CN105450502A - Software-defined network oriented email denial suppression system and suppression method thereof - Google Patents

Software-defined network oriented email denial suppression system and suppression method thereof Download PDF

Info

Publication number
CN105450502A
CN105450502A CN201410482740.3A CN201410482740A CN105450502A CN 105450502 A CN105450502 A CN 105450502A CN 201410482740 A CN201410482740 A CN 201410482740A CN 105450502 A CN105450502 A CN 105450502A
Authority
CN
China
Prior art keywords
email
reliability
behavior
denial
signing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410482740.3A
Other languages
Chinese (zh)
Other versions
CN105450502B (en
Inventor
韩志耕
陈耿
王良民
朱玉全
谢晴晴
景波
刘林源
王瑜
韩冰青
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Audit University
Original Assignee
陈耿
韩志耕
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 陈耿, 韩志耕 filed Critical 陈耿
Priority to CN201410482740.3A priority Critical patent/CN105450502B/en
Publication of CN105450502A publication Critical patent/CN105450502A/en
Application granted granted Critical
Publication of CN105450502B publication Critical patent/CN105450502B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a software-defined network oriented email denial suppression system and a suppression method thereof. The software-defined network oriented email denial suppression system regards a traditional email interactive model as a data plane and a denial suppression as a control plane, achieves the suppression and management of email denial behaviors, and comprises an interactive evidence binding assembly, an interactive evidence management assembly, a denial behavior detection assembly, a sign-in behavior assessment assembly, a sign-in reliability management assembly and a denial behavior early-warning assembly. In an email denial suppression framework, the email interaction forms the closed-loop self-feedback denial suppression system through the whole process from denial early-warning before email interaction, denial management during the interaction process to the denial detection and sign-in reliability feedback after interaction, and the denial-free requirement of email interaction is satisfied. The software-defined network oriented email denial suppression system does not damage the traditional email interactive model, and can achieve denial suppression beforehand.

