CN102811169B - Virtual private network (VPN) implementation method and system for performing multi-core parallel processing by using Hash algorithm - Google Patents

Virtual private network (VPN) implementation method and system for performing multi-core parallel processing by using Hash algorithm Download PDF

Info

Publication number
CN102811169B
CN102811169B CN201210257170.9A CN201210257170A CN102811169B CN 102811169 B CN102811169 B CN 102811169B CN 201210257170 A CN201210257170 A CN 201210257170A CN 102811169 B CN102811169 B CN 102811169B
Authority
CN
China
Prior art keywords
vpn
data message
processor core
core
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201210257170.9A
Other languages
Chinese (zh)
Other versions
CN102811169A (en
Inventor
罗俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Westone Information Industry Inc
Original Assignee
Chengdu Westone Information Industry Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Westone Information Industry Inc filed Critical Chengdu Westone Information Industry Inc
Priority to CN201210257170.9A priority Critical patent/CN102811169B/en
Publication of CN102811169A publication Critical patent/CN102811169A/en
Application granted granted Critical
Publication of CN102811169B publication Critical patent/CN102811169B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to the technical field of virtual private network (VPN), and discloses a VPN implementation method and a VPN implementation system for performing multi-core parallel processing by using a Hash algorithm. The method specifically comprises the following steps of: constructing a Hash bucket according to the number of processor cores in a VPN system, wherein the depth of the Hash bucket is equal to the number of the processor cores, and each Hash value in the Hash bucket corresponds to the number of a processor core; calculating a Hash value according to a quintuple of a received data message, and finding a corresponding processor core according to the Hash value; and transmitting the data message to the corresponding processor core for processing, wherein the quintuple comprises a source Internet protocol (IP) address, a destination IP address, a source transmission layer port, a destination transmission layer port and an IP message protocol number. Compared with the prior art, the method and the system have the advantages that the utilization efficiency of a plurality of processor cores can be greatly improved, a plurality of data streams can be encrypted and decrypted in parallel, and the high throughput of the VPN is ensured.

Description

Hash algorithm is adopted to carry out VPN realization method and the system of multi-core parallel concurrent process
Technical field
The present invention relates to VPN technologies field, particularly relate to a kind of adopt hash algorithm to carry out multi-core parallel concurrent process VPN realization method and system.
Background technology
VPN(Virtual Private Network, be called for short VPN) be the abbreviation of VPN (virtual private network), at present, Network Security Device on market has gradually adopted the multi-core platform being equipped with multiple hardware processor core, to scheme the throughput improving network data, the particularly equipment of this computation-intensive of IPSEC VPN, the introducing of multiple processor core should be very effective to raising whole system encryption and decryption transmission throughput.But effect bad in actual applications, otherwise be exactly that network card data is concentrated and sent indivedual or minority processor core to, however be exactly each data message very random pass to different processor cores.The former causes the imbalance that responsible load Distribution is serious, thus multinuclear utilance is lower, multinuclear actual change monokaryon.The latter causes data message seriously out of order, because the data encrypting and deciphering of different message length time difference used is very large, this is very unfavorable for the application higher based on reliability requirements such as TCP, can cause frequent insignificant re-transmission, and whole efficiency of transmission is sharply reduced.
Summary of the invention
For the technical problem of core utilance low and poor reliability when multinuclear process in the vpn system existed in prior art, the invention discloses a kind of VPN realization method adopting hash algorithm to carry out multi-core parallel concurrent process.Another object of the present invention is to provide a kind of vpn system adopting hash algorithm to carry out multi-core parallel concurrent process.
Object of the present invention is realized by following technical proposals:
A kind of VPN realization method adopting hash algorithm to carry out multi-core parallel concurrent process, it specifically comprises following steps: the number according to processor core in vpn system builds Hash bucket, the degree of depth of Hash bucket equals the number of processor core, a numbering of each cryptographic Hash alignment processing device core in Hash bucket, five-tuple according to the data message received calculates cryptographic Hash, and find out corresponding processor core according to cryptographic Hash, sent to by data message corresponding processor core to process; Wherein: five-tuple comprises source and destination IP address, source and destination transport layer port and IP message protocol number.
More enter a ground, above-mentioned each processor core creates separately a VPN strategy, when processor core receives data message, searches the VPN strategy that data message is corresponding, processes data message according to searching the VPN strategy obtained.
More enter a ground, said method also comprises for each cryptographic Hash distributes a fifo queue, and processor core takes out data and to go forward side by side row relax from fifo queue, and the data message after process is delivered to network interface card and sends.
More enter a ground, said method also comprises for each processor core setting data load process upper limit, this upper limit determines according to the average treatment load of the computing capability of monokaryon and multiple core, once data payload exceeds the process upper limit, transfers to the lightest core of load to process by data message.
More enter a ground, above-mentioned VPN strategy search the VPN Policy List preferentially searching present treatment device core, the VPN Policy List of other processor cores can not be searched again further one by one by matched data message.
More enter a ground, the computing formula of above-mentioned cryptographic Hash is as follows:
Wherein Hash bucket depth B D equals the number of the processor core of equipment, and data message source IP address is Sip, source port is Sport, object IP address is Dip, destination interface is Dport and protocol number is Proto.
The invention also discloses a kind of system of above-mentioned VPN realization method, described system comprises: initialization module, data distribution module, data processing module and data transmission blocks, described initialization module, data distribution module, data processing module and data transmission blocks sequentially connect, described initialization module is for building Hash bucket, and distribute a fifo queue for each cryptographic Hash, for each processor core creates independently VPN Policy List; Described data distribution module is used for the undressed data message received by network interface card, adopt hash algorithm to carry out shunting process according to the number of processor core and the five-tuple of data message, will there is the data message of same cryptographic Hash stored in same fifo queue; Described data processing module carries out encryption and decryption and the encapsulation decapsulation process of VPN; Data message after process is passed to network interface card and sends by described data transmission blocks.
Beneficial effect of the present invention: the data message of the present invention by receiving, hash algorithm is adopted to carry out shunting process according to the number of processor core and the five-tuple of data message, and maintain independently VPN Policy List for each processor core, different processor core process is given different distribution of flows, distributing a FIFO(first in first out for each cryptographic Hash simultaneously) queue to be to realize the order-preserving of same data flow data message, thus greatly can improve the utilization ratio of multi-processor core, realize multiple data stream to walk abreast encryption and decryption process, reach very high VPN throughput.
Accompanying drawing explanation
Fig. 1 is the VPN realization flow figure that employing hash algorithm that the embodiment of the present invention provides carries out multi-core parallel concurrent process.
Fig. 2 is the VPN concrete grammar that employing hash algorithm that the embodiment of the present invention provides carries out multi-core parallel concurrent process.
Fig. 3 is the structure chart that employing hash algorithm that the embodiment of the present invention provides carries out the vpn system of multi-core parallel concurrent process.
Embodiment
In order to make object of the present invention, technical scheme and advantage clearly understand, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
Fig. 1 is the VPN realization flow figure that employing hash algorithm that the embodiment of the present invention provides carries out multi-core parallel concurrent process.
The invention discloses a kind of VPN realization method adopting hash algorithm to carry out multi-core parallel concurrent process, it specifically comprises following steps: the number according to processor core in vpn system builds Hash bucket, the degree of depth of Hash bucket equals the number of processor core, a numbering of each cryptographic Hash alignment processing device core in Hash bucket, such as cryptographic Hash is the alignment processing device core 1 of 1, cryptographic Hash is the alignment processing device core 2 of 2 ..., by that analogy.Five-tuple according to the data message received calculates cryptographic Hash, and find out corresponding processor core according to cryptographic Hash, and send to processor core to process data message, wherein: five-tuple comprises source and destination IP address, source and destination transport layer port and IP message protocol number.Cryptographic Hash is calculated according to above-mentioned five-tuple.By building Hash bucket to processor core, and adopting hash algorithm to shunt data message, drastically increasing the utilization ratio of multi-processor core, realize multiple data stream and to walk abreast encryption and decryption process, reach very high VPN throughput.
