Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Address renewing method based on network key exchange protocol

A technology of address update and network key, applied in the field of virtual private network and network, to prevent bombing and ensure physical reachability

Inactive Publication Date: 2009-10-28
徐州永威木业有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0029] The purpose of the present invention is to provide an address update method based on the network key exchange protocol, which solves the problem of address update based on the network key exchange protocol, and simultaneously returns the public address (applied to NAT scenarios, referring to data packets being IP address modified by NAT

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Address renewing method based on network key exchange protocol
  • Address renewing method based on network key exchange protocol

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach

[0044] The present invention provides an address updating method based on the network key exchange protocol. The hosts at the starting end and the responding end need to maintain a binding address list of private addresses and public addresses. The private address is the IP address of the originating host itself. This IP address may be a private address in a certain subnet, which is used to identify the security association; the public address is the address that is changed after the data packet passes through NAT. The public address is the real address on the Internet. NAT traversal can be completed by adding the IP address of the transport layer port number to the IP address. The bind address list is divided into two parts:

[0045] One part is the start-end host binding address list, and the list entries are the start-end host's private IP address and its public address. When the originating host obtains a new private IP address (if there is no NAT, it obtains a new public...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to network technology. In order to solve the address update problem of IKEv2, an address update method based on the network key exchange protocol is provided, and a private address and a public address of the initial host are bound to the initial host and the responder host. Address list, when the originating host obtains a new private address or public address, it will create a new entry in the address list of the host at the end, and request to update the address list of the responding host, and the responding end will return confirmation update information to complete the address update. It ensures the physical reachability of the update address and prevents "third-party bombing" and "transparent pseudo-NAT attack".

Description

technical field [0001] The present invention relates to network technology, in particular to a virtual private network (VPN), specifically an address update method based on a network key exchange protocol. Background technique [0002] With the continuous development of the Internet, due to its convenience and speed, many large companies, government departments or civil organizations use it to transmit data. The various departments of these units are often inter-regional and far apart. If all use their own dedicated lines , which is very expensive. So using a public network like the Internet to transmit private data can save a lot of money. But the consequence of this is that it is very insecure. On the Internet, data may be stolen or modified by malicious network intruders at any time. Therefore, data must be encrypted during transmission, and the receiver and sender pass through a virtual secure Tunnel to transmit information, this is virtual private network technology. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/24
Inventor 苗福友张宏科张思东杨申苏伟任彦杨贺郑祖周陈建王江林郜帅秦亚娟刘颖
Owner 徐州永威木业有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products