Description

The Email of software-oriented define grid denies suppression system and suppressing method thereof
Technical field
The present invention relates to network safety filed, the Email being specifically related to a kind of software-oriented define grid denies suppression system and suppressing method thereof.
Background technology
As cross-platform universal distributed system a kind of under heterogeneous network environment, Email has become one network application the most widely along with the universal of the Internet; But meanwhile, the extensive concern that problem causes industry just is successively denied in the transmitting-receiving concerned with safety of electronic mail, comprises mail sending and denies (malice transmit leg is denied afterwards and once sent this mail) and mail reception denial (malice recipient denies afterwards and once received this mail).In con-ventional post system, the conventional means suppressing mail to deny problem is for vital document (such as contract, contract, bidding documents, subpoena etc.) provides the postal value-added service being called vouchered postal material, postal operator, by providing mail to according to proving that mailer was sending this mail sometime, proving that this mail is successfully submitted by recipient's signing by hand receipt, is implemented to follow the trail of to deny behavior to mail transmission/reception afterwards.In CYBERSPACE, due to the disappearance of electronic communication system quoting ability, make PEM (PrivacyEnhancedMail), MOSS (MIMEObjectSecurityServices), S/MIME (Secure/MultipurposeInternetMailExtensions) and PGP (PrettyGoodPrivacy) although etc. safety of electronic mail agreement integrality, authentication property and confidentiality can be provided, non-repudiation cannot be provided; RFC2634 (EnhancedSecurityServicesforS/MIME, ESS-S/MIME) sign for by introducing in S/MIME the problem that evidence attempts to solve the undeniable disappearance of E-mail receiver/send, but this standard is based upon on honest addressee (recipient can return receipt surely) supposes, this usually cannot meet in real world.
The existing major technique of taking precautions against denial in the Email world signs for Email, and this technology by exchanging e-mail messages and resisting denying evidence liberally to ensure reviewing of transmitting-receiving denial behavior between mistrustful receiving-transmitting sides.As a challenge, since the people such as people and R.Deng such as J.Zhou in 1996 begin one's study and sign for e-mail technique, emerge over nearly 18 years and large quantities ofly sign for email solutions, representative work has: (1) is in protocol security character meets, KremerS. wait people to discuss the undeniable problem of information interaction first comprehensively, give the fundamental property that fair non-repudiation protocol must meet; The people such as JoseOnieva sign for email protocol for quick optimism and do not possess time-bounded problem, propose a kind of asynchronous time-bounded technology; The people such as ChangsheMa point out to use the RSA-CEMD of transparent TTP optimism to sign for email protocol to there is recipient and can recover signature ciphertext (verifying by all senders) by invalid the verifying of transmission and cheat transmit leg (recipient can successfully receive email message, and sender obtain less than signing for evidence) problem, propose a kind of improvement version, compensate for the fairness defect of former agreement; The people such as Min-HuaShao for numerous sign for email protocol exist malicious parties can by attack deception honesty side, thus the problem bringing fairness to lack (honesty side cannot obtain expected information), the general character signing for email solutions existence by analysis GG and OS these two is attacked, propose the corrective measure avoiding this type of safety problem, and sum up the guideline of evading the attack of this type of general character when email protocol is signed in design; The people such as JosepLluisFerrer-Gomilla are while summary signs for email protocol definition, character and demand, and emphasis has set forth the reason that associated safety character is repelled mutually.(2) at trusted third party (TrustedThirdParty, TTP) intervention aspect, the people such as MaciaMut-Puigserver sign for email protocol owing to depending on third party unduly for existing, thus there is the third-party problem of the necessary unconditional trust of user, propose to introduce third party alliance signing in email protocol, this alliance to be voted generation by all third party members, the fairness making a small amount of malicious third parties cannot destroy Email to put to the proof; Because alliance only gets involved when agreement execute exception, this reduces the probability that alliance becomes communication performance bottleneck undoubtedly; Consider that TTP can form the problem of communication performance bottleneck, the people such as GiuseppeAteniese propose a kind of distributed email solutions TRICERT that signs for, adopt distributed computing technology to divide (i.e. Distributed T TP) TTP task, reduce the degree of belief (half is credible) single TTP being needed to applying; The people such as AloisPaulin are for the existing problem signed for email protocol and cannot realize because using the transnational interoperability of scope of application finite sum that formed of TTP, propose and a kind ofly sign for e-mail system without the general of TTP, this system can provide the probability of justice undeniable, on the one hand, when agreement performs, addressee progressively obtains the blocks of data in encrypting messages block chain, be that each piece of generation receives evidence, another reverse side stops addressee can obtain its expected information before the execution of Permanent interruption agreement by encryption simultaneously.(3) mutual topological in, the people such as JianyingZhou sign for for existing the problem that email protocol is confined to topology one to one, propose two optimisms and in many ways sign for email protocol, transmit leg can implement mail simultaneously with multiple recipient mutual, and transmit leg and any recipient all can termination protocol run at any time; On this basis, the people such as OnievaJ. have set forth undeniable mechanism in many ways comprehensively, comprise requirement definition and security property.(4) in agreement can be disposed, the people such as MartinAbadi propose and a kind ofly use that the online TTP's of lightweight sign for email protocol, this protocol suite fail safe, autgmentability, easily realize, can be deployed in all over the body, e-mail recipient is outside mail reader and web browser, without the need to other specific software any, simultaneously also without the need to any PKIX; RolfOppliger signs for E-mail service architectural model with TTP involvement level for cutting point summarizes, and discusses the impact that performance, trust and infrastructure are disposed particular architecture model; The people such as GuilinWang are for the existing large expense signed for email solutions and bring owing to introducing complicated cryptography, thus the problem of the mobile radio network environment of resource-constrained cannot be applied to, propose a kind of only containing 3 message steps and 4 kinds of low overhead protocol operated; ArneTauber point out when current sign for that e-mail system is of a great variety, security property is not yet reached common understanding, the interoperability that e-mail system must put forth effort resolution system is signed in large scale deployment, with the security property such as fairness, non-repudiation for classification foundation, the difference assessing and discuss current large scale deployment signs for the difference and compatibling problem that standard email and system need when reaching interoperability target to make up; On this basis, propose the interoperability standard signing for e-mail system, and for European Union give can transnational interoperability sign for email solutions.
