High-speed safe virtual network proxy method and system

A virtual network and virtual network card technology, applied in the field of network proxy, can solve problems such as poor efficiency of virtual network interface devices

Active Publication Date: 2021-05-18
德思信息科技(南京)有限公司
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The purpose of the present invention is to provide a high-speed secure virtual network proxy method and its system t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • High-speed safe virtual network proxy method and system
  • High-speed safe virtual network proxy method and system
  • High-speed safe virtual network proxy method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0050] The present invention provides such figure 1 A method for a high-speed secure virtual network proxy shown in , comprising the following process steps:

[0051] (1) The client initiates a connection to the gateway;

[0052] (2) After the connection is successful, the client initiates a proxy opening request to the gateway;

[0053] (3) The gateway receives the proxy opening request and initiates a connection to the application system;

[0054] (4) If ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a high-speed safe virtual network proxy method and system. The system comprises a virtual network card and a client virtual network card processing module for processing data flowing through the virtual network card. The method is characterized by comprising the following steps that S10, a client converts request data flowing through a virtual network card, packages the request data and sends the request data to a gateway; S20, the gateway receives the data packet in the step S10, unpacks the data packet and sends the data packet to an application system through proxy connection; S30, the application system returns the data packet in the step S20 to the gateway through proxy connection; and S40, the gateway encapsulates the data packet in the step S30 and returns the encapsulated data packet to the client. According to the high-speed secure virtual network proxy method and system, the data message packaging and forwarding problems can be efficiently solved.

Description

technical field [0001] The invention belongs to the technical field of network proxy, and in particular relates to a high-speed safe virtual network proxy method and system thereof. Background technique [0002] With the rapid development of Internet technology and the advent of the era of 5G and the Internet of Things, enterprises are constantly forced to reconstruct security boundaries. Software Defined Perimeter (Software Defined Perimeter) is a network security architecture that can provide security protection for the OSI seven-layer protocol stack. SDP can Achieving asset concealment and using a single packet to establish a trusted connection through separate control and data planes before allowing a connection to the hidden asset, a zero trust network using SDP enables organizations to defend against new variants of old attack methods that Continuing to emerge in existing network models centered around network and infrastructure boundaries; [0003] In the SDP archite...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/12H04L29/08H04L12/46
CPCH04L12/4641H04L61/2592H04L67/02
Inventor 陈玮孙刚康自清
Owner 德思信息科技(南京)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products