Method and device for deleting Child SAs

A technology of equipment and peer equipment, which is applied in the field of communication and can solve problems such as deletion errors

Active Publication Date: 2013-08-07
XINHUASAN INFORMATION TECH CO LTD
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0028] After receiving the deletion message, the B side deletes the newly established ChildSA with the SPI set to 1 and the security protocol set to ESP, resulting in a deletion error

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for deleting Child SAs
  • Method and device for deleting Child SAs
  • Method and device for deleting Child SAs

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] Aiming at the above-mentioned problems existing in the prior art, the embodiment of the present invention provides a technical solution of Child SA deletion. In this technical solution, when a device needs to delete a Child SA, the device sets the outbound direction Child SA corresponding to the Child SA to be deleted as unavailable, and sends a message carrying the SPI and security protocol of the Child SA to be deleted to the peer device. Delete message; when the device receives the delete response message returned by the peer device, the device deletes the Child SA to be deleted and the outbound Child SA corresponding to the Child SA to be deleted.

[0059] Among them, when the peer device receives the delete message, it can query the corresponding Child SA (outgoing Child SA) according to the SPI and security protocol carried in the delete message, and query the inbound Child SA corresponding to the Child SA, and delete the query to the Child SA (including the outbo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and device for deleting Child SAs. The method includes the following steps: when needing to delete a Child SA, the device sets the outbound Child SA corresponding to the Child SA to be deleted to be unavailable, and sends a deletion message carrying the security parameter index (SPI) and security protocol of the Child SA to be deleted to the peer device; and when the deletion response message returned by the peer device is received by the device, the Child SA to be deleted and the outbound Child SA corresponding to the Child SA to be deleted are deleted by the device. In the invention, the probability of deleting Child SAs by mistake is decreased.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a method and device for deleting Child SA. Background technique [0002] IPsec (IP security, IP security) is a three-layer tunnel encryption protocol formulated by IETF (Internet Engineering Task Force, Internet Engineering Task Force), which provides high-quality, interoperable, cryptography-based It is a traditional security technology for implementing Layer 3 VPN (Virtual Private Network, Virtual Private Network). [0003] Specific communication parties establish IPsec tunnels to transmit users' private data, and provide the following security services at the IP layer: [0004] Data confidentiality (Confidentiality): The IPsec sender encrypts the packet before transmitting it over the network; [0005] Data Integrity: The IPsec receiver authenticates the packets sent by the sender to ensure that the data has not been tampered with during transmission; [0006...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30H04L29/06
Inventor 杨超
Owner XINHUASAN INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products