CN117439765A - Data storage forwarding method and system based on application awareness - Google Patents

Data storage forwarding method and system based on application awareness Download PDF

Info

Publication number
CN117439765A
CN117439765A CN202311157701.1A CN202311157701A CN117439765A CN 117439765 A CN117439765 A CN 117439765A CN 202311157701 A CN202311157701 A CN 202311157701A CN 117439765 A CN117439765 A CN 117439765A
Authority
CN
China
Prior art keywords
application
data
network
message header
protection module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311157701.1A
Other languages
Chinese (zh)
Inventor
齐飞
唐尚禹
盛明哲
王宣
霍明德
张艳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Digital Intelligence Integration Innovation Technology Co ltd
Research Institute of China United Network Communications Corp Ltd
Original Assignee
Chongqing Digital Intelligence Integration Innovation Technology Co ltd
Research Institute of China United Network Communications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Digital Intelligence Integration Innovation Technology Co ltd, Research Institute of China United Network Communications Corp Ltd filed Critical Chongqing Digital Intelligence Integration Innovation Technology Co ltd
Priority to CN202311157701.1A priority Critical patent/CN117439765A/en
Publication of CN117439765A publication Critical patent/CN117439765A/en
Pending legal-status Critical Current

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a data storage forwarding method and system based on application perception, the method firstly obtains the requirement of the application on network transmission, an operator distributes symmetric or asymmetric secret keys for the application and informs the application and network forwarding nodes; the application packages the requirement for network transmission in an I Pv6 message header, encrypts the I Pv6 message header data and sends the data to the network; the network forwarding node receives the encrypted I Pv6 message header data, applies for at least two layers of space in the privacy information protection module, decrypts the space, and forwards the decrypted space according to the I Pv6 message header; the network forwarding node encrypts the generated log information and generates a log information table; the encrypted I Pv6 data is transmitted according to the requirements indicated in the message header until the data is transmitted to the destination node, and the destination node receives the data. By adopting the technical scheme, the security protection of the network node application privacy information is realized by arranging the privacy information protection module at the network node.

Description

Data storage forwarding method and system based on application awareness
Technical Field
The invention belongs to the technical field of data transmission, and relates to a data storage forwarding method and system based on application awareness.
Background
Many applications run simultaneously in an industrial production environment, but the requirements of different applications on network bandwidth, time delay, jitter, packet loss rate and the like are different, even very different.
For example, for material transfer applications in an industrial control environment, the latency requirement is on the order of 100ms; the worker wears the AR equipment to carry out AR-based auxiliary assembly, products and assembly information are identified through the AR equipment camera, the worker can carry out assembly operation according to the displayed guiding picture by wearing the AR glasses, a single-channel video is larger than or equal to 4 Mbps, 1080P video is needed, and the end-to-end time delay requirement is smaller than 100ms; under the power differential protection environment, a plurality of relay protection devices mutually send real-time current data, and the real-time current data and the local current data at the same moment are compared to detect whether faults occur, the time delay required by data communication between the devices is less than 5ms, and the jitter is less than 200us; under the machine tool control application environment, the time delay requirement is at the level of 10ms, and the jitter requirement is at the level of 100 us; some high-performance synchronous processing requires time delay of 1ms level and jitter of less than 1us; in addition, even in the same application type, such as machine vision application, the on-line detection of different links such as product surface defects, part assembly and the like has quite different demands on network, cloud edge end coordination and the like.
This puts high demands on the network, which requires that it can effectively distinguish application types when transmitting application data, and provides suitable deterministic carrying capacity for different types of applications. The prior art can only realize privacy security in the network transmission process, but has no limitation on network nodes, and if someone maliciously attacks the network nodes or network administrators actively reveal application privacy data, no way is provided for avoiding.
Disclosure of Invention
The invention aims to provide a data storage forwarding method and system based on application awareness, which realize the security protection of network node application privacy information.
In order to achieve the above purpose, the basic scheme of the invention is as follows: a data storage forwarding method based on application awareness comprises the following steps:
acquiring the requirement of an application on network transmission;
the operator distributes symmetric or asymmetric keys for the application and informs the application and each network forwarding node;
the application packages the requirement of network transmission in an IPv6 message header, encrypts IPv6 message header data and sends the data to the network;
the network forwarding node receives the encrypted IPv6 message header data, applies for at least two layers of space in the privacy information protection module, decrypts the encrypted IPv6 message header data in the applied at least two layers of space according to a secret key distributed by an operator for the application, and forwards the encrypted IPv6 message header data according to a corresponding rule;
the network forwarding node encrypts the generated log information in the privacy information protection module and generates a log information table;
the encrypted IPv6 data is transmitted according to the requirements indicated in the message header until the data is transmitted to the destination node;
the destination node receives the data.
The working principle and the beneficial effects of the basic scheme are as follows: according to the technical scheme, the end-to-end privacy security protection of application data is realized through non-plaintext transmission on a network line and black box forwarding data processing of a network forwarding node privacy information protection module.
Further, the operator allocates an asymmetric key to the application, the network forwarding node allocates a key, and the application with application awareness needs allocates a key, and the two keys are a key pair.
The security of the data information is provided through the secret key, and the use is facilitated.
Further, the network forwarding node assigns one or more key pairs for an application.
And the key pair is distributed according to the requirement, so that the security is better.
Further, when the encrypted application data with application perception requirements passes through the network forwarding node, temporary storage is carried out on the privacy information protection module of the network forwarding node;
the network forwarding node decrypts the IPV6 message header in the privacy information protection module, reads out the processing mode and forwards the IPV6 message header;
after the forwarding is completed, the generated log information is stored in a privacy information protection module of the network forwarding node.
The operation is simple and the use is convenient.
Further, the working method of the privacy protection module is as follows:
the privacy protection module comprises a first layer and a second layer, wherein the first layer comprises a plurality of two layers, and each two layers is provided with a unique ID;
after receiving an application request, the network forwarding node applies for a corresponding two-layer space, unpacks and reads the message header in the two-layer space, and does not have any other data transmission with the outside except that the routing forwarding path is sent out;
and the historical forwarding record, the log record application, the log information and the processing time are stored in the second layer, and the historical forwarding record of the APN6 information is encrypted through a secret key.
The invention also provides a data storage forwarding system based on application perception, which comprises a terminal application module, a key distribution module and a privacy information protection module;
the terminal application module sets the differentiated requirement of the network in the IPv6 data message header, encrypts the differentiated requirement and ensures that the application data is not transmitted in the clear text in the network; the operator distributes corresponding password information for the application client according to the network requirement of the application and synchronizes the password information to the application sensing node, and the application client carries the password information in the message header of the IPv6 data message so as to transmit the network requirement to the application sensing node;
the key distribution module receives a key application sent by an application with application perception requirements, distributes a key and distributes the key to the involved network forwarding node;