Sign for the suppression of Email to the behavior of denial to be positioned to detect afterwards, this means that the denial behavior be detected may prove effective already, perhaps harm is brought to honest user; From safeguarding that the angle of honest user mailing system is said, the denial behavior not yet proved effective is tackled in advance, the cost that more can reduce honest user is followed the trail of in detection after already proving effective than denial behavior, but all cannot provide this type of function to sign for the credible e-mail technique that Email is representative at present.Moreover, although early warning technology has obtained ripe utilization on the potential security threat in prevention information space, especially deny the research not appearance of behavior early warning at present for safety of electronic mail early warning.
Summary of the invention
Goal of the invention: the object of the invention is to solve the deficiencies in the prior art, the Email of a kind of software-oriented define grid is provided to deny suppression system and suppressing method thereof, outside the measuring ability of denial afterwards that denial suppressing method of the present invention not only can provide similar tradition to sign for e-mail system, before Email is mutual, just can also implement source to potential denial behavior and suppress.
Technical scheme: software defined network (SoftwareDefinedNetworking, SDN) proposed in next generation internet architectural study project by Stanford University CleanSlate scientific research group at first, as a kind of organization plan changing legacy interconnect net system, SDN is once proposing the active response obtaining rapidly the Internet giants such as Google, Facebook, Microsoft, Cisco and Juniper, there is promotion SDN standardized open network foundation (OpenNetworkFoundation, ONF) P thereupon.SDN difference and the core of legacy network are network control planes and being separated of datum plane.
The Email of a kind of software-oriented of the present invention define grid denies suppression system, comprise datum plane and control plane, described datum plane is conventional e-mail interaction models, and control plane is that the denial being additional to conventional e-mail interaction models suppresses unit.
Further, described denial suppresses unit to comprise mutual evidence bundled components, mutual evidence management assembly, denies behavioral value assembly, signs for behavior evaluation assembly, signs for reliability Management Unit and the behavior of denial early warning assembly;
Described mutual evidence bundled components utilizes undeniable technology to carry out the unique association binding of behavior-evidence to the interbehavior be based upon on conventional e-mail interaction models, and binding result is submitted to mutual evidence management assembly with the form of mutual evidence;
Described mutual evidence management assembly carries out chain type management to the mutual evidence from mutual evidence bundled components, submits history evidence to denial behavioral value assembly simultaneously;
Described denial behavioral value assembly utilize from mutual evidence management component retrieves to history evidence denials detection is carried out to E-mail receiver/send behavior, and testing result submitted to the form of the behavior of signing for sign for behavior evaluation assembly;
Described behavior evaluation assembly of signing for utilizes new person's assessment technology to carry out preliminary trust evaluation to the behavior of signing for denying detection components submission, and utilize the history from signing for this Email entity that reliability Management Unit retrieves to sign for reliability sequence on this basis, trust revaluation is carried out to the entry evaluation result of the behavior of signing for, and result is fed back to the form reliably signing for reliability signs for reliability Management Unit;
Described reliability Management Unit of signing for provides the history of relevant e-mail entity to sign for reliability sequence to signing for behavior evaluation assembly, receives from signing for reliably signing for reliability revaluation result, providing up-to-date reliability of signing for for denying the early warning decision of behavior to denial behavior early warning assembly of behavior evaluation assembly;
Described denial behavior early warning assembly is up-to-dately signed for reliability from what sign for reliability Management Unit retrieval relevant e-mail entity, denial early warning order is applied to traditional Email interaction models is carried out denying suppressing in advance.
The Email that the invention also discloses a kind of software-oriented define grid denies the suppressing method of suppression system, comprises the following steps:
(1) the denial early warning stage before Email is mutual, denial behavior early warning assembly currently treats that mutual the up-to-date of Email entity signs for reliability from signing for reliability Management Unit to retrieve, be about to Email entity the Email interbehavior that carries out according to this reliability implement to deny early warning, and it is mutual that result is acted on the form denying early warning order the Email that mail inter-entity is about to carry out;
(2) the denial management phase in Email reciprocal process, mutual evidence bundled components utilizes undeniable technology to implement electronic evidence binding to the interbehavior of mail entity, and binding result is submitted to evidence management assembly with the form of mutual evidence carries out timing management;
(3) the denial detection-phase after Email is mutual, deny behavioral value assembly from evidence management assembly with the electronic evidence of the form of history evidence retrieval with epicycle Email intercorrelation, the Email entity behavior utilizing the denial arbitration technique in undeniable service just to occur epicycle is on this basis implemented to deny and is detected, and testing result is submitted to the form of the behavior of signing for and signed for behavior evaluation assembly and carry out reliability assessment;
(4) after Email is mutual, sign for reliability feedback stage, sign for behavior evaluation assembly after the preliminary reliability assessment completing the behavior of signing for, utilize and sign for the preliminary reliability assessment result of reliability sequence pair carry out signing for reliability revaluation from signing for history that reliability Management Unit retrieves, its result is submitted to the form reliably signing for reliability and is signed for reliability Management Unit and carry out timing management, the denial behavior early warning before mutual for next round Email and next round Email mutual after sign for reliability feedback.
Further, the reliability of signing in described step (1) is the degree of recognition that in e-mail system, the public signs for behavior to Email physical mail; Denial early warning order is the preliminary treatment measure to the potential denial behavior of Email entity, difference according to granularity can have different preliminary treatment measures, such as forbid that Email entity sends mail, forbids that Email entity receives mail, forbids the mutual mail of Email inter-entity, and allow the mutual mail of Email inter-entity etc.
Further, the mutual evidence in described step (2) is the digital signature for the specific interbehavior of unique association Email entity.
Further, the history evidence in described step (3) is the digital signature of the previous interbehavior of unique association Email to be detected entity; And the deception that the behavior of signing for is Email entity to be showed in mail transmission/reception problem or dishonest behavior.
Further, the Evaluation of reliability that reliability is behavior of signing for Email entity is signed in described step (4); Ordered sets during to be Email entity on previous contiguous mutual wheel sign for reliability that history signs for reliability sequence; Reliably sign for reliability be use Email entity history to sign for the current preliminary reliability assessment result signing for behavior of reliability sequence pair Email entity carries out obtaining after revaluation calculates to the current final Evaluation of reliability signing for behavior.
Beneficial effect: compared with prior art, the present invention has the following advantages:
(1) the present invention compensate for existing mail technique of signing for and can only deny to Email the deficiency that behavior suppresses afterwards alternately, provide the suppression technology in advance of denial behavior innovatively, also achieve suppression in advance and working in coordination with of afterwards suppressing based on the principle of closed loop feedback simultaneously, ensure the interests of honest mail user to greatest extent;
