Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System and method for realizing VPN protocol at application layer

A technology of application layer and protocol, applied in the direction of transmission system, digital transmission system, data exchange through path configuration, etc., can solve problems such as core layer system crash, unfavorable adaptability and impact of VPN client application environment, etc., to avoid conflicts , Improve the adaptability of the network environment

Inactive Publication Date: 2007-03-28
武汉思为同飞网络技术股份有限公司
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this case, if the user host has already installed these conflicting software and then installs the VPN client software, it is easy to cause multiple programs to compete for kernel space and modify each other's network protocol stacks, resulting in conflicts, while the core layer Conflicts often cause system crashes or even crashes
[0004] What kind of terminal device the VPN client will be installed on is often not known in advance, and the specific users who use the VPN client, according to their actual work needs and personal preferences, do not know what other security tools they have installed. Therefore, if the IPSec protocol is implemented at the core layer of the system according to the conventional thinking, it will inevitably conflict with other programs, which will have an extremely adverse impact on the application environment adaptability of the VPN client.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for realizing VPN protocol at application layer
  • System and method for realizing VPN protocol at application layer
  • System and method for realizing VPN protocol at application layer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] Further explain below in conjunction with accompanying drawing:

[0043] 1. A system that implements the VPN protocol at the application layer

[0044] (1) IKE module 1

[0045] The typical implementation of IKE module 1 is the Internet open source software FreeSWAN; FreeSWAN is a software of IPSec and Internet key exchange protocol implemented on the Linux operating system.

[0046] (2) IPSec module 2

[0047] The typical implementation of IPSec module 2 is the Internet open source software FreeSWAN; FreeSWAN is a software of IPSec and Internet key exchange protocol implemented on the Linux operating system.

[0048] (3) Network protocol stack module 3

[0049] Typical representatives of the network protocol stack module 3 are network operating systems such as Windows, UNIX, and Linux.

[0050] (4) Virtual network card module 4

[0051] The virtual network card module 4 can obtain the information of the virtual network interface by checking the system interface an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a system and method for implementing VPN protocol at application layer, relating to a network communication packing method, and especially relating to a method for implementing IPSec protocol packing at system application layer; and the method can prevent IPsec message being blocked by other programs at system kernel layer, thus assuring the IPSec message smoothly passes through the system and implementing safety communication. And the system comprises VPN card module, network protocol stack module, IKE module and IPSec module, connected in series in order, where the IKE module and the IPSec module call each other, so do the IKE module and the network protocol stack module, and so do the network protocol stack module and the VPN card module. And the method encrypt and decrypt VPN message at the system application layer, thus improving the adaptability of VPN client-end system to network environments, applied to making VPN system development in Windows and Unix operating systems.

Description

technical field [0001] The present invention relates to a method for network communication encapsulation, in particular to a method for implementing IPSec protocol encapsulation at the system application layer; the method can prevent IPSec messages from being blocked by other programs at the system core layer, thereby ensuring that IPSec messages pass through the system smoothly , to achieve secure communication. Background technique [0002] With the development of the Internet, network security issues are becoming more and more prominent, especially how to use the Internet for private communication has become a hot issue. Currently, VPN technology is mainly used to solve this problem. The current mainstream VPN products will follow the standard IPSec to implement, because IPSec is a global security standard, only when IPSec strictly follows various protocol specifications can the intercommunication between VPN products of different manufacturers be realized. The IPSec pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/56H04L29/06H04L12/46
Inventor 肖凌高翠霞梅松张云鹤王景素
Owner 武汉思为同飞网络技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products