Further, described each processor core creates separately a VPN strategy, when processor core receives data message, searches the VPN strategy that data message is corresponding, processes data message according to searching the VPN strategy obtained.Each processor core creates separately VPN strategy, corresponding VPN strategy can be gone out to go forward side by side row relax by fast finding after processor core receives data message, add the efficiency of parallel processing.
Further, described method also comprises for each cryptographic Hash distributes a fifo queue, and processor core takes out data and to go forward side by side row relax from fifo queue, and the data message after process is delivered to network interface card and sends.Adopt the form of queue to preserve data message, realize the order-preserving of same data flow data message, further increase the efficiency of parallel processing.
Further, for each processor core setting data load process upper limit, this upper limit determines according to the average treatment load of the computing capability of monokaryon and multiple core, once data payload exceeds the process upper limit, transfers to the lightest core of load to process by data message.Thus the data message of a massive dataflow stream can by multiple core parallel processing.
Further, described VPN strategy search the VPN Policy List preferentially searching present treatment device core, the VPN Policy List of other processor cores can not be searched again further one by one by matched data message.So also be the efficiency further increasing parallel processing.
Further, the computing formula of described cryptographic Hash can be, but not limited to
Wherein Hash bucket depth B D equals the number of the processor core of equipment, then any source IP address is Sip, source port is Sport, object IP address is Dip, destination interface be Dport and protocol number is Proto.By above-mentioned hash function, the Parameter Mapping of five-tuple is become cryptographic Hash, found the processor core of data message by cryptographic Hash.
The employing hash algorithm that Fig. 2 shows the embodiment of the present invention to be provided carries out the concrete grammar of multi-core parallel concurrent process, and details are as follows:
In step s 201, build Hash bucket according to processor core number, for each processor core creates independently VPN Policy List, and distribute a FIFO(first in first out according to the degree of depth (number corresponding to processor) of Hash bucket for each cryptographic Hash) queue.
In step S202, when network interface card interrupts occurring, the data message that network interface card receives adopts hash algorithm to carry out shunting process according to the five-tuple (source and destination IP address, source and destination transport layer port and IP message protocol number) of the number of processor core and data message, gives different processor core process different distribution of flows.
In step S203, each processor is verified and is looked for VPN Policy List, processes data message according to searching the VPN strategy obtained.(preferentially search the VPN Policy List of present treatment device core, can not matched data message search the VPN Policy List of other processor cores more further one by one)
In step S204, each processor core, according to the principle of first in first out, takes out the data message processed and is delivered to network interface card and sends from the fifo queue of correspondence.
Fig. 3 is the structure chart that employing hash algorithm that the embodiment of the present invention provides carries out the vpn system of multi-core parallel concurrent process.
The invention also discloses a kind of vpn system adopting hash algorithm to carry out multi-core parallel concurrent process, described system comprises: initialization module 321, data distribution module 322, data processing module 323 and data transmission blocks 324, described initialization module 321, data distribution module 322, data processing module 323 and data transmission blocks 324 sequentially connect, described initialization module 321 builds Hash bucket for the number according to processor core, the degree of depth of Hash bucket corresponds to the number of processor core, for each cryptographic Hash distributes a FIFO(first in first out) queue, and create independently VPN Policy List for each processor core, described data distribution module, for the undressed data message that network interface card is received, hash algorithm is adopted to carry out shunting process according to the number of processor core and the five-tuple (source and destination IP address, source and destination transport layer port and IP message protocol number) of data message, the data message with same cryptographic Hash is labeled as " untreated " stored in same fifo queue, thus gives different processor core process different distribution of flows.If the load of this processor core has exceeded the process upper limit (this upper limit determines according to the average treatment load of the computing capability of monokaryon and multiple core), this data message pointer is passed to the lightest processor core of load by the mode then by interrupting between processor, processed by this processor core, but still it is constant in the order of former fifo queue to maintain this data message.
Data message is shunted and is carried out encryption and decryption and the encapsulation decapsulation process of IPSEC VPN after marking by data processing module.Each processor core can run the data processing module of a same code, data message is taken out for the fifo queue from correspondence, and search VPN strategy IPSEC encryption and decryption and process such as encapsulation decapsulation etc. are carried out to it, the data message be disposed is labeled as " processed ".Each processor core is also accepted and processes the data message of the core of the overload of being come by interrupt delivery between processor.
Finally according to the principle of first in first out and the mode of poll, the data message being labeled as " processed " in each fifo queue is passed to network interface card by data transmission blocks to send.
Here sub to invention has been detailed description by specific embodiment, there is provided the description of above-described embodiment in order to make those skilled in the art manufacture or be suitable for the present invention, the various amendments of these embodiments are easy understand for a person skilled in the art.The present invention is not limited to these examples, or some aspect wherein.Scope of the present invention is described in detail by additional claim.
Above-mentioned explanation illustrate and describes a preferred embodiment of the present invention, but as previously mentioned, be to be understood that the present invention is not limited to the form disclosed by this paper, should not regard the eliminating to other embodiments as, and can be used for other combinations various, amendment and environment, and can in invention contemplated scope described herein, changed by the technology of above-mentioned instruction or association area or knowledge.And the change that those skilled in the art carry out and change do not depart from the spirit and scope of the present invention, then all should in the protection range of claims of the present invention.

