Patent application number | Description | Published |
20100260203 | TUNNELING IPv6 PACKET THROUGH IPv4 NETWORK USING A TUNNEL ENTRY BASED ON IPv6 PREFIX AND TUNNELING IPv4 PACKET USING A TUNNEL ENTRY BASED ON IPv4 PREFIX - The present invention relates to tunneling an IPv6 packet through an IPv4 network. In using a tunneling method upon transmitting an IPv6 packet in an IP network, when destination nodes desired to be communicated are located within the same IPv6 prefix network, IPv6 prefix information is added for the management of a tunnel entry. Hence, tunneling information on terminals located within the same IPv6 prefix network can be managed as one tunnel entry. Accordingly, the time consumed when retrieving a tunnel entry can be reduced. | 10-14-2010 |
20100262825 | SECURITY METHOD OF MOBILE INTERNET PROTOCOL BASED SERVER - A security method in a server-based mobile IP system is provided. Specifically, in the security method, general data is securely exchanged in addition to a control message that is exchanged between a mobile node and a server or between mobile nodes. Specifically, provided is a method of securely exchanging data by using a mobile node including an mPAK execution module generating necessary keys by exchanging key information with the server while performing a mutual authentication process and negotiating the security policy; and a security module setting a security policy that is negotiated with the corresponding node and applying the security policy to data according to the set security policy when transmitting the data. | 10-14-2010 |
20110085552 | SYSTEM AND METHOD FOR FORMING VIRTUAL PRIVATE NETWORK - Technology for forming a virtual private network (VPN) is provided. A VPN gateway that supports mobility with a connection node having a virtual home address (HoA) and a care of address (CoA) includes a mobility support unit, a data security unit, and a virtual address converter. When a packet is transferred from the connection node, the mobility support unit sustains a binding relationship between a home address (HoA) of the connection node and the changed CoA, and processes a mobility tunnel for the packet, thereby generating a first conversion packet. The data security unit performs a security test of the first conversion packet. The virtual address converter converts the HoA of the connection node, which is a source address of the first conversion packet in which the security test is complete, to a private network internal address that can be used in the VPN, thereby generating a second conversion packet. | 04-14-2011 |
20110200005 | METHOD OF SUPPORTING MOBILITY USING SECURITY TUNNEL - Enclosed is a method of supporting mobility using a security tunnel. For the movement of a terminal in a local network and the movement of a terminal to an external network, an active tunnel and a standby tunnel are set to provide mobility to the terminal. When the local network moves, mobility for the local network is provided. The stability of a network is guaranteed using security connection. | 08-18-2011 |
20120106559 | METHOD OF NETWORK-BASED COMMUNICATION IN VIRTUAL NETWORK ENVIRONMENT - In a plurality of virtual tunnel routers including a first virtual tunnel router and a second virtual tunnel router, the first virtual tunnel router and the second virtual tunnel router request virtual network prefix information from a tunnel mapping controller. When the tunnel mapping controller generates virtual network prefix information of the first virtual tunnel router and the second virtual tunnel router, respectively, and transmits the same along with information of a list of adjacent virtual tunnel routers, the first virtual tunnel router and the second virtual tunnel router create a tunnel. With the tunnel established, the virtual network prefix information received by the first virtual tunnel router and second virtual tunnel router, respectively, is linked so that direct communication can be performed between the first virtual tunnel router and the second virtual tunnel router. | 05-03-2012 |
20120161936 | RFID TAG DEVICE AND METHOD OF RECOGNIZING THE SAME - Provided is a radio frequency identification (RFID) tag device. The RFID tag device includes memory which stores ID information and a second count value, and a certification unit which performs a certification process according to a keyed hash value received from the outside and a result of a comparison between first and second count values received from the outside, and adjusts the second count value. | 06-28-2012 |
20130128741 | FLOW BASED QOS ROUTER CAPABLE OF REPORTING REAL-TIME STATISTICS - Disclosed is a flow-based QoS router capable of reporting real-time statistics, including: a line card configured to collect flow information by analyzing a flow, classify the collected flow information into flow information not requesting filtering and flow information requesting filtering, and transmit each of the flow information not requesting filtering and the flow information requesting filtering; a system supervisor controller configured to receive the flow information not requesting filtering and the flow information requesting filtering from the line card and store the flow information not requesting filtering and the flow information requesting filtering, and accessed by a manager terminal to monitor the flow information not requesting filtering and the flow information requesting filtering to perform filtering of and QoS application to a predetermined flow; and an application processor configured to command QoS application to the predetermined flow according to a request from the system supervisor controller. | 05-23-2013 |
20130133057 | SYSTEM FOR MANAGING VIRTUAL PRIVATE NETWORK AND METHOD THEREOF - Disclosed are a system for managing virtual private networks (VPNs) includes: terminals configured to transmit user data; a manager configured to transmit information for concealing networks and managing the VPNs; border gateways configured to decrypt the user data and perform a network address translation (NAT) procedure and a filtering procedure on the decrypted user data based on the information; and servers configured to receive the user data subjected to the NAT procedure and the filtering procedure, wherein the filtering procedure is a procedure discarding the user data to be transferred to the servers that are not allowed so as to allow the terminals to access only the allowed servers, the NAT procedure is a procedure changing an Internet protocol (IP) address used in a first network to an IP address used in a second network, and the first network and the second network are different networks. | 05-23-2013 |
20130163601 | USER CENTRIC VIRTUAL NETWORK AND METHOD OF ESTABLISHING THE SAME - Provided is a method of establishing a user centric virtual network. The method includes: performing a first tunneling operation between a first tunnel end and an address translation device, which are connected to a first private network, and a tunnel relay device; performing a second tunneling operation between a second tunnel end and an address translation device, which are connected to a second private network, and the tunnel relay device; and performing a third tunneling operation between the tunnel relay device and an end client, wherein a virtual IP is allocated to each of the first and second tunnel ends, the address translation devices, the end client, and the tunnel relay device; and each of the first to third tunneling operations connects routing information on the virtual IP to a corresponding tunnel. | 06-27-2013 |
20140002584 | METHOD OF SELECTING CONFERENCE PROCESSING DEVICE AND VIDEO CONFERENCE SYSTEM USING THE METHOD | 01-02-2014 |
20140223541 | METHOD FOR PROVIDING SERVICE OF MOBILE VPN - Disclosed is a method for providing mobile virtual private network (VPN) services. An operation method of a group and tunnel manager (GTM) for providing mobile VPN services includes receiving a first message for registering information of a VPN group from a gateway, generating tunnel information between the GTM and the gateway based on the first message, and transmitting a packet based on the tunnel information. Accordingly, a private address may be used even in a mobile VPN, and therefore a VPN site may be configured even in an environment where a public address is difficult to use, or a flexible VPN site may be configured. | 08-07-2014 |
20140317402 | METHOD OF PROCESSING PACKET IN BELOW BINARY STACK STRUCTURE - Disclosed is a packet processing method in a below binary stack (BBS) structure. A transmission packet processing method includes receiving a packet from a network layer, reassembling a packet for which a first fragmentation has been performed when the received packet is the packet for which the first fragmentation has been performed, encrypting the reassembled packet, performing a second fragmentation for the encrypted packet when the second fragmentation is necessary for the encrypted packet, adding a header to the packet for which the second fragmentation has been performed, and transmitting the packet with the header added thereto through a physical layer. Accordingly, an encryption function can be provided in the BBS structure. | 10-23-2014 |