Multi-level fragmented high-security-strength communication system

A security strength, communication system technology, applied in the field of high security strength communication systems, can solve problems such as large delay, single VPN solution, poor security, etc., to achieve the effect of ensuring stability and reliability, protecting privacy attributes, and defending against network attacks

Pending Publication Date: 2022-03-25
SEAS BEIJING INFORMATION TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Each VPN scheme has its own advantages and disadvantages. For example, the PPTP scheme is fast, easy to deploy, and applicable to a wide range of platforms, but its security is poor; the OpenVPN scheme has high security, but configuration difficulties and large delays; High performance, easy to deploy, but slow, there is no perfect solution to solve all problems
[0004] Traditional network communication systems usually use a single Internet access method and a single VPN solution. Once a failure occurs, the normal development of the business cannot be guaranteed, and the possible backdoor of the loophole cannot be avoided, and there is a possibility of being cracked. What's more, Several existing VPN solutions have been found to contain malware,
[0005] The technical disadvantages of VPN itself make it vulnerable to eavesdropping, disguise, man-in-the-middle and other attacks
Traditional network communication systems usually use static Internet access methods, data encryption and identity verification methods basically use fixed algorithms, and network security devices generally use fixed security policies. Source traceability, vulnerable to new types of network attacks such as APT
[0006] The singleness, staticity, and fixity of the traditional network communication system make it have various security defects. The traffic characteristics of the communication system are obvious, easy to trace the source, a single Internet access method, static encryption and authentication algorithms, and fixed network security policies. , the traffic characteristics are relatively obvious, it is easy to be monitored and traced by network attackers, and it is difficult to resist various new types of network attacks, which is not conducive to the development of high-security services

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-level fragmented high-security-strength communication system
  • Multi-level fragmented high-security-strength communication system
  • Multi-level fragmented high-security-strength communication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to enable those skilled in the art to better understand this solution, the technical solution in this embodiment will be clearly and completely described below in conjunction with the accompanying drawings in this embodiment. Obviously, the described embodiment is only a part of this embodiment Examples, but not all examples. Based on the embodiments herein, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the scope of this protection.

[0027] The multi-level, fragmented, high-security communication system of the present invention will be further described below in conjunction with the accompanying drawings and specific implementation methods: this embodiment is based on existing VPN technology, adopts heterogeneous multi-link technology, and is based on multiple access methods (ADSL, dedicated line, 4G, 5G) and a variety of secure encrypted tunnels (PPTP, OpenVPN) to build a network, and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a multi-level fragmented high-security-strength communication system, and solves the problem that the integrity and confidentiality of network communication still need to be improved in the prior art. The system comprises a system operation and maintenance management module which is responsible for management configuration, state monitoring and log management of the system, and a control module which is responsible for performing control plane processing on the system; the connection fragmentation module is responsible for the system to schedule data messages on different connections of the user to different VPN tunnels based on various connection fragmentation algorithms; the message fragmentation module is responsible for the system to schedule different data messages to multiple access links based on multiple message fragmentation algorithms; and the far-end server module establishes a plurality of encrypted tunnel connections with a plurality of far-end servers at the same time through a plurality of supported link access modes. The technology dynamically adapts to a complex network environment, fault states of all links are detected in real time, and stability and reliability of user communication are guaranteed.

Description

technical field [0001] The invention relates to the field of network communication security, in particular to a multi-level fragmented communication system with high security strength. Background technique [0002] In the construction process of the traditional network communication system, in order to solve the problem of communication integrity and confidentiality, the VPN scheme is generally adopted, by establishing a secure tunnel, using advanced digital encryption protocols (RSA, DES, etc.) The entire message or session is encrypted, and technologies such as digital signatures are used for identity verification. [0003] Commonly used VPN solutions include OpenVPN, PPTP, L2TP / IPSec, etc. Each VPN scheme has its own advantages and disadvantages. For example, the PPTP scheme is fast, easy to deploy, and applicable to a wide range of platforms, but its security is poor; the OpenVPN scheme has high security, but configuration difficulties and large delays; High performanc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/40H04L12/46H04L41/0253H04L43/0817H04L67/025
CPCH04L63/0272H04L63/0485H04L41/0253H04L43/0817H04L67/025H04L12/4633H04L12/4641H04L63/168
Inventor 肖达宋延坡王天鹏刘超丁家奇张凯源刘明月张涛
Owner SEAS BEIJING INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products