the privacy information protection module is arranged into two or more layers, wherein the first layer is provided with an independent secret key by a network forwarding node, and the secret key enters the next layer after being matched; after receiving an application, the network forwarding node applies for the privacy information protection module, and processes the operation related to the specific application in the lower two-layer protection module after the application is successful.
By using the system, a privacy information protection module is arranged at a network node, a camera bellows processes and stores historical forwarding records (logs) of APN6 information, absolute safety of application privacy data of the APN6 information is ensured, and end-to-end safety protection of application privacy information of the network node is realized.
Further, the terminal application module, the key distribution module and the privacy information protection module are communicated with each other through the communication module.
And the communication module is utilized to ensure the information transmission requirement among the modules.
Drawings
Fig. 1 is a flow chart of the application aware based data store-and-forward system of the present invention.
Detailed Description
Embodiments of the present invention are described in detail below, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to like or similar elements or elements having like or similar functions throughout. The embodiments described below by referring to the drawings are illustrative only and are not to be construed as limiting the invention.
In the description of the present invention, it should be understood that the terms "longitudinal," "transverse," "upper," "lower," "front," "rear," "left," "right," "vertical," "horizontal," "top," "bottom," "inner," "outer," and the like indicate orientations or positional relationships based on the orientation or positional relationships shown in the drawings, merely to facilitate describing the present invention and simplify the description, and do not indicate or imply that the devices or elements referred to must have a specific orientation, be configured and operated in a specific orientation, and therefore should not be construed as limiting the present invention.
In the description of the present invention, unless otherwise specified and defined, it should be noted that the terms "mounted," "connected," and "coupled" are to be construed broadly, and may be, for example, mechanical or electrical, or may be in communication with each other between two elements, directly or indirectly through intermediaries, as would be understood by those skilled in the art, in view of the specific meaning of the terms described above.
The invention discloses a data storage forwarding method based on application awareness, which realizes the security protection of network node application privacy information. After the data forwarding is completed, the network needs to be unknown to the history forwarding process of the Application data, so that a special privacy information protection module is needed to process and store the history forwarding record (log) of the APN6 information, and the access authority of the privacy information protection module is only accessible by super administrators or not accessible by all persons, thereby ensuring the absolute safety of the Application private data of the APN6 (Application-aware IPv6 network).
The data storage forwarding method based on application awareness comprises the following steps:
acquiring the network transmission requirements of an application, such as time delay, bandwidth and the like;
the operator distributes symmetric or asymmetric keys for the application and informs the application and each network forwarding node; the application data with application perception requirements is transmitted in encrypted data on a network line, and the data is safe in the transmission process.
The application packages the requirement of network transmission in an IPv6 message header, encrypts IPv6 message header data and sends the data to the network;
the network forwarding node receives the encrypted IPv6 message header data, applies for at least two layers of space in the privacy information protection module, decrypts the encrypted IPv6 message header data in the applied at least two layers of space according to a secret key distributed by an operator, and forwards the encrypted IPv6 message header data according to corresponding rules (the existing rules are that the IPv6 message header indicates a destination address and the network carries out routing forwarding based on the existing rules; the method can ensure that the application data with application perception requirements are forwarded to a required destination according to the requirements, and also ensure that the user privacy data carried in the IPV6 message header is not known by the network forwarding nodes and network administrators, and ensure the end-to-end safety of the data in the flow.
The network forwarding node encrypts the generated log information in the privacy information protection module and generates a log information table (corresponding contents such as log table record application, log information, processing time and the like);
the encrypted IPv6 data is transmitted according to the requirement of indication in the message header (the IPv6 message header indicates the destination address, and the network performs route forwarding based on the existing rule) until the encrypted IPv6 data is transmitted to the destination node; when the encrypted application data with application perception requirements passes through the network forwarding node, the network forwarding node decrypts the data according to the key distributed by the operator, the decrypted data is transparent to the network forwarding node, namely visible, but the decryption process is required to be completed in the network forwarding node privacy information protection module.
When the encrypted application data with application perception requirements passes through the network forwarding node, the encrypted application data is temporarily stored in a privacy information protection module of the network forwarding node, and is similar to a black box, and the network forwarding node decrypts the IPV6 message header in the module, reads out the processing mode and forwards the IPV6 message header. After the forwarding is finished, if log information is generated and is also stored in a privacy information protection module of the network forwarding node, the privacy information protection module is not aware of related data, only a super manager can access or all people cannot access, the related area is reduced as much as possible, and if the super manager can access, log records are also made, so that responsibility is pursued when a problem occurs later.
The destination node receives the data.
In a preferred scheme of the invention, an operator distributes asymmetric keys for applications, a network forwarding node distributes a key, and an application with application perception requirements distributes a key, wherein the two keys are a key pair. Preferably, the network forwarding node distributes one or more key pairs for one application, and distributes the key pairs according to the requirement, so that the security is better. The security of the data information is provided through the secret key, and the use is facilitated.
