WO2017113404A1 - Nœud de réseau, procédé de transmission par paquets et réseau - Google Patents
Nœud de réseau, procédé de transmission par paquets et réseau Download PDFInfo
- Publication number
- WO2017113404A1 WO2017113404A1 PCT/CN2015/100333 CN2015100333W WO2017113404A1 WO 2017113404 A1 WO2017113404 A1 WO 2017113404A1 CN 2015100333 W CN2015100333 W CN 2015100333W WO 2017113404 A1 WO2017113404 A1 WO 2017113404A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- network node
- encrypted
- information
- timestamp
- packet
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04J—MULTIPLEX COMMUNICATION
- H04J3/00—Time-division multiplex systems
- H04J3/02—Details
- H04J3/06—Synchronising arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L7/00—Arrangements for synchronising receiver with transmitter
Definitions
- the present application relates to the field of communications technologies, and in particular, to a network node, a packet transmission method, and a network.
- the performance requirements for time synchronization in wireless communication systems are getting higher and higher.
- the method of using the Global Positioning System (GPS) for time synchronization in the wireless communication system has the disadvantages of high construction difficulty, high failure rate, and poor maintainability.
- FIG. 1 shows a flow of time synchronization between a master node and a slave node defined by the current 1588 version (Version, V) 2 protocol.
- the master node sends a synchronization (Sync) message to the slave node at time t1, the message carries timestamp information for indicating t1; the slave node receives the Sync message at time t2, and according to the slave The timestamp information obtained in the message for indicating t1 determines t1; then, the slave node sends a delay request (Delay_Req) message to the master node at time t3, and the master node receives the Delay_Req message at time t4, in response to The Delay_Req message is sent to the Delay_Resp message, and the message carries the timestamp information for indicating t4. After receiving the Delay_Resp message, the slave node obtains the t4 according to the received message. The timestamp information determines t4.
- Sync synchronization
- the slave node determines the amount of time adjustment (Offest) according to the following formula:
- Offset ((t4-t3)-(t2-t1))/2.
- the slave node adjusts the local clock according to the determined Offset, and the above process is continuously repeated, eventually causing the Offset to converge to close to zero, thereby achieving time synchronization between the slave node and the master node.
- the time synchronization scheme specified by the 1588V2 protocol requires very high precision for the timestamp.
- the master node is required to write the timestamp information into the packet at the instant of the message (Sync and Delay_Resp) to ensure time synchronization between the master node and the slave node. Precision.
- the timestamp information needs to record the transmission time of the encrypted message. If the message is sent after the timestamp information is encrypted and then the message is sent out, the process of encrypting the timestamp information also takes a certain period of time. The encrypted timestamp information cannot accurately indicate the time at which the message is sent, which reduces the accuracy of time synchronization.
- the present application provides a network node, a message transmission method, and a network, which are used to provide a scheme for time synchronization between network nodes, which supports message encryption and ensures time synchronization accuracy.
- the application provides a time synchronization method, including:
- the second network node determines a first sending time at which the first network node sends the first encrypted message, and receives the first encrypted message according to the first Determining a clock time difference between the second network node and the first network node; and then, the second network node adjusts the local clock according to the determined clock time difference to perform time synchronization with the first network node .
- an encrypted message can be transmitted between two network nodes, and the second network node can determine the sending time of the encrypted message, so that the second network node can receive the encrypted message according to the determined sending time of the encrypted message and itself.
- the receiving time of the text adjusts the local clock to achieve precise synchronization with the first network node.
- the first network node sends the second encryption to the second network node before the second network node determines that the first network node sends the first transmission time of the first encrypted message.
- the second network node obtains timestamp information indicating the time of sending the first encrypted message from the second encrypted message, and determines the sending time of the first encrypted message according to the timestamp information.
- the first network node sends the timestamp information through a separate encrypted message, so that the second network node can obtain the accurate first sending time, and can also encrypt the timestamp information to ensure time synchronization. Accuracy, as well as the security of data transmission.
- the first network node before the second network node determines that the first network node sends the first encrypted message, the first network node sends the first timestamp information together with the first encrypted message. And sending, by the second network node, the first timestamp information is not encrypted by the first network node; in this manner, the second network node determines, according to the first timestamp information, a sending moment of the first encrypted message.
- the first network node does not encrypt the first timestamp information, so that the first encrypted packet can be sent out in time, and the first timestamp information can accurately indicate the sending time of the first encrypted packet, thereby ensuring time.
- the accuracy of the synchronization is not encrypt the first timestamp information, so that the first encrypted packet can be sent out in time, and the first timestamp information can accurately indicate the sending time of the first encrypted packet, thereby ensuring time.
- the first network node After the second network node receives the first encrypted packet, the first network node sends the third encrypted packet, and receives the fourth encrypted packet sent by the first network node; the second network node obtains the fourth encrypted packet. a second timestamp information, where the second timestamp information is used to indicate that the first network node receives the second receiving time of the third encrypted message; the second network node determines the second receiving time according to the second timestamp information;
- the second network node may determine a clock time difference between the second network node and the first network node according to the first receiving time, the first sending time, the second sending time of sending the third encrypted message, and the second receiving time.
- the determined clock time difference is more accurate.
- the second network node Before the second network node receives the first encrypted packet sent by the first network node, the second network node sends a fifth encrypted packet to the first network node, where the first encrypted packet includes the third timestamp information, The third timestamp information is used to indicate that the first network node receives the third encrypted packet.
- the second network node may determine a clock time difference between the second network node and the first network node according to the third sending time, the third receiving time, the first receiving time, and the first sending time of sending the fifth encrypted message.
- the determined clock time difference is more accurate.
- the second network node After receiving the first encrypted packet sent by the first network node, the second network node sends the third encrypted packet to the first network node, and receives the fourth encrypted packet sent by the first network node and the fourth encrypted packet.
- a second timestamp information sent by the text the second timestamp information is used to indicate that the first network node receives the second receiving time of the third encrypted message, and is not encrypted by the first network node; The second timestamp information determines a second receiving time;
- the second network node may determine a clock time difference between the second network node and the first network node according to the first receiving time, the first sending time, the second sending time of sending the third encrypted message, and the second receiving time.
- the determined clock time difference is more accurate.
- the second network node Before the second network node receives the first encrypted packet sent by the first network node, sending a fifth encrypted packet to the first network node, and sending, together with the first encrypted packet, the third timestamp information, the third The timestamp information is used to indicate that the first network node receives the third receiving moment of the fifth encrypted packet, and is not encrypted by the first network node; the second network node determines the third receiving time according to the third timestamp information;
- the second network node may determine a clock time difference between the second network node and the first network node according to the third sending time, the third receiving time, the first receiving time, and the first sending time of sending the fifth encrypted message.
