Method for forwarding internet protocol security (IPSec)

A data item, encryption and decryption technology, applied in the field of network security, can solve problems such as bandwidth waste and increased costs, and achieve the effect of reducing costs and improving user experience

Inactive Publication Date: 2012-04-18
OPZOON TECH
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, using this method requires adding qos hardware to the network equipment without qos function, which increases the cost
An...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for forwarding internet protocol security (IPSec)
  • Method for forwarding internet protocol security (IPSec)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. The following examples are used to illustrate the present invention, but are not intended to limit the scope of the present invention.

[0021] Such as figure 1 As shown, a kind of Ipsec forwarding method of the present invention comprises the following steps:

[0022] A: Increase the service priority level for each specific data item in the SPD database and SADB database;

[0023] B: Prioritize processing of data items with high priority according to the service priority.

[0024] In step B, the cpu obtains the SPD or SADB data item corresponding to the message that needs to be encrypted and decrypted, and then adds the data item that needs to be encrypted / decrypted to the predetermined encryption and decryption queue according to the service priority. Specifically, it is realized through the following ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for forwarding internet protocol security (IPSec) and relates to the technical field of network security. The method comprises the following steps of: A, adding a service priority level to each specific data item in a security policy database (SPD) and a security association database (SADB); and B, according to the service priority level, performing priority processing on high-priority data items. The method for forwarding the IPSec has the advantages that: according to the situation of network flow and the size of the priorities of users, the bandwidths of the users with different priorities are dynamically changed; by improving the bandwidth distribution of high-priority users, using experiences of the high-priority users are improved; installation of quality of service (QoS) equipment is not required for network equipment without a QoS function; and cost is reduced.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an Ipsec forwarding method. Background technique [0002] IPSec (Internet Protocol Security) is a set of protocols defined by IETF (Internet Engineering Task Force) that provides Internet Protocol (IP) security at the network layer. It ensures data transmission through data encryption, authentication, and integrity checks. Reliability, privacy, confidentiality. It consists of a series of RFC documents, among which RFC2401 defines the basic structure of IPSec; RFC2402 defines the Authentication Header (AH) of IPSec; RFC2406 defines the Encapsulating Security Payload (ESP) of IPSec; RFC2409 defines the Internet Key Exchange (IKE) of IPSec. [0003] IPSec protocols include: AH, ESP, IKE, etc. ESP encapsulates security payloads to provide data encryption and verification functions for IP payloads. The AH authentication header provides data integrity and verification funct...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/56H04L12/851
Inventor 陈海滨
Owner OPZOON TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products