CN1764200A - Network safety access control architecture and realizing method - Google Patents

Network safety access control architecture and realizing method Download PDF

Info

Publication number
CN1764200A
CN1764200A CNA200510104358XA CN200510104358A CN1764200A CN 1764200 A CN1764200 A CN 1764200A CN A200510104358X A CNA200510104358X A CN A200510104358XA CN 200510104358 A CN200510104358 A CN 200510104358A CN 1764200 A CN1764200 A CN 1764200A
Authority
CN
China
Prior art keywords
data
node
network
segment
sign
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA200510104358XA
Other languages
Chinese (zh)
Other versions
CN1764200B (en
Inventor
武蒙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN200510104358A priority Critical patent/CN1764200B/en
Publication of CN1764200A publication Critical patent/CN1764200A/en
Application granted granted Critical
Publication of CN1764200B publication Critical patent/CN1764200B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention provides a network security access control system structure, which comprises: composing receive and transmit nodes respectively by an upper adaptor, a bottom adaptor, a data processor, and encode/decode device; the transmission node treats the data packaged by network layer to send into transmission queue in data link layer; the receive node receives and treats data from data link layer to send to network layer, and controls the data security and access right by node label and system time. Based on cryptography calculation, this invention encodes data packet to make terminals of different groups invisible with each other and user need not input name and password by inner mechanism, and provides security guarantee to terminal communication.

