Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A message processing method, bastion host and terminal equipment

A technology for terminal equipment and packet processing, applied in the field of communications, can solve problems such as server attacks, and achieve the effect of enhancing security, realizing security reinforcement, and reducing the risk of hijacking attacks

Active Publication Date: 2021-05-28
NEW H3C SECURITY TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, once the bastion host itself is compromised, the servers protected by the bastion host will also be exposed, which in turn will cause the server to be attacked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A message processing method, bastion host and terminal equipment
  • A message processing method, bastion host and terminal equipment
  • A message processing method, bastion host and terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0041] In order to realize the security reinforcement of the bastion host itself, thereby reducing the risk of a man-in-the-middle hijacking attack, an embodiment of the present application provides a message processing method, a bastion host, and a terminal device, which are applied to the bastion host, wherein the message processing method includes:

[0042] Receive the pending message sent by the terminal device, the pending message is: a message encrypted by the terminal device u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An embodiment of the present application provides a message processing method, a bastion host, and a terminal device, wherein the message processing method applied to the bastion host includes: receiving a message to be processed sent by the terminal device; obtaining the first message of the message to be processed; Characteristic information; based on the first corresponding relationship between the characteristic information and the key identifier, obtain the first key identifier corresponding to the first characteristic information; use the key represented by the first key identifier to decrypt the message to be processed; decrypt the decrypted The pending packets are processed. By encrypting the pending messages between the client and the bastion host, the security of the bastion host is enhanced, the security reinforcement of the bastion host itself is realized, and the risk of man-in-the-middle hijacking attacks is effectively reduced.

Description

technical field [0001] The present application relates to the technical field of communications, and in particular to a message processing method, a bastion host, and a terminal device. Background technique [0002] In the network, the bastion host is connected to the terminal and the server respectively. In this way, the bastion host cuts off the direct connection between the terminal and the server, and also cuts off the direct access of the terminal to the server, and the terminal can only access the server through the bastion host. The bastion host adopts the method of protocol proxy, and the proxy terminal initiates access to the server. Using the bastion machine agent to access the server can effectively block illegal access and malicious attacks from the terminal. It not only strengthens the operation and maintenance management, but also improves the access security to the server. [0003] Based on the role played by the bastion host in the terminal's access to the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0281H04L63/0428H04L63/126H04L63/1441
Inventor 岳炳词
Owner NEW H3C SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products