Summary of the invention
The present invention is directed at least overcome one of drawbacks described above provide it is a kind of based on STiP model security terminal mark and recognize
Method and system are demonstrate,proved, to guarantee the safety of local terminal end host access.
In order to achieve the above objectives, technical solution of the present invention is specifically achieved in that
One aspect of the present invention provides a kind of security terminal mark and authentication method based on STiP model, comprising:
Local terminal end host will be identified using the private key of local terminal end host comprising active security host identifier and purpose security host
The data packet original text of symbol is signed, and data packet to be sent is obtained, and data packet to be sent is sent to access authentication server,
In, data packet to be sent includes data packet original text and signature, and source security host identifier is unique mark of local terminal end host
Know, purpose security host identifier is the unique identification of distant terminal host;Access authentication server receives data packet to be sent,
In the case where not finding the binding information with the binding of source security host identifier in local mapped cache table, to local mapping
Resolver sends the request of inquiry with the binding information of source security host identifier binding, wherein with source security host identifier
It is whole that the binding information of binding includes at least source security host identifier, the public key bound with source security host identifier and local terminal
The route location mark of the local terminal couple in router of end main frame access;Local Mapping Resolution device parsing inquiry and source security host mark
The request for knowing the binding information of symbol binding is reflected in the binding information of local search and the binding of source security host identifier locally
Radiolysis parser do not find with source security host identifier binding binding information in the case where, successively to root Mapping Resolution device,
Top level map resolver and permissions mapping resolver make iterative queries into, and obtain and source safety master from permissions mapping resolver
The binding information of machine identifier binding, and the binding information bound with source security host identifier is sent to access authentication service
Device;Access authentication server receive with source security host identifier binding binding information, using with source security host identifier
Data to be forwarded packet is sent to local terminal access routing if upchecking by the true and false of the public key verifications of binding data packet to be sent
Device, wherein data to be forwarded packet includes at least data packet original text;Local terminal couple in router receives data to be forwarded packet, in local
In the case where not found in mapped cache table with the binding information of purpose security host identifier binding, to local Mapping Resolution
Device sends the request of inquiry with the binding information of purpose security host identifier binding, wherein with purpose security host identifier
The public key and right that the binding information of binding includes at least purpose security host identifier, binds with purpose security host identifier
Hold the route location mark of the opposite end couple in router of end host access;Local Mapping Resolution device parsing inquiry and purpose safety
The request of the binding information of hostid binding is believed in local search and the binding with the binding of purpose security host identifier
Breath, local Mapping Resolution device do not find with purpose security host identifier binding binding information in the case where, successively to
Root Mapping Resolution device, top level map resolver and permissions mapping resolver make iterative queries into, and from permissions mapping resolver
Obtain the binding information with the binding of purpose security host identifier, and the binding information that will be bound with purpose security host identifier
It is sent to local terminal couple in router;Local terminal couple in router identifies source route location and purpose route location mark is encapsulated into
Data to be forwarded packet after encapsulation is sent to opposite end couple in router, wherein source route location is identified as by data to be forwarded packet
The route location of local terminal couple in router identifies, and purpose route location is identified as the route location mark of opposite end couple in router;
Opposite end couple in router receives the data to be forwarded packet after encapsulation, and the data to be forwarded packet after encapsulation is decapsulated, is obtained
Data to be forwarded packet, and data to be forwarded packet is sent to distant terminal host.
In addition, access authentication server is received with after the binding information of source security host identifier binding, method is also wrapped
Include: the binding information bound with source security host identifier is stored in local mapped cache table by access authentication server.
In addition, when being also stored with the caching with the binding information of source security host identifier binding in local mapped cache table
Between length;Method further include: access authentication server cache-time length then after, deletion tied up with source security host identifier
Fixed binding information.
In addition, source security host identifier and purpose security host identifier are named according to preset structure.
In addition, root Mapping Resolution device, top level map resolver and permissions mapping resolver form tree-shaped topological structure.
In addition, the topology of root Mapping Resolution device, top level map resolver and the composition decentralization of permissions mapping resolver
Structure.
In addition, data to be forwarded packet is sent to local terminal access after access authentication server receives data packet to be sent
Before router, method further include: access authentication server is using hash algorithm to source security host identifier and purpose safety
Hostid carries out operation, source security host identification (RFID) tag and purpose security host identification (RFID) tag is obtained, by source security host
Identification (RFID) tag and source security host identifier and purpose safety master in purpose security host identification (RFID) tag replacement data packet original text
Machine identifier.