In a preferred scheme of the invention, when encrypted application data with application perception requirements passes through a network forwarding node, the encrypted application data is temporarily stored in a privacy information protection module of the network forwarding node;
the network forwarding node decrypts the IPV6 message header in the privacy information protection module, reads out the processing mode and forwards the IPV6 message header;
after the forwarding is completed, the generated log information is stored in a privacy information protection module of the network forwarding node.
In a preferred scheme of the invention, the working method of the privacy protection module is as follows:
the privacy protection module comprises a first layer and a second layer, wherein the first layer comprises a plurality of two layers, and each two layers is provided with a unique ID; the first layer is composed of two layers, and is similar to a large space with a plurality of small parallel spaces inside;
after receiving an application request, the network forwarding node applies for a corresponding two-layer space, unpacks and reads the message header in the two-layer space, and does not have any other data transmission with the outside except that the routing forwarding path is sent out;
and the historical forwarding record, the log record application, the log information and the processing time are stored in the second layer, and the historical forwarding record of the APN6 information is encrypted through a secret key.
The invention also provides a data storage forwarding system based on application perception, which realizes the end-to-end privacy safety protection of application data through non-plaintext transmission on a network line and black box forwarding data processing of a network forwarding node privacy information protection module. As shown in fig. 1, the data store-and-forward system based on application awareness includes a terminal application module, a key distribution module, and a privacy information protection module.
The terminal application module is used for setting the differentiated requirements of the network (different requirements of different applications on the aspects of time delay, bandwidth, jitter and the like on the network) at the IPv6 data message head, encrypting the data message head and ensuring the non-plaintext transmission of the application data in the network; the operator distributes corresponding password information for the application client according to the network requirement of the application and synchronizes the password information to the application sensing node, and the application client carries the password information in the message header of the IPv6 data message so as to transmit the network requirement to the application sensing node.
The key distribution module receives a key application sent by an application with application perception requirements to an operator network, the operator network distributes symmetric or asymmetric keys for the application with application perception requirements and distributes the keys to the involved network forwarding nodes (if the keys are asymmetric, each network forwarding node distributes a key, the application with application perception requirements distributes a key, and the two keys are a key pair) so as to determine the validity of sending, forwarding and receiving APN6 data.
The privacy information protection module is arranged into two or more layers, wherein the first layer is provided with an independent secret key by a network forwarding node, and the secret key enters the next layer after being matched; after receiving an application, the network forwarding node applies for the privacy information protection module, and processes the operation related to the specific application in the lower two-layer protection module after the application is successful. The two layers are matched with the application, different protection levels can be provided in the same application, which is equivalent to a nested structure, and the lower layer application also needs additional encryption system (such as symmetric and asymmetric) selection and corresponding keys.
The privacy information protection module stores historical forwarding records (logs) of APN6 information, the data of the module needs to be encrypted (the key is a key negotiated with a specific application, can be a symmetric key or an asymmetric key), the log records corresponding contents such as application, log information, processing time and the like, and the access authority of the module is only accessible by super administrators or can not be accessed by all people, so that the absolute safety of the application privacy data of the APN6 information is ensured.
The first layer comprises a plurality of second layers (for example, two hundred layers, each second layer has a unique ID identifier), after receiving an application request, the network forwarding node applies for a corresponding second layer space for the network forwarding node, and all the work in the unpacking and reading message header is completed in the space, and no other data transmission exists between the network forwarding node and the outside except the sending of the routing forwarding path. The two layers contain information such as history forwarding record (log) of APN6 information, log table record application, log information, processing time and the like. By using the system, a privacy information protection module is arranged at a network node, a camera bellows processes and stores historical forwarding records (logs) of APN6 information, absolute safety of application privacy data of the APN6 information is ensured, and end-to-end safety protection of application privacy information of the network node is realized.
In a preferred scheme of the invention, the data storage forwarding system based on application perception further comprises a communication module, and the terminal application module, the key distribution module and the privacy information protection module are communicated with each other through the communication module. The communication module comprises a wired communication network and a wireless communication network, is selected according to the needs, is beneficial to use, and ensures the information transmission requirements among the modules.
In the technical scheme, the applications of different terminals are regarded as different applications, and different user logs correspond to different decryption keys.
In the description of the present specification, a description referring to terms "one embodiment," "some embodiments," "examples," "specific examples," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present invention. In this specification, schematic representations of the above terms do not necessarily refer to the same embodiments or examples. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
While embodiments of the present invention have been shown and described, it will be understood by those of ordinary skill in the art that: many changes, modifications, substitutions and variations may be made to the embodiments without departing from the spirit and principles of the invention, the scope of which is defined by the claims and their equivalents.

