Method and system for confirming network communication object

A network communication and main technology, applied in transmission systems, error prevention/detection using return channels, electrical components, etc., can solve problems such as unfavorable network security protection, handshaking process is vulnerable to network interception, etc., to achieve multi-layer protection. Effect

Inactive Publication Date: 2014-02-12
冯丽娟
View PDF2 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The above handshake process is vulnerable to network interception, so that malicious programs pretend to be th

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for confirming network communication object
  • Method and system for confirming network communication object
  • Method and system for confirming network communication object

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0030] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings. It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.

[0031] Communication handshake and data transmission process

[0032] The inventor found through analysis that the TCP communication handshake process is as follows figure 1 Shown:

[0033] Among them, the requesting party is referred to as Party A, and the requested party is referred to as Party B;

[0034] (1) At the beginning of TCP communication, Party A will send a control bit (ie bit code) syn of 1, and include the machine's random serial number (ie sequence number / sequence number) seq=x data packet to Party B;

[0035] (2) After Party B receives the data packet with the control bit syn as 1, it will constr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for confirming a network communication object. A data sender is called a sender for short, and a data receiver is called a receiver for short. The method comprises the steps that when the sender transmits data to the receiver, the initial package, to be sent, of the sender is intercepted, equal-length encryption is carried out on the initial package or one or more fields in the initial package, and then the initial package is sent to the receiver; after the receiver receives the initial package, decryption is carried out on the encrypted initial package or one or more encrypted fields in the initial package, if the decryption succeeds, decrypted data are sent upwards to the protocol layer of a local computer, an if the decryption fails, the initial package is abandoned; the initial package comprises SeqNumber, AckNumber, data length and ACK control bit fields, and an ACK control bit is set to be 1. The encryption and the decryption are carried out on the two communication ends, and data transmission of each time is protected.

Description

technical field [0001] The invention relates to the field of computer network security, in particular to a network communication subject confirmation method and system. Background technique [0002] Network security protection is a kind of network security technology, which refers to technical solutions such as how to effectively carry out intervention control and how to ensure the security of data transmission, mainly including physical security analysis technology, network structure security analysis technology, system security analysis technology , manage security analysis techniques, and other security services and security mechanism strategies. [0003] TCP (Transmission Control Protoc01) transmission control protocol, providing reliable connection services. [0004] There are 6 types of TCP flags (bit codes): SYN (synchronous connection establishment), ACK (acknowledgment confirmation), PSH (push transmission), FIN (finish end), RST (reset reset), URG (urgent emergenc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L1/16
Inventor 冯丽娟
Owner 冯丽娟
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products