CN102891848B - Ipsec security alliance is utilized to be encrypted the method for deciphering - Google Patents

Ipsec security alliance is utilized to be encrypted the method for deciphering Download PDF

Info

Publication number
CN102891848B
CN102891848B CN201210360662.0A CN201210360662A CN102891848B CN 102891848 B CN102891848 B CN 102891848B CN 201210360662 A CN201210360662 A CN 201210360662A CN 102891848 B CN102891848 B CN 102891848B
Authority
CN
China
Prior art keywords
message
compartment wall
fire compartment
address
opposite equip
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201210360662.0A
Other languages
Chinese (zh)
Other versions
CN102891848A (en
Inventor
陈海滨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Opzoon Technology Co Ltd
Original Assignee
Opzoon Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Opzoon Technology Co Ltd filed Critical Opzoon Technology Co Ltd
Priority to CN201210360662.0A priority Critical patent/CN102891848B/en
Publication of CN102891848A publication Critical patent/CN102891848A/en
Application granted granted Critical
Publication of CN102891848B publication Critical patent/CN102891848B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention provides a kind of method utilizing ipsec security alliance to be encrypted deciphering, at least one local device sends message to opposite equip., and the method comprises: A, local device send message to the first fire compartment wall of local terminal; B, the first fire compartment wall receive message, utilize ipsec security alliance to be encrypted message, and encrypted message are sent to the second fire compartment wall of opposite end; After C, the second fire compartment wall receive encrypted message, carry out searching of ipsec security alliance according to the type of security protocol of encrypted message and Security Parameter Index, and by the ipsec security alliance found, encrypted message is decrypted, obtain decrypted message; D, the second fire compartment wall create mapping relations table, and decrypted message are sent to described opposite equip..Present invention achieves when multiple local device sends message respectively to an opposite equip., the fire compartment wall of opposite equip. returns back message according to mapping relations respectively to multiple local device.

