Communication method and device

A communication method and technology of the communication party, applied in the field of communication methods and devices, can solve problems such as losses, achieve the effect of protecting interests and improving communication security

Active Publication Date: 2016-06-29
ALIBABA GRP HLDG LTD
View PDF8 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, when electronic devices are lost or account passwords are leaked, illegal users may impersonate corresponding users and obtain sensitive content from other users, causing serious losses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication method and device
  • Communication method and device
  • Communication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] To further illustrate the application, the following examples are provided:

[0036] figure 1 It is a flow chart of a communication method based on verifying the initiator in an exemplary embodiment of the present application, such as figure 1 As shown, the method is applied to the electronic device of the verification initiator, and may include the following steps:

[0037] Step 102, the local device initiates a user identity verification request to the peer device.

[0038] Step 104, the local device determines whether the peer communication party has passed the identity verification according to the received response information; wherein, the response information is directly sent by the peer device to the local device, or is sent by the server according to Generated based on the return information from the peer device.

[0039] Step 106 , when the peer communication party passes the identity verification, the local device completes the communication process betwee...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a communication method and device. The method may comprise that a local end device initiates a user identity verification request to an opposite end device; the local end device determines whether an opposite end communication party passes identity verification or not according to received response information, wherein the response information is directly sent to the local end device by the opposite end device, or is produced by a server according to the returned information from the opposite end device; and when the opposite end communication party passes identity verification, the local end device finishes a communication process between a local end communication party and the opposite end communication party. Through adoption of the technical scheme provided by the invention, the communication security is increased; and the benefits of the communication parties are ensured.

Description

technical field [0001] The present application relates to the technical field of communication, and in particular to a communication method and device. Background technique [0002] When sensitive content is involved, each communication party often needs to determine the security of the communication environment to avoid leakage of sensitive content. In related technologies, it is proposed to encrypt communication messages to ensure that even after the communication messages are leaked, sensitive content therein can still be protected from being easily viewed. [0003] However, in the case of lost electronic devices or leaked account passwords, illegal users may impersonate corresponding users and obtain sensitive content from other users, causing serious losses. Contents of the invention [0004] In view of this, the present application provides a communication method and device, which can improve communication security and protect the interests of communication parties....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/108H04L65/1069H04L9/321H04L2209/80H04L9/3297H04L9/3226H04L63/0428H04L63/0861
Inventor 张黎黎陈航
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products