An encrypted tunnel communication method based on hip protocol

A communication method and protocol technology, which is applied in the field of network communication security, can solve the problems of being unable to integrate, unable to use the excellent characteristics of host identification HIP, and unable to realize self-reform, etc., and achieve the effect of wide application range and high degree of security and confidentiality

Active Publication Date: 2020-10-02
宝牧科技(天津)有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in some networks, there are still traditional and old devices that cannot be transformed by themselves (such as foreign manufacturers). These devices cannot support the host identification HIP protocol themselves, so they cannot take advantage of the excellent features of the host identification HIP, and thus cannot be integrated into throughout the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An encrypted tunnel communication method based on hip protocol
  • An encrypted tunnel communication method based on hip protocol
  • An encrypted tunnel communication method based on hip protocol

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment

[0036] Such as figure 2 Shown: Two devices that do not support the host identification HIP protocol: programmable logic controller PLC (192.168.1.20) and data acquisition and monitoring control system SCADA (192.168.1.100); programmable logic controller PLC (192.168.1.20) Connect a host identification HIP switch (10.0.2.5), data acquisition and monitoring control system SCADA (192.168.1.100) connect a host identification HIP switch (10.0.2.8); open the address resolution APR of the two host identification HIP switches Proxy function, creating a general routing encapsulation protocol GRE virtual interface tunnel on two host identification HIP switches;

[0037] Such as image 3 Shown: Replace the outer layer destination IP and source IP before the general routing encapsulation protocol GRE message header with the destination local identifier LSI (1.0.2.8) and the source local identifier LSI ( 1.0.2.5); encapsulate the real IP address of the device programmable logic controll...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an encrypted tunnel communication method based on a host identity protocol (HIP). Two pieces of equipment not supporting the HIP are separately connected with an HIP switch, andthe two HIP switches are connected via a network; agent functions of APR of the two HIP switches are opened, and a GRW virtual interface tunnel is built on the two HIP switches. According to the encrypted tunnel communication method based on the HIP provided by the invention, matched with the HIP switches and the GRE virtual interface tunnel technologies, the HIP communication can be achieved between the equipment without HIP functions, mobile interconnection networking between the equipment without mobile interconnection functions and mutual networking between the different networks are achieved, and the characteristics of wide application range and high security and confidentiality degree are provided.

Description

technical field [0001] The invention belongs to the field of network communication security, in particular to an encrypted tunnel communication method based on HIP protocol. Background technique [0002] Host Identity HIP (Host Identity Protocol), the host identity protocol introduces a new encrypted namespace, provides a secure host mobile and multi-homing method for the Internet, and makes it easier to authenticate both parties in communication, so as to realize a secure and trustworthy network system . The host identification HIP utilizes the ESP protocol and transmission mode of IPSEC to realize end-to-end secure communication. In the case of mobile Internet, IPv4 and IPv6 mixed networking, it can realize the security of communication data. However, in some networks, there are still traditional and old devices that cannot be transformed by themselves (such as foreign manufacturers). These devices cannot support the host identification HIP protocol themselves, so they c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/029H04L63/18H04L63/205
Inventor 滕建桓
Owner 宝牧科技(天津)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products