Description

Ipsec security alliance is utilized to be encrypted the method for deciphering
Technical field
The present invention relates to communication technical field, particularly a kind of method utilizing ipsec security alliance to be encrypted deciphering.
Background technology
Internet protocol security (IPSec, InternetProtocolSecurity) is a kind of security protocol of extensive use in network service.In the application of this agreement, carrying out information transmission between two equipment needs to set up the encrypting and decrypting process of ipsec security alliance for information, to guarantee the safe transfer of information.When multiple equipment sends information respectively to an equipment, when an equipment receives information and returns echo message respectively to multiple equipment, echo message can be caused not corresponding with multiple equipment, easily cause entanglement.
Summary of the invention
(1) technical problem solved
The invention solves multiple local device and send message respectively to an opposite equip., an opposite equip. returns the technical problem of back message respectively to multiple local device.
(2) technical scheme
The present invention proposes a kind of method utilizing ipsec security alliance to be encrypted deciphering, it is characterized in that, at least one local device sends message to opposite equip., and described method comprises:
A, local device send message to the first fire compartment wall of local terminal;
B, the first fire compartment wall receive message, utilize ipsec security alliance to be encrypted message, and encrypted message are sent to the second fire compartment wall of opposite end;
After C, the second fire compartment wall receive encrypted message, carry out searching of ipsec security alliance according to the type of security protocol of encrypted message and Security Parameter Index, and by the ipsec security alliance found, encrypted message is decrypted, obtain decrypted message;
D, the second fire compartment wall create mapping relations table, and decrypted message are sent to described opposite equip..
Preferably, described in steps A, message comprises: local device address and opposite equip. address.
Preferably, described in step B, encrypted message comprises: the first fire compartment wall address and the second fire compartment wall address.
Preferably, described in step C, decrypted message comprises: local device address and opposite equip. address.
Preferably, the table of mapping relations described in step D comprises the corresponding relation of local device address, opposite equip. address, the first fire compartment wall address, the second fire compartment wall address and ipsec security alliance.
Preferably, step D opposite equip. also comprises after receiving decrypted message:
E, opposite equip. send back message to the second fire compartment wall, and described back message comprises opposite equip. address and local device address;
The back message received mates with mapping relations table by F, the second fire compartment wall, obtains the first fire compartment wall address corresponding with the opposite equip. address in back message and local device address and the second fire compartment wall address, ipsec security alliance;
G, utilize described ipsec security alliance to be encrypted back message, after encryption, back message comprises the first fire compartment wall address and the second fire compartment wall address, and encryption back message is sent to the first fire compartment wall;
H, the first fire compartment wall utilize ipsec security alliance to be decrypted encryption back message after receiving encryption back message, and deciphering back message is sent to local device.
Preferably, when the back message received being mated with mapping relations table in step F, mate with mapping relations table again after opposite equip. address in back message and local device address are exchanged.
(3) beneficial effect
The message encryption of the present invention by multiple local device is sent respectively to an opposite equip., and the fire compartment wall of opposite equip. is after deciphering message, create mapping relations table, achieve when multiple local device sends message respectively to an opposite equip., the fire compartment wall of opposite equip. returns back message according to mapping relations respectively to multiple local device.
Accompanying drawing explanation
Fig. 1 is that the ipsec security alliance that utilizes that the present invention proposes is encrypted the method flow diagram of deciphering.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described.
Embodiment 1
The present invention proposes a kind of method utilizing ipsec security alliance to be encrypted deciphering, it is characterized in that, at least one local device sends message to opposite equip., and described method comprises:
A, local device send message to the first fire compartment wall of local terminal;
B, the first fire compartment wall receive message, utilize ipsec security alliance to be encrypted message, and encrypted message are sent to the second fire compartment wall of opposite end;
After C, the second fire compartment wall receive encrypted message, carry out searching of ipsec security alliance according to the type of security protocol of encrypted message and Security Parameter Index SPI, and by the ipsec security alliance found, encrypted message is decrypted, obtain decrypted message;
D, the second fire compartment wall create mapping relations table, and decrypted message are sent to described opposite equip..
Embodiment 2
The present embodiment includes all the elements of embodiment 1, in addition, is further defined to by message described in steps A and comprises: local device address and opposite equip. address.
Described in step B, encrypted message comprises: the first fire compartment wall address and the second fire compartment wall address.Message encryption is carried (EncapsulatingSecurityPayload, ESP)/certification header (AuthenticationHeader, AH) message for encapsulation safety is clean by the first fire compartment wall.
Described in step C, decrypted message comprises: local device address and opposite equip. address.After the second fire compartment wall receives ESP/AH message, the IPSecSA(IPsec Security Association on server is searched) according to the type of security protocol (AH agreement or ESP agreement) of message and Security Parameter Index, after finding, utilize ipsec security alliance to be decrypted by encrypted message, and send to opposite equip..
The table of mapping relations described in step D comprises: the corresponding relation of local device address and opposite equip. address, the first fire compartment wall address and the second fire compartment wall address, ipsec security alliance.After encrypted message is deciphered, form mapping relations table, and decrypted message is sent to opposite equip..
Step D opposite equip. also comprises after receiving decrypted message:
E, opposite equip. send back message to the second fire compartment wall, and described back message comprises opposite equip. address and local device address;
The back message received mates with mapping relations table by F, the second fire compartment wall, obtains the first fire compartment wall address corresponding with the opposite equip. address in back message and local device address and the second fire compartment wall address, ipsec security alliance;
G, utilize described ipsec security alliance to be encrypted back message, after encryption, back message comprises the first fire compartment wall address and the second fire compartment wall address, and encryption back message is sent to the first fire compartment wall;
H, the first fire compartment wall utilize ipsec security alliance to be decrypted encryption back message after receiving encryption back message, and deciphering back message is sent to local device.
When the back message received being mated with mapping relations table in step F, mate with mapping relations table again after opposite equip. address in back message and local device address are exchanged.Owing to being back message, therefore in back message, opposite equip. address and local device address need to exchange, after exchanging and mapping relations table mate.
Embodiment 3
The present embodiment utilizes concrete IP address to carry out a kind of method utilizing ipsec security alliance to be encrypted deciphering of more specific detail, and specific embodiment is as follows:
Pc1-------------first fire compartment wall------------the second fire compartment wall------------Pc2
Client Pc1 sends message, wherein, through the first fire compartment wall (Firewall, fw) and the second fire compartment wall to client Pc2.
The local device IP2 address 1.1.1.1 of Pc1 sends the opposite equip. IP2 address 2.2.2.2 of message to pc2.
Now message structure is:
When needing to be encrypted as ESP message by IPSecSA through the first fire compartment wall, the IP1 address of the first fire compartment wall is 192.168.1.1 to the IP1 address of the second fire compartment wall is 192.168.1.2
Message structure after first fire compartment wall encryption is:
Second fire compartment wall receives rear and carries out searching of IPSecSA according to the Security Parameter Index in message ESP and ESP type of security protocol, and is decrypted by the IPSecSA found, and create mapping relations table after successful decryption, mapping relations table is as follows:
1, IP address: IP1(src192.168.1.1/dst192.168.1.2 after encryption)
2, ipsec security alliance: IPSecSA
3, IP address: IP2(src1.1.1.1/dst2.2.2.2 after deciphering)
Carried out being transmitted to Pc2 by message after deciphering after deciphering, now message structure is:
Pc2 sends back message after obtaining message, and message format is as follows:
Second fire compartment wall mates IP address: IP2(src1.1.1.1/dst2.2.2.2 after the deciphering in mapping relations table after receiving back message), src1.1.1.1 and dst2.2.2.2 is needed to carry out exchanging coupling during coupling, just according to the ipsec security alliance in table, back message is encrypted after matching, back message after encryption comprises the first fire compartment wall address and the second fire compartment wall address, back message after encryption is sent to the first fire compartment wall, forwards the packet to Pc1 after the first fire compartment wall deciphering.
Above execution mode is only for illustration of the present invention; and be not limitation of the present invention; the those of ordinary skill of relevant technical field; without departing from the spirit and scope of the present invention; can also make a variety of changes and modification; therefore all equivalent technical schemes also belong to category of the present invention, and scope of patent protection of the present invention should be defined by the claims.