(2) early warning is the key that denial behavior suppresses in advance, first the denial behavior of Email entity on mail transmission/reception and dishonest behavior Unify legislation are the behavior of signing for by the present invention for this reason, on this basis by reliability assessment technology, innovatively the behavior of signing for is quantified as Email physical mail transmitting-receiving denial degree can consistently be described sign for reliability, and this is signed for reliability denies early warning decision-making foundation as Email;
(3) the present invention does not destroy traditional Email interaction models to the suppression that Email denies behavior, this make based on the present invention realize system can be compatible well with the electronic mail network infrastructure of current widespread deployment, enormously simplify system dispose cost and complexity.
Accompanying drawing explanation
Fig. 1 is present system structure and process chart;
Fig. 2 is the network design figure of the embodiment of the present invention;
Fig. 3 is the denial behavior injection model schematic diagram of the embodiment of the present invention;
Fig. 4 signs for reliability susceptibility under situation is denied in the nothing collusion of the embodiment of the present invention to compare schematic diagram;
Fig. 5 signs for reliability susceptibility under situation is denied in the collusion of the embodiment of the present invention to compare schematic diagram;
Fig. 6 is that the collusion of the embodiment of the present invention is denied signing for reliability susceptibility influence power schematic diagram;
Fig. 7 is the denial behavior inhibition schematic diagram in advance of the embodiment of the present invention;
Fig. 8 is the denial behavior rejection ability schematic diagram in advance of the embodiment of the present invention.
Embodiment
Below technical solution of the present invention is described in detail in conjunction with the accompanying drawings and embodiments.
As shown in Figure 1, the Email of a kind of software-oriented of the present invention define grid denies suppression system, follow the software defined network thought controlling to peel off mutually with data, comprise datum plane and control plane, described datum plane is conventional e-mail interaction models, and control plane is that the denial being additional to conventional e-mail interaction models suppresses unit.
Wherein, deny suppression unit to comprise mutual evidence bundled components, mutual evidence management assembly, deny behavioral value assembly, sign for behavior evaluation assembly, sign for reliability Management Unit and the behavior of denial early warning assembly;
Mutual evidence bundled components utilizes undeniable technology to carry out the unique association binding of behavior-evidence to the interbehavior be based upon on conventional e-mail interaction models, and binding result is submitted to mutual evidence management assembly with the form of mutual evidence;
Mutual evidence management assembly carries out chain type management to the mutual evidence from mutual evidence bundled components, submits history evidence to denial behavioral value assembly simultaneously;
Deny behavioral value assembly utilize from mutual evidence management component retrieves to history evidence denials detection is carried out to E-mail receiver/send behavior, and testing result submitted to the form of the behavior of signing for sign for behavior evaluation assembly;
Signing for behavior evaluation assembly utilizes trust evaluation technology to carry out preliminary trust evaluation to the behavior of signing for denying detection components submission, and utilize the history from signing for this Email entity that reliability Management Unit retrieves to sign for reliability sequence on this basis, trust revaluation is carried out to the entry evaluation result of the behavior of signing for, and result is fed back to the form reliably signing for reliability signs for reliability Management Unit;
Sign for reliability Management Unit to provide the history of relevant e-mail entity to sign for reliability sequence to signing for behavior evaluation assembly, receive from signing for reliably signing for reliability revaluation result, providing up-to-date reliability of signing for for denying the early warning decision of behavior to denial behavior early warning assembly of behavior evaluation assembly;
Denial behavior early warning assembly is up-to-dately signed for reliability from what sign for reliability Management Unit retrieval relevant e-mail entity, denial early warning order is applied to traditional Email interaction models is carried out denying suppressing in advance.
Deny in suppression system at above-mentioned Email, denial management from the mutual front denial early warning of Email, reciprocal process, denial after mutual detects and signs for reliability feedback, whole process make Email become alternately a closed loop self feed back denial suppress system, meet Email mutual without denial demand.
The Email that the invention also discloses a kind of software-oriented define grid denies the suppressing method of suppression system, comprises the following steps:
(1) the denial early warning stage before Email is mutual, denial behavior early warning assembly currently treats that mutual the up-to-date of Email entity signs for reliability from signing for reliability Management Unit to retrieve, be about to Email entity the Email interbehavior that carries out according to this reliability implement to deny early warning, and it is mutual that result is acted on the form denying early warning order the Email that mail inter-entity is about to carry out;
Wherein, sign for reliability and refer to that in e-mail system, the public signs for the degree of recognition of behavior to Email physical mail; Denial early warning order refers to the preliminary treatment measure to the potential denial behavior of Email entity, difference according to granularity can have different preliminary treatment measures, such as forbid that Email entity sends mail, forbids that Email entity receives mail, forbids the mutual mail of Email inter-entity, and allow the mutual mail of Email inter-entity etc.;
(2) the denial management phase in Email reciprocal process, mutual evidence bundled components utilizes undeniable technology to implement electronic evidence binding to the interbehavior of mail entity, and binding result is submitted to evidence management assembly with the form of mutual evidence carries out timing management; This mutual evidence is the digital signature for the specific interbehavior of unique association Email entity;
(3) the denial detection-phase after Email is mutual, deny behavioral value assembly from evidence management assembly with the electronic evidence of the form of history evidence retrieval with epicycle Email intercorrelation, the Email entity behavior utilizing the denial arbitration technique in undeniable service just to occur epicycle is on this basis implemented to deny and is detected, and testing result is submitted to the form of the behavior of signing for and signed for behavior evaluation assembly and carry out reliability assessment; Wherein, history evidence refers to the digital signature of the previous interbehavior of unique association Email to be detected entity, and the deception that the behavior of signing for is Email entity to be showed in mail transmission/reception problem or dishonest behavior;
(4) after Email is mutual, sign for reliability feedback stage, sign for behavior evaluation assembly after the preliminary reliability assessment completing the behavior of signing for, utilize and sign for the preliminary reliability assessment result of reliability sequence pair carry out signing for reliability revaluation from signing for history that reliability Management Unit retrieves, its result is submitted to the form reliably signing for reliability and is signed for reliability Management Unit and carry out timing management, denial behavior early warning before mutual for next round Email and next round Email mutual after sign for reliability feedback, herein sign for the Evaluation of reliability that reliability is behavior of signing for Email entity, ordered sets during to be Email entity on previous contiguous mutual wheel sign for reliability that history signs for reliability sequence, reliably sign for reliability be use Email entity history to sign for the current preliminary reliability assessment result signing for behavior of reliability sequence pair Email entity carries out obtaining after revaluation calculates to the current final Evaluation of reliability signing for behavior.
Core link in said process is the binding of mutual evidence, denies behavioral value, signs for behavior evaluation and the behavior of denial early warning, and the specific works principle of these four core links is as follows:
(1) in mutual evidence binding, for supporting group sending of email (single-shot being considered as the special case mass-sended herein), the present invention adopts the in many ways undeniable evidence binding technology possessing one-to-many topological structure.The method of mutual evidence binding is: information to be sent is divided into two pieces: encryption key and ciphertext, is the mutual and cipher key interaction of ciphertext by mail reciprocal decomposition; First ciphertext and signature NRO (Non-RepudiationOrigin) are sent to recipient by transmit leg, concomitantly key and signature Sub (Submission) are sent to TTP (TrustThirdParty) simultaneously; Respond with signature NRR (Non-RepudiationReceipt) after recipient receives this ciphertext; It is published in public directory by TTP after receiving key together with signature Con (Confidence), and such recipient just can obtain key from TTP thus decrypt expressly, and transmit leg also can from retrieving Con and being preserved.
The symbol related to when describing mutual evidence binding procedure is described below:
X ╟/(╢) Y:[M] entity X to/(from) entity Y transmission/(acquisition) information M;
S, R, R ', Ri e-mail sending, recipient's set, recipient's subclass, recipient member;
Entity public key set in uRi, uRRi PKI, R;
SigB xB(M), MB iBx implements signature, s for sending to the specific mail of Ri expressly to mail M;
C=EB kB(M), M=DB kB(C) with key K encrypting messages M obtain ciphertext C, deciphering C obtain plaintext M;
H (), EB rB() one-way hash function, group's encryption function (its ciphertext can only be deciphered by member in R).Concrete mutual evidence binding, as shown in process 1, is described below:
Process 1.BbindE//behavior-evidence binding procedure
Input: s, R={RB iB| l≤i≤| R|}, M={MB iB| l≤i≤| R|}, TTP;
Export: behavior-evidence binding result;
begin
// step 1-5 is system initialization
1.s and each Ri initialization counter CounterB separately sB← 0 and CounterB riB← 0;
2.s and each Ri select time section tB separately sBand tB riB, preserve SubB for definition of T TP kBand NRRB iBtime limit;
3.TTP selects information announcement duration tB 0B;
4.s is that each Ri selects random number nB iB, and calculate xB iB← EB uRiB(nB iB);
5.s selects key K, for each Ri calculates and cB iB← EB kiB(MB iB);
// step 6-9 is for implementing binding
6.s ╟ Ri:[Ri, tB sB, lB iB, cB iB, xB iB, uRi, NROB iB]; // in R entity mass-sending ciphertext, can with step 6' concurrence performance
6'.s ╟ TTP:[R, tB sB, L, EB rB(K), NRO, CounterB sB++, SubB kB]; // submit key to
7.Ri ╟ TTP:[s, lB iB, xB iB, uRi, tB riB, NROB iB, CounterB riB++, NRRB iB]; // application receives key
8.s ╢ TTP:[s, R ', L ', T, tB sB, tSetB r ' B, EB r ' B(EB rB(K)), NRR, ConB kB]; // retrieval key receives evidence
9.Ri ╢ TTP:[s, R ', L ', T, tB sB, tSetB r ' B, EB r ' B(EB rB(K)), NRR, ConB kB]; // obtain key
// step 10 is binding result feedback
10. homing behavior evidence binding result.
end
Relevant field information is described below:
lB iB=h(s,Ri,TTP,h(cB iB),h(K)),L={lB iB|Ri∈R∧l≤i≤|R|},L′={lB iB|Ri∈R′∧l≤i≤|R′|}
NROB iB=SigB sB(Ri,lB iB,xB iB,uRi,tB sB,h(cB iB)),NRO={NROB iB|Ri∈R∧1≤i≤|R|}
NRRB iB=SigB RiB(s,lB iB,xB iB,uRi,tB RiB,cB iB,NRO,CounterB RiB),
SubB KB=SigB sB(R,L,tB sB,EB RB(K),NRO,CounterB sB),tSetB R′ B={tB RjB|1≤j≤|R′|}
ConB KB=SigB TTPB(s,R′,L′,T,tB sB,tSetB R′B,EB R’B(EB RB(K)),NRO,NRR)
Said process can guarantee that mail transmission/reception Fang Junneng obtains behavior of the signing for evidence of the other side, and namely s obtains the mail reception evidence { NRRB of Ri iB, ConB kB, Ri obtains the mail sending evidence { NROB of s iB, ConB kB.
(2) on denial behavioral value, the transmission for Email is denied behavior and is received denial behavior, and the present invention can adopt the following two kinds detection algorithm to investigate respectively:
Detection algorithm is denied in algorithm 1Check-Origin//transmission
Input: ConB kB, NROB iB, TTP, Ri, s, CounterB sB, CounterB riB, cB iB, MB iB, K, lB iB
Export: isOrigin//whether deny transmission
begin
1.Kfroms←0;cB iBfroms←0;legreceiver←0;noreplay←0;legrnd←0;rightcipher←0;isOrigin←0;
2.ifConB kBthe signature thenKfromsB of isTTP b← 1; //s submitted K to TTP
3.ifNROB iBthe signature thencB of iss iBfromsB b← 1; The cB that //Ri receives iBsent by s
4.ifRibelongstoR ' thenlegreceiver ← 1; //Ri is effective recipient
5.ifCounterB riB==CounterB sBthennoreplay ← 1; //s and Ri does not all reset the other side's message
6.iflB iB==h (s, Ri, TTP, h (cB iB), h (K)) thenlegrnd ← 1; //lB iBit is legal agreement wheel mark
7.ifcB iB==EB kiB(MB iB) thenrightcipher ← 1; //cB iBit is correct ciphertext
8.ifKfromsB b* cB iBfromsB b* legreceiver*noreplay*legrnd*rightcipherthenisOrigin ← 1; //s sent MB iBto Ri
9.returnisOrigin;
end
Detection algorithm is denied in algorithm 2Check-Receipt//reception
Input: ConB kB, NROB iB, NRRB iB, TTP, Ri, s, CounterB sB, CounterB riB, cB iB, MB iB, K, lB iB
Export: isReceipt//whether deny reception
begin
1.cangetK←0;getcipher←0;truecipher←0;legreceiver←0;noreplay←0;legrnd←0;rightcipher←0;isReceipt←0;
2.ifConB kBthe signature thencangetKB of isTTP b← 1; //Ri can obtain ki
3.ifNRRB iBsignature thengetcipher ← 1 of isRi; //Ri receives cB iBand be willing to obtain ki from TTP
4.ifNROB iBsignature thentruecipher ← 1 of iss; //cB iBgenuine
5.ifRibelongstoR ' thenlegreceiver ← 1; //Ri is effective recipient
6.ifCounterB riB==CounterB sBthennoreplay ← 1; // there is not message-replay
7.iflB iB==h (s, Ri, TTP, h (cB iB), h (K)) thenlegrnd ← 1; // agreement wheel is legal
8.ifcB iB==EB kiB(MB iB) thenrightcipher ← 1; //cB iBit is correct ciphertext
9.ifKfromsB b* cB iBfromsB b* legreceiver*noreplay*legrnd*rightcipherthenisReceipt ← 1; //Ri received the MB that s sends iB
10.returnisReceipt;
end
(3) signing in behavior evaluation, the present invention uses and signs for reliability to carry out unified quantization.
In the present invention, the assessment of signing for reliability is carried out in two steps, comprise and initially sign for reliability calculating and sign for reliability revaluation.
One, initially signs for reliability CRB tBcalculate, assess according to denying testing result, subscript t is for identifying the assessment moment;
Its two, reliability TVB is signed in revaluation tBcalculate, in order to make to sign for, reliability approaches entity to be assessed truly signs for behavior, adopts herein and signs for reliability revaluation model as follows to initially signing for reliability RB tBimplement revaluation:
TVB tB=α * CRB tB+ β * HB tB+ γ * DB tB+ δ * DB tB* | SDB tB| (formula 1)
As shown in Equation 1, the present invention utilizes four kinds of data (initially to sign for reliability CRB tB, history signs for reliability HB tB, sign for reliability fluctuation ratio DB tB, sign for reliability fluctuation tendency SDB tB) come CRB tBcarry out revaluation, what make revaluation reliability more approach entity from 5 angles truly signs for behavior, and first is by γ * DB tBweighted calculation measures the burst fluctuation (from jumping as denying without denying, jumping as nothing is denied from denial) of the behavior of signing for; Second is by β * HB tB+ γ * DB tB+ δ * DB tB* | SDB tB| weighted calculation distinguishes improvement (being tending towards without denying) and the deterioration (being tending towards denying) that entity signs for behavior; 3rd is by α * CRB tB+ β * HB tBweighted calculation tolerates unconscious wrong denial behavior, and consistently reflect entity truly sign for behavior; 4th is by γ * DB tB+ δ * DB tB* | SDB tB| weighted calculation strengthens signs for the ageing of reliability assessment.Weight coefficient α in formula 1, beta, gamma and δ all between 0 and 1, component HB tB, DB tB, SDB tBcomputational methods as follows:
HB tB = 1 LH * ∫ t - LH t - 1 CR x d x ≈ Σ k = t - LH t - 1 CR k * ρ t - ( k + 1 ) / Σ i = t - LH t - 1 ρ t - ( i + 1 ) (formula 2)
In above-mentioned formula 2, ρ (0< ρ≤1) and LH is respectively the concern Summing Factor previously signing for reliability and pays close attention to number of time slots.
DB tB = &Sigma; k = t - LH t - 1 ( CR k - &Sigma; i = t - LH t - 1 CR i / LH ) 2 / LH &ap; CRB tB - HB tB (formula 3)
SDB tB = &Sigma; k = t - LDH t - 1 ( D k - &Sigma; i = t - LDH t - 1 D i / LDH ) 2 / LDH &ap; DB t B - &Sigma; k = t - LDH t - 1 D k * &theta; t - ( k + 1 ) / &Sigma; i = t - LDH t - 1 &theta; t - ( i + 1 ) (formula 4)
In above-mentioned formula 4, θ (0< θ≤1) and LDH is respectively the concern Summing Factor previously signing for reliability fluctuation ratio and pays close attention to number of time slots.
LH in formula 2, LDH in formula 4, and α in formula 1, beta, gamma and δ arrange as follows respectively:
1) LH and LDH is set to the vibration time slot size that malious email entity strategy denies behavior usually;
2) beta/alpha is proportional to LH usually;
3) arrange &gamma; = &gamma; 1 , D t &GreaterEqual; 0 &gamma; 2 , D t < 0 ; &gamma; 1 &le; &gamma; 2 (formula 5)
4) arrange &delta; = &delta; 1 , D t * SD t < 0 &delta; 2 , D t * SD t &GreaterEqual; 0 ; &delta; 1 &le; &delta; 2 (formula 6)
(4) in denial behavior early warning, the present invention carries out early warning decision according to signing for reliability,
Sign in the present invention reliability threshold values (CertifiedReputationThreshold, CRT) refer to Email entity x t take turns Email mutual in sign for reliability threshold values, and CRTB tB(x) be Email entity patient the minimum of other Email entity sign for reliability.
Suppose TVB tB(x) and CRTB tBx () is signing for reliability and signing for reliability threshold values of the mutual front mail entity x of t wheel respectively, s is e-mail sending, R={RB 1B, RB 2B..., RB | R|Bbe the set of mail reception side, then the denial prediction policy that the present invention uses is:
(formula 7)
In above formula, PI, IS, PR and II represent respectively and can normally mutual, transmission deny, receive denial, transmitting-receiving denial.
Embodiment:
For setting forth the actual inhibition of the present invention to the behavior of denial further, set up a real Email in the present embodiment and deny suppression system RIMail, building of this system employs Open-Source Tools OpenFlow, and uses Email of the present invention denial suppressing method to carry out denial suppression.
As shown in Figure 2, the structure of the RIMail system in the present embodiment relates to 5 PC, wherein: pc0 is as OpenFlow controller (installation increase income POX controller), run RIMail controller (denial namely in the present invention suppresses unit) thereon, be responsible to define Email and deny suppression strategy alternately, and Policy Result is distributed OpenFlow switch by OpenFlow agreement by escape way; Pc1 and pc2 is as OpenFlow switch (install Mininet and OpenvSwitch), and the Email distributed according to controller is denied suppression strategy alternately and formed e-mail data and pass alternating-current meter, and exchange e-mails data accordingly; Pc3 is as email client (installing the e-mail client software NRMail of customization), and main task has two, and one is smtp and the pop3 client functionality realizing Traditional E-mail System; Two is the SOCKET communication of intercepting and capturing conventional e-mail data interaction, and it is submitted to RIMail controller by control channel; Pc4, as mail service end (installing winmail5.1.1 mail service), provides smtp and pop3 to serve simultaneously.
In the present embodiment, the experiment parameter of RIMail system arranges as follows:
A, mail entity total amount are 1025, and wherein honest entity is 4:1 with the ratio of malicious entities quantity; Honest entity is not denied, is not conspired, do not calumniate other people with other people; Malicious entities can show tactful denial behavior, can implement collusion each other because of private interests, and the honest entity that spreads vicious gossip;
B, initially sign for reliability RB tBsimple computation is, if testing result is for denying, then and RB tB=0.1, otherwise RB tB=1;
The strategy of C, honest entity and malicious entities denies behavior injection model as shown in Figure 3, and vibration time slot is set to 10 timeslices (being namely set to 20 timeslices cycle of oscillation);
D, setting sign for reliability calculating parameter α=0.2, β=0.8, γ B 1B=0.05, γ B 2B=0.2, δ B 1B=0.05, δ B 2B=0.2, LH=LDH=10.
RIMail service data 1---sign for the sensitivity analysis of reliability to the behavior of denial:
Based on the denial behavior injection model shown in Fig. 3, Fig. 4 gives and denies honest entity under situation without collusion in RIMail system and sign for reliability (calumniated and without calumny) and malicious entities signs for reliability ([ρ=1, θ=1], [ρ=1, θ=0.75], [ρ=0.75, θ=1] and [ρ=0.75, θ=0.75]) fluctuation situation; Correspond, Fig. 5 gives malicious entities collusion and denies honest entity under situation and malicious entities signs for reliability fluctuation situation, can find out, what the existence of malicious entities libel action on the one hand can reduce honest entity signs for reliability; Although on the other hand under four kinds of history attention rates malicious entities make a profit (namely abuse sign for reliability have an eye to the main chance and recovery sign for reliability pay the difference of cost) substantially equal, but ρ less (namely reducing the attention rate to previously initially signing for reliability) and θ comparatively greatly (namely improving the attention rate to previously signing for reliability fluctuation ratio) time, sign for reliability more responsive to denial behavior.
Fig. 6 analyzes malicious entities collusion further and denies impact on signing for reliability susceptibility and causing, can find out, four groups of ([ρ=1, θ=1], [ρ=1, θ=0.75], [ρ=0.75, θ=1] and [ρ=0.75, θ=0.75]) under different attention rate, the enforcement of collusion all can make: (1) susceptibility when behavior worsens reduces; (2) when behavior improves, susceptibility improves; (3) malicious entities profit can promote.
RIMail service data 2---deny behavior inhibition analysis in advance:
With sign for compared with e-mail model, the valuable feature of EmRIM is can detect denial behavior in advance and implements source and suppresses, for this reason, the present embodiment with history attention rate [ρ=1, θ=0.75] for example is evaluated and tested the denial inhibition in advance of RIMail system.To arrange threshold coefficient be 0.8 (namely sign for reliability threshold values=sign for reliability * 0.8), and Fig. 7 gives mail mutual total amount when rising to 10000 times from 0 time by step-length 20, send in RIMail deny, receive deny, transmitting-receiving denies and without denial situation.From overall trend, having/[nothing] conspire and have/under [nothing] calumniates four kinds of occasions, along with the carrying out that denial behavior suppresses in advance, send denial in RIMail, receive denial and receive and dispatch the proportion denied and sharply reduce, sharply rise without denying mutual proportion, this shows EmRIM Be very effective on denial behavior suppresses in advance, greatly can promote the mutual credibility of Email.
RIMail service data 3---deny behavior rejection ability analysis in advance:
Suppress the analysis of denial ability to intend the three kinds of gauges adopting assessment grader conventional to EmRIM: recall ratio (Recall), precision ratio (Precision) and harmonic-mean (F-measure) in advance.
If in mail interbehavior sample to be detected, TP is the sample number be correctly validated as denying behavior, and FN is the sample number being mistaken for dishonest behavior, and FP is the sample number being mistaken for denial behavior, then three conventional tolerance are respectively:
(1) behavior recall ratio is denied: R=TP/ (TP+FN);
(2) behavior precision ratio is denied: P=TP/ (TP+FP);
(3) harmonic-mean: F=2*P*R/ (P+R).
ρ=1 is set, θ=0.75, threshold coefficient be 0.8, Fig. 8 analyze EmRIM having/[nothing] conspire and have/[nothing] calumniate denial behavior rejection ability in advance under four kinds of occasions.Can find out, although recall ratio mean value maintains about 0.4 (under-enumeration part will be detected) in advance afterwards, but precision ratio is high in advance, and obtain good harmonic-mean, this shows that EmRIM possesses certain denial behavior rejection ability in advance.

Claims (7)

1. the Email of a software-oriented define grid denies suppression system, it is characterized in that: comprise datum plane and control plane, described datum plane is conventional e-mail interaction models, and control plane is that the denial being additional to conventional e-mail interaction models suppresses unit.
2. the Email of software-oriented according to claim 1 define grid denies suppression system, it is characterized in that: described denial suppresses unit to comprise mutual evidence bundled components, mutual evidence management assembly, denies behavioral value assembly, signs for behavior evaluation assembly, signs for reliability Management Unit and the behavior of denial early warning assembly;
Described mutual evidence bundled components utilizes undeniable technology to carry out the unique association binding of behavior-evidence to the interbehavior be based upon on conventional e-mail interaction models, and binding result is submitted to mutual evidence management assembly with the form of mutual evidence;
Described mutual evidence management assembly carries out chain type management to the mutual evidence from mutual evidence bundled components, submits history evidence to denial behavioral value assembly simultaneously;
Described denial behavioral value assembly utilize from mutual evidence management component retrieves to history evidence denials detection is carried out to E-mail receiver/send behavior, and testing result submitted to the form of the behavior of signing for sign for behavior evaluation assembly;
Described behavior evaluation assembly of signing for utilizes reliability assessment technology to carry out preliminary trust evaluation to the behavior of signing for denying detection components submission, and utilize the history from signing for this Email entity that reliability Management Unit retrieves to sign for reliability sequence on this basis, trust revaluation is carried out to the entry evaluation result of the behavior of signing for, and result is fed back to the form reliably signing for reliability signs for reliability Management Unit;
Described reliability Management Unit of signing for provides the history of relevant e-mail entity to sign for reliability sequence to signing for behavior evaluation assembly, receives from signing for reliably signing for reliability revaluation result, providing up-to-date reliability of signing for for denying the early warning decision of behavior to denial behavior early warning assembly of behavior evaluation assembly;
Described denial behavior early warning assembly is up-to-dately signed for reliability from what sign for reliability Management Unit retrieval relevant e-mail entity, denial early warning order is applied to traditional Email interaction models is carried out denying suppressing in advance.
3. the Email of the software-oriented define grid as described in claim 1 and 2 any one denies a suppressing method for suppression system, it is characterized in that: comprise the following steps:
(1) the denial early warning stage before Email is mutual, denial behavior early warning assembly currently treats that mutual the up-to-date of Email entity signs for reliability from signing for reliability Management Unit to retrieve, be about to Email entity the Email interbehavior that carries out according to this reliability implement to deny early warning, and it is mutual that result is acted on the form denying early warning order the Email that mail inter-entity is about to carry out;
(2) the denial management phase in Email reciprocal process, mutual evidence bundled components utilizes undeniable technology to implement electronic evidence binding to the interbehavior of mail entity, and binding result is submitted to evidence management assembly with the form of mutual evidence carries out timing management;
(3) the denial detection-phase after Email is mutual, deny behavioral value assembly from evidence management assembly with the electronic evidence of the form of history evidence retrieval with epicycle Email intercorrelation, the Email entity behavior utilizing the denial arbitration technique in undeniable service just to occur epicycle is on this basis implemented to deny and is detected, and testing result is submitted to the form of the behavior of signing for and signed for behavior evaluation assembly and carry out reliability assessment;
(4) after Email is mutual, sign for reliability feedback stage, sign for behavior evaluation assembly after the preliminary reliability assessment completing the behavior of signing for, utilize and sign for the preliminary reliability assessment result of reliability sequence pair carry out signing for reliability revaluation from signing for history that reliability Management Unit retrieves, its result is submitted to the form reliably signing for reliability and is signed for reliability Management Unit and carry out timing management, the denial behavior early warning before mutual for next round Email and next round Email mutual after sign for reliability feedback.
4. the Email of software-oriented according to claim 3 define grid denies the suppressing method of suppression system, it is characterized in that: the reliability of signing in described step (1) is the degree of recognition that in e-mail system, the public signs for behavior to Email physical mail; Denial early warning order is the preliminary treatment measure to the potential denial behavior of Email entity, and the difference according to granularity can have different preliminary treatment measures.
5. the Email of software-oriented according to claim 3 define grid denies the suppressing method of suppression system, it is characterized in that: the mutual evidence in described step (2) is the digital signature for the specific interbehavior of unique association Email entity.
6. the Email of software-oriented according to claim 3 define grid denies the suppressing method of suppression system, it is characterized in that: the history evidence in described step (3) is the digital signature of the previous interbehavior of unique association Email to be detected entity; And the deception that the behavior of signing for is Email entity to be showed in mail transmission/reception problem or dishonest behavior.
7. the Email of software-oriented according to claim 3 define grid denies the suppressing method of suppression system, it is characterized in that: sign for the Evaluation of reliability that reliability is behavior of signing for Email entity in described step (4); Ordered sets during to be Email entity on previous contiguous mutual wheel sign for reliability that history signs for reliability sequence; Reliably sign for reliability be use Email entity history to sign for the current preliminary reliability assessment result signing for behavior of reliability sequence pair Email entity carries out obtaining after revaluation calculates to the current final Evaluation of reliability signing for behavior.
CN201410482740.3A 2014-09-19 2014-09-19 The Email that software-oriented defines network denies suppression system and its suppressing method Active CN105450502B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410482740.3A CN105450502B (en) 2014-09-19 2014-09-19 The Email that software-oriented defines network denies suppression system and its suppressing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410482740.3A CN105450502B (en) 2014-09-19 2014-09-19 The Email that software-oriented defines network denies suppression system and its suppressing method

