Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network resource query method and system

A network resource and resource query technology, which is applied to key distribution, can solve the problems of increased key leakage, no automatic update of keys, and inability to continue to use, so as to achieve the effect of improving the strength of information security

Active Publication Date: 2009-04-08
SHENZHEN THUNDER NETWORK TECH
View PDF0 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011]However, the security of the above method is completely based on the key, and the key itself has no automatic update mechanism, and generally the same key will be used for a long time Information exchange will undoubtedly increase the possibility of the key itself being leaked; at the same time, information thieves or hackers can also use calculation or cryptography rules to infer the key used by intercepting a sufficient number of encrypted ciphertexts.
For example, the 64-bit shared key that was once commonly used can no longer be used because it was cracked by hackers
[0012] It can be seen from the above that since the existing symmetric encryption method is completely open, its security depends entirely on the key agreed by the two parties in the information exchange, and the key cannot be automatic update
Therefore, if the key is lost, leaked or cracked, the information thief will be able to pretend to be a client and use the key to steal information resources in the resource information database, thereby making the information in the resource information database safe and operational. Business interests are seriously threatened

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network resource query method and system
  • Network resource query method and system
  • Network resource query method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings and examples.

[0023] A method for querying network resources is provided in an embodiment of the present invention, the flow of which is as follows image 3 As shown, wherein after the client is started, it establishes a connection with the server through the network, and the same security policy is preset in the client and the server, and the security policy is an algorithm used in the entire identity authentication process. The method includes:

[0024] Step 301: the client includes the original address information in the resource query request and sends it to the server;

[0025] Step 302: the server side receives the request and requires the client side to perform identity authentication;

[0026] Step 303: The client randomly generates the mother text, accordin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network resources inquiry method. A client side and a server side are equipped with the same security policy which is an algorithm used in the whole identity authentication process. The method comprises the following steps: the client side sends a resource inquiry request to the server side, and the server side indicates the client side to authenticate identity after receiving the resources inquiry request; after the identity authentication is passed, the server side inquires resources to obtain a resources inquiry result, and sends back the resources inquiry result to the client side. The invention also further provides a network resources inquiry system. The network resource inquiry method and the system ensure that the valid client side can successfully pass the identity authentication and obtain the resources inquiry result, avoid hackers or rivals from illegally stealing information in the resource information database, and greatly enhances the information security in the resource information database.

Description

technical field [0001] The invention relates to information security technology, in particular to a network resource query method and system. Background technique [0002] At present, with the explosive growth of information capacity and the rapid development of Internet technology, it is more and more obvious that people rely on the Internet to obtain various information they need. After people find the information resources they need from the Internet, although some of them can be used repeatedly online, most of the information still needs to be downloaded to the local computer for use. Because the download software can provide a higher download speed, the download software has developed rapidly as a special type of application software. [0003] Most of the current downloading software adopts the multi-resource downloading technology. The multi-resource downloading technology refers to the Uniform Resource Locator (Uniform Resource Locator, URL) link of the information r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
Inventor 李幸涛
Owner SHENZHEN THUNDER NETWORK TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products