Claims (5)

1. utilize ipsec security alliance to be encrypted a method for deciphering, it is characterized in that, at least one local device sends message to opposite equip., and described method comprises:
A, local device send message to the first fire compartment wall of local terminal;
B, the first fire compartment wall receive message, utilize ipsec security alliance to be encrypted message, and encrypted message are sent to the second fire compartment wall of opposite end;
After C, the second fire compartment wall receive encrypted message, carry out searching of ipsec security alliance according to the type of security protocol of encrypted message and Security Parameter Index, and by the ipsec security alliance found, encrypted message is decrypted, obtain decrypted message;
D, the second fire compartment wall create mapping relations table, and decrypted message are sent to described opposite equip.;
The table of mapping relations described in step D comprises the corresponding relation of local device address, opposite equip. address, the first fire compartment wall address, the second fire compartment wall address and ipsec security alliance;
Step D opposite equip. also comprises after receiving decrypted message:
E, opposite equip. send back message to the second fire compartment wall, and described back message comprises opposite equip. address and local device address;
The back message received mates with mapping relations table by F, the second fire compartment wall, obtains the first fire compartment wall address corresponding with the opposite equip. address in back message and local device address and the second fire compartment wall address, ipsec security alliance;
G, utilize described ipsec security alliance to be encrypted back message, after encryption, back message comprises the first fire compartment wall address and the second fire compartment wall address, and encryption back message is sent to the first fire compartment wall;
H, the first fire compartment wall utilize ipsec security alliance to be decrypted encryption back message after receiving encryption back message, and deciphering back message is sent to local device.
2. method according to claim 1, is characterized in that, described in steps A, message comprises: local device address and opposite equip. address.
3. method according to claim 1, is characterized in that, described in step B, encrypted message comprises: the first fire compartment wall address and the second fire compartment wall address.
4. method according to claim 1, is characterized in that, described in step C, decrypted message comprises: local device address and opposite equip. address.
5. method according to claim 1, is characterized in that, when being mated with mapping relations table by the back message received in step F, mates after being exchanged in opposite equip. address in back message and local device address with mapping relations table again.
CN201210360662.0A 2012-09-25 2012-09-25 Ipsec security alliance is utilized to be encrypted the method for deciphering Expired - Fee Related CN102891848B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210360662.0A CN102891848B (en) 2012-09-25 2012-09-25 Ipsec security alliance is utilized to be encrypted the method for deciphering

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210360662.0A CN102891848B (en) 2012-09-25 2012-09-25 Ipsec security alliance is utilized to be encrypted the method for deciphering

Publications (2)

Publication Number Publication Date
CN102891848A CN102891848A (en) 2013-01-23
CN102891848B true CN102891848B (en) 2015-12-02

