Invention Grant
US08856537B2 Method for protecting a telecommunication network and secure router implementing such a method 有权
用于保护电信网络和实现这种方法的安全路由器的方法

  • Patent Title: Method for protecting a telecommunication network and secure router implementing such a method
  • Patent Title (中): 用于保护电信网络和实现这种方法的安全路由器的方法
  • Application No.: US13375127
    Application Date: 2010-04-22
  • Publication No.: US08856537B2
    Publication Date: 2014-10-07
  • Inventor: Haithem El-AbedAntony Martin
  • Applicant: Haithem El-AbedAntony Martin
  • Applicant Address: FR Boulogne-Billancourt
  • Assignee: Alcatel Lucent
  • Current Assignee: Alcatel Lucent
  • Current Assignee Address: FR Boulogne-Billancourt
  • Agency: Carmen Patti Law Group, LLC
  • Priority: FR0953639 20090602
  • International Application: PCT/FR2010/050770 WO 20100422
  • International Announcement: WO2010/139871 WO 20101209
  • Main IPC: H04L9/32
  • IPC: H04L9/32 H04L12/755 H04L12/751
Method for protecting a telecommunication network and secure router implementing such a method
Abstract:
This invention pertains to a method for protecting a telecommunication network comprising at least one secure router (100) equipped with a topology map (103) of that network in order to determine the intermediate routers which constitute an optimal pathway for routing information, said secure router and said intermediate routers generating this topological map by sharing the lists of links (LSA1, LSA2, LSAn) using a communications protocol, characterized in that the secure router (100) performs the following steps: The step (109) of calculating and then saving, when a list of links (LSA1, LSA2, . . . LSAn) is received, at least one receiving fingerprint (hash(LSA1), hash(LSA2), . . . hash(LSAn)) of the lists received (LSA1, LSA2, . . . LSAn), The step (120) of calculating and then saving, when a list of links (LSA′1, LSA′2, . . . LSA′n) is transmitted, at least one sending fingerprint (hash(LSA′1), hash(LSA′2), . . . hash(LSA′n)) of the lists to be transmitted, and The step of comparing the receiving fingerprint (hash(LSA1), hash(LSA2), . . . hash(LSAn)) to the sending fingerprint (hash(LSA′1), hash(LSA′2), . . . hash(LSA′n) such that the sending of a list of links (LSA1, LSA2, LSAn) is inhibited if the receiving fingerprint is different from the sending fingerprint.
Information query
Patent Agency Ranking
0/0