Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Processing method for abnormality of IKE (internet key exchange) negotiation

A processing method and abnormal technology, applied in the field of communication, can solve problems such as excessive occupation of network resources and system memory resources

Inactive Publication Date: 2013-01-09
OPZOON TECH
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The invention mainly solves the technical problem that when the IKE negotiation is abnormal, the negotiation message is still sent continuously, and the network resources and system memory resources are occupied too much

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Processing method for abnormality of IKE (internet key exchange) negotiation
  • Processing method for abnormality of IKE (internet key exchange) negotiation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. The following examples are used to illustrate the present invention, but are not intended to limit the scope of the present invention.

[0024] figure 1 It is a flow chart of the inventive method, comprising the following steps:

[0025] A. The sender initiates a negotiation message;

[0026] B. If there is an exception, the receiving end will respond to the sending end with an abnormal information message, and mark the receiving end as inactive within the first set time;

[0027] C. After receiving the abnormal information message, the sending end marks the sending end as inactive within a second set time.

[0028] Wherein, the negotiation message in the step A carries configuration information, and the configuration information includes an encryption key and a negotiation policy.

[0029] Further, the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a processing method for the abnormality of IKE (internet key exchange) negotiation. The processing method specifically comprises the following steps of: transmitting a negotiation message by a transmitting end; in case of abnormality, responding an abnormal information message of the transmitting end by a receiving end, and marking the receiving end as a non-activated status within a first set time; and marking the transmitting end as the non-activated status within a second set time after the transmitting end receives the abnormal information message. When the IKE (internet key exchange) negotiation is abnormal, the method can prevent the negotiation message from being continuously transmitted, so that the excessive occupancy of network resource and system memory resource can be avoided.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a method for processing abnormalities in IKE negotiation. Background technique [0002] Internet Protocol Security (IPSec) is an end-to-end mechanism designed by IETF (Internet Engineering Task Force) to ensure the security of Internet IP layer communication, including Network Authentication Protocol (AH), Encapsulation Security Payload Protocol (ESP), key exchange Protocol (IKE) and some algorithms for network authentication and encryption, etc. [0003] Among them, the process of Internet Key Exchange (IKE) is divided into two parts: the first phase negotiation and the second phase negotiation. During the negotiation, the devices at both ends of the network need to exchange messages. These messages are used to exchange and confirm configuration, Authentication, key information, etc. In the actual exchange process, when the configuration information of the devices at bot...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L29/06
Inventor 陈海滨
Owner OPZOON TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products