Claims (7)

1. The data storage forwarding method based on application awareness is characterized by comprising the following steps:
acquiring the requirement of an application on network transmission;
the operator distributes symmetric or asymmetric keys for the application and informs the application and each network forwarding node;
the application packages the requirement of network transmission in an IPv6 message header, encrypts IPv6 message header data and sends the data to the network;
the network forwarding node receives the encrypted IPv6 message header data, applies for at least two layers of space in the privacy information protection module, decrypts the encrypted IPv6 message header data in the applied at least two layers of space according to a secret key distributed by an operator for the application, and forwards the encrypted IPv6 message header data according to a corresponding rule;
the network forwarding node encrypts the generated log information in the privacy information protection module and generates a log information table;
the encrypted IPv6 data is transmitted according to the requirements indicated in the message header until the data is transmitted to the destination node;
the destination node receives the data.
2. The application-aware-based data store-and-forward method of claim 1, wherein the operator assigns an asymmetric key to the application, the network forwarding node assigns a key to the application having application-aware requirements, and the two keys are a key pair.
3. The application-aware-based data store-and-forward method of claim 2, wherein the network forwarding node assigns one or more key pairs for an application.
4. The application-aware-based data store-and-forward method of claim 1, wherein when encrypted application data with application awareness requirements passes through a network forwarding node, the encrypted application data is temporarily stored in a privacy information protection module of the network forwarding node;
the network forwarding node decrypts the IPV6 message header in the privacy information protection module, reads out the processing mode and forwards the IPV6 message header;
after the forwarding is completed, the generated log information is stored in a privacy information protection module of the network forwarding node.
5. The application-aware-based data store-and-forward method of claim 1, wherein the privacy protection module operates as follows:
the privacy protection module comprises a first layer and a second layer, wherein the first layer comprises a plurality of two layers, and each two layers is provided with a unique ID;
after receiving an application request, the network forwarding node applies for a corresponding two-layer space, unpacks and reads the message header in the two-layer space, and does not have any other data transmission with the outside except that the routing forwarding path is sent out;
and the historical forwarding record, the log record application, the log information and the processing time are stored in the second layer, and the historical forwarding record of the APN6 information is encrypted through a secret key.
6. The data storage forwarding system based on application perception is characterized by comprising a terminal application module, a key distribution module and a privacy information protection module;
the terminal application module sets the differentiated requirement of the network in the IPv6 data message header, encrypts the differentiated requirement and ensures that the application data is not transmitted in the clear text in the network; the operator distributes corresponding password information for the application client according to the network requirement of the application and synchronizes the password information to the application sensing node, and the application client carries the password information in the message header of the IPv6 data message so as to transmit the network requirement to the application sensing node;
the key distribution module receives a key application sent by an application with application perception requirements, distributes a key and distributes the key to the involved network forwarding node;
the privacy information protection module is arranged into two or more layers, wherein the first layer is provided with an independent secret key by a network forwarding node, and the secret key enters the next layer after being matched; after receiving an application, the network forwarding node applies for the privacy information protection module, and processes the operation related to the specific application in the lower two-layer protection module after the application is successful.
7. The application-aware-based data store-and-forward system of claim 6, further comprising a communication module, wherein the terminal application module, the key distribution module, and the privacy information protection module communicate with each other via the communication module.
CN202311157701.1A 2023-09-08 2023-09-08 Data storage forwarding method and system based on application awareness Pending CN117439765A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311157701.1A CN117439765A (en) 2023-09-08 2023-09-08 Data storage forwarding method and system based on application awareness

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311157701.1A CN117439765A (en) 2023-09-08 2023-09-08 Data storage forwarding method and system based on application awareness

Publications (1)

Publication Number Publication Date
CN117439765A true CN117439765A (en) 2024-01-23

Family

ID=89552334

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311157701.1A Pending CN117439765A (en) 2023-09-08 2023-09-08 Data storage forwarding method and system based on application awareness

Country Status (1)

Country Link
CN (1) CN117439765A (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100050256A1 (en) * 2008-08-20 2010-02-25 Stephen Knapp Methods and systems for internet protocol (ip) packet header collection and storage
US20170302575A1 (en) * 2016-04-19 2017-10-19 Cisco Technology, Inc. Content delivery from home networks
CN109347814A (en) * 2018-10-05 2019-02-15 李斌 A kind of container cloud security means of defence and system based on Kubernetes building
CN111624869A (en) * 2020-04-25 2020-09-04 中国人民解放军战略支援部队信息工程大学 Method and system for automatically sensing attack behavior and Ethernet switch
CN112637069A (en) * 2020-12-18 2021-04-09 支付宝(杭州)信息技术有限公司 Data message transmission method and device
CN112769785A (en) * 2020-12-29 2021-05-07 深圳市风云实业有限公司 Network integration depth detection device and method based on rack switch equipment
CN114244621A (en) * 2021-12-24 2022-03-25 北京科电航宇空间技术有限公司 High-safety-intensity communication system with multi-level fragmentation
CN114584969A (en) * 2022-05-09 2022-06-03 成都信息工程大学 Information processing method and device based on associated encryption
CN116389035A (en) * 2022-12-30 2023-07-04 苏州盛科通信股份有限公司 Data message processing method, chip and forwarding equipment

