Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Safe network transmission method and system

A technology of secure network and transmission method, applied in the direction of transmission system, digital transmission system, data exchange network, etc., can solve the problem of host or specific port attack without providing technical means, and achieve the effect of preventing attacks

Inactive Publication Date: 2003-03-19
HUAZHONG UNIV OF SCI & TECH
View PDF1 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There is also no good technical means in the end system (sender and receiver) to protect specific hosts or specific ports from attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe network transmission method and system
  • Safe network transmission method and system
  • Safe network transmission method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0095] The inventive method utilizes computer technology and network technology to realize, and its main feature has:

[0096] (1) The messages transmitted by the application of the transmission server in the system include real messages and decoy messages: in addition to transmitting encrypted real messages, the transmission messages also transmit pseudo-random sequences with the same cryptographic characteristics as the real messages , to lure some malicious attacks, the data format in the transmission system provides the function of identifying different types of messages;

[0097] (2) Random identity switching during transmission: In this system, the communication control server and multiple transmission servers form a cluster system to jointly complete data transmission tasks. Each system in the cluster automatically performs identity switching and port switching at the application layer or transport layer to protect the security of hosts and ports in the cluster;

[009...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A safety network transmitting method and its system providing a active defense technology for safe message transmitting in the network can be used in information safety field by setting up safe virtual special network to submit safety service for the data transmitting in the network. The present invention has comprehensively used the communication technology of "main-assistant" machines, the pseudo-random sequence creation technology, the rout-extension protocol and information control extension protocol, through the identification result of pseudo-random sequence message transmitted to each other between the safety routers to mark the safety of the system route and to pick up the safe pathes from the existing network as well as to submit them to the message transmitting.

Description

technical field [0001] The invention belongs to network information security technology, and in particular relates to a secure network transmission method and system thereof. Background technique [0002] The TCP / IP protocol is a network protocol standard used by the Internet. It is a protocol family including TCP protocol (Transport Control Protocol, Transmission Control Protocol), IP protocol (Internet Protocol) and other protocols. The protocol family is divided into the following four layers: network interface layer, network layer, transmission control layer, and application layer. [0003] Currently, there are two main types of network security measures using TCP / IP technology and corresponding network security products: open type (such as data encryption) and passive defense type (such as firewall). Due to the characteristics of borderless, spreading and concealment of network attacks, all of these increase the difficulty of network security defense. The difficulty o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L47/43
Inventor 胡汉平张宝良陈翔王祖喜吴晓刚胡昌赤朱海燕
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products