Unlock instant, AI-driven research and patent intelligence for your innovation.

Improve ipsec performance and anti-eavesdropping security

An anti-replay and data packet technology, applied to electrical components, transmission systems, etc., can solve problems such as insecurity, imbalance, and partial

Active Publication Date: 2017-08-04
HUAWEI TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, a host may communicate with another host, client, network, etc. via the Internet, which may be partially, unevenly and / or completely insecure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Improve ipsec performance and anti-eavesdropping security
  • Improve ipsec performance and anti-eavesdropping security
  • Improve ipsec performance and anti-eavesdropping security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] IPsec is a suite of security protocols that includes security protocols for securing Internet Protocol (IP) communications across various networks, as described in Internet Engineering Task Force (IETF) document Request for Comments (RFC) 4301, cited in way incorporated. IPsec may secure communications at the IP layer (eg, Layer 3 and / or the Network layer of the Open Systems Interconnection (OSI) model). IPsec may be an end-to-end security scheme that protects data flow (eg, information) between security gateways. IPsec can employ unidirectional SA pairs to protect data flows, including packets. For example, the local security gateway may use the first SA to protect information transmitted to the remote security gateway, and use the second SA to protect information received from the remote security gateway. IPsec may also allow SA bundles, which may include SAs nested within SAs (eg, tunnels within tunnels). IPsec may be limited to using SA pairs and / or SA bundle pai...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A network element (NE), comprising: the network element (NE) comprising: a memory device for storing instructions; Processor for executing instructions by dividing the first plurality of packets of the data stream into a first plurality of subflows, and having the first plurality of subflows transmitted via the network to the second NE, wherein the first plurality of subflows using a first Internet Protocol Security Protocol (IPsec) security consortium (SA) cluster comprising a plurality of parallel subsa. The present invention further comprises a network element (NE), comprising a processor for using the Internet Key Exchange Protocol (IKE) or IKE version 2 (IKEv2) between the NE and the second NE to create an IPsec SA cluster comprising a first plurality of subsA, wherein the first subsa is unidirectional, and the first subSA for transmitting the first plurality of packets in the same direction.

Description

[0001] Cross References to Related Applications [0002] This application claims prior application priority to U.S. Provisional Patent Application No. 61 / 618,359, filed March 30, 2012, by Xiangyang Zhang et al., entitled "Multipath IP Layer Security," which is incorporated herein by reference In this book, it is like reproducing the full text. [0003] About Federal Sponsored [0004] Statement of Research or Development [0005] not applicable. [0006] References to Microfiche Attachments [0007] not applicable. Background technique [0008] Networked devices may be required to communicate across multiple networks. Certain devices may require that such communications remain secure. Devices interconnected via a secure network may rely on security measures inherent in the secure network to provide such security for any cross-network communication. These devices could also be required to communicate across unsecured networks. For example, a host may communicate with an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/18H04L63/164H04L63/16H04L63/0485H04L63/06
Inventor 宋继飞易晓勇张向阳
Owner HUAWEI TECH CO LTD