[go: up one dir, main page]

CN110247894B - A method and device for identifying counterfeit handle servers - Google Patents

A method and device for identifying counterfeit handle servers Download PDF

Info

Publication number
CN110247894B
CN110247894B CN201910407635.6A CN201910407635A CN110247894B CN 110247894 B CN110247894 B CN 110247894B CN 201910407635 A CN201910407635 A CN 201910407635A CN 110247894 B CN110247894 B CN 110247894B
Authority
CN
China
Prior art keywords
handle
hash value
target
service information
home service
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910407635.6A
Other languages
Chinese (zh)
Other versions
CN110247894A (en
Inventor
史可
贾雪琴
邢宇龙
胡云
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201910407635.6A priority Critical patent/CN110247894B/en
Publication of CN110247894A publication Critical patent/CN110247894A/en
Application granted granted Critical
Publication of CN110247894B publication Critical patent/CN110247894B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention provides a method and a device for identifying a fake handle server, relates to the technical field of Internet, and can ensure that the handle server is not tampered in the analysis process of a handle system identifier. The method comprises the following steps: acquiring a target handle code analysis request sent by a client; if the target handle code analysis request comprises the security request, acquiring a second hash value corresponding to a first hash value of the target handle code stored on the block chain after hash conversion; matching target home service information according to the target handle code; performing hash transformation on the target home service information to obtain a third hash value; and if the second hash value is determined to be the same as the third hash value, determining that the handle server is not forged. The embodiment of the application is applied to the analysis of the handle system identification.

