http://rdf.ncbi.nlm.nih.gov/pubchem/patent/WO-2011110096-A1

Outgoing Links

Predicate Object
assignee http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_d1ad93e569c3a39cb3f980eab67b6337
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_3fe4851d4c0a5207538fb1e243303ff5
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_14e2198da121ff2586a4ea0a20ceba86
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_7d6b77040ead08e28c5be8c6ee138c44
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_880fa40eef8ff97d566cdcac3a545d8a
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_bf3de930924bcc04f162530944cd99c8
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_fee612eb39a5cfca8794e5d728431295
classificationCPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1458
classificationIPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L45-74
filingDate 2011-03-10-04:00^^<http://www.w3.org/2001/XMLSchema#date>
inventor http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_3d586d59abba34b95098343acd86708c
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_b762d6b73a320380cf98835930299cfd
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_0fbdf53fae5bf179e0fcf34ac442ffc8
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_c1ce395d70d120ff3a0357642ab6bd6c
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_b1db77ea7aade53ae0c883c67902fd56
publicationDate 2011-09-15-04:00^^<http://www.w3.org/2001/XMLSchema#date>
publicationNumber WO-2011110096-A1
titleOfInvention Method and device for realizing trusted network connection through router or switch
abstract The present invention discloses a method and device for realizing trusted network connection through a router or a switch, which prevent invalid access of DOS attack, relay attack and invasion of Trojan horse and other malicious software and guarantee routing privacy. The technical solution of the invention is that: through extension of the existed IP header at the router, a source address and a destination address are verified, thereby address authenticity certification and address lifetime certification are provided, and the invalid access of the DOS attack is prevented; the freshness certification of the current connection is provided to prevent the relay attack on the router; the credibility of the routing operating environment is provided to prevent the invasion of the Trojan horse and other malicious software on the router; and the decryption function is added to the router to guarantee the routing privacy. The method and the device are used in the offices, organizations and departments with privacy and safety requirements.
isCitedBy http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-103618607-B
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-103618607-A
priorityDate 2010-03-10-04:00^^<http://www.w3.org/2001/XMLSchema#date>
type http://data.epo.org/linked-data/def/patent/Publication

Incoming Links

Predicate Subject
isDiscussedBy http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID323477769
http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID245348577

Total number of triples: 25.