Secure communication method and device

A communication and security technology, applied in the field of data security, can solve problems such as server illegal attack, server automation attack, communication data leakage, etc.

Active Publication Date: 2016-04-13
RIVER INFORMATION TECH SHANGHAI CO LTD
View PDF7 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This security issue mainly involves: automated attacks on servers, leakage of communication data, illegal attacks on servers by middlemen, access to servers by illegal clients, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure communication method and device
  • Secure communication method and device
  • Secure communication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0076] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0077] Embodiments of the present invention are based on figure 1 The system architecture shown in , in this system, a security proxy device (which can be in the form of hardware, software, or virtual machine) is set between the client and the server. The security proxy device acts as an intermediate device and is responsible for the connection between the client and the server Communication security between clients, the data exchanged between the client and the server must be forwarded through the security proxy device. In order to realize the forwarding of the interactive data between the client and the server by the security agent device, the following network setting methods can be adopted in advance but not limited to:

[0078] The first way...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a secure communication method and device. Secure proxy equipment is arranged between a client and a server. The secure communication method comprises the following steps: after the secure proxy equipment receives data returned to the client by the server, allocating a token to the client, and transmitting the token, the data returned to the client by the server and an execution module to the client; and receiving a request sent by the execution module running on the client through the token, verifying the token, and forwarding the request to the server if verification passes. Through adoption of the secure communication method and device, the communication security between the client and the server is enhanced, and various automatic attacks to the server can be prevented.

Description

【Technical field】 [0001] The invention relates to the technical field of data security, in particular to a secure communication method and device. 【Background technique】 [0002] With the rapid development of network technology, whether it is the client of the mobile device or the client of the PC, the communication between the client and the server is facing severe security problems. This security problem mainly involves: automated attack on the server, leakage of communication data, illegal attack on the server by the middleman, access to the server by an illegal client, and so on. 【Content of invention】 [0003] In view of this, the present invention provides a secure communication method and device, so as to improve the security of the communication between the client and the server. [0004] The specific technical scheme is as follows: [0005] The present invention provides a method for secure communication, which is executed by a security proxy device arranged bet...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0281H04L63/06H04L63/0876H04L63/0884H04L63/10H04L63/1458H04L63/1466H04L63/1491G06F21/335H04L63/0807G06F2221/2151H04L63/0428H04L67/564H04L9/40H04L63/062H04L63/1408
Inventor 林育民肖洪勇郑霖许明
Owner RIVER INFORMATION TECH SHANGHAI CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products