Description

Method and device for identifying fake handle server
Technical Field
The embodiment of the invention relates to the technical field of Internet, in particular to a method and a device for identifying a fake handle server.
Background
The Handle system is used as a universal name service system, can provide basic services such as permanent identification, dynamic link, safety management and the like for digital objects in a network, and has a wider application prospect with the development of the internet and the rise of new technologies such as the internet of things and the like in recent years.
The security of the Handle system depends on the security of the client and the Handle server. When doing business, the handle system and the client usually trust each other completely. The integrity of the handle system depends to a large extent on the integrity of the information of the global service, including the local handle service under which the home service is included. Not only can invalid global service information mislead the client to use an inappropriate local handle service, but the invalid global service information also allows an attacker to forge the handle server signature. In addition, for efficiency, the handle server will generate or return a digital signature for the home service response only if specifically required by the client, and the client must explicitly require the handle server to return a digital signature in order to ensure the integrity of the data, in which case the client may require the handle server to encrypt any data using a session key after establishing a communication session with the handle server in order to protect sensitive data from disclosure.
Therefore, the security of the existing handle system depends strongly on the security of the handle server and the security of the client during each interaction between the handle server and the client. For efficiency, if the request of the client to return the digital signature is not received, the handle server does not generate or return the digital signature for each home service response, and the client must explicitly request the handle server to return the digital signature in order to ensure the integrity of the data. When data is sensitive, although the key is used again by the handle server after the client and the handle server establish a session, the client explicitly requires the handle system to return a digital signature, and invalid global service information allows an attacker to forge the server signature, so that the existing handle system has a vulnerability in overall security.
Disclosure of Invention
Embodiments of the present invention provide a method and an apparatus for identifying a fake handle server, which can ensure that the handle server is not tampered during the analysis process of a handle system identifier.
In a first aspect, a method for identifying a fake handle server is provided, which includes the following steps: acquiring a target handle code analysis request sent by a client, wherein the target handle code analysis request comprises a target handle code; if the target handle code analysis request comprises the security request, acquiring a second hash value corresponding to a first hash value of the target handle code stored on the block chain after hash conversion, wherein the second hash value is a hash value of home service information matched with the target handle code and pre-stored on the block chain; matching target home service information according to the target handle code; performing hash transformation on the target home service information to obtain a third hash value; and if the second hash value is the same as the third hash value, determining that the handle server is not forged, wherein the target home service information is used for indicating the client to select the handle server.
In the scheme, a target handle code analysis request sent by a client is obtained, wherein the target handle code analysis request comprises a target handle code; if the target handle code analysis request comprises the security request, acquiring a second hash value corresponding to a first hash value of the target handle code stored on the block chain after hash conversion, wherein the second hash value is a hash value of home service information matched with the target handle code and pre-stored on the block chain; matching target home service information according to the target handle code; performing hash transformation on the target home service information to obtain a third hash value; and if the second hash value is determined to be the same as the third hash value, determining that the handle server is not forged. The method and the device have the advantages that the Hash transformation and the block chain storage are combined to be used for judging whether the handle server is forged or not, when the second Hash value of the home service information which is stored in the block chain and matched with the target handle code is identical to the third Hash value of the target home service information which is matched with the target handle code and needs to be analyzed by the client, the fact that the handle server is not forged is determined, when data are sensitive, whether the handle server is correct or not can be automatically identified, and the fact that the strength of the handle server and the safety of the client depend on the strength of the handle server in the analyzing process of the handle system identification in the prior art is avoided.
In a second aspect, an apparatus for identifying a counterfeit handle server is provided, including: the system comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring a target handle code analysis request sent by a client, and the target handle code analysis request comprises a target handle code; the obtaining module is further configured to obtain a second hash value corresponding to the first hash value after hash conversion is performed on the target handle code stored in the block chain if it is determined that the target handle code analysis request includes the secret request, where the second hash value is a hash value of home service information matched with the target handle code and pre-stored in the block chain; the matching module is used for matching the target home service information according to the target handle code acquired by the acquisition module; the processing module is used for carrying out hash transformation on the target home service information matched by the matching module to obtain a third hash value; and the determining module is used for determining that the handle server is not forged if the second hash value acquired by the acquiring module is the same as the third hash value acquired by the processing module, wherein the target home service information is used for indicating the client to select the handle server.
In a third aspect, an apparatus for identifying a fake handle server is provided, including a communication interface, a processor, a memory, and a bus; the memory is used for storing computer-executable instructions, the processor is connected with the memory through the bus, and when the device for identifying the fake handle server runs, the processor executes the computer-executable instructions stored in the memory so as to enable the device for identifying the fake handle server to execute the method for identifying the fake handle server according to the first aspect.
In a fourth aspect, there is provided a computer storage medium comprising instructions which, when executed on a computer, cause the computer to perform the method of identifying a fake handle server as described above.
In a fifth aspect, a computer program product is provided, the computer program product comprising instruction code for performing the method of identifying a fake handle server as described above.
It can be understood that any one of the above-mentioned apparatuses, computer storage media, or computer program products for identifying a counterfeit handle server is used to execute the method according to the first aspect, and therefore, the beneficial effects that can be achieved by the apparatuses, the computer storage media, or the computer program products refer to the beneficial effects of the method according to the first aspect and the corresponding solutions in the following detailed description, and are not described herein again.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a schematic diagram of a handle system architecture according to an embodiment of the present invention;
