Method for realizing embedded secure socket layer virtual private network (SSL VPN)

An implementation method and embedded technology, applied in electrical components, transmission systems, etc., can solve problems such as poor data processing capabilities, equipment support problems, and low security, and achieve the goal of improving forwarding efficiency, simplifying forwarding rules, and ensuring stability Effect

Inactive Publication Date: 2011-05-18
GUANGZHOU ZHIYUAN ELECTRONICS CO LTD
View PDF4 Cites 66 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] 2. Traditional IPSec solutions cannot check the security of user equipment
[0011] 3. Access control is not detailed enough
[0012] 4. In a complex network environment, it is difficult to deploy IPsec VPN
[0013] 5. Device support issues
[0027] 2. Most embedded systems are strictly limited by resources. The system itself has been tailored and customized, and its security and stability need to be tested for a long time. If complex network security protocols are used, it is also a new challenge for the performance of embedded smart devices. challenge
[0028] 3. Compared with traditional PC equipment, embedded systems have poorer data processing capabilities, smaller memory, single system functions, and lower security, so it is more difficult to ensure the security of their data and the legality of their identities during network communication.
[0029] 4. Embedded system platforms are very different. For multiple embedded smart devices on different platforms, if they want to communicate with each other in the same network, it is not feasible to directly adopt the traditional VPN deployment solution.
[0030] The patent of the present invention proposes corresponding solutions for the above-mentioned difficulties combined with the characteristics of different embedded intelligent platforms, which fundamentally solves the security problems of multi-platform and multi-link network communication of embedded systems, and improves the multi-platform resources of embedded systems Problems that are difficult to manage uniformly

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing embedded secure socket layer virtual private network (SSL VPN)
  • Method for realizing embedded secure socket layer virtual private network (SSL VPN)
  • Method for realizing embedded secure socket layer virtual private network (SSL VPN)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0272] Such as figure 1 Shown, the concrete workflow of the inventive method is as follows:

[0273] (1) Assume that there are four different clients with different operating systems installed, namely WinCE, Linux, WinXP, and uCOS. These clients are in different intranet environments and are connected to the VPN server through different links.

[0274](2) To connect to the VPN server, the WinCE client must first have the certificate and key issued by the CA, so that the VPN server allows the WinCE client to connect and enter the virtual private network. Similarly, other clients must have corresponding certificates and keys to connect to the VPN server. Once the client is connected to the server, the server will obtain various information of the client through a predetermined protocol, including client type, product model, OS identifier used, protocol version number used, and the current link used.

[0275] (3) When the WinCE client is connected to the server, it will send ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of embedded communication systems, and discloses a method for realizing an embedded secure socket layer virtual private network (SSL VPN), which solves the problems of data security and unified resource management of communication among different pieces of embedded equipment. The method is characterized in that: (1) a VPN server performs communication by a self-defined VPN communication protocol standard; (2) a VPN client acquires a related data packet by adopting virtual network card technology, performs unified packaging on the data packet, and simultaneously can position the embedded equipment in a virtual local area network by a virtual network card; and (3) the VPN client performs unified processing on different interfaces between link communication modules and embedded main boards by adopting unified abstract interface technology. In the invention, the method for realizing the SSL VPN is implemented in the embedded field, ensures the security of data transmission, and optimizes the current situation of multi-embedded platform resource management to a great extent so as to greatly influence the development of the embedded field.

Description

technical field [0001] The invention relates to the technical field of embedded communication systems, in particular to an embedded VPN security communication system using Internet protocol and SSL protocol. Background technique [0002] With the rapid development of the Internet and embedded technology, the number of embedded devices (detectors, smart homes, personal medical care, mobile devices, etc.) connected to the network has increased dramatically, and this growth trend will continue. Embedded devices with communication functions make it possible to apply computer technology to equipment such as on-site monitoring, medical emergency response, battlefield management, and home automation. These devices are complex and connected to the Internet in various ways. These embedded devices are High security guarantees are required. Without sufficient security, attackers may steal communication data, destroy data integrity, and even take control of these devices with disastrous...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08
Inventor 周立功
Owner GUANGZHOU ZHIYUAN ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products