Check patentability & draft patents in minutes with Patsnap Eureka AI!

Pseudowire encryption method in MPLS-TP

An encryption method and pseudowire technology, which is applied in the field of pseudowire encryption in MPLS-TP, can solve problems such as the lack of pseudowire end-to-end encryption solutions, and achieve the effect of improving security

Inactive Publication Date: 2019-01-22
ANHUI WANTONG POSTS & TELECOMM CO LTD
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

IPSEC generally works at the network layer, while pseudowires work at the link layer. IPSEC cannot directly work at the link layer, so there is a lack of end-to-end encryption solutions specially designed for pseudowires.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Pseudowire encryption method in MPLS-TP
  • Pseudowire encryption method in MPLS-TP
  • Pseudowire encryption method in MPLS-TP

Examples

Experimental program
Comparison scheme
Effect test

specific example

[0067] Pseudowire encryption using IKEv1 negotiation; including the following steps:

[0068] Step 1: Establish a pseudowire PW between two PE devices. The detailed steps are: configure MPLS-TP between two PE devices, including:

[0069] 1) Set the device IP address and routing;

[0070] 2) Define VPWS instance;

[0071] 3) Configure the AC port;

[0072] 4) Configure pseudowire parameters;

[0073] Step 2: Establish an associated channel IKE-Channel on the pseudowire PW. The detailed steps are: configure the IKE parameter set, including:

[0074] 1) IKE version and mode, such as IKEv1 main mode;

[0075] 2) Encryption and decryption algorithms, such as AES-128;

[0076] 3) Integrity verification algorithm, such as SHA-256;

[0077] 4) An identity authentication method, such as a pre-shared key; 5) Select an encapsulation format, such as ESP. Then configure the associated channel IKE-Channel on the pseudowire PW, set the Channel-type value to 99, and associate the IKE p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A pseudowire encryption method in MPLS-TP can solve the technical problem that there is no end-to-end encryption solution specially designed for pseudowire in the existing network. The method comprises the following steps: S100: establishing a pseudowire PW between two PE devices; S200: establishing an association channel IKE-Channel on the pseudowire PW; S300: on the associated channel IKE-Channel,IKE negotiation message is transmitted, and SEC SA is generated through IKE negotiation; S400: establishing an association channel SEC-Channel on the pseudowire PW; S500: the algorithm and key negotiated in the SEC SA are used to perform encryption and integrity verification of the pseudowire service packets, and the encrypted packets are transmitted on the associated channel SEC-Channel. The invention can be used in existing MPLS-TP network equipment, to achieve the existing network of pseudowire traffic encryption, improve the security of the network, and can be combined with the new quantum encryption, national secret algorithm, can be flexibly deployed to the existing network.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a pseudowire encryption method in MPLS-TP. Background technique [0002] MPLS-TP is a connection-oriented packet switching network technology, which is implemented by the scalable MPLS architecture jointly proposed by ITU-T and IETF. These extensions are called Transport Profile for MPLS (MPLS-TP). MPLS-TP carries services such as IP, Ethernet, ATM, and TDM through a pseudowire (PW, Pseudo Wire). The existing pseudowire technology can simulate end-to-end circuit switching very well, but the packets are transmitted in clear text on the pseudowire. , missing an encryption method. [0003] IPSEC (Internet Protocol Security) is an open standard framework that ensures confidential and secure communication over an IP network by using encrypted security services. IPSEC negotiates SAs through the ISAKMP protocol. ISAKMP (Internet Security Association and Key Management Protocol)...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/723H04L12/721H04L45/50
CPCH04L45/50H04L45/68H04L63/0485
Inventor 林晨
Owner ANHUI WANTONG POSTS & TELECOMM CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More