Unlock instant, AI-driven research and patent intelligence for your innovation.

A method, device and system for maintaining an internet protocol security tunnel

An Internet protocol and security technology, applied in the field of communication, can solve problems such as service interruption of terminal equipment

Active Publication Date: 2021-09-14
HUAWEI TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] This application provides an IPSec tunnel maintenance method, device and system to solve the problem that the service of the VPN gateway to the terminal device is interrupted due to the unavailability of the IPSec tunnel when the IP address of the terminal device changes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method, device and system for maintaining an internet protocol security tunnel
  • A method, device and system for maintaining an internet protocol security tunnel
  • A method, device and system for maintaining an internet protocol security tunnel

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] The character " / " in this article generally indicates that the contextual objects are an "or" relationship. The term "and / or" in this article is just an association relationship describing associated objects, which means that there can be three relationships, for example, A and / or B can mean: A exists alone, A and B exist simultaneously, and there exists alone B these three situations.

[0066] When the embodiments of the present invention refer to ordinal numerals such as "first", "second", "third" or "fourth", unless they really express the meaning of order according to the context, they should be understood as merely distinguishing use.

[0067] Such as figure 1 As shown, the method for maintaining an IPSec tunnel provided by this application can be applied to a communication system including a VPN gateway and a terminal device. Among them, the terminal devices involved in this application may include various handheld devices with wireless communication functions,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application discloses a method, device and system for maintaining an Internet protocol security tunnel, which relates to the field of communication technology and can solve the problem that a VPN gateway interrupts the service of the terminal equipment when the IP address of the terminal equipment changes. Including: the terminal device and the VPN gateway negotiate based on the first IP address and the IKE protocol, and establish an IPSec tunnel according to the negotiated SA; the terminal device determines that the first IP address is changed to the second IP address; the terminal device sends the first request to the VPN gateway message, the first request message carries the second IP address and the first tunnel identifier, the first request message is used to request to update the first SA record, and the first SA record includes the SA, the first IP address and the first tunnel identifier Correspondence between identifiers; the terminal device generates a second tunnel identifier according to the second IP address and a preset algorithm; the terminal device replaces the first tunnel identifier in the second SA record with the second tunnel identifier.

Description

technical field [0001] The present application relates to the field of communication technologies, and in particular to a method, device and system for maintaining an Internet Protocol Security (Internet Protocol Security, IPSec) tunnel. Background technique [0002] The IPSec protocol is a three-layer tunnel encryption protocol, which can realize the security technology of a virtual private network (Virtual Private Network, VPN). An IPSec tunnel is established between the terminal device and the VPN gateway to protect and transmit the user's private data, and provide security services such as data confidentiality, data integrity, data source authentication, and anti-replay at the IP layer. [0003] The IPSec tunnel is established based on the Internet Key Exchange (IKE) protocol. The communication parties determine the security association (Security Association, SA) required by the IPSec tunnel through two phases of IKE negotiation. Specifically, the communication parties...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24H04L12/46H04L29/06
CPCH04L12/4641H04L41/0803H04L63/0485H04L63/0272H04L63/0428H04L12/4633H04L47/825H04L47/748H04L12/66H04L63/061H04L9/40
Inventor 朱晓明柏文鑫孔金
Owner HUAWEI TECH CO LTD