- the determined clock time difference is more accurate.
- the present application provides a first network node, where the first network node has a function of implementing the behavior of the first network node in the foregoing method.
- the functions may be implemented by hardware or by corresponding software implemented by hardware.
- the hardware or software includes one or more modules corresponding to the functions described above.
- the structure of the first network node includes a processor and a transceiver, and the processor is configured to support the first network node to perform a corresponding function in the foregoing method.
- the transceiver is configured to support communication between the first network node and the second network node, send information or a message involved in the foregoing method to the second network node, or receive, from the second network node, the method involved in the foregoing method. Information or message.
- the first network node can also include a memory for coupling with a processor that retains program instructions and data necessary for the first network node.
- the present application provides a second network node, which has a function of implementing the behavior of the second network node in the foregoing method.
- the functions may be implemented by hardware or by corresponding software implemented by hardware.
- the hardware or software includes one or more modules corresponding to the functions described above.
- the structure of the second network node includes a processor and a transceiver, and the processor is configured to support the second network node to perform a corresponding function in the foregoing method.
- the transceiver is configured to support communication between the second network node and the first network node, send information or a message involved in the foregoing method to the first network node, or receive, from the first network node, the method involved in the foregoing method. Information or message.
- the first network node can also include a memory for coupling with a processor that retains program instructions and data necessary for the first network node.
- the application provides a network comprising the first network node and the second network node described in the above aspects.
- the present application provides a computer storage medium for storing computer software instructions for use in the first network node, including a program designed to perform the above aspects.
- the present application provides a computer storage medium for storing computer software instructions for use by the second network node, including a program designed to perform the above aspects.
- the source network node of a message refers to the network node that sends the message
- the target network node of a message refers to the network node that receives the message
- the application provides a packet transmission method, including:
- a network node sends a first encrypted message and a second encrypted message to another network node, where the second encrypted message includes a first timestamp message indicating a first sending time of the first encrypted message.
- the source network node of the first encrypted message sends the first timestamp information together with the first encrypted message to the target network node of the first encrypted message, and does not encrypt the first timestamp information; the first encryption
- the target network node of the packet obtains the first timestamp information, determines the first sending time of the first encrypted packet according to the obtained first timestamp information, and determines the first receiving time and the determined time according to the received first encrypted packet.
- the local clock is adjusted.
- the target network node of the first encrypted message can obtain an accurate first sending time, and can also encrypt the timestamp information. The accuracy of time synchronization and the security of data transmission are guaranteed.
- the first encrypted packet can be sent out in time, and the first timestamp information can accurately indicate the sending time of the first encrypted packet, thereby ensuring time synchronization. Precision.
- the source network node of the first encrypted packet receives the third encrypted packet, and sends the fourth encryption to the target network node of the first encrypted packet.
- the second timestamp information includes a second timestamp information, where the second timestamp information indicates that the network node receives the second received time of the third encrypted message; or the second timestamp information is together with the fourth encrypted message. Transmitted, and the second timestamp information is not encrypted.
- the target network node of the first encrypted packet may determine the source network of the first encrypted packet according to the first receiving time, the first sending time, the second sending time of sending the third encrypted message, and the second receiving time.
- the clock time difference between the nodes, the determined clock time difference is more accurate.
- the third encrypted process and the fourth encrypted message include the same first synchronization process identifier information, and the first synchronization process identifier information is used to identify the encryption of the first synchronization process identifier information.
- the target network node of the first encrypted message can determine that the third encrypted message and the fourth encrypted message are the same synchronization process according to the same first synchronization process identification information.
- the fourth encrypted packet includes the first timestamp indication information
- the first timestamp indication information is used to indicate that the fourth encrypted message is included for indicating the fourth plus
- the secret message contains the timestamp information of the received time of the encrypted message of the same first synchronization process identification information.
- the target network node of the first encrypted packet can determine which packet has the required timestamp information, so as to determine the receiving time of the third encrypted packet according to the obtained timestamp information, and then determine the third encrypted packet according to the determined third encrypted packet.
- the time of reception is time synchronized.
- the fifth encrypted packet sent by the target network node of the first encrypted packet is received before the source network node of the first encrypted packet;
- the third encrypted message includes a third timestamp information, where the third timestamp information indicates that the source network node of the first encrypted message receives the third received time of the fifth encrypted message; or the source network of the first encrypted message
- the node sends the third timestamp information together with the first encrypted message, and the third timestamp information is not encrypted.
- the target network node of the first encrypted message may determine the source network node of the first encrypted message according to the third sending time, the third receiving time, the first receiving time, and the first sending time of the fifth encrypted message.
- the difference in clock time between the clock times is more accurate.
- the first encrypted message and the second encrypted message include the same second synchronization process identifier.
- the second synchronization process identifier information is used to identify a synchronization process to which the encrypted message of the second synchronization process identifier information belongs.
- the target network node of the first encrypted message can determine that the first encrypted message and the second encrypted message are the same synchronization process according to the same first synchronization process identification information.
- the second encrypted message includes a second timestamp indication information
- the second timestamp indication information is used to indicate that the second encrypted message includes
- the encrypted message includes the timestamp information of the sending time of the encrypted message of the same second synchronization process identification information.
- the target network node of the first encrypted packet can determine which packet has the required timestamp information, so as to determine the sending time of the first encrypted packet according to the obtained timestamp information, and then determine the first encrypted packet according to the determined first encrypted packet.
- the time of transmission is time synchronized.
- the present application provides a network node, where the network node has the function of implementing the behavior of the source network node that implements the first encrypted message in the method provided by the foregoing seventh aspect.
- the functions may be implemented by hardware or by corresponding software implemented by hardware.
- the hardware or software includes one or more modules corresponding to the functions described above.
- the structure of the network node includes a processor and a transmitter, and the processor is configured to support a source network node of the first encrypted message to perform a corresponding function in the foregoing method.
- the source network node that is used by the sender to support the first encrypted message sends the information or the message involved in the method provided by the foregoing seventh aspect to the target network node of the first encrypted message.
- the network node may further include a receiver, and the source network node for supporting the first encrypted message receives the information or the message involved in the method provided by the foregoing seventh aspect from the target network node of the first encrypted message.
- the network node can also include a memory for coupling with the processor that holds the necessary program instructions and data for the network node.
- the present application provides a network node, which has the function of implementing the behavior of a target network node that implements the first encrypted message in the method provided by the foregoing seventh aspect.
- the functions may be implemented by hardware or by corresponding software implemented by hardware.
- the hardware or software includes one or more modules corresponding to the functions described above.
- the structure of the network node includes a processor and a receiver, and the processor is configured to support the network node to perform a corresponding function in the method provided in the foregoing seventh aspect.
- the receiver is configured to support the network node to receive information or a message involved in the method provided by the foregoing seventh aspect from a source network node of the first encrypted message.
- the network node may further include a transmitter, configured to support the network node to send the information or the message involved in the method provided by the foregoing seventh aspect to the target network node of the first encrypted message.
- the network node can also include a memory for coupling with the processor that holds the necessary program instructions and data for the network node.
- the application provides a network, where the network includes a source network node and a target network node of the first encrypted message provided by the foregoing seventh aspect.
- the application provides a computer storage medium for storing computer software instructions used by a source network node of the first encrypted message, which is configured to execute the seventh party The program designed by the face.
- the present application provides a computer storage medium for storing computer software instructions for a target network node of the first encrypted message, comprising a program designed to execute the seventh aspect.
- FIG. 1 is a flow chart of time synchronization between a master node and a slave node according to the current 1588V2 protocol;
- FIG. 2 is a schematic diagram of a network model applicable to the present application
- FIG. 3 is a schematic diagram of a method for sending timestamp information according to the present application.
- FIG. 4 is a schematic diagram of another method for sending timestamp information provided by the present application.
- FIG. 5 is a schematic structural diagram of a network provided by the present application.
- 6A to 6C and 7 to 14 are flowcharts of various message transmissions provided by the present application.
- 15 to 17 are schematic structural diagrams of encrypted packets in the present application.
- 18 to 21 are schematic structural diagrams of network nodes provided by the present application.
- Synchronization refers to maintaining a certain relationship between two or more signals in frequency or phase, that is, the phase difference or frequency difference of two or more signals remains within the agreed allowable range.
- synchronization can be divided into frequency synchronization and time synchronization.
- Frequency synchronization means that the frequencies are the same between two or more signals, or that the frequency difference remains within the agreed allowable range.
- Time synchronization means that the phases are the same between two or more signals, or the phase difference remains within the agreed allowable range; or
- UTC Universal Time Coordinated
- the master node refers to the network node as the time base during the time synchronization process
- a slave node is a network node that synchronizes with the master node based on the time of the master node during the time synchronization process.
- the first network node may be a master node
- the second network node may be a slave node
- FIG. 2 shows a network model applicable to the present application.
- the present application can be applied to a network model specified by the 1588V2 protocol, but is not limited to the network model specified by the 1588V2 protocol.
- the network node shown by the dotted line is an optional network node.
- the server can be directly connected to the client or connected through one or more relay nodes.
- the way of time synchronization can be divided into the following two ways:
- the synchronization mode in which the primary node first transmits the message for time synchronization is called the "first synchronization mode".
- the synchronization mode in which the slave node first transmits the packet for time synchronization is called the "second synchronization mode".
- the manner in which the first network node sends the timestamp information includes but is not limited to the following two types:
- the first network node sends the timestamp information by encrypting the message, and encrypts the timestamp information, where the timestamp information is used to indicate the sending time of other encrypted messages sent by the first network node.
- the first network node sends the encrypted message A, and then sends the encrypted message A'.
- the encrypted message A' carries the timestamp information TimeStampA, and the TimeStampA is used to instruct the first network node to send the encrypted message. The sending moment of A.
- the first network node does not encrypt the timestamp information, and sends the timestamp information together with the encrypted message.
- the timestamp information is used to indicate the sending time of the encrypted message sent together.
- the first network node sends the encrypted message B together with the timestamp information TimeStampB, where the TimeStampB is not encrypted, and is used to indicate that the first network node sends the transmission time of the encrypted message B.
- system and “network” are used interchangeably herein in the context of the present invention.
- the term “and/or” in this context is merely an association describing the associated object, indicating that there may be three relationships, for example, A and / or B, which may indicate that A exists separately, and both A and B exist, respectively. B these three situations.
- the character "/" in this article generally indicates that the contextual object is an "or" relationship.
- FIG. 5 is a schematic structural diagram of a network provided by the present application.
- the network includes a first network node 501 and a second network node 502, and packets can be transmitted between the two network nodes. Further, the second network node 502 can be time synchronized with the first network node 501.
- the second network node 502 and the first network node 501 pass the time, as described above, there may be other network nodes between the first network node 501 and the second network node 502, and then the second network node 502 and the first
- the manner in which the network node 501 performs time synchronization is the first synchronization mode; or the other network node does not exist between the first network node 501 and the second network node 502, and the second network node 502 performs time synchronization with the first network node 501.
- the way is the second synchronization method.
- the network 50 may be a wireless network, for example, when the foregoing GPS is used.
- the network 50 can also be a computer network.
- the solution provided by the present application can be used for time synchronization.
- the communication system that can be adopted by the wireless network includes, but is not limited to, the following wireless communication standards:
- GSM Global System of Mobile communication
- CDMA Code Division Multiple Access
- CDMA Code Division Multiple Access
- TD-SCDMA Wideband Code Division Multiple Access
- WCDMA Wideband Code Division Multiple Access
- FDD LTE Frequency Division Duplexing-Long Term Evolution
- LTE-advanced Long Term Evolution-Advanced
- PHS Personal Handy-phone System
- WiFi Wireless Fidelity
- WiMAX Worldwide Interoperability for Microwave Access
- the first network node 501 and the second network node 502 may be any nodes in the foregoing wireless network, such as a terminal device, a base station, a core network device, and the like.
- FIG. 6A is a flowchart of message transmission provided by the present application. As shown in FIG. 6A, the process includes the following steps:
- the first network node 501 generates a first encrypted message.
- the first network node 501 sends the generated first encrypted packet to the second network node 502;
- the second network node 502 After receiving the first encrypted packet, the second network node 502 determines that the first network node 501 sends the first sending time of the first encrypted packet.
- the second network node 502 determines a clock time difference between the second network node 502 and the first network node 501 according to the first receiving moment of receiving the first encrypted packet and the determined first sending moment.
- the second network node 502 adjusts the local clock according to the determined clock time difference, and The second network node 502 performs time synchronization.
- the first sending time of the first encrypted node of the first network node 501 is t1
- the time when the second network node 502 receives the first encrypted message is t2
- the second network node can calculate the second according to t1 and t2.
- the clock time difference between the network node 502 and the first network node 501 is offset.
- the second network node 502 can calculate an offset according to t1, t2, and a predefined message transmission delay delay0, where delay0 is used to indicate that the first encrypted message is transmitted from the first network node 501 to the second network node.
- the required duration, the value may be a preset value in the network 50, or may be an empirical value obtained by the second network node 502 according to a previous process of performing message transmission with the first network node 501. For example, after the clocks of the first network node 501 and the second network node 502 are calibrated by other network nodes, the experience value is calculated according to the result of t2-t1, and may also pass through the first network node 501 and the second network node. This empirical value is obtained by a two-way measurement between 502.
