Unlock instant, AI-driven research and patent intelligence for your innovation.

IKE message negotiation method and system

A message negotiation and message technology, applied in the field of communication, can solve problems such as business interruption

Active Publication Date: 2014-04-16
HUAWEI TECH CO LTD
View PDF2 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] In view of this, the present invention provides a method and system for IKE message negotiation to solve the problem of long-term service interruption caused by switching between the active device and the backup device in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • IKE message negotiation method and system
  • IKE message negotiation method and system
  • IKE message negotiation method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0096] In order to make the object, technical solution and advantages of the present invention clearer, the technical solution of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Apparently, each of the following embodiments is only a part of the present invention. Based on the following embodiments of the present invention, even if those skilled in the art do not make creative work, they can obtain other technical features that can solve the technical problems of the present invention and realize the technical effects of the present invention by equivalently transforming some or even all of the technical features. Embodiments, and these transformed embodiments obviously do not depart from the disclosed scope of the present invention.

[0097] Two-machine hot standby cluster (Hot standby cluster), two physical devices back up each other and implement the same security policy. In ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an IKE message negotiation method and a system. The IKE message negotiation method comprises the steps: a standby device updates a stored third identification value according to an update notification of a primary device, wherein the update notification of the primary device is sent after the primary device updates a stored second identification value; when the standby device is switched to a new primary device, the new primary device sends a second message negotiating IPSec information to an opposite terminal device according to an updated third identification, wherein the third identification is stored in the standby device and used for obtaining state information of the primary device. By adopting the method, the problem of long-time interruption caused by switching between the primary device and the standby device in the prior art is solved.

Description

[0001] This application claims the priority of a Chinese patent application filed with China Patent Office on October 12, 2012, with application number 201210387149.0, and the title of the invention is "Method and System for IKE Message Negotiation", the entire contents of which are incorporated in this application by reference middle. technical field [0002] Embodiments of the present invention relate to communication technologies, and in particular to a method and system for IKE (Internet Key Exchange) message negotiation. Background technique [0003] The second version of the key exchange protocol (Internet Key Exchange Protocol Version2, referred to as IKEv2), is used for authentication and key negotiation of the Security Association (SA) in the virtual private network (Virtual Private Network, referred to as VPN), Negotiate the relevant information needed for Internet Protocol Security (IPSec) communication between the two communicating parties in the VPN, such as enc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24H04L69/40
CPCH04L63/164H04L63/061H04L67/104H04L69/40H04L63/04
Inventor 张玮刘瑞瑞谢文辉高国鲁
Owner HUAWEI TECH CO LTD