Method and device for realizing tunnel safety

A tunnel and device technology, applied in the field of network communication, can solve the problem of no message authenticity check

Inactive Publication Date: 2010-02-10
NEW H3C TECH CO LTD
View PDF0 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] It can be seen that the existing tunnel technology does not check the authenticity of the message when decapsulating

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for realizing tunnel safety
  • Method and device for realizing tunnel safety
  • Method and device for realizing tunnel safety

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037]The core idea of ​​the present invention is: before sending the data flow message through the tunnel, the tunnel start point device and the tunnel end device negotiate the label dedicated to the data flow; when the tunnel start point device sends the data flow message through the tunnel, first give The data flow message is marked with a label; when the tunnel terminal device receives the data flow message from the tunnel, it determines the legitimacy of the message according to the label.

[0038] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings and examples.

[0039] Figure 5 It is a flowchart of a method for implementing tunnel security in an embodiment of the present invention. Such as Figure 5 As shown, the method includes:

[0040] Step 501 , the tunnel starting point device sends the characteristic informat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a device for realizing tunnel safety; the method comprises steps of: a tunnel initial point device transmits characteristic information of a data stream needing tobe transmitted by the tunnel to a tunnel terminal point device; the tunnel terminal point device distributes labels according to the characteristic information, transmits the distributed labels to the tunnel initial point device, and correspondingly stores the characteristic information and the distributed labels to a label list; the tunnel initial point device appends the distributed labels to an external surface message header of a data current message packaged by the tunnel and then transmits the data current message to the tunnel; when the tunnel terminal point device receives the data current message from the tunnel, the tunnel terminal point device acquires the characteristic information and the labels from the data current message, and determines whether the data current message islegal through looking up the label list. The technical solution of the invention can distinguish the forged tunnel message.

Description

technical field [0001] The invention relates to the technical field of network communication, in particular to a method for realizing tunnel security, a tunnel start point device and a tunnel end point device. Background technique [0002] Tunnel technology is a way to transmit data between networks by using the infrastructure of the Internet. The tunneling protocol repackages data frames or packets of other protocols and sends them through the tunnel. The new frame header provides routing information for passing the encapsulated payload data across the Internet. [0003] In the tunneling technology, the process of encapsulating and forwarding the original packet at the tunnel starting point is called inbound tunneling, and the process of decapsulating and forwarding the tunnel packet at the tunnel end point is called outbound tunneling. Among them, the protocol type of the original message is A, and the process of adding another protocol header with the protocol type B to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/56H04L12/46
Inventor 林涛
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products