UNP (Universal Network Passport) tunnel secure sharing method and system

A security and tunneling technology, applied in the field of network communication, can solve problems such as waste of network resources, complex configuration, repeated IP address configuration conflicts, etc., to achieve the effects of improving security, realizing data isolation, and saving resources

Active Publication Date: 2018-03-16
ZHEJIANG UNIVIEW TECH CO LTD
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the internal network of Internet cafes is highly autonomous and random, and the scale of Internet cafes varies. It is common for multiple Internet cafes to have the same intranet IP segment configuration. If the IPCs of several Internet cafes are connected to The public security network is likely to cause conflicts due to repeated configuration of IP addresses, and it is necessary to establish a separate UNP tunnel for each IPC
In this case, the configuration is more complicated and wastes network resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • UNP (Universal Network Passport) tunnel secure sharing method and system
  • UNP (Universal Network Passport) tunnel secure sharing method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0061] Embodiment 1. The social resource IPC sends a message to the management server of the public platform.

[0062] The access server decapsulates the UNP message from the security supervision box, restores the layer-2 message, and performs address translation, that is, changes the source IP in the layer-2 message to the virtual address corresponding to the social resource, and sends it to the management server.

[0063] The fields of the packet sent to the management server after address translation are:

[0064] The source MAC is the MAC address MAC1 of IPC1 (48:EA:63:00:11:01), and the destination MAC is the MAC address MAC100 of the management server (48:EA:63:88:88:88);

[0065] The source IP is the virtual address vIP1 (10.10.10.3) of IPC1, and the destination IP is the management server IP address IP100 (202.5.1.100).

[0066] The source IP is changed to the virtual address vIP1 (10.10.10.3) of IPC1 after address translation.

Embodiment 2

[0067] Embodiment 2. This embodiment also supports communication between social resources. The social resource sending the message is called the first social resource, and the destination device is called the second social resource. For example, in the communication between IPC1 and IPC2, IPC1 sends a message to IPC2, IPC1 is the first social resource, and IPC2 is the second social resource.

[0068] The IPC1 message is sent to the access server after the security monitoring box is tagged with VLAN10, and the access server assigns a virtual address vIP1 (10.10.10.3) to IPC1; similarly, the message sent by IPC2 is tagged with the VLAN20 tag on the security monitoring box Send it to the access server, and the access server assigns the virtual address vIP2 (10.10.10.4) to IPC2.

[0069] When the packet sent from IPC1 to IPC2 passes through the access server, the following address translation is performed:

[0070] The access server decapsulates the UNP message from the security ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a UNP (Universal Network Passport) tunnel secure sharing method and system. A security supervision box receives messages sent by social resources, packages the messages into UNP messages and sends the UNP messages through an established UNP tunnel, wherein labels of VLANs to which the social resources belong are carried in the UNP messages; an access server allocates virtual addresses to the social resources, replaces practical IP addresses of the social resources in the messages by the virtual addresses and sends the messages to destination devices; the access server receives the messages sent to destination social resources, replaces the virtual addresses by the practical IP addresses of the destination social resources according to recorded social resource tableentries, packages the messages into the UNP messages and sends the UNP messages to the security supervision box, wherein the labels of the VLANs to which the destination social resources belong are carried in the UNP messages; and the security supervision box receives the UNP messages and sends the messages to the social resources from corresponding VLAN ports according to the VLAN labels and destination MACs of the messages. According to the method and the system, the UNP tunnel is shared, so the resources are saved; and IP isolation is carried out through the VLANs, so the security is improved.

Description

technical field [0001] The invention belongs to the technical field of network communication, and in particular relates to a method and system for safe sharing of UNP tunnels. Background technique [0002] As the scope of video surveillance services becomes more and more widely used, the subsequent security issues are increasingly valued by users, and users' demands for the safe transmission of audio and video information in surveillance systems are also increasing. At the same time, the government also needs to conduct unified supervision on the video surveillance systems of enterprises and institutions, and connect the video sources connected to various social resources to the public security network for supervision. [0003] The access of various social resources to the public security network is conducive to cracking down on criminal suspects in various criminal and public security cases. Among them, Internet cafes, as places with high incidence of criminal cases, are li...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/46H04L29/12
CPCH04L12/4633H04L12/4641H04L61/2592H04N7/18
Inventor 周迪周欣如
Owner ZHEJIANG UNIVIEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products