Unlock instant, AI-driven research and patent intelligence for your innovation.

Self-adaptive method and system for network security

A network security and user technology, applied in the field of communication, can solve problems such as incomplete authentication, abnormal download of business data, easy loss of signaling, etc., and achieve the effect of reducing occupancy

Active Publication Date: 2019-09-03
武汉思普崚技术有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The existing technology requires an authentication request first, and then a business request. The server needs to respond twice before it can start sending business data, which involves a lot of signaling overhead
And when the terminal is in a mobile state, it is easy to lose signaling, resulting in incomplete authentication or abnormal download of business data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Self-adaptive method and system for network security
  • Self-adaptive method and system for network security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings, so that the advantages and features of the present invention can be more easily understood by those skilled in the art, so as to define the protection scope of the present invention more clearly.

[0032] figure 1 A flow chart of the adaptive method provided by this application, the method includes:

[0033] The sending end obtains the network security data and user identity data, determines the corresponding priority level according to the importance of the transmission service, selects the modulation mode according to the priority order from high to low, and sends an authentication request to the receiving end, and the authentication request carries Network security data and user identity data; the network security data includes business request data;

[0034] Wherein, the selection of the modulation method includes: estimating the first...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a self-adaptive method and system for network security, and the method comprises the steps: a sending end carrying network security data and user identity data in an authentication request, and determining a self-adaptive modulation mode according to the importance of a transmission service and a first CSI value of a transmission channel; the relay receiving end determininga self-adaptive demodulation mode according to the estimated second CSI value of the transmission channel and the estimated service importance of the service data packet which is successfully transmitted last time; receiving demodulation data of a user, extracting network security data and user identity data from the demodulation data for authentication, directly issuing service data after the authentication is passed, combining an authentication request and a service request into a whole, ensuring that the authentication process is quickly completed, and reducing the occupation of a mobile transmission channel as much as possible.

Description

technical field [0001] The present application relates to the field of communication technology, and in particular to an adaptive method and system for network security. Background technique [0002] In the prior art, an authentication request is required first, and then a service request is made, and the server needs two responses before it can start delivering service data, which involves a large amount of signaling overhead. And when the terminal is in a moving state, it is easy to lose signaling, resulting in incomplete authentication or abnormal download of service data. An improved authentication method needs to be provided to simplify the link of terminal authentication. Contents of the invention [0003] The purpose of the present invention is to provide an adaptive method and system for network security. Considering that the terminal is in a mobile state, the authentication request and the service request are combined into one, and adaptively selected according t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/06H04B17/309
CPCH04W12/06H04B17/309
Inventor 段彬
Owner 武汉思普崚技术有限公司