CN108134794A - A kind of method of business datum encrypted transmission in intelligence manufacture Internet of Things based on GRE and IPSEC - Google Patents

A kind of method of business datum encrypted transmission in intelligence manufacture Internet of Things based on GRE and IPSEC Download PDF

Info

Publication number
CN108134794A
CN108134794A CN201711428884.0A CN201711428884A CN108134794A CN 108134794 A CN108134794 A CN 108134794A CN 201711428884 A CN201711428884 A CN 201711428884A CN 108134794 A CN108134794 A CN 108134794A
Authority
CN
China
Prior art keywords
things
business datum
intelligence manufacture
control platform
ipsec
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711428884.0A
Other languages
Chinese (zh)
Inventor
杨文安
黄超
郭宇
田威
廖文和
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing University of Aeronautics and Astronautics
Original Assignee
Nanjing University of Aeronautics and Astronautics
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing University of Aeronautics and Astronautics filed Critical Nanjing University of Aeronautics and Astronautics
Priority to CN201711428884.0A priority Critical patent/CN108134794A/en
Publication of CN108134794A publication Critical patent/CN108134794A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4633Interconnection of networks using encapsulation techniques, e.g. tunneling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0485Networking architectures for enhanced packet encryption processing, e.g. offloading of IPsec packet processing or efficient security association look-up
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention is a kind of method of business datum encrypted transmission in intelligence manufacture Internet of Things based on GRE and IPSEC, the vpn tunneling of generic route encapsulation is configured in intelligence manufacture Internet of Things between two traffic-carrying devices of business datum control platform and client device, communication in intelligence manufacture Internet of Things between two traffic-carrying devices of business datum control platform and client device, including operational order and data acquisition information, all it is encapsulated in gre tunneling.Meanwhile configuring negotiation goes out IPSEC tunnels between two traffic-carrying devices of business datum control platform and client device in intelligence manufacture Internet of Things, the communication bag on gre tunneling will pass through the encryption and decryption process of IPSEC.The present invention can realize the relative safety of business data transmission in intelligence manufacture Internet of Things, and moderate cost, versatile, easy to spread.

Description

Business datum encrypted transmission in a kind of intelligence manufacture Internet of Things based on GRE and IPSEC Method
Technical field
The present invention is to be related to data encryption communication field, specifically a kind of intelligence manufacture object based on GRE and IPSEC The method of business datum encrypted transmission in connection.
Background technology
Business data transmission main task is to rely on isomery in complicated manufacturing industry Internet of Things to mix net in intelligence manufacture Internet of Things Dynamic Manufacturing information involved in manufacturing process complexity workshop condition is such as operated employee, in product, material by the seamless union of network Deng location information and status information, the processing technology information of workpiece and quality information, the modal information and work information of equipment The timely transmitting task of carry out is waited, realizes full manufacturing process actual time safety data transmission.Due to intelligence manufacture technology of Internet of things Core and basis be industry internet technology, be product of the industry internet technology in manufacture field strengthened research, cover Each level technologies such as computer, communication, automation, Industrial Engineering, information management, be related to industrial sensor, RFID label tag, RFID reader, one-dimensional Quick Response Code, AGV trolleies, detection monitoring network, intelligent terminal, middleware, increment calculates and information service The safety problems such as the correlation software and hardware product such as platform, virus attack, hacker attacks and unauthorized access also can be in intelligence manufacture Internet of Things Occur in net, the danger and influence brought is almost unimaginable.Once attacker successfully invades intelligence manufacture Internet of Things safety Center or data center, it is possible to the relevant important information such as core technology and classified information is stolen or destroys, it will be to manufacturing industry Enterprise's production run and national process industry economic security cause major hidden danger.Therefore, intelligence manufacture Internet of Things innovation and development is closed National manufacturing industry data safety and future economy social orientation, wherein business datum safe transmission are to ensure that intelligence manufacture Decision, supervision, operation, the vital step for servicing effective simultaneously safe and feasible in Internet of Things development.
" Internet protocol safety (IPSec) " is a kind of frame structure of open standard, by using encrypted peace Full service communication of safety to ensure to be maintained secrecy on Internet protocol (IP) network.IPSec (Internet Protocol Security) be safe networking long-term direction.It by end-to-end safety come the protection of active is provided with Prevent dedicated network and the attack of Internet.In the communications, only sender and reception uniquely have to be understood that IPSec is protected just now Shield.IPSec defines the security service used in internetwork layer, and function includes data ciphering and deciphering, the access to network element Control, data integrity inspection and prevents Replay Attack at data source address verification.
GRE (Generic Routing Encapsulation) i.e. Generic Routing Encapsulations, are VPN third layer tunnels Agreement employs one kind between protocol layer and is referred to as Tunnel(Tunnel)Technology, be to certain network layer protocols(Such as IPv4, IPv6, MPLS etc.)Data packet be packaged, the data packet for enabling these packed is transmitted in IPv4 networks.
The method of Internet of Things data encrypted transmission is varied at present, and it is real to have plenty of the enciphering and deciphering algorithm based on privately owned exploitation Existing, versatility is not high, it is not easy to promote;Have plenty of based on quantum key encryption and decryption, need extremely expensive quantum key distribution Equipment, cost are too high.It is therefore desirable to provide a kind of method of intelligence manufacture internet of things service Data Encryption Transmission, cost is fitted In, it is versatile, it is easy to spread.
Invention content
The technical problem to be solved in the present invention is to provide business numbers in a kind of intelligence manufacture Internet of Things based on GRE and IPSEC According to the method for encrypted transmission, this kind of method can realize in intelligence manufacture Internet of Things business datum control platform and client device it Between data communication encryption, ensure that the safety of Content of communciation.
In order to solve the above technical problems, the technical solution adopted by the present invention is:
A kind of method of business datum encrypted transmission in intelligence manufacture Internet of Things based on GRE and IPSEC, it is characterized in that:Including intelligence Business data transmission equipment in Internet of Things can be manufactured, the business data transmission equipment includes business datum in intelligence manufacture Internet of Things Control platform and client device;
Business datum control platform can send acquisition information operational order to client device in the intelligence manufacture Internet of Things, And receive the data that client device is sent to acquisition;
The client device can receive the acquisition information operation that business datum control platform is sent in intelligence manufacture Internet of Things Order, and perform, the data of acquisition are finally sent to business datum control platform in intelligence manufacture Internet of Things;
Business datum control platform is connected with client device by public network data-signal in the intelligence manufacture Internet of Things;It is described Public network be carry in intelligence manufacture Internet of Things the gre tunneling established between business datum control platform and client device and The Ethernet in IPSEC tunnels;
The method of the business datum encrypted transmission is specific as follows:
Step 1:Business datum control platform sends acquisition information operational order to client device in intelligence manufacture Internet of Things;
Step 2:Business datum control platform will be in the acquisition information operational order encapsulation described in step 1 in intelligence manufacture Internet of Things Gre tunneling head and IP heads;
Step 3:In intelligence manufacture Internet of Things business datum control platform by step 2 treated data carry out IPSEC certifications and plus It is close;
Step 4:Business datum control platform is by IPSEC certifications in step 3 and encrypted acquisition information in intelligence manufacture Internet of Things Operational order carries out network transmission by public network;
Step 5:Client device receives the acquisition information operational order by above step transmission, and use and intelligence manufacture object The IPSEC authenticated encryptions key and hash computational algorithm that business datum control platform consults in connection are to acquiring information operational order It is authenticated and decrypts;
Step 6:Client device carries out solution GRE encapsulation process to IPSEC certifications and the message that passes through of decryption, peel off IP with GRE heads;
Step 7:Client device reads and performs acquisition information operational order;
Step 8:The data that client device is acquired to business datum control platform forwarding step 7;
Step 9:The data acquired described in step 8 are encapsulated upper gre tunneling head and IP heads by client device;
Step 10:Client device uses the IPSEC certifications consulted with business datum control platform in intelligence manufacture Internet of Things to add Key and the data of hash computational algorithm processed acquisition to step 9 carry out IPSEC certifications and encryption;
Step 11:The data of IPSEC certifications and encrypted acquisition in step 10 are carried out network by client device by public network Transmission;
Step 12:Business datum control platform receives the data for the acquisition transmitted by step 11 in intelligence manufacture Internet of Things, and makes The data of acquisition are authenticated conciliating with the IPSEC authenticated encryptions key and hash computational algorithm consulted with client device It is close;
Step 13:The message that business datum control platform passes through IPSEC certifications and decryption in intelligence manufacture Internet of Things carries out solution GRE Encapsulation process peels IP and GRE heads off;
Step 14:The data that business datum control platform read step 7 is acquired.
To optimize foregoing invention, the concrete measure taken further includes:
Business datum control platform and client device need to match in advance therebetween in intelligence manufacture Internet of Things in the step 2 GRE has been put, the GRE data transmission tunnels of three-layer VPN have been formed on public network, this tunnel is transparent to the network node on public network , only business datum control platform and client device can just perceive gre tunneling in intelligence manufacture Internet of Things.
In the step 3 in intelligence manufacture Internet of Things business datum control platform and client device need therebetween it is pre- IPSEC tunnels have first been configured, has consulted the key of message sending end certification and hash computational algorithm, is offseted for message sink end The certification of breath, it is also necessary to enciphering and deciphering algorithm and key are consulted, for decryption of the message sink end to message.IPSEC tunnels pair Network node on public network is transparent, and only business datum control platform and client device can just be felt in intelligence manufacture Internet of Things Know IPSEC tunnels.
The number of client devices is at least one.
What the method for business datum encrypted transmission can reach in intelligence manufacture Internet of Things of this kind based on GRE and IPSEC has Beneficial effect is:
First:It is configured between two traffic-carrying devices of business datum control platform and client device in intelligence manufacture Internet of Things logical With the vpn tunneling of routed encapsulation, in intelligence manufacture Internet of Things the two business transmission of business datum control platform and client device set Communication between standby, including operational order and data acquisition information, is all encapsulated in gre tunneling.
Second:Match between two traffic-carrying devices of business datum control platform and client device in intelligence manufacture Internet of Things It puts and negotiates IPSEC tunnels, the communication bag on gre tunneling will pass through the encryption and decryption process of IPSEC.
Description of the drawings
In methods of the Fig. 1 for business datum encrypted transmission in a kind of intelligence manufacture Internet of Things based on GRE and IPSEC of the present invention Intelligence manufacture Internet of Things network implementation schematic diagram.
In methods of the Fig. 2 for business datum encrypted transmission in a kind of intelligence manufacture Internet of Things based on GRE and IPSEC of the present invention Business datum encrypted transmission work flow diagram in intelligence manufacture Internet of Things.
Specific embodiment
The invention will be further described for preferred embodiment in detail below.
A kind of method of business datum encrypted transmission in intelligence manufacture Internet of Things based on GRE and IPSEC, it is characterized in that:Packet Business data transmission equipment in intelligence manufacture Internet of Things is included, the business data transmission equipment includes business in intelligence manufacture Internet of Things Data control platform and client device;
Business datum control platform can send acquisition information operational order to client device in the intelligence manufacture Internet of Things, And receive the data that client device is sent to acquisition;
The client device can receive the acquisition information operation that business datum control platform is sent in intelligence manufacture Internet of Things Order, and perform, the data of acquisition are finally sent to business datum control platform in intelligence manufacture Internet of Things;
Business datum control platform is connected with client device by public network data-signal in the intelligence manufacture Internet of Things;It is described Public network be carry in intelligence manufacture Internet of Things the gre tunneling established between business datum control platform and client device and The Ethernet in IPSEC tunnels;
The method of the business datum encrypted transmission is specific as follows:
Step 1:Business datum control platform sends acquisition information operational order to client device in intelligence manufacture Internet of Things;
Step 2:Business datum control platform will be in the acquisition information operational order encapsulation described in step 1 in intelligence manufacture Internet of Things Gre tunneling head and IP heads;
Step 3:In intelligence manufacture Internet of Things business datum control platform by step 2 treated data carry out IPSEC certifications and plus It is close;
Step 4:Business datum control platform is by IPSEC certifications in step 3 and encrypted acquisition information in intelligence manufacture Internet of Things Operational order carries out network transmission by public network;
Step 5:Client device receives the acquisition information operational order by above step transmission, and use and intelligence manufacture object The IPSEC authenticated encryptions key and hash computational algorithm that business datum control platform consults in connection are to acquiring information operational order It is authenticated and decrypts;
Step 6:Client device carries out solution GRE encapsulation process to IPSEC certifications and the message that passes through of decryption, peel off IP with GRE heads;
Step 7:Client device reads and performs acquisition information operational order;
Step 8:The data that client device is acquired to business datum control platform forwarding step 7;
Step 9:The data acquired described in step 8 are encapsulated upper gre tunneling head and IP heads by client device;
Step 10:Client device uses the IPSEC certifications consulted with business datum control platform in intelligence manufacture Internet of Things to add Key and the data of hash computational algorithm processed acquisition to step 9 carry out IPSEC certifications and encryption;
Step 11:The data of IPSEC certifications and encrypted acquisition in step 10 are carried out network by client device by public network Transmission;
Step 12:Business datum control platform receives the data for the acquisition transmitted by step 11 in intelligence manufacture Internet of Things, and makes The data of acquisition are authenticated conciliating with the IPSEC authenticated encryptions key and hash computational algorithm consulted with client device It is close;
Step 13:The message that business datum control platform passes through IPSEC certifications and decryption in intelligence manufacture Internet of Things carries out solution GRE Encapsulation process peels IP and GRE heads off;
Step 14:The data that business datum control platform read step 7 is acquired.
In the present embodiment, business datum control platform and client device be therebetween in intelligence manufacture Internet of Things in step 2 Pre-configured GRE is needed, the GRE data transmission tunnels of three-layer VPN are formed on public network, this tunnel is to the network section on public network Point is transparent, and only business datum control platform and client device can just perceive gre tunneling in intelligence manufacture Internet of Things.
In the present embodiment, business datum control platform and client device be therebetween in intelligence manufacture Internet of Things in step 3 Pre-configured IPSEC tunnels are needed, the key of message sending end certification and hash computational algorithm are consulted, for message sink Hold the certification to message, it is also necessary to enciphering and deciphering algorithm and key are consulted, for decryption of the message sink end to message.IPSEC Tunnel is transparent, business datum control platform and client device only in intelligence manufacture Internet of Things to the network node on public network IPSEC tunnels can just be perceived.
In the present embodiment, number of client devices is at least one.
In the present embodiment, two traffic-carrying devices of business datum control platform and client device in intelligence manufacture Internet of Things Between the vpn tunneling of generic route encapsulation, business datum control platform and client device two in intelligence manufacture Internet of Things is configured Communication between traffic-carrying device including operational order and data acquisition information, is all encapsulated in gre tunneling.Meanwhile intelligence Configuring negotiation goes out IPSEC tunnels between two traffic-carrying devices of business datum control platform and client device in manufacture Internet of Things Road, the communication bag on gre tunneling will pass through the encryption and decryption process of IPSEC.
The method of this kind of business datum encrypted transmission passes through business datum control platform and client in intelligence manufacture Internet of Things The vpn tunneling of configuring negotiation GRE and IPSEC is to communication bag on tunnel adds solution between two traffic-carrying devices of end equipment Close processing, can realize the relative safety of business data transmission in intelligence manufacture Internet of Things, and moderate cost, versatile, easily In popularization.
The above is only the preferred embodiment of the present invention, protection scope of the present invention is not limited merely to above-described embodiment, All technical solutions belonged under thinking of the present invention all belong to the scope of protection of the present invention.It should be pointed out that for the art For those of ordinary skill, several improvements and modifications without departing from the principles of the present invention should be regarded as the protection of the present invention Range.

Claims (4)

1. a kind of method of business datum encrypted transmission in intelligence manufacture Internet of Things based on GRE and IPSEC, it is characterized in that:Including Business data transmission equipment in intelligence manufacture Internet of Things, the business data transmission equipment include business number in intelligence manufacture Internet of Things According to control platform and client device;
Business datum control platform can send acquisition information operational order to client device in the intelligence manufacture Internet of Things, And receive the data that client device is sent to acquisition;
The client device can receive the acquisition information operation that business datum control platform is sent in intelligence manufacture Internet of Things Order, and perform, the data of acquisition are finally sent to business datum control platform in intelligence manufacture Internet of Things;
Business datum control platform is connected with client device by public network data-signal in the intelligence manufacture Internet of Things;It is described Public network be carry in intelligence manufacture Internet of Things the gre tunneling established between business datum control platform and client device and The Ethernet in IPSEC tunnels;
The method of the business datum encrypted transmission is specific as follows:
Step 1:Business datum control platform sends acquisition information operational order to client device in intelligence manufacture Internet of Things;
Step 2:Business datum control platform will be in the acquisition information operational order encapsulation described in step 1 in intelligence manufacture Internet of Things Gre tunneling head and IP heads;
Step 3:In intelligence manufacture Internet of Things business datum control platform by step 2 treated data carry out IPSEC certifications and plus It is close;
Step 4:Business datum control platform is by IPSEC certifications in step 3 and encrypted acquisition information in intelligence manufacture Internet of Things Operational order carries out network transmission by public network;
Step 5:Client device receives the acquisition information operational order by above step transmission, and use and intelligence manufacture object The IPSEC authenticated encryptions key and hash computational algorithm that business datum control platform consults in connection are to acquiring information operational order It is authenticated and decrypts;
Step 6:Client device carries out solution GRE encapsulation process to IPSEC certifications and the message that passes through of decryption, peel off IP with GRE heads;
Step 7:Client device reads and performs acquisition information operational order;
Step 8:The data that client device is acquired to business datum control platform forwarding step 7;
Step 9:The data acquired described in step 8 are encapsulated upper gre tunneling head and IP heads by client device;
Step 10:Client device uses the IPSEC certifications consulted with business datum control platform in intelligence manufacture Internet of Things to add Key and the data of hash computational algorithm processed acquisition to step 9 carry out IPSEC certifications and encryption;
Step 11:The data of IPSEC certifications and encrypted acquisition in step 10 are carried out network by client device by public network Transmission;
Step 12:Business datum control platform receives the data for the acquisition transmitted by step 11 in intelligence manufacture Internet of Things, and makes The data of acquisition are authenticated conciliating with the IPSEC authenticated encryptions key and hash computational algorithm consulted with client device It is close;
Step 13:The message that business datum control platform passes through IPSEC certifications and decryption in intelligence manufacture Internet of Things carries out solution GRE Encapsulation process peels IP and GRE heads off;
Step 14:The data that business datum control platform read step 7 is acquired.
2. business datum encrypted transmission in a kind of intelligence manufacture Internet of Things based on GRE and IPSEC according to claim 1 Method, it is characterised in that:In the step 2 in intelligence manufacture Internet of Things both business datum control platform and client device it Between need pre-configured GRE, on public network formed three-layer VPN GRE data transmission tunnels, this tunnel is to the network on public network Node is transparent, and only business datum control platform and client device can just perceive gre tunneling in intelligence manufacture Internet of Things.
3. business datum encrypted transmission in a kind of intelligence manufacture Internet of Things based on GRE and IPSEC according to claim 1 Method, it is characterised in that:In the step 3 in intelligence manufacture Internet of Things both business datum control platform and client device it Between need pre-configured IPSEC tunnels, consult message sending end certification key and hash computational algorithm, connect for message Certification of the receiving end to message, it is also necessary to enciphering and deciphering algorithm and key are consulted, for decryption of the message sink end to message, IPSEC tunnels are transparent, business datum control platform and client only in intelligence manufacture Internet of Things to the network node on public network End equipment can just perceive IPSEC tunnels.
4. business datum encrypted transmission in a kind of intelligence manufacture Internet of Things based on GRE and IPSEC according to claim 1 Method, it is characterised in that:The number of client devices is at least one.
CN201711428884.0A 2017-12-26 2017-12-26 A kind of method of business datum encrypted transmission in intelligence manufacture Internet of Things based on GRE and IPSEC Pending CN108134794A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711428884.0A CN108134794A (en) 2017-12-26 2017-12-26 A kind of method of business datum encrypted transmission in intelligence manufacture Internet of Things based on GRE and IPSEC

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711428884.0A CN108134794A (en) 2017-12-26 2017-12-26 A kind of method of business datum encrypted transmission in intelligence manufacture Internet of Things based on GRE and IPSEC

Publications (1)

Publication Number Publication Date
CN108134794A true CN108134794A (en) 2018-06-08

Family

ID=62393009

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711428884.0A Pending CN108134794A (en) 2017-12-26 2017-12-26 A kind of method of business datum encrypted transmission in intelligence manufacture Internet of Things based on GRE and IPSEC

Country Status (1)

Country Link
CN (1) CN108134794A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110191098A (en) * 2019-05-05 2019-08-30 厦门网宿有限公司 A kind of method, first network equipment and second network equipment transmitting data

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070283429A1 (en) * 2006-05-30 2007-12-06 A10 Networks Inc. Sequence number based TCP session proxy
CN101163088A (en) * 2007-07-31 2008-04-16 杭州华三通信技术有限公司 Multicast data transmitting method and equipment
CN101572644A (en) * 2009-06-19 2009-11-04 杭州华三通信技术有限公司 Data encapsulation method and equipment thereof
US20140247709A1 (en) * 2013-03-01 2014-09-04 Mastercard International Incorporated Systems and methods for broadband backup
CN104821874A (en) * 2015-05-15 2015-08-05 长春大学 Method employing quantum secret key for IOT (Internet of Things) data encryption transmission
CN106230793A (en) * 2016-07-22 2016-12-14 安徽皖通邮电股份有限公司 A kind of MPLSVPN of realization operates in the method on the IPVPN of encryption
CN106878138A (en) * 2017-01-18 2017-06-20 新华三技术有限公司 A kind of message transmitting method and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070283429A1 (en) * 2006-05-30 2007-12-06 A10 Networks Inc. Sequence number based TCP session proxy
CN101163088A (en) * 2007-07-31 2008-04-16 杭州华三通信技术有限公司 Multicast data transmitting method and equipment
CN101572644A (en) * 2009-06-19 2009-11-04 杭州华三通信技术有限公司 Data encapsulation method and equipment thereof
US20140247709A1 (en) * 2013-03-01 2014-09-04 Mastercard International Incorporated Systems and methods for broadband backup
CN104821874A (en) * 2015-05-15 2015-08-05 长春大学 Method employing quantum secret key for IOT (Internet of Things) data encryption transmission
CN106230793A (en) * 2016-07-22 2016-12-14 安徽皖通邮电股份有限公司 A kind of MPLSVPN of realization operates in the method on the IPVPN of encryption
CN106878138A (en) * 2017-01-18 2017-06-20 新华三技术有限公司 A kind of message transmitting method and device

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
刘阳: "GRE over IPSec工作流程探究与应用分析", 《青岛职业技术学院学报》 *
李飞,吴春旺,王敏: "《信息安全理论与技术》", 31 March 2016, 西安电子科技大学出版社 *
王春莲,靳晋,牟思: "《计算机网络安全案例教程》", 31 August 2014, 北京邮电大学出版社 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110191098A (en) * 2019-05-05 2019-08-30 厦门网宿有限公司 A kind of method, first network equipment and second network equipment transmitting data

Similar Documents

Publication Publication Date Title
CN110996318B (en) Safety communication access system of intelligent inspection robot of transformer substation
US11102226B2 (en) Dynamic security method and system based on multi-fusion linkage response
JP2009506617A (en) System and method for processing secure transmission information
CN104067595A (en) System and method for innovative management of transport layer security session tickets in a network environment
CN106487749A (en) Key generation method and device
CN102546184B (en) Method and system for message secure transmission or key distribution in sensor network
CN102882789A (en) Data message processing method, system and equipment
TW200307423A (en) Password device and method, password system
CN103441983A (en) Information protection method and device based on link layer discovery protocol
CN104219217A (en) SA (security association) negotiation method, device and system
CN110099072A (en) A kind of safety protecting method being directed to industrial data transmission of internet of things
CN111756627A (en) Cloud platform security access gateway of electric power monitored control system
CN108111308A (en) One kind is based on the encrypted industry internet communication encryption method of dynamic random
US20080072033A1 (en) Re-encrypting policy enforcement point
CN103227742B (en) A kind of method of ipsec tunnel fast processing message
CN114143050B (en) Video data encryption system
CN107645513A (en) A kind of IPsec content auditings device and method
CN211352206U (en) IPSec VPN cryptographic machine based on quantum key distribution
CN102710638A (en) Device and method for isolating data by adopting non-network manner
CN107995086A (en) A kind of method of business datum encrypted transmission in intelligence manufacture Internet of Things based on VPDN and IPSEC
Gupta et al. Networking in IoT: Technologies Usage, Security Threats, and Possible Countermeasures
CN111885430B (en) In-band telemetry method and system based on Ethernet frame
Benslimane et al. Security mechanisms for 6LoWPAN network in context of internet of things: A Survey
CN102882859A (en) Security protection method based on public network data transmission information system
CN103167489B (en) The wireless public network means of communication with security protection in electric power system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180608