时,CCN网络也未对内容的安全进行合理的管理,无法解决现阶段IP网络存在的数据泄露等问题。CCN has changed from the traditional focus on server and host IP addresses to just whether the content of the data meets the requirements. Users no longer care about which host provides services. It's about how to get data faster, more accurately, and more efficiently. So in this age when content is king, researchers have devised a content-based network architecture. After several years of development, significant results have been achieved in the CCN architecture and test bed construction. However, due to its subversive network architecture, there are many technical difficulties in its network deployment and large-scale deployment. CCN only builds the overall network from the content as the core, and does not consider the reasonable planning and application of user identification and satellite ground-air identification in the future Internet of Everything era, which leads to the defect of insufficient scalability when facing different business processes. At the same time, the CCN network does not manage the security of the content reasonably, and cannot solve the problems of data leakage in the IP network at this stage.
DNS解析域名解析服务是Internet最为重要的一项核心服务。通过DNS,用户能更方便地访问互联网,而不需要记住能够被机器直接读取但人类难以理解和记忆的IP地址。DNS协议是应用层协议,运行在UDP协议之上,使用端口号53。DNS resolution The domain name resolution service is the most important core service of the Internet. Through DNS, users can access the Internet more conveniently, without the need to remember IP addresses that can be directly read by machines but are difficult for humans to understand and remember. The DNS protocol is an application layer protocol, running on top of the UDP protocol, using port number 53.
DNS利用类似树状目录的架构,将主机名的管理分配在不同层级的DNS服务器当中,通过分层管理的策略,得以实现现阶段IP到域名的快速解析以及访问。通常Internet主机域名的一般结构为:主机名.三级域名.二级域名.顶级域名。Internet的顶级域名由Internet网络协会域名注册查询负责网络地址分配的委员会(ICANN)进行登记和管理,它还为Internet的每一台主机分配唯一的IP地址。其解析流程大致如下:当DNS用户需要查询程序中使用的名称时,它会查询本地DNS服务器来解析该名称。用户发送的每条查询消息都包括3条信息,以指定服务器应回答的问题。DNS查询以各种不同的方式进行解析。用户有时也可通过使用从以前查询获得的缓存信息就地应答查询。DNS服务器可使用其自身的资源记录信息缓存来应答查询,也可代表请求用户来查询或联系其他DNS服务器,以完全解析该名称,并随后将应答返回至用户。DNS uses a tree-like directory structure to distribute the management of host names among different levels of DNS servers. Through a hierarchical management strategy, the current stage of rapid resolution and access from IP to domain names can be realized. Generally, the general structure of Internet host domain name is: host name. third-level domain name. second-level domain name. top-level domain name. The top-level domain name of the Internet is registered and managed by the Internet Network Association Domain Name Registration and Inquiry Committee (ICANN) responsible for network address allocation. It also assigns a unique IP address to each host on the Internet. The resolution process is roughly as follows: When a DNS user needs to query the name used in the program, it will query the local DNS server to resolve the name. Each query message sent by the user includes 3 pieces of information to specify the question that the server should answer. DNS queries are resolved in a variety of different ways. Users can sometimes answer queries on the spot by using cached information obtained from previous queries. The DNS server can use its own resource record information cache to answer the query, and can also query or contact other DNS servers on behalf of the requesting user to completely resolve the name, and then return the response to the user.
DNS的主要缺点在于,第一,域名管理过于中心化:在现有的DNS中,顶级域名的产生、分配完全依赖于ICANN,缺失公平竞争的机制无法实现互联网共管共治的开发本愿,同时域名交易,变更手续繁琐,这也导致域名的管理效率低下。第二,安全问题:DNS系统是一个中心化递归架构系统,使得其面对DDoS等网络攻击时显得较为脆弱。第三,隐私问题:现阶段互联网确实有效的隐私保护策略,导致数据盗取以及滥用现象十分严重。The main shortcomings of DNS are that, first, domain name management is too centralized: In the existing DNS, the generation and distribution of top-level domain names are completely dependent on ICANN, and the lack of a fair competition mechanism cannot achieve the development of Internet co-management and co-governance. The transaction and change procedures are cumbersome, which also leads to inefficient domain name management. Second, security issues: The DNS system is a centralized recursive architecture system, making it vulnerable to DDoS and other network attacks. Thirdly, privacy issues: the Internet’s effective privacy protection strategies at this stage have led to serious data theft and abuse.
发明内容Summary of the invention
本发明提供了一种支持多模标识网络寻址渐进去IP的方法,其特征在于,包括构建网络,该网络采用自上到下层级化网络域进行划分,其中网络的顶级域由各个国家的政府机构作为顶级标识管理节点,组成全球联盟 共同管理标识的产生登记及解析管理,网络中所有的网络资源都将锁存在区块链上;一级域及以下各级域为相应行政或专业机构管理,其域内的标识管理方式、标识注册方案及共识算法可以不同;The present invention provides a method for supporting multi-mode identification network addressing and progressively removing IP, which is characterized in that it includes constructing a network, which is divided into hierarchical network domains from top to bottom, wherein the top-level domain of the network is divided by each country As a top-level identity management node, government agencies form a global alliance to jointly manage the generation, registration and analysis management of the logo. All network resources in the network will be locked on the blockchain; the first-level domain and the following levels are the corresponding administrative or professional institutions Management, logo management methods, logo registration schemes and consensus algorithms within the domain can be different;
网络中存在监管节点、个人用户以及企业用户网络节点,每个域内均有相应的网络监管节点,网络监管节点负责域内用户管理、标识注册、标识间互通以及标识路由服务,同时每个网络监管节点存在面向内容网络标识、空间地理位置标识、身份信息及IP地址多模标识;上下域之间通过网络监管节点作为数据访问接口以实现层级化的数据传输;个人用户包括传统意义上的个人用户以及物联网时代的终端节点在网络中带有移动特性的网络接入节点,企业用户包括政府机关、专业机构、公司及具有内容发布权的网站的组织机构;There are supervision nodes, individual users, and corporate user network nodes in the network. Each domain has a corresponding network supervision node. The network supervision node is responsible for user management, logo registration, inter-identity intercommunication and logo routing services in the domain. At the same time, each network supervision node There are multi-mode identifications for content network identification, spatial geographic location identification, identity information and IP address; the upper and lower domains use network supervision nodes as data access interfaces to achieve hierarchical data transmission; individual users include individual users in the traditional sense and The terminal nodes in the Internet of Things era are network access nodes with mobile characteristics in the network. Enterprise users include government agencies, professional institutions, companies, and organizations with content publishing rights;
网络支持包括身份标识、内容标识、空间地理位置标识及IP地址标识的多种标识共存的网络层路由寻址,其网络中的所有资源的内容标识均会和发布者的身份标识相互绑定,用户登陆网络时的空间地理位置标识及访问的网络资源将记录在所在域的网络监管节点区块链上用于安全监管及数据保护The network supports network layer routing addressing in which multiple identities including identity, content, geographic location and IP address coexist, and the content identities of all resources in the network are bound to the publisher’s identity. The geographical location identification of the user when logging in to the network and the network resources accessed will be recorded on the blockchain of the network supervision node of the domain for security supervision and data protection
作为本发明的进一步改进,该方法包括标识注册步骤、网络资源请求步骤;As a further improvement of the present invention, the method includes an identity registration step and a network resource request step;
所述标识注册步骤包括:The logo registration step includes:
步骤1,注册资源:网络节点接收用户的资源注册内容,同时网络节点将根据内容存放的位置节点加上地理空间位置标识以及内容发布人的身份标识; Step 1. Register the resource: the network node receives the user's resource registration content, and the network node adds the geospatial location identifier and the identity identifier of the content publisher according to the location node where the content is stored;
步骤2,网络节点认证:本域的网络节点在接收到用户传输的标识注册请求之后,网络节点将对其内容及其用户信息进行审查,随后对该资源标识进行注册,随后将产生的标识注册请求上传至上一级域并加上本地的标识前缀;Step 2: Network node authentication: After the network node in this domain receives the identity registration request transmitted by the user, the network node will review its content and user information, then register the resource identity, and then register the generated identity Request to upload to the upper level domain and add the local identification prefix;
步骤3,标识注册请求传输:当上一级网络节点接收到标识注册请求之后,将按照设定的数据传输协议将其注册标识报文传输到其所在域的控制器进行后续认证及注册操作;Step 3. Identity registration request transmission: After the upper-level network node receives the identity registration request, it will transmit its registration identity message to the controller of its domain according to the set data transmission protocol for subsequent authentication and registration operations;
步骤4,标识校验:顶级域内的网络节点在接收到其下级网络域的标识注册请求之后,将对该请求的数据进行校验并将返回给原申请节点相应的确认信号;同时将采用设定的分布式存储方案来保证所有注册的标识均无法被篡改,原标识信息将存储在顶级域的分布式数据库之上,每经过一 个设定的时间之后,全网将进行相应的数据库同步工作以确认各个顶级域名之间的资源标识信息对等且统一;Step 4. Identity verification: After receiving the identity registration request of its subordinate network domain, the network node in the top-level domain will verify the requested data and return the corresponding confirmation signal to the original application node; at the same time, it will adopt the design A distributed storage scheme is set to ensure that all registered logos cannot be tampered with. The original identification information will be stored in the distributed database of the top-level domain. After a set time has passed, the entire network will synchronize the corresponding database. To confirm that the resource identification information between each top-level domain name is equal and unified;
所述网络资源请求步骤包括:The network resource request step includes:
步骤A,查询请求:向最近的网络节点传送查询请求;Step A, query request: send a query request to the nearest network node;
步骤B,本地标识数据查询:当最近的多模网络节点接收到用户所发出的请求之后,将根据查询的标识进行区分,如果是IP地址则继续传统的DNS查询流程,如果是身份或内容标识,那么查询转发表,转发表里记载了标识内容是否存在本地数据库中,如果是,那么返回相应的标识内容,否则执行步骤C;Step B, local identification data query: When the nearest multi-mode network node receives the request from the user, it will distinguish according to the query identification. If it is an IP address, continue the traditional DNS query process, if it is an identity or content identification , Then query the forwarding table, the forwarding table records whether the identification content exists in the local database, if it is, then return the corresponding identification content, otherwise go to step C;
步骤C,请求查询传输:当本地数据库内没有相应的标识内容时,将此查询请求上传至上一级网络节点之中,上一级网络节点在接受到下一级所发送的查询请求之后,将按照步骤A至步骤B进行查询,如果查询到相应的标识内容,将返回给相应的内容标识给下一级网络节点,否则,将此查询请求接着传递给上一级网络节点,直到顶级域的网络节点;Step C, request for query transmission: when there is no corresponding identification content in the local database, upload the query request to the upper-level network node. After receiving the query request sent by the next-level network node, Follow steps A to B to query. If the corresponding identification content is queried, it will be returned to the corresponding content identification to the next-level network node. Otherwise, the query request will be passed to the upper-level network node until the top-level domain Network node
步骤D,标识查询验证及互通:若顶级域节点在查询到相关已被注册标识之后,将自动根据现有网络的动态拓扑结构来下发相关的最短路径,网络中的转发线路上的相关多模网络节点将收到新的转发路径表,通过多跳路由建立数据传输通路;若顶级域内节点未查询到相应的标识,同时查询数据库中该标识对应的其他网络标识信息,进行步骤E;Step D, identification query verification and intercommunication: If the top-level domain node finds the related registered identification, it will automatically issue the related shortest path according to the dynamic topology of the existing network. There are many related links on the forwarding line in the network. The modular network node will receive the new forwarding path table and establish a data transmission path through multi-hop routing; if the node in the top-level domain does not find the corresponding identifier, at the same time query the database for other network identifier information corresponding to the identifier, proceed to step E;
步骤E,标识请求下发:顶级域内网络节点将根据原标识以及转换标识后的第一个前缀对查询请求进行下发至指定的网络域,直至到达查询请求所指定的最下级网络节点进行本地查询;若成功查询到相应标识内容,则将相应的资源内容传递给查询请求方,否则,返回查询错误信息。Step E: Issuing the identification request: The network node in the top-level domain will issue the query request to the specified network domain according to the original identification and the first prefix after the conversion, until it reaches the lowest-level network node specified by the query request for local Query; if the corresponding identification content is successfully queried, the corresponding resource content will be passed to the query requester, otherwise, the query error message will be returned.
作为本发明的进一步改进,网络系统中的资源均具有相对应的多种标识,用以指代其内容名字、发布者身份、空间地理位置,通过标识间的绑定和互通,网络中各方的内容发布和访问行为可以得到有效的控制和监管;同时,将多模网络标识直接运用于网络层的寻址过程中,通过多模标识的动态匹配和互通技术,用户可以在多种寻址方式间做出选择,以应对复杂多变的应用需求和网络环境。As a further improvement of the present invention, the resources in the network system all have corresponding multiple identifiers to refer to their content name, publisher identity, and spatial geographic location. Through the binding and intercommunication between the identifiers, all parties in the network The content publishing and access behavior of the Internet can be effectively controlled and supervised; at the same time, the multi-mode network identity is directly used in the addressing process of the network layer. Through the dynamic matching and intercommunication technology of the multi-mode identity, users can Choose between methods to deal with complex and changeable application requirements and network environments.
作为本发明的进一步改进,除传统的IP地址外,寻址过程基于以下三种标识:As a further improvement of the present invention, in addition to the traditional IP address, the addressing process is based on the following three types of identification:
面向内容名字的寻址:使用层级化的字符串标识网络中的每一个资源,为了支持直接面向内容名字的寻址过程,多模网络节点均拥有以名字作为键 的转发信息表,以记录每个名字对应的转发端口信息;数据的传输以用户驱动的方式进行:内容的请求者将内容名录入兴趣报文中并发送至网络;多模网络节点将兴趣报文的到来端口记录在未决兴趣表中,并查询转发信息表将报文转发,直至其到达一个内容的持有者;通过查询未决兴趣表,包含了请求内容的数据包将沿着兴趣报文的到来路径回溯给请求者;面向内容名字的寻址过程将数据自身和数据所处的具体位置相解耦,为网络系统提供了更大的灵活性;Content name-oriented addressing: Use hierarchical character strings to identify each resource in the network. In order to support the addressing process directly facing content names, multi-mode network nodes have forwarding information tables with names as keys to record each resource. Forwarding port information corresponding to each name; data transmission is carried out in a user-driven manner: the content requester enters the content list into the interest message and sends it to the network; the multi-mode network node records the arrival port of the interest message in the pending In the interest table, and query the forwarding information table to forward the message until it reaches a content holder; by querying the pending interest table, the data packet containing the requested content will be traced back to the request along the arrival path of the interest message The content name-oriented addressing process decouples the data itself and the specific location of the data, providing greater flexibility for the network system;
面向身份的寻址:身份用于局部或者全局唯一地指代一个用户,用户在网络上的行为,包括对网络资源的发布和访问,将受制于其身份决定的具体权限,且任一行为均可以追溯到用户的身份信息;Identity-oriented addressing: Identity is used to uniquely refer to a user locally or globally. The user's behavior on the network, including the release and access to network resources, will be subject to the specific authority determined by its identity, and any behavior Identity information that can be traced back to the user;
面向空间地理位置的寻址:位置信息不但可以代表现实意义上的地理位置,还可以代表抽象空间中的虚拟位置,为防止寻址过程中发生歧义,本系统中两个用户的位置将不会发生重合;面向空间地理位置的寻址过程是:多模网络节点计算每个邻居和目的地之间的几何距离,并贪婪地选取最小者作为转发对象。Addressing for spatial and geographic location: Location information can not only represent geographic location in the real sense, but also virtual location in abstract space. To prevent ambiguity during addressing, the location of two users in this system will not Coincidence occurs; the addressing process for spatial and geographic location is: multi-mode network nodes calculate the geometric distance between each neighbor and the destination, and greedily select the smallest one as the forwarding object.
作为本发明的进一步改进,在所述面向身份的寻址中,身份标识包括公钥、用户本人证件ID、移动电话的IMEI码。As a further improvement of the present invention, in the identity-oriented addressing, the identity identifier includes the public key, the user's own certificate ID, and the IMEI code of the mobile phone.
作为本发明的进一步改进,在所述面向名字的寻址和面向身份的寻址中,采用基于身份标识和组合矩阵的安全机制,在所述安全机制中,采用的密码机制为椭圆曲线加密,若给定椭圆曲线上的基点G和它的阶n,则以正整数r<n作为私钥,而G的r倍点rG=R作为公钥,私钥矩阵(r ij) m×n为m×n阶,其中每个元素r ij均是满足r ij<n的正整数;并通过对应关系r ijG=R ij生成公钥矩阵(R ij) m×n;私钥矩阵仅由密钥管理机构持有,用于用户的私钥分发;而公钥矩阵则由每一个网络节点持有,用于数据的签名认证;密钥管理机构通过用户的身份标识ID和私钥矩阵(r ij)生成用户的私钥r IDAs a further improvement of the present invention, in the name-oriented addressing and identity-oriented addressing, a security mechanism based on identification and a combination matrix is adopted. In the security mechanism, the password mechanism adopted is elliptic curve encryption, If the base point G on the elliptic curve and its order n are given, a positive integer r<n is used as the private key, and the r multiple point rG=R of G is the public key, and the private key matrix (r ij ) m×n is m×n order, where each element r ij is a positive integer satisfying r ij <n; and the public key matrix (R ij ) m×n is generated through the corresponding relationship r ij G=R ij ; the private key matrix is only composed of secret The key management agency holds the user’s private key distribution; the public key matrix is held by each network node and is used for data signature authentication; the key management agency uses the user’s identity ID and the private key matrix (r ij ) Generate the user's private key r ID .
作为本发明的进一步改进,在所述基于身份标识和组合矩阵的安全机制中,私钥生成过程由以下方式实现:基于加密芯片和密码学运算,每个身份标识ID均可以唯一地生成一串下标序列:As a further improvement of the present invention, in the security mechanism based on identification and combination matrix, the private key generation process is implemented in the following way: Based on encryption chips and cryptographic operations, each identification ID can uniquely generate a string Subscript sequence:
GenerateSub(ID)={i 1,i 2,...i l,j 1,j 2,...j l} GenerateSub(ID)={i 1 , i 2 ,...i l , j 1 , j 2 ,...j l }
GenerateSub(ID)表示从身份标识ID生成下标的函数,i 1,i 2...i l表示 矩阵的行坐标,j 1,j 2...j l表示矩阵的列坐标; GenerateSub(ID) represents the function of generating subscripts from the identity ID, i 1 , i 2 ... i l represent the row coordinates of the matrix, and j 1 , j 2 ... j l represent the column coordinates of the matrix;
此时ID对应的私钥为私钥矩阵中下标对应项的加和:At this time, the private key corresponding to the ID is the sum of the subscript corresponding items in the private key matrix:
Figure PCTCN2019073507-appb-000001
Figure PCTCN2019073507-appb-000001
r ID表示用户的私钥,
Figure PCTCN2019073507-appb-000002
代表私钥矩阵(r ij)中行坐标为i 1,i 2...i l,列坐标为j 1,j 2...j l的元素;
r ID represents the user's private key,
Figure PCTCN2019073507-appb-000002
Represents the elements with row coordinates i 1 , i 2 ... i l and column coordinates j 1 , j 2 ... j l in the private key matrix (r ij );
同样,ID对应的公钥可以由验证方通过公钥矩阵和身份标识ID计算出:Similarly, the public key corresponding to the ID can be calculated by the verifier through the public key matrix and the identity ID:
Figure PCTCN2019073507-appb-000003
Figure PCTCN2019073507-appb-000003
R ID表示用户的公钥,
Figure PCTCN2019073507-appb-000004
代表公钥矩阵(R ij)中行坐标为i 1,i 2...i l,列坐标为j 1,j 2...j l的元素;
R ID represents the public key of the user,
Figure PCTCN2019073507-appb-000004
Represents the elements with row coordinates i 1 , i 2 ... i l and column coordinates j 1 , j 2 ... j l in the public key matrix (R ij );
由于G的倍点构成一个交换群,有:Since the multiple points of G constitute a commutative group, there are:
Figure PCTCN2019073507-appb-000005
Figure PCTCN2019073507-appb-000005
r IDG代表基点G的r ID倍点; G r ID r ID of the representative base point G times points;
因此(r ID,R ID)构成私-公钥对关系,通过这种方式,不但完成了身份标识同公钥之间的一一绑定,保障了网络行为的可监管性和可追查性,还省去了频繁的公钥请求流程,提升了网络的实际性能。 Therefore, (r ID , R ID ) constitutes a private-public key pair relationship. In this way, not only the one-to-one binding between the identity and the public key is completed, and the supervisability and traceability of network behavior are guaranteed. It also saves the frequent public key request process, and improves the actual performance of the network.
作为本发明的进一步改进,该方法包括名字和身份间的互通过程,在名字和身份间的互通过程中,将内容的名称与其原发布者的身份标识相绑定,并采用可验证的拓展名用于标识网络资源,其形式如下:As a further improvement of the present invention, the method includes an inter-passing process between name and identity. In the inter-passing process between name and identity, the name of the content is bound to the identity of the original publisher, and a verifiable extension is adopted. Used to identify network resources, the form is as follows:
/UniqueID A/SubID A/Name/Sig(Name,PrK A) /UniqueID A /SubID A /Name/Sig(Name, PrK A )
其中UniqueID A是发布者A的全局唯一的身份标识,不会发生碰撞,由该标识生成用户的公-私钥对;SubID A是A发布该内容时采用的次级身份标识,因网络中的同一用户可能兼有多种身份;Name是层级化的内容名;Sig(Name,PrK A)是A对内容名所做的签名;当内容被用户接收,或被多模网络节点缓存之前,其签名必须被验证以保证其合法性;使用前缀树的数据结构以支持对名字和身份标识的存储和查询操作,在前缀树中,根节点的每条连接边均对应一个用户,我们使用全局唯一的身份标识UniqueID A,用以对各个用户进行指代,每个用户节点均记录着该用户对应的F转发信息表的表项和空间位置信息,前缀树的第二层代表每个用户拥有的多种身份标识,若用户A1以身份
Figure PCTCN2019073507-appb-000006
发布了资源Name1,则其对应的名字节点将成为身份
Figure PCTCN2019073507-appb-000007
的子节点,该名字节点会记录签名Sig(Name1,PrK A1),以及该名字对应的转发信息表的表项和空间位置信息,通过在该前缀树中的查询操作,可以完成名字和身份标识,或同一用户拥有的多种身份标识间的相互转换。
Among them, UniqueID A is the globally unique identity of publisher A. There will be no collision. The user’s public-private key pair is generated from this identity; SubID A is the secondary identity used by A when publishing the content. The same user may have multiple identities; Name is a hierarchical content name; Sig (Name, PrK A ) is A's signature on the content name; when the content is received by the user or cached by the multi-mode network node, its The signature must be verified to ensure its legitimacy; the data structure of the prefix tree is used to support the storage and query operations of names and identities. In the prefix tree, each connection edge of the root node corresponds to a user, and we use global uniqueness The identity identifier UniqueID A is used to refer to each user. Each user node records the entries and spatial location information of the F forwarding information table corresponding to the user. The second layer of the prefix tree represents what each user has Multiple identities, if user A1 is
Figure PCTCN2019073507-appb-000006
If the resource Name1 is released, its corresponding name node will become the identity
Figure PCTCN2019073507-appb-000007
The name node will record the signature Sig (Name1, PrK A1 ), as well as the entry and space location information of the forwarding information table corresponding to the name. Through the query operation in the prefix tree, the name and identity identification can be completed , Or the mutual conversion between multiple identities owned by the same user.
作为本发明的进一步改进,该方法包括位置和名字、身份间的转换过程,在内容名字、身份间的互通过程中,每个用户均对应着一个唯一的现实或虚拟的空间地理位置标识,而对于网络中的某个内容名字,为了减小路由延迟,我们将它的位置标识设置为"持有该名字对应内容的最近的节点位置",由上层控制节点计算并下发;通过将对应的位置信息记录到所述前缀树中,可以完成从名字、身份到空间地理位置的互通操作;为了各用户的位置不会发生碰撞,我们使用空间地理位置-身份的散列表以完成它们间的映射操作。As a further improvement of the present invention, the method includes the conversion process between location, name and identity. In the process of mutual passing between content name and identity, each user corresponds to a unique real or virtual spatial geographic location identifier, and For a certain content name in the network, in order to reduce the routing delay, we set its location identifier to "the position of the nearest node holding the content corresponding to the name", which is calculated and delivered by the upper control node; by setting the corresponding The location information is recorded in the prefix tree, which can complete the interoperability from the name, identity to the spatial geographic location; in order to prevent the location of each user from colliding, we use the spatial geographic location-identity hash table to complete the mapping between them operating.
作为本发明的进一步改进,该方法包括用户管理及隐私保护策略,在用户管理及隐私保护策略中,所有用户终端在网络中发送标识注册请求时,都会捆绑相应的身份信息以保证网络的正常运行,用户用一个指定的哈希函数并加上用户的身份信息中生成身份证书,其身份证书将为该用户在网络中的身份证明,同时将空间地理位置标识作为该用户的辅助标识信息;同时,系统将把该用户的公钥发送给网络监管节点,然后用户使用自己的身份证书对标识注册请求进行签名,并和标识注册请求一起发送给网络监管节点;网络监管节点首先用与用户相同的哈希函数从接收到的标识注册请求中验证用户的合法性,再根据用户的公钥来对附加的签名进行解密, 比较这两个哈希值,若相同则可确认签名属于用户;若标识注册请求被网络监管节点确认,系统将存储该用户的身份证书到分布式数据中,保证以后对该标识内容进行溯源以及监管;系统将对用户所发布的网络内容进行分级,用户访问网络资源时将根据其访问者的身份信息确定访问权限。As a further improvement of the present invention, the method includes user management and privacy protection policies. In the user management and privacy protection policies, when all user terminals send identification registration requests in the network, they will bind corresponding identification information to ensure the normal operation of the network. , The user uses a specified hash function and adds the user’s identity information to generate an identity certificate. The identity certificate will be the identity proof of the user in the network, and the spatial geographic location identifier will be used as the user’s auxiliary identification information; , The system will send the user’s public key to the network supervision node, and then the user uses his own identity certificate to sign the identity registration request, and sends it to the network supervision node together with the identity registration request; the network supervision node first uses the same The hash function verifies the legitimacy of the user from the received logo registration request, then decrypts the attached signature according to the user’s public key, compares the two hash values, and if they are the same, it can be confirmed that the signature belongs to the user; The registration request is confirmed by the network supervision node. The system will store the user’s identity certificate in distributed data to ensure that the identification content will be traced and supervised in the future; the system will classify the network content published by the user, and when the user accesses network resources The access authority will be determined based on the identity information of its visitors.
作为本发明的进一步改进,该方法包括个人用户接入网络步骤,在个人用户接入网络步骤中,用户通过传统Internet接入该网络系统时,网络节点将记录该用户终端的MAC地址作为身份标识存储到网络中,同时还将记录该用户终端的空间地理位置,其形式为空间三维坐标,对于手机用户而言,将同时记录该手机的IMEI码作为身份认证信息的一部分,在每个网络域的边界处设有相应的网关设备,保证用户可以通过多种网络标识访问互联网资源;用户通过新型网络标识接入网络时,将在用户的本地节点存储相关的身份信息,包括不限于用户的指纹、虹膜等具有追溯用户身份的生物信息,该身份信息只存放于用户节点本地用于生成用户签名,并不在多模标识网络中传输;同时,将个人用户的身份标识与其发布的各种内容标识相绑定,其身份标识作为该网络内容的一种寻址标识,方便网络中其余节点直接通过用户标识对网络资源进行寻址,提高网络资源查询效率。As a further improvement of the present invention, the method includes the step of personal user accessing the network. In the step of personal user accessing the network, when the user accesses the network system through the traditional Internet, the network node will record the MAC address of the user terminal as an identity identifier Stored in the network, it will also record the spatial geographic location of the user terminal in the form of three-dimensional coordinates. For mobile phone users, the IMEI code of the mobile phone will be recorded as part of the identity authentication information at the same time. Corresponding gateway equipment is installed at the border of the, to ensure that users can access Internet resources through a variety of network identifiers; when users access the network through the new network identifier, relevant identity information will be stored in the user’s local node, including but not limited to the user’s fingerprint , Iris and other biological information with traceable user identity, the identity information is only stored locally in the user node to generate user signatures, and is not transmitted in the multi-mode identity network; at the same time, the identity of the individual user is identified with various content identifications published In combination, its identity is used as an addressing identifier for the network content, which facilitates other nodes in the network to directly address network resources through user identifiers, and improves the efficiency of network resource query.
作为本发明的进一步改进,该方法包括企业用户接入网络步骤,在企业用户接入网络步骤中,企业用户将捆绑政府或专业机构所颁发的身份识别码作为身份标识以登陆网络,其发布的网络资源也将绑定其企业身份信息,企业用户所发布的网络资源及服务器所在的空间地理位置标识将记录在所在域的网络监管节点区块链上用于安全监管及数据保护。As a further improvement of the present invention, the method includes the step of enterprise user accessing the network. In the step of enterprise user accessing the network, the enterprise user will bind the identity identification code issued by the government or professional organization as the identity identifier to log on to the network, and the The network resources will also be bound to their corporate identity information, and the network resources issued by corporate users and the spatial geographic location identification of the server will be recorded on the blockchain of the network supervision node in the domain for security supervision and data protection.
本发明还提供了一种支持多模标识网络寻址渐进去IP的系统,包括:存储器、处理器以及存储在所述存储器上的计算机程序,所述计算机程序配置为由所述处理器调用时实现本发明所述的方法的步骤。The present invention also provides a system supporting multi-mode identification network addressing progressively IP, including: a memory, a processor, and a computer program stored on the memory, the computer program is configured to be called by the processor Implement the steps of the method described in the present invention.
本发明还提供了一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,所述计算机程序配置为由处理器调用时实现本发明所述方法的步骤。The present invention also provides a computer-readable storage medium that stores a computer program, and the computer program is configured to implement the steps of the method of the present invention when called by a processor.