- the second network node 502 can calculate an offset according to the following formula:
- the first network node 501 may send the first timestamp information to the second network node 502, where the first timestamp information is used to indicate that the first network node 501 sends the first sending time t1 of the first encrypted message.
- step S603 the second network node 502 can determine t1 according to the first timestamp information.
- the first network node 501 can use a plurality of alternative manners when transmitting the first timestamp information.
- Manner 1 The first timestamp information is sent by using the second encrypted message.
- the method further includes:
- S602' the first network node 501 sends a second encrypted message, where the second encrypted message includes the first timestamp information;
- step S603 after receiving the second encrypted message, the second network node 502 determines the first sending time according to the first timestamp information acquired from the second encrypted message.
- the first network node 501 sends the timestamp information through a separate encrypted message.
- the second network node 502 is enabled to obtain an accurate first transmission time, and can also encrypt the time stamp information, ensuring the accuracy of time synchronization and the security of data transmission.
- Manner 2 The first timestamp information is sent together with the first encrypted message, and the first timestamp information is not encrypted.
- the first network node 501 when the first network node 501 sends the first encrypted message in step S602, the first timestamp information is sent, and the first timestamp information is not encrypted by the first network node 501.
- step S603 the second network node 502 receives the first timestamp information while receiving the first encrypted message, so as to determine the first sending time according to the first timestamp information.
- the first network node 501 does not encrypt the first timestamp information, so as to ensure that the first encrypted packet can be sent out in time, and the first timestamp information can accurately indicate the sending time of the first encrypted packet, thereby ensuring The accuracy of time synchronization.
- the second network node 502 can calculate the offset according to the preset delay0.
- the first network node 501 and the second network node 502 can also transmit other messages to each other.
- the second network node 502 can calculate The transmission delays delay and offset of the outgoing message from the first network node 501 to the second network node 502.
- the different synchronization modes between the first network node 501 and the second network node 502 can be respectively exemplified.
- the second network node 502 sends a third encrypted message to the first network node 501
- the second network node 502 determines that the first network node 501 receives the second received time t4 of the third encrypted message
- the second network node 502 is configured according to the second network node 502.
- the second transmission time t3 at which the third encrypted message is transmitted, and t1, t2, and t4 are calculated to be offset. For example, it can be calculated according to the following formula:
- Offset [(t2-t1)-(t4-t3)]/2.
- the second network node 502 sends a fifth encrypted message to the first network node 501, the second network node 502 determines that the first network node 502 receives the second received time t4 of the third encrypted message, and the second network node 502 is configured according to the second network node 502.
- the second transmission time t3 at which the third encrypted message is transmitted, and t1, t2, and t4 are calculated to be offset. For example, it can be calculated according to the following formula:
- Offset [(t4-t3)-(t2-t1)]/2.
- Figure 7 shows a flow of time synchronization.
- the first synchronization mode is used to perform time synchronization between the first network node 501 and the second network node 502.
- the first network node 501 indicates the receiving time of the other encrypted packets received by the first network node 501 by carrying the timestamp information in the encrypted message, and the second network node 502 determines the time according to the timestamp information in the encrypted message. The time at which the transmitted encrypted message is received by the first network node 501.
- the process includes the following steps:
- the first network node 501 sends a first encrypted message to the second network node 502 at time t1, and the second network node 502 receives the first encrypted message at time t2.
- the first network node 501 sends a second encrypted message to the second network node 502, where the second encrypted message carries timestamp information for indicating t1.
- S703 The second network node 502 sends a third encrypted message to the first network node 501 at time t3, and the first network node 501 receives the third encrypted message at time t4.
- the first network node 501 sends a fourth encrypted message to the second network node 502, where the fourth encrypted message carries timestamp information for indicating t4.
- the second network node 502 can calculate the deficit according to the following formula:
- Offset [(t2-t1)-(t4-t3)]/2.
- the first encrypted message and the second encrypted message correspond to each other, and the two encrypted messages may carry the same synchronization process identification information (such as the serial number 1 in FIG. 15); the third encryption The message and the fourth encrypted message correspond to each other, and the two encrypted messages may carry the same synchronization process identification information (such as serial number 2 in FIG. 15).
- the second encrypted packet may carry the timestamp indication information, and is used to indicate that the second encrypted packet includes the first synchronization process identifier information that is used to indicate that the second encrypted packet is included in the second encrypted packet.
- the encrypted message that is, the timestamp information of the sending time of the first encrypted message, that is, the first timestamp information.
- the timestamp indicates that the information can be implemented in multiple ways.
- the first encrypted packet and the second encrypted packet may carry sequence information, for example, the first encrypted packet carrying sequence information A and the second encrypted packet carrying sequence information B, wherein the time sequence indicated by B is greater than the A indication.
- the time sequence is later, in combination with A and B, the second network node 502 can be instructed: the message including the sequence information B carries timestamp information indicating the time of sending the message including the sequence information A.
- the second encrypted packet carries a timestamp indication information
- the first encrypted packet does not carry the timestamp indication information
- the second network node 502 can be indicated: the encrypted packet including the timestamp indication information. Timestamp information.
- the second network node 502 in combination with the synchronization process identification information, may determine that the second encrypted packet includes the first timestamp information of the first encrypted packet.
- the fourth encrypted packet may carry the timestamp indication information, and is used to indicate that the fourth encrypted packet includes the first synchronization process identifier information that is used to indicate that the fourth encrypted packet is included.
- the encrypted packet that is, the timestamp information of the receiving moment of the third encrypted packet, that is, the second timestamp information.
- the timestamp indication information also has multiple implementation manners similar to the timestamp indication information in the second encrypted packet, and details are not described herein again.
- Figure 8 shows a flow of time synchronization.
- the first synchronization mode is used to perform time synchronization between the first network node 501 and the second network node 502.
- the first network node 501 transmits unencrypted carrying timestamp information while transmitting the encrypted message.
- the process includes the following steps:
- the first network node 501 sends the first encrypted report to the second network node 502 at time t1. And sending unencrypted timestamp information for indicating t1, the second network node 502 receiving the first encrypted message and the timestamp information for indicating t1 at time t2;
- the second network node 502 sends a third encrypted message to the first network node 501 at time t3, and the first network node 501 receives the third encrypted message at time t4.
- the first network node 501 sends a fourth encrypted message to the second network node 502 and unencrypted timestamp information for indicating t4.
- the second network node 502 After receiving the timestamp information for indicating t4, the second network node 502 can calculate the offset according to the following formula:
- Offset [(t2-t1)-(t4-t3)]/2.
- the third encrypted message and the fourth encrypted message correspond to each other, and the two encrypted messages may carry the same synchronization process identification information (such as the serial number in FIG. 16) for indicating The two packets are used for the same time synchronization process.
