会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Method for protecting a telecommunication network and secure router implementing such a method
    • 用于保护电信网络和实现这种方法的安全路由器的方法
    • US08856537B2
    • 2014-10-07
    • US13375127
    • 2010-04-22
    • Haithem El-AbedAntony Martin
    • Haithem El-AbedAntony Martin
    • H04L9/32H04L12/755H04L12/751
    • H04L45/021H04L45/02H04L45/025
    • This invention pertains to a method for protecting a telecommunication network comprising at least one secure router (100) equipped with a topology map (103) of that network in order to determine the intermediate routers which constitute an optimal pathway for routing information, said secure router and said intermediate routers generating this topological map by sharing the lists of links (LSA1, LSA2, LSAn) using a communications protocol, characterized in that the secure router (100) performs the following steps: The step (109) of calculating and then saving, when a list of links (LSA1, LSA2, . . . LSAn) is received, at least one receiving fingerprint (hash(LSA1), hash(LSA2), . . . hash(LSAn)) of the lists received (LSA1, LSA2, . . . LSAn), The step (120) of calculating and then saving, when a list of links (LSA′1, LSA′2, . . . LSA′n) is transmitted, at least one sending fingerprint (hash(LSA′1), hash(LSA′2), . . . hash(LSA′n)) of the lists to be transmitted, and The step of comparing the receiving fingerprint (hash(LSA1), hash(LSA2), . . . hash(LSAn)) to the sending fingerprint (hash(LSA′1), hash(LSA′2), . . . hash(LSA′n) such that the sending of a list of links (LSA1, LSA2, LSAn) is inhibited if the receiving fingerprint is different from the sending fingerprint.
    • 本发明涉及一种用于保护电信网络的方法,该电信网络包括配备有该网络的拓扑图(103)的至少一个安全路由器(100),以便确定构成用于路由信息的最佳路径的中间路由器,所述安全路由器 并且所述中间路由器通过使用通信协议共享链路列表(LSA1,LSA2,LSAn)来生成该拓扑图,其特征在于,安全路由器(100)执行以下步骤:计算然后保存的步骤(109) 当接收到链路列表(LSA1,LSA2,...,LSAn)时,接收到的列表中的至少一个接收指纹(散列(LSA1),散列(LSA2),...,散列(LSAn))) LSA2,... LSAn),当发送链路列表(LSA'1,LSA'2,...,LSA'n)时,计算并保存的步骤(120)至少一个发送指纹(散列 (LSA'1),散列(LSA'2),...散列(LSA'n)),并且步骤 比较接收指纹(散列(LSA1),散列(LSA2))。 。 。 散列(LSAn))发送到发送指纹(散列(LSA'1),散列(LSA'2),...哈希(LSA'n)),使得发送链路列表(LSA1,LSA2,LSAn) 如果接收的指纹与发送指纹不同,则会被禁止。
    • 3. 发明申请
    • METHOD FOR PROTECTING A TELECOMMUNICATION NETWORK AND SECURE ROUTER IMPLEMENTING SUCH A METHOD
    • 保护电信网络和安全路由器的方法实施这种方法
    • US20120102330A1
    • 2012-04-26
    • US13375127
    • 2010-04-22
    • Haithem El- AbedAntony Martin
    • Haithem El- AbedAntony Martin
    • H04L9/32H04L29/06
    • H04L45/021H04L45/02H04L45/025
    • This invention pertains to a method for protecting a telecommunication network comprising at least one secure router (100) equipped with a topology map (103) of that network in order to determine the intermediate routers which constitute an optimal pathway for routing information, said secure router and said intermediate routers generating this topological map by sharing the lists of links (LSA1, LSA2, LSAn) using a communications protocol, characterized in that the secure router (100) performs the following steps: The step (109) of calculating and then saving, when a list of links (LSA1, LSA2, . . . LSAn) is received, at least one receiving fingerprint (hash(LSA1), hash(LSA2), . . . hash(LSAn)) of the lists received (LSA1, LSA2, . . . LSAn), The step (120) of calculating and then saving, when a list of links (LSA′1, LSA′2, . . . LSA′n) is transmitted, at least one sending fingerprint (hash(LSA′1), hash(LSA′2), . . . hash(LSA′n)) of the lists to be transmitted, and The step of comparing the receiving fingerprint (hash(LSA1), hash(LSA2), . . . hash(LSAn)) to the sending fingerprint (hash(LSA′1), hash(LSA′2), . . . hash(LSA′n) such that the sending of a list of links (LSA1, LSA2, LSAn) is inhibited if the receiving fingerprint is different from the sending fingerprint.
    • 本发明涉及一种用于保护电信网络的方法,该电信网络包括配备有该网络的拓扑图(103)的至少一个安全路由器(100),以便确定构成用于路由信息的最佳路径的中间路由器,所述安全路由器 并且所述中间路由器通过使用通信协议共享链路列表(LSA1,LSA2,LSAn)来生成该拓扑图,其特征在于,安全路由器(100)执行以下步骤:计算然后保存的步骤(109) 当接收到链路列表(LSA1,LSA2,...,LSAn)时,接收到的列表中的至少一个接收指纹(散列(LSA1),散列(LSA2),...,散列(LSAn))) LSA2,... LSAn),当发送链路列表(LSA'1,LSA'2,...,LSA'n)时,计算并保存的步骤(120)至少一个发送指纹(散列 (LSA'1),散列(LSA'2),...散列(LSA'n)),并且步骤 比较接收指纹(散列(LSA1),散列(LSA2))。 。 。 散列(LSAn))发送到发送指纹(散列(LSA'1),散列(LSA'2),...哈希(LSA'n)),使得发送链路列表(LSA1,LSA2,LSAn) 如果接收的指纹与发送指纹不同,则会被禁止。