Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Communication method and device with memory function

A communication method and memory technology, applied in the field of data communication, can solve the problems of complex key management and key negotiation process, vulnerability to DoS attacks, and inability to trace the content of communication, so as to achieve batch signature verification of messages and ensure integrity. and consistency effects

Pending Publication Date: 2022-05-27
BEIJING INFORMATION SCI & TECH UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, additional security enhancement technologies such as IPSec can only solve local problems in a local area. In particular, the implementation of IPSec technology is relatively complicated, and its key management and key agreement process are very complicated, and it is vulnerable to DoS attacks and man-in-the-middle attacks; At the same time, the non-repudiation of data transmission cannot be guaranteed, and the communication content cannot be traced

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication method and device with memory function
  • Communication method and device with memory function
  • Communication method and device with memory function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided so that the present disclosure will be more thoroughly understood, and will fully convey the scope of the present disclosure to those skilled in the art.

[0028] figure 1 A schematic structural diagram of a communication system with a memory function provided by an embodiment of the present invention is shown, see figure 1 , The communication system with memory function provided by the embodiment of the present invention includes: a communication device with memory function and a peer device. The peer device is the same as the communication device with memory function and can...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

According to the communication method and device with the memory function provided by the invention, both communication parties realize a memorized communication mode by setting the memory function, and the existence of any message can be efficiently memorized, inquired and proved so as to achieve a tracing effect; and meanwhile, the two communication parties maintain the same memory function, so that the integrity and consistency of data transmission can be ensured, and the effect of message batch signature verification can be realized.

Description

technical field [0001] The present invention relates to the technical field of data communication, and in particular, to a communication method and device with a memory function. Background technique [0002] The traditional TCP / IP network transmission mode does not have endogenous security mechanisms such as address authenticity identification, which is easy to cause the transmitted content to be tampered with and forged, resulting in a large number of attacks such as source address spoofing, route hijacking, and denial of service. In order to solve such security problems, additional security enhancement technologies such as IPSec are usually used to encrypt and authenticate the transmitted packets. However, additional security enhancement technologies such as IPSec can usually only solve local problems in a local scope, especially the implementation of IPSec technology is relatively complex, its key management and key negotiation process is very complicated, and it is vuln...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32
CPCH04L9/321H04L9/3218H04L9/3247
Inventor 蒋文保叶帅
Owner BEIJING INFORMATION SCI & TECH UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products