Dual-protocol based VPN implementing method
An implementation method and dual-protocol technology, applied in the field of information security, can solve problems such as poor security, slow speed, and low function integration, and achieve the effect of avoiding major security risks, improving security and speed, and reducing forwarding and calling links
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0026] The following describes the implementation steps of the VPN protocol in conjunction with the accompanying drawings:
[0027] Figure 1: Explain the process of establishing VPN dual protocol:
[0028] The first step is to preset parameters and network keys: preset communication protocol, network key, and key length parameters;
[0029] The second step is to establish an IPSec standard encryption tunnel, namely: VPN standard protocol (omitted);
[0030] The third step is to establish a dedicated encryption tunnel (ie: VPN dedicated protocol): negotiate and exchange encryption tunnel parameters, such as the user name, protocol type, encryption algorithm, key length, public key algorithm length, encryption tunnel retention period, Encrypted tunnel timeout reconnection, time stamp;
[0031] The fourth step, identity verification and key exchange stage: use the negotiated encryption algorithm, pre-shared key, public key, hash function and digital signature to achieve user identity...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap