CN108134794A - A kind of method of business datum encrypted transmission in intelligence manufacture Internet of Things based on GRE and IPSEC - Google Patents
A kind of method of business datum encrypted transmission in intelligence manufacture Internet of Things based on GRE and IPSEC Download PDFInfo
- Publication number
- CN108134794A CN108134794A CN201711428884.0A CN201711428884A CN108134794A CN 108134794 A CN108134794 A CN 108134794A CN 201711428884 A CN201711428884 A CN 201711428884A CN 108134794 A CN108134794 A CN 108134794A
- Authority
- CN
- China
- Prior art keywords
- things
- business datum
- intelligence manufacture
- control platform
- ipsec
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4633—Interconnection of networks using encapsulation techniques, e.g. tunneling
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0272—Virtual private networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0485—Networking architectures for enhanced packet encryption processing, e.g. offloading of IPsec packet processing or efficient security association look-up
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The present invention is a kind of method of business datum encrypted transmission in intelligence manufacture Internet of Things based on GRE and IPSEC, the vpn tunneling of generic route encapsulation is configured in intelligence manufacture Internet of Things between two traffic-carrying devices of business datum control platform and client device, communication in intelligence manufacture Internet of Things between two traffic-carrying devices of business datum control platform and client device, including operational order and data acquisition information, all it is encapsulated in gre tunneling.Meanwhile configuring negotiation goes out IPSEC tunnels between two traffic-carrying devices of business datum control platform and client device in intelligence manufacture Internet of Things, the communication bag on gre tunneling will pass through the encryption and decryption process of IPSEC.The present invention can realize the relative safety of business data transmission in intelligence manufacture Internet of Things, and moderate cost, versatile, easy to spread.
Description
Technical field
The present invention is to be related to data encryption communication field, specifically a kind of intelligence manufacture object based on GRE and IPSEC
The method of business datum encrypted transmission in connection.
Background technology
Business data transmission main task is to rely on isomery in complicated manufacturing industry Internet of Things to mix net in intelligence manufacture Internet of Things
Dynamic Manufacturing information involved in manufacturing process complexity workshop condition is such as operated employee, in product, material by the seamless union of network
Deng location information and status information, the processing technology information of workpiece and quality information, the modal information and work information of equipment
The timely transmitting task of carry out is waited, realizes full manufacturing process actual time safety data transmission.Due to intelligence manufacture technology of Internet of things
Core and basis be industry internet technology, be product of the industry internet technology in manufacture field strengthened research, cover
Each level technologies such as computer, communication, automation, Industrial Engineering, information management, be related to industrial sensor, RFID label tag,
RFID reader, one-dimensional Quick Response Code, AGV trolleies, detection monitoring network, intelligent terminal, middleware, increment calculates and information service
The safety problems such as the correlation software and hardware product such as platform, virus attack, hacker attacks and unauthorized access also can be in intelligence manufacture Internet of Things
Occur in net, the danger and influence brought is almost unimaginable.Once attacker successfully invades intelligence manufacture Internet of Things safety
Center or data center, it is possible to the relevant important information such as core technology and classified information is stolen or destroys, it will be to manufacturing industry
Enterprise's production run and national process industry economic security cause major hidden danger.Therefore, intelligence manufacture Internet of Things innovation and development is closed
National manufacturing industry data safety and future economy social orientation, wherein business datum safe transmission are to ensure that intelligence manufacture
Decision, supervision, operation, the vital step for servicing effective simultaneously safe and feasible in Internet of Things development.
" Internet protocol safety (IPSec) " is a kind of frame structure of open standard, by using encrypted peace
Full service communication of safety to ensure to be maintained secrecy on Internet protocol (IP) network.IPSec (Internet
Protocol Security) be safe networking long-term direction.It by end-to-end safety come the protection of active is provided with
Prevent dedicated network and the attack of Internet.In the communications, only sender and reception uniquely have to be understood that IPSec is protected just now
Shield.IPSec defines the security service used in internetwork layer, and function includes data ciphering and deciphering, the access to network element
Control, data integrity inspection and prevents Replay Attack at data source address verification.
GRE (Generic Routing Encapsulation) i.e. Generic Routing Encapsulations, are VPN third layer tunnels
Agreement employs one kind between protocol layer and is referred to as Tunnel(Tunnel)Technology, be to certain network layer protocols(Such as
IPv4, IPv6, MPLS etc.)Data packet be packaged, the data packet for enabling these packed is transmitted in IPv4 networks.
