Check patentability & draft patents in minutes with Patsnap Eureka AI!

A message mirroring and encryption transmission method

A technology of encrypted transmission and mirroring, applied in the field of message mirroring and encrypted transmission, it can solve the problems of poor security, inability to improve security, and the operation speed is not as fast as hardware, and achieve fast encryption speed, improve security, and consume less resources. Effect

Active Publication Date: 2017-02-22
北京浩瀚深度信息技术股份有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] This encryption method needs to occupy host resources, and its operation speed is not as fast as that of hardware, and the encrypted key is stored in the encryption software in plain text, which has poor security; The text is still in the form of plain text, which cannot improve its security; further, the shunt device is connected in the network in parallel, and the sorting speed for the required mirrored packets is relatively slow
It can be seen that the current packet mirroring and encrypted transmission methods have many disadvantages

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A message mirroring and encryption transmission method
  • A message mirroring and encryption transmission method
  • A message mirroring and encryption transmission method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to make the purpose, technical means and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings.

[0028] In this application, a mirroring device is connected in series in the network, and the mirroring device realizes message mirroring and encryption, and then transmits it to the background for analysis and processing.

[0029] figure 1 It is a basic flowchart of the message mirroring and encrypted transmission method in this application. like figure 1 As shown, the method includes:

[0030] Step 101, connect mirrored devices in series in the network.

[0031] Connect the mirroring device to the network in series, such as figure 2 As shown in Fig. 1, the mirror device is inserted on the physical line. Compared with the adjacent routers, this method does not affect the reliable transmission of the link.

[0032] In step 102, the mirroring device mirrors...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a message mirroring and encrypted transmitting method. The message mirroring and encrypted transmitting method comprises a mirroring device connected in a network in series mirrors needed messages, and the mirrored messages are encapsulated by using a tunnel protocol; the encapsulated mirrored messages are encrypted by using a dedicated hardware unit in the mirroring device and then are transmitted to a background. Through the application of the message mirroring and encrypted transmitting method, the safety of the transmission of the mirrored messages can be improved.

Description

technical field [0001] This application relates to network flow monitoring technology, in particular to a message mirroring and encrypted transmission method. Background technique [0002] With the rapid development of broadband services, the importance of network traffic monitoring and control has become increasingly prominent, mainly reflected in: the complexity and diversity of Internet services, it is necessary to understand the traffic and business composition of the IP bearer network through network monitoring, and monitor these traffic and services Effective management; the popularization and application of P2P has replaced the traditional business as the largest consumer of network bandwidth resources. Unmanaged VOIP virtual operation has degraded the original broadband service and seriously affected the interests of operators and telephone service users. It can be effectively restricted through network monitoring; for non-standard network sharing access, network mon...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/801H04L9/32
Inventor 于华陈勇陈陆颖刘芳
Owner 北京浩瀚深度信息技术股份有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More