Computing equipment and equipment communication method

A computing device and device communication technology, applied in the direction of electrical components, transmission systems, etc., can solve problems such as network security and equipment security cannot be guaranteed, and achieve the effect of reducing the risk of being attacked and ensuring network security and equipment security

Inactive Publication Date: 2017-02-08
ANTAIOS (BEIJING) INFORMATION TECH
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] One of the purposes of the present invention is to provide a device communication method to solve the problem that the network security and device security of the private network cannot be guaranteed in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computing equipment and equipment communication method
  • Computing equipment and equipment communication method
  • Computing equipment and equipment communication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. However, it will be understood by those skilled in the art that the present invention may be practiced without these specific details. In other instances, well-known methods, procedures, components and circuits have not been described in detail so as not to obscure the present invention.

[0028] In order to understand the main idea of ​​the present invention faster, before setting forth the illustrative embodiments of the present invention, the main idea of ​​the present invention is briefly described:

[0029] The basis of data transmission is that the two sides of the interactive communication device exchange each other's IP address / MAC address, supported communication protocol, port number and other information through a three-way handshake. The two devices obtain and determine each other's address and protocol. The d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses computing equipment and an equipment communication method. The method comprises the steps: receiving first data transmitted by second computing equipment at a network side; analyzing the communication structure of the first data, transmitting second data, corresponding to the first data, of a communication structure to the second computing equipment if the communication structure of the first data is not a first communication structure, wherein the second data is used for indicating the second computing equipment to transmit the data of the first communication structure. Through a reverse authentication mechanism, the method achieves the 'first verification, second connection' network access management, avoids the attack risks caused by the first connection, and guarantees the network safety and equipment safety of a private network. Moreover, the method employs a no-response strategy, reduces the attack risks, and further guarantees the network safety and equipment safety of the private network.

Description

technical field [0001] The invention relates to the technical field of network communication detection, in particular to a computing device and a device communication method. Background technique [0002] Computer network transmission complies with the OS I seven-layer network model. OS I defines the standards for different computer interconnections, so that computing devices with different operating systems and CPU processors can communicate with each other; network access management also follows the OS I model. For private networks For example, the TCP / IP protocol defines a three-way handshake process before the communication between the communication devices of both parties to establish a data link between the communication devices, but in the handshake It is very likely that an attack has already been encountered during the process. Tampering the verification program or forging access information will cause the subsequent verification to lose its original effect or direc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/08H04L67/141H04L69/161
Inventor 汪家祥
Owner ANTAIOS (BEIJING) INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products