The method of Internet of Things data encrypted transmission is varied at present, and it is real to have plenty of the enciphering and deciphering algorithm based on privately owned exploitation
Existing, versatility is not high, it is not easy to promote;Have plenty of based on quantum key encryption and decryption, need extremely expensive quantum key distribution
Equipment, cost are too high.It is therefore desirable to provide a kind of method of intelligence manufacture internet of things service Data Encryption Transmission, cost is fitted
In, it is versatile, it is easy to spread.
Invention content
The technical problem to be solved in the present invention is to provide business numbers in a kind of intelligence manufacture Internet of Things based on GRE and IPSEC
According to the method for encrypted transmission, this kind of method can realize in intelligence manufacture Internet of Things business datum control platform and client device it
Between data communication encryption, ensure that the safety of Content of communciation.
In order to solve the above technical problems, the technical solution adopted by the present invention is:
A kind of method of business datum encrypted transmission in intelligence manufacture Internet of Things based on GRE and IPSEC, it is characterized in that:Including intelligence
Business data transmission equipment in Internet of Things can be manufactured, the business data transmission equipment includes business datum in intelligence manufacture Internet of Things
Control platform and client device;
Business datum control platform can send acquisition information operational order to client device in the intelligence manufacture Internet of Things,
And receive the data that client device is sent to acquisition;
The client device can receive the acquisition information operation that business datum control platform is sent in intelligence manufacture Internet of Things
Order, and perform, the data of acquisition are finally sent to business datum control platform in intelligence manufacture Internet of Things;
Business datum control platform is connected with client device by public network data-signal in the intelligence manufacture Internet of Things;It is described
Public network be carry in intelligence manufacture Internet of Things the gre tunneling established between business datum control platform and client device and
The Ethernet in IPSEC tunnels;
The method of the business datum encrypted transmission is specific as follows:
Step 1:Business datum control platform sends acquisition information operational order to client device in intelligence manufacture Internet of Things;
Step 2:Business datum control platform will be in the acquisition information operational order encapsulation described in step 1 in intelligence manufacture Internet of Things
Gre tunneling head and IP heads;
Step 3:In intelligence manufacture Internet of Things business datum control platform by step 2 treated data carry out IPSEC certifications and plus
It is close;
Step 4:Business datum control platform is by IPSEC certifications in step 3 and encrypted acquisition information in intelligence manufacture Internet of Things
Operational order carries out network transmission by public network;
Step 5:Client device receives the acquisition information operational order by above step transmission, and use and intelligence manufacture object
The IPSEC authenticated encryptions key and hash computational algorithm that business datum control platform consults in connection are to acquiring information operational order
It is authenticated and decrypts;
Step 6:Client device carries out solution GRE encapsulation process to IPSEC certifications and the message that passes through of decryption, peel off IP with
GRE heads;
Step 7:Client device reads and performs acquisition information operational order;
Step 8:The data that client device is acquired to business datum control platform forwarding step 7;
Step 9:The data acquired described in step 8 are encapsulated upper gre tunneling head and IP heads by client device;
Step 10:Client device uses the IPSEC certifications consulted with business datum control platform in intelligence manufacture Internet of Things to add
Key and the data of hash computational algorithm processed acquisition to step 9 carry out IPSEC certifications and encryption;
Step 11:The data of IPSEC certifications and encrypted acquisition in step 10 are carried out network by client device by public network
Transmission;
Step 12:Business datum control platform receives the data for the acquisition transmitted by step 11 in intelligence manufacture Internet of Things, and makes
The data of acquisition are authenticated conciliating with the IPSEC authenticated encryptions key and hash computational algorithm consulted with client device
It is close;
Step 13:The message that business datum control platform passes through IPSEC certifications and decryption in intelligence manufacture Internet of Things carries out solution GRE
Encapsulation process peels IP and GRE heads off;
Step 14:The data that business datum control platform read step 7 is acquired.
To optimize foregoing invention, the concrete measure taken further includes:
Business datum control platform and client device need to match in advance therebetween in intelligence manufacture Internet of Things in the step 2
GRE has been put, the GRE data transmission tunnels of three-layer VPN have been formed on public network, this tunnel is transparent to the network node on public network
, only business datum control platform and client device can just perceive gre tunneling in intelligence manufacture Internet of Things.