Description

A kind of network safety access control architecture and implementation method
1, technical field
The present invention relates to a kind of Computer Applied Technology, specifically a kind of network safety access control architecture and implementation method.
2, background technology
Existing network technology only is concerned about information encryption more than the transport layer usually at secure context, yet, in real world applications, there are a lot of servers or node still to be subjected to various infringements, as: implanted trojan horse program make that some important user names and close value are stolen, the password of the leading subscriber that cracks server and invade the deception of server, diverse network layer, as based on the pseudo-D.O.S etc. that connects of the TCP of ARP deception.Again since the present invention the uniqueness of ' node identification ' of being explained, use user of the present invention need not input user name and password just can land automatically at server end.The present invention is this with safety, can effectively prevent most hacker's behavior, and other need the network information field of high security that safety guarantee is provided for ecommerce and company's internal network etc.
3, summary of the invention
The purpose of this invention is to provide a kind of network safety access control architecture and implementation method.
The present invention can simply be described as: increased a transparent filter on network layer and data link layer, non-safe data (hacker's behavior also is based on data) are isolated in below the network layer, make non-safe node exchange data with this node.For non-node of the present invention; node involved in the present invention is just as a black hole, and physical presence but can't perception can't be understood the data of interchange; each node automatic network layer begins to be protected like this, greatly improves the level of security of network with less cost.
The objective of the invention is to realize in the following manner: send in transmitting-receiving the upper strata adapter is set respectively in the node, the bottom adapter, data processor and encryption and decryption device, data after sending node is packed network layer are successively through the upper strata adapter, data processor, after the processing of enciphering/deciphering device and bottom adapter, send into the data link layer transmit queue and send to receiving node, after receiving node receives data in link layer, pass through the bottom adapter respectively, the enciphering/deciphering device, data processor and upper strata adapter are sent into network layer after handling, and by node identification and system time safety of data and access rights are controlled; The server responsible node sign in the network and the granting of system time are also safeguarded ' node identification-MAC-IP table '.
The task of upper strata adapter is: when sending data, the data of network layer are split into plurality of sections, and add unique identification in every segment data front; Having the uniquely identified data segment comprises: the quantity of the data segment that the numbering of network layer packet, bag split, the position of data segment, the length and the decomposed data section of data segment have uniquely identified data segment choosing several and be combined into one section new data and send data processor at random with split; When the upper strata adapter receives data, receive that data processor splits have uniquely identified data segment data after, be reduced into the former packet that network layer can be discerned according to the sign before the data segment, be sent to network layer.
When data processor sends data, the data of transmitting for the upper strata adapter increase header, comprise that destination node sign, sending node identify, form the system time sign of this segment data, the value of disturbing, data segment, length identify at random, and add that in this data back the parity values of this segment data, destination node sign are to determine according to the corresponding relation of ' node identification-MAC-IP table '.
When receiving data, in the data after ' enciphering/deciphering device ' deciphering, isolates by data processor the destination node sign, the sending node sign, form the system time sign of this segment data, the length mark of data segment and the information such as parity check code of data segment, whether verification msg destination node sign is this node, whether the sending node sign of data is known node, whether the verification system time format is correct, the system time of the data that receive of checking whether in the effective time of agreement, the destination node of the data that the corresponding relation checking of being write down according to ' node identification-MAC-IP table ' receives and the correctness of sending node and verify the parity values of this data segment.
The task of enciphering/deciphering device is: when sending data, the data that encryption ' data processor ' is made up also send the bottom adapter to; When receiving data, deciphering ' bottom adapter ' institute's data processed also sends data processor to, and the key of using during encryption and decryption is that the server in the present networks generates and provides according to node identification, the elements such as MAC, IP of server; The algorithm of using during encryption and decryption is that the server in the present networks generates and provides.
The task of bottom adapter is: when sending data, before the data that ' enciphering/deciphering device ' encrypted increase and existing system compatible header and after data the parity values of these data of increase; When receiving data, check the parity values of data and remove the data appended header information, and be sent to the enciphering/deciphering device., wherein, header mainly comprises: send and network layer address, the upper-layer protocol of receiving node identify, are used to distinguish the security domain label etc. of belonging network.
Node identification is the unique identification of this node in present networks, and the MAC Address of node is different with network layer address therewith for it; This sign is in the server issues of present networks, and is associated with the MAC Address and the network layer address of this node; Server is responsible for Maintenance Point sign with the relation table of this node M AC address and network layer address promptly: node identification-MAC-IP table, after a certain node receives the data of unknown node in the network, ask for the reliability of this correspondence table with the verification msg source, data processor regularly transmit a request to server to obtain the mapping table of up-to-date ' node identification-MAC-IP table '.
System time is the data that are used to identify whole network time; There is the node of identical cryptographic algorithm to have only a system time; System time is to be sent by server end node time encryption.
Architecture of the present invention and method are calculated based on close value student movement, packet by the refined net layer, make the terminal node of non-homologue invisible mutually, and internal mechanism makes the user need not input user name and close value when using native system, for each communication between terminals in the network provides safety assurance.
4, description of drawings
Accompanying drawing 1 is the structural representation of data transmitting node;
Accompanying drawing 2 is the structural representation of data reception node;
Accompanying drawing 3 is the security protection schematic diagram of sending node and receiving node;
Accompanying drawing 4 is the data processing work view of node;
Accompanying drawing 5 is the data segment frame structure schematic diagram by forming behind the adapter of upper strata;
Accompanying drawing 6 is the data segment frame structure schematic diagram after the processor processing.
Description of drawings: the P_Num among Fig. 5 is a former packet flowing water number; P_Count is the number that former packet is decomposed; PartNum is the serial number of data segment; Len is for decomposing the length of back data segment.
5, embodiment
Explain below with reference to accompanying drawing network system security access control method of the present invention being done.
At first, node A and Node B are registered at server end respectively, obtain node identification separately, encryption key and algorithm, necessary datas such as the security domain label of belonging network, when one group with the irrelevant network data Data of upper-layer protocol when node A sends to Node B, Data forms one section network layer data that is called bag through each above step of A meshed network layer earlier, it is passed to A node described in the invention ' upper strata adapter ' then, ' upper strata adapter ' resolves into plurality of sections with Data, numbering according to bag, the quantity that bag is decomposed, the position of the former bag in data segment place, the label of the synthetic data segment of information sets such as the length of segment invests the front of each small data segments, like this, promptly avoided causing the long problem of frame owing to increased excessive data, make the identical upper layer data Data also can be not identical after handling again, also increase the difficulty that goes out key and algorithm by data analysis clocklike.
Small data segments is passed to ' data processor ' of A node described in the invention subsequently, and ' data processor ' the partial data section is pieced together at random is combined into new data, and adds the higher authorities and verification.Wherein, header comprises: the sign of destination node, the sign of sending node, the form system time of this segment data, the scrambler that generates immediately, the length of data segment etc.The destination node of destination node identification data is though existing IP and MAC as the address, because IP and MAC can't guarantee uniqueness, identify so need to increase this field; Sending node sign is the source node sign, is used for receiving node and judges the safety of whether originating; The system time that forms this segment data is a unified time in the marked network, and this system time is actually one group of character string that regularly increases, and guarantees that data are not forged or repeatedly reception; Length is the length of load data; Verification is the parity values of load data.
' the enciphering/deciphering device ' of A node next described in the invention begins its encryption.Wherein, encrypting used key is to be generated by node identification and other individual informations of server according to server node, and each node is distributed when server end is registered; Encrypting used algorithm also is to be generated and be distributed when each node is registered by the actual conditions of server according to present networks.In the network a plurality of security domains can be arranged, different security domains is distinguished by different keys and algorithm.Different security domains in the same network can have identical IP address.The length of key and the complexity of algorithm can suitably be adjusted according to the key data on upper strata, and for example: the data that the upper strata is mainly moved are important and data volume is not very big, and then key can be often, algorithm can be complicated; If the upper strata has VOD or real-time audio and video, in order to reduce time-delay, can shorten key length, reduce the algorithm complexity.
Data encrypted will be passed through the processing of ' the bottom adapter ' of A node described in the invention, makes it to look like the data that common upper strata is come.This just needs to increase header: the network layer address of destination node and sending node, upper-layer protocol type, security domain label etc., and the check value of computational load data invests data trailer.The security domain label is used to identify the network of each different cryptographic algorithm, data can be exchanged mutually in the network of each different cryptographic algorithm, such as label is the network use key key1 of a, algorithm M1, label uses key key2 for the b network, algorithm M2, the router in the network just can also encrypt with the key and the algorithm of b network the data decryption from a network according to key and the algorithm of network label a, thereby the data of saying a network are sent to the b network.Data after the processing are given data link layer, send by normal data.
The B node receives data, and at first ' the bottom adapter ' of B node receives the data of data link layer, and ' bottom adapter ' checks that earlier whether the upper-layer protocol territory in the header is the mark of network described in the invention, if not then abandoning this data; Check then whether check value correct, lose data to prove that these data were not modified midway, if not to abandon this data.
By the data of ' bottom adapter ' trial inspection after removing header and afterbody, be decrypted by ' the enciphering/deciphering device ' of B node.Because the B node is under the jurisdiction of identical security domain together with the A node, so key is identical with the A node with algorithm.
Data after the deciphering are responsible for inspection by ' data processor ' of B node.Review time territory does not at first meet agreement, time ahead of time or overtime etc. if data solve normal character, time representation, all will be dropped; Check then whether the destination node sign is this node, if not then abandoning data; Inspection source node sign, whether corresponding with the MAC-IP of source node, if,, then abandon these data if still not right or not looking for server to send request to obtain the mapping table of up-to-date ' node identification-MAC-IP '; Check the check value of data, if not to abandon data;
Data through inspection are safe data basically, ' the upper strata adapter ' of B node splits it, form several little data segments, and with the der group synthetic original data of these data segments according to sequencing that identifies on the label information and place bag, after the data that comprised of bag all receive, this bag is passed to upper strata (network layer).

Claims (8)

1, a kind of network safety access control architecture, it is characterized in that sending the upper strata adapter is set respectively in the node in transmitting-receiving, the bottom adapter, data processor and encryption and decryption device, data after sending node is packed network layer are successively through the upper strata adapter, data processor, after the processing of enciphering/deciphering device and bottom adapter, send into the data link layer transmit queue and send to receiving node, after receiving node receives data in link layer, pass through the bottom adapter respectively, the enciphering/deciphering device, data processor and upper strata adapter are sent into network layer after handling, and by node identification and system time safety of data and access rights are controlled; The server responsible node sign in the network and the granting of system time are also safeguarded ' node identification-MAC-IP table '.
2, a kind of implementation method of network security access control system is characterized in that the task of upper strata adapter is: when sending data, the data of network layer are split into plurality of sections, and add unique identification in every segment data front; Having the uniquely identified data segment comprises: the quantity of the data segment that the numbering of network layer packet, bag split, the position of data segment, the length and the decomposed data section of data segment have uniquely identified data segment choosing several and be combined into one section new data and send data processor at random with split; The upper strata adapter receives that data processor splits have uniquely identified data segment data after, be reduced into the former packet that network layer can be discerned according to the sign before the data segment, be sent to network layer.
4, the implementation method of network system security access control system according to claim 2, when it is characterized in that data processor sends data, data increase header, destination node sign, the sending node that transmits to the upper strata adapter identifies, forms the system time sign of this segment data, the value of disturbing, data segment, length identify at random, and add that in this data back the parity values of this segment data, destination node sign are to determine according to the corresponding relation of ' node identification-MAC-IP table '.
5, the implementation method of network system security access control system according to claim 2, it is characterized in that in the data after ' enciphering/deciphering device ' deciphering, isolating when ' data processor ' receives data the destination node sign, the sending node sign, form the system time sign of this segment data, the length mark of data segment and the information such as parity check of data segment, whether verification msg destination node sign is this node, whether the sending node sign of data is known node, whether the verification system time format is correct, the system time of the data that receive of checking whether in the effective time of agreement, the destination node of the data that the corresponding relation checking of being write down according to ' node identification-MAC-IP table ' receives and the correctness of sending node and verify the parity values of this data segment.
6, the implementation method of network system security access control system according to claim 2 is characterized in that the task of ' enciphering/deciphering device ' is: when sending data, the data that encryption ' data processor ' is made up also send the bottom adapter to; When receiving data, deciphering ' bottom adapter ' institute's data processed also sends data processor to, and the key of using during encryption and decryption is that the server in the present networks generates and provides according to node identification, the elements such as MAC, IP of server; The algorithm of using during encryption and decryption is that the server in the present networks generates and provides.
7, the implementation method of network system security access control system according to claim 2, the task of it is characterized in that ' bottom adapter ' is: when sending data, before the data that ' enciphering/deciphering device ' encrypted increase and existing system compatible header and after data the parity values of these data of increase; When receiving data, check the parity values of data and remove the data appended header information, and be sent to the enciphering/deciphering device, wherein, header mainly comprises: send and network layer address, the upper-layer protocol of receiving node identify, are used to distinguish the security domain label etc. of belonging network.
8, the implementation method of network system security access control system according to claim 2 is characterized in that node identification is the unique identification of this node in present networks, and the MAC Address of node is different with network layer address therewith for it; This sign is in the server issues of present networks, and is associated with the MAC Address and the network layer address of this node; Server is responsible for Maintenance Point sign with the relation table of this node M AC address and network layer address promptly: node identification-MAC-IP table, after a certain node receives the data of unknown node in the network, ask for the reliability of this correspondence table with the verification msg source, data processor regularly transmit a request to server to obtain the mapping table of up-to-date ' node identification-MAC-IP table '.
9, the implementation method of network system security access control system according to claim 2 is characterized in that system time is the data that are used to identify whole network time; There is the node of identical cryptographic algorithm to have only a system time; System time is to be sent by server end node time encryption.
CN200510104358A 2005-10-27 2005-10-27 Network safety access control architecture and realizing method Expired - Fee Related CN1764200B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200510104358A CN1764200B (en) 2005-10-27 2005-10-27 Network safety access control architecture and realizing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200510104358A CN1764200B (en) 2005-10-27 2005-10-27 Network safety access control architecture and realizing method

Publications (2)

Publication Number Publication Date
CN1764200A true CN1764200A (en) 2006-04-26
CN1764200B CN1764200B (en) 2010-05-05

Family

ID=36748135

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200510104358A Expired - Fee Related CN1764200B (en) 2005-10-27 2005-10-27 Network safety access control architecture and realizing method

Country Status (1)

Country Link
CN (1) CN1764200B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105307055A (en) * 2015-10-30 2016-02-03 深圳云聚汇数码有限公司 Timestamp-based network data access encryption method
CN106131801A (en) * 2016-06-30 2016-11-16 成都西可科技有限公司 A kind of based on android system without JA(junction ambient) enciphered data transmission method

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3413788B2 (en) * 1997-09-25 2003-06-09 日本電信電話株式会社 Communication method having communication protocol for performing flow control between layers and data communication terminal
US6484210B1 (en) * 1997-11-10 2002-11-19 General Instrument Corporation Packet processing relay agent to provide link layer forwarding in one-way cable/wireless/satellite modems
CN1103521C (en) * 1999-04-08 2003-03-19 上海贝尔电话设备制造有限公司 communication system in network management
US7177952B1 (en) * 1999-10-01 2007-02-13 Nortel Networks Limited Method and system for switching between two network access technologies without interrupting active network applications

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105307055A (en) * 2015-10-30 2016-02-03 深圳云聚汇数码有限公司 Timestamp-based network data access encryption method
CN106131801A (en) * 2016-06-30 2016-11-16 成都西可科技有限公司 A kind of based on android system without JA(junction ambient) enciphered data transmission method
CN106131801B (en) * 2016-06-30 2019-10-01 成都西可科技有限公司 One kind being based on the connectionless environment enciphered data transmission method of android system

Also Published As

Publication number Publication date
CN1764200B (en) 2010-05-05

Similar Documents

Publication Publication Date Title
Ji et al. A novel covert channel based on length of messages
CN1311660C (en) Server apparatus, and method of distributing a security policy in communication system
CN1723671A (en) IP hopping for secure data transfer
CN1703867A (en) Firewall
CN106060003A (en) Network boundary unidirectional isolated transmission device
CN1332552A (en) Network address conversion gateway of local network using local IP address and untranslated port address
CN105072025B (en) For the security protection gateway and system of modern industrial control system network service
CN107172030B (en) High-privacy and anti-tracing communication method
WO2013172743A1 (en) Method for protected interaction between a client device and a server via the internet
CN111212033A (en) Page display method and device based on combined web crawler defense technology and electronic equipment
CN111797431B (en) Encrypted data anomaly detection method and system based on symmetric key system
CN1197324C (en) Method for identifying Internet users
CN114254269B (en) System and method for determining rights of biological digital assets based on block chain technology
CN113347198B (en) ARP message processing method, device, network equipment and storage medium
CN105049448A (en) Single sign-on device and method
CN1764200B (en) Network safety access control architecture and realizing method
CN107835168A (en) A kind of authentication method being multiplied based on client information sequence spreading matrix transposition
CN116743470A (en) Service data encryption processing method and device
CN104811421A (en) Secure communication method and secure communication device based on digital rights management
CN1223145C (en) Message safety protection method based on boundary gateway protocol message
US20020013810A1 (en) Electronic document mapping
CN113794563B (en) Communication network security control method and system
CN113259315B (en) Communication message safety protection method and system suitable for power distribution network
CN111783158B (en) Method for guaranteeing security of electronic contract
CN107508739B (en) Authentication method for transmitting data through VPN tunnel

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20100505

Termination date: 20101027