A method for implementing vpn tunnel protocol

A technology of tunneling protocol and implementation method, applied in the field of network communication, can solve the problem of not being able to proxy Internet data, etc., and achieve the effects of reducing data communication traffic, simple encapsulation format, and increasing encryption complexity

Active Publication Date: 2021-04-09
ANHUI XINHUABO INFORMATION TECH
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The VPN of SSL protocol or SOCK5 protocol can only proxy the Internet data of applications that support the proxy function, and cannot act as agent for other Internet data
Conditions cannot be met for users with this requirement

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for implementing vpn tunnel protocol
  • A method for implementing vpn tunnel protocol
  • A method for implementing vpn tunnel protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The embodiments of the present invention are described in detail below. This embodiment is implemented on the premise of the technical solution of the present invention, and detailed implementation methods and specific operating procedures are provided, but the protection scope of the present invention is not limited to the following implementation example.

[0030] Such as figure 2 , image 3 , Figure 5 Shown: a VPN tunneling protocol implementation method, applied to the tunnel communication between the VPN client and the VPN server, the VPN client encrypts the user communication data in the tunnel, sends it to the VPN server, and the VPN server forwards and decrypts it After the user data is sent to the target network, the tunnel communication includes the following processes: (1) client: send a link establishment request; (2) when the negotiation times out or the client message error stops; when the client authentication is successful, the server sends the estab...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a VPN tunnel protocol implementation method, which is applied to tunnel communication between a VPN client and a VPN server. The VPN client encrypts and encapsulates user communication data in a tunnel, sends it to a VPN server, and the VPN server forwards it. The decrypted user data is sent to the target network; the tunnel communication includes the following processes: (1) Client: send a link establishment request; (2) When the negotiation times out or the client message error stops; when the client authentication is successful, the server sends The link is established successfully; (3) When the link keep-alive times out or the client sends an exit message, stop. The encryption key of the present invention is not directly transmitted on the network, and the local key is added and changed in combination with random numbers. The encryption key is safe and can be changed randomly, and the tunnel data cannot be cracked in combination with traffic, so that the communication content of the user is more secure.

Description

technical field [0001] The invention relates to the technical field of network communication, in particular to a method for realizing a VPN tunnel protocol. Background technique [0002] VPN (Virtual Private Network virtual private network) can connect two or more enterprise intranets located in different places on the Internet through a special encrypted communication protocol, or establish a dedicated communication line between mobile users and enterprises . This proprietary communication line is often described as a VPN tunnel, which is a safe and stable tunnel through the chaotic public network. A virtual private network is an extension of a corporate intranet. [0003] In addition to the commercial use of enterprises, ordinary users or security auditors often use VPN to surf the Internet anonymously to avoid communication information being identified and leaked. [0004] At present, the tunneling protocols adopted by VPN are divided into the following types: PPTP, L2...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/46H04L29/06H04L9/08
CPCH04L9/0869H04L12/4633H04L12/4641H04L63/0428
Inventor 王晶晶王卫周会晓刘萍
Owner ANHUI XINHUABO INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products