Another aspect of the present invention provides a kind of security terminal mark and Verification System based on STiP model, comprising: this
End host is held, for that will include active security host identifier and purpose security host mark using the private key of local terminal end host
The data packet original text for knowing symbol is signed, and obtains data packet to be sent, data packet to be sent is sent to access authentication server,
Wherein, data packet to be sent includes data packet original text and signature, and source security host identifier is the unique of local terminal end host
Mark, purpose security host identifier are the unique identification of distant terminal host;Access authentication server, it is to be sent for receiving
Data packet, in the case where not finding the binding information with the binding of source security host identifier in local mapped cache table, to
Local Mapping Resolution device sends the request of inquiry with the binding information of source security host identifier binding, wherein main safely with source
Machine identifier binding binding information include at least source security host identifier, with source security host identifier binding public key with
And the route location mark of the local terminal couple in router of local terminal end host access;Local Mapping Resolution device, for parsing inquiry
The request for the binding information bound with source security host identifier, in the binding of local search and the binding of source security host identifier
Information, local Mapping Resolution device do not find with source security host identifier binding binding information in the case where, successively to
Root Mapping Resolution device, top level map resolver and permissions mapping resolver make iterative queries into, and from permissions mapping resolver
The binding information with the binding of source security host identifier is obtained, and the binding information bound with source security host identifier is sent
To access authentication server;Access authentication server is also used to receive the binding information with the binding of source security host identifier, benefit
With the true and false for the public key verifications data packet to be sent bound with source security host identifier, if upchecking, by data to be forwarded
Packet is sent to local terminal couple in router, wherein data to be forwarded packet includes at least data packet original text;Local terminal couple in router is used
In receiving data to be forwarded packet, does not find in local mapped cache table and believe with the binding of purpose security host identifier binding
In the case where breath, the request for the binding information that inquiry is bound with purpose security host identifier is sent to local Mapping Resolution device,
Wherein, purpose security host identifier and purpose safety are included at least with the binding information of purpose security host identifier binding
The route location mark of the opposite end couple in router of the public key and distant terminal host access of hostid binding;Locally reflect
Radiolysis parser, be also used to parse inquiry and purpose security host identifier binding binding information request, local search with
With the binding information of purpose security host identifier binding, does not find in local Mapping Resolution device and identified with purpose security host
In the case where the binding information for according with binding, successively to root Mapping Resolution device, top level map resolver and permissions mapping resolver
It makes iterative queries into, and obtains the binding information bound with purpose security host identifier from permissions mapping resolver, and will be with
The binding information of purpose security host identifier binding is sent to local terminal couple in router;Local terminal couple in router, be also used to by
Source route location mark and purpose route location mark are encapsulated into data to be forwarded packet, and the data to be forwarded packet after encapsulation is sent out
It send to opposite end couple in router, wherein source route location is identified as the route location mark of local terminal couple in router, purpose routing
Station location marker is that the route location of opposite end couple in router identifies;Opposite end couple in router, it is to be forwarded after encapsulating for receiving
Data packet decapsulates the data to be forwarded packet after encapsulation, obtains data to be forwarded packet, and data to be forwarded packet is sent
To distant terminal host.
In addition, access authentication server, is also used to after receiving the binding information bound with source security host identifier,
The binding information bound with source security host identifier is stored in local mapped cache table.
In addition, when being also stored with the caching with the binding information of source security host identifier binding in local mapped cache table
Between length;Access authentication server, be also used to cache-time length then after, delete with source security host identifier binding
Binding information.
In addition, source security host identifier and purpose security host identifier are named according to preset structure.
In addition, root Mapping Resolution device, top level map resolver and permissions mapping resolver form tree-shaped topological structure.
In addition, the topology of root Mapping Resolution device, top level map resolver and the composition decentralization of permissions mapping resolver
Structure.
In addition, access authentication server, is also used to after receiving data packet to be sent, data to be forwarded packet is sent to
Before local terminal couple in router, source security host identifier and purpose security host identifier are transported using hash algorithm
It calculates, obtains source security host identification (RFID) tag and purpose security host identification (RFID) tag, source security host identification (RFID) tag and purpose are pacified
Source security host identifier and purpose security host identifier in full host identification label replacement data packet original text.
