Method for optimizing protocol IPsec ESP in single-tunnel mode and device

An optimization method and single-tunnel technology, applied in the computer field, can solve problems such as low decryption efficiency

Inactive Publication Date: 2017-12-08
ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to provide a method and device for optimizing the IPsec ESP pr

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for optimizing protocol IPsec ESP in single-tunnel mode and device
  • Method for optimizing protocol IPsec ESP in single-tunnel mode and device
  • Method for optimizing protocol IPsec ESP in single-tunnel mode and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] Begin to introduce the optimization method embodiment one of IPsec ESP protocol under the single tunnel mode provided by the present invention in detail below, refer to figure 1 , Embodiment 1 specifically includes:

[0048] Step S11: Determine the mapping relationship between each packet data in the original data at the encryption end and the target address.

[0049] The encryption end refers to the end that encrypts the original data, and the target address refers to the address to which the original data is finally transmitted.

[0050] Specifically, determining the mapping relationship between each packet data in the original data at the encryption end and the target data may be, using a hash algorithm to calculate the hash between each packet data in the original data at the sending end and the target address Value, the hash value reflects the mapping relationship between the packet data and the target address. Wherein, the packet data may be tuple data.

[0051] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for optimizing a protocol IPsec ESP in a single-tunnel mode. The method is applied to an encryption terminal and comprises the steps: a mapping relationship between all grouped data among raw data and a target address is determined, then, the grouped data are encrypted to obtain encrypted grouped data, then, the mapping relationship is inserted into the encrypted grouped data to obtain transmitting data, finally, the transmitting data are sent to a decryption terminal, the decryption terminal allocates the encrypted grouped data to each execution device according to the mapping relationship, and the execution devices decrypt the encrypted grouped data. By the method, the decryption terminal allocates the encrypted grouped data to a plurality of execution devices for decryption, the execution devices decrypt the encrypted grouped data, and thus, the decryption efficiency in the single-tunnel mode is greatly increased. The method for optimizing the protocol IPsec ESP in the single-tunnel mode, provided by the invention, is applied to the decryption terminal. The invention further provides two devices corresponding to the two methods. The devices correspond to the methods.

Description

technical field [0001] The invention relates to the field of computers, in particular to an optimization method and device for an IPsec ESP protocol in a single tunnel mode. Background technique [0002] With the development of the Internet, the coverage of the Internet is becoming wider and wider. However, because there are a large number of unreliable users on the Internet, many routes in the middle of the network are managed by unknown people, and data transmission needs to go through these routes, so the security of data transmission on the Internet cannot be guaranteed. [0003] In order to ensure the security of Internet data transmission, IPSec, the full name of Internet Protocol Security, is an end-to-end mechanism designed by IEIF to ensure the security of IP layer communication. It is not a separate protocol, but a series of protocols that provide complete security for IP networks. A collection of protocols and services. The encapsulating security payload protoco...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/06H04L29/12
CPCH04L9/0643H04L61/2592H04L63/0485
Inventor 李光辉
Owner ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products