Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network security communication method and device

A network security and communication method technology, applied in the field of network security communication methods and devices, can solve the problems that the evaluation dimension cannot be optimized at the same time, the delay is unacceptable, and the TCP transmission efficiency is low, so as to reduce the probability of interception and enhance the penetration rate. The effect of permeability and ensuring safety

Pending Publication Date: 2022-03-22
浪潮工业互联网股份有限公司
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

TCP guarantees that the data delivered to the application layer is delivered in order, without loss, and without repetition. In order to achieve this goal, TCP has designed modules such as message numbering, confirmation, timeout retransmission, sliding window, and congestion control, which also makes the TCP protocol In the work, you have to pay a big price. Generally speaking, there are three main design goals of a network protocol: real-time, reliability, and fairness. In fact, these three evaluation dimensions cannot be optimal at the same time. Protocols have their design goals. For TCP, its design goals are mainly reliability and fairness, so the transmission efficiency of TCP is actually relatively low. For some applications with high real-time requirements, TCP's Latency is often unacceptable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security communication method and device
  • Network security communication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In order to enable those skilled in the art to better understand the solutions of the present invention, the present invention will be further described in detail below in conjunction with specific embodiments. Apparently, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts fall within the protection scope of the present invention.

[0033] A preferred embodiment is given below:

[0034] Such as Figure 1-2 As shown, a network security communication method in this embodiment has the following steps:

[0035] S1. Start the node, open port 12345 as the KCP protocol communication port between nodes, and open port 12346 as the node discovery mechanism port.

[0036] S2. Through the node discovery mechanism, the nodes in the blockchain obtain the IP and KCP protocol l...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of communication protocols, and particularly provides a network security communication method which is characterized by comprising the following steps: S1, starting nodes, opening a port as an inter-node KCP protocol communication port, and then opening a node discovery mechanism port; s2, through a node discovery mechanism, nodes in the block chain obtain IP and KCP protocol monitoring ports of peer nodes in the network; s3, establishing a KCP protocol connection based on UDP between the nodes; s4, negotiating between the nodes to establish an encrypted channel; s5, messages are sent among the nodes; s6, the node sends a message to a block chain service layer for processing; and S7, sequentially disconnecting the KCP connection between the nodes. Compared with the prior art, the encryption channel is adopted, the safety of data communication is guaranteed, and the method has good popularization value.

Description

technical field [0001] The invention relates to the technical field of communication protocols, and specifically provides a network security communication method and device. Background technique [0002] TCP and UDP are the two main transport protocols in the transport layer. TCP is a transport protocol oriented to connection byte streams and provides reliable services to the application layer, while UDP is oriented to Packets (like IP packets, when communicating with peer-to-peer protocol stacks, No need to establish a connection in advance), unreliable, best-effort delivery (best-effort) transport protocol. TCP guarantees that the data delivered to the application layer is delivered in order, without loss, and without repetition. In order to achieve this goal, TCP has designed modules such as message numbering, confirmation, timeout retransmission, sliding window, and congestion control. This also makes the TCP protocol In the work, you have to pay a big price. Generally ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40H04L67/01H04L69/164
CPCH04L63/0435H04L69/164H04L69/26
Inventor 刘亚雄商广勇李程刘宁马岩堂
Owner 浪潮工业互联网股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products