Clock calibration method and network security protection method and device based on clock synchronization

A clock calibration and clock error technology, which is applied in the field of computer equipment and storage media, clock calibration methods, devices, and network security protection methods based on clock synchronization, can solve complex and time-consuming processes, low efficiency of clock calibration, and inability to obtain client Problems such as clock error with the server to achieve the effect of preventing network attacks, efficient network security protection, and improving network security

Pending Publication Date: 2021-10-26
PING AN ASSET MANAGEMENT CO LTD
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method relies on the server's support for NTP, so if the server does not provide NTP support, this method cannot obtain the clock error between the client and the server
The current clock calibration method based on the HTTP protocol is to send two HTTP requests to the target host at intervals of a time interval by the local host, record the sending time of the local host, the time of receiving the response and the time of the target host sending t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Clock calibration method and network security protection method and device based on clock synchronization
  • Clock calibration method and network security protection method and device based on clock synchronization
  • Clock calibration method and network security protection method and device based on clock synchronization

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0065] The clock calibration method provided by this application can be applied to such as figure 1 shown in the application environment. Wherein, the terminal 102 communicates with the server 104 through the network. It may be that the user sets the request sending time interval, so that the terminal 102 regularly sends the heartbeat request to the server 104 according to the preset time interval, and records the request sending time of the heartbeat request, and then receives the heartbeat request response message fed back by the server 102, and Record the message rece...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of security monitoring, and provides a clock calibration method and a network security protection method and device based on clock synchronization. The clock calibration method comprises the following steps: sending a heartbeat request to a server, recording request sending time of the heartbeat request, receiving a heartbeat request response message which is fed back by the server and carries request receiving server time for receiving the heartbeat request, and recording message receiving time; and if time deviation between the request sending time and the message receiving time is less than or equal to preset time deviation, determining a clock error relative to the server, and calibrating a local clock according to the clock error. By adopting the method, clock calibration efficiency can be improved. The network security protection method based on clock synchronization comprises the following steps: receiving a heartbeat request which is sent by a user terminal and carries request initiation time, recording request receiving time, and filtering the heartbeat request in which the time deviation between the request initiation time and the request receiving time exceeds the preset time deviation. The method can realize efficient network protection.

Description

technical field [0001] The present application relates to the technical field of security monitoring, in particular to a clock calibration method, device, computer equipment and storage medium, and a clock synchronization-based network security protection method, device, computer equipment and storage medium. Background technique [0002] With the rapid development of Internet technology, more and more businesses are connected to the Internet, and various smart devices have been launched, such as ticket issuing machines for movie theaters. However, these devices are directly connected to the public network with poor network security, and are easy to be hijacked when making a request. In order to ensure the reliability of the request, it is necessary to ensure that the clocks between the client and the server are kept synchronized so that the clock error is kept within a reasonable error range. [0003] At present, the commonly used method to solve network clock synchronizat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04J3/06H04L29/08H04L12/26H04L29/06
CPCH04J3/0638H04L67/02H04L43/10H04L63/0227
Inventor 管圣腾刘南翔黄瑞华晁士龙柳丽丽
Owner PING AN ASSET MANAGEMENT CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products