fig. 2 is a schematic diagram of a method for identifying a counterfeit handle server according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of an apparatus for identifying a counterfeit handle server according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of an apparatus for identifying a counterfeit handle server according to another embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The Handle system adopts a distributed management architecture to realize distributed management of each data storage system. Under the distributed management architecture of the Handle system, a service platform can be built at low cost and quickly, and the service platform is simply and quickly butted with different systems, supports various applications and provides services for the applications. Referring to fig. 1, the top layer is composed of a global service, where the global service is called a Global Handle Registry (GHR). The lower layer is composed of all local handle services such as local handle service 1 (LHS) and local handle service 2, where each local handle service has its own sub-name space, for example, local handle service 1 has sub-name space 1, and local handle service 2 has sub-name space 2. A local handle service consists of two parts: naming authority (naming authority), called home service, also called prefix; and the unique handle under the naming authority, called suffix, i.e. handle code in the present application, for example, local handle service 1 owns home service 11 and home service 12 under sub-name space 1, where the unique handle1 under home service 11 and the unique handle2 under home service 12 correspond; the local handle service 2 has a home service 21 and a home service 22 under the sub-name space 2, wherein the home service 21 corresponds to a unique handle3 under the home service 21, and the home service 22 corresponds to a unique handle4 under the home service 22.
Based on the distributed service system architecture of the handle system, the sub-name space of any local handle service can be provided with the service by the corresponding local handle service, the global service or both. The global service may be used to send any handle service request to the responsible local handle service. The distributed service architecture of the Handle system allows any given Handle service to be replicated to service sites under multiple home services, each of which may further distribute it to a single cluster of Handle servers. The local handle service provides the handle with the only service of the parsing and management service under the home service, so before the handle is parsed, the client must determine the home service of the handle. The home service of each handle is registered with the global handle registry. The client can find the home service of each handle by querying the naming authority handle at the global handle registry. The client sends a handle analysis request to the global handle registration center; the method comprises the steps that a global handle registry inquires a home service according to a handle analysis request, and returns service information of the home service, namely home service information, to a client, wherein the home service information lists service sites of the given home service and interfaces of each handle server in each service site; the client selects a service site from the service information, finds a responsible handle server in the site, and sends a handle analysis request to the handle server. For example, the handle code to be resolved is "ncstrl. The client needs to know the home service of "ncstrl. The home service can be obtained by the handle system querying the naming authority handle "0. NA/ncstrl.vatech _ cs" at GHR. The handle system will return the home service information according to the home service. From the home service information, the client can select a service site, find a responsible handle server in the service site, and send the parsing request to the handle server.
Based on the handle system architecture and the method for querying the handle server in the global handle registration center by the client, the application provides a method for identifying a fake handle server, which is shown in fig. 2 and specifically comprises the following steps:
201. and acquiring a target handle code analysis request sent by the client.
Firstly, since the analysis and management of the target handle code is provided by the home service, which is also the only provider, the home service information lists the service sites of the given home service and the interfaces of each handle server in each service site, the client selects one service site from the service information, finds the responsible handle server in the site, and sends a handle analysis request to the handle server, so that the client needs to determine the home service information before analyzing the target handle code.
Therefore, it is preferable that the home service information is matched to the target handle code when the target handle code is used for the first time after the application. That is, when the handle system acquires the target handle code for the first time, the home service is inquired for the target handle code in the global handle registration center, and the home service information is acquired.
Further, hash transformation (hash) is carried out on the target handle code to obtain a first hash value, at the moment, the globally unique target handle code is hashed to generate a string of 256-bit strings which cannot be reversely cracked in the prior art, namely the first hash value.
Further, hash transformation is carried out on the home service information, and a second hash value is obtained. The method comprises the following steps: and if the survival time of the home service information is determined to be overtime, matching new home service information for the target handle code again, and performing hash transformation on the new home service information to obtain a second hash value. For example, if the survival time of the home service information is 24 hours, after the home service information survives for 24 hours, the handle system queries and matches a new home service for the target handle code in the global handle registration center again, and then hashes the service information of the home service to obtain a second hash value.
Further, the first hash value and the second hash value are correlated to generate a correlation result.
Preferably, the first hash value and the second hash value may be associated in a form of a conventional database table to generate an association table. Of course, the association key-value pair may also be generated by associating the first hash value with the second hash value in json's key-value pair format.
Further, the correlation result is stored in the block chain.
Secondly, when the client needs to analyze the target handle code, sending a target handle code analysis request to the handle system, and acquiring the target handle code analysis request sent by the client by the handle system, wherein the target handle code analysis request comprises the target handle code.
202. And if the target handle code analysis request comprises the security request, acquiring a second hash value corresponding to the first hash value after the hash conversion is carried out on the target handle code stored on the block chain.
The second hash value is a hash value of the home service information that is pre-stored on the block chain and matched with the target handle code, that is, the second hash value in step 201.
203. And matching the target home service information according to the target handle code.
Specifically, the handle system queries the target home service in the global handle registration center according to the target handle code, and acquires the target home service information.
204. And carrying out hash transformation on the target home service information to obtain a third hash value.
205. And if the second hash value is determined to be the same as the third hash value, determining that the handle server is not forged.
Specifically, the second hash value is a hash value of home service information which is prestored in the block chain and matched with the target handle code, and the third hash value is a hash value of target home service information which is sent by the client and matched with the target handle code most recently; since the home service information is matched with the same target home code twice, if the second hash value of the home service information is the same as the third hash value of the target home service information, it can be determined that the service site carried in the target home service information and the interface of the server are not modified, that is, the home server is not forged.
And the target home service information is used for indicating the client to select a handle server.
Specifically, the target home service information may list the service sites of a given target home service, as well as the interface of each handle server in each service site. And the handle system feeds the target home service information back to the client, the client selects a service site from the service information, finds a responsible handle server in the site, and sends a handle analysis request to the handle server.
Further, in the application, the information and the service which have the globally unique identifier in the home service may also be associated with the hash value of the target handle code.
