Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for realizing information bypass by using IP Option

A technology for information encapsulation and user identity, applied in transmission systems, digital transmission systems, error prevention/detection using return channels, etc., can solve problems such as message loss, delay, and failure to find NAT entries, etc., and achieve real-time performance Guarantee, the effect of reliability guarantee

Active Publication Date: 2012-05-09
网经科技(苏州)有限公司 +1
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] ②Scheme 2 has very high requirements on the reliability and real-time performance of NAT uploads. In real networks, packet loss and delays are likely to occur, resulting in the situation that the network security device cannot find NAT entries and cannot identify user identities.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing information bypass by using IP Option
  • Method for realizing information bypass by using IP Option
  • Method for realizing information bypass by using IP Option

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The method of using IP Option to realize information transparent transmission, the specific process is: 1) Intercept the first message of each network flow on the gateway; 2) Before the message is forwarded, the private information is encapsulated into IP Option, and the IP header of the message is inserted Tail; 3) Adjust the IP header ihl, tot_len, and recalculate the IP header checksum; 4) Forward the message; 5) At the central node of the network, intercept the message, analyze the first message of each network flow, and get private information, and remove the private information from the message, and then forward the message.

[0028] Wherein, the network flow is uniquely defined by the quintuple, and the quintuple refers to: source IP, destination IP, source port, destination port, and transport layer protocol. Transparently transmit private information by modifying the IP header of forwarded packets. Any private information can be carried, such as source IP, sou...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for realizing information bypass by using IP Option, the process thereof is: 1. incepting a first message of each network flow at a gateway; 2. encapsulating private information into IP Option before transferring the message and inserting into the head and tail part of the message; 3. adjusting ihl and tot_len at the head part of the message, and re-calculating checksum at the head of the message; 4. transferring the message; and 5. intercepting the message at the central node of the network, analyzing the first message of each network flow to obtain the private information, and deleting the private information in the message and then transferring the message. Only the first message of each network flow needs modifying, so the influence on the transfer performance of message transfer is very small, even if the first message needs slicing, the influence on the transfer performance is not large; the private information and the normal message are transferred out together, thus the reliability is guaranteed, if the normal message is lost, the network application can re-transfer the message, and during the re-transfer, the private information can still be passed by.

Description

technical field [0001] The invention relates to a method for carrying private information on a gateway device, in particular to a method for realizing transparent transmission of information by using an IP Option in the gateway device, and belongs to the technical fields of computer network communication and computer network security. Background technique [0002] With the development of the computer security industry and the advancement of enterprise informatization, small and medium-sized enterprises have increasingly strong demands for network security, but the network security business has high requirements for hardware and high costs. A centralized security solution is derived from this, which provides network security guarantees for a group of small and medium-sized enterprises in the network nodes by deploying security devices at the central node of the network, greatly reducing the equipment procurement costs of small and medium-sized enterprises. [0003] One diffic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/56H04L12/66H04L1/00H04L1/18H04L29/06
Inventor 刘继明谢炜
Owner 网经科技(苏州)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products