As seen from the above technical solution provided by the invention, provide through the embodiment of the present invention based on STiP model
Security terminal mark and authentication method and system, the network securitys such as source address spoofing, identity security can be solved from source
Problem, to be conducive to construct autonomous controllable, safe and reliable internet environment.
Specific embodiment
Detailed description of embodiments of the present invention with reference to the accompanying drawing.
Fig. 1 shows a kind of security terminal mark and Verification System based on STiP model provided in an embodiment of the present invention
Structural schematic diagram, referring to Fig. 1, the security terminal mark and Verification System provided in an embodiment of the present invention based on STiP model, packet
Include: the mutually independent access net 10 of IP address and backbone network 20, wherein access net 10 include multiple end hosts (wherein extremely
Less include local terminal end host 101 and distant terminal host 103) and at least one access authentication server is (wherein at least
Including the local terminal access authentication server 102 being connect with local terminal end host 101).Certainly as a kind of optional reality of the invention
Mode is applied, at least one access authentication server can also include the opposite end access authentication connecting with distant terminal host 103
Server (not shown).Backbone network 20 include multiple couple in routers (wherein at least include local terminal couple in router 201 with
And opposite end couple in router 202), local Mapping Resolution device 203, root Mapping Resolution device 204, top level map resolver 205 and
Permissions mapping resolver 206, local terminal couple in router 201 connect local terminal access authentication server 102, opposite end couple in router
(with opposite end access authentication server, opposite end couple in router 202 connects 202 peer end of the connection end hosts 103
Opposite end access authentication server), local Mapping Resolution device 203, root Mapping Resolution device 204, top level map resolver 205 and power
Limit Mapping Resolution device 206 is sequentially connected.It will be appreciated by persons skilled in the art that above-mentioned connection can be that wired connection can also
Think wireless connection, this is not particularly limited in the present invention.Hereinafter, to provided in an embodiment of the present invention based on STiP model
Security terminal mark and Verification System are described in detail:
Local terminal end host 101, for the private key using local terminal end host will comprising active security host identifier and
The data packet original text of purpose security host identifier is signed, and data packet to be sent is obtained, and data packet to be sent is sent to
Access authentication server 102, wherein data packet to be sent includes data packet original text and signature, and source security host identifier is
The unique identification of local terminal end host 101, purpose security host identifier are the unique identification of distant terminal host 103;
Access authentication server 102 is not found and source for receiving data packet to be sent in local mapped cache table
In the case where the binding information of security host identifier binding, inquiry and source security host are sent to local Mapping Resolution device 203
The request of the binding information of identifier binding, wherein pacify with the binding information of source security host identifier binding including at least source
Full hostid, the local terminal couple in router with the public key of source security host identifier binding and the access of local terminal end host
201 route location mark;
Local Mapping Resolution device 203, for parsing the request of inquiry with the binding information of source security host identifier binding,
In the binding information of local search and the binding of source security host identifier, do not found in local Mapping Resolution device main safely with source
In the case where the binding information of machine identifier binding, successively to root Mapping Resolution device 204, top level map resolver 205 and power
Limit Mapping Resolution device 206 makes iterative queries into, and obtains and the binding of source security host identifier from permissions mapping resolver 206
Binding information, and the binding information bound with source security host identifier is sent to access authentication server 102;
Access authentication server 102 is also used to receive the binding information with the binding of source security host identifier, utilization and source
The true and false of the public key verifications data packet to be sent of security host identifier binding sends data to be forwarded packet if upchecking
To local terminal couple in router 201, wherein data to be forwarded packet includes at least data packet original text;
Local terminal couple in router 201 is not found and mesh for receiving data to be forwarded packet in local mapped cache table
Security host identifier binding binding information in the case where, to local Mapping Resolution device 203 send inquiry with purpose safety
The request of the binding information of hostid binding, wherein at least wrapped with the binding information of purpose security host identifier binding
Include purpose security host identifier, the opposite end with the public key of purpose security host identifier binding and the access of distant terminal host
The route location of couple in router identifies;
Local Mapping Resolution device 203 is also used to parse the binding information of inquiry and the binding of purpose security host identifier
Request is not found in local search and the binding information with the binding of purpose security host identifier in local Mapping Resolution device
In the case where the binding information bound with purpose security host identifier, successively parsed to root Mapping Resolution device 204, top level map
Device 205 and permissions mapping resolver 206 make iterative queries into, and obtain and purpose security host mark from permissions mapping resolver
Know the binding information of symbol binding, and the binding information bound with purpose security host identifier is sent to local terminal couple in router
201;
Local terminal couple in router 201, be also used to identify source route location and purpose route location mark be encapsulated into
Data packet is forwarded, the data to be forwarded packet after encapsulation is sent to opposite end couple in router 202, wherein source route location mark
It is identified for the route location of local terminal couple in router 201, purpose route location is identified as the routing position of opposite end couple in router 202
Set mark;
Opposite end couple in router 202, for receiving the data to be forwarded packet after encapsulating, by the data to be forwarded packet after encapsulation
It is decapsulated, obtains data to be forwarded packet, and data to be forwarded packet is sent to distant terminal host 103.
