A computer communication method, network host and system
A technology of network hosts and computers, which is applied in transmission systems and key distribution, can solve problems such as illegal data tampering and theft, open access protocols, and access without a verification mechanism, etc., to achieve the effect of ensuring security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0049] An embodiment of the present invention provides a computer communication method, the method comprising:
[0050] 101: Detect loading of an encryption module that stores an identity code and a key algorithm factor that match the service host;
[0051] 102: Obtain the identity code and key algorithm factor from the encryption module;
[0052] 103: According to the identification code and the key algorithm factor, generate the service host location key needed to determine the process of matching the service host; broadcast the service host location information encrypted with the service host location key, and receive the response from the service host;
[0053] 104: Verify whether the response is correct according to the service host location key; if the response is correct, generate a link connection key according to the identity code and key algorithm factor; send the link connection information encrypted with the link connection key to the service host;
[0054] 105: ...
Embodiment 2
[0058] see figure 2 , the embodiment of the present invention provides a method for communicating between a network host and a service host, which is described by taking the network host as an example. The method mainly includes steps 201-205:
[0059] 201: Detect loading of an encryption module storing an identity code and a key algorithm factor matching the service host, and obtain the identity code and key algorithm factor from the encryption module;
[0060] In this step, the encryption module detected on the network host is used to pre-store the identity of the service host and the key algorithm factor. The encryption module can specifically use an encryption lock, which is an encryption product that is inserted into a computer USB port and combines software and hardware; The encryption module detection program installed on the network host will detect the loading of the encryption module, and drive the network host to read the content in the encryption module; read the ...
Embodiment 3
[0144] see Figure 9 , this embodiment provides a network host, the network host includes:
[0145] An acquisition module 901, configured to acquire an identity code and a key algorithm factor matched with the service host;
[0146] A key generation module 902, configured to generate a link connection key according to an identity code and a key algorithm factor;
[0147] The sending module 903 is configured to send the link connection information encrypted with the link connection key to the service host;
[0148] The receiving module 904 is configured to receive a response from the service host, and verify whether the response is correct according to the link connection key;
[0149] If the answer is correct, the sending module 903 sends communication data information to the service host to establish communication with the service host.
[0150] The detection module 905 is configured to detect the loading of the encryption module 906 and drive the acquisition module 901 to...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 