Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Data secure communication method

A communication method and data security technology, applied in the field of data communication, can solve the problems such as the inability of the owner to modify the password actively, the data is not completely consistent, and the lack of initiative, etc., to shorten the establishment time, improve the speed of the handshake protocol, and reduce the power consumption. Effect

Inactive Publication Date: 2016-03-23
STATE GRID SHANDONG LINQU POWER SUPPLY +2
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, there is still a large risk of leakage in this communication method, because no dynamic data participates in the encryption operation, so the encrypted result will not change. How complicated the encryption process is, once the source code is leaked, it is hard to escape the fate of being cracked on a large scale. The reason is very simple. After mastering the source code, the password cracker can use the input password to obtain the encryption result, and the website needs to face a large number of terminals. , the same communication protocol must be adopted for all terminals, otherwise, it is possible that false terminals can pass the verification
[0006] There is also a biological code, which uses some special structures of certain organs or tissues of the human body to have certain stability and unity throughout life. This special structure can be read by a computer system, such as fingerprints or irises, The disadvantage of this type of password is that the owner of the password cannot actively modify it, lacks initiative, and the data stored on the server is not completely consistent with the data to be tested. It is necessary to use a fuzzy algorithm to obtain the answer through comparison, and the fuzzy algorithm consumes a lot of system resources.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data secure communication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] see figure 1 , the data security communication method of the present embodiment, comprises the following steps:

[0043] A data security communication method, comprising the steps of:

[0044] 1) The control center performs security verification on the interactive terminal and establishes a secure communication channel; specifically includes the following steps:

[0045]101) The interactive terminal queries the cached session connection information with the control center, uses the digest algorithm cached in the session connection information to perform digest calculation on the session key, and writes the session number and the digest calculation result into the connection application packet;

[0046] 102) The interactive terminal queries the cached control center certificate, and writes the serial number of the control center certificate and the serial number of the interactive terminal certificate into the connection application packet;

[0047] 103) The interactiv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the data secure communication technical field and relates to a data secure communication method. The data secure communication method includes the following steps that: 1) a control center performs security authentication on interaction terminals and establishes secure communication channels; and 2) the control center allows interaction terminals which pass the security verification to perform data operation on an interaction medium through the safe communication channels, and prevents interaction terminals which do not pass the security verification from performing data operation on the interaction medium. With the data safe communication method of the invention adopted, the secure communication channels can be established more fast, and cracking difficulty of digital certificates can be increased, and the safety and reliability of a data communication process can be enhanced, and the consumption of resources of a communications system by the communication process can be reduced.

Description

technical field [0001] The invention relates to the technical field of data communication, in particular to a data security communication method. Background technique [0002] Nowadays, with the development of the information age, the security of information interaction has attracted more and more attention. At present, some encryption measures are adopted in various data exchanges, mainly using some digital encryption methods. [0003] A digital certificate is a kind of electronic identity proof. Usually, a digital certificate is an invariable encrypted data. The passwords, passwords and digital certificates we use seldom use plaintext data for security. They all use encrypted data. Encrypted data It is to use a program to set an encryption protocol, that is, to ensure the consistency of encryption and decryption through a certain algorithm to facilitate verification [0004] A very common secure communication channel establishment and data protection method is to use the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/166
Inventor 马华杰邱梅庞占星赵晓雪郎需栋高继轩陈万强许朋波刘刚
Owner STATE GRID SHANDONG LINQU POWER SUPPLY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products