Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data transmission method, system and device

A data transmission method and information transmission technology, which are applied in the field of responder client equipment and data transmission systems, and can solve problems such as heavy processing load of VPN servers.

Active Publication Date: 2016-06-15
HUAWEI TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present invention provides a data transmission method, which is used to solve the problem of a large processing load on the VPN server during the end-to-end communication process between clients in the existing VPN scenario

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data transmission method, system and device
  • Data transmission method, system and device
  • Data transmission method, system and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] In this embodiment, the data transmission method provided by the embodiment of the present invention will be described from the perspective of the initiator client.

[0050] attached figure 1It is a schematic diagram of a VPN scenario applied in the embodiment of the present invention, including a client 1, a VPN server, and a client 2. It should be noted that the same client can act as the initiator in one communication process and as the initiator in another communication process. responding party. In this embodiment, the data transmission scheme is described by taking the client 1 as an initiator client and the client 2 as a responder client as an example.

[0051] Such as figure 2 As shown, the flow of the data transmission method provided by the embodiment of the present invention is as follows:

[0052] Step 210, the initiator client queries the VPN server for the external network IP addresses of the initiator client and the responder client, and the external ...

Embodiment 2

[0071] The embodiment of the present invention describes the data transmission solution provided by the embodiment of the present invention from the perspective of the VPN server. Its application scene diagram is attached figure 1 shown.

[0072] attached Figure 4 It is a flow chart of the data transmission method provided by the embodiment of the present invention.

[0073] Step 410, the VPN server provides the initiating client and the responding client with the queried external IP addresses of the client according to the pre-stored external IP addresses of the clients.

[0074] Optionally, as attached Figure 5 As shown, the VPN server provides the initiator client with the external network IP addresses of the initiator client and the responder client that are queried. The specific process includes:

[0075] Step 510, the VPN server receives the query request message sent by the initiator client, and extracts the ID of the initiator client and the ID of the responder c...

Embodiment 3

[0085] The embodiment of the present invention describes the data transmission solution provided by the embodiment of the present invention from the perspective of the responder client. Its application scene diagram is attached figure 1 shown.

[0086] attached Figure 6 It is a flow chart of the data transmission method provided by the embodiment of the present invention.

[0087] Step 610, the responder client performs key negotiation with the initiator client through the VPN server.

[0088] Optionally, during the key negotiation, what is negotiated may be a symmetric key, such as a key generated based on the DES algorithm, or an asymmetric key, which is not limited here.

[0089] Step 620, after the key negotiation is completed, the responder client extracts the external network IP addresses of the initiator client and the responder client from the received UDP message sent by the initiator client.

[0090] After receiving the UDP packet sent by the initiator client, t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data transmission method, which is applied in a virtual private network (VPN), comprising: the initiator client queries the VPN server for the IP addresses of the initiator client and the responder client; The server and the responder client perform key negotiation; after the key negotiation is completed, the initiator client writes the external network IP address of the initiator client into the source address field of the UDP message to be sent, and writes the address of the responder client The external network IP address is written into the destination address field of the UDP message to be sent, and the UDP message to be sent is encrypted according to the negotiated key; the initiator client sends the encrypted UDP message to the responder client , and directly perform packet interaction with the responder client. In the present invention, after the key negotiation is completed, the message between the initiator client and the responder client does not need to be forwarded by the VPN server, thus reducing the processing load of the VPN server.

Description

technical field [0001] The present invention relates to the field of computer and communication technologies, in particular to a data transmission method, an initiator client device, a virtual private network (VPN, Virtual Private Network) server, a responder client device and a data transmission system . Background technique [0002] User Datagram Protocol (UDP, UserDatagramProtocol) is a connectionless transport layer protocol that provides transaction-oriented simple and unreliable information transmission services. It is suitable for application environments that only transmit a small amount of data at a time and do not require high reliability. [0003] End-to-end UDP communication is usually implemented through server forwarding. In a VPN scenario, the VPN client (hereinafter referred to as the client) does not know the external network IP address of the peer client. In the destination address field of the UDP message to be sent Fill in the intranet IP address of the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F13/00
CPCH04L63/0272H04L63/0428H04L63/06H04L63/061
Inventor 翟现旗华国尧陈爱平桂耀
Owner HUAWEI TECH CO LTD
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More