Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for realizing network security communication, and equipment

A technology of network security and network information, which is applied in the field of network security communication, can solve problems such as security and aggravate communication insecurity, and achieve the effect of improving security and efficiency and reducing the risk of being attacked

Active Publication Date: 2020-01-21
TENCENT TECH (SHENZHEN) CO LTD
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Today's society has entered the information age. Advanced Internet technology is the leader of today's society. Advanced communication technology has also become an important communication channel in today's society. The impact of communication technology is reflected in all aspects of society. However, advanced communication technology While facilitating life and production, it also brings a series of safety problems
[0003] For example, all kinds of software have greatly facilitated people's lives, especially in today's highly popularized smartphones and computers, the software used in communication systems is extremely open, and the existence of software is inevitable, more or less security breach, which directly exacerbates the insecurity of communication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for realizing network security communication, and equipment
  • Method and device for realizing network security communication, and equipment
  • Method and device for realizing network security communication, and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to make the purpose, technical solution and advantages of the application clearer, the application will be further described in detail below in conjunction with the accompanying drawings. Apparently, the described embodiments are only some of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in the present application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present application.

[0041] It should be noted that the terms "first" and "second" in the description and claims of the present application and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such that the embodiments of the application described herein can be practiced in sequen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method and device for realizing network security communication, and equipment. The method comprises the steps: receiving a service access request which comprises the identification of a service access side, the network information of the service access side, the service access information and the session information; performing first authentication on the service accessrequest based on the network information of the service access party; when the first authentication succeeds, determining a service access party encryption algorithm corresponding to the service access party based on the identifier of the service access party; performing second authentication on the service access request based on the service access party encryption algorithm, the service access information and the session information; and when the second authentication succeeds, obtaining corresponding service data based on the service access request, and returning the service data to the service access party. According to the invention, the security of the system and background data can be improved, and the risk that the service system is attacked is reduced.

Description

technical field [0001] The present application relates to the technical field of communication, and in particular to a method, device and equipment for realizing network security communication. Background technique [0002] Network communication security is to ensure the availability, integrity, reliability and greater confidentiality of information in the form of transmission. Today's society has entered the information age. Advanced Internet technology is the leader of today's society. Advanced communication technology has also become an important communication channel in today's society. The impact of communication technology is reflected in all aspects of society. However, advanced communication technology While facilitating life and production, it also brings a series of safety problems. [0003] For example, all kinds of software have greatly facilitated people's lives, especially in today's highly popularized smartphones and computers, the software used in communicat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/0236H04L63/0281H04L63/0428H04L63/06H04L63/08H04L63/101H04L63/205H04L2463/082
Inventor 赖俊凡
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products