Security management method of dual-encryption channel cooperation in network management system

A network management system and encrypted channel technology, applied in the field of security management of double encrypted channel cooperation, can solve the problems of failure to exert transmission efficiency and low efficiency, and achieve good practical application significance and value, effective system resources, and effective utilization. Effect

Active Publication Date: 2008-03-05
网经科技(苏州)有限公司
View PDF0 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The network management system is a network communication application program that needs to transmit data on the intranet or the Internet. The transmitted data may involve user information and business secrets within the enterprise. It is necessary to encrypt the transmitted data and establish an independent network during the transmission process. The encryption channel makes the t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security management method of dual-encryption channel cooperation in network management system
  • Security management method of dual-encryption channel cooperation in network management system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0024] A security management method for double encryption channel cooperation in a network management system, which uses encryption channel technology to divide transmission data into two types, establishes two different types of encryption channels according to different data types, and adopts different encryption methods and Transmission mode, at the same time, the two channels cooperate with each other to complete the entire data transmission requirements. The data is divided into two types: control signaling data and file data. An encrypted signaling transmission channel is established to transmit control signaling data, and an encrypted data transmission channel is established to transmit file data. The specific execution process of the two channels is in charge of the control module. , so that the two encrypted channels cooperate with each other to transmit data securely.

[0025] The architecture of the dual encryption channel of the network management system is shown i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The method divides transmissive data into two classes: one class as control signaling data, and the other class as file data. Two encryption channels: one channel for transmitting encrypted signaling, the other channel for transmitting encrypted data are built between clients and server. Two encrypted channels adopt different encryption manners and transmission modes. The control signaling data are transmitted by encrypted signaling transmission channel (ESTC), and the file data are transmitted by encrypted data transmission channel (EDTC). ESTC and EDTC are mutual independence, and not disturbed each other to accomplish transmitting data of network management system jointly and symbiotically. Using different encryption methods and transmission modes, the dual encrypted channels are in favor of system safety. Independent, encrypted high performance EDTC raises efficiency for transmitting data. Two separate encrypted channels realize accesses for devices simultaneously.

Description

technical field [0001] The invention relates to a method for data security transmission management in a network management system, in particular to a security management method for cooperation of double encryption channels. Background technique [0002] With the rapid development of the Internet, network applications are becoming more and more widespread. However, the openness of the Internet poses a serious threat to the security of services on the Internet. In order to ensure healthy and orderly development, it is necessary to provide a strong guarantee on network security. [0003] Because traditional network transmission passwords and data are in plain text, hackers can easily intercept these passwords and data, and the verification method of traditional service programs also has its weaknesses, and it is easy to be attacked by a man-in-the-middle. The fake program transmits the data to the real server, and after the transmitted data is changed hands by the intermediary...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24H04L9/28H04L29/08
Inventor 孙希律刘继明谢正清
Owner 网经科技(苏州)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products