- the fourth encrypted message may also carry the timestamp indication information in the third embodiment.
- the third encrypted message and the fourth encrypted message may be carried respectively.
- the sequence information such as the third encrypted message carrying sequence information A and the fourth encrypted message carrying sequence information B, may indicate that the second network node 502: the timestamp information sent together with the message including the sequence information B is used to indicate Time stamp information including the time at which the message of the sequence information A is received.
- Figure 9 shows a flow of time synchronization.
- the first synchronization mode is used to perform time synchronization between the first network node 501 and the second network node 502.
- the process includes the following steps:
- the first network node 501 sends a first encrypted message to the second network node 502 at time t1, and the second network node 502 receives the first encrypted message at time t2.
- the first network node 501 sends a second encrypted message to the second network node 502, where the second encrypted message carries timestamp information for indicating t1.
- the second network node 502 sends a third encrypted message to the first network node 501 at time t3, and the first network node 501 receives the third encrypted message at time t4.
- the first network node 501 sends a fourth encrypted message to the second network node 502, and simultaneously sends unencrypted timestamp information for indicating t4.
- the second network node 502 can calculate the deficit according to the following formula:
- Offset [(t2-t1)-(t4-t3)]/2.
- the first encrypted message and the second encrypted message correspond to each other, and the two encrypted messages may carry the same synchronization process identification information (such as the serial number 1 in FIG. 15) for indicating this.
- the two encrypted packets are used in the same time synchronization process; the third encrypted packet and the fourth encrypted packet are mutually corresponding, and the two encrypted packets can carry the same synchronization process identification information (for example, FIG. 15
- the serial number 2 is used to indicate that the two encrypted messages are used for the same time synchronization process.
- the second encrypted message may also carry the timestamp indication information in the third embodiment.
- the first encrypted message and the second encrypted message may respectively carry the sequence information, for example, the first encrypted message carries the sequence information A, the first The second encrypted node carries the sequence information B, and may indicate the second network node 502: the timestamp information sent together with the message including the sequence information B is used to indicate the sending time of the message including the sequence information A; the fourth encrypted message
- the text may also carry the timestamp indication information in the third embodiment.
- the third encrypted message and the fourth encrypted message may also carry the sequence information, for example, the third encrypted message carries the sequence information A and the fourth encrypted message.
- the message carrying sequence information B may indicate that the second network node 502: the timestamp information sent together with the message including the sequence information B is used to indicate the reception time of the message including the sequence information A.
- Figure 10 shows a flow of time synchronization.
- the first synchronization mode is used to perform time synchronization between the first network node 501 and the second network node 502.
- the process includes the following steps:
- the first network node 501 sends a first encrypted message to the second network node 502 at time t1, and sends unencrypted timestamp information for indicating t1, and the second network node 502 receives the first encryption at time t2. a message and a timestamp information indicating t1;
- the second network node 502 sends a third encrypted message to the first network node 501 at time t3, and the first network node 501 receives the third encrypted message at time t4.
- the first network node 501 sends a fourth encrypted message to the second network node 502, where the fourth encrypted message carries timestamp information for indicating t4.
- the second network node 502 After receiving the fourth encrypted packet, the second network node 502 obtains the fourth encrypted packet from the fourth encrypted packet. After indicating the timestamp information of t4, the offset can be calculated according to the following formula:
- Offset [(t2-t1)-(t4-t3)]/2.
- the third encrypted message and the fourth encrypted message correspond to each other, and the two encrypted messages may carry the same synchronization process identification information (such as the serial number in FIG. 16) for indicating The three packets are used in the same time synchronization process; the fourth encrypted message may also carry the timestamp indication information in the third embodiment, for example, the third encrypted message and the fourth encrypted message may be carried respectively.
- the sequence information such as the third encrypted message carrying sequence information A and the fourth encrypted message carrying sequence information B, may indicate that the second network node 502: the message including the sequence information B is carried in the message for indicating the inclusion of the sequence information A.
- Figure 11 shows a flow of time synchronization.
- the first synchronization mode is performed by using the second synchronization mode between the first network node 501 and the second network node 502.
- the first network node 501 carries the timestamp information in the sent encrypted message.
- the process includes the following steps:
- the second network node 502 sends a fifth encrypted message to the first network node 501 at time t3, and the second network node 502 receives the fifth encrypted message at time t4.
- the first network node 501 sends a first encrypted message to the second network node 502 at time t1.
- the first encrypted message carries timestamp information for indicating t4, and the second network node 502 receives the first time at time t2.
- S1103 The first network node 501 sends a second encrypted packet to the second network node 502, and the fourth encrypted message carries timestamp information for indicating t1.
- the second network node 502 After receiving the second encrypted message, the second network node 502 obtains the timestamp information for indicating t1 from the second encrypted message, and then calculates the offset according to the following formula:
- Offset [(t4-t3)-(t2-t1)]/2.
- the first encrypted message and the second encrypted message correspond to each other, and the two encrypted messages may carry the same synchronization process identification information (such as the serial number in FIG. 17) for indicating The two packets are used in the same time synchronization process.
- the second encrypted message may also carry the timestamp indication information in the third embodiment.
- the carrying sequence information such as the first encrypted packet carrying sequence information A and the second encrypted packet carrying sequence information B, may indicate that the second network node 502: the packet including the sequence information B carries the information indicating the inclusion of the sequence information. Timestamp information of the time at which A's message is sent.
- the first network node 501 may send timestamp information for indicating t4 through another message instead of the first encrypted message.
- Figure 12 shows a flow of time synchronization.
- the first synchronization mode is performed by using the second synchronization mode between the first network node 501 and the second network node 502.
- the first network node 501 sends unencrypted timestamp information.
- the process includes the following steps:
- the second network node 502 sends a fifth encrypted message to the first network node 501 at time t3, and the second network node 502 receives the fifth encrypted message at time t4.
- the first network node 501 sends the first encrypted packet to the second network node 502 at time t1, and sends the unencrypted timestamp information for indicating t4 while transmitting the first encrypted packet, the second network node. 502, at time t2, receiving the first encrypted message and the timestamp information for indicating t4;
- the first network node 501 sends a second encrypted message to the second network node 502, and sends an unencrypted timestamp information for indicating t1 while transmitting the second encrypted message.
- the second network node 502 receives the second encrypted message and the timestamp information for indicating t1, and then calculates the offset according to the following formula:
- Offset [(t4-t3)-(t2-t1)]/2.
- the first encrypted message and the second encrypted message correspond to each other, and the two encrypted messages may carry the same synchronization process identification information (such as the serial number in FIG. 17) for indicating The two packets are used for the same time synchronization process.
- the second encrypted message may also carry the timestamp indication information in the third embodiment.