In the step 3 in intelligence manufacture Internet of Things business datum control platform and client device need therebetween it is pre-
IPSEC tunnels have first been configured, has consulted the key of message sending end certification and hash computational algorithm, is offseted for message sink end
The certification of breath, it is also necessary to enciphering and deciphering algorithm and key are consulted, for decryption of the message sink end to message.IPSEC tunnels pair
Network node on public network is transparent, and only business datum control platform and client device can just be felt in intelligence manufacture Internet of Things
Know IPSEC tunnels.
The number of client devices is at least one.
What the method for business datum encrypted transmission can reach in intelligence manufacture Internet of Things of this kind based on GRE and IPSEC has
Beneficial effect is:
First:It is configured between two traffic-carrying devices of business datum control platform and client device in intelligence manufacture Internet of Things logical
With the vpn tunneling of routed encapsulation, in intelligence manufacture Internet of Things the two business transmission of business datum control platform and client device set
Communication between standby, including operational order and data acquisition information, is all encapsulated in gre tunneling.
Second:Match between two traffic-carrying devices of business datum control platform and client device in intelligence manufacture Internet of Things
It puts and negotiates IPSEC tunnels, the communication bag on gre tunneling will pass through the encryption and decryption process of IPSEC.
Description of the drawings
In methods of the Fig. 1 for business datum encrypted transmission in a kind of intelligence manufacture Internet of Things based on GRE and IPSEC of the present invention
Intelligence manufacture Internet of Things network implementation schematic diagram.
In methods of the Fig. 2 for business datum encrypted transmission in a kind of intelligence manufacture Internet of Things based on GRE and IPSEC of the present invention
Business datum encrypted transmission work flow diagram in intelligence manufacture Internet of Things.
Specific embodiment
The invention will be further described for preferred embodiment in detail below.
A kind of method of business datum encrypted transmission in intelligence manufacture Internet of Things based on GRE and IPSEC, it is characterized in that:Packet
Business data transmission equipment in intelligence manufacture Internet of Things is included, the business data transmission equipment includes business in intelligence manufacture Internet of Things
Data control platform and client device;
Business datum control platform can send acquisition information operational order to client device in the intelligence manufacture Internet of Things,
And receive the data that client device is sent to acquisition;
The client device can receive the acquisition information operation that business datum control platform is sent in intelligence manufacture Internet of Things
Order, and perform, the data of acquisition are finally sent to business datum control platform in intelligence manufacture Internet of Things;
Business datum control platform is connected with client device by public network data-signal in the intelligence manufacture Internet of Things;It is described
Public network be carry in intelligence manufacture Internet of Things the gre tunneling established between business datum control platform and client device and
The Ethernet in IPSEC tunnels;
The method of the business datum encrypted transmission is specific as follows:
Step 1:Business datum control platform sends acquisition information operational order to client device in intelligence manufacture Internet of Things;
Step 2:Business datum control platform will be in the acquisition information operational order encapsulation described in step 1 in intelligence manufacture Internet of Things
Gre tunneling head and IP heads;
Step 3:In intelligence manufacture Internet of Things business datum control platform by step 2 treated data carry out IPSEC certifications and plus
It is close;
Step 4:Business datum control platform is by IPSEC certifications in step 3 and encrypted acquisition information in intelligence manufacture Internet of Things
Operational order carries out network transmission by public network;
Step 5:Client device receives the acquisition information operational order by above step transmission, and use and intelligence manufacture object
The IPSEC authenticated encryptions key and hash computational algorithm that business datum control platform consults in connection are to acquiring information operational order
It is authenticated and decrypts;
Step 6:Client device carries out solution GRE encapsulation process to IPSEC certifications and the message that passes through of decryption, peel off IP with
GRE heads;
Step 7:Client device reads and performs acquisition information operational order;
Step 8:The data that client device is acquired to business datum control platform forwarding step 7;
Step 9:The data acquired described in step 8 are encapsulated upper gre tunneling head and IP heads by client device;
Step 10:Client device uses the IPSEC certifications consulted with business datum control platform in intelligence manufacture Internet of Things to add
Key and the data of hash computational algorithm processed acquisition to step 9 carry out IPSEC certifications and encryption;
Step 11:The data of IPSEC certifications and encrypted acquisition in step 10 are carried out network by client device by public network
Transmission;
Step 12:Business datum control platform receives the data for the acquisition transmitted by step 11 in intelligence manufacture Internet of Things, and makes
The data of acquisition are authenticated conciliating with the IPSEC authenticated encryptions key and hash computational algorithm consulted with client device
It is close;
Step 13:The message that business datum control platform passes through IPSEC certifications and decryption in intelligence manufacture Internet of Things carries out solution GRE
Encapsulation process peels IP and GRE heads off;
Step 14:The data that business datum control platform read step 7 is acquired.
