Communication safety verification method and device thereof

A technology of communication security and verification method, applied in the field of communication security verification method and device thereof, can solve the problems of low security and the like

Active Publication Date: 2014-09-10
KENIU NETWORK TECH BEIJING
View PDF2 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The server directly controls the client according to the RegID. In this process, the server and the client will not perform security verification processing, and the security is low.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication safety verification method and device thereof
  • Communication safety verification method and device thereof
  • Communication safety verification method and device thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0119] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0120] Such as figure 1 As shown, it is a schematic flow chart of a communication security verification method provided by an embodiment of the present invention. The method can be applied to a system including a GCM platform, a client, and a server. The method can include the following steps:

[0121] Step 101, the client generates a client Token, and sends the client Token to the server.

[0122] Specifically, in the unified message push system based on the GCM ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a communication safety verification method. The method comprises the steps: a client generates a client token and transmits the client token to the server; the client receives validation information returned by the server, wherein the validation information takes the client token and a server token generated by the server, and the server token is used for exclusively identifying information sent by the sever; the client verifies the client token taken in the validation information, and returns first confirmation information with the server token to the server; when the client receives second confirmation information returned by the server, the communication safety is determined between the client and the server. The invention further discloses a client and a server. By adopting the method, the communication safety can be improved.

Description

technical field [0001] The present invention relates to the technical field of communications, in particular to a communication security verification method and device thereof. Background technique [0002] In the mobile era, the application scenario of controlling a single App (application) in the cloud is very common. In this application scenario, message push is essentially to continuously request the server in a polling manner, but for mobile devices, if each application has its own polling framework, it will consume a lot of power. To solve this problem, Google developed The unified message push platform GCM (Google Cloud Messaging, Google Cloud Message Push) platform can provide a unified message push service for all applications. [0003] In the existing GCM platform-based message push technology, after the client applies for a RegID (Registration IDentity, registration identifier) ​​from the GCM platform, it reports the RegID to the server. The server directly cont...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 胡月鹏王春雷刘强
Owner KENIU NETWORK TECH BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products