Predicate |
Object |
assignee |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_d1ad93e569c3a39cb3f980eab67b6337 http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_3fe4851d4c0a5207538fb1e243303ff5 http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_14e2198da121ff2586a4ea0a20ceba86 http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_7d6b77040ead08e28c5be8c6ee138c44 http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_880fa40eef8ff97d566cdcac3a545d8a http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_bf3de930924bcc04f162530944cd99c8 http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_fee612eb39a5cfca8794e5d728431295 |
classificationCPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1458 |
classificationIPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L45-74 |
filingDate |
2011-03-10-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
inventor |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_3d586d59abba34b95098343acd86708c http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_b762d6b73a320380cf98835930299cfd http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_0fbdf53fae5bf179e0fcf34ac442ffc8 http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_c1ce395d70d120ff3a0357642ab6bd6c http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_b1db77ea7aade53ae0c883c67902fd56 |
publicationDate |
2011-09-15-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
publicationNumber |
WO-2011110096-A1 |
titleOfInvention |
Method and device for realizing trusted network connection through router or switch |
abstract |
The present invention discloses a method and device for realizing trusted network connection through a router or a switch, which prevent invalid access of DOS attack, relay attack and invasion of Trojan horse and other malicious software and guarantee routing privacy. The technical solution of the invention is that: through extension of the existed IP header at the router, a source address and a destination address are verified, thereby address authenticity certification and address lifetime certification are provided, and the invalid access of the DOS attack is prevented; the freshness certification of the current connection is provided to prevent the relay attack on the router; the credibility of the routing operating environment is provided to prevent the invasion of the Trojan horse and other malicious software on the router; and the decryption function is added to the router to guarantee the routing privacy. The method and the device are used in the offices, organizations and departments with privacy and safety requirements. |
isCitedBy |
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-103618607-B http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-103618607-A |
priorityDate |
2010-03-10-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
type |
http://data.epo.org/linked-data/def/patent/Publication |