Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Security parameter index management method and apparatus

A security parameter index and management method technology, which is applied in the field of security parameter index management methods and devices, can solve problems such as low search efficiency, achieve high search efficiency, reduce memory usage, and avoid allocation conflicts

Active Publication Date: 2018-10-02
MAIPU COMM TECH CO LTD
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide a security parameter index management method and device to solve the problem of low search efficiency caused by HASH conflicts in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security parameter index management method and apparatus
  • Security parameter index management method and apparatus
  • Security parameter index management method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0047] The security parameter index management method provided in this embodiment is applied to figure 1 A communication device 100 is shown. The communication device 100 includes an index array, and the array elements in the index array that do not store security parameter indexes are free array elements.

[0048] In this embodiment, the security parameter index is generated based on the array subscript of the relevant array element in the index array and assigned to the security association, and the address pointer pointing to the security association is stored in the array element.

[0049] Accordingly, when the communication device 100 allocates array elements, please refer to figure 2 , the method includes the following steps.

[0050] Step S110, selecting one of the free array elements as the first target array element.

[0051] Specifically, in this embodiment, when the system is initialized, the array elements in the index array are all free array elements, and the...

no. 2 example

[0122] This embodiment provides a security parameter index management method, which is applied to a communication device 100, and the communication device 100 includes an idle identification array and at least one index array. The index array includes free array elements not used for generating security parameter indexes, and the free array elements form a chain of free elements. The array elements of the free identifier array point to the elements in the index array.

[0123] The difference between this embodiment and the first embodiment is that in this embodiment, the security parameter index is generated according to the array subscripts of the allocated index array and the array subscripts of the related array elements of the idle identification array and assigned to the security association, and the And store the address pointer pointing to the security association in the array element.

[0124] Please refer to Figure 15 , the method includes the following steps.

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a security parameter index management method and apparatus, which is applied to a communication device. The apparatus is characterized in that the communication device comprisesan index array; and the index array comprises idle array elements not used for generating security parameter indexes. The method comprises the steps of selecting an idle array element as a first target array element; and based on an array subscript of the first target array element, generating the security parameter index to be allocated to security association, and assigning an address pointer pointing to the security association to the first target array element. The security parameter indexes are allocated in an array form, and the security parameter indexes are generated based on the array subscripts of the idle array elements, so that the generated security parameter indexes are ensured not to be used certainly and the problem of security parameter index allocation conflict is avoided. The security parameter indexes are organized by adopting the array; and compared with a mode using a HASH table in the prior art, fewer memories are occupied and the search efficiency is higher.

Description

technical field [0001] The present invention relates to the field of communication security, in particular to a security parameter index management method and device. Background technique [0002] During communication between communication devices, security association (Security Association, SA) is required for security verification. During the verification process, it is necessary to find the SA that needs to be used to decapsulate the message according to the destination address, protocol and security parameter index of the message. [0003] In the prior art, by organizing SA in the form of a hash (HASH) table, the HASH value generated by the destination address, protocol and security parameter index is used to find the corresponding SA. Linked lists are organized together and hung on the same HASH node. When looking for SA, first locate the HASH node according to the HASH value, and then traverse the linked list to compare the destination address, protocol, and SPI to de...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/50G06F17/30
CPCG06F9/5016
Inventor 范恒英
Owner MAIPU COMM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products