In the scheme, a target handle code analysis request sent by a client is obtained, wherein the target handle code analysis request comprises a target handle code; if the target handle code analysis request comprises the security request, acquiring a second hash value corresponding to a first hash value of the target handle code stored on the block chain after hash conversion, wherein the second hash value is a hash value of home service information matched with the target handle code and pre-stored on the block chain; matching target home service information according to the target handle code; performing hash transformation on the target home service information to obtain a third hash value; and if the second hash value is determined to be the same as the third hash value, determining that the handle server is not forged. The method and the device have the advantages that the Hash transformation and the block chain storage are combined to be used for judging whether the handle server is forged or not, when the second Hash value of the home service information which is stored in the block chain and matched with the target handle code is identical to the third Hash value of the target home service information which is matched with the target handle code and needs to be analyzed by the client, the fact that the handle server is not forged is determined, when data are sensitive, whether the handle server is correct or not can be automatically identified, and the fact that the strength of the handle server and the safety of the client depend on the strength of the handle server in the analyzing process of the handle system identification in the prior art is avoided.
In the embodiment of the present invention, the functional modules of the device for identifying a counterfeit handle server may be divided according to the method embodiment, for example, each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. It should be noted that, the division of the modules in the embodiment of the present invention is schematic, and is only a logic function division, and there may be another division manner in actual implementation.
Fig. 3 shows a schematic diagram of a possible structure of the apparatus for identifying a counterfeit handle server in the above embodiment, in the case of dividing each functional module according to each function. The method for identifying a fake handle server is implemented, wherein the device for identifying the fake handle server is applied to a handle system. Specifically, the method comprises the following steps:
the obtaining module 31 is configured to obtain a target handle code analysis request sent by a client, where the target handle code analysis request includes a target handle code; the obtaining module 31 is further configured to obtain a second hash value corresponding to a first hash value after hash conversion is performed on the target handle code stored in the block chain if it is determined that the target handle code analysis request includes a secret request, where the second hash value is a hash value of home service information matched with the target handle code and pre-stored in the block chain; the matching module 32 is configured to match the target home service information according to the target handle code acquired by the acquisition module 31; the processing module 33 is configured to perform hash transformation on the target home service information matched by the matching module 32 to obtain a third hash value; a determining module 34, configured to determine that the handle server is not forged if it is determined that the second hash value obtained by the obtaining module 31 is the same as the third hash value obtained by the processing module 33, where the target home service information is used to indicate that the client selects the handle server.
Optionally, the obtaining module 31 is further configured to obtain the target handle code; the matching module 32 is further configured to match home service information for the target handle code; the processing module 33 is further configured to perform hash transformation on the target handle code to obtain a first hash value; the processing module 33 is further configured to perform hash transformation on the home service information to obtain a second hash value; an association module 35, configured to associate the first hash value with the second hash value, and generate an association result; the processing module 33 is further configured to store the association result into a block chain.
Optionally, the associating module 35 is specifically configured to associate the first hash value with the second hash value in a form of a conventional database table, so as to generate an association table.
Optionally, the associating module 35 is specifically configured to associate the first hash value with the second hash value in a json key value pair manner, so as to generate an associated key value pair.
Optionally, the matching module 32 is further configured to match new home service information for the target handle code again if it is determined that the life time of the home service information is overtime; the processing module 33 is further configured to perform hash transformation on the new home service information to obtain a second hash value.
In the case of an integrated module, the means for identifying a spoofed handle server comprises: the device comprises a storage unit, a processing unit and an interface unit. The processing unit is used for controlling and managing the action of the device for identifying the fake handle server. And the interface unit is used for identifying the information interaction between the device of the fake handle server and other equipment. And the storage unit is used for storing program codes and data of the device for identifying the fake handle server.
For example, the processing unit is a processor, the storage unit is a memory, and the interface unit is a communication interface. The device for identifying the fake handle server is shown in fig. 4 and comprises a communication interface 401, a processor 402, a memory 403 and a bus 404, wherein the communication interface 401 and the processor 402 are connected with the memory 403 through the bus 404.
Processor 402 may be a general-purpose Central Processing Unit (CPU), a microprocessor, an Application-Specific Integrated Circuit (ASIC), or one or more Integrated circuits configured to control the execution of programs in accordance with the teachings of the present disclosure.
The Memory 403 may be a Read-Only Memory (ROM) or other type of static storage device that can store static information and instructions, a Random Access Memory (RAM) or other type of dynamic storage device that can store information and instructions, an Electrically Erasable Programmable Read-Only Memory (EEPROM), a Compact Disc Read-Only Memory (CD-ROM) or other optical Disc storage, optical Disc storage (including Compact Disc, laser Disc, optical Disc, digital versatile Disc, blu-ray Disc, etc.), magnetic disk storage media or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, but is not limited to these. The memory may be self-contained and coupled to the processor via a bus. The memory may also be integral to the processor.
The memory 403 is used for storing application program codes for executing the scheme of the application, and the processor 402 controls the execution. The communication interface 401 is used for information interaction with other devices, for example, information interaction between the apparatus supporting the counterfeit handle server and other devices, for example, data acquisition from other devices or data transmission to other devices. The processor 402 is configured to execute application program code stored in the memory 403 to implement the methods described in the embodiments of the present application.
Further, there is provided a computing storage medium (or media) comprising instructions that when executed perform the method operations performed by the apparatus for identifying a fake handle server in the above embodiments. Additionally, a computer program product is also provided, comprising the above-described computing storage medium (or media).
All relevant contents of each step related to the above method embodiment may be referred to the functional description of the corresponding functional module, and the function thereof is not described herein again.
It should be understood that, in various embodiments of the present invention, the sequence numbers of the above-mentioned processes do not mean the execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation on the implementation process of the embodiments of the present invention.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus, and method may be implemented in other ways. For example, the above-described device embodiments are merely illustrative, and for example, the division of the units is only one logical functional division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U disk, a removable hard disk, a read-only memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (13)

