Method and device for realizing network security communication, and equipment

A technology of network security and network information, which is applied in the field of network security communication, can solve problems such as security and aggravate communication insecurity, and achieve the effect of improving security and efficiency and reducing the risk of being attacked

Active Publication Date: 2020-01-21
TENCENT TECH (SHENZHEN) CO LTD
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Today's society has entered the information age. Advanced Internet technology is the leader of today's society. Advanced communication technology has also become an important communication channel in today's society. The impact of communication technology is reflected in all aspects of society. However, advanced communication technology While facilitating life and production, it a

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for realizing network security communication, and equipment
  • Method and device for realizing network security communication, and equipment
  • Method and device for realizing network security communication, and equipment

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0040] In order to make the purpose, technical solutions, and advantages of this application clearer, the application will be further described in detail below in conjunction with the accompanying drawings. Obviously, the described embodiments are only a part of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in this application, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of this application.

[0041] It should be noted that the terms "first" and "second" in the description and claims of the application and the above-mentioned drawings are used to distinguish similar objects, and are not necessarily used to describe a specific sequence or sequence. It should be understood that the data used in this way can be interchanged under appropriate circumstances, so that the embodiments of the present application described herein can be implemented i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method and device for realizing network security communication, and equipment. The method comprises the steps: receiving a service access request which comprises the identification of a service access side, the network information of the service access side, the service access information and the session information; performing first authentication on the service accessrequest based on the network information of the service access party; when the first authentication succeeds, determining a service access party encryption algorithm corresponding to the service access party based on the identifier of the service access party; performing second authentication on the service access request based on the service access party encryption algorithm, the service access information and the session information; and when the second authentication succeeds, obtaining corresponding service data based on the service access request, and returning the service data to the service access party. According to the invention, the security of the system and background data can be improved, and the risk that the service system is attacked is reduced.

Description

technical field [0001] The present application relates to the technical field of communication, and in particular to a method, device and equipment for realizing network security communication. Background technique [0002] Network communication security is to ensure the availability, integrity, reliability and greater confidentiality of information in the form of transmission. Today's society has entered the information age. Advanced Internet technology is the leader of today's society. Advanced communication technology has also become an important communication channel in today's society. The impact of communication technology is reflected in all aspects of society. However, advanced communication technology While facilitating life and production, it also brings a series of safety problems. [0003] For example, all kinds of software have greatly facilitated people's lives, especially in today's highly popularized smartphones and computers, the software used in communicat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0236H04L63/0281H04L63/0428H04L63/06H04L63/08H04L63/101H04L63/205H04L2463/082
Inventor 赖俊凡
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products