In the present embodiment, business datum control platform and client device be therebetween in intelligence manufacture Internet of Things in step 2
Pre-configured GRE is needed, the GRE data transmission tunnels of three-layer VPN are formed on public network, this tunnel is to the network section on public network
Point is transparent, and only business datum control platform and client device can just perceive gre tunneling in intelligence manufacture Internet of Things.
In the present embodiment, business datum control platform and client device be therebetween in intelligence manufacture Internet of Things in step 3
Pre-configured IPSEC tunnels are needed, the key of message sending end certification and hash computational algorithm are consulted, for message sink
Hold the certification to message, it is also necessary to enciphering and deciphering algorithm and key are consulted, for decryption of the message sink end to message.IPSEC
Tunnel is transparent, business datum control platform and client device only in intelligence manufacture Internet of Things to the network node on public network
IPSEC tunnels can just be perceived.
In the present embodiment, number of client devices is at least one.
In the present embodiment, two traffic-carrying devices of business datum control platform and client device in intelligence manufacture Internet of Things
Between the vpn tunneling of generic route encapsulation, business datum control platform and client device two in intelligence manufacture Internet of Things is configured
Communication between traffic-carrying device including operational order and data acquisition information, is all encapsulated in gre tunneling.Meanwhile intelligence
Configuring negotiation goes out IPSEC tunnels between two traffic-carrying devices of business datum control platform and client device in manufacture Internet of Things
Road, the communication bag on gre tunneling will pass through the encryption and decryption process of IPSEC.
The method of this kind of business datum encrypted transmission passes through business datum control platform and client in intelligence manufacture Internet of Things
The vpn tunneling of configuring negotiation GRE and IPSEC is to communication bag on tunnel adds solution between two traffic-carrying devices of end equipment
Close processing, can realize the relative safety of business data transmission in intelligence manufacture Internet of Things, and moderate cost, versatile, easily
In popularization.
The above is only the preferred embodiment of the present invention, protection scope of the present invention is not limited merely to above-described embodiment,
All technical solutions belonged under thinking of the present invention all belong to the scope of protection of the present invention.It should be pointed out that for the art
For those of ordinary skill, several improvements and modifications without departing from the principles of the present invention should be regarded as the protection of the present invention
Range.
Claims (4)
1. a kind of method of business datum encrypted transmission in intelligence manufacture Internet of Things based on GRE and IPSEC, it is characterized in that:Including
Business data transmission equipment in intelligence manufacture Internet of Things, the business data transmission equipment include business number in intelligence manufacture Internet of Things
According to control platform and client device;
Business datum control platform can send acquisition information operational order to client device in the intelligence manufacture Internet of Things,
And receive the data that client device is sent to acquisition;
The client device can receive the acquisition information operation that business datum control platform is sent in intelligence manufacture Internet of Things
Order, and perform, the data of acquisition are finally sent to business datum control platform in intelligence manufacture Internet of Things;
Business datum control platform is connected with client device by public network data-signal in the intelligence manufacture Internet of Things;It is described
Public network be carry in intelligence manufacture Internet of Things the gre tunneling established between business datum control platform and client device and
The Ethernet in IPSEC tunnels;
The method of the business datum encrypted transmission is specific as follows:
Step 1:Business datum control platform sends acquisition information operational order to client device in intelligence manufacture Internet of Things;
Step 2:Business datum control platform will be in the acquisition information operational order encapsulation described in step 1 in intelligence manufacture Internet of Things
Gre tunneling head and IP heads;
Step 3:In intelligence manufacture Internet of Things business datum control platform by step 2 treated data carry out IPSEC certifications and plus
It is close;
Step 4:Business datum control platform is by IPSEC certifications in step 3 and encrypted acquisition information in intelligence manufacture Internet of Things
Operational order carries out network transmission by public network;
Step 5:Client device receives the acquisition information operational order by above step transmission, and use and intelligence manufacture object
The IPSEC authenticated encryptions key and hash computational algorithm that business datum control platform consults in connection are to acquiring information operational order
It is authenticated and decrypts;
Step 6:Client device carries out solution GRE encapsulation process to IPSEC certifications and the message that passes through of decryption, peel off IP with
GRE heads;
Step 7:Client device reads and performs acquisition information operational order;
Step 8:The data that client device is acquired to business datum control platform forwarding step 7;
Step 9:The data acquired described in step 8 are encapsulated upper gre tunneling head and IP heads by client device;
Step 10:Client device uses the IPSEC certifications consulted with business datum control platform in intelligence manufacture Internet of Things to add
Key and the data of hash computational algorithm processed acquisition to step 9 carry out IPSEC certifications and encryption;
Step 11:The data of IPSEC certifications and encrypted acquisition in step 10 are carried out network by client device by public network
Transmission;
Step 12:Business datum control platform receives the data for the acquisition transmitted by step 11 in intelligence manufacture Internet of Things, and makes
The data of acquisition are authenticated conciliating with the IPSEC authenticated encryptions key and hash computational algorithm consulted with client device
It is close;
Step 13:The message that business datum control platform passes through IPSEC certifications and decryption in intelligence manufacture Internet of Things carries out solution GRE
Encapsulation process peels IP and GRE heads off;
Step 14:The data that business datum control platform read step 7 is acquired.
2. business datum encrypted transmission in a kind of intelligence manufacture Internet of Things based on GRE and IPSEC according to claim 1
Method, it is characterised in that:In the step 2 in intelligence manufacture Internet of Things both business datum control platform and client device it
Between need pre-configured GRE, on public network formed three-layer VPN GRE data transmission tunnels, this tunnel is to the network on public network
Node is transparent, and only business datum control platform and client device can just perceive gre tunneling in intelligence manufacture Internet of Things.
3. business datum encrypted transmission in a kind of intelligence manufacture Internet of Things based on GRE and IPSEC according to claim 1
Method, it is characterised in that:In the step 3 in intelligence manufacture Internet of Things both business datum control platform and client device it
Between need pre-configured IPSEC tunnels, consult message sending end certification key and hash computational algorithm, connect for message
Certification of the receiving end to message, it is also necessary to enciphering and deciphering algorithm and key are consulted, for decryption of the message sink end to message,
IPSEC tunnels are transparent, business datum control platform and client only in intelligence manufacture Internet of Things to the network node on public network
End equipment can just perceive IPSEC tunnels.
4. business datum encrypted transmission in a kind of intelligence manufacture Internet of Things based on GRE and IPSEC according to claim 1
Method, it is characterised in that:The number of client devices is at least one.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711428884.0A CN108134794A (en) | 2017-12-26 | 2017-12-26 | A kind of method of business datum encrypted transmission in intelligence manufacture Internet of Things based on GRE and IPSEC |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711428884.0A CN108134794A (en) | 2017-12-26 | 2017-12-26 | A kind of method of business datum encrypted transmission in intelligence manufacture Internet of Things based on GRE and IPSEC |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108134794A true CN108134794A (en) | 2018-06-08 |
Family
ID=62393009
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711428884.0A Pending CN108134794A (en) | 2017-12-26 | 2017-12-26 | A kind of method of business datum encrypted transmission in intelligence manufacture Internet of Things based on GRE and IPSEC |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108134794A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110191098A (en) * | 2019-05-05 | 2019-08-30 | 厦门网宿有限公司 | A kind of method, first network equipment and second network equipment transmitting data |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070283429A1 (en) * | 2006-05-30 | 2007-12-06 | A10 Networks Inc. | Sequence number based TCP session proxy |
