Supercharge Your Innovation With Domain-Expert AI Agents!

Method for enhancing network communication security

A technology for communication security and network enhancement, applied in the field of enhanced communication security, can solve problems such as inability to guarantee security, difficulties, etc., and achieve the effects of improving security, preventing leakage, and preventing the execution of illegal configurations

Inactive Publication Date: 2015-03-25
PHICOMM (SHANGHAI) CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Although the encryption algorithm is used to encrypt the user name and password in the message, it brings some difficulties to illegal users to obtain the user name and password required for device configuration through the message, but it cannot guarantee 100% security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for enhancing network communication security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] In order to enable those skilled in the art to better understand the technical solutions of the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings and embodiments. Obviously, the described embodiments are only the present invention. Some embodiments of the invention are not all of the embodiments.

[0015] In the present invention, after the client (usually a host equipped with a web browser) logs in to the server with a correct user name and password, the server uses the user name, password, and client IP address as the identification of the connection between the client and the server, and records The absolute time the client logged in.

[0016] The present invention saves user names, passwords and client IP addresses for each legally connected client on the server. When the server receives the request message from the client, it checks whether the conn...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for enhancing network communication security. The method includes the steps that a server responds with a sending confirming message after receiving a request message, the server gives up the request message and does not execute the content of the request message if not receiving the response to the confirming message from a client side within a specific period of time, and the server responds to the request message and executes the content of the request message if receiving the response to the confirming message from the client side within the specific period of time. The server responds to each received request message with one confirming message; when the response to the confirming message is not received within a certain period of time, the request message is considered as illegal, and the content of the request message is not executed. By means of the method, the communication security is effectively improved, the leakage of device information is avoided, and the execution of illegal configuration is avoided as well.

Description

technical field [0001] The invention relates to the field of network communication, in particular to a method for enhancing communication security. Background technique [0002] With the development of computer and communication technology, Internet applications are no longer limited to PCs, and the networking of embedded devices has also become a product of the development of information technology. After the embedded device is connected to the Internet, it can easily share information to the network, and also realize remote control, upgrade and maintenance of the device. Users only need a web browser to visually understand the device information and running status, and can configure the device simply and conveniently by changing the elements on the page, without having too much understanding of the device internals. [0003] When the device is connected to the Internet, the information is shared in the network, and remote configuration is also acceptable. This not only p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/08
Inventor 黄小飞车任秋刘驰王旭仲
Owner PHICOMM (SHANGHAI) CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More