A processing method for ike negotiation exception

A processing method and abnormal technology, applied in the field of communication, can solve problems such as excessive occupation of network resources and system memory resources

Inactive Publication Date: 2016-04-20
OPZOON TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The invention mainly solves the technical problem that when the IKE negotiation is abnormal, the negotiation message is still sent continuously, and the network resources and system memory resources are occupied too much

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A processing method for ike negotiation exception
  • A processing method for ike negotiation exception

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. The following examples are used to illustrate the present invention, but are not intended to limit the scope of the present invention.

[0024] figure 1 It is a flow chart of the inventive method, comprising the following steps:

[0025] A. The sender initiates a negotiation message;

[0026] B. If there is an exception, the receiving end will respond to the sending end with an abnormal information message, and mark the receiving end as inactive within the first set time;

[0027] C. After receiving the abnormal information message, the sending end marks the sending end as inactive within a second set time.

[0028] Wherein, the negotiation message in the step A carries configuration information, and the configuration information includes an encryption key and a negotiation policy.

[0029] Further, the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for processing abnormalities in IKE negotiation, which specifically includes: a sending end initiates a negotiation message; if an abnormality occurs, the receiving end responds with an abnormal information message of the sending end, and marks the receiving end within a first set time is in an inactive state; after receiving the above-mentioned abnormal information message, the sending end marks the sending end as an inactive state within a second set time. When the IKE negotiation is abnormal, this method can prevent the continuous sending of negotiation packets, avoiding excessive occupation of network resources and system memory resources.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a method for processing abnormalities in IKE negotiation. Background technique [0002] Internet Protocol Security (IPSec) is an end-to-end mechanism designed by IETF (InternetEngineeringTaskForce) to ensure the security of Internet IP layer communication, including Network Authentication Protocol (AH), Encapsulating Security Payload Protocol (ESP), Key Exchange Protocol (IKE ) and some algorithms for network authentication and encryption, etc. [0003] Among them, the process of Internet Key Exchange (IKE) is divided into two parts: the first phase negotiation and the second phase negotiation. During the negotiation, the devices at both ends of the network need to exchange messages. These messages are used to exchange and confirm configuration, Authentication, key information, etc. In the actual exchange process, when the configuration information of the devices at both ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06
Inventor 陈海滨
Owner OPZOON TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products