Unlock instant, AI-driven research and patent intelligence for your innovation.

Network security verification method and system for distributed system

A distributed system and distributed network technology, applied in transmission systems, electrical components, etc., can solve problems such as hidden dangers in network security, achieve data transmission security, and improve the effect of verification methods

Active Publication Date: 2017-08-18
XUCHANG UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are hidden dangers in the network security of the current distributed system, so it needs to be improved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security verification method and system for distributed system
  • Network security verification method and system for distributed system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0030] Such as figure 1 As shown, this embodiment provides a network security verification method for a distributed system, the distributed network includes at least two servers 1 distributed in different regions and a network security verification data center 2, including the following steps:

[0031] a) Create a secure user name for each server 1 in advance, then encrypt and transmit it to the network security verification data center 2 for storage, and open the connection password of the network security verification data center 2 before sending it to the network security verification data center 2, By inputting the connection password on the server 1 and transmitting it to the network security verification data center 2 for verification, after the verification is completed, the data is transmitted to the network security verification data center 2;

[0032] b) When it is necessary to realize data transmission between two servers 1, the first server 1 sends its own user nam...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network security verification method for a distributed system. The network security verification method includes at least two servers distributed in different areas and a network security verification data center, wherein an input module and a time detection module are arranged on each server; each server can generate a session key and a dynamic secret order and transmit the session key and the dynamic secret order to the network security verification data center, and each server is also connected with a decryption module; and the network security verification data center carries a connection secret order that is used for pairing with the connection secret order sent by each server, is connected with each server after being successfully paired, is used for storing a secure user name, the session key and the dynamic secret order sent by each server, and can perform combined encryption for the session key and the dynamic secret order and transmit the session key and the dynamic secret order to the server that needs to receive; and the network verification is finally implemented through pairing between the two servers. The method disclosed by the invention has the characteristic of improving the security performance of network transmission.

Description

technical field [0001] The invention relates to a security authentication technology, in particular to a distributed system network security authentication method and system. Background technique [0002] With the rapid development of computer technology and network technology, Internet (Internet) technology plays an increasingly important role in people's daily life, study and work. Moreover, with the development of the mobile Internet, the Internet is also developing towards mobility. In today's information age, a variety of information devices have emerged: fixed telephones and mobile terminals for voice transmission; servers and personal computers for information resource sharing and processing; various TV sets for video data display etc. These devices are produced to solve actual needs in specific fields. With the advent of the integration of electronic consumption, computer, and communication (3C), people are paying more and more attention to the research on the com...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0442H04L63/062H04L63/08H04L67/10
Inventor 朱永杰冯战申张玲孙培岩
Owner XUCHANG UNIV