CN109474615B - Service encryption system and service communication method based on encryption process - Google Patents

Service encryption system and service communication method based on encryption process Download PDF

Info

Publication number
CN109474615B
CN109474615B CN201811514956.8A CN201811514956A CN109474615B CN 109474615 B CN109474615 B CN 109474615B CN 201811514956 A CN201811514956 A CN 201811514956A CN 109474615 B CN109474615 B CN 109474615B
Authority
CN
China
Prior art keywords
server
service
encryption
request
encryption algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811514956.8A
Other languages
Chinese (zh)
Other versions
CN109474615A (en
Inventor
陈剑波
鲍勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Luxingtong Information Technology Co ltd
Original Assignee
Chengdu Luxingtong Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Luxingtong Information Technology Co ltd filed Critical Chengdu Luxingtong Information Technology Co ltd
Priority to CN201811514956.8A priority Critical patent/CN109474615B/en
Publication of CN109474615A publication Critical patent/CN109474615A/en
Application granted granted Critical
Publication of CN109474615B publication Critical patent/CN109474615B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Technology Law (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a service encryption system and a service communication method based on an encryption process. The service communication method includes: registering an internal server port and an IP; a step in which the external server transmits a port request encrypted by a first encryption algorithm to the encryption server; the encryption server responds to the port request and sends a request response; a step in which the external server transmits a service request encrypted by the second encryption algorithm to the internal server; and the external server verifies the service request. The invention sets the independent encryption server, processes the information verification and the authority (identity) verification in different links and different objects, can effectively improve the security level of communication between the servers, and ensures that the system is not easy to be attacked illegally; the system has simple structure, high safety level and small required operand.

Description

Service encryption system and service communication method based on encryption process
Technical Field
The present invention relates to a service encryption system and a service communication method based on an encryption process.
Background
With the rapid development of network communication, information security has attracted people's attention, various attacks are often accompanied in network communication, and in order to cope with the attacks, people encrypt or verify communication data by technologies such as cryptography, digital signature and the like, so that the cryptography and digital signature technology are rapidly developed.
For cryptography in network communication, various hash encryption algorithms MD4, MD5, SHA0, SHA1, and the like have been developed. However, the encryption structures are simple, all of which are easy to decipher, and the security level is not high.
Disclosure of Invention
The invention aims to: in view of the above problems, a service encryption system with high security level and a service communication method based on encryption process are provided to improve the security level of network communication in service request and ensure the secure communication between servers.
The technical scheme adopted by the invention is as follows:
a service encryption communication system comprises an external server, an encryption server and an internal wall server, wherein the encryption server is respectively connected with the external server and the internal server,
the external server is used for sending a port request encrypted by a first encryption algorithm to the encryption server, wherein the port request comprises a required service name; the encryption server is also used for receiving and decrypting a request response sent by the encryption server to obtain port and IP information; also according to the port and IP information, sending a service request encrypted by a second encryption algorithm to a corresponding service, wherein the service request contains external server name information;
the encryption server is used for monitoring the internal server and the external server; receiving and decrypting a port request sent by an external server, and performing information verification on decrypted information; the server is also used for sending a request response encrypted by a first encryption algorithm to an external server passing information verification, wherein the request response comprises a port corresponding to the required service and IP information;
the internal server is used for registering the port and IP of the service provided by the internal server on the encryption server; the server is also used for receiving and decrypting a service request sent by an external server and carrying out authority verification on the decrypted information; and also for providing a corresponding required service to an external server that passes the right authentication.
The external request server and the internal server can be isolated through the independent encryption server, and the whole service request and communication are ensured to be in a safe environment. Meanwhile, the information verification and the service authority verification are respectively delivered to different servers, so that the independence among all the links of the service request can be ensured, the mutual interference is avoided, and meanwhile, the data processed in all the links are subjected to decentralized processing, so that the operation pressure of the system is balanced. The information is checked in advance, so that illegal requests can be filtered, and the subsequent operation of unnecessary links is saved under the condition of ensuring the network security. And a double authentication mode for information and authority is set, so that the safety of the communication system can be further ensured.
Further, the decryption information obtained by the decryption port request of the encryption server is: a service name of a service required by the external server; the information verification is as follows: and searching the required service in the registered service, if the registered service is found, indicating that the information verification passes, otherwise, failing to pass.
The retrieval of the requested service name can be carried out, so that the request can be responded at the fastest speed, and meanwhile, the legality of the request is verified.
Further, the decryption information obtained by the internal server decryption service request is: sending an external server name of the service request; the authority verification is as follows: and verifying whether the external server is registered on the internal server, if so, passing the authority verification, and otherwise, failing to pass the authority verification.
The identity of the request terminal is verified, so that the disguise of an illegal user can be prevented, and the server is prevented from being attacked illegally.
Further, the first encryption algorithm and the second encryption algorithm are different.
Different encryption modes are set for the information encryption and the server encryption, so that the illegal decoding probability of the system can be reduced, and the safety factor of system communication is improved.
Further, the first encryption algorithm is one of an RSA encryption algorithm or an AES encryption algorithm, and the second encryption algorithm is one of the RSA encryption algorithm and the AES encryption algorithm that is different from the first encryption algorithm.
And the complexity of the system structure can be effectively reduced and the construction cost can be reduced by adopting a mature encryption algorithm.
In order to solve all or part of the problems, the invention provides a service communication method based on an encryption process, which comprises the following steps:
A. the encryption server monitors an internal server and an external server respectively;
B. the internal server starts the service and registers the port and IP of the service provided by the internal server to the encryption server;
C. an external server sends a port request encrypted by a first encryption algorithm to an encryption server, wherein the port request comprises a required service name;
D. the encryption server decrypts the port request, performs information verification on the decrypted information, and sends a request response encrypted by a first encryption algorithm to the external server after the verification is passed, wherein the request response comprises the port corresponding to the required service and the IP information;
E. the external server decrypts the request response to obtain the port and IP information, and sends a service request encrypted by a second encryption algorithm to the corresponding service according to the port and IP information, wherein the service request comprises the name information of the external server;
F. and the internal server providing the service decrypts the service request, performs authority verification on the decrypted information, and provides the required service to the external server after the verification is passed.
The external request server and the internal server can be isolated through the independent encryption server, and the whole service request and communication are ensured to be in a safe environment. Meanwhile, the information verification and the service authority verification are respectively delivered to different servers, so that the independence among all the links of the service request can be ensured, the mutual interference is avoided, and meanwhile, the data processed in all the links are subjected to decentralized processing, so that the operation pressure of the system is balanced. The information is checked in advance, so that illegal requests can be filtered, and the subsequent operation of unnecessary links is saved under the condition of ensuring the network security. And a double authentication mode for information and authority is set, so that the safety of the communication system can be further ensured.
Further, in step D, the information verification performed by the encryption server on the decryption information is: and the encryption server decrypts the port request to obtain the name of the required service, searches the required service in the registered service, if the registered service is found, the information verification is passed, otherwise, the information verification is not passed.
Further, in step F, the right verification performed on the external server is: and the internal server decrypts the service request to obtain the name of the external server, verifies whether the external server is registered on the internal server, if so, the permission verification is passed, and otherwise, the permission verification is not passed.
Further, the first encryption algorithm is different from the second encryption algorithm.
Further, the first encryption algorithm is one of an RSA encryption algorithm or an AES encryption algorithm, and the second encryption algorithm is one of the RSA encryption algorithm and the AES encryption algorithm that is different from the first encryption algorithm.
In summary, due to the adoption of the technical scheme, the invention has the beneficial effects that:
1. the invention can isolate the external request server from the internal server by arranging the independent encryption server, thereby ensuring that the whole service request and communication are in a safe environment. The information verification and the service authority verification are respectively delivered to different servers, so that the independence among all the links of the service request can be ensured, the mutual interference is avoided, and meanwhile, the data processed in all the links are subjected to decentralized processing, and the system operation pressure is balanced.
2. The invention sets linear double verification for information verification and authority (identity) verification, on one hand, illegal requests can be effectively filtered out, and the pressure of subsequent operation is reduced; on the other hand, the double authentication mode can effectively improve the security of communication between servers and prevent the servers from being attacked by illegal users.
3. Different encryption modes are adopted for information verification and server verification, so that the encryption security level of the system can be increased, and the security of the system is improved.
4. The invention has simple structure between servers, low system construction and operation cost and high safety level.
Drawings
The invention will now be described, by way of example, with reference to the accompanying drawings, in which:
fig. 1 is a configuration diagram of a service encryption communication system.
In the figure, 10 is an encryption server, 20 is an external server, and 30 is an internal server.
Detailed Description
All of the features disclosed in this specification, or all of the steps in any method or process so disclosed, may be combined in any combination, except combinations of features and/or steps that are mutually exclusive.
Any feature disclosed in this specification (including any accompanying claims, abstract) may be replaced by alternative features serving equivalent or similar purposes, unless expressly stated otherwise. That is, unless expressly stated otherwise, each feature is only an example of a generic series of equivalent or similar features.
The AES encryption algorithm is a symmetric algorithm, and the same key (key) is used for encryption and decryption; the RSA encryption algorithm is an asymmetric algorithm that uses different keys for encryption and decryption.
A service encryption communication system includes an external server, an encryption server and an inner wall server, the encryption server is connected with the external server and the internal server respectively, wherein:
the external server is used for sending a port request encrypted by a first encryption algorithm to the encryption server, wherein the port request comprises a required service name; the encryption server is also used for receiving and decrypting a request response sent by the encryption server to obtain port and IP information; also according to the port and IP information, sending a service request encrypted by a second encryption algorithm to a corresponding service, wherein the service request contains external server name information;
the encryption server is used for monitoring the internal server and the external server; receiving and decrypting a port request sent by an external server, and performing information verification on decrypted information; the server is also used for sending a request response encrypted by a first encryption algorithm to an external server passing information verification, wherein the request response comprises a port corresponding to the required service and IP information;
the internal server is used for registering the port and IP of the service provided by the internal server on the encryption server; the server is also used for receiving and decrypting a service request sent by an external server and carrying out authority verification on the decrypted information; and also for providing a corresponding required service to an external server that passes the right authentication.
In one embodiment, the decryption port of the encryption server requests to obtain the service name of the service required by the external server, and the information verification is as follows: and searching the required service in the registered service, if the registered service is found, indicating that the information verification passes, otherwise, failing to pass.
In one embodiment, the internal server decrypts the service request to obtain the external server name, and the authority is verified as: and verifying whether the external server is registered on the internal server, if so, passing the authority verification, and otherwise, failing to pass the authority verification.
The first encryption algorithm and the second encryption algorithm may be the same or different. If different, the security factor of the entire serving communication system can be increased. For the case where the first encryption algorithm and the second encryption algorithm are different, in one embodiment, the first encryption algorithm is one of an RSA encryption algorithm or an AES encryption algorithm, and the second encryption algorithm is the other encryption algorithm.
This embodiment discloses another kind of service encryption communication system, including outside server, encryption server and inner wall server, the encryption server is connected outside server and inside server respectively, wherein:
the external server is used for sending a port request encrypted by a first encryption algorithm to the encryption server, wherein the port request comprises a required service name; the encryption server is also used for receiving and decrypting a request response sent by the encryption server to obtain port and IP information; also according to the port and IP information, sending a service request encrypted by a second encryption algorithm to a corresponding service, wherein the service request contains external server name information;
the encryption server is used for monitoring the internal server and the external server in real time; receiving and decrypting a port request sent by an external server, and performing information verification on decrypted information; the server is also used for sending a request response encrypted by a first encryption algorithm to an external server passing information verification, wherein the request response comprises a port corresponding to the required service and IP information;
the internal server is used for registering the port and IP of the service provided by the internal server on the encryption server; the server is also used for receiving and decrypting a service request sent by an external server and carrying out authority verification on the decrypted information; and also for providing a corresponding required service to an external server that passes the right authentication.
This embodiment discloses another kind of service encryption communication system, including outside server, encryption server and inner wall server, the encryption server is connected outside server and inside server respectively, wherein:
the external server is used for sending a port request encrypted by an RSA algorithm to the encryption server, wherein the port request comprises a required service name; the encryption server is also used for receiving and decrypting a request response sent by the encryption server to obtain port and IP information; sending a service request encrypted by an AES algorithm to a corresponding service according to the port and the IP information, wherein the service request contains external server name information;
the encryption server is used for monitoring the internal server and the external server; receiving and decrypting a port request sent by an external server to obtain a required service name, and performing information verification on the required service: searching the required service in the registered service, and if the registered service is found, indicating that the information verification is passed; the server is also used for sending a request response encrypted by an RSA algorithm to an external server passing information verification, wherein the request response comprises a port corresponding to the required service and IP information;
the internal server is used for registering the port and IP of the service provided by the internal server on the encryption server; and the server is also used for receiving and decrypting a service request sent by an external server to obtain the name of the external server, and performing authority verification on the external server: verifying whether the external server is registered on the internal server, if so, passing the permission verification; and also for providing a corresponding required service to an external server that passes the right authentication.
As shown in fig. 1, the present embodiment discloses a service communication method based on an encryption process, which includes the following steps:
A. the encryption server monitors an internal server and an external server respectively;
B. the internal server starts the service and registers the port and IP of each service provided by the internal server to the encryption server;
C. an external server sends a port request encrypted by a first encryption algorithm to an encryption server, wherein the port request comprises a required service name; the method comprises the steps of obtaining port information corresponding to required services;
D. the encryption server decrypts the port request, performs information verification on the decrypted information, and sends a request response encrypted by a first encryption algorithm to the external server after the verification is passed, wherein the request response comprises the port and the IP information corresponding to the service required by the (external server);
E. the external server decrypts the request response to obtain the port and IP information, and sends a service request encrypted by a second encryption algorithm to the corresponding service according to the port and IP information, wherein the service request comprises the name information of the external server;
F. and the internal server providing the service (corresponding to the port and the IP information) decrypts the service request, performs authority verification on the decrypted information, and provides the required service for the external server after the verification is passed.
The first encryption algorithm and the second encryption algorithm may be the same or different. If different, the security factor of the entire serving communication system can be made higher.
The embodiment discloses another service communication method based on an encryption process, which comprises the following steps:
A. the encryption server monitors an internal server and an external server respectively in real time;
B. the internal server starts the service and registers the port and IP of each service provided by the internal server to the encryption server;
C. an external server sends a port request encrypted by a first encryption algorithm to an encryption server, wherein the port request comprises a required service name;
D. the encryption server decrypts the port request (by a decryption algorithm corresponding to the first encryption algorithm) to obtain a required service name, searches the required service in the registered service, and sends a request response encrypted by the first encryption algorithm to the external server if the corresponding service is found, wherein the request response comprises the port and IP information corresponding to the found service;
E. the external server decrypts the request response (by a decryption algorithm corresponding to the first encryption algorithm) to obtain the port and IP information, and sends a service request encrypted by the second encryption algorithm to the corresponding service according to the port and IP information, the service request containing external server name information;
F. and the internal server provides the required service (corresponding to the port and the IP information), decrypts the service request (by a decryption algorithm corresponding to the second encryption algorithm), acquires the name of the external server, verifies whether the external server is registered on the internal server or not, and provides the required service to the external server if the external server is registered.
The embodiment discloses another service communication method based on an encryption process, which comprises the following steps:
A. the encryption server monitors an internal server and an external server respectively in real time;
B. the internal server starts the service and registers the port and IP of each service provided by the internal server to the encryption server;
C. an external server sends a port request encrypted by an RSA algorithm to an encryption server, wherein the port request comprises a required service name;
D. the encryption server decrypts the port request through a private key corresponding to the RSA encryption public key to obtain a required service name, searches the required service in the registered service, and sends a request response encrypted by an RSA algorithm to the external server if the corresponding service is found, wherein the request response comprises a port corresponding to the found service and IP information;
E. the external server decrypts the request response through a private key corresponding to the RSA encryption public key to acquire the port and the IP information, and sends a service request encrypted by an AES algorithm to the corresponding service according to the port and the IP information, wherein the service request comprises the name information of the external server;
F. and the internal server providing the required service (corresponding to the port and the IP information) decrypts the service request by using the private key of the AES encryption public key to obtain the name of the external server, verifies whether the external server is registered on the internal server or not, and provides the required service to the external server if the external server is registered.
The invention is not limited to the foregoing embodiments. The invention extends to any novel feature or any novel combination of features disclosed in this specification and any novel method or process steps or any novel combination of features disclosed.

Claims (8)

1. The utility model provides a communication system is encrypted in service, includes outside server, encryption server and inner wall server, and the outside server is connected respectively to the encryption server and inside server, its characterized in that:
the external server is used for sending a port request encrypted by a first encryption algorithm to the encryption server, wherein the port request comprises a required service name; the encryption server is also used for receiving and decrypting a request response sent by the encryption server to obtain port and IP information; also according to the port and IP information, sending a service request encrypted by a second encryption algorithm to a corresponding service, wherein the service request contains external server name information;
the encryption server is used for monitoring the internal server and the external server; receiving and decrypting a port request sent by an external server to obtain a service name of a service required by the external server, and performing information verification on decryption information: searching the required service in the registered service, and if the registered service is found, indicating that the information verification is passed; the server is also used for sending a request response encrypted by a first encryption algorithm to an external server passing information verification, wherein the request response comprises a port corresponding to the required service and IP information;
the internal server is used for registering the port and IP of the service provided by the internal server on the encryption server; the server is also used for receiving and decrypting a service request sent by an external server and carrying out authority verification on the decrypted information; and also for providing a corresponding required service to an external server that passes the right authentication.
2. The service encryption communication system according to claim 1, wherein the decryption information obtained by the internal server decrypting the service request is: sending an external server name of the service request; the authority verification is as follows: and verifying whether the external server is registered on the internal server, if so, passing the authority verification, and otherwise, failing to pass the authority verification.
3. A service encryption communication system according to claim 1 or 2, wherein said first encryption algorithm and said second encryption algorithm are different.
4. The service encryption communication system according to claim 3, wherein the first encryption algorithm is one of an RSA encryption algorithm or an AES encryption algorithm