Claims (5)

1. the VPN realization method adopting hash algorithm to carry out multi-core parallel concurrent process, it specifically comprises following steps: the number according to processor core in vpn system builds Hash bucket, the degree of depth of Hash bucket equals the number of processor core, a numbering of each cryptographic Hash alignment processing device core in Hash bucket, five-tuple according to the data message received calculates cryptographic Hash, and find out corresponding processor core according to cryptographic Hash, sent to by data message corresponding processor core to process; Wherein: five-tuple comprises source and destination IP address, source and destination transport layer port and IP message protocol number; Each described processor core creates separately a VPN strategy, when processor core receives data message, searches the VPN strategy that data message is corresponding, processes data message according to searching the VPN strategy obtained; Described VPN strategy search the VPN Policy List preferentially searching present treatment device core, the VPN Policy List of other processor cores can not be searched again further one by one by matched data message.
2. the VPN realization method adopting hash algorithm to carry out multi-core parallel concurrent process as claimed in claim 1, it is characterized in that described method also comprises for each cryptographic Hash distributes a fifo queue, processor core takes out data and to go forward side by side row relax from fifo queue, and the data message after process is delivered to network interface card and sends.
3. the VPN realization method adopting hash algorithm to carry out multi-core parallel concurrent process as claimed in claim 1, it is characterized in that described method also comprises for each processor core setting data load process upper limit, this upper limit determines according to the average treatment load of the computing capability of monokaryon and multiple core, once data payload exceeds the process upper limit, the lightest core of load is transferred to process by data message.
4. the employing hash algorithm as described in any one claim of claim 1-3 carries out the VPN realization method of multi-core parallel concurrent process, it is characterized in that the computing formula of described cryptographic Hash is as follows:
Wherein Hash bucket depth B D equals the number of the processor core of equipment, and data message source IP address is Sip, source port is Sport, object IP address is Dip, destination interface is Dport and protocol number is Proto.
5. one kind realizes the system of VPN realization method described in any one claim of claim 1-4, it is characterized in that described system comprises: initialization module, data distribution module, data processing module and data transmission blocks, described initialization module, data distribution module, data processing module and data transmission blocks sequentially connect, described initialization module is for building Hash bucket, and distribute a fifo queue for each cryptographic Hash, for each processor core creates independently VPN Policy List; Described data distribution module is used for the undressed data message received by network interface card, adopt hash algorithm to carry out shunting process according to the number of processor core and the five-tuple of data message, will there is the data message of same cryptographic Hash stored in same fifo queue; Described data processing module carries out encryption and decryption and the encapsulation decapsulation process of VPN; Data message after process is passed to network interface card and sends by described data transmission blocks.
CN201210257170.9A 2012-07-24 2012-07-24 Virtual private network (VPN) implementation method and system for performing multi-core parallel processing by using Hash algorithm Expired - Fee Related CN102811169B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210257170.9A CN102811169B (en) 2012-07-24 2012-07-24 Virtual private network (VPN) implementation method and system for performing multi-core parallel processing by using Hash algorithm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210257170.9A CN102811169B (en) 2012-07-24 2012-07-24 Virtual private network (VPN) implementation method and system for performing multi-core parallel processing by using Hash algorithm

