CN117439765A - Data storage forwarding method and system based on application awareness - Google Patents
Data storage forwarding method and system based on application awareness Download PDFInfo
- Publication number
- CN117439765A CN117439765A CN202311157701.1A CN202311157701A CN117439765A CN 117439765 A CN117439765 A CN 117439765A CN 202311157701 A CN202311157701 A CN 202311157701A CN 117439765 A CN117439765 A CN 117439765A
- Authority
- CN
- China
- Prior art keywords
- application
- data
- network
- message header
- protection module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 25
- 238000013500 data storage Methods 0.000 title claims abstract description 13
- 230000005540 biological transmission Effects 0.000 claims abstract description 20
- 230000008447 perception Effects 0.000 claims abstract description 17
- 238000012545 processing Methods 0.000 claims description 13
- 238000004891 communication Methods 0.000 claims description 11
- 238000009826 distribution Methods 0.000 claims description 9
- 239000000463 material Substances 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 2
- 230000007547 defect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 239000011521 glass Substances 0.000 description 1
- 238000009776 industrial production Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000003860 storage Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a data storage forwarding method and system based on application perception, the method firstly obtains the requirement of the application on network transmission, an operator distributes symmetric or asymmetric secret keys for the application and informs the application and network forwarding nodes; the application packages the requirement for network transmission in an I Pv6 message header, encrypts the I Pv6 message header data and sends the data to the network; the network forwarding node receives the encrypted I Pv6 message header data, applies for at least two layers of space in the privacy information protection module, decrypts the space, and forwards the decrypted space according to the I Pv6 message header; the network forwarding node encrypts the generated log information and generates a log information table; the encrypted I Pv6 data is transmitted according to the requirements indicated in the message header until the data is transmitted to the destination node, and the destination node receives the data. By adopting the technical scheme, the security protection of the network node application privacy information is realized by arranging the privacy information protection module at the network node.
Description
Technical Field
The invention belongs to the technical field of data transmission, and relates to a data storage forwarding method and system based on application awareness.
Background
Many applications run simultaneously in an industrial production environment, but the requirements of different applications on network bandwidth, time delay, jitter, packet loss rate and the like are different, even very different.
For example, for material transfer applications in an industrial control environment, the latency requirement is on the order of 100ms; the worker wears the AR equipment to carry out AR-based auxiliary assembly, products and assembly information are identified through the AR equipment camera, the worker can carry out assembly operation according to the displayed guiding picture by wearing the AR glasses, a single-channel video is larger than or equal to 4 Mbps, 1080P video is needed, and the end-to-end time delay requirement is smaller than 100ms; under the power differential protection environment, a plurality of relay protection devices mutually send real-time current data, and the real-time current data and the local current data at the same moment are compared to detect whether faults occur, the time delay required by data communication between the devices is less than 5ms, and the jitter is less than 200us; under the machine tool control application environment, the time delay requirement is at the level of 10ms, and the jitter requirement is at the level of 100 us; some high-performance synchronous processing requires time delay of 1ms level and jitter of less than 1us; in addition, even in the same application type, such as machine vision application, the on-line detection of different links such as product surface defects, part assembly and the like has quite different demands on network, cloud edge end coordination and the like.
This puts high demands on the network, which requires that it can effectively distinguish application types when transmitting application data, and provides suitable deterministic carrying capacity for different types of applications. The prior art can only realize privacy security in the network transmission process, but has no limitation on network nodes, and if someone maliciously attacks the network nodes or network administrators actively reveal application privacy data, no way is provided for avoiding.
Disclosure of Invention
The invention aims to provide a data storage forwarding method and system based on application awareness, which realize the security protection of network node application privacy information.
In order to achieve the above purpose, the basic scheme of the invention is as follows: a data storage forwarding method based on application awareness comprises the following steps:
acquiring the requirement of an application on network transmission;
the operator distributes symmetric or asymmetric keys for the application and informs the application and each network forwarding node;
the application packages the requirement of network transmission in an IPv6 message header, encrypts IPv6 message header data and sends the data to the network;
the network forwarding node receives the encrypted IPv6 message header data, applies for at least two layers of space in the privacy information protection module, decrypts the encrypted IPv6 message header data in the applied at least two layers of space according to a secret key distributed by an operator for the application, and forwards the encrypted IPv6 message header data according to a corresponding rule;
the network forwarding node encrypts the generated log information in the privacy information protection module and generates a log information table;
the encrypted IPv6 data is transmitted according to the requirements indicated in the message header until the data is transmitted to the destination node;
the destination node receives the data.
The working principle and the beneficial effects of the basic scheme are as follows: according to the technical scheme, the end-to-end privacy security protection of application data is realized through non-plaintext transmission on a network line and black box forwarding data processing of a network forwarding node privacy information protection module.
Further, the operator allocates an asymmetric key to the application, the network forwarding node allocates a key, and the application with application awareness needs allocates a key, and the two keys are a key pair.
The security of the data information is provided through the secret key, and the use is facilitated.
Further, the network forwarding node assigns one or more key pairs for an application.
And the key pair is distributed according to the requirement, so that the security is better.
Further, when the encrypted application data with application perception requirements passes through the network forwarding node, temporary storage is carried out on the privacy information protection module of the network forwarding node;
the network forwarding node decrypts the IPV6 message header in the privacy information protection module, reads out the processing mode and forwards the IPV6 message header;
after the forwarding is completed, the generated log information is stored in a privacy information protection module of the network forwarding node.
The operation is simple and the use is convenient.
Further, the working method of the privacy protection module is as follows:
the privacy protection module comprises a first layer and a second layer, wherein the first layer comprises a plurality of two layers, and each two layers is provided with a unique ID;
after receiving an application request, the network forwarding node applies for a corresponding two-layer space, unpacks and reads the message header in the two-layer space, and does not have any other data transmission with the outside except that the routing forwarding path is sent out;
and the historical forwarding record, the log record application, the log information and the processing time are stored in the second layer, and the historical forwarding record of the APN6 information is encrypted through a secret key.
The invention also provides a data storage forwarding system based on application perception, which comprises a terminal application module, a key distribution module and a privacy information protection module;
the terminal application module sets the differentiated requirement of the network in the IPv6 data message header, encrypts the differentiated requirement and ensures that the application data is not transmitted in the clear text in the network; the operator distributes corresponding password information for the application client according to the network requirement of the application and synchronizes the password information to the application sensing node, and the application client carries the password information in the message header of the IPv6 data message so as to transmit the network requirement to the application sensing node;
the key distribution module receives a key application sent by an application with application perception requirements, distributes a key and distributes the key to the involved network forwarding node;
the privacy information protection module is arranged into two or more layers, wherein the first layer is provided with an independent secret key by a network forwarding node, and the secret key enters the next layer after being matched; after receiving an application, the network forwarding node applies for the privacy information protection module, and processes the operation related to the specific application in the lower two-layer protection module after the application is successful.
By using the system, a privacy information protection module is arranged at a network node, a camera bellows processes and stores historical forwarding records (logs) of APN6 information, absolute safety of application privacy data of the APN6 information is ensured, and end-to-end safety protection of application privacy information of the network node is realized.
Further, the terminal application module, the key distribution module and the privacy information protection module are communicated with each other through the communication module.
And the communication module is utilized to ensure the information transmission requirement among the modules.
Drawings
Fig. 1 is a flow chart of the application aware based data store-and-forward system of the present invention.
Detailed Description
Embodiments of the present invention are described in detail below, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to like or similar elements or elements having like or similar functions throughout. The embodiments described below by referring to the drawings are illustrative only and are not to be construed as limiting the invention.
In the description of the present invention, it should be understood that the terms "longitudinal," "transverse," "upper," "lower," "front," "rear," "left," "right," "vertical," "horizontal," "top," "bottom," "inner," "outer," and the like indicate orientations or positional relationships based on the orientation or positional relationships shown in the drawings, merely to facilitate describing the present invention and simplify the description, and do not indicate or imply that the devices or elements referred to must have a specific orientation, be configured and operated in a specific orientation, and therefore should not be construed as limiting the present invention.
In the description of the present invention, unless otherwise specified and defined, it should be noted that the terms "mounted," "connected," and "coupled" are to be construed broadly, and may be, for example, mechanical or electrical, or may be in communication with each other between two elements, directly or indirectly through intermediaries, as would be understood by those skilled in the art, in view of the specific meaning of the terms described above.
The invention discloses a data storage forwarding method based on application awareness, which realizes the security protection of network node application privacy information. After the data forwarding is completed, the network needs to be unknown to the history forwarding process of the Application data, so that a special privacy information protection module is needed to process and store the history forwarding record (log) of the APN6 information, and the access authority of the privacy information protection module is only accessible by super administrators or not accessible by all persons, thereby ensuring the absolute safety of the Application private data of the APN6 (Application-aware IPv6 network).
The data storage forwarding method based on application awareness comprises the following steps:
acquiring the network transmission requirements of an application, such as time delay, bandwidth and the like;
the operator distributes symmetric or asymmetric keys for the application and informs the application and each network forwarding node; the application data with application perception requirements is transmitted in encrypted data on a network line, and the data is safe in the transmission process.
The application packages the requirement of network transmission in an IPv6 message header, encrypts IPv6 message header data and sends the data to the network;
the network forwarding node receives the encrypted IPv6 message header data, applies for at least two layers of space in the privacy information protection module, decrypts the encrypted IPv6 message header data in the applied at least two layers of space according to a secret key distributed by an operator, and forwards the encrypted IPv6 message header data according to corresponding rules (the existing rules are that the IPv6 message header indicates a destination address and the network carries out routing forwarding based on the existing rules; the method can ensure that the application data with application perception requirements are forwarded to a required destination according to the requirements, and also ensure that the user privacy data carried in the IPV6 message header is not known by the network forwarding nodes and network administrators, and ensure the end-to-end safety of the data in the flow.
The network forwarding node encrypts the generated log information in the privacy information protection module and generates a log information table (corresponding contents such as log table record application, log information, processing time and the like);
the encrypted IPv6 data is transmitted according to the requirement of indication in the message header (the IPv6 message header indicates the destination address, and the network performs route forwarding based on the existing rule) until the encrypted IPv6 data is transmitted to the destination node; when the encrypted application data with application perception requirements passes through the network forwarding node, the network forwarding node decrypts the data according to the key distributed by the operator, the decrypted data is transparent to the network forwarding node, namely visible, but the decryption process is required to be completed in the network forwarding node privacy information protection module.
When the encrypted application data with application perception requirements passes through the network forwarding node, the encrypted application data is temporarily stored in a privacy information protection module of the network forwarding node, and is similar to a black box, and the network forwarding node decrypts the IPV6 message header in the module, reads out the processing mode and forwards the IPV6 message header. After the forwarding is finished, if log information is generated and is also stored in a privacy information protection module of the network forwarding node, the privacy information protection module is not aware of related data, only a super manager can access or all people cannot access, the related area is reduced as much as possible, and if the super manager can access, log records are also made, so that responsibility is pursued when a problem occurs later.
The destination node receives the data.
In a preferred scheme of the invention, an operator distributes asymmetric keys for applications, a network forwarding node distributes a key, and an application with application perception requirements distributes a key, wherein the two keys are a key pair. Preferably, the network forwarding node distributes one or more key pairs for one application, and distributes the key pairs according to the requirement, so that the security is better. The security of the data information is provided through the secret key, and the use is facilitated.
In a preferred scheme of the invention, when encrypted application data with application perception requirements passes through a network forwarding node, the encrypted application data is temporarily stored in a privacy information protection module of the network forwarding node;
the network forwarding node decrypts the IPV6 message header in the privacy information protection module, reads out the processing mode and forwards the IPV6 message header;
after the forwarding is completed, the generated log information is stored in a privacy information protection module of the network forwarding node.
In a preferred scheme of the invention, the working method of the privacy protection module is as follows:
the privacy protection module comprises a first layer and a second layer, wherein the first layer comprises a plurality of two layers, and each two layers is provided with a unique ID; the first layer is composed of two layers, and is similar to a large space with a plurality of small parallel spaces inside;
after receiving an application request, the network forwarding node applies for a corresponding two-layer space, unpacks and reads the message header in the two-layer space, and does not have any other data transmission with the outside except that the routing forwarding path is sent out;
and the historical forwarding record, the log record application, the log information and the processing time are stored in the second layer, and the historical forwarding record of the APN6 information is encrypted through a secret key.
The invention also provides a data storage forwarding system based on application perception, which realizes the end-to-end privacy safety protection of application data through non-plaintext transmission on a network line and black box forwarding data processing of a network forwarding node privacy information protection module. As shown in fig. 1, the data store-and-forward system based on application awareness includes a terminal application module, a key distribution module, and a privacy information protection module.
The terminal application module is used for setting the differentiated requirements of the network (different requirements of different applications on the aspects of time delay, bandwidth, jitter and the like on the network) at the IPv6 data message head, encrypting the data message head and ensuring the non-plaintext transmission of the application data in the network; the operator distributes corresponding password information for the application client according to the network requirement of the application and synchronizes the password information to the application sensing node, and the application client carries the password information in the message header of the IPv6 data message so as to transmit the network requirement to the application sensing node.
The key distribution module receives a key application sent by an application with application perception requirements to an operator network, the operator network distributes symmetric or asymmetric keys for the application with application perception requirements and distributes the keys to the involved network forwarding nodes (if the keys are asymmetric, each network forwarding node distributes a key, the application with application perception requirements distributes a key, and the two keys are a key pair) so as to determine the validity of sending, forwarding and receiving APN6 data.
The privacy information protection module is arranged into two or more layers, wherein the first layer is provided with an independent secret key by a network forwarding node, and the secret key enters the next layer after being matched; after receiving an application, the network forwarding node applies for the privacy information protection module, and processes the operation related to the specific application in the lower two-layer protection module after the application is successful. The two layers are matched with the application, different protection levels can be provided in the same application, which is equivalent to a nested structure, and the lower layer application also needs additional encryption system (such as symmetric and asymmetric) selection and corresponding keys.
The privacy information protection module stores historical forwarding records (logs) of APN6 information, the data of the module needs to be encrypted (the key is a key negotiated with a specific application, can be a symmetric key or an asymmetric key), the log records corresponding contents such as application, log information, processing time and the like, and the access authority of the module is only accessible by super administrators or can not be accessed by all people, so that the absolute safety of the application privacy data of the APN6 information is ensured.
The first layer comprises a plurality of second layers (for example, two hundred layers, each second layer has a unique ID identifier), after receiving an application request, the network forwarding node applies for a corresponding second layer space for the network forwarding node, and all the work in the unpacking and reading message header is completed in the space, and no other data transmission exists between the network forwarding node and the outside except the sending of the routing forwarding path. The two layers contain information such as history forwarding record (log) of APN6 information, log table record application, log information, processing time and the like. By using the system, a privacy information protection module is arranged at a network node, a camera bellows processes and stores historical forwarding records (logs) of APN6 information, absolute safety of application privacy data of the APN6 information is ensured, and end-to-end safety protection of application privacy information of the network node is realized.
In a preferred scheme of the invention, the data storage forwarding system based on application perception further comprises a communication module, and the terminal application module, the key distribution module and the privacy information protection module are communicated with each other through the communication module. The communication module comprises a wired communication network and a wireless communication network, is selected according to the needs, is beneficial to use, and ensures the information transmission requirements among the modules.
In the technical scheme, the applications of different terminals are regarded as different applications, and different user logs correspond to different decryption keys.
In the description of the present specification, a description referring to terms "one embodiment," "some embodiments," "examples," "specific examples," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present invention. In this specification, schematic representations of the above terms do not necessarily refer to the same embodiments or examples. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
While embodiments of the present invention have been shown and described, it will be understood by those of ordinary skill in the art that: many changes, modifications, substitutions and variations may be made to the embodiments without departing from the spirit and principles of the invention, the scope of which is defined by the claims and their equivalents.
Claims (7)
1. The data storage forwarding method based on application awareness is characterized by comprising the following steps:
acquiring the requirement of an application on network transmission;
the operator distributes symmetric or asymmetric keys for the application and informs the application and each network forwarding node;
the application packages the requirement of network transmission in an IPv6 message header, encrypts IPv6 message header data and sends the data to the network;
the network forwarding node receives the encrypted IPv6 message header data, applies for at least two layers of space in the privacy information protection module, decrypts the encrypted IPv6 message header data in the applied at least two layers of space according to a secret key distributed by an operator for the application, and forwards the encrypted IPv6 message header data according to a corresponding rule;
the network forwarding node encrypts the generated log information in the privacy information protection module and generates a log information table;
the encrypted IPv6 data is transmitted according to the requirements indicated in the message header until the data is transmitted to the destination node;
the destination node receives the data.
2. The application-aware-based data store-and-forward method of claim 1, wherein the operator assigns an asymmetric key to the application, the network forwarding node assigns a key to the application having application-aware requirements, and the two keys are a key pair.
3. The application-aware-based data store-and-forward method of claim 2, wherein the network forwarding node assigns one or more key pairs for an application.
4. The application-aware-based data store-and-forward method of claim 1, wherein when encrypted application data with application awareness requirements passes through a network forwarding node, the encrypted application data is temporarily stored in a privacy information protection module of the network forwarding node;
the network forwarding node decrypts the IPV6 message header in the privacy information protection module, reads out the processing mode and forwards the IPV6 message header;
after the forwarding is completed, the generated log information is stored in a privacy information protection module of the network forwarding node.
5. The application-aware-based data store-and-forward method of claim 1, wherein the privacy protection module operates as follows:
the privacy protection module comprises a first layer and a second layer, wherein the first layer comprises a plurality of two layers, and each two layers is provided with a unique ID;
after receiving an application request, the network forwarding node applies for a corresponding two-layer space, unpacks and reads the message header in the two-layer space, and does not have any other data transmission with the outside except that the routing forwarding path is sent out;
and the historical forwarding record, the log record application, the log information and the processing time are stored in the second layer, and the historical forwarding record of the APN6 information is encrypted through a secret key.
6. The data storage forwarding system based on application perception is characterized by comprising a terminal application module, a key distribution module and a privacy information protection module;
the terminal application module sets the differentiated requirement of the network in the IPv6 data message header, encrypts the differentiated requirement and ensures that the application data is not transmitted in the clear text in the network; the operator distributes corresponding password information for the application client according to the network requirement of the application and synchronizes the password information to the application sensing node, and the application client carries the password information in the message header of the IPv6 data message so as to transmit the network requirement to the application sensing node;
the key distribution module receives a key application sent by an application with application perception requirements, distributes a key and distributes the key to the involved network forwarding node;
the privacy information protection module is arranged into two or more layers, wherein the first layer is provided with an independent secret key by a network forwarding node, and the secret key enters the next layer after being matched; after receiving an application, the network forwarding node applies for the privacy information protection module, and processes the operation related to the specific application in the lower two-layer protection module after the application is successful.
7. The application-aware-based data store-and-forward system of claim 6, further comprising a communication module, wherein the terminal application module, the key distribution module, and the privacy information protection module communicate with each other via the communication module.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311157701.1A CN117439765A (en) | 2023-09-08 | 2023-09-08 | Data storage forwarding method and system based on application awareness |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311157701.1A CN117439765A (en) | 2023-09-08 | 2023-09-08 | Data storage forwarding method and system based on application awareness |
Publications (1)
Publication Number | Publication Date |
---|---|
CN117439765A true CN117439765A (en) | 2024-01-23 |
Family
ID=89552334
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311157701.1A Pending CN117439765A (en) | 2023-09-08 | 2023-09-08 | Data storage forwarding method and system based on application awareness |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117439765A (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100050256A1 (en) * | 2008-08-20 | 2010-02-25 | Stephen Knapp | Methods and systems for internet protocol (ip) packet header collection and storage |
US20170302575A1 (en) * | 2016-04-19 | 2017-10-19 | Cisco Technology, Inc. | Content delivery from home networks |
CN109347814A (en) * | 2018-10-05 | 2019-02-15 | 李斌 | A kind of container cloud security means of defence and system based on Kubernetes building |
CN111624869A (en) * | 2020-04-25 | 2020-09-04 | 中国人民解放军战略支援部队信息工程大学 | Method and system for automatically sensing attack behavior and Ethernet switch |
CN112637069A (en) * | 2020-12-18 | 2021-04-09 | 支付宝(杭州)信息技术有限公司 | Data message transmission method and device |
CN112769785A (en) * | 2020-12-29 | 2021-05-07 | 深圳市风云实业有限公司 | Network integration depth detection device and method based on rack switch equipment |
CN114244621A (en) * | 2021-12-24 | 2022-03-25 | 北京科电航宇空间技术有限公司 | High-safety-intensity communication system with multi-level fragmentation |
CN114584969A (en) * | 2022-05-09 | 2022-06-03 | 成都信息工程大学 | Information processing method and device based on associated encryption |
CN116389035A (en) * | 2022-12-30 | 2023-07-04 | 苏州盛科通信股份有限公司 | Data message processing method, chip and forwarding equipment |
-
2023
- 2023-09-08 CN CN202311157701.1A patent/CN117439765A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100050256A1 (en) * | 2008-08-20 | 2010-02-25 | Stephen Knapp | Methods and systems for internet protocol (ip) packet header collection and storage |
US20170302575A1 (en) * | 2016-04-19 | 2017-10-19 | Cisco Technology, Inc. | Content delivery from home networks |
CN109347814A (en) * | 2018-10-05 | 2019-02-15 | 李斌 | A kind of container cloud security means of defence and system based on Kubernetes building |
CN111624869A (en) * | 2020-04-25 | 2020-09-04 | 中国人民解放军战略支援部队信息工程大学 | Method and system for automatically sensing attack behavior and Ethernet switch |
CN112637069A (en) * | 2020-12-18 | 2021-04-09 | 支付宝(杭州)信息技术有限公司 | Data message transmission method and device |
CN112769785A (en) * | 2020-12-29 | 2021-05-07 | 深圳市风云实业有限公司 | Network integration depth detection device and method based on rack switch equipment |
CN114244621A (en) * | 2021-12-24 | 2022-03-25 | 北京科电航宇空间技术有限公司 | High-safety-intensity communication system with multi-level fragmentation |
CN114584969A (en) * | 2022-05-09 | 2022-06-03 | 成都信息工程大学 | Information processing method and device based on associated encryption |
CN116389035A (en) * | 2022-12-30 | 2023-07-04 | 苏州盛科通信股份有限公司 | Data message processing method, chip and forwarding equipment |
Non-Patent Citations (2)
Title |
---|
GEORGIOS DAOUTIS: "PRIVACY PRESERVING CLOUD COMPUTATION FOR DATA COLLECTED FROM MICROCONTROLLERS", 《HELLENIC MEDITERRANEAN UNIVERSITY》, 12 April 2023 (2023-04-12), pages 1 - 74 * |
胡南,周宇,伍传丽,邯子皓,向剑文,张家琦,邢燕祯: "IPv6 安全风险与防范方案", 《软件导刊》, vol. 22, no. 4, 30 April 2023 (2023-04-30), pages 118 - 125 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10965791B2 (en) | Handling different protocol data unit types in a device to device communication system | |
US9712504B2 (en) | Method and apparatus for avoiding double-encryption in site-to-site IPsec VPN connections | |
US6704866B1 (en) | Compression and encryption protocol for controlling data flow in a network | |
CN104272674A (en) | Multi-tunnel virtual private network | |
CN111385259B (en) | Data transmission method, device, related equipment and storage medium | |
CA2556448C (en) | Method and apparatus for providing data over a dynamic wireless network | |
US20040158706A1 (en) | System, method, and device for facilitating multi-path cryptographic communication | |
CN102439912B (en) | Communication control device and monitoring device | |
CN102088438A (en) | Method for solving address conflict of Internet protocol security (IPSec) Client and IPSec Client | |
CN101471839B (en) | Method for asynchronously implementing IPSec vpn through multi-nuclear | |
GB2357019A (en) | Apparatus which encrypts data received from a plaintext side of its local IP subnet and transmits it on a ciphertext side of the same subnet | |
JPH06318939A (en) | Cipher communication system | |
CN101552677B (en) | Processing method and exchange equipment for address detected message | |
CN117439765A (en) | Data storage forwarding method and system based on application awareness | |
JPH10327193A (en) | Encipherment system | |
JPH1141280A (en) | Communication system, vpn repeater and recording medium | |
CN115277200B (en) | Multi-node key auto-negotiation management method for link layer transparent encryption system | |
CN110445708A (en) | Communication means and system in a kind of Convergence gateway | |
CN111245618A (en) | Internet of things secret communication system and method based on quantum key | |
CN102647343A (en) | Flow control method and system for safe network equipment | |
CN117375862A (en) | Message forwarding method, system, network device, storage medium and program product | |
CN107995086A (en) | A kind of method of business datum encrypted transmission in intelligence manufacture Internet of Things based on VPDN and IPSEC | |
US11095610B2 (en) | Methods and apparatus for autonomous network segmentation | |
JPH11239184A (en) | Switching hub | |
KR20150060050A (en) | Network device and method of forming tunnel of network device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |