All Categories

History

Communication network related security protocols Encryption protocols Fusion IPsec/IKE-Fusion IPsec・IKE
Communication network related security protocols Encryption protocols Fusion IPsec/IKE-Grape System Co., Ltd.

Communication network related security protocols Encryption protocols Fusion IPsec/IKE
Grape System Co., Ltd.


About This Product

Fusion IPsec is a simple addition to the Fusion NET TCP/IP stack that enables the use of encrypted and authenticated communications to systems running Fusion NET. Fusion IKE is a protocol that allows you to automatically use IPsec security in conjunction with other network nodes.

■Features

・Providing ANSI C source code ・Small size and easy to implement ・Affordable price with royalty-free contract ・Shorten the development period for embedded devices and contribute to reducing development costs ・We also undertake contract development using this product.

■Platform independent

- Once developed, an application is independent of the OS or other platform, so it can be easily ported to any platform that supports C/C++ libraries, helping to bring products to market quickly. - Structure that does not depend on RTOS or hardware timers. Function/Fusion IPsec

■Strong encryption

Encrypting Internet traffic means that what is passed over the Internet cannot be easily read by intermediate nodes. Strong encryption refers to how easily the encrypted data can be 'cracked'. Fusion IPsec offers various levels of encryption and different encryption algorithms, which are trade-offs between processor usage and security levels.

■Data integrity

By calculating a checksum and including the checksum within the encrypted data, you can make it difficult to modify data that is passed over the Internet. Fusion IPsec automatically checks whether packets received using IPsec have been tampered with. Modified packets are typically ignored and retransmitted by the source.

■Peer authentication

Digital signatures are used for authentication. This allows data recipients to be confident that all received data comes from the original source and not from imposters.

■Replay attack protection

Packet duplication (duplication at intermediate nodes in the Internet) can be prevented using encrypted sequence numbers within the packets. Duplicated packets are ignored.

  • Product

    Communication network related security protocols Encryption protocols Fusion IPsec/IKE

Share this product


50+ people viewing


Free
Get started with our free quotation service - no cost, no obligation.

No Phone Required
We respect your privacy. You can receive quotes without sharing your phone number.

1 Models of Communication network related security protocols Encryption protocols Fusion IPsec/IKE

Image Part Number Price (excluding tax)
Communication network related security protocols Encryption protocols Fusion IPsec/IKE-Part Number-Fusion IPsec・IKE

Fusion IPsec・IKE

Available upon quote

Customers who viewed this product also viewed

Reviews shown here are reviews of companies.

See More Security Systems Products

Other products of Grape System Co., Ltd.

Reviews shown here are reviews of companies.


View more products of Grape System Co., Ltd.

About Company Handling This Product

This is the version of our website addressed to speakers of English in the United States. If you are a resident of another country, please select the appropriate version of Metoree for your country in the drop-down menu.

Copyright © 2025 Metoree