Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Implementation method of network VPN cipher machine based on no IP address

A technology of IP address and implementation method, which is applied in the field of network management, can solve problems such as occupation, and achieve the effects of ensuring transmission confidentiality, enhancing flexibility and convenience, and saving IP address resources

Pending Publication Date: 2022-03-25
乾讯信息技术(无锡)有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to provide a method for realizing a network VPN cipher machine based on no IP address, to solve the problem that the prior art VPN cipher machine must occupy an IP address of an external network, and when deploying, the IP address must be set, especially in new When adding a VPN cipher machine, the encryption policy between the cipher machines must be modified synchronously.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implementation method of network VPN cipher machine based on no IP address

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The following will be combined with figure 1 The technical solutions of the present invention are clearly and completely described, and obviously, the described embodiments are part of the embodiments of the present invention, but not all of them.

[0018] The components of the embodiments of the invention generally described and shown in the figures herein may be arranged and designed in a variety of different configurations. Accordingly, the following detailed description of the embodiments of the invention provided in the accompanying drawings is not intended to limit the scope of the claimed invention, but merely represents selected embodiments of the invention.

[0019] Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0020] In the description of the present invention, it should be noted that the terms ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an implementation method of a network VPN cipher machine based on no IP address, and relates to the technical field of network management. According to the invention, the communication between the network VPN cipher machines does not need to depend on the own IP address to carry out encryption packaging processing, and does not depend on the IP address to carry out management configuration, thereby achieving the purposes of saving the IP address resource of the Internet and guaranteeing the transmission secrecy of the network message and the anti-permeation protection of the network.

Description

technical field [0001] The invention relates to the technical field of network management, in particular to a method for realizing a network VPN cipher machine based on no IP address. Background technique [0002] The traditional VPN cipher machine has its own IP address, and the IP address of the VPN cipher machine needs to be configured before use. The VPN cipher machine adopts the tunnel mode to realize the encryption, decryption and encapsulation of data packets. Generally, a negotiation protocol is adopted between VPN cipher machines to negotiate encryption algorithms, encryption keys, and encryption policies, so as to realize the encryption and decryption of data packets between cipher machines and achieve the purpose of network communication security. In this mode, the VPN cipher machine must occupy an IP address of the external network, and the IP address must be set during deployment. Especially when adding a new VPN cipher machine, the encryption policy between the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L45/02H04L45/00H04L9/40
CPCH04L45/02H04L45/08H04L63/0876
Inventor 强科华丁余泉
Owner 乾讯信息技术(无锡)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products