Publications (2)

Publication Number Publication Date
CN102811169A CN102811169A (en) 2012-12-05
CN102811169B true CN102811169B (en) 2015-05-27

Family

ID=47234748

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210257170.9A Expired - Fee Related CN102811169B (en) 2012-07-24 2012-07-24 Virtual private network (VPN) implementation method and system for performing multi-core parallel processing by using Hash algorithm

Country Status (1)

Country Link
CN (1) CN102811169B (en)

Families Citing this family (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103049336A (en) * 2013-01-06 2013-04-17 浪潮电子信息产业股份有限公司 Hash-based network card soft interrupt and load balancing method
CN103414556B (en) * 2013-08-16 2016-06-01 成都卫士通信息产业股份有限公司 A kind of IKE key consulting tactical lookup method
CN104734993B (en) * 2013-12-24 2018-05-18 杭州华为数字技术有限公司 Data distribution method and current divider
CN105337896A (en) * 2014-07-25 2016-02-17 华为技术有限公司 Message processing method and device
CN105589829A (en) * 2014-09-15 2016-05-18 华为技术有限公司 Data processing method based on multi-core processor chip, device and system
CN105159779B (en) * 2015-08-17 2020-03-13 深圳中兴网信科技有限公司 Method and system for improving data processing performance of multi-core CPU
CN105939312A (en) * 2015-08-26 2016-09-14 杭州迪普科技有限公司 Data transmission method and device
CN105975433B (en) * 2016-06-30 2019-04-19 瑞斯康达科技发展股份有限公司 A kind of message processing method and device
CN107846364A (en) * 2016-09-19 2018-03-27 阿里巴巴集团控股有限公司 A kind for the treatment of method and apparatus of message
CN106899512A (en) * 2017-02-15 2017-06-27 北京浩瀚深度信息技术股份有限公司 Multi engine realization method and system based on DPI in FPGA
CN107483362A (en) * 2017-07-11 2017-12-15 郑州云海信息技术有限公司 A kind of method for dispatching message based on shift register
CN109327405B (en) * 2017-07-31 2022-08-12 迈普通信技术股份有限公司 Message order-preserving method and network equipment
CN107707479B (en) * 2017-10-31 2021-08-31 北京锐安科技有限公司 Five-tuple rule searching method and device
CN108306832B (en) * 2018-01-29 2021-07-27 北京启明星辰信息安全技术有限公司 Network traffic shunting method and device
CN108667733A (en) * 2018-03-29 2018-10-16 新华三信息安全技术有限公司 A kind of network equipment and message processing method
CN108718259B (en) * 2018-05-30 2020-07-03 新华三信息安全技术有限公司 Message processing method and multi-core processor
CN109062684A (en) * 2018-07-04 2018-12-21 南京南大光电工程研究院有限公司 A kind of real-time dynamic self-adapting dynamic load balancing method of release of the hardware of multi-core processor
CN110650020B (en) * 2019-09-25 2022-05-10 天津市滨海新区信息技术创新中心 Mimicry fuzzy decision method, device and system
CN110601950B (en) * 2019-10-08 2021-06-01 河南省云安大数据安全防护产业技术研究院有限公司 VPN gateway system based on DTLS protocol and implementation method
CN111669374B (en) * 2020-05-25 2022-05-27 成都安恒信息技术有限公司 Encryption and decryption performance expansion method for single tunnel software of IPsec VPN
CN112383480B (en) * 2020-10-29 2022-11-04 曙光网络科技有限公司 Flow table processing method and device, monitoring device and storage medium
CN112714069A (en) * 2021-01-06 2021-04-27 上海交通大学 Method for lowering shunting module to network card hardware in IPSec security gateway environment
CN113347230B (en) * 2021-05-13 2022-09-06 长沙星融元数据技术有限公司 Load balancing method, device, equipment and medium based on programmable switch
CN113296705B (en) * 2021-05-27 2022-09-27 浙江萤火虫区块链科技有限公司 Framework system for parallel computing Poseido Hash in Filecin
CN113626160B (en) * 2021-07-07 2023-03-24 厦门市美亚柏科信息股份有限公司 Network data packet high-concurrency processing method and system based on cavium processor
CN113504989A (en) * 2021-07-08 2021-10-15 山东科技大学 Multi-core parallel processing method for near-bottom multi-beam orthogonal demodulation processing
CN116016035B (en) * 2023-02-16 2023-06-13 北京天维信通科技有限公司 Method for applying multipath service in same tunnel by utilizing quintuple

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102483707A (en) * 2009-06-22 2012-05-30 思杰系统有限公司 Systems and methods for retaining source ip in a load balancing mutli-core environment

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8452835B2 (en) * 2009-12-23 2013-05-28 Citrix Systems, Inc. Systems and methods for object rate limiting in multi-core system
CN101964749A (en) * 2010-09-21 2011-02-02 北京网康科技有限公司 Message retransmission method and system based on multi-core architecture
CN102104544B (en) * 2011-01-25 2012-06-20 无锡网芯科技有限公司 Order preserving method for fragmented message flow in IP (Internet Protocol) tunnel of multi-nuclear processor with accelerated hardware

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102483707A (en) * 2009-06-22 2012-05-30 思杰系统有限公司 Systems and methods for retaining source ip in a load balancing mutli-core environment

Also Published As

Publication number Publication date
CN102811169A (en) 2012-12-05

Similar Documents

Publication Publication Date Title
CN102811169B (en) Virtual private network (VPN) implementation method and system for performing multi-core parallel processing by using Hash algorithm
EP3603003B1 (en) Hardware-accelerated secure communication management
US20200356699A1 (en) Security plugin for a system-on-a-chip platform
CN105763557B (en) Exchange chip or NP cooperate with the method and system for completing message IPSEC encryption with CPU
US8474034B2 (en) Method and apparatus for fast check and update of anti-replay window without bit-shifting in internet protocol security
US8327129B2 (en) Method, apparatus and system for internet key exchange negotiation
US11372684B2 (en) Technologies for hybrid field-programmable gate array application-specific integrated circuit code acceleration
US11509638B2 (en) Receive-side processing for encapsulated encrypted packets
CN101051891A (en) Method and device for safety strategy uniformly treatment in safety gateway
Ozmen et al. Dronecrypt-an efficient cryptographic framework for small aerial drones
KR20150013041A (en) Network interface card with virtual switch and traffic flow policy enforcement
CN101834840A (en) Efficient key derivation for end-to-end network security with traffic visibility
CN1747380A (en) The block encryption data are decrypted
Kim et al. A case for smartnic-accelerated private communication
Bays et al. A heuristic-based algorithm for privacy-oriented virtual network embedding
CN102065021A (en) IPSecVPN (Internet Protocol Security Virtual Private Network) realizing system and method based on NetFPGA (Net Field Programmable Gate Array)
US20050063543A1 (en) Hardware acceleration for Diffie Hellman in a device that integrates wired and wireless L2 and L3 switching functionality
CN115174482B (en) Message distribution method and device of network equipment
CN116260579A (en) Message encryption and decryption method for IP packet
US10951520B2 (en) SDN, method for forwarding packet by SDN, and apparatus
CN115314195A (en) Method for realizing high-speed IPSec by using network card with password function
US10958620B1 (en) Systems and methods for improving packet forwarding throughput for encapsulated tunnels
CN103227742A (en) Method for IPSec (Internet protocol security) tunnel to rapidly process messages
CN106658490B (en) A kind of wireless sensor network homomorphic cryptography method for secret protection
CN114039795B (en) Software defined router and data forwarding method based on same

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150527

Termination date: 20210724

CF01 Termination of patent right due to non-payment of annual fee