Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method for encrypting and decrypting data packets

A data packet, encryption and decryption technology, applied in the field of information security, can solve complex encryption and decryption processing, difficult data packet encryption and decryption processing, etc., to achieve the effect of increasing network adaptability and simplifying development difficulty

Active Publication Date: 2015-08-12
中电科网络安全科技股份有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The bridge works at the data link layer and forwards frames according to the MAC address. The IPSEC protocol works at the transport layer. The IPSEC VPN device deployed in bridge mode forwards all data packets with non-local destination addresses, resulting in It is difficult to encrypt and decrypt data packets, and it is very complicated to implement encryption and decryption of data frames separately at the data link layer

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for encrypting and decrypting data packets

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] As attached to the manual figure 1 The flow chart of the method for encrypting and decrypting data packets in the present invention is shown. The invention discloses a method for encrypting and decrypting data packets, which specifically includes the following steps:

[0015] Step 1, the physical network card receives the ether frame, and judges whether the network card received by the ether frame belongs to a bridge device, if so, then submits the ether frame to the bridge protocol stack, if not, then submits the ether frame to the IP protocol stack;

[0016] Step 2, the bridge protocol stack identifies the Ethernet frame, if the Ethernet frame is a unicast frame, then identifies the attributes of the Ethernet frame, and the non-unicast frame is directly processed by the bridge protocol stack;

[0017] Step 3, when the attribute of Ethernet frame is IP packet, judge whether this bridge interface in the IP protocol stack is configured with IP address, if yes, then revi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a data packet encryption and decryption technology and discloses a method for carrying out encryption and decryption processing on a data packet. The method particularly comprises the following steps: S1, receiving an Ethernet frame by a physical network card, judging whether the network card which receives the Ethernet frame belongs to bridge equipment, submitting the Ethernet frame to a bridge protocol stack if yes, and submitting the Ethernet frame to an IP (Internet Protocol) protocol stack if no; S2, identifying the Ethernet frame by the bridge protocol stack, identifying an attribute of the Ethernet frame if the Ethernet frame is a unicast frame, and directly carrying out processing by the bridge protocol stack if the Ethernet frame is a non-unicast frame; S3, when the attribute of the Ethernet frame is an IP data packet, submitting the data packet to the IP protocol stack; and S4, carrying out encryption and decryption processing on the data packet submitted to the IP protocol stack. The IP data frame is identified by the bridge protocol stack; the IP data packet is submitted to an upper layer (a transmission layer) to be subjected to VPN (Virtual Private Network) encryption and decryption processing; and by utilizing different processing modes of a link layer and the transmission layer on the data frame, the effect that IPSECVPN (Internet Protocol Security Virtual Private Network) equipment utilizes the IP protocol stack to carry out encryption and decryption processing on the data frame in a network bridge mode is implemented.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method for encrypting and decrypting data packets. Background technique [0002] There are two deployment modes for PSEC VPN devices to access the network: gateway deployment mode and bridge deployment mode. In the gateway deployment mode, the internal and external network interfaces of the IPSEC VPN device have different routes, and act as a router or NAT conversion device to realize route forwarding, internal Internet access and external service. It is generally used in a new network or where the user plans to replace the original router / firewall with a VPN gateway. In the bridge deployment mode, IPSEC VPN is connected as a bridge device between routers (firewalls) and switches (back-end services), and transparently forwards all data except VPN packets. The bridge works at the data link layer and forwards frames according to the MAC address. The IPSEC protocol...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/46H04L12/741H04L29/08H04L45/74
Inventor 傅勇罗俊李明明
Owner 中电科网络安全科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products