Unlock instant, AI-driven research and patent intelligence for your innovation.

A computer communication method, network host and system

A technology of network hosts and computers, which is applied in transmission systems and key distribution, can solve problems such as illegal data tampering and theft, open access protocols, and access without a verification mechanism, etc., to achieve the effect of ensuring security

Active Publication Date: 2016-01-06
BC P INC CHINA NAT PETROLEUM CORP +2
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] During the interaction process between the application on the network host and the service data on the service host, the application must know the access address of the service. Once the access address of the service changes, the application will fail to access the service; and the access protocol between the service and the application is public, and the data It is easy to be illegally tampered with and stolen, and there is no verification mechanism for application access to services, which may easily cause arbitrary access to services by illegal applications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A computer communication method, network host and system
  • A computer communication method, network host and system
  • A computer communication method, network host and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] An embodiment of the present invention provides a computer communication method, the method comprising:

[0050] 101: Detect loading of an encryption module that stores an identity code and a key algorithm factor that match the service host;

[0051] 102: Obtain the identity code and key algorithm factor from the encryption module;

[0052] 103: According to the identification code and the key algorithm factor, generate the service host location key needed to determine the process of matching the service host; broadcast the service host location information encrypted with the service host location key, and receive the response from the service host;

[0053] 104: Verify whether the response is correct according to the service host location key; if the response is correct, generate a link connection key according to the identity code and key algorithm factor; send the link connection information encrypted with the link connection key to the service host;

[0054] 105: ...

Embodiment 2

[0058] see figure 2 , the embodiment of the present invention provides a method for communicating between a network host and a service host, which is described by taking the network host as an example. The method mainly includes steps 201-205:

[0059] 201: Detect loading of an encryption module storing an identity code and a key algorithm factor matching the service host, and obtain the identity code and key algorithm factor from the encryption module;

[0060] In this step, the encryption module detected on the network host is used to pre-store the identity of the service host and the key algorithm factor. The encryption module can specifically use an encryption lock, which is an encryption product that is inserted into a computer USB port and combines software and hardware; The encryption module detection program installed on the network host will detect the loading of the encryption module, and drive the network host to read the content in the encryption module; read the ...

Embodiment 3

[0144] see Figure 9 , this embodiment provides a network host, the network host includes:

[0145] An acquisition module 901, configured to acquire an identity code and a key algorithm factor matched with the service host;

[0146] A key generation module 902, configured to generate a link connection key according to an identity code and a key algorithm factor;

[0147] The sending module 903 is configured to send the link connection information encrypted with the link connection key to the service host;

[0148] The receiving module 904 is configured to receive a response from the service host, and verify whether the response is correct according to the link connection key;

[0149] If the answer is correct, the sending module 903 sends communication data information to the service host to establish communication with the service host.

[0150] The detection module 905 is configured to detect the loading of the encryption module 906 and drive the acquisition module 901 to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a communication method of a computer, a network host and a communication system and belongs to the technical field of communication. The communication method of the computer includes the following steps of obtaining an identity identification code and a secret key algorithm factor, wherein the identity identification code and the secret key algorithm factor are matched with a service host; generating a service host locating secret key and a link connection secret key according to the identity identification code and the secret key algorithm factor; sending service host locating information which is encrypted through the service host locating secret key, receiving a response of the service host, and sending link connection information which is encrypted through the link connection secret key to the service host when the response of the service host is right; and receiving the response of the service host, sending communication data information to the service host and establishing communication with the service host when the response is right. The communication method of the computer, the network host and the communication system can achieve safety verification of mutual information between the service host and the network host and guarantees safety of the communication. Applications on the network host need to be registered on a link monitoring program, and therefore the fact that an illegal application accesses the service host is avoided.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a computer communication method, a network host and a system. Background technique [0002] In the distributed computer architecture, the computers in the system are divided into two types according to their functions: service hosts and application hosts. A system function program run by a service host is called a service, and a system function program run by an application host is called an application. With the widespread application and continuous maturity of distributed computer technology in enterprise informatization and process automation, various services are continuously integrated, standardized and standardized, and services have shown a trend of cross-system development. The correlation and integration between various services and applications are broken, and the relationship between services and applications is becoming looser and looser. In this process, secu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08
Inventor 郭长滨李国栋
Owner BC P INC CHINA NAT PETROLEUM CORP