本发明的有益效果是:本发明提出了一套融合区块链的新型网络多模标识产生管理及其路由寻址系统,利用多模标识动态适配及互通技术来突破现有网络IP层细腰的性能以及安全瓶颈;使用分布式区块链共识算法实现互联网共管共治的本愿。网络所有的网络资源都将锁存在区块链上,保证网络资源真实可信、不被篡改;使用高效能、低开销的分布式存储技术来实现多模标识路由的安全性以及不可篡改性;同时,引入结合生物身份 特征信息的用户实名登记及入网登录管理策略以及隐私保护的签名策略,降低系统的管理成本以及提高接入节点信息的隐私安全。The beneficial effects of the present invention are: the present invention proposes a new network multi-mode identification generation management and routing addressing system that integrates blockchain, and uses multi-mode identification dynamic adaptation and intercommunication technology to break through the existing network IP layer fineness The performance and security bottlenecks of the waist; the use of distributed blockchain consensus algorithms to achieve the original wish of Internet co-management and co-governance All network resources of the network will be locked on the blockchain to ensure that the network resources are authentic and not tampered with; high-performance, low-overhead distributed storage technology is used to realize the security and non-tampering of multi-mode identification routing; At the same time, the introduction of user real-name registration and network login management strategies combined with biometric identity information and signature strategies for privacy protection are introduced to reduce system management costs and improve the privacy and security of access node information.
附图说明Description of the drawings
图1是本发明的总体架构图。Figure 1 is a diagram of the overall architecture of the present invention.
图2是本发明的基于身份标识和组合矩阵的安全机制示意图。Figure 2 is a schematic diagram of the security mechanism based on the identity identification and the combined matrix of the present invention.
图3是本发明的前缀树的数据结构示意图。Figure 3 is a schematic diagram of the data structure of the prefix tree of the present invention.
具体实施方式detailed description
缩略语和关键术语定义:Definitions of acronyms and key terms:
多模标识网络:多种路由标识并存的网络。多种路由共存是指以特定寻址方式(多态寻址)为依据,建立满足所需的各种约束属性的网络路由过程。其主要支持多种网络体系结构并存,满足多种应用业务需求。Multi-mode identification network: a network where multiple routing identifications coexist. The coexistence of multiple routes refers to the establishment of a network routing process that satisfies various constraint attributes based on a specific addressing mode (polymorphic addressing). It mainly supports the coexistence of multiple network architectures to meet the needs of multiple application services.
SDN(Software Defined Network),软件定义网络。其核心通过将网络设备的控制面与数据面分离开来,从而实现了网络流量的灵活控制,使网络作为管道变得更加智能,为核心网络及应用的创新提供了良好的平台。SDN (Software Defined Network), software defined network. Its core realizes flexible control of network traffic by separating the control plane and data plane of network equipment, making the network more intelligent as a pipeline, and providing a good platform for the innovation of core networks and applications.
CCN(Content-Centric Networking),命名数据网络。采用名字为网络路由标识,通过多模网络节点来缓存内容,从而使数据传输更快,并能提高内容的检索效率。CCN (Content-Centric Networking), named data network. The name is used as the network routing identifier, and the content is cached through multi-mode network nodes, so that data transmission is faster and the retrieval efficiency of content can be improved.
本发明公开了一种支持多模标识网络寻址渐进去IP的方法,如图1所示为本发明网络总体架构,整个新型多模标识的网络系统采用自上到下层级化网络域进行划分。其中网络的顶级域由各个国家的政府机构作为顶级标识管理节点,其共同维持一条联盟链来达成全网共识,实现互联网共管共治的本愿。网络所有的网络资源都将锁存在区块链上,保证网络资源真实可信、不被篡改。一级域及其它域为相应国家及专业机构管理,其域内的标识管理方式、标识注册方案及共识算法可以不同,其具体实现细节也可不同,通过低耦合的方式来保证系统之间的安全性以及实现各层级之间的特殊性以及定制性。上下域之间通过网络监管节点作为数据访问接口以实现层级化的数据传输。互联网管控的权利交由全世界互联网参与者,不再是某个独立的机构垄断,实现后IP时代网络空间的多边共管共治共享,平等开放。The present invention discloses a method for supporting multi-mode identification network addressing to gradually remove IP. Figure 1 shows the overall network architecture of the present invention. The entire new multi-mode identification network system is divided into hierarchical network domains from top to bottom. . Among them, the top-level domains of the network are managed by the government agencies of various countries as the top-level identity management nodes, and they jointly maintain an alliance chain to reach a consensus of the entire network and realize the original wish of Internet co-management and co-governance. All network resources on the network will be locked on the blockchain to ensure that the network resources are authentic and not tampered with. The first-level domains and other domains are managed by corresponding countries and professional institutions. The logo management methods, logo registration schemes and consensus algorithms in their domains can be different, and their specific implementation details can also be different. Low coupling is used to ensure the security between systems And to realize the particularity and customization between each level. The upper and lower domains use network supervisory nodes as data access interfaces to realize hierarchical data transmission. The power of Internet management and control is handed over to Internet participants all over the world, and is no longer monopolized by an independent organization. It realizes multilateral co-management, co-governance and sharing of cyberspace in the post-IP era, and equality and openness.
新型网络系统中存在监管节点、个人用户以及企业用户等网络节点。每个域内均有相应的网络监管节点,主要负责域内用户管理、标识注册、标识转换以及标识路由等服务,同时每个网络监管节点存在面向内容网络标识,空间地理位置标识、身份信息及IP地址等多模标识。个人用户包括 传统意义上的个人用户以及物联网时代的终端节点等在网络中带有移动特性的网络接入节点。企业用户包括政府机关、专业机构、公司及具有内容发布权的网站等组织机构。There are network nodes such as supervisory nodes, individual users and enterprise users in the new network system. Each domain has a corresponding network supervision node, which is mainly responsible for services such as user management, identity registration, identity conversion and identity routing in the domain. At the same time, each network supervision node has content-oriented network identity, spatial geographic location identity, identity information and IP address And other multi-mode logos. Individual users include individual users in the traditional sense and terminal nodes in the Internet of Things era that have mobile network access nodes in the network. Enterprise users include government agencies, professional organizations, companies, and websites with content publishing rights and other organizations.
新型网络支持包括身份标识、内容标识、空间地理位置标识及IP地址标识等多种标识共存的网络层路由寻址。其网络中的所有的资源的内容标识均会和发布者的身份标识相互绑定,用户登陆网络时的空间信息标识及访问的网络资源将记录在所在域的网络监管节点区块链上用于安全监管及数据保护。The new network supports network layer routing addressing where multiple identifiers such as identity identifiers, content identifiers, spatial geographic location identifiers, and IP address identifiers coexist. The content identifiers of all resources in its network will be bound to the identity of the publisher. The spatial information identifiers and network resources accessed when users log on to the network will be recorded on the blockchain of the network supervision node of the domain for use Security supervision and data protection.
由于新型网络的所有各方发布内容和访问行为都受到有效的保护及管理,其接入网络所产生的行为不可抵赖。任何网络攻击或非法行为也将被域内区块链记录下来,因此以这些标识的使用将使得网络空间处于有序与安全的状态,将引导用户的各种流量承载到与身份绑定的新型标识网络如面向内容标识、身份标识上来。而自然的减少在没有任何安全保障的IP网络流量。追求高可信服务的信息发布方将以他们的信息发布到新型标识上,从而自然引导网络流量及体系的去IP化。Since all parties in the new network publish content and access behaviors are effectively protected and managed, the behaviors generated by their access to the network cannot be denied. Any cyber attacks or illegal behaviors will also be recorded by the blockchain within the domain. Therefore, the use of these identifiers will make the cyberspace in an orderly and safe state, and will guide users' various traffic to a new type of identity bound to the identity The network is for content identification and identity identification. The natural reduction in IP network traffic without any security guarantees. Information publishers pursuing high-credibility services will publish their information on the new logo, which will naturally lead to the de-IPization of network traffic and systems.
本发明包括用户接入网络流程,具体包括个人用户接入网络步骤和企业用户接入网络步骤。The present invention includes the user access network process, specifically including the steps of individual users accessing the network and enterprise users accessing the network.
个人用户接入网络步骤:Steps for individual users to access the network:
在该网络中IP标识并不作为主要的路由寻址标识。用户通过传统Internet接入该网络系统时,网络节点将记录该用户终端的MAC地址作为身份标识存储到网络中,其形式为cn/guangdong/shenzhen/44-8A-5B-85-58-D2。同时还将记录该用户终端的空间地理位置标识,其形式为空间三维坐标。对于手机用户而言,将同时记录该手机的IMEI码作为身份认证信息的一部分。在每个网络域的边界处设有相应的网关设备,保证用户可以通过多种网络标识访问互联网资源。The IP identification is not used as the main routing identification in this network. When a user accesses the network system through the traditional Internet, the network node will record the MAC address of the user terminal as an identification and store it in the network in the form of cn/guangdong/shenzhen/44-8A-5B-85-58-D2. At the same time, the spatial geographic location identifier of the user terminal will be recorded in the form of three-dimensional spatial coordinates. For mobile phone users, the IMEI code of the mobile phone will be recorded as part of the identity authentication information. Corresponding gateway equipment is provided at the boundary of each network domain to ensure that users can access Internet resources through multiple network identifiers.
用户通过新型网络标识接入网络时,将存储用户接入传统Internet全部信息。同时将在用户的本地节点存储相关的身份信息,包括不限于用户的指纹、虹膜等特定的具有追溯用户身份的生物信息。该身份信息只存放于用户节点本地用于生成用户签名,并不在新型多模标识网络中传输。同时,在未来物联网场景、5G发展、个人用户生活习惯改变下,移动接入方式将成为互联网的主要接入方式之一。将个人用户特定的身份标识与其发布的各种内容标识相绑定,其身份标识作为该网络内容的一种寻址标识,方便网络中其余节点直接通过用户标识对网络资源进行路由寻址,提高网 络资源查询效率。When a user accesses the network through the new network identifier, all information about the user's access to the traditional Internet will be stored. At the same time, relevant identity information will be stored in the user's local node, including but not limited to the user's fingerprint, iris and other specific biological information with traceable user identity. The identity information is only stored locally in the user node for generating user signatures, and is not transmitted in the new multi-mode identification network. At the same time, in the future Internet of Things scenes, 5G development, and changes in individual users’ living habits, mobile access will become one of the main Internet access methods. Bind the specific identity of an individual user with the various content identities that it publishes, and its identity is used as an addressing identifier for the network content, which facilitates the other nodes in the network to directly route and address network resources through the user’s identity, improving The efficiency of network resource query.
企业用户接入网络步骤:Steps for enterprise users to access the network:
企业用户将捆绑政府或专业机构所颁发的身份识别码作为身份标识以登陆网络,其发布的网络资源也将绑定其企业身份信息。企业用户所发布的网络资源及服务器所在的空间信息标识将记录在所在域的网络监管节点区块链上用于安全监管及数据保护。Enterprise users will bind the ID code issued by the government or professional organization as their identity to log on to the network, and the network resources they publish will also be bound to their corporate identity information. The network resources issued by the enterprise users and the spatial information identification of the server will be recorded on the blockchain of the network supervision node of the domain for security supervision and data protection.
本发明包括网络路由方案,网络路由方案包括标识注册步骤和网络资源请求步骤。The present invention includes a network routing scheme, which includes an identification registration step and a network resource request step.
所述标识注册步骤包括:The logo registration step includes:
步骤1,注册资源:网络节点接收用户的资源注册内容,即在该网络中,任何能够被路由寻址的资源都要求先向网络节点注册,然后才能被其他的网络设备访问。所以用户首先要向任意一个网络节点注册名称为“/pku/movie/hello.mkv”的内容。宣称其对该内容的所有权。同时网络节点将根据内容存放的位置节点加上地理空间位置标识以及内容发布人的身份标识。 Step 1. Register resources: The network node receives the user's resource registration content, that is, in the network, any resource that can be routed must be registered with the network node before being accessed by other network devices. So the user must first register the content named "/pku/movie/hello.mkv" to any network node. Claim its ownership of the content. At the same time, the network node will add the geospatial location identifier and the identity identifier of the content publisher according to the location node where the content is stored.
步骤2,网络节点认证:本域的网络节点在接收到用户传输的标识注册请求之后,网络节点将对其内容及其用户信息进行审查(审查包括人工审查或自动审查,自动审查可以采用区块链的智能合约),随后对该资源标识进行注册,随后将产生的标识注册请求上传至上一级域并加上本地的标识前缀;Step 2: Network node authentication: After the network node in this domain receives the identity registration request transmitted by the user, the network node will review its content and user information (review includes manual review or automatic review, and automatic review can use blocks Chain smart contract), then register the resource identifier, and then upload the generated identifier registration request to the upper-level domain and add the local identifier prefix;
步骤3,标识注册请求传输:当上一级网络节点接收到标识注册请求之后,将按照设定的数据传输协议将其注册标识报文传输到其所在域的控制器进行后续认证及注册操作;Step 3. Identity registration request transmission: After the upper-level network node receives the identity registration request, it will transmit its registration identity message to the controller of its domain according to the set data transmission protocol for subsequent authentication and registration operations;
步骤4,标识校验:顶级域内的网络节点在接收到其下级网络域的标识注册请求之后,将对该请求的数据进行校验并将返回给原申请节点相应的确认信号;同时将采用设定的分布式存储方案来保证所有注册的标识均无法被篡改,原标识信息将存储在顶级域的分布式数据库之上,每经过一个设定的时间之后,全网将进行相应的数据库同步工作以确认各个顶级域名之间的资源标识信息对等且统一。Step 4. Identity verification: After receiving the identity registration request of its subordinate network domain, the network node in the top-level domain will verify the requested data and return the corresponding confirmation signal to the original application node; at the same time, it will adopt the design A distributed storage scheme is set to ensure that all registered logos cannot be tampered with. The original identification information will be stored in the distributed database of the top-level domain. After a set time has passed, the entire network will synchronize the corresponding database. To confirm that the resource identification information between each top-level domain name is equal and unified.
所述网络资源请求步骤包括:The network resource request step includes:
步骤A,查询请求:向最近的网络节点传送查询请求;当请求的内容已获得网络注册的时候,客户端即可使用相应的统一资源标识符获取所需要的网络资源。Step A, query request: send a query request to the nearest network node; when the requested content has been registered on the network, the client can use the corresponding uniform resource identifier to obtain the required network resources.
步骤B,本地标识数据查询:当最近的多模网络节点接收到用户所发出的请求之后,将根据查询的标识进行区分,如果是IP地址则继续传统的DNS查询流程,如果是身份或内容标识,那么查询转发表,转发表里记载了标识内容是否存在本地数据库中,如果是,那么返回相应的标识内容,否则执行步骤C;Step B, local identification data query: When the nearest multi-mode network node receives the request from the user, it will distinguish according to the query identification. If it is an IP address, continue the traditional DNS query process, if it is an identity or content identification , Then query the forwarding table, the forwarding table records whether the identification content exists in the local database, if it is, then return the corresponding identification content, otherwise go to step C;
步骤C,请求查询传输:当本地数据库内没有相应的标识内容时,将此查询请求上传至上一级网络节点之中,上一级网络节点在接受到下一级所发送的查询请求之后,将按照步骤A至步骤B进行查询,如果查询到相应的标识内容,将返回给相应的内容标识给下一级网络节点,否则,将此查询请求接着传递给上一级网络节点,直到顶级域的网络节点;Step C, request for query transmission: when there is no corresponding identification content in the local database, upload the query request to the upper-level network node. After receiving the query request sent by the next-level network node, Follow steps A to B to query. If the corresponding identification content is queried, it will be returned to the corresponding content identification to the next-level network node. Otherwise, the query request will be passed to the upper-level network node until the top-level domain Network node
步骤D,标识查询验证及互通:若顶级域节点在查询到相关已被注册标识之后,将自动根据现有网络的动态拓扑结构来下发相关的最短路径,网络中的转发线路上的相关多模网络节点将收到新的转发路径表,通过多跳路由建立数据传输通路;若顶级域内节点未查询到相应的标识,同时查询数据库中该标识对应的其他网络标识信息,进行步骤E;Step D, identification query verification and intercommunication: If the top-level domain node finds the related registered identification, it will automatically issue the related shortest path according to the dynamic topology of the existing network. There are many related links on the forwarding line in the network. The modular network node will receive the new forwarding path table and establish a data transmission path through multi-hop routing; if the node in the top-level domain does not find the corresponding identifier, at the same time query the database for other network identifier information corresponding to the identifier, proceed to step E;
步骤E,标识请求下发:顶级域内网络节点将根据原标识以及转换标识后的第一个前缀对查询请求进行下发至指定的网络域,直至到达查询请求所指定的最下级网络节点进行本地查询;若成功查询到相应标识内容,则将相应的资源内容传递给查询请求方,否则,返回查询错误信息。Step E: Issuing the identification request: The network node in the top-level domain will issue the query request to the specified network domain according to the original identification and the first prefix after the conversion, until it reaches the lowest-level network node specified by the query request for local Query; if the corresponding identification content is successfully queried, the corresponding resource content will be passed to the query requester, otherwise, the query error message will be returned.
多模标识网络寻址:Multi-mode identification network addressing:
新型网络系统中的资源均具有相对应的多种标识,用以指代其内容名字、发布者身份、网络位置等信息,通过标识间的绑定和互通,网络中各方的内容发布和访问行为可以得到有效的控制和监管。同时,我们将多模网络标识直接运用于网络层的寻址过程中,通过多模标识的动态匹配和互通技术,用户可以在多种寻址方式间做出选择,以应对复杂多变的应用需求和网络环境,以此提升了系统的稳定性和适应性,并为我们今后设计更具创新性的智能寻址策略提供了可能。The resources in the new network system have a variety of corresponding identifiers to refer to their content name, publisher identity, network location and other information. Through the binding and intercommunication between the identifiers, the content release and access of all parties in the network Behavior can be effectively controlled and supervised. At the same time, we apply the multi-mode network identification directly to the addressing process of the network layer. Through the dynamic matching and intercommunication technology of the multi-mode identification, the user can choose between multiple addressing methods to cope with complex and changeable applications. Demands and network environment have improved the stability and adaptability of the system, and made it possible for us to design more innovative intelligent addressing strategies in the future.
除传统的IP地址外,寻址过程主要基于以下三种标识(随之技术的进步,可以扩展加入有其它标识):In addition to the traditional IP address, the addressing process is mainly based on the following three identifiers (with the advancement of technology, it can be extended to include other identifiers):
面向内容名字的寻址:类似于命名数据网络(Named Data Networking,NDN),我们使用层级化的字符串标识网络中的每一个资源,形如"com/ndn/pku/document/01.pdf"。为了支持直接面向内容名字的寻址过程,多模网络节点均拥有以名字作为键的转发信息表(FIB),以记录每个名字对 应的转发端口信息。数据的传输以用户驱动的方式进行:内容的请求者将内容名录入兴趣(Interest)报文中并发送至网络;多模网络节点将兴趣报文的到来端口记录在未决兴趣表(Pending Information Table,PIT)中,并查询FIB将报文转发,直至其到达一个内容的持有者;通过查询PIT,包含了请求内容的数据包将沿着兴趣报文的到来路径回溯给请求者。面向名字的寻址过程将数据自身和数据所处的具体位置相解耦,为网络系统提供了更大的灵活性,同时,名字可以传达更为丰富的信息,有效解决了IP地址语义过载的问题。Content name-oriented addressing: Similar to Named Data Networking (NDN), we use hierarchical strings to identify each resource in the network, like "com/ndn/pku/document/01.pdf" . In order to support the addressing process directly facing content names, multi-mode network nodes all have a forwarding information table (FIB) with names as keys to record the forwarding port information corresponding to each name. The data transmission is carried out in a user-driven manner: the content requester enters the content list into the Interest message and sends it to the network; the multi-mode network node records the arrival port of the interest message in the pending interest table (Pending Information). Table, PIT), and query FIB to forward the message until it reaches a content holder; by querying PIT, the data packet containing the requested content will be traced back to the requester along the arrival path of the interest message. The name-oriented addressing process decouples the data itself and the specific location of the data, which provides greater flexibility for the network system. At the same time, the name can convey richer information, effectively solving the semantic overload of the IP address. problem.
面向身份的寻址:身份用于局部或者全局唯一地指代一个用户,常用的身份标识包括公钥,用户本人证件ID,移动电话的IMEI码等等。用户在网络上的行为,包括对网络资源的发布和访问,将受制于其身份决定的具体权限,且任一行为均可以追溯到用户的身份信息,由此提高了网络的可监管性,铲除了不法行为滋生的土壤。Identity-oriented addressing: Identity is used to uniquely refer to a user locally or globally. Commonly used identities include public keys, user IDs, IMEI codes of mobile phones, and so on. The user’s behavior on the network, including the release and access to network resources, will be subject to the specific authority determined by his identity, and any behavior can be traced back to the user’s identity information, thereby improving the network’s supervisability and eliminating The breeding ground for wrongdoing.
面向空间地理位置的寻址:空间地理位置不但可以代表现实意义上的地理位置,如北斗卫星系统或GPS全球定位位置信息,还可以代表抽象空间中的虚拟位置,如将网络映射到几何空间中后节点获取的数学坐标。为防止寻址过程中发生歧义,本系统中两个用户的位置将不会发生重合。Addressing for spatial geographic location: spatial geographic location can not only represent geographic location in a realistic sense, such as Beidou satellite system or GPS global positioning location information, but also represent virtual locations in abstract space, such as mapping the network to geometric space The mathematical coordinates obtained by the back node. In order to prevent ambiguity in the addressing process, the positions of the two users in this system will not overlap.
面向位置的寻址过程一般基于距离计算,即多模网络节点计算每个邻居和目的地之间的几何距离,并贪婪地选取最小者作为转发对象。由于该方法具有极小的存储占用和计算开销,面向位置的寻址可以有效地应对网络规模较大时路由表的膨胀问题,从而提高了网络的可扩展性。The location-oriented addressing process is generally based on distance calculation, that is, multi-mode network nodes calculate the geometric distance between each neighbor and the destination, and greedily select the smallest one as the forwarding object. Because this method has very small storage occupation and computational overhead, location-oriented addressing can effectively deal with the expansion of the routing table when the network is large, thereby improving the scalability of the network.
多模标识转换过程:Multi-mode logo conversion process:
1.基于身份标识和组合矩阵的安全机制:1. Security mechanism based on identification and combination matrix:
面向名字的寻址过程将数据和其所在的具体地点相分离,提供了更大的灵活性和可拓展性;但与之相对地,数据和地点的解绑同样引入了一定的安全隐患。The name-oriented addressing process separates the data from the specific location, providing greater flexibility and scalability; but in contrast, the unbinding of data and location also introduces certain security risks.
因此,现有的内容中心网络架构通常使用“可验证的名字”用于数据的请求流程,即每个名字必须包含其发布者的公钥获取方式,以及发布者对名字和内容所做的签名。数据报文在被多模网络节点缓存,或被请求者接收之前,必须首先被验证其签名,以保证其名字和内容的完整、安全和可靠。Therefore, the existing content center network architecture usually uses "verifiable names" for the data request process, that is, each name must include the publisher's public key acquisition method, and the publisher's signature on the name and content . Before a data message is cached by a multi-mode network node or received by a requester, its signature must first be verified to ensure the integrity, safety and reliability of its name and content.
由于网络中存在频繁的公钥请求过程,为节约带宽资源、减轻网络的传输压力,本系统采用了基于身份标识和组合矩阵的公私钥生成方案,该 方案的简略描述如下:Due to the frequent public key request process in the network, in order to save bandwidth resources and reduce the transmission pressure of the network, this system adopts a public and private key generation scheme based on identification and a combination matrix. The brief description of the scheme is as follows:
我们采用的密码机制为椭圆曲线加密(Elliptic Curve Cryptography,ECC),在ECC中,若给定椭圆曲线上的基点G和它的阶n,则以正整数r<n作为私钥,而G的r倍点rG=R作为公钥。通过(r,G)计算出R十分简单,而出于椭圆曲线离散对数问题的困难性,通过(R,G)求解出r则在计算上不可行。私钥矩阵(rij) m×n为m×n阶,其中每个元素r ij均是满足r ij<n的正整数;并通过对应关系r ijG=R ij生成公钥矩阵(R ij) m×n。私钥矩阵仅由密钥管理机构持有,用于用户的私钥分发;而公钥矩阵则由每一个网络节点持有,用于数据的签名认证。 The cryptographic mechanism we use is Elliptic Curve Cryptography (ECC). In ECC, if the base point G on the elliptic curve and its order n are given, a positive integer r<n is used as the private key, and G’s r times point rG=R as the public key. It is very simple to calculate R by (r, G), but due to the difficulty of the elliptic curve discrete logarithm problem, it is computationally infeasible to solve for r by (R, G). The private key matrix (rij) m×n is of order m×n, where each element r ij is a positive integer satisfying r ij <n; and the public key matrix (R ij ) is generated through the correspondence relation r ij G=R ij m×n . The private key matrix is only held by the key management agency and used for the user's private key distribution; while the public key matrix is held by each network node and used for data signature authentication.
如图2所示,密钥管理机构通过用户的身份标识ID和私钥矩阵(r ij)生成用户的私钥r ID,举例而言,私钥生成过程可以由以下方式实现:基于加密芯片和密码学运算,每个身份标识ID均可以唯一地生成一串下标序列: As shown in Figure 2, the key management agency generates the user’s private key r ID through the user’s identity ID and private key matrix (r ij ). For example, the private key generation process can be implemented in the following ways: based on an encryption chip and In cryptographic operations, each identification ID can uniquely generate a sequence of subscripts:
GenerateSub(ID)={i 1,i 2,...i l,j 1,j 2,...j l} GenerateSub(ID)={i 1 , i 2 ,...i l , j 1 , j 2 ,...j l }
GenerateSub(ID)表示从身份标识ID生成下标的函数,i 1,i 2...i l表示矩阵的行坐标,j 1,j 2...j l表示矩阵的列坐标; GenerateSub(ID) represents the function of generating subscripts from the identity ID, i 1 , i 2 ... i l represent the row coordinates of the matrix, and j 1 , j 2 ... j l represent the column coordinates of the matrix;
此时ID对应的私钥为私钥矩阵中下标对应项的加和:At this time, the private key corresponding to the ID is the sum of the subscript corresponding items in the private key matrix:
Figure PCTCN2019073507-appb-000008
Figure PCTCN2019073507-appb-000008
r ID表示用户的私钥,
Figure PCTCN2019073507-appb-000009
代表私钥矩阵(r ij)中行坐标为i 1,i 2...i l,列坐标为j 1,j 2...j l的元素;
r ID represents the user's private key,
Figure PCTCN2019073507-appb-000009
Represents the elements with row coordinates i 1 , i 2 ... i l and column coordinates j 1 , j 2 ... j l in the private key matrix (r ij );
同样,ID对应的公钥可以由验证方通过公钥矩阵和身份标识ID计算出:Similarly, the public key corresponding to the ID can be calculated by the verifier through the public key matrix and the identity ID:
Figure PCTCN2019073507-appb-000010
Figure PCTCN2019073507-appb-000010
R ID表示用户的公钥,
Figure PCTCN2019073507-appb-000011
代表公钥矩阵(R ij)中行坐标为 i 1,i 2...i l,列坐标为j 1,j 2...j l的元素;
R ID represents the public key of the user,
Figure PCTCN2019073507-appb-000011
Represents the elements with row coordinates i 1 , i 2 ... i l and column coordinates j 1 , j 2 ... j l in the public key matrix (R ij );
由于G的倍点构成一个交换群,有:Since the multiple points of G constitute a commutative group, there are:
Figure PCTCN2019073507-appb-000012
Figure PCTCN2019073507-appb-000012
r IDG代表基点G的r ID倍点; G r ID r ID of the representative base point G times points;
因此(r ID,R ID)构成私-公钥对关系。通过这种方式,不但完成了身份标识同公钥之间的一一绑定,保障了网络行为的可监管性和可追查性,还省去了频繁的公钥请求流程,提升了网络的实际性能。 Therefore (r ID , R ID ) constitutes a private-public key pair relationship. In this way, not only the one-to-one binding between the identity identifier and the public key is completed, which ensures the supervisability and traceability of network behavior, but also eliminates the frequent public key request process and improves the actual network performance.
2.名字和身份间的转换过程:2. The conversion process between name and identity:
为了维护安全的网络环境,我们将内容的名称与其原发布者的身份标识相绑定,并采用可验证的拓展名用于标识网络资源,其形式如下:In order to maintain a secure network environment, we bind the name of the content to the identity of the original publisher, and use verifiable extensions to identify network resources. The form is as follows:
/UniqueID A/SubID A/Name/Sig(Name,PrK A) /UniqueID A /SubID A /Name/Sig(Name, PrK A )
其中UniqueID A是发布者A的全局唯一的身份标识,不会发生碰撞,由该标识生成用户的公-私钥对;SubID A是A发布该内容时采用的次级身份标识,因网络中的同一用户可能兼有多种身份;Name是层级化的内容名;Sig(Name,PrK A)是A对内容名所做的签名。当内容被用户接收,或被多模网络节点缓存之前,基于上述的安全机制,其签名必须被验证以保证其合法性。由此,网络中的任一资源均可追溯到其原发布者,保障了发布行为的可监管性和网络传输的安全。 Among them, UniqueID A is the globally unique identity of publisher A. There will be no collision. The user’s public-private key pair is generated from this identity; SubID A is the secondary identity used by A when publishing the content. The same user may have multiple identities; Name is a hierarchical content name; Sig (Name, PrK A ) is A's signature on the content name. Before the content is received by the user or cached by the multi-mode network node, based on the above-mentioned security mechanism, its signature must be verified to ensure its legality. As a result, any resource in the network can be traced back to its original publisher, ensuring the supervision of publishing behavior and the security of network transmission.
在该表示方法下,身份可以看作是拓展名的一种特殊形式,即那些内容名为空的情形,因此,我们使用前缀树这一数据结构以支持对名字和身份标识的存储和查询操作:Under this representation method, the identity can be regarded as a special form of the extension name, that is, the content name is empty. Therefore, we use the prefix tree as a data structure to support the storage and query operations of the name and identity. :
图3为组件粒度的前缀树示例,根节点的每条连接边均对应者一个用户,我们使用全局唯一的身份标识UniqueID A,用以对各个用户进行指代, 每个用户节点均记录着该用户对应的FIB表项和空间位置信息。树的第二层代表每个用户拥有的多种身份标识,若用户A1以身份
Figure PCTCN2019073507-appb-000013
发布了资源Name1,则其对应的名字节点将成为身份
Figure PCTCN2019073507-appb-000014
的子节点,该名字节点会记录签名Sig(Name1,PrK A1),以及该名字对应的FIB表项和空间位置信息。通过在该前缀树中的查询操作,我们即可以完成名字和身份标识,或同一用户拥有的多种身份标识间的相互转换。
Figure 3 is an example of a prefix tree with component granularity. Each connection edge of the root node corresponds to a user. We use the globally unique identity UniqueID A to refer to each user. Each user node records the FIB entry and spatial location information corresponding to the user. The second level of the tree represents the multiple identities owned by each user. If user A1 is
Figure PCTCN2019073507-appb-000013
If the resource Name1 is released, its corresponding name node will become the identity
Figure PCTCN2019073507-appb-000014
The name node will record the signature Sig (Name1, PrK A1 ), as well as the FIB entry and space location information corresponding to the name. Through the query operation in the prefix tree, we can complete the mutual conversion between name and identity, or multiple identities owned by the same user.
使用前缀树可以获得如下的优势:1.前缀树对相同的前缀信息进行了压缩合并,从而降低了存储开销;2.前缀树的性质决定了它天然地支持最长前缀匹配(Longest Prefix Matching,LPM)查询模式,与名字在FIB中的匹配模式相一致;3.前缀树记录了各名字和身份间的逻辑关系,以实现它们之间的绑定和转换操作。Using the prefix tree can obtain the following advantages: 1. The prefix tree compresses and merges the same prefix information, thereby reducing storage overhead; 2. The nature of the prefix tree determines that it naturally supports the longest prefix matching (Longest Prefix Matching, LPM) query mode, consistent with the matching mode of the name in the FIB; 3. The prefix tree records the logical relationship between names and identities to achieve binding and conversion operations between them.
3.位置和名字、身份间的转换过程:3. The conversion process between location, name and identity:
如上文所述,每个用户均对应着一个唯一的现实或虚拟的空间位置标识,而对于网络中的某个名字,为了减小路由延迟,我们将它的位置标识设置为"持有该名字对应内容的最近的节点位置",由上层控制节点计算并下发。As mentioned above, each user corresponds to a unique real or virtual spatial location identifier. For a certain name in the network, in order to reduce the routing delay, we set its location identifier to "hold the name The nearest node location of the corresponding content is calculated and delivered by the upper control node.
通过将对应的位置信息记录到上述的前缀树中,我们即可以完成从名字、身份到位置的转换操作。另一方面,考虑到各用户的位置不会发生碰撞,我们使用位置-身份的散列表以完成它们间的映射操作。By recording the corresponding location information in the above prefix tree, we can complete the conversion from name, identity to location. On the other hand, considering that the location of each user will not collide, we use a location-identity hash table to complete the mapping operation between them.
用户管理及隐私保护策略:User management and privacy protection strategy:
所有用户终端在网络中发送标识注册请求时,都会捆绑相应的身份信息以保证网络的正常运行。用户用一个特定的哈希函数并加上用户的身份信息中生成身份证书,其证书将为该用户在网络中的身份证明,同时将地空标识作为该用户的辅助标识信息。同时,系统将把该用户的公钥发送给网络监管节点。然后用户使用自己的身份证书对标识注册请求进行签名,并和标识注册请求一起发送给网络监管节点。网络监管节点首先用与用户相同的哈希函数从接收到的标识注册请求中验证用户的合法性,再根据用户的公钥来对附加的签名进行解密。比较这两个哈希值,若相同则可确认签名属于用户。若标识注册请求被网络监管节点确认,系统将存储该用户的身份证书到分布式数据中,保证以后对该标识内容进行溯源以及监管。同时,系统要求所有标识必须先经过注册才能在网络中被路由以及标识注册时必须添加发布者的身份信息,可以有效降低网络中传播违规违禁的网络内容。其中包括不限于传统IP网络的暗网以及个人隐私数据,有效的提 高了用户的隐私安全性。When all user terminals send an identity registration request in the network, they will bind corresponding identity information to ensure the normal operation of the network. The user uses a specific hash function and adds the user's identity information to generate an identity certificate. The certificate will be the identity proof of the user in the network, and the ground-air identity will be used as the user's auxiliary identification information. At the same time, the system will send the user's public key to the network supervision node. Then the user signs the identity registration request with his own identity certificate and sends it to the network supervision node together with the identity registration request. The network supervision node first uses the same hash function as the user to verify the legitimacy of the user from the received identification registration request, and then decrypts the additional signature according to the user's public key. Compare these two hash values, if they are the same, it can be confirmed that the signature belongs to the user. If the logo registration request is confirmed by the network supervision node, the system will store the user's identity certificate in the distributed data to ensure the traceability and supervision of the logo content in the future. At the same time, the system requires that all logos must be registered before they can be routed in the network and the identity information of the publisher must be added when the logo is registered, which can effectively reduce the spread of illegal network content on the network. These include the dark web and personal privacy data that are not limited to traditional IP networks, effectively improving users' privacy and security.
新型网络系统将引入权限管理策略。系统将对用户所发布的网络内容进行分级。用户访问网络资源时将根据其访问者的身份信息确定访问权限,例如限制学生等特定群体每天的上网时间以及游戏时间。网络内容分级可以有效的保护未成年人身心健康以及促进互联网内容合理合规发展。The new network system will introduce rights management strategies. The system will classify the network content posted by users. When users access network resources, they will determine their access permissions based on the identity information of their visitors, such as restricting the daily online time and game time of specific groups such as students. Online content classification can effectively protect the physical and mental health of minors and promote the development of reasonable and compliant Internet content.
本发明公开了一种支持多模标识网络寻址渐进去IP的系统,包括:存储器、处理器以及存储在所述存储器上的计算机程序,所述计算机程序配置为由所述处理器调用时实现本发明所述的方法的步骤。The present invention discloses a system that supports multi-mode identification network addressing and progressive IP, including: a memory, a processor, and a computer program stored on the memory, and the computer program is configured to be implemented when called by the processor The steps of the method of the present invention.
本发明还公开了一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,所述计算机程序配置为由处理器调用时实现本发明所述的方法的步骤。The present invention also discloses a computer-readable storage medium, the computer-readable storage medium stores a computer program, and the computer program is configured to implement the steps of the method of the present invention when called by a processor.
本发明具有如下有益效果:The present invention has the following beneficial effects:
1.域名的解析服务不再由特定的13台服务器及其附属的镜像服务器提供。互联网管控的权利交由全世界互联网参与者,不再是某个独立的机构垄断,实现后IP时代网络空间的多边共管共治共享,平等开放。1. The domain name resolution service is no longer provided by the specific 13 servers and their affiliated mirror servers. The power of Internet management and control is handed over to Internet participants all over the world, and is no longer monopolized by an independent organization. It realizes multilateral co-management, co-governance and sharing of cyberspace in the post-IP era, and equality and openness.
2.对于政府而言,多模标识网络通过去中心化的区块链技术实现全球共管,避免了国家域名被特定国家抹除,提高了国家网络的安全性。同时,所有各方发布内容和访问行为都受到有效的保护及管理,其接入网络所产生的行为不可抵赖,降低了国家的网络监管成本。2. For the government, the multi-mode identity network realizes global co-management through decentralized blockchain technology, which prevents country domain names from being erased by specific countries and improves the security of the national network. At the same time, all parties’ published content and access behaviors are effectively protected and managed, and their access to the network cannot be denied, which reduces the country’s network supervision costs.
3.对于网络服务提供商而言,在未来物联网场景、5G发展、个人用户生活习惯改变下,移动接入方式将成为互联网的主要接入方式之一。新型多模标识网络通过引入多种网络标识,特别是天生支持移动性的身份标识,提高了网络整体的寻址效率。减少了网络服务提供商因传统网络中移动用户所产生的运维成本。同时,网络的安全性大幅度提升,有效降低了ISP的网络安全风险。3. For network service providers, in the future Internet of Things scenes, 5G development, and changes in personal user habits, mobile access will become one of the main Internet access methods. The new multi-mode identity network improves the overall addressing efficiency of the network by introducing multiple network identities, especially identity identities that naturally support mobility. Reduce the operation and maintenance costs of network service providers due to mobile users in traditional networks. At the same time, the security of the network has been greatly improved, effectively reducing the network security risks of ISPs.
4.对于企业用户而言,企业用户将捆绑政府或专业机构所颁发的身份识别码作为身份标识以登陆网络,其发布的网络资源也将绑定其企业身份信息。由于其内容均锁存在区块链之上,避免了被黑客篡改的风险。4. For enterprise users, the enterprise user will bind the identity identification code issued by the government or professional organization as the identity mark to log in to the network, and the network resources issued by it will also bind its corporate identity information. Since its content is locked on the blockchain, the risk of tampering by hackers is avoided.
5.对于个人用户而言,个人用户将捆绑相应的生物身份信息及其他身份认证信息作为身份标识以登陆网络,其发布的网络资源也将绑定其身份信息。个人用户登陆网络时的空间信息标识及访问的网络资源将记录在所在域的网络监管节点区块链上用于安全监管及数据保护。网络监管节点会拒绝注册、删除及惩处网络中的违规网络资源及恶意用户。相对于传统IP 网络存在的隐私安全问题,该网络系统具有良好的隐私保护性及安全性。5. For an individual user, the individual user will bind the corresponding biometric identity information and other identity authentication information as an identity identifier to log in to the network, and the network resources it publishes will also bind its identity information. The spatial information identification and network resources accessed by individual users when they log on to the network will be recorded on the blockchain of the network supervision node in the domain for security supervision and data protection. The network supervision node will refuse to register, delete and punish violating network resources and malicious users in the network. Compared with the privacy and security problems of traditional IP networks, this network system has good privacy protection and security.
6.对于未成年用户而言,新型多模标识网络在标识注册的同时引入分级管理机制。未成年人使用网络,其访问的内容按各地政府的规定,可是受到有效的管理。减少未成年人沉迷网络的可能性并有效净化未成年人的上网环境。6. For underage users, the new multi-mode identity network introduces a hierarchical management mechanism while identity registration. When minors use the Internet, the content they visit is subject to effective management in accordance with local government regulations. Reduce the possibility of minors indulging in the Internet and effectively purify minors’ online environment.
7.引入多模标识寻址路由,网络将更加关注网络资源本身或用户本身而非传统网络资源存放位置。避免了传统IP网络所存在的性能细腰问题,极大的提高了网络资源传输的效率。7. Introducing multi-mode identification addressing routing, the network will pay more attention to the network resource itself or the user itself rather than the storage location of traditional network resources. It avoids the performance problem of the traditional IP network and greatly improves the efficiency of network resource transmission.
8.引入用户身份标识来提高网络安全性及可用性。所有标识在注册的时候均需要绑定用户特定的生物身份信息,密码秘钥,才能完成标识注册,该网络中每一步注册信息都将完成全的保存,可以对恶意行为进行有效的追溯,以达到网络中所有网络资源均可管可控。同时大幅度降低用户隐私泄露的风险。8. Introduce user identification to improve network security and usability. All logos need to bind user-specific biometric identity information and password keys to complete logo registration when registering. Each step of the registration information in the network will be fully saved, which can effectively trace malicious behaviors. All network resources in the network can be managed and controlled. At the same time, the risk of user privacy leakage is greatly reduced.
9.由于新型网络的所有各方发布内容和访问行为都受到有效的保护及管理,其接入网络所产生的行为不可抵赖。任何网络攻击或非法行为也将被域内区块链记录下来,因此以这些标识的使用将使得网络空间处于有序与安全的状态,将引导用户的各种流量承载到与身份绑定的新型标识网络如面向内容标识、身份标识上来。而自然的减少在没有任何安全保障的IP网络流量。追求高可信服务的信息发布方将以他们的信息发布到新型标识上,从而自然引导网络流量及体系的去IP化。9. Since all parties of the new network publish content and access behaviors are effectively protected and managed, the behaviors generated by their access to the network cannot be denied. Any cyber attacks or illegal behaviors will also be recorded by the blockchain within the domain. Therefore, the use of these identifiers will make the cyberspace in an orderly and safe state, and will guide users' various traffic to a new type of identity bound to the identity The network is for content identification and identity identification. The natural reduction in IP network traffic without any security guarantees. Information publishers pursuing high-credibility services will publish their information on the new logo, which will naturally lead to the de-IPization of network traffic and systems.
10.可以在不改变系统架构的情况下支持对象存储地址的解析以及已有的域名解析系统。10. It can support the resolution of object storage addresses and the existing domain name resolution system without changing the system architecture.
11.提出了一种基于身份标识和组合矩阵的密钥生成机制,通过加密芯片和密码学算法,在组合矩阵的基础上,每个身份标识均可以唯一地生成椭圆曲线加密算法的密钥对。由此,仅依靠公钥矩阵和发布者的身份标识,数据的接受方就可以计算出其公钥,从而完成其签名认证。该机制不但将身份标识与密码学信息相绑定,有利于面向身份的网络管理;还省去了频繁的公钥分发和请求过程,提升了网络的利用效率。11. Proposed a key generation mechanism based on identification and combination matrix. Through the encryption chip and cryptographic algorithm, on the basis of the combination matrix, each identification can uniquely generate the key pair of the elliptic curve encryption algorithm . Therefore, only relying on the public key matrix and the identity of the issuer, the recipient of the data can calculate its public key, thereby completing its signature verification. This mechanism not only binds the identity identifier to the cryptographic information, which is conducive to identity-oriented network management; it also eliminates the frequent public key distribution and request process, and improves the efficiency of network utilization.
12.提出了一种支持多模网络标识的寻址策略,通过名字标识,身份标识和空间位置标识之间的相互转换,用户可以灵活选取最适合的寻址方式以应对复杂多变的网络环境与实际需求,从而提升了该系统的适应性。同时,网络资源名与原发布者标识的绑定提升了网络行为的可监管性和可追查性,保证了网络传输的安全可靠。12. An addressing strategy that supports multi-mode network identification is proposed. Through the mutual conversion between name identification, identity identification and spatial location identification, users can flexibly choose the most suitable addressing method to cope with complex and changeable network environments And actual demand, thereby enhancing the adaptability of the system. At the same time, the binding of the network resource name and the original publisher's identity improves the supervisability and traceability of network behavior, and ensures the safety and reliability of network transmission.
13.引入结合身份标识的不对称签名机制,使用户对发布的网络资源进行加密,同时网络监管节点会拒绝注册、删除及惩处网络中的违规网络资源及恶意用户。相对于传统IP网络存在的隐私安全问题,该网络系统具有良好的隐私保护性及安全性。13. Introduce an asymmetric signature mechanism combined with identification to enable users to encrypt published network resources. At the same time, network supervision nodes will refuse to register, delete and punish illegal network resources and malicious users in the network. Compared with the privacy and security problems of traditional IP networks, the network system has good privacy protection and security.
14.提出了一种网络的平滑过渡的渐进式部署的扩展方案,可以在不改变系统架构的情况下支持已有的DNS域名解析系统,用户可以通过多种方式接入网络,并逐步的替换现有的域名解析系统。14. A gradual deployment expansion plan for a smooth transition of the network is proposed, which can support the existing DNS domain name resolution system without changing the system architecture. Users can access the network in a variety of ways and gradually replace it. Existing domain name resolution system.
以上内容是结合具体的优选实施方式对本发明所作的进一步详细说明,不能认定本发明的具体实施只局限于这些说明。对于本发明所属技术领域的普通技术人员来说,在不脱离本发明构思的前提下,还可以做出若干简单推演或替换,都应当视为属于本发明的保护范围。The above content is a further detailed description of the present invention in conjunction with specific preferred embodiments, and it cannot be considered that the specific implementation of the present invention is limited to these descriptions. For those of ordinary skill in the technical field to which the present invention belongs, a number of simple deductions or substitutions can be made without departing from the concept of the present invention, which should be regarded as falling within the protection scope of the present invention.

Claims (14)

  1. 一种支持多模标识网络寻址渐进去IP的方法,其特征在于,包括构建网络,该网络采用自上到下层级化网络域进行划分,其中网络的顶级域由各个国家的政府机构作为顶级标识管理节点组成全球联盟共同管理标识的产生登记及解析管理,网络中所有的网络资源都将锁存在区块链上;一级域及以下各级域为相应行政或专业机构管理,其域内的标识管理方式、标识注册方案及共识算法可以不同;A method for supporting multi-mode identification network addressing and gradually removing IP, which is characterized in that it includes constructing a network, which is divided into hierarchical network domains from top to bottom. The identity management nodes form a global alliance to jointly manage the generation, registration and analysis management of the identity. All network resources in the network will be locked on the blockchain; the first-level domain and the lower-level domains are managed by the corresponding administrative or professional institutions. Logo management methods, logo registration schemes and consensus algorithms can be different;
    网络中存在监管节点、个人用户以及企业用户网络节点,每个域内均有相应的网络监管节点,网络监管节点负责域内用户管理、标识注册、标识互通以及标识路由服务,同时每个网络监管节点存在面向内容网络标识、空间地理位置标识、身份信息及IP地址多模标识;上下域之间通过网络监管节点作为数据访问接口以实现层级化的数据传输;个人用户包括传统意义上的个人用户以及物联网时代的终端节点在网络中带有移动特性的网络接入节点,企业用户包括政府机关、专业机构、公司及具有内容发布权的网站的组织机构;There are supervision nodes, individual users, and enterprise user network nodes in the network. Each domain has a corresponding network supervision node. The network supervision node is responsible for user management, logo registration, logo intercommunication and logo routing services in the domain. At the same time, each network supervision node exists For content network identification, spatial geographic location identification, identity information and IP address multi-mode identification; upper and lower domains use network supervision nodes as data access interfaces to achieve hierarchical data transmission; individual users include individual users and objects in the traditional sense The terminal nodes in the networking era have mobile network access nodes in the network. Enterprise users include government agencies, professional institutions, companies, and organizations with content publishing rights;
    网络支持包括身份标识、内容标识、空间地理位置标识及IP地址标识的多种标识共存的网络层路由寻址,其网络中的所有资源的内容标识均会和发布者的身份标识相互绑定,用户登陆网络时的空间地理位置标识及访问的网络资源将记录在所在域的网络监管节点区块链上用于安全监管及数据保护。The network supports network layer routing addressing in which multiple identities including identity, content, geographic location and IP address coexist, and the content identities of all resources in the network are bound to the publisher’s identity. The geographical location identification of the user when logging in to the network and the network resources accessed will be recorded on the blockchain of the network supervision node of the domain for security supervision and data protection.
  2. 根据权利要求1所述的方法,其特征在于,该方法包括标识注册步骤、网络资源请求步骤;The method according to claim 1, wherein the method comprises an identity registration step and a network resource request step;
    所述标识注册步骤包括:The logo registration step includes:
    步骤1,注册资源:网络节点接收用户的资源注册内容,同时网络节点将根据内容存放的位置节点加上空间地理位置标识以及内容发布人的身份标识;Step 1. Register resources: The network node receives the user's resource registration content, and at the same time, the network node adds the spatial geographic location identifier and the identity identifier of the content publisher according to the location where the content is stored;
    步骤2,网络节点认证:本域的网络节点在接收到用户传输的标识注册请求之后,网络节点将对其内容及其用户信息进行审查,随后对该资源标识进行注册,随后将产生的标识注册请求上传至上一级域并加上本地的标识前缀;Step 2: Network node authentication: After the network node in this domain receives the identity registration request transmitted by the user, the network node will review its content and user information, then register the resource identity, and then register the generated identity Request to upload to the upper level domain and add the local identification prefix;
    步骤3,标识注册请求传输:当上一级网络节点接收到标识注册请求之后,将按照设定的数据传输协议将其注册标识报文传输到其所在域的控制器进行后续认证及注册操作;Step 3. Identity registration request transmission: After the upper-level network node receives the identity registration request, it will transmit its registration identity message to the controller of its domain according to the set data transmission protocol for subsequent authentication and registration operations;
    步骤4,标识校验:顶级域内的网络节点在接收到其下级网络域的标识注册请求之后,将对该请求的数据进行校验并将返回给原申请节点相应的确认信号;同时将采用设定的分布式存储方案来保证所有注册的标识均无法被篡改,原标识信息将存储在顶级域的分布式数据库之上,每经过一个设定的时间之后,全网将进行相应的数据库同步工作以确认各个顶级域名之间的资源标识信息对等且统一;Step 4. Identity verification: After receiving the identity registration request of its subordinate network domain, the network node in the top-level domain will verify the requested data and return the corresponding confirmation signal to the original application node; at the same time, it will adopt the design A distributed storage scheme is set to ensure that all registered logos cannot be tampered with. The original identification information will be stored in the distributed database of the top-level domain. After a set time has passed, the entire network will synchronize the corresponding database. To confirm that the resource identification information between each top-level domain name is equal and unified;
    所述网络资源请求步骤包括:The network resource request step includes:
    步骤A,查询请求:向最近的网络节点传送查询请求;Step A, query request: send a query request to the nearest network node;
    步骤B,本地标识数据查询:当最近的多模网络节点接收到用户所发出的请求之后,将根据查询的标识进行区分,如果是IP地址则继续传统的DNS查询流程,如果是身份或内容标识,那么查询转发表,转发表里记载了标识内容是否存在本地数据库中,如果是,那么返回相应的标识内容,否则执行步骤C;Step B, local identification data query: When the nearest multi-mode network node receives the request from the user, it will distinguish according to the query identification. If it is an IP address, continue the traditional DNS query process, if it is an identity or content identification , Then query the forwarding table, the forwarding table records whether the identification content exists in the local database, if it is, then return the corresponding identification content, otherwise go to step C;
    步骤C,请求查询传输:当本地数据库内没有相应的标识内容时,将此查询请求上传至上一级网络节点之中,上一级网络节点在接受到下一级所发送的查询请求之后,将按照步骤A至步骤B进行查询,如果查询到相应的标识内容,将返回给相应的内容标识给下一级网络节点,否则,将此查询请求接着传递给上一级网络节点,直到顶级域的网络节点;Step C, request for query transmission: when there is no corresponding identification content in the local database, upload the query request to the upper-level network node. After receiving the query request sent by the next-level network node, Follow steps A to B to query. If the corresponding identification content is queried, it will be returned to the corresponding content identification to the next-level network node. Otherwise, the query request will be passed to the upper-level network node until the top-level domain Network node
    步骤D,标识查询验证及互通:若顶级域节点在查询到相关已被注册标识之后,将自动根据现有网络的动态拓扑结构来下发相关的最短路径,网络中的转发线路上的相关多模网络节点将收到新的转发路径表,通过多跳路由建立数据传输通路;若顶级域内节点未查询到相应的标识,同时查询数据库中该标识对应的其他网络标识信息,进行步骤E;Step D, identification query verification and intercommunication: If the top-level domain node finds the related registered identification, it will automatically issue the related shortest path according to the dynamic topology of the existing network. There are many related links on the forwarding line in the network. The modular network node will receive the new forwarding path table and establish a data transmission path through multi-hop routing; if the node in the top-level domain does not find the corresponding identifier, at the same time query the database for other network identifier information corresponding to the identifier, proceed to step E;
    步骤E,标识请求下发:顶级域内网络节点将根据原标识以及转换标识后的第一个前缀对查询请求进行下发至指定的网络域,直至到达查询请求所指定的最下级网络节点进行本地查询;若成功查询到相应标识内容,则将 相应的资源内容传递给查询请求方,否则,返回查询错误信息。Step E: Issuing the identification request: The network node in the top-level domain will issue the query request to the specified network domain according to the original identification and the first prefix after the conversion of the identification, until it reaches the lowest-level network node specified by the query request for local Query; if the corresponding identification content is successfully queried, the corresponding resource content will be passed to the query requester, otherwise, the query error message will be returned.
  3. 根据权利要求1所述的方法,其特征在于,网络系统中的资源均具有相对应的多种标识,用以指代其内容名字、发布者身份、空间地理位置,通过标识间的绑定和互通,网络中各方的内容发布和访问行为可以得到有效的控制和监管;同时,将多模网络标识直接运用于网络层的寻址过程中,通过多模标识的动态匹配和互通技术,用户可以在多种寻址方式间做出选择,以应对复杂多变的应用需求和网络环境。The method according to claim 1, characterized in that the resources in the network system all have corresponding multiple identifiers to refer to their content name, publisher identity, spatial geographic location, and through the binding and Interoperability, the content release and access behavior of all parties in the network can be effectively controlled and supervised; at the same time, the multi-mode network identity is directly used in the addressing process of the network layer, through the dynamic matching and intercommunication technology of the multi-mode identity, users You can choose between a variety of addressing methods to cope with complex and changeable application requirements and network environments.
  4. 根据权利要求3所述的方法,其特征在于,除传统的IP地址外,寻址过程基于以下三种标识:The method according to claim 3, characterized in that, in addition to the traditional IP address, the addressing process is based on the following three types of identification:
    面向内容名字的寻址:使用层级化的字符串标识网络中的每一个资源,为了支持直接面向内容名字的寻址过程,多模网络节点均拥有以名字作为键的转发信息表,以记录每个名字对应的转发端口信息;数据的传输以用户驱动的方式进行:内容的请求者将内容名录入兴趣报文中并发送至网络;路由节点将兴趣报文的到来端口记录在未决兴趣表中,并查询转发信息表将报文转发,直至其到达一个内容的持有者;通过查询未决兴趣表,包含了请求内容的数据包将沿着兴趣报文的到来路径回溯给请求者;面向名字的寻址过程将数据自身和数据所处的具体位置相解耦,为网络系统提供了更大的灵活性;Content name-oriented addressing: Use hierarchical character strings to identify each resource in the network. In order to support the addressing process directly facing content names, multi-mode network nodes have forwarding information tables with names as keys to record each resource. Forwarding port information corresponding to each name; data transmission is carried out in a user-driven manner: the content requester enters the content list into the interest message and sends it to the network; the routing node records the arrival port of the interest message in the pending interest table , And query the forwarding information table to forward the message until it reaches a content holder; by querying the pending interest table, the data packet containing the requested content will be traced back to the requester along the arrival path of the interest message; The name-oriented addressing process decouples the data itself from the specific location of the data, providing greater flexibility for the network system;
    面向身份的寻址:身份用于局部或者全局唯一地指代一个用户,用户在网络上的行为,包括对网络资源的发布和访问,将受制于其身份决定的具体权限,且任一行为均可以追溯到用户的身份信息;Identity-oriented addressing: Identity is used to uniquely refer to a user locally or globally. The user's behavior on the network, including the release and access to network resources, will be subject to the specific authority determined by its identity, and any behavior Identity information that can be traced back to the user;
    面向空间地理位置的寻址:位置信息不但可以代表现实意义上的地理位置,还可以代表抽象空间中的虚拟位置,为防止寻址过程中发生歧义,本系统中两个用户的位置将不会发生重合;面向空间地理位置的寻址过程是:多模网络节点计算每个邻居和目的地之间的几何距离,并贪婪地选取最小者作为转发对象。Addressing for spatial and geographic location: Location information can not only represent geographic location in the real sense, but also virtual location in abstract space. To prevent ambiguity during addressing, the location of two users in this system will not Coincidence occurs; the addressing process for spatial and geographic location is: multi-mode network nodes calculate the geometric distance between each neighbor and the destination, and greedily select the smallest one as the forwarding object.
  5. 根据权利要求4所述的方法,其特征在于,在所述面向身份的寻址中,身份标识包括公钥、用户本人证件ID、移动电话的IMEI码,电子邮箱地址及其它身份标识。The method according to claim 4, wherein, in the identity-oriented addressing, the identity identifier includes a public key, a user ID, an IMEI code of a mobile phone, an email address, and other identity identifiers.
  6. 根据权利要求4所述的方法,其特征在于,在所述面向名字的寻址和面 向身份的寻址中,采用基于身份标识和组合矩阵的安全机制,在所述安全机制中,采用的密码机制为椭圆曲线加密,若给定椭圆曲线上的基点G和它的阶n,则以正整数r<n作为私钥,而G的r倍点rG=R作为公钥,私钥矩阵(r ij) m×n为m×n阶,其中每个元素r ij均是满足r ij<n的正整数;并通过对应关系r ijG=R ij生成公钥矩阵(R ij) m×n;私钥矩阵仅由密钥管理机构持有,用于用户的私钥分发;而公钥矩阵则由每一个网络节点持有,用于数据的签名认证;密钥管理机构通过用户的身份标识ID和私钥矩阵(r ij)生成用户的私钥r IDThe method according to claim 4, characterized in that, in the name-oriented addressing and identity-oriented addressing, a security mechanism based on an identity identifier and a combination matrix is adopted, and in the security mechanism, a password is adopted The mechanism is elliptic curve encryption. If the base point G on the elliptic curve and its order n are given, the positive integer r<n is used as the private key, and the r multiple point of G = R is used as the public key, and the private key matrix (r ij ) m×n is of order m×n, where each element r ij is a positive integer satisfying r ij <n; and the public key matrix (R ij ) m×n is generated through the corresponding relationship r ij G=R ij ; The private key matrix is only held by the key management agency and used for the user's private key distribution; while the public key matrix is held by each network node and used for data signature authentication; the key management agency uses the user's identity ID And the private key matrix (r ij ) to generate the user's private key r ID .
  7. 根据权利要求6所述的方法,其特征在于,在所述基于身份标识和组合矩阵的安全机制中,私钥生成过程由以下方式实现:基于加密芯片和密码学运算,每个身份标识ID均可以唯一地生成一串下标序列:The method according to claim 6, characterized in that, in the security mechanism based on the identity and the combination matrix, the private key generation process is implemented in the following manner: based on an encryption chip and cryptographic operations, each identity ID is A sequence of subscripts can be generated uniquely:
    GenerateSub(ID)={i 1,i 2,...i l,j 1,j 2,...j l} GenerateSub(ID)={i 1 , i 2 ,...i l , j 1 , j 2 ,...j l }
    GenerateSub(ID)表示从身份标识ID生成下标的函数,i 1,i 2...i l表示矩阵的行坐标,j 1,j 2...j l表示矩阵的列坐标; GenerateSub(ID) represents the function of generating subscripts from the identity ID, i 1 , i 2 ... i l represent the row coordinates of the matrix, and j 1 , j 2 ... j l represent the column coordinates of the matrix;
    此时ID对应的私钥为私钥矩阵中下标对应项的加和:At this time, the private key corresponding to the ID is the sum of the subscript corresponding items in the private key matrix:
    Figure PCTCN2019073507-appb-100001
    Figure PCTCN2019073507-appb-100001
    r ID表示用户的私钥,
    Figure PCTCN2019073507-appb-100002
    代表私钥矩阵(r ij)中行坐标为i 1,i 2...i l,列坐标为j 1,j 2...j l的元素;
    r ID represents the user's private key,
    Figure PCTCN2019073507-appb-100002
    Represents the elements with row coordinates i 1 , i 2 ... i l and column coordinates j 1 , j 2 ... j l in the private key matrix (r ij );
    同样,ID对应的公钥可以由验证方通过公钥矩阵和身份标识ID计算出:Similarly, the public key corresponding to the ID can be calculated by the verifier through the public key matrix and the identity ID:
    Figure PCTCN2019073507-appb-100003
    Figure PCTCN2019073507-appb-100003
    R ID表示用户的公钥,
    Figure PCTCN2019073507-appb-100004
    代表公钥矩阵(R ij)中行坐标为i 1,i 2...i l,列坐标为j 1,j 2...j l的元素;
    R ID represents the public key of the user,
    Figure PCTCN2019073507-appb-100004
    Represents the elements with row coordinates i 1 , i 2 ... i l and column coordinates j 1 , j 2 ... j l in the public key matrix (R ij );
    由于G的倍点构成一个交换群,有:Since the multiple points of G constitute a commutative group, there are:
    Figure PCTCN2019073507-appb-100005
    Figure PCTCN2019073507-appb-100005
    r IDG代表基点G的r ID倍点; G r ID r ID of the representative base point G times points;
    因此(r ID,R ID)构成私-公钥对关系,通过这种方式,不但完成了身份标识同公钥之间的一一绑定,保障了网络行为的可监管性和可追查性,还省去了频繁的公钥请求流程,提升了网络的实际性能。 Therefore, (r ID , R ID ) constitutes a private-public key pair relationship. In this way, not only the one-to-one binding between the identity and the public key is completed, and the supervisability and traceability of network behavior are guaranteed. It also saves the frequent public key request process, and improves the actual performance of the network.
  8. 根据权利要求1所述的方法,其特征在于,该方法包括名字和身份间的互通过程,在名字和身份间的互通过程中,将内容的名称与其原发布者的身份标识相绑定,并采用可验证的拓展名用于标识网络资源,其形式如下:The method according to claim 1, characterized in that the method comprises an inter-passing process between the name and the identity, in the inter-passing process between the name and the identity, the name of the content is bound to the identity of the original publisher, and A verifiable extension is used to identify network resources, and its form is as follows:
    /UniqueID A/SubID A/Name/Sig(Name,PrK A) /UniqueID A /SubID A /Name/Sig(Name,PrK A )
    其中UniqueID A是发布者A的全局唯一的身份标识,不会发生碰撞,由该标识生成用户的公-私钥对;SubID A是A发布该内容时采用的次级身份标识,因网络中的同一用户可能兼有多种身份;Name是层级化的内容名;Sig(Name,PrK A)是A对内容名所做的签名;当内容被用户接收,或被多模网络节点缓存之前,其签名必须被验证以保证其合法性;使用前缀树的数据结构以支持对名字和身份标识的存储和查询操作,在前缀树中,根节点的每条连接边均对应一个用户,我们使用全局唯一的身份标识UniqueID A,用以对各个用户进行指代,每个用户节点均记录着该用户对应的
    Figure PCTCN2019073507-appb-100006
    转发信息表的表项和空间位置信息,前缀树的第二层代表每个用户拥有的多种身份标识,若用户A1以身份
    Figure PCTCN2019073507-appb-100007
    发布了资源Name1,则其对应的名字节点将成为身份
    Figure PCTCN2019073507-appb-100008
    的子节点,该名字节点会记录签名Sig(Name1,PrK A1),以及该名字对应的转发信息表的表项和空间位置信息,通过在该前缀树中的查询操作,可以完成名字和身份标识,或同一用户拥有的多种身份标识间的相互转换。
    Among them, UniqueID A is the globally unique identity of publisher A. There will be no collision. The user’s public-private key pair is generated from this identity; SubID A is the secondary identity used by A when publishing the content. The same user may have multiple identities; Name is a hierarchical content name; Sig (Name, PrK A ) is A's signature on the content name; when the content is received by the user or is cached by a multi-mode network node, its The signature must be verified to ensure its legitimacy; the data structure of the prefix tree is used to support the storage and query operations of names and identities. In the prefix tree, each connection edge of the root node corresponds to a user, and we use global uniqueness UniqueID A is used to refer to each user, and each user node records the user’s corresponding
    Figure PCTCN2019073507-appb-100006
    The entries and spatial location information of the forwarding information table. The second layer of the prefix tree represents the multiple identities owned by each user. If user A1 is
    Figure PCTCN2019073507-appb-100007
    If the resource Name1 is released, its corresponding name node will become the identity
    Figure PCTCN2019073507-appb-100008
    The name node will record the signature Sig (Name1, PrK A1 ), as well as the entry and space location information of the forwarding information table corresponding to the name. Through the query operation in the prefix tree, the name and identity identification can be completed , Or the mutual conversion between multiple identities owned by the same user.
  9. 根据权利要求8所述的方法,其特征在于,该方法包括位置和内容名字、身份间的互通过程,在位置和名字、身份间的互通过程中,每个用户均对应着一个唯一的现实或虚拟的空间地理位置标识,而对于网络中的某个内容名字,为了减小路由延迟,我们将它的位置标识设置为"持有该名字对应内容的最近的节点位置",由上层控制节点计算并下发;通过将对应的位置信息记录到所述前缀树中,可以完成从名字、身份到空间地理位置的互通操作;为了各用户的位置不会发生碰撞,我们使用空间地理位置-身份的散列表以完成它们间的映射操作。The method according to claim 8, characterized in that the method includes an interworking process between location, content name, and identity. In the interworking process between location, name, and identity, each user corresponds to a unique reality or Virtual spatial location identification, and for a certain content name in the network, in order to reduce the routing delay, we set its location identification to "the position of the nearest node holding the content corresponding to the name", which is calculated by the upper control node Concurrent delivery; by recording the corresponding location information in the prefix tree, the interoperability from name, identity to spatial geographic location can be completed; in order to avoid collisions between the locations of users, we use spatial geographic location-identity Hash table to complete the mapping operation between them.
  10. 根据权利要求1所述的方法,其特征在于,该方法包括用户管理及隐私保护策略,在用户管理及隐私保护策略中,所有用户终端在网络中发送标识注册请求时,都会捆绑相应的身份信息以保证网络的正常运行,用户用一个指定的哈希函数并加上用户的身份信息中生成身份证书,其身份证书将为该用户在网络中的身份证明,同时将空间地理位置标识作为该用户的辅助标识信息;同时,系统将把该用户的公钥发送给网络监管节点,然后用户使用自己的身份证书对标识注册请求进行签名,并和标识注册请求一起发送给网络监管节点;网络监管节点首先用与用户相同的哈希函数从接收到的标识注册请求中验证用户的合法性,再根据用户的公钥来对附加的签名进行解密,比较这两个哈希值,若相同则可确认签名属于用户;若标识注册请求被网络监管节点确认,系统将存储该用户的身份证书到分布式数据中,保证以后对该标识内容进行溯源以及监管;系统将对用户所发布的网络内容进行分级,用户访问网络资源时将根据其访问者的身份信息确定访问权限。The method according to claim 1, wherein the method includes user management and privacy protection policies. In the user management and privacy protection policies, when all user terminals send identification registration requests in the network, they will bind corresponding identification information In order to ensure the normal operation of the network, the user uses a specified hash function and adds the user’s identity information to generate an identity certificate. The identity certificate will be the identity certificate of the user in the network, and the geographical location identifier is used as the user At the same time, the system will send the user’s public key to the network supervision node, and then the user signs the identity registration request with his own identity certificate, and sends it to the network supervision node together with the identity registration request; the network supervision node First, use the same hash function as the user to verify the legitimacy of the user from the received logo registration request, and then decrypt the additional signature according to the user's public key, compare the two hash values, and confirm if they are the same The signature belongs to the user; if the logo registration request is confirmed by the network supervision node, the system will store the user's identity certificate in distributed data to ensure that the logo content will be traced and supervised in the future; the system will classify the network content published by the user , When a user accesses network resources, the access authority will be determined according to the identity information of the visitor.
  11. 根据权利要求1所述的方法,其特征在于,该方法包括个人用户接入网络步骤,在个人用户接入网络步骤中,用户通过传统Internet接入该网络系统时,网络节点将记录该用户终端的MAC地址作为身份标识存储到网络中,同时还将记录该用户终端的空间地理位置,其形式为空间三维坐标,对于手机用户而言,将同时记录该手机的IMEI码作为身份认证信息的一部分,在每个网络域的边界处设有相应的网关设备,保证用户可以通过多种网络标识访问互联网资源;用户通过新型网络标识接入网络时,将在用户的本地节点存储相关的身份信息,包括但不限于用户的指纹、虹膜及其它具有追溯用户身份的生物信息,该身份信息只存放于用户节点本地用于生成用户签名,并不在多模标识网络中传输;同时,将个人用户的身份标识 与其发布的各种内容标识相绑定,其身份标识作为该网络内容的一种寻址标识,方便网络中其余节点直接通过用户标识对网络资源进行寻址,提高网络资源查询效率。The method according to claim 1, characterized in that the method comprises the step of personal user accessing the network, in the step of personal user accessing the network, when the user accesses the network system through the traditional Internet, the network node will record the user terminal The MAC address of the mobile phone is stored in the network as the identity identifier. At the same time, the spatial geographic location of the user terminal will be recorded in the form of spatial three-dimensional coordinates. For mobile phone users, the IMEI code of the mobile phone will be recorded as part of the identity authentication information. , There is a corresponding gateway device at the boundary of each network domain to ensure that users can access Internet resources through a variety of network identifiers; when users access the network through a new network identifier, relevant identity information will be stored in the user’s local node. Including but not limited to the user’s fingerprint, iris and other biological information with traceable user identity. The identity information is only stored locally on the user node for generating user signatures, and is not transmitted in the multi-mode identification network; at the same time, the identity of the individual user The identifier is bound to various content identifiers issued, and its identity identifier serves as an addressing identifier of the network content, which facilitates other nodes in the network to directly address network resources through user identifiers, and improves the efficiency of network resource query.
  12. 根据权利要求1所述的方法,其特征在于,该方法包括企业用户接入网络步骤,在企业用户接入网络步骤中,企业用户将捆绑政府或专业机构所颁发的身份识别码作为身份标识以登陆网络,其发布的网络资源也将绑定其企业身份信息,企业用户所发布的网络资源及服务器所在的空间信息标识将记录在所在域的网络监管节点区块链上用于安全监管及数据保护。The method according to claim 1, characterized in that the method comprises a step of enterprise users accessing the network, and in the step of enterprise users accessing the network, the enterprise user binds the identity identification code issued by the government or professional organization as the identity identifier. Log on to the network, the network resources released by the company will also be bound to its corporate identity information. The network resources released by corporate users and the spatial information identification of the server will be recorded on the blockchain of the network supervision node of the domain for security supervision and data protection.
  13. 一种支持多模标识网络寻址渐进去IP的系统,其特征在于,包括:存储器、处理器以及存储在所述存储器上的计算机程序,所述计算机程序配置为由所述处理器调用时实现权利要求1-12中任一项所述的方法的步骤。A system that supports multi-mode identification network addressing and progressive IP, which is characterized by comprising: a memory, a processor, and a computer program stored on the memory, and the computer program is configured to be implemented when called by the processor The steps of the method of any one of claims 1-12.
  14. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有计算机程序,所述计算机程序配置为由处理器调用时实现权利要求1-12中任一项所述的方法的步骤。A computer-readable storage medium, wherein the computer-readable storage medium stores a computer program configured to implement the method according to any one of claims 1-12 when called by a processor step.
PCT/CN2019/073507 2019-01-28 2019-01-28 Progressive ip removal method and system supporting multi-mode identifier network addressing and storage medium WO2020154865A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2019/073507 WO2020154865A1 (en) 2019-01-28 2019-01-28 Progressive ip removal method and system supporting multi-mode identifier network addressing and storage medium
CN201980005057.1A CN111373704B (en) 2019-01-28 2019-01-28 Method, system and storage medium for supporting multimode identification network addressing progressive-entry IP

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/073507 WO2020154865A1 (en) 2019-01-28 2019-01-28 Progressive ip removal method and system supporting multi-mode identifier network addressing and storage medium

Publications (1)

Publication Number Publication Date
WO2020154865A1 true WO2020154865A1 (en) 2020-08-06

Family

ID=71212620

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/073507 WO2020154865A1 (en) 2019-01-28 2019-01-28 Progressive ip removal method and system supporting multi-mode identifier network addressing and storage medium

Country Status (2)

Country Link
CN (1) CN111373704B (en)
WO (1) WO2020154865A1 (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112200502A (en) * 2020-11-19 2021-01-08 苏州协同创新智能制造装备有限公司 Industrial internet identification analysis method
CN112989313A (en) * 2021-01-14 2021-06-18 国网上海市电力公司 Identification registration method and device, electronic equipment and storage medium
CN113055363A (en) * 2021-03-02 2021-06-29 南通大学 Identification analysis system implementation method based on block chain trust mechanism
CN113452668A (en) * 2021-03-12 2021-09-28 深圳市百佳华网络科技有限公司 Internet of things terminal access monitoring method, computer program and storage medium
CN114944933A (en) * 2022-04-12 2022-08-26 中国人民解放军战略支援部队信息工程大学 Multi-modal network high-robustness control method, controller and system based on heterogeneous identification
CN115065719A (en) * 2022-06-09 2022-09-16 深圳创维数字技术有限公司 Device interaction access method and device, electronic device and readable storage medium
CN115242702A (en) * 2022-09-22 2022-10-25 广州优刻谷科技有限公司 Internet of things node optimal path planning method and system
CN115296826A (en) * 2022-10-10 2022-11-04 佛山赛思禅科技有限公司 Multilateral common-pipe multi-identification space-ground integrated intelligent network-connected automobile high-safety special network system
CN116418600A (en) * 2023-06-09 2023-07-11 安徽华云安科技有限公司 Node security operation and maintenance method, device, equipment and storage medium
CN116527248A (en) * 2023-04-19 2023-08-01 佛山赛思禅科技有限公司 High-security communication method and system supporting quantum identification routing addressing at network layer
CN116633692A (en) * 2023-07-24 2023-08-22 天津大学合肥创新发展研究院 Server, data security system and method

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112100234B (en) * 2020-08-12 2021-09-10 北京大学 Content addressing method and system of graph type account book based on random consensus
CN114554567A (en) * 2020-11-24 2022-05-27 华为技术有限公司 Communication method and communication device
CN112565094B (en) * 2020-12-09 2023-04-07 之江实验室 Multi-mode network topology structure
CN112597771A (en) * 2020-12-29 2021-04-02 重庆邮电大学 Chinese text error correction method based on prefix tree combination
CN112804152B (en) * 2020-12-30 2022-06-17 佛山赛思禅科技有限公司 Method and system for supporting continuous evolution of packet communication network addressing route identification
CN113765808A (en) * 2021-06-16 2021-12-07 北京交通大学 Network routing method, system, device and electronic equipment
CN114629631B (en) * 2021-07-21 2024-01-09 国网河南省电力公司信息通信公司 Data trusted interaction method and system based on alliance chain and electronic equipment
CN114189468B (en) * 2021-11-02 2024-04-12 云端领航(北京)通信科技股份有限公司 Multi-identification network system routing method based on identification clustering
CN114048517B (en) * 2022-01-14 2022-05-20 北京大学深圳研究生院 Dual channel consensus system and method for blockchains, computer readable storage medium
CN115664799B (en) * 2022-10-25 2023-06-06 江苏海洋大学 Data exchange method and system applied to information technology security

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103338150A (en) * 2013-07-19 2013-10-02 中国人民解放军信息工程大学 Method and device for establishing information communication network system structure, as well as server and router
CN108064444A (en) * 2017-04-19 2018-05-22 北京大学深圳研究生院 A kind of domain name analysis system based on block chain
CN108124502A (en) * 2017-03-31 2018-06-05 北京大学深圳研究生院 A kind of top level domain management method and system based on alliance's chain

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10230526B2 (en) * 2014-12-31 2019-03-12 William Manning Out-of-band validation of domain name system records
US10075298B2 (en) * 2015-06-02 2018-09-11 ALTR Solutions, Inc. Generation of hash values within a blockchain
CN108366136B (en) * 2017-12-29 2021-04-06 北京世纪互联宽带数据中心有限公司 Domain name resolution method and device
CN108366138B (en) * 2018-05-28 2021-10-26 北京奇虎科技有限公司 Domain name operation method, system and electronic equipment
CN108429765B (en) * 2018-05-28 2021-10-26 北京奇虎科技有限公司 Method, server and storage medium for realizing domain name resolution based on block chain

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103338150A (en) * 2013-07-19 2013-10-02 中国人民解放军信息工程大学 Method and device for establishing information communication network system structure, as well as server and router
CN108124502A (en) * 2017-03-31 2018-06-05 北京大学深圳研究生院 A kind of top level domain management method and system based on alliance's chain
CN108064444A (en) * 2017-04-19 2018-05-22 北京大学深圳研究生院 A kind of domain name analysis system based on block chain

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112200502A (en) * 2020-11-19 2021-01-08 苏州协同创新智能制造装备有限公司 Industrial internet identification analysis method
CN112989313A (en) * 2021-01-14 2021-06-18 国网上海市电力公司 Identification registration method and device, electronic equipment and storage medium
CN113055363A (en) * 2021-03-02 2021-06-29 南通大学 Identification analysis system implementation method based on block chain trust mechanism
CN113055363B (en) * 2021-03-02 2023-07-04 南通大学 Identification analysis system implementation method based on blockchain trust mechanism
CN113452668A (en) * 2021-03-12 2021-09-28 深圳市百佳华网络科技有限公司 Internet of things terminal access monitoring method, computer program and storage medium
CN114944933B (en) * 2022-04-12 2023-05-12 中国人民解放军战略支援部队信息工程大学 Multi-mode network high-robustness control method, controller and system based on heterogeneous identification
CN114944933A (en) * 2022-04-12 2022-08-26 中国人民解放军战略支援部队信息工程大学 Multi-modal network high-robustness control method, controller and system based on heterogeneous identification
CN115065719A (en) * 2022-06-09 2022-09-16 深圳创维数字技术有限公司 Device interaction access method and device, electronic device and readable storage medium
CN115065719B (en) * 2022-06-09 2023-07-14 深圳创维数字技术有限公司 Equipment interactive access method and device, electronic equipment and readable storage medium
CN115242702A (en) * 2022-09-22 2022-10-25 广州优刻谷科技有限公司 Internet of things node optimal path planning method and system
CN115296826A (en) * 2022-10-10 2022-11-04 佛山赛思禅科技有限公司 Multilateral common-pipe multi-identification space-ground integrated intelligent network-connected automobile high-safety special network system
CN116527248A (en) * 2023-04-19 2023-08-01 佛山赛思禅科技有限公司 High-security communication method and system supporting quantum identification routing addressing at network layer
CN116418600A (en) * 2023-06-09 2023-07-11 安徽华云安科技有限公司 Node security operation and maintenance method, device, equipment and storage medium
CN116418600B (en) * 2023-06-09 2023-08-15 安徽华云安科技有限公司 Node security operation and maintenance method, device, equipment and storage medium
CN116633692A (en) * 2023-07-24 2023-08-22 天津大学合肥创新发展研究院 Server, data security system and method
CN116633692B (en) * 2023-07-24 2023-10-13 天津大学合肥创新发展研究院 Server, data security system and method

Also Published As

Publication number Publication date
CN111373704A (en) 2020-07-03
CN111373704B (en) 2022-03-29

Similar Documents

Publication Publication Date Title
WO2020154865A1 (en) Progressive ip removal method and system supporting multi-mode identifier network addressing and storage medium
Chen et al. Trust architecture and reputation evaluation for internet of things
Hu et al. A survey on data provenance in IoT
Lyu et al. SBAC: A secure blockchain-based access control framework for information-centric networking
Mohsin et al. Blockchain authentication of network applications: Taxonomy, classification, capabilities, open challenges, motivations, recommendations and future directions
CN110945853B (en) Method for generating and managing multimode identification network based on alliance chain voting consensus algorithm
CN108064444B (en) Domain name resolution system based on block chain
Ren et al. Potential identity resolution systems for the industrial Internet of Things: A survey
CN109327481B (en) Block chain-based unified online authentication method and system for whole network
US9047462B2 (en) Computer account management system and realizing method thereof
CN103262063B (en) For the method and apparatus created in leading network in content and manage virtual private group
Li et al. Trust-enhanced content delivery in blockchain-based information-centric networking
CN103001945B (en) Diversified resource identifier safety access method
CN112702402A (en) System, method, device, processor and storage medium for realizing government affair information resource sharing and exchange based on block chain technology
WO2021036707A1 (en) Post ip sovereign network architecture
Li et al. Trustroam: A novel blockchain-based cross-domain authentication scheme for Wi-Fi access
RU2373572C2 (en) System and method for resolution of names
US20230024127A1 (en) Community server for secure hosting of community forums via network operating system in secure data network
EP3817320B1 (en) Blockchain-based system for issuing and validating certificates
Wang et al. Blockzone: A blockchain-based dns storage and retrieval scheme
Chai et al. BHE-AC: A blockchain-based high-efficiency access control framework for Internet of Things
Nguyen et al. Leveraging blockchain to enhance data privacy in IoT-based applications
Khan et al. Enhanced decentralized management of patient-driven interoperability based on blockchain
Wang et al. MIS: A multi-identifier management and resolution system in the metaverse
Li et al. Three-tier storage framework based on TBchain and IPFS for protecting IoT security and privacy

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19913272

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19913272

Country of ref document: EP

Kind code of ref document: A1