1. A method of identifying a fake handle server, characterized in that,
acquiring a target handle code analysis request sent by a client, wherein the target handle code analysis request comprises a target handle code;
if the target handle code analysis request comprises a secret request, acquiring a second hash value corresponding to a first hash value of the target handle code after hash conversion, wherein the second hash value is a hash value of home service information matched with the target handle code and pre-stored in the block chain, and the home service information is acquired when the target handle code is used for the first time after application;
matching target home service information according to the target handle code;
performing hash transformation on the target home service information to obtain a third hash value, wherein the third hash value is the hash value of the target home service information which is newly matched with a target handle code sent by the client;
and if the second hash value is the same as the third hash value, determining that the handle server is not forged, wherein the target home service information is used for indicating a client to select the handle server.
2. A method for identifying a fake handle server as recited in claim 1, wherein before obtaining the target handle code resolution request sent by the client, the method further comprises:
acquiring the target handle code;
matching home service information for the target handle code;
performing hash transformation on the target handle code to obtain a first hash value;
performing hash transformation on the home service information to obtain a second hash value;
associating the first hash value with the second hash value to generate an association result;
and storing the correlation result into a block chain.
3. A method of identifying a spoofed handle server as in claim 2 wherein associating the first hash value with the second hash value generates an association result comprising:
and associating the first hash value with the second hash value in a traditional database table form to generate an association table.
4. A method of identifying a spoofed handle server as in claim 2 wherein associating the first hash value with the second hash value generates an association result comprising:
and associating the first hash value with the second hash value in a json key value pair mode to generate an associated key value pair.
5. A method of identifying a counterfeit handle server according to claim 2,
if the survival time of the home service information is determined to be overtime, matching new home service information for the target handle code again;
and carrying out hash transformation on the new home service information to obtain a second hash value.
6. An apparatus for identifying a counterfeit handle server, characterized in that,
the system comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring a target handle code analysis request sent by a client, and the target handle code analysis request comprises a target handle code;
the obtaining module is further configured to obtain a second hash value corresponding to a first hash value of the target handle code after hash conversion is performed on the target handle code stored in the block chain if it is determined that the target handle code analysis request includes a secret request, where the second hash value is a hash value of home service information matched with the target handle code and pre-stored in the block chain, and the home service information is obtained when the target handle code is used for the first time after application;
the matching module is used for matching target home service information according to the target handle code acquired by the acquisition module;
the processing module is used for carrying out hash transformation on the target home service information matched by the matching module to obtain a third hash value, wherein the third hash value is the hash value of the target home service information which is newly matched with the target handle code and sent by the client;
and the determining module is used for determining that the handle server is not forged if the second hash value acquired by the acquiring module is the same as the third hash value acquired by the processing module, wherein the target home service information is used for indicating a client to select the handle server.
7. An arrangement for identifying a counterfeit handle server according to claim 6,
the obtaining module is further configured to obtain the target handle code;
the matching module is also used for matching home service information for the target handle code;
the processing module is further configured to perform hash transformation on the target handle code to obtain a first hash value;
the processing module is further configured to perform hash transformation on the home service information to obtain a second hash value;
the association module is used for associating the first hash value with the second hash value to generate an association result;
the processing module is further configured to store the association result in a block chain.
8. An arrangement for identifying a counterfeit handle server according to claim 7,
the association module is specifically configured to associate the first hash value with the second hash value in a form of a conventional database table, and generate an association table.
9. An arrangement for identifying a counterfeit handle server according to claim 7,
the association module is specifically configured to associate the first hash value with the second hash value in a json key value pair manner, and generate an associated key value pair.
10. An arrangement for identifying a counterfeit handle server according to claim 7,
the matching module is further used for matching new home service information for the target handle code again if the survival time of the home service information is determined to be overtime;
and the processing module is also used for carrying out hash transformation on the new home service information to obtain a second hash value.
11. The device for identifying the fake handle server is characterized by comprising a communication interface, a processor, a memory and a bus; the memory is used for storing computer-executable instructions, the processor is connected with the memory through the bus, and when the device for identifying a counterfeit handle server runs, the processor executes the computer-executable instructions stored in the memory so as to enable the device for identifying a counterfeit handle server to execute the method for identifying a counterfeit handle server according to any one of claims 1 to 5.
12. A computer storage medium comprising instructions that, when executed on a computer, cause the computer to perform the method of identifying a counterfeit handle server according to any of claims 1-5.
13. A computer program product, characterized in that the computer program product comprises instruction code for performing the method of identifying a counterfeit handle server according to any of claims 1-5.
CN201910407635.6A 2019-05-16 2019-05-16 A method and device for identifying counterfeit handle servers Active CN110247894B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910407635.6A CN110247894B (en) 2019-05-16 2019-05-16 A method and device for identifying counterfeit handle servers

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910407635.6A CN110247894B (en) 2019-05-16 2019-05-16 A method and device for identifying counterfeit handle servers

Publications (2)

Publication Number Publication Date
CN110247894A CN110247894A (en) 2019-09-17
CN110247894B true CN110247894B (en) 2021-06-18

Family

ID=67884530

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910407635.6A Active CN110247894B (en) 2019-05-16 2019-05-16 A method and device for identifying counterfeit handle servers

Country Status (1)

Country Link
CN (1) CN110247894B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111082941B (en) * 2019-11-22 2022-12-20 天翼物联科技有限公司 Internet of things data sharing method and system based on block chain technology
CN111209596A (en) * 2020-04-21 2020-05-29 国网电子商务有限公司 Block chain-based industrial internet identification analysis access control method
CN112491855B (en) * 2020-11-19 2023-04-07 中国联合网络通信集团有限公司 Method and device for determining handle identifier analysis state
CN112256706B (en) * 2020-11-19 2023-01-24 中国联合网络通信集团有限公司 Method and device for determining handle reference state
CN112667929B (en) * 2020-12-11 2023-11-03 北京中数创新科技股份有限公司 Prefix and identification data safe pushing method and system based on Handle system
CN112667930B (en) * 2020-12-18 2024-09-06 北京中数创新科技股份有限公司 Prefix aggregation method and system based on Handle system
CN112948876A (en) * 2021-02-26 2021-06-11 中国联合网络通信集团有限公司 Tracing method and device

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2104305A1 (en) * 2008-03-21 2009-09-23 Koninklijke KPN N.V. Call service handling in an IMS-based system
CN103546502A (en) * 2012-07-11 2014-01-29 中国电信股份有限公司 Metadata sharing method and cloud storage server
CN104219232A (en) * 2014-08-26 2014-12-17 浙江大学 Method for controlling file security of block distributed file system
CN105247529A (en) * 2013-04-30 2016-01-13 微软技术许可有限责任公司 Synchronizing credential hashes between directory services
CN107181747A (en) * 2017-05-19 2017-09-19 北京中数创新科技股份有限公司 A kind of Handle resolution systems comprising top mode
CN107197001A (en) * 2017-05-05 2017-09-22 工业和信息化部电信研究院 A kind of industry internet module information method
WO2018125989A3 (en) * 2016-12-30 2018-08-23 Intel Corporation Naming and blockchain recording for the internet of things
CN108462692A (en) * 2018-01-30 2018-08-28 合肥工业大学 A kind of data tamper resistant systems and its method based on block chain
CN109033405A (en) * 2018-08-03 2018-12-18 华为技术有限公司 Safeguard method and apparatus, server and the computer readable storage medium of block chain
CN109714408A (en) * 2018-12-20 2019-05-03 中国科学院沈阳自动化研究所 A kind of semantization industrial network service interface system based on Handle mark

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10355861B2 (en) * 2017-03-28 2019-07-16 Dell Products, Lp Chassis-based cryptographic affinities

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2104305A1 (en) * 2008-03-21 2009-09-23 Koninklijke KPN N.V. Call service handling in an IMS-based system
CN103546502A (en) * 2012-07-11 2014-01-29 中国电信股份有限公司 Metadata sharing method and cloud storage server
CN105247529A (en) * 2013-04-30 2016-01-13 微软技术许可有限责任公司 Synchronizing credential hashes between directory services
CN104219232A (en) * 2014-08-26 2014-12-17 浙江大学 Method for controlling file security of block distributed file system
WO2018125989A3 (en) * 2016-12-30 2018-08-23 Intel Corporation Naming and blockchain recording for the internet of things
CN107197001A (en) * 2017-05-05 2017-09-22 工业和信息化部电信研究院 A kind of industry internet module information method
CN107181747A (en) * 2017-05-19 2017-09-19 北京中数创新科技股份有限公司 A kind of Handle resolution systems comprising top mode
CN108462692A (en) * 2018-01-30 2018-08-28 合肥工业大学 A kind of data tamper resistant systems and its method based on block chain
CN109033405A (en) * 2018-08-03 2018-12-18 华为技术有限公司 Safeguard method and apparatus, server and the computer readable storage medium of block chain
CN109714408A (en) * 2018-12-20 2019-05-03 中国科学院沈阳自动化研究所 A kind of semantization industrial network service interface system based on Handle mark

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Handle System Namespace and Service Definition;Sun,etl al;《IETF RFC 3651》;20031130;第1-41页 *
区块链中的身份识别和访问控制技术研究;张青禾;《中国优秀硕士学位论文全文数据库信息科技辑》;20190131;第1-72页 *

Also Published As

Publication number Publication date
CN110247894A (en) 2019-09-17

Similar Documents

Publication Publication Date Title
CN110247894B (en) A method and device for identifying counterfeit handle servers
US11005779B2 (en) Method of and server for detecting associated web resources
US9544278B2 (en) Using domain name system security extensions in a mixed-mode environment
US20170034136A1 (en) Methods and Systems For Proxying Data
US20060230039A1 (en) Online identity tracking
US20170026401A1 (en) System and method for threat visualization and risk correlation of connected software applications
US20180302427A1 (en) Aggregating asset vulnerabilities
CN103973651A (en) Account password identification setting and inquiring method and device based on salt password bank
RU2012151502A (en) CONTENT REPUTATION SERVICE BASED ON DECLARATION
CN111104579A (en) Identification method and device for public network assets and storage medium
CN111800426A (en) Method, device, equipment and medium for accessing native code interface in application program
CN110958249A (en) Information processing method, information processing device, electronic equipment and storage medium
US20150381558A1 (en) Nsec3 performance in dnssec
US12250230B2 (en) Lateral movement analysis using certificate private keys
CN110232279A (en) A kind of leak detection method and device
CN111597537A (en) Block chain network-based certificate issuing method, related equipment and medium
Jones et al. Oauth 2.0 authorization server metadata
CN111353136B (en) Method and device for processing operation request
CN112202805A (en) Method for trusted network connection, corresponding device, computer equipment and medium
CN108121904A (en) Unlocking method, device, electronic equipment and server
CN111385293B (en) Network risk detection method and device
EP3311555A1 (en) Advanced security for domain names
CN113326506B (en) Applet monitoring method and device
US11444971B2 (en) Method for assessing the quality of network-related indicators of compromise
CN115695371A (en) Domain name registration and domain name resolution method, device, system, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant