Secure communication method and system of secure server

A security server and communication system technology, applied in transmission systems, electrical components, etc., can solve problems such as unauthorized access by users, threats to security application systems, and difficulty in tracing and tracking, so as to improve security performance, avoid direct operation, and be strong. retroactive effect

Active Publication Date: 2013-04-10
THE FIRST RES INST OF MIN OF PUBLIC SECURITY +1
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this communication mode, the security server 12 is visible to the business operation platform 11, so there is a possibility that users of the business operation platform 11 or illegal operators attack the security server 12 by illegal means, so that the security of the security server 12 is at great risk. thereby threatening the security application system 1
[0003] In addition, in the security application system 1, there is no related access control technical solution for the users of the business operation platform 11 and the operation terminals of the business operation platform 11, and it may happen that the user accesses beyond the authority or illegal operators illegally access the security server 12. In addition, the security application system 1 lacks an effective control scheme for users and operating terminals, and it is difficult to trace and track problems after they occur.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure communication method and system of secure server
  • Secure communication method and system of secure server
  • Secure communication method and system of secure server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments, but the protection scope of the present invention is not limited thereto.

[0047] Such as figure 2 As shown, the security communication system 2 of the security server of the present invention includes a proxy server 23 , a business system operation terminal 21 , an information verification terminal 24 and a security server 22 . Wherein, three network cards are installed in the proxy server 23, and are respectively connected through communication between the business system operation terminal 21, the information verification terminal 24 and the security server 22 through these three network cards, and the business system operation terminal 21, the information verification terminal 24 and the security server The servers 22 are not connected to each other, so that the security server 22 is isolated from the operation terminal 21 of the business s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secure communication method of a secure server. The secure communication method of the secure server comprises the following steps of (1) registering information through an information verification terminal, and binding a user ID and a business system operation terminal internet protocol (IP); (2) checking biological characteristics of a user; (3) registering through the business system operation terminal IP which is bound with the user, and checking the state of the user in the information verification terminal through a proxy server; (4) the business system operation terminal IP accessing the secure server through the proxy server; (5) logging off verification information of the user. The invention further discloses a system which is used for implementing of the communication method, and the system comprises the proxy server, a business system operation terminal, the information verification terminal and the secure server. The business system operation terminal, the information verification terminal and the secure server are respectively connected with the proxy server in a communication mode. The proxy server conducts data forwarding between the business system operation terminal and the secure server, so that the secure server is invisible in the business system operation terminal and illegal operation of the secure server is avoided.

Description

technical field [0001] The invention relates to the technical field of information security, especially related to the communication security of a security server. Background technique [0002] At present, the existing security application system 1 schemes are in the form of figure 1 As shown, the security application system 1 generally directly provides secure password services for the business operation platform 11 in the form of a security server 12, the security server 12 is directly connected to the business operation platform 11, and the security server 12 is directly connected to the business operation platform 11. To send and receive data to each other, security services include such content as identity authentication, data confidentiality, digital signature and signature verification. In this communication mode, as a support for providing cryptographic services externally, the security of the security server 12 is the only key element to ensure the business securit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 蒋才平李景华鄢金端陆洪波亢洋邓晨
Owner THE FIRST RES INST OF MIN OF PUBLIC SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products