VPN tunnel protocol implementation method

A technology of tunneling protocol and implementation method, which is applied in the field of network communication, can solve problems such as inability to proxy online data, achieve the effects of reducing data communication traffic, simple encapsulation format, and increasing encryption complexity

Active Publication Date: 2017-08-11
ANHUI XINHUABO INFORMATION TECH
View PDF8 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The VPN of SSL protocol or SOCK5 protocol can only proxy the Internet data of applications that support the pr

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • VPN tunnel protocol implementation method
  • VPN tunnel protocol implementation method
  • VPN tunnel protocol implementation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The embodiments of the present invention are described in detail below. This embodiment is implemented on the premise of the technical solution of the present invention, and detailed implementation methods and specific operating procedures are provided, but the protection scope of the present invention is not limited to the following implementation example.

[0030] Such as figure 2 , image 3 , Figure 5 Shown: a VPN tunneling protocol implementation method, applied to the tunnel communication between the VPN client and the VPN server, the VPN client encrypts the user communication data in the tunnel, sends it to the VPN server, and the VPN server forwards and decrypts it After the user data is sent to the target network, the tunnel communication includes the following processes: (1) Client: Send a link establishment request; (2) When the negotiation times out or the client message error stops; when the client authentication is successful, the server sends the estab...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a VPN tunnel protocol implementation method applied to tunnel communication between a VPN client and a VPN server side. The VPN client packages user communication data into the tunnel in an encrypted manner, and sends to the VPN server, and the VPN server forwards the decrypted user data to a target network. The tunnel communication comprises the steps as follow: 1, a client sends a link building request; 2, when negotiation is overtime or a client message is error and ends; when the client is successfully authenticated, the server side sends a message about successful building of the link; and 3, when the keep-alive of the link is overtime or the client sends a quit message, communication is ended. According to the method provided by the invention, an encryption key is not directly transmitted on a network, the local key is added in combination with increase of a random number, and the encryption key is safe and can be randomly changed, so that the tunnel data cannot be cracked by combing with traffic, and thus communication content of the user is safer.

Description

technical field [0001] The invention relates to the technical field of network communication, in particular to a method for realizing a VPN tunnel protocol. Background technique [0002] VPN (Virtual Private Network virtual private network) can connect two or more enterprise intranets located in different places on the Internet through a special encrypted communication protocol, or establish a dedicated communication line between mobile users and enterprises . This proprietary communication line is often described as a VPN tunnel, which is a safe and stable tunnel through the chaotic public network. A virtual private network is an extension of a corporate intranet. [0003] In addition to the commercial use of enterprises, ordinary users or security auditors often use VPN to surf the Internet anonymously to avoid communication information being identified and leaked. [0004] At present, the tunneling protocols adopted by VPN are divided into the following types: PPTP, L2...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/46H04L29/06H04L9/08
CPCH04L9/0869H04L12/4633H04L12/4641H04L63/0428
Inventor 王晶晶王卫周会晓刘萍
Owner ANHUI XINHUABO INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products