It can be seen that the security terminal mark and Verification System based on STiP model provided through the embodiment of the present invention,
The network security problems such as source address spoofing, identity security can be solved from source, to be conducive to the autonomous controllable, safety of building
Believable internet environment.
Specifically, access net 10 can complete the access of end host, in STiP model base provided in an embodiment of the present invention
On plinth, accessed using globally unique SHI (security host identifier, Secure Host Identifier) to identify in network
Every end host, the security host mark be not involved in global routing.Data routing may be implemented in backbone network 20, local to map
Resolver 203, root Mapping Resolution device 204, top level map resolver 205 and permissions mapping resolver 206 are configurable to one
A server, such as a mapping server, are also configurable to a server cluster, this is in the present invention with no restrictions.
Meanwhile accessing net 10 and backbone network 20 and using independent address space: access net 10 uses security terminal identifier
Data are forwarded, backbone network 20 is routed and forwarded data packet using IP address.Since end host cannot directly access access routing
Therefore device can effectively prevent attack of the end host to couple in router.So that STiP mould provided in an embodiment of the present invention
Net 10 is accessed in type and this design of 20 separation architecture of backbone network can guarantee that future terminal access technology and backbone network framework are distinguished
Independently evolution.
In access net 10, the authenticity of end host is verified by access authentication server.Specifically, before use,
Each end host can be distributed a pair of public and private key by such as mapping server, which is bound with end host mark,
I.e. public and private key is bound with SHI, meanwhile, also by the RLOC of SHI and couple in router, (route location is identified, Routing
Locator it) is bound, that is, the triple that mapping server can recorde as the binding of each end host, the triple include
SHI, the public key with SHI binding, the RLOC of the couple in router of SHI access.Source terminal host carries out data packet using private key
Signature, access authentication server can be obtained by inquiring such as mapping server and the public key of source SHI binding, to whole from source
The data packet of end main frame is identified.A kind of specific implementation presented below, but the present invention is not limited thereto, in STiP mould
In type, when the end host of a website sends data to the end host of another website, i.e., when local terminal end host
101 to distant terminal host 103 send data when, when data reach access authentication server 102 after, if local terminal access recognize
It demonstrate,proves in the local mapped cache table of server and does not find SHI-to-RLOC (the i.e. security host identifier of local terminal end host
With local terminal access routing route location mark mapping relations) mapping item, can to LMR (local Mapping Resolution device,
Local Map Resolver) send message, the mapping relations of request SHI-to-RLOC;LMR receives access authentication service
Start to parse the request message after the request of device 102, is locally searching the binding letter bound with the SHI of local terminal end host first
Breath, if SHI record is not present, LMR can initiate iterative query to RMR (root Mapping Resolution device, Root Map Resolver),
Local Mapping Resolution device by root Mapping Resolution device, TMR (top level map resolver, Top-level Map Resolver) and
It is parsed after the iterative query three times of AMR (permissions mapping resolver, Authoritative Map Resolver) from permissions mapping
Device obtains the binding information of the SHI of the inquiry of access authentication server 102, i.e. SHI-Public Key-RLOC is (with SHI binding
Public key).After access authentication server 102 sends data packets to local terminal couple in router 201, local terminal couple in router 201
The address RLOC of the SHI binding of distant terminal host 103 is obtained, then local terminal couple in router 201 is using the RLOC of oneself as source
Address, using the RLOC of opposite end couple in router 202 as purpose address encapsulated message.Opposite end couple in router 202 receives data
Message is decapsulated after packet, then sends distant terminal host 103 for message.
In access net 20 access authentication server 102 to verify the end host of access and not to be forge and pretend to be it is specific can
To be accomplished in that message X is obtained very short message digest H1 after operation of making a summary by local terminal end host 101,
D operation, i.e. digital signature are carried out to H1 with the private key of oneself again.After obtaining signature D (H1), it is attached to behind message X and is sent out
It sees off, access authentication server 102 is received and signature D (H1) separated with message X first after message, then with local terminal end host
101 public key carries out E operation to D (H1), obtains message digest H1, then carry out abstract operation to message X, obtains message digest
H2.If H1 is equal to H2, access authentication server 102 can conclude that the message received is true;Otherwise it is not just.
As an optional embodiment of the embodiment of the present invention, access authentication server 102 is also used in reception and source
After the binding information of security host identifier binding, the binding information bound with source security host identifier is stored in local
In mapped cache table.Specifically, it after each inquiry request of access authentication server 102 obtains response, can will be taken in response message
The binding information of band is stored in local mapped cache table, to facilitate subsequent be employed without to go to inquire again, improves processing effect
Rate.
As an optional embodiment of the embodiment of the present invention, also it is stored in local mapped cache table main safely with source
The cache-time length of the binding information of machine identifier binding;Access authentication server, be also used to cache-time length then
Afterwards, the binding information with the binding of source security host identifier is deleted.Specifically, in the caching record of local mapped cache table storage
TTL (Time-To-Live) value, the i.e. time span of binding information caching can be set, to guarantee in a timing
In while improve efficiency, beyond needing to reacquire binding information in the time to improve safety.
As an optional embodiment of the embodiment of the present invention, source security host identifier and purpose security host mark
Symbol is named according to preset structure.Specifically, security host identifier provided in an embodiment of the present invention, which can use, layer
The host identification nomenclature scheme of secondary structure is named, and thereby may be ensured that the global uniqueness and polymerism of SHI.
As an optional embodiment of the embodiment of the present invention, root Mapping Resolution device 204, top level map resolver 205
And permissions mapping resolver 206 forms tree-shaped topological structure.The iterative query from top under can guarantee each time as a result,
Mapping Resolution is all most short searching route, can both guarantee the global uniqueness and polymerism of SHI in this way, and also can control each
The mapping table scale of layer Mapping Resolution device.
As an optional embodiment of the embodiment of the present invention, root Mapping Resolution device 204, top level map resolver 205
And permissions mapping resolver 206 forms the topological structure of decentralization.Since the renewal frequency of mapping relations is mainly by terminal
The mobile influence with reachable state of position of host machine, the present invention can quickly be rung by the tree-shaped Mapping Resolution system of the level established
Registration, update, inquiry and the removal request of mapping relations are answered, the renewal frequency of mapping relations and the traffic of update message will not
As the performance bottleneck of each layer Mapping Resolution device, because the maintenance of mapping relations is that state is convergent, map locating postpones and reflects
The state scale of penetrating is controllable.
Specifically, such as SHI name topology example is as follows: facility.scheme.bistu.edu.cn, parsing
Steps are as follows for the iterative query of the mapping relations of facility.scheme.bistu.edu.cn:
A, local Mapping Resolution device analyzes full name, determines the server for the control that needs to have authoritative weight to cn Mapping Resolution utensil
Position, request and obtain response;
B, it requests to inquire cn Mapping Resolution device the reference information for obtaining edu.cn server;
C, it requests to inquire edu.cn Mapping Resolution device the reference information for obtaining bistu.edu.cn server;
D, bistu.edu.cn Mapping Resolution device is requested, the reference letter of the server of scheme.bistu.edu.cn is obtained
Breath;
E, scheme.bistu.edu.cn Mapping Resolution device is requested, facility.scheme.bistu.edu.cn is obtained
Binding information response.
