Method and device of obtaining IPSec SA (Internet Protocol Security Association)
An acquisition method and server technology, applied in the field of IPSec SA acquisition, can solve the problem of consuming large system resources, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0046] In a specific application, in order to prevent the user's private network data carried by the ADVPN network from leaking to the public network, IPSec technology can be introduced into the ADVPN network. After the introduction of IPSec technology, each node in the ADVPN network negotiates IPSec SA one-to-one, and the private network data between nodes is encrypted and transmitted after encapsulating specific packet headers with IPSec SA. Specifically, when each node in the ADVPN network negotiates IPSec SA, it must first ensure the security of the control packets exchanged when negotiating IPSEC SA, so the whole negotiation is divided into two stages; the first stage is to establish IKE (Internet Key Exchange, Internet key exchange) peer entities, and then negotiate IKE SA between entities; IKE SA is used to protect the second stage, that is, to protect the control messages exchanged when establishing IPSEC SA; the second stage is to The process of negotiating the IPSEC ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com