A method for embedding IPSEC in IP protocol stack
A technology of IP protocol and IP message, which is applied in the field of information security in the field of information technology, and can solve the problems that the complete function of IPSEC cannot be realized, and it is difficult to realize it.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0086] From attached figure 1 It can be seen that the IP packet is still an IP packet after IPSEC encapsulation, and is still processed by the IP processing flow on the network as an IP packet. Therefore, IPSEC processing is part of IP processing. To complete the IPSEC processing, the IPSEC output processing flow must be embedded in the IP output processing flow, and the IPSEC input processing flow must be embedded in the IP input processing flow. After embedding, the IP output processing flow will call the IPSEC output processing flow, and the IP input processing flow will call the IPSEC input processing flow. Therefore, an IPSEC embedding method includes four aspects:
[0087] √Embedding point for IPSEC input;
[0088] √The processing flow of IPSEC input;
[0089] √Embedding point of IPSEC output;
[0090] √The processing flow of IPSEC output;
[0091] Introduce the IPSEC embedding method of the present invention below:
[0092] 1. Embedding point of IPSEC input
[0...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com