CN101163088A (en) * | 2007-07-31 | 2008-04-16 | 杭州华三通信技术有限公司 | Multicast data transmitting method and equipment |
CN101572644A (en) * | 2009-06-19 | 2009-11-04 | 杭州华三通信技术有限公司 | Data encapsulation method and equipment thereof |
US20140247709A1 (en) * | 2013-03-01 | 2014-09-04 | Mastercard International Incorporated | Systems and methods for broadband backup |
CN104821874A (en) * | 2015-05-15 | 2015-08-05 | 长春大学 | Method employing quantum secret key for IOT (Internet of Things) data encryption transmission |
CN106230793A (en) * | 2016-07-22 | 2016-12-14 | 安徽皖通邮电股份有限公司 | A kind of MPLSVPN of realization operates in the method on the IPVPN of encryption |
CN106878138A (en) * | 2017-01-18 | 2017-06-20 | 新华三技术有限公司 | A kind of message transmitting method and device |
-
2017
- 2017-12-26 CN CN201711428884.0A patent/CN108134794A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070283429A1 (en) * | 2006-05-30 | 2007-12-06 | A10 Networks Inc. | Sequence number based TCP session proxy |
CN101163088A (en) * | 2007-07-31 | 2008-04-16 | 杭州华三通信技术有限公司 | Multicast data transmitting method and equipment |
CN101572644A (en) * | 2009-06-19 | 2009-11-04 | 杭州华三通信技术有限公司 | Data encapsulation method and equipment thereof |
US20140247709A1 (en) * | 2013-03-01 | 2014-09-04 | Mastercard International Incorporated | Systems and methods for broadband backup |
CN104821874A (en) * | 2015-05-15 | 2015-08-05 | 长春大学 | Method employing quantum secret key for IOT (Internet of Things) data encryption transmission |
CN106230793A (en) * | 2016-07-22 | 2016-12-14 | 安徽皖通邮电股份有限公司 | A kind of MPLSVPN of realization operates in the method on the IPVPN of encryption |
CN106878138A (en) * | 2017-01-18 | 2017-06-20 | 新华三技术有限公司 | A kind of message transmitting method and device |
Non-Patent Citations (3)
Title |
---|
刘阳: "GRE over IPSec工作流程探究与应用分析", 《青岛职业技术学院学报》 * |
李飞,吴春旺,王敏: "《信息安全理论与技术》", 31 March 2016, 西安电子科技大学出版社 * |
王春莲,靳晋,牟思: "《计算机网络安全案例教程》", 31 August 2014, 北京邮电大学出版社 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110191098A (en) * | 2019-05-05 | 2019-08-30 | 厦门网宿有限公司 | A kind of method, first network equipment and second network equipment transmitting data |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110996318B (en) | Safety communication access system of intelligent inspection robot of transformer substation | |
US11102226B2 (en) | Dynamic security method and system based on multi-fusion linkage response | |
Rauf et al. | Security and privacy for IoT and fog computing paradigm | |
JP2009506617A (en) | System and method for processing secure transmission information | |
CN104067595A (en) | System and method for innovative management of transport layer security session tickets in a network environment | |
CN106487749A (en) | Key generation method and device | |
CN102882789A (en) | Data message processing method, system and equipment | |
TW200307423A (en) | Password device and method, password system | |
CN104219217A (en) | SA (security association) negotiation method, device and system | |
CN103441983A (en) | Information protection method and device based on link layer discovery protocol | |
CN110099072A (en) | A kind of safety protecting method being directed to industrial data transmission of internet of things | |
CN111756627A (en) | Cloud platform security access gateway of electric power monitored control system | |
WO2014046604A2 (en) | Method and device for network communication management | |
CN108111308A (en) | One kind is based on the encrypted industry internet communication encryption method of dynamic random | |
US20080072033A1 (en) | Re-encrypting policy enforcement point | |
CN103227742B (en) | A kind of method of ipsec tunnel fast processing message | |
CN114143050B (en) | Video data encryption system | |
CN107645513A (en) | A kind of IPsec content auditings device and method | |
CN211352206U (en) | IPSec VPN cryptographic machine based on quantum key distribution | |
CN102710638A (en) | Device and method for isolating data by adopting non-network manner | |
Benslimane et al. | Security mechanisms for 6LoWPAN network in context of internet of things: A Survey | |
CN107995086A (en) | A kind of method of business datum encrypted transmission in intelligence manufacture Internet of Things based on VPDN and IPSEC | |
Gupta et al. | Networking in IoT: Technologies Usage, Security Threats, and Possible Countermeasures | |
CN111885430B (en) | In-band telemetry method and system based on Ethernet frame | |
CN102882859A (en) | Security protection method based on public network data transmission information system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180608 |