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100050256A1 (en) * 2008-08-20 2010-02-25 Stephen Knapp Methods and systems for internet protocol (ip) packet header collection and storage
US20170302575A1 (en) * 2016-04-19 2017-10-19 Cisco Technology, Inc. Content delivery from home networks
CN109347814A (en) * 2018-10-05 2019-02-15 李斌 A kind of container cloud security means of defence and system based on Kubernetes building
CN111624869A (en) * 2020-04-25 2020-09-04 中国人民解放军战略支援部队信息工程大学 Method and system for automatically sensing attack behavior and Ethernet switch
CN112637069A (en) * 2020-12-18 2021-04-09 支付宝(杭州)信息技术有限公司 Data message transmission method and device
CN112769785A (en) * 2020-12-29 2021-05-07 深圳市风云实业有限公司 Network integration depth detection device and method based on rack switch equipment
CN114244621A (en) * 2021-12-24 2022-03-25 北京科电航宇空间技术有限公司 High-safety-intensity communication system with multi-level fragmentation
CN114584969A (en) * 2022-05-09 2022-06-03 成都信息工程大学 Information processing method and device based on associated encryption
CN116389035A (en) * 2022-12-30 2023-07-04 苏州盛科通信股份有限公司 Data message processing method, chip and forwarding equipment

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
GEORGIOS DAOUTIS: "PRIVACY PRESERVING CLOUD COMPUTATION FOR DATA COLLECTED FROM MICROCONTROLLERS", 《HELLENIC MEDITERRANEAN UNIVERSITY》, 12 April 2023 (2023-04-12), pages 1 - 74 *
胡南,周宇,伍传丽,邯子皓,向剑文,张家琦,邢燕祯: "IPv6 安全风险与防范方案", 《软件导刊》, vol. 22, no. 4, 30 April 2023 (2023-04-30), pages 118 - 125 *

Similar Documents

Publication Publication Date Title
US10965791B2 (en) Handling different protocol data unit types in a device to device communication system
US9712504B2 (en) Method and apparatus for avoiding double-encryption in site-to-site IPsec VPN connections
US6704866B1 (en) Compression and encryption protocol for controlling data flow in a network
CN104272674A (en) Multi-tunnel virtual private network
CN111385259B (en) Data transmission method, device, related equipment and storage medium
CA2556448C (en) Method and apparatus for providing data over a dynamic wireless network
US20040158706A1 (en) System, method, and device for facilitating multi-path cryptographic communication
CN102439912B (en) Communication control device and monitoring device
CN102088438A (en) Method for solving address conflict of Internet protocol security (IPSec) Client and IPSec Client
CN101471839B (en) Method for asynchronously implementing IPSec vpn through multi-nuclear
GB2357019A (en) Apparatus which encrypts data received from a plaintext side of its local IP subnet and transmits it on a ciphertext side of the same subnet
JPH06318939A (en) Cipher communication system
CN101552677B (en) Processing method and exchange equipment for address detected message
CN117439765A (en) Data storage forwarding method and system based on application awareness
JPH10327193A (en) Encipherment system
JPH1141280A (en) Communication system, vpn repeater and recording medium
CN115277200B (en) Multi-node key auto-negotiation management method for link layer transparent encryption system
CN110445708A (en) Communication means and system in a kind of Convergence gateway
CN111245618A (en) Internet of things secret communication system and method based on quantum key
CN102647343A (en) Flow control method and system for safe network equipment
CN117375862A (en) Message forwarding method, system, network device, storage medium and program product
CN107995086A (en) A kind of method of business datum encrypted transmission in intelligence manufacture Internet of Things based on VPDN and IPSEC
US11095610B2 (en) Methods and apparatus for autonomous network segmentation
JPH11239184A (en) Switching hub
KR20150060050A (en) Network device and method of forming tunnel of network device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination