Method, device and system for negotiating business bearing tunnels

A technology of service bearing and tunneling, which is applied in the transmission system, data exchange through path configuration, electrical components, etc., and can solve the problem of high processing capacity requirements of user equipment and packet gateway equipment, increased message transmission delay, and high equipment cost. question

Active Publication Date: 2011-05-11
HUAWEI TECH CO LTD
View PDF7 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] The negotiated IPSec tunnel for carrying services is an encrypted tunnel. When carrying services through this encrypted tunnel, it is required to perform encryption and decryption processing and/or consistency chec...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for negotiating business bearing tunnels
  • Method, device and system for negotiating business bearing tunnels
  • Method, device and system for negotiating business bearing tunnels

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings. Here, the exemplary embodiments and descriptions of the present invention are used to explain the present invention, but not to limit the present invention.

[0047] In actual application scenarios, there are some services with high security requirements, such as the users of these services are enterprise users or these services transmit important data of enterprises, and there are also some services with low security requirements, such as The users of these services are individual users or these services transmit HTTP (Hyper Text Transport Protocol, hypertext transfer protocol) news and entertainment services; when transmitting services with low security requirements, it is unnecessary to perform encryption and decryption p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for negotiating business bearing tunnels, which comprises the following steps: receiving an internet key exchange (IKE) authentication request, wherein the IKE authentication request carries information of non-encrypted tunnels supported by user equipment; when the security level of the business is lower than the preset level, according to the information of the non-encrypted tunnels supported by the user equipment, selecting the non-encrypted tunnels for bearing the business from the non-encrypted tunnels supported by the user equipment; and sending an IKE authentication response, wherein the IKE authentication response carries the information of the non-encrypted tunnels for bearing the business. The invention also discloses a grouping gateway device, the user equipment and a communication system. In the method, the non-encrypted tunnel for bearing the business can be negotiated, so that the encryption/decryption treatment and/or the consistency check are not carried out when the subsequent business bearing is performed, thus reducing the transmission delay of the messages and the device cost.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a method, device and system for negotiating a service bearer tunnel. Background technique [0002] IKE (Internet Key Exchange, Internet Key Exchange) protocol is the preferred key exchange protocol in the implementation of IPSec (Internet Protocol Security, Internet Protocol Security), and the new version of IKEv2 (IKE version 2, Internet Key Exchange Version 2) protocol retains The basic functions of traditional IKE are revised according to the problems found in the IKE research process, while taking into account the needs of simplicity, efficiency, security and robustness. The IKEv2 protocol greatly improves the interoperability of different IPsec systems through the minimum specification of core functions and default encryption algorithms. [0003] The negotiation process of IKEv2 is as follows: [0004] IKEv2 establishes a pair of IPSec_SA (Security Associati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/46
Inventor 武二华高晓峰蔡安宁
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products