Network security routing method and system

A routing and security technology, applied in the field of network security routing methods and systems, can solve problems such as high equipment investment costs, and achieve the effect of low implementation cost and wide applicability

Inactive Publication Date: 2021-06-04
北京明未科技有限公司
View PDF9 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, authentication of transmitted data packets requires additional end-system cooperation, certain implementation costs and protocol costs, and not all data in the network is applicable, and hop-by-hop paradigm routing cannot select the optimal security path from a macro perspective , the constrained routing used i...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security routing method and system
  • Network security routing method and system
  • Network security routing method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for ease of description, only parts related to the invention are shown in the drawings.

[0032] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments. For ease of understanding, some technical terms involved in the embodiments of this application are explained below:

[0033] Functional Domain: The range of network nodes and links with functional characteristics.

[0034] Nodes: including nodes outside the domain and network routing nodes within ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network security routing method and system, and the method comprises the steps: carrying out the security value initialization processing of each node in each node in a functional domain, and determining the security value of each intra-domain interface corresponding to each node; according to a conventional routing rule, traversing possible paths to the maximum extent in a preset period; carrying out convergence processing on paths participating in security routing on each node according to a preset in-band signaling rule based on the security value to obtain a path security value; and based on the path security value, performing secure routing forwarding on the screened key service traffic according to a routing forwarding strategy. According to the scheme, the path participating in the security routing can be converged to the optimal security degree according to the in-band signaling rule, so that global security routing forwarding optimization is carried out on the screened key service flow, and the scheme can be integrated into most existing networks of users, and is wide in applicability.

Description

technical field [0001] The present invention generally relates to the technical field of network security, and specifically relates to a network security routing method and system. Background technique [0002] With the popularization of the Internet and the continuous development of high-bandwidth services such as multimedia, IP services have shown explosive growth, and the bandwidth resources of IP networks have become more and more tense. In order to make better use of network resources and provide better services It is very important to ensure the security of data transmission in IP networks for many key applications. [0003] At present, the relevant technologies ensure the security of the data transmission process by encrypting the transmitted data packets, verifying the integrity of the data, and verifying the identity of the data signature. When the routing algorithm performs network security routing, the security risk can be added to the routing algorithm. [0004...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/721H04L12/741H04L45/74
CPCH04L45/14H04L45/74H04L45/38
Inventor 魏雅菲
Owner 北京明未科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products