Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for carrying out private security data communication base on decimal communication numbers

A communication number and security data technology, applied in the field of communication, can solve problems such as difficult communication, difficulty in remembering IP addresses for both parties in communication, message spoofing, etc.

Inactive Publication Date: 2005-11-16
黄涛
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] 1) Communication terminals can only be accessed through Internet-based IP addresses, and the Internet IP addresses of most communication terminals are constantly changing dynamically
[0004] 2) It is often difficult for both parties to communicate to remember each other's IP address, so it is difficult to communicate directly
[0005] 3) Sometimes a communication terminal is located on the internal LAN, and it is difficult for external machines to directly address and access
[0006] 4) Communication terminals communicate directly with each other based on the Internet, which is prone to security issues such as message loss, illegal access, and message counterfeiting
[0013] At present, problem 2) can be solved by establishing a VPN method, but problem 1) cannot be solved; and some methods described above are difficult to really solve problem 2), because they are essentially based on P2P communication, and generally all focus on encryption. Solve the security of data transmission, but it is difficult to really solve how to provide sufficient network security, how to provide sufficient anti-spoofing and other identity confirmation, how to provide means for centralized monitoring and management, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for carrying out private security data communication base on decimal communication numbers

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] 1. Communication terminal creation:

[0057] Such as figure 1 As shown, the access server (1) and the access server (2) are located inside the private network, respectively connected to the forwarding server (3) and the forwarding server (4) in the public network; the access server (5) is located in the public network (INTERNET network), the forwarding server (4) is connected; the forwarding server (3) is an access server at the same time, and the communication terminal (8) and the communication terminal (6) are directly connected on the forwarding server (3). The length of the set network number section is 4 bits, the network number section of the forwarding server (1) is 1111; the network number section of the forwarding server (2) is 2111.

[0058] The access server (1) is placed in the internal private network 1, and communicates with the forwarding server (1) in the Internet through a proxy. The length of the subnet number segment of the access server (1) is three...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The method is composed of communication terminal, access server, and forwarding server. The communication terminal and the access server can be deployed inside private network, or deployed on public network. The forwarding server is deployed on public network. Each communication terminal possesses a unique decimal digit communication number. Based on communication number, intercommunication is carried out among communication terminals. Access server realizes addressing for communication. Forwarding server realizes addressing step by step. MAC address of communication terminal as id information is bound to communication number. In communication process, encryption is carried out for communication message based on id information of communication terminal and id information of communication message. Thus, private safety communication channel is built, and legal authentication is carried out for id of communication terminal and id of communication message.

Description

Technical field: [0001] The invention relates to mutual communication technology between communication terminals, in particular to a method for mutual data communication between communication terminals based on decimal communication codes. It belongs to the field of communication technology. Background technique: [0002] With the development of Internet business, people use the Internet to realize mutual voice, data and image between communication terminals. It is still relatively difficult to establish a convenient interconnection between them, mainly in the following aspects: [0003] 1) Communication terminals can only be accessed through Internet-based IP addresses, and the Internet IP addresses of most communication terminals are constantly changing dynamically. [0004] 2) It is often difficult for both parties to communicate to remember the IP address of the other party, so it is difficult to communicate directly. [0005] 3) Sometimes a communication terminal is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/701
Inventor 朱文和
Owner 黄涛
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products