As an optional embodiment of the embodiment of the present invention, access authentication server 102 is also used to pending in reception
It is main safely to source using hash algorithm before data to be forwarded packet is sent to local terminal couple in router 201 after sending data packet
Machine identifier and purpose security host identifier carry out operation, obtain source security host identification (RFID) tag and purpose security host mark
Label, by the source security host mark in source security host identification (RFID) tag and purpose security host identification (RFID) tag replacement data packet original text
Know symbol and purpose security host identifier.Due to security host identifier SHI be it is globally unique, in order to increase in backbone network 20
The privacy of source host identifier in the data packet of transmission, it is contemplated that being used in access authentication server 102 in specific implementation
Hash algorithm generates SHIT (security host identification (RFID) tag, the Secure of regular length to the security host identifier of random length
Host Identifier Tag), the source host identifier in raw data packets is then replaced with into the cryptographic Hash.
Fig. 2 shows a kind of security terminal marks and authentication method based on STiP model provided in an embodiment of the present invention
Flow chart, the security terminal mark and authentication method provided in an embodiment of the present invention based on STiP model are applied to above system,
Only the security terminal mark to provided in an embodiment of the present invention based on STiP model and authentication method are briefly described below,
His unaccomplished matter, referring specifically to the related description of above system.Referring to fig. 2, provided in an embodiment of the present invention to be based on STiP model
Security terminal mark and authentication method include:
S201, local terminal end host will include active security host identifier and purpose using the private key of local terminal end host
The data packet original text of security host identifier is signed, and data packet to be sent is obtained, and data packet to be sent is sent to access
Certificate server, wherein data packet to be sent includes data packet original text and signature, and source security host identifier is local terminal terminal
The unique identification of host, purpose security host identifier are the unique identification of distant terminal host;
S202, access authentication server receive data packet to be sent, do not find in local mapped cache table and pacify with source
In the case where the binding information of full hostid binding, inquiry and source security host identifier are sent to local Mapping Resolution device
The request of the binding information of binding, wherein include at least source security host with the binding information of source security host identifier binding
Identifier, the routing with the public key of source security host identifier binding and the local terminal couple in router of local terminal end host access
Station location marker;
S203, the request of local Mapping Resolution device parsing inquiry and the binding information of source security host identifier binding,
The binding information of local search and the binding of source security host identifier, does not find and source security host in local Mapping Resolution device
In the case where the binding information of identifier binding, successively to root Mapping Resolution device, top level map resolver and permissions mapping solution
Parser makes iterative queries into, and the binding information bound with source security host identifier is obtained from permissions mapping resolver, and will
Access authentication server is sent to the binding information of source security host identifier binding;
S204, access authentication server receive with source security host identifier binding binding information, using with source safety
Data to be forwarded packet is sent to this if upchecking by the true and false of the public key verifications data packet to be sent of hostid binding
Hold couple in router, wherein data to be forwarded packet includes at least data packet original text;
S205, local terminal couple in router receive data to be forwarded packet, do not find in local mapped cache table and purpose
In the case where the binding information of security host identifier binding, inquiry and purpose security host mark are sent to local Mapping Resolution device
Know the request of the binding information of symbol binding, wherein include at least purpose with the binding information of purpose security host identifier binding
Security host identifier, the opposite end access road with the public key of purpose security host identifier binding and the access of distant terminal host
It is identified by the route location of device;
S206, the request of local Mapping Resolution device parsing inquiry and the binding information of purpose security host identifier binding,
In local search and the binding information with the binding of purpose security host identifier, do not found and purpose in local Mapping Resolution device
In the case where the binding information of security host identifier binding, successively to root Mapping Resolution device, top level map resolver and power
Limit Mapping Resolution device makes iterative queries into, and the binding bound with purpose security host identifier is obtained from permissions mapping resolver
Information, and the binding information bound with purpose security host identifier is sent to local terminal couple in router;
S207, local terminal couple in router identifies source route location and purpose route location mark is encapsulated into number to be forwarded
According to packet, the data to be forwarded packet after encapsulation is sent to opposite end couple in router, wherein source route location is identified as local terminal access
The route location of router identifies, and purpose route location is identified as the route location mark of opposite end couple in router;
S208, opposite end couple in router receive encapsulation after data to be forwarded packet, by the data to be forwarded packet after encapsulation into
Row decapsulation, obtains data to be forwarded packet, and data to be forwarded packet is sent to distant terminal host.
It can be seen that the security terminal mark and authentication method based on STiP model provided through the embodiment of the present invention,
The network security problems such as source address spoofing, identity security can be solved from source, to be conducive to the autonomous controllable, safety of building
Believable internet environment.
As an optional embodiment of the embodiment of the present invention, access authentication server is received to be identified with source security host
After the binding information for according with binding, method further include: the binding that access authentication server will be bound with source security host identifier
Information preservation is in local mapped cache table.It specifically, can be by sound after each inquiry request of access authentication server obtains response
The binding information carried in message is answered to be stored in local mapped cache table, to facilitate subsequent be employed without to go to inquire again,
Improve treatment effeciency.
As an optional embodiment of the embodiment of the present invention, also it is stored in local mapped cache table main safely with source
The cache-time length of the binding information of machine identifier binding;Method further include: access authentication server is in cache-time length
After then, the binding information with the binding of source security host identifier is deleted.Specifically, in the caching of local mapped cache table storage
TTL (Time-To-Live) value, the i.e. time span of binding information caching, to guarantee one can be set in record
While improving efficiency in fixing time, need to reacquire binding information exceeding in the time to improve safety.
As an optional embodiment of the embodiment of the present invention, source security host identifier and purpose security host mark
Symbol is named according to preset structure.Specifically, security host identifier provided in an embodiment of the present invention, which can use, layer
The host identification nomenclature scheme of secondary structure is named, and thereby may be ensured that the global uniqueness and polymerism of SHI.
As an optional embodiment of the embodiment of the present invention, root Mapping Resolution device, top level map resolver and power
Limit Mapping Resolution device forms tree-shaped topological structure.The iterative query from top under can guarantee Mapping Resolution each time as a result,
All it is most short searching route, can have both guaranteed the global uniqueness and polymerism of SHI in this way, also can control each layer of mapping solution
The mapping table scale of parser.
As an optional embodiment of the embodiment of the present invention, root Mapping Resolution device, top level map resolver and power
Limit the topological structure of Mapping Resolution device composition decentralization.Since the renewal frequency of mapping relations is mainly moved by end host position
Dynamic and reachable state influence, the present invention can be with quick response mapping relations by the tree-shaped Mapping Resolution system of the level established
Registration, update, inquiry and removal request, the traffic of the renewal frequencies of mapping relations and update message will not become each layer and reflect
The performance bottleneck of radiolysis parser, because the maintenance of mapping relations is that state is convergent, map locating delay and mapping status scale
It is controllable.
As an optional embodiment of the embodiment of the present invention, access authentication server receive data packet to be sent it
Afterwards, before data to be forwarded packet being sent to local terminal couple in router, method further include: access authentication server is calculated using Hash
Method carries out operation to source security host identifier and purpose security host identifier, obtains source security host identification (RFID) tag and purpose
Security host identification (RFID) tag, will be in source security host identification (RFID) tag and purpose security host identification (RFID) tag replacement data packet original text
Source security host identifier and purpose security host identifier.Due to security host identifier SHI be it is globally unique, in order to increase
Add the privacy of source host identifier in the data packet transmitted in backbone network 20, can be considered in specific implementation and taken in access authentication
Being engaged in, SHIT of the device 102 using hash algorithm to the security host identifier generation regular length of random length (mark by security host mark
Label, Secure Host Identifier Tag), the source host identifier in raw data packets is then replaced with into the Hash
Value.
Any process described otherwise above or method description are construed as in flow chart or herein, and expression includes
It is one or more for realizing specific logical function or process the step of executable instruction code module, segment or portion
Point, and the range of the preferred embodiment of the present invention includes other realization, wherein can not press shown or discussed suitable
Sequence, including according to related function by it is basic simultaneously in the way of or in the opposite order, Lai Zhihang function, this should be of the invention
Embodiment person of ordinary skill in the field understood.
Those skilled in the art are understood that realize all or part of step that above-described embodiment method carries
It suddenly is that relevant hardware can be instructed to complete by program, the program can store in a kind of computer-readable storage medium
In matter, which when being executed, includes the steps that one or a combination set of embodiment of the method.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show
The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example
Point is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are not
Centainly refer to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be any
One or more embodiment or examples in can be combined in any suitable manner.
Above embodiment is only that preferred embodiments of the present invention will be described, is not carried out to the scope of the present invention
It limits, without departing from the spirit of the design of the present invention, this field ordinary engineering and technical personnel is to technical solution of the present invention
The various changes and improvements made, should fall within the scope of protection determined by the claims of the present invention.