Family

ID=47535215

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210360662.0A Expired - Fee Related CN102891848B (en) 2012-09-25 2012-09-25 Ipsec security alliance is utilized to be encrypted the method for deciphering

Country Status (1)

Country Link
CN (1) CN102891848B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103220273B (en) * 2013-03-19 2016-01-06 汉柏科技有限公司 A kind of method and system of CPU fast-forwarding message
CN103227742B (en) * 2013-03-26 2015-09-16 汉柏科技有限公司 A kind of method of ipsec tunnel fast processing message
CN104168106A (en) * 2013-05-20 2014-11-26 鸿富锦精密工业(深圳)有限公司 Data transmission system, data sending terminal and data receiving terminal
CN103516574A (en) * 2013-09-26 2014-01-15 汉柏科技有限公司 Message encrypting method through virtual interfaces
CN107342964B (en) * 2016-04-28 2019-05-07 华为技术有限公司 A kind of message parsing method and equipment
CN109639721B (en) * 2019-01-08 2022-02-22 郑州云海信息技术有限公司 IPsec message format processing method, device, equipment and storage medium
CN110430111B (en) * 2019-06-26 2022-07-26 厦门网宿有限公司 OpenVPN data transmission method and VPN server
CN112600802B (en) * 2020-12-04 2022-04-15 苏州盛科通信股份有限公司 SRv6 encrypted message and SRv6 message encryption and decryption methods and devices

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1574839A (en) * 2003-06-06 2005-02-02 微软公司 Multi-layered firewall architecture
CN102281180A (en) * 2011-07-14 2011-12-14 冶金自动化研究设计院 Virtual network interface card (NIC) communication device applied in mutual communication of terminals in different local area networks

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101471936B (en) * 2007-12-29 2012-08-08 华为技术有限公司 Method, device and system for establishing IP conversation

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1574839A (en) * 2003-06-06 2005-02-02 微软公司 Multi-layered firewall architecture
CN102281180A (en) * 2011-07-14 2011-12-14 冶金自动化研究设计院 Virtual network interface card (NIC) communication device applied in mutual communication of terminals in different local area networks

Also Published As

Publication number Publication date
CN102891848A (en) 2013-01-23

Similar Documents

Publication Publication Date Title
CN102891848B (en) Ipsec security alliance is utilized to be encrypted the method for deciphering
US10601594B2 (en) End-to-end service layer authentication
CN107018134B (en) Power distribution terminal safety access platform and implementation method thereof
CN102882789B (en) A kind of data message processing method, system and equipment
EP3213486B1 (en) Device to device communication between user equipments
CN107104977B (en) Block chain data secure transmission method based on SCTP
JP2006121510A (en) Encryption communications system
CN102035845B (en) Switching equipment for supporting link layer secrecy transmission and data processing method thereof
CN111756529B (en) Quantum session key distribution method and system
CN107147666A (en) The method of data encrypting and deciphering between internet-of-things terminal and cloud data platform
CN104219217A (en) SA (security association) negotiation method, device and system
CN105516062B (en) Method for realizing L2 TP over IPsec access
CN101707767B (en) Data transmission method and devices
CN102571790B (en) A kind of method and apparatus of the encrypted transmission for realize target file
CN111756528B (en) Quantum session key distribution method, device and communication architecture
CN103227742B (en) A kind of method of ipsec tunnel fast processing message
CN101521667B (en) Method and device for safety data communication
KR20180130203A (en) APPARATUS FOR AUTHENTICATING IoT DEVICE AND METHOD FOR USING THE SAME
CN109344639A (en) A kind of distribution automation double protection safety chip, data transmission method and equipment
KR100948604B1 (en) Security method of mobile internet protocol based server
CN105025472A (en) Method and system for encrypting, hiding and discovering of WIFI access point
CN104184646A (en) VPN data interaction method and system and VPN data interaction device
US20160366191A1 (en) Single Proxies in Secure Communication Using Service Function Chaining
CN110035061A (en) Trust server information processing method and system
CN104335621B (en) Association identification communication device and association identification communication means

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
PP01 Preservation of patent right

Effective date of registration: 20180823

Granted publication date: 20151202

PP01 Preservation of patent right
PD01 Discharge of preservation of patent

Date of cancellation: 20210823

Granted publication date: 20151202

PD01 Discharge of preservation of patent
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20151202

Termination date: 20180925

CF01 Termination of patent right due to non-payment of annual fee