CN118555570A - Safety control access method of APN6 - Google Patents

Safety control access method of APN6 Download PDF

Info

Publication number
CN118555570A
CN118555570A CN202410927151.5A CN202410927151A CN118555570A CN 118555570 A CN118555570 A CN 118555570A CN 202410927151 A CN202410927151 A CN 202410927151A CN 118555570 A CN118555570 A CN 118555570A
Authority
CN
China
Prior art keywords
application
information
public key
edge sensing
apn6
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410927151.5A
Other languages
Chinese (zh)
Inventor
李云霞
马中骏
陶高峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Future Network Research Institute Industrial Internet Innovation Application Base Of Zijinshan Laboratory
Original Assignee
Shandong Future Network Research Institute Industrial Internet Innovation Application Base Of Zijinshan Laboratory
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Future Network Research Institute Industrial Internet Innovation Application Base Of Zijinshan Laboratory filed Critical Shandong Future Network Research Institute Industrial Internet Innovation Application Base Of Zijinshan Laboratory
Priority to CN202410927151.5A priority Critical patent/CN118555570A/en
Publication of CN118555570A publication Critical patent/CN118555570A/en
Pending legal-status Critical Current

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application relates to a safety control access method of APN6, which uses the extension head of IPv6 message to carry application information, so that the network can identify the application, and sense the requirement of the application on the network, thereby providing accurate and differentiated network service for different application services. The application can carry out safe access control on the APN6, can prevent the forging of information among different devices, can prevent the information from being tampered on a transmission link, can effectively prevent the processing of invalid packets, and improves the efficiency and the speed of processing the packets by a server.

Description

Safety control access method of APN6
Technical Field
The application belongs to the technical field of network security, and particularly relates to a security control access method of APN 6.
Background
The construction idea of the APN6 network is to re-couple the network and the application information which are originally positioned at different layers of the TCI/IP protocol stack and are mutually decoupled by means of the expandability of the IPv6 header and carry the application information. For a network, the device can perceive application information by parsing the extension header; for applications, application information may be customized. However, since the application information carried by the APN6 is in plain text, the information may be falsified or maliciously tampered during the transmission process, which may cause resource waste caused by receiving an invalid data packet by the server, and may destroy the security of the server.
Disclosure of Invention
The invention provides a secure control access method of APN6, which can ensure secure transmission of data, and a server side can identify normal messages and provide normal services for the messages.
The technical scheme of the invention is as follows:
The method is realized by combining a public key management system based on a serial architecture consisting of a user side, access edge sensing equipment, an APN6 network, transfer-out edge sensing equipment, an operator server and a database, and specifically comprises the following steps of:
The first step: the user terminal uses the application information as a private key and registers with a public key management system; the access edge sensing device, the transfer-out edge sensing device and the operator server register the public key management system with the business capability code to generate a private key; the application information comprises network quality information in application identification information and application demand information, and the network quality information comprises application request network bandwidth, acceptable network maximum time delay, acceptable maximum jitter and acceptable maximum packet loss rate;
And a second step of: the user side sends application information to the access edge sensing equipment, the access edge equipment checks whether the received information carries the application information, if yes, the report passes through, and the application information is directly forwarded to the operator server through the transfer-out edge sensing equipment; if not, the five-tuple is packaged and then forwarded to an operator server through the roll-out edge perception device, the operator server searches a database to judge whether the user is legal or not, if yes, the user returns to the user side to support the user side to continue to access; if not, the report is not passed;
And a third step of: the access edge sensing device and the transfer-out edge sensing device send the public key to an operator server, and the operator server negotiates whether the data in the database are consistent with the received public key by comparing the public key with the public key, if so, the shared key is returned to the access edge sensing device and the transfer-out edge sensing device; if not, returning to failure;
Fourth step: the user terminal generates a summary of the application information of the APN6 network and generates an authentication code by using a shared key signature;
Fifth step: the user end sends a message to the access edge sensing equipment, the access edge sensing equipment decrypts the shared secret key to verify whether the message is a legal APN6 message, if so, the next step is executed; if not, packaging the backup information of the user terminal into a message for re-encryption, selecting network quality information conforming to the application, and forwarding the message to the edge sensing equipment through an APN6 network;
sixth step: after receiving the message, the edge sensing equipment judges whether the application information of the user side passes through the message, if so, the application information is forwarded to an operator server; if not, discarding.
Further, the application identification information comprises an App ID, a User ID, and a Session ID, and is used for uniquely determining the service of the User.
Further, in the first step, after the public key management system receives the registration information, the public key management system checks the validity of the information and updates the database system of the public key management system, and the correspondence table between the public key and the private key is increased.
Due to the adoption of the technical scheme, the application has the following beneficial effects:
the application carries out safety access control on the APN6 in the third step and the fifth step, can prevent the forging of information among different devices, can prevent the information from being tampered on a transmission link, can effectively prevent the processing of invalid packets, and improves the efficiency and the speed of processing the packets by a server.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute a limitation on the application. In the drawings:
FIG. 1 is a system architecture diagram of the present application;
FIG. 2 is a process diagram of the present application in the standby phase;
fig. 3 is a process diagram of the present application during an authentication phase.
Detailed Description
Referring to fig. 1-3, the application provides a secure control access method for an APN6, which is realized by combining a serial architecture consisting of a user side, an access edge sensing device, an APN6 network, a roll-out edge sensing device, an operator server and a database with a public key management system.
The application information of the APN6 may be divided into two parts, wherein one part is application identification information including App ID, user ID, session ID, and the application identification information is used for uniquely determining the service of the User. The other part is application demand information, wherein the application demand information is network quality information comprising application request network bandwidth, acceptable network maximum time delay, acceptable maximum jitter and acceptable maximum packet loss rate.
The method specifically comprises the following steps:
the first step: the user terminal uses the application information as a private key and registers with a public key management system; the access edge perception device, the transfer-out edge perception device and the operator server register the public key management system with the business capability code to generate a private key.
In the first step, after the public key management system receives the registration information, the public key management system checks the validity of the information and updates the database system of the public key management system, and the corresponding relation table of the public key and the private key is increased.
And a second step of: the user side sends application information to the access edge sensing equipment, the access edge equipment checks whether the received information carries the application information, if yes, the report passes through, and the application information is directly forwarded to the operator server through the transfer-out edge sensing equipment; if not, the five-tuple is packaged and then forwarded to an operator server through the roll-out edge perception device, the operator server searches a database to judge whether the user is legal or not, if yes, the user returns to the user side to support the user side to continue to access; if not, the report is not passed.
And a third step of: the access edge sensing device and the transfer-out edge sensing device send the public key to an operator server, and the operator server negotiates whether the data in the database are consistent with the received public key by comparing the public key with the public key, if so, the shared key is returned to the access edge sensing device and the transfer-out edge sensing device; if not, returning to failure.
In the third step, the returned shared key is used for decrypting the transceiving messages in the subsequent step. It will be appreciated by those skilled in the art that the public key and the private key are a set of keys in pairs, i.e., the public key and the private key are one key pair obtained by an algorithm, one of which is disclosed to the outside, referred to as the public key; and the other is reserved by itself and is called a private key.
Fourth step: the user terminal generates a digest of the application information of the APN6 network and generates an authentication code by using the shared key signature.
Fifth step: the user end sends a message to the access edge sensing equipment, the access edge sensing equipment decrypts the shared secret key to verify whether the message is a legal APN6 message, if so, the next step is executed; if not, packaging the backup information of the user terminal into a message for re-encryption, selecting network quality information conforming to the application, and forwarding the message to the edge sensing equipment through an APN6 network;
Sixth step: after receiving the message, the edge sensing equipment judges whether the application information of the user side passes through the message, if so, the application information is forwarded to an operator server, and the operator normally serves the operator server; if not, discarding, and the operator does not provide service.
The application can improve the transmission safety of the APN6 and release the information passing the authentication. The application can block invalid data and discard data packets which do not pass the authentication. The application has strong expansibility, APN6 uses the expansion head of IPv6, and the carried application information can be automatically modified according to the requirement.
The application can be realized by adopting or referring to the prior art at the places which are not described in the application.
The foregoing is merely exemplary of the present application and is not intended to limit the present application. Various modifications and variations of the present application will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. which come within the spirit and principles of the application are to be included in the scope of the claims of the present application.

Claims (3)

1. The method is characterized in that the method is realized by combining a public key management system based on a serial architecture consisting of a user side, an access edge sensing device, an APN6 network, a transfer-out edge sensing device, an operator server and a database, and specifically comprises the following steps:
The first step: the user terminal uses the application information as a private key and registers with a public key management system; the access edge sensing device, the transfer-out edge sensing device and the operator server register the public key management system with the business capability code to generate a private key; the application information comprises network quality information in application identification information and application demand information, and the network quality information comprises application request network bandwidth, acceptable network maximum time delay, acceptable maximum jitter and acceptable maximum packet loss rate;
And a second step of: the user side sends application information to the access edge sensing equipment, the access edge equipment checks whether the received information carries the application information, if yes, the report passes through, and the application information is directly forwarded to the operator server through the transfer-out edge sensing equipment; if not, the five-tuple is packaged and then forwarded to an operator server through the roll-out edge perception device, the operator server searches a database to judge whether the user is legal or not, if yes, the user returns to the user side to support the user side to continue to access; if not, the report is not passed;
And a third step of: the access edge sensing device and the transfer-out edge sensing device send the public key to an operator server, and the operator server negotiates whether the data in the database are consistent with the received public key by comparing the public key with the public key, if so, the shared key is returned to the access edge sensing device and the transfer-out edge sensing device; if not, returning to failure;
Fourth step: the user terminal generates a summary of the application information of the APN6 network and generates an authentication code by using a shared key signature;
Fifth step: the user end sends a message to the access edge sensing equipment, the access edge sensing equipment decrypts the shared secret key to verify whether the message is a legal APN6 message, if so, the next step is executed; if not, packaging the backup information of the user terminal into a message for re-encryption, selecting network quality information conforming to the application, and forwarding the message to the edge sensing equipment through an APN6 network;
sixth step: after receiving the message, the edge sensing equipment judges whether the application information of the user side passes through the message, if so, the application information is forwarded to an operator server; if not, discarding.
2. The method for secure control access to APN6 of claim 1,
The application identification information comprises an App ID, a User ID and a Session ID, and is used for uniquely determining the service of the User.
3. The method for secure control access to APN6 of claim 1,
In the first step, after the public key management system receives the registration information, the public key management system checks the validity of the information and updates the database system of the public key management system, and the corresponding relation table of the public key and the private key is increased.
CN202410927151.5A 2024-07-11 2024-07-11 Safety control access method of APN6 Pending CN118555570A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410927151.5A CN118555570A (en) 2024-07-11 2024-07-11 Safety control access method of APN6

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410927151.5A CN118555570A (en) 2024-07-11 2024-07-11 Safety control access method of APN6

Publications (1)

Publication Number Publication Date
CN118555570A true CN118555570A (en) 2024-08-27

Family

ID=92444323

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410927151.5A Pending CN118555570A (en) 2024-07-11 2024-07-11 Safety control access method of APN6

Country Status (1)

Country Link
CN (1) CN118555570A (en)

Similar Documents

Publication Publication Date Title
US7116668B2 (en) Method for time stamp-based replay protection and PDSN synchronization at a PCF
O'shea et al. Child-proof authentication for MIPv6 (CAM)
CN101965722B (en) Re-establishment of a security association
Durham et al. The COPS (common open policy service) protocol
AU2003294330B2 (en) Methods and apparatus for dynamic session key generation and rekeying in mobile IP
KR100651715B1 (en) Method for generating and accepting address automatically in IPv6-based Internet and data structure thereof
US20030147537A1 (en) Secure key distribution protocol in AAA for mobile IP
US20070101408A1 (en) Method and apparatus for providing authorization material
EP1639780B1 (en) Security for protocol traversal
CN113395247B (en) Method and equipment for preventing replay attack on SRv6HMAC verification
CA2280906C (en) Secure packet radio network
JP2009526455A (en) A method for ensuring the authenticity of messages exchanged according to the mobile internet protocol
Galvin et al. SNMP Security Protocols
Rodeh et al. Ensemble security
CN113473456B (en) Million-level Internet of things terminal security access method and system based on domestic passwords
Liu et al. Secure name resolution for identifier-to-locator mappings in the global internet
CN102315996A (en) Network admission control method and system
US8644153B2 (en) Infrastructure for mediation device to mediation device communication
CN116235462A (en) Method for protecting encrypted user identity from replay attacks
US8086908B2 (en) Apparatus and a method for reporting the error of each level of the tunnel data packet in a communication network
CN118555570A (en) Safety control access method of APN6
KR20060129071A (en) Protocol expansion of a signaling message
US7949878B2 (en) Telecommunication-assisted time stamp
CN100536471C (en) Method for effective protecting signalling message between mobile route and hometown agent
JP3632167B2 (en) Cryptographic communication device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination