Dual-protocol based VPN implementing method

An implementation method and dual-protocol technology, applied in the field of information security, can solve problems such as poor security, slow speed, and low function integration, and achieve the effect of avoiding major security risks, improving security and speed, and reducing forwarding and calling links

Inactive Publication Date: 2008-05-14
胡祥义
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, there are many VPN products using the IPSec protocol in the world, and most of them have the following weaknesses: low function integration, slow speed, high price, poor security, and insufficient ability to resist group attacks. At the same time, the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dual-protocol based VPN implementing method
  • Dual-protocol based VPN implementing method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0026] The following describes the implementation steps of the VPN protocol in conjunction with the accompanying drawings:

[0027] Figure 1: Explain the process of establishing VPN dual protocol:

[0028] The first step is to preset parameters and network keys: preset communication protocol, network key, and key length parameters;

[0029] The second step is to establish an IPSec standard encryption tunnel, namely: VPN standard protocol (omitted);

[0030] The third step is to establish a dedicated encryption tunnel (ie: VPN dedicated protocol): negotiate and exchange encryption tunnel parameters, such as the user name, protocol type, encryption algorithm, key length, public key algorithm length, encryption tunnel retention period, Encrypted tunnel timeout reconnection, time stamp;

[0031] The fourth step, identity verification and key exchange stage: use the negotiated encryption algorithm, pre-shared key, public key, hash function and digital signature to achieve user identity...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for realizing a dual protocol-based VPN, which is based on a code, an integrated circuit board of an industrial computer, a chip and network technique. The design concept of a special operation system of a microkernel is used for establishing an encryption system with a plurality of key systems; the method of pre-sharing the key is adopted to share the key secretly under the protection of encryption algorithm; each IP data packet has a key to establish standard encryption channel of IPSec and select an IP level (a third level) to establish a special encryption channel; the encryption channels are used for managing all the remote VPN gateways, establishing the function of auditing and logging and integrating the main safety function modules such as encryption algorithm, key management, a VPN standard protocol, a VPN special protocol, management tools and the function of auditing and logging into a whole; at the same time, the self-destruction function of a VPN functional module driven by a hardware is realized; thereby, a virtual special network based on the dual protocol is established.

Description

Technical field: [0001] The invention relates to the field of information security, can encrypt and decrypt the data of the private network in real time, and is applicable to various networks of government, enterprise, army, bank, securities, insurance and other units. Background technique: [0002] At present, there are many VPN products using the IPSec protocol in the world, and most of them have the following weaknesses: low function integration, slow speed, high price, poor security, and insufficient ability to resist group attacks. At the same time, there are also weaknesses in the use of VPN. The low efficiency of the general-purpose operating system, the high cost of distribution and management of various keys, and the difficulty of daily maintenance of the system have directly affected the application and popularization of VPNs. Invention content: [0003] The present invention adopts cipher, industrial computer board card, chip and network technology, sets up the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/46H04L29/06
Inventor 胡祥义
Owner 胡祥义
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products