- the first encrypted message and the second encrypted message may be carried respectively.
- the sequence information such as the first encrypted message carrying sequence information A and the second encrypted message carrying sequence information B, may indicate to the second network node 502 that the timestamp information sent together with the message including the sequence information B is used to indicate The transmission time of the message including the sequence information A.
- the first network node 501 can pass another message instead of the first encryption.
- the message is sent with timestamp information indicating t4.
- Figure 13 shows a flow of time synchronization.
- the first synchronization mode is performed by using the second synchronization mode between the first network node 501 and the second network node 502.
- the process includes the following steps:
- the second network node 502 sends a fifth encrypted message to the first network node 501 at time t3, and the second network node 502 receives the fifth encrypted message at time t4.
- the first network node 501 sends a first encrypted message to the second network node 502 at time t1.
- the first encrypted message carries timestamp information for indicating t4, and the second network node 502 receives the first time at time t2.
- the first network node 501 sends a second encrypted message to the second network node 502, and simultaneously sends unencrypted timestamp information for indicating t1.
- the second network node 502 may calculate the offset according to the following formula:
- Offset [(t4-t3)-(t2-t1)]/2.
- the first encrypted message and the second encrypted message correspond to each other, and the two encrypted messages may carry the same synchronization process identification information (such as the serial number in FIG. 17) for indicating The two packets are used for the same time synchronization process.
- the second encrypted message may also carry the timestamp indication information in the third embodiment.
- the first encrypted message and the second encrypted message may be carried respectively.
- the sequence information such as the first encrypted message carrying sequence information A and the second encrypted message carrying sequence information B, may indicate to the second network node 502 that the timestamp information sent together with the message including the sequence information B is used to indicate The transmission time of the message including the sequence information A.
- the first network node 501 may send timestamp information for indicating t4 through another message instead of the first encrypted message.
- Figure 14 shows a flow of time synchronization.
- the first synchronization mode is performed by using the second synchronization mode between the first network node 501 and the second network node 502.
- the process includes the following steps:
- the second network node 502 sends a fifth encrypted report to the first network node 501 at time t3.
- the second network node 502 receives the fifth encrypted message at time t4;
- the first network node 501 sends the first encrypted message to the second network node 502 at time t1, and sends the unencrypted timestamp information for indicating t4 while transmitting the first encrypted message, the second network node. 502, at time t2, receiving the first encrypted message and the timestamp information for indicating t4;
- the first network node 501 sends a second encrypted message to the second network node 502, and carries a timestamp information indicating the t1 in the second encrypted message.
- the second network node 502 After receiving the second encrypted message, the second network node 502 obtains the timestamp information for indicating t1 from the second encrypted message, and then calculates the offset according to the following formula:
- Offset [(t4-t3)-(t2-t1)]/2.
- the first encrypted message and the second encrypted message correspond to each other, and the two encrypted messages may carry the same synchronization process identification information (such as the serial number in FIG. 17) for indicating The two packets are used for the same time synchronization process.
- the second encrypted message may also carry the timestamp indication information in the third embodiment.
- the first encrypted message and the second encrypted message may be carried respectively.
- the sequence information such as the first encrypted message carrying sequence information A and the second encrypted message carrying sequence information B, may indicate that the second network node 502: the message including the sequence information B is carried in the message for indicating the inclusion of the sequence information A. Timestamp information of the time at which the message was sent.
- the first network node 501 may send timestamp information for indicating t4 through another message instead of the first encrypted message.
- Figure 18 shows a network node.
- the network node may include:
- the processing module 1801 is configured to generate a first encrypted message.
- the sending module 1802 is configured to send the first encrypted packet generated by the processing module 1801.
- the processing module 1801 is further configured to: generate a second packet, where the sending module 1802 is further configured to: send the second encrypted packet generated by the processing module 1801, where the second encrypted packet is the same as the target network node of the first encrypted packet, where The second encrypted message includes a first timestamp information indicating a first sending time of the first encrypted message; or the sending module 1802 is further configured to: send the first timestamp information together with the first encrypted message, and The first timestamp information is not encrypted.
- the network node further includes a receiving module, configured to send the first in the sending module 1802. After encrypting the packet, receiving the third encrypted packet;
- the sending module 1802 is further configured to: send the fourth encrypted packet; the source network node of the third encrypted packet, and the target network node of the fourth encrypted packet, which are the same as the target network node of the first encrypted packet;
- the second encrypted message includes a second timestamp information, where the second timestamp information indicates that the network node receives the second received time of the third encrypted message; or the sending module 1802 is further configured to: use the second timestamp information
- the four encrypted messages are sent together, and the second timestamp information is not encrypted.
- the third encrypted packet and the fourth encrypted packet include the same first synchronization process identifier information, where the first synchronization process identifier information is used to identify a synchronization process to which the encrypted packet of the first synchronization process identifier information belongs .
- the fourth encrypted packet includes the first timestamp indication information
- the first timestamp indication information is used to indicate that the fourth encrypted message includes timestamp information indicating a receiving time of the encrypted message that includes the same first synchronization process identification information as the fourth encrypted message.
- the network node further includes: a receiving module, configured to receive, after the sending module 1802 sends the first encrypted packet, the fifth encrypted packet, the source network node of the fifth encrypted packet, and the target of the first encrypted packet
- a receiving module configured to receive, after the sending module 1802 sends the first encrypted packet, the fifth encrypted packet, the source network node of the fifth encrypted packet, and the target of the first encrypted packet
- the third encrypted message includes a third timestamp information, where the third timestamp information indicates a third receiving time when the network node receives the fifth encrypted message; or the sending module 1802 is further configured to: use the third timestamp information An encrypted message is sent together, and the third timestamp information is not encrypted.
- the first encrypted packet and the second encrypted packet include the same second synchronization process identifier information
- the second synchronization process identifier information is used to identify a synchronization process to which the encrypted packet of the second synchronization process identifier information belongs .
- the second encrypted packet includes the second timestamp indication information
- the second timestamp indication information is used to indicate that the second encrypted message includes timestamp information indicating a sending time of the encrypted message that includes the second second process identification information that is the same as the second encrypted message.
- the processing module 1801 can be used to implement the processing and control operations of the first network node 501
- the sending module 1802 can be used to implement the sending operation of the first network node 501
- the receiving module can be used to implement the receiving operation of the first network node 501.
- Figure 19 illustrates one possible implementation of the network node shown in Figure 18.
- the processor 1901 is configured to implement the function of the processing module 1801, and the transmitter 1902 is configured to implement the function of the sending module 1802.
- Figure 20 shows another network node.
- the network node may include: a receiving module 2001 and a processing module 2002;
- the receiving module 2001 is configured to receive the first encrypted packet.