Publications (2)

Publication Number Publication Date
CN105450502A true CN105450502A (en) 2016-03-30
CN105450502B CN105450502B (en) 2018-10-09

Family

ID=55560304

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410482740.3A Active CN105450502B (en) 2014-09-19 2014-09-19 The Email that software-oriented defines network denies suppression system and its suppressing method

Country Status (1)

Country Link
CN (1) CN105450502B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105827521A (en) * 2016-06-02 2016-08-03 韩志耕 SDN based e-mail denial source suppression system and suppression method thereof

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060053490A1 (en) * 2002-12-24 2006-03-09 Herz Frederick S System and method for a distributed application and network security system (SDI-SCAM)
CN1852316A (en) * 2006-04-10 2006-10-25 北京航空航天大学 Anti-denial method between UA and MTA based on anti-denial protocol
CN101714957A (en) * 2009-10-30 2010-05-26 北京航空航天大学 System for managing nonrepudiative evidence of mass mails by third party
CN102170407A (en) * 2011-04-18 2011-08-31 南京审计学院 Method for realizing electronic mail credibility management on the basis of anti-fraud control logic unit
CN103684922A (en) * 2013-12-23 2014-03-26 蓝盾信息安全技术股份有限公司 Outlet information privacy checking detection platform system based on SDN (self-defending network) and detection method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060053490A1 (en) * 2002-12-24 2006-03-09 Herz Frederick S System and method for a distributed application and network security system (SDI-SCAM)
CN1852316A (en) * 2006-04-10 2006-10-25 北京航空航天大学 Anti-denial method between UA and MTA based on anti-denial protocol
CN101714957A (en) * 2009-10-30 2010-05-26 北京航空航天大学 System for managing nonrepudiative evidence of mass mails by third party
CN102170407A (en) * 2011-04-18 2011-08-31 南京审计学院 Method for realizing electronic mail credibility management on the basis of anti-fraud control logic unit
CN103684922A (en) * 2013-12-23 2014-03-26 蓝盾信息安全技术股份有限公司 Outlet information privacy checking detection platform system based on SDN (self-defending network) and detection method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
韩志耕等: "多方不可否认协议时限性分析与改进", 《电子学报》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105827521A (en) * 2016-06-02 2016-08-03 韩志耕 SDN based e-mail denial source suppression system and suppression method thereof
CN105827521B (en) * 2016-06-02 2019-07-05 南京审计大学 E-mail based on SDN denies source and inhibits system and its suppressing method

Also Published As

Publication number Publication date
CN105450502B (en) 2018-10-09

Similar Documents

Publication Publication Date Title
US8533806B2 (en) Method for authenticating a trusted platform based on the tri-element peer authentication(TEPA)
US20210367753A1 (en) Trusted measurement and control network authentication method based on double cryptographic values and chaotic encryption
CN102647461B (en) Communication means based on HTTP, server, terminal
CN109559122A (en) Block chain data transmission method and block chain data transmission system
CN109981639B (en) Block chain based distributed trusted network connection method
CN109104271B (en) Digital signature method, device and system
CN102780698A (en) User terminal safety communication method in platform of Internet of Things
US9100418B2 (en) Adaptive data verification for resource-constrained systems
CN110086599B (en) Hash calculation method and signcryption method based on homomorphic chameleon Hash function
US20190356496A1 (en) Public Key Infrastructure &amp; Method of Distribution
CN101931536B (en) Method for encrypting and authenticating efficient data without authentication center
CN105681470A (en) Communication method, server and terminal based on hypertext transfer protocol
CN110519300A (en) Client key method for secure storing based on password bidirectional authentication
Saxena et al. Efficient signature scheme for delivering authentic control commands in the smart grid
US9544144B2 (en) Data encryption
CN105812354A (en) LBS-based anti-attack location privacy protection method for IoV
Chernyi et al. Security of electronic digital signature in maritime industry
CN104394532A (en) Anti-brute force safe log-in method for mobile terminal
CN105450502A (en) Software-defined network oriented email denial suppression system and suppression method thereof
CN103986724A (en) Real-name authentication method and system for e-mail
CN101888383A (en) Method for implementing extensible trusted SSH
US20220021542A1 (en) Low latency immutable data integrity
CN111800384A (en) Financial service application management method and device based on block chain
CN105743647B (en) The cross-domain broadcast authentication method of spatial information net
Jin Cryptographic Solutions for Cyber-Physical System Security

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20180530

Address after: 210000 No. 86, Yushan West Road, Jiangpu street, Pukou District, Nanjing, Jiangsu.

Applicant after: Nanjing Audit University

Address before: 210017 607, room 3, Lake heart garden, 207 Shui Xi Men street, Jianye District, Nanjing, Jiangsu.

Applicant before: Chen Geng

Applicant before: Han Zhigeng

GR01 Patent grant
GR01 Patent grant