Invention Grant
US08856537B2 Method for protecting a telecommunication network and secure router implementing such a method
有权
用于保护电信网络和实现这种方法的安全路由器的方法
- Patent Title: Method for protecting a telecommunication network and secure router implementing such a method
- Patent Title (中): 用于保护电信网络和实现这种方法的安全路由器的方法
-
Application No.: US13375127Application Date: 2010-04-22
-
Publication No.: US08856537B2Publication Date: 2014-10-07
- Inventor: Haithem El-Abed , Antony Martin
- Applicant: Haithem El-Abed , Antony Martin
- Applicant Address: FR Boulogne-Billancourt
- Assignee: Alcatel Lucent
- Current Assignee: Alcatel Lucent
- Current Assignee Address: FR Boulogne-Billancourt
- Agency: Carmen Patti Law Group, LLC
- Priority: FR0953639 20090602
- International Application: PCT/FR2010/050770 WO 20100422
- International Announcement: WO2010/139871 WO 20101209
- Main IPC: H04L9/32
- IPC: H04L9/32 ; H04L12/755 ; H04L12/751

Abstract:
This invention pertains to a method for protecting a telecommunication network comprising at least one secure router (100) equipped with a topology map (103) of that network in order to determine the intermediate routers which constitute an optimal pathway for routing information, said secure router and said intermediate routers generating this topological map by sharing the lists of links (LSA1, LSA2, LSAn) using a communications protocol, characterized in that the secure router (100) performs the following steps: The step (109) of calculating and then saving, when a list of links (LSA1, LSA2, . . . LSAn) is received, at least one receiving fingerprint (hash(LSA1), hash(LSA2), . . . hash(LSAn)) of the lists received (LSA1, LSA2, . . . LSAn), The step (120) of calculating and then saving, when a list of links (LSA′1, LSA′2, . . . LSA′n) is transmitted, at least one sending fingerprint (hash(LSA′1), hash(LSA′2), . . . hash(LSA′n)) of the lists to be transmitted, and The step of comparing the receiving fingerprint (hash(LSA1), hash(LSA2), . . . hash(LSAn)) to the sending fingerprint (hash(LSA′1), hash(LSA′2), . . . hash(LSA′n) such that the sending of a list of links (LSA1, LSA2, LSAn) is inhibited if the receiving fingerprint is different from the sending fingerprint.
Public/Granted literature
- US20120102330A1 METHOD FOR PROTECTING A TELECOMMUNICATION NETWORK AND SECURE ROUTER IMPLEMENTING SUCH A METHOD Public/Granted day:2012-04-26
Information query