- the receiving module 2001 is further configured to: receive the second encrypted packet, where the first encrypted packet is the same as the source network node of the second encrypted packet, and the processing module 2002 is configured to obtain the first timestamp information from the second encrypted packet.
- the first timestamp information is used to indicate the first sending time; or the receiving module 2001 is further configured to: receive the first timestamp information that is sent together with the first encrypted message, and the first timestamp information is not encrypted;
- the processing module 2002 is configured to determine, according to the first timestamp information, a first sending time of the first encrypted message, and according to the first receiving time that the receiving module 2001 receives the first encrypted message and the first sending determined by the processing module 2002 At the moment, adjust the local clock.
- the network node further includes: a sending module, configured to send the third encrypted packet after the receiving module 2001 receives the first encrypted packet;
- the receiving module 2001 is further configured to: receive the fourth encrypted packet; the source network node of the third encrypted packet and the target network node of the fourth encrypted packet are the same as the source network node of the first encrypted packet;
- the processing module 2002 is further configured to: obtain the second timestamp information from the fourth encrypted message, where the second timestamp information is used to indicate the second receiving time of the third encrypted message; or the receiving module 2001 is further configured to: receive and The second timestamp information sent by the fourth encrypted message together, and the second timestamp information is not encrypted;
- the processing module 2002 is specifically configured to: adjust the local clock according to the first receiving time, the first sending time, the second sending time of the third encrypted message, and the second receiving time.
- the third encrypted message and the fourth encrypted message include the same first synchronization process identifier.
- the first synchronization process identifier information is used to identify a synchronization process to which the encrypted message of the first synchronization process identifier information belongs.
- the fourth encrypted packet includes the first timestamp indication information
- the first timestamp indication information is used to indicate that the fourth encrypted message includes timestamp information indicating a receiving time of the encrypted message that includes the same first synchronization process identification information as the fourth encrypted message;
- the processing module 2002 is further configured to: before the second receiving time is determined according to the second timestamp information, determine, according to the first timestamp indication information, that the second encrypted time information is included in the fourth encrypted message.
- the network node further includes: a sending module, configured to send a fifth encrypted message before the receiving module 2001 receives the first encrypted message; and a source of the first encrypted message and the source of the first encrypted message
- a sending module configured to send a fifth encrypted message before the receiving module 2001 receives the first encrypted message
- a source of the first encrypted message and the source of the first encrypted message The network nodes are the same;
- the first encrypted packet includes the third timestamp information, and the network node obtains the third timestamp information from the first encrypted message, where the third timestamp information is used to indicate the third receiving time of the fifth encrypted message; or
- the module 2001 is further configured to: receive third timestamp information that is sent together with the first encrypted message, where the third timestamp information is not encrypted;
- the processing module 2002 is further configured to: determine a third receiving moment according to the third timestamp information
- the processing module 2002 is specifically configured to: adjust the local clock according to the third sending time, the third receiving time, the first receiving time, and the first sending time of the fifth encrypted message.
- the first encrypted message and the second encrypted message include the same second synchronization process identification information
- the second synchronization process identification information is used to identify a synchronization process to which the encrypted message of the second synchronization process identification information belongs.
- the second encrypted packet includes the second timestamp indication information
- the second timestamp indication information is used to indicate that the second encrypted message includes timestamp information indicating a sending time of the encrypted message that includes the second second process identification information that is the same as the second encrypted message;
- the processing module 2002 is further configured to: before determining the first sending moment of the first encrypted packet according to the first timestamp information, determining, according to the second timestamp indication information, that the second encrypted packet includes the first time Stamp information.
- the receiving module 2001 may be used to implement the receiving operation of the second network node 502
- the processing module 2002 may be used to implement the second network node 502.
- the processing module can be used to implement the transmitting operation of the second network node 502.
- Figure 21 illustrates one possible implementation of the network node shown in Figure 20.
- the receiver 2101 is configured to implement the function of the receiving module 2001
- the processor 2102 is configured to implement the functions of the processing module 2002.
- a network node may carry the timestamp information indicating the sending time of the previously sent encrypted message in the encrypted message sent later, or The timestamp information indicating the time when the encrypted message is sent is not encrypted, and is sent along with the encrypted message.
- the target network node of the encrypted packet can obtain the accurate transmission time of the encrypted packet, and then synchronize with the source network node of the encrypted packet.
- embodiments of the present application can be provided as a method, system, or computer program product.
- the present application can take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment in combination of software and hardware.
- the application can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
- the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the computer readable memory is stored in the computer readable memory.
- the instructions in the production result include an article of manufacture of the instruction device that implements the functions specified in one or more blocks of the flowchart or in a flow or block of the flowchart.
- These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
- the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Synchronisation In Digital Transmission Systems (AREA)
Abstract
La présente invention se rapporte au domaine technique des communications et concerne plus particulièrement un nœud de réseau, un procédé de transmission par paquets et un réseau, et elle est utilisée pour fournir une solution de réalisation d'une synchronisation temporelle entre des nœuds de réseau. La solution prend en charge le cryptage de paquets et peut garantir la précision de la synchronisation temporelle. Dans le procédé d'envoi de paquets selon la présente invention, un nœud de réseau envoie un premier paquet crypté à un autre nœud de réseau, et envoie un deuxième paquet crypté à un autre nœud de réseau. Le deuxième paquet crypté comprend des premières informations d'horodatage destinées à indiquer un premier moment d'envoi du premier paquet crypté. Avec la présente invention, un nœud de réseau cible d'un paquet crypté peut acquérir un moment d'envoi précis du paquet crypté et effectue ainsi une synchronisation temporelle avec un nœud de réseau source du paquet crypté.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201580085629.3A CN108781162A (zh) | 2015-12-31 | 2015-12-31 | 一种网络节点、报文传输方法和网络 |
PCT/CN2015/100333 WO2017113404A1 (fr) | 2015-12-31 | 2015-12-31 | Nœud de réseau, procédé de transmission par paquets et réseau |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2015/100333 WO2017113404A1 (fr) | 2015-12-31 | 2015-12-31 | Nœud de réseau, procédé de transmission par paquets et réseau |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2017113404A1 true WO2017113404A1 (fr) | 2017-07-06 |
Family
ID=59224367
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2015/100333 WO2017113404A1 (fr) | 2015-12-31 | 2015-12-31 | Nœud de réseau, procédé de transmission par paquets et réseau |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN108781162A (fr) |
WO (1) | WO2017113404A1 (fr) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112398567A (zh) * | 2020-11-17 | 2021-02-23 | 珠海格力电器股份有限公司 | 加密通信过程中时钟同步方法和装置以及多设备系统 |
CN113242128A (zh) * | 2021-07-13 | 2021-08-10 | 北京天御云安科技有限公司 | 一种基于系统时间作为密码算法初始化向量的时间戳校正方法 |
CN113489588A (zh) * | 2021-06-30 | 2021-10-08 | 湖南三一智能控制设备有限公司 | 作业机械的数据处理方法、装置及作业机械 |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112448896B (zh) | 2019-08-30 | 2024-04-30 | 华为技术有限公司 | 确定性网络中的发送周期的确定方法和装置 |
CN111711710B (zh) * | 2020-05-27 | 2022-11-11 | 北京金山云网络技术有限公司 | 访问MongoDB复制集集群的方法、装置、设备及存储介质 |
CN115484078A (zh) * | 2022-08-31 | 2022-12-16 | 中汽创智科技有限公司 | 时间同步方法、装置、电子设备及存储介质 |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002017659A1 (fr) * | 2000-08-17 | 2002-02-28 | Sepura Limited | Messages de donnees courts dans des systemes de communication du service mobile |
CN1922623A (zh) * | 2004-02-17 | 2007-02-28 | 富士通株式会社 | 无线钱包 |
CN102457371A (zh) * | 2010-10-27 | 2012-05-16 | 华为技术有限公司 | 时间同步方法和相关设备及系统 |
CN102957489A (zh) * | 2008-02-03 | 2013-03-06 | 大唐移动通信设备有限公司 | 时钟同步方法、主从时钟实体 |
CN103118029A (zh) * | 2013-02-18 | 2013-05-22 | 中兴通讯股份有限公司 | 一种加密报文互传时间同步方法及装置 |
CN104270756A (zh) * | 2014-10-24 | 2015-01-07 | 石家庄铁道大学 | 身份与位置分离网络中的域内映射更新认证方法 |
WO2015049138A1 (fr) * | 2013-10-03 | 2015-04-09 | Alcatel Lucent | Transmission sécurisée de paquets de synchronisation temporelle |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9112632B2 (en) * | 2008-01-25 | 2015-08-18 | Cisco Technology, Inc. | Supporting efficient and accurate sync/followup timestamps |
-
2015
- 2015-12-31 CN CN201580085629.3A patent/CN108781162A/zh active Pending
- 2015-12-31 WO PCT/CN2015/100333 patent/WO2017113404A1/fr active Application Filing
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002017659A1 (fr) * | 2000-08-17 | 2002-02-28 | Sepura Limited | Messages de donnees courts dans des systemes de communication du service mobile |
CN1922623A (zh) * | 2004-02-17 | 2007-02-28 | 富士通株式会社 | 无线钱包 |
CN102957489A (zh) * | 2008-02-03 | 2013-03-06 | 大唐移动通信设备有限公司 | 时钟同步方法、主从时钟实体 |
CN102457371A (zh) * | 2010-10-27 | 2012-05-16 | 华为技术有限公司 | 时间同步方法和相关设备及系统 |
CN103118029A (zh) * | 2013-02-18 | 2013-05-22 | 中兴通讯股份有限公司 | 一种加密报文互传时间同步方法及装置 |
WO2015049138A1 (fr) * | 2013-10-03 | 2015-04-09 | Alcatel Lucent | Transmission sécurisée de paquets de synchronisation temporelle |
CN104270756A (zh) * | 2014-10-24 | 2015-01-07 | 石家庄铁道大学 | 身份与位置分离网络中的域内映射更新认证方法 |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112398567A (zh) * | 2020-11-17 | 2021-02-23 | 珠海格力电器股份有限公司 | 加密通信过程中时钟同步方法和装置以及多设备系统 |
CN112398567B (zh) * | 2020-11-17 | 2021-10-29 | 珠海格力电器股份有限公司 | 加密通信过程中时钟同步方法和装置以及多设备系统 |
CN113489588A (zh) * | 2021-06-30 | 2021-10-08 | 湖南三一智能控制设备有限公司 | 作业机械的数据处理方法、装置及作业机械 |
CN113242128A (zh) * | 2021-07-13 | 2021-08-10 | 北京天御云安科技有限公司 | 一种基于系统时间作为密码算法初始化向量的时间戳校正方法 |
CN113242128B (zh) * | 2021-07-13 | 2022-02-08 | 北京天御云安科技有限公司 | 一种基于系统时间作为密码算法初始化向量的时间戳校正方法 |
Also Published As
Publication number | Publication date |
---|---|
CN108781162A (zh) | 2018-11-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2017113404A1 (fr) | Nœud de réseau, procédé de transmission par paquets et réseau | |
US11006378B2 (en) | Synchronizing clocks in a wireless system | |
EP2727392B1 (fr) | Mécanisme de positionnement distribué pour des dispositifs de communication sans fil | |
JP7359342B2 (ja) | 時間同期方法及び装置 | |
US11503557B2 (en) | Time synchronization in integrated 5G wireless and time-sensitive networking systems | |
CN108028817B (zh) | 用于具有限回程的小小区的定时同步 | |
US11606155B2 (en) | Method for exchanging time synchronization packet and network apparatus | |
CN107836136B (zh) | 同步方法及装置 | |
EP3531610B1 (fr) | Procédé de synchronisation de fréquence et horloge esclave | |
WO2012055360A1 (fr) | Procédé de synchronisation temporelle et dispositif et système associés | |
EP3180876B1 (fr) | Procédé et appareil pour synchroniser une pluralité de dispositifs distribués avec un réseau | |
CN104836630A (zh) | Ieee1588时钟同步系统及其实现方法 | |
WO2016095099A1 (fr) | Procédé et appareil de synchronisation temporelle | |
JP2018505576A (ja) | 複数のシンクデバイスへのワイヤレスストリーミング伝送のタイミングを同期する技法 | |
CN104349451B (zh) | 一种进行同步的方法和设备 | |
EP4010777A1 (fr) | Systèmes d'horodatage d'évènements sur des dispositifs périphériques | |
US20220039042A1 (en) | Methods, second node and apparatus for determining clock asynchronization | |
WO2017063322A1 (fr) | Procédé de synchronisation temporelle, dispositif de synchronisation temporelle principal, système de communication, et support de stockage de données | |
WO2014100982A1 (fr) | Procédé de synchronisation d'interface radio et appareil associé | |
CN107431960B (zh) | 用于无线电网络同步的方法和装置 | |
WO2023116435A1 (fr) | Procédé et appareil de communication | |
US20200041633A1 (en) | Methods and apparatuses for distance measurement | |
WO2013091202A1 (fr) | Procédé, dispositif et système de synchronisation | |
Rajagopal et al. | Study of synchronization facets for 5G small cell use case scenario | |
WO2019104522A1 (fr) | Procédés et dispositifs associés à un réseau flexe |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15912028 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 15912028 Country of ref document: EP Kind code of ref document: A1 |