Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, device and system for securely transmitting and receiving pseudowire network data

A data security and receiving device technology, applied in the field of communication, can solve the problems of inability to realize security protection, non-IP/TCP messages cannot realize encrypted transmission, etc., and achieve the effect of wide application

Active Publication Date: 2013-04-24
HUAWEI TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] For PW transmission technology, IPSec can only protect IP / TCP communication, and cannot implement encrypted transmission for non-IP / TCP packets, and IPSec uses end-to-end processing. If either the sender or the receiver does not support IPSec It is impossible to realize the security protection function

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for securely transmitting and receiving pseudowire network data
  • Method, device and system for securely transmitting and receiving pseudowire network data
  • Method, device and system for securely transmitting and receiving pseudowire network data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] figure 1 It is a flow chart of a method for securely sending data in a pseudowire network provided by an embodiment of the present invention, as shown in figure 1 As shown, the methods described include:

[0027] S101. Receive an original packet sent by a terminal.

[0028] In the embodiment of the present invention, a typical PW network is used to illustrate how to establish a PW network with data security attributes when the PW is established. figure 2 It is a typical PW network structure diagram, such as figure 2 As shown, the terminal 201 establishes a PW connection with the terminal 204 through an attachment link 202 (AC, Attachment Circuit) and an attachment link 203 of another terminal 204 , wherein the AC 202 receives the original message sent by the terminal 201 .

[0029] S102. Perform security processing on the received original message according to the pre-negotiated security attribute to generate a security message. The secure processing of the receiv...

Embodiment 2

[0038] image 3 It is a block diagram of a data security sending device for a pseudowire network provided by an embodiment of the present invention, such as image 3 As shown, the described secure data sending device for a pseudowire network includes an original message receiving unit 301, a security processing unit 302, a pseudowire encapsulating unit 303, and a secure message sending unit 304, wherein:

[0039] The original message receiving unit 301 is configured to receive the original message sent by the terminal.

[0040] In the embodiment of the present invention, combined with figure 2 As shown, the device for securely sending data may be AC202, wherein the original message receiving unit 301 is configured to receive the original message sent by the terminal 201.

[0041] The security processing unit 302 is configured to perform security processing on the received original message according to the pre-negotiated security attributes, and generate a security message. ...

Embodiment 3

[0050] Figure 4 It is a flow chart of a data secure receiving method for a pseudowire network provided by an embodiment of the present invention, as shown in Figure 4 As shown, the methods described include:

[0051] S401. Receive the encapsulated security message through the pre-established pseudowire tunnel.

[0052] In the embodiment of the present invention, before step S401 receiving the encapsulated security message through the pre-established pseudo-wire tunnel, the method may include the step of establishing a pseudo-wire tunnel through negotiation. to combine figure 2 As shown, AC203 and AC202 establish a pseudowire tunnel through negotiation, and then AC203 receives an encapsulated security packet from AC202 through the established pseudowire tunnel.

[0053] S402. Perform pseudowire decapsulation processing on the received encapsulated security message to generate a decapsulated message.

[0054] In the embodiment of the present invention, AC203 performs pseu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a method, device and system for data security transmission / reception in a pseudo-wire (PW) network. The data security transmission method includes: receiving an original message transmitted from a terminal (S201); according to a pre-negotiated security attribute, performing security processing for the received original message to generate a security message (S202); performing a pseudo-wire encapsulation processing for the generated security message to generate an encapsulated security message (S203); transmitting the encapsulated security message through a pre-established pseudo-wire tunnel (S204). The present invention overcomes the problem of information insecurity in the prior art of the PW transmission technology, realizes the security protection function of data during the PW transmission forwarding, solves the technical blank space for performing security protection processing for the transmission data in the PW, is not limited to Internet Protocol / Transfer Control Protocol (IP / TCP) messages and is widely applied, so as to perform security protection processing for the existing and future visible various kinds of messages.

Description

technical field [0001] The present invention relates to the technical field of communication, in particular to a method, device and system for securely sending and receiving data in a pseudowire network. Background technique [0002] Pseudowire (PW, Pseudo Wire) emulates ATM, frame relay, Ethernet, low-speed time division multiplexing (TDM, Time Division Multiplexing) circuits and synchronous optical network (SONET, Synchronous Optical Network / Synchronous Digital Hierarchy (SDH, synchronous digital hierarchy) and other services, PW encapsulates a specific service (PDU, Protocol Data Unit) at the ingress, and then carries it on the path or tunnel between the ingress and egress These PDUs manage the timing and sequence of these PDUs to emulate the functions of other services. [0003] As network security issues become more and more serious, it is no longer possible to ensure the security of data during PW transmission only by setting passwords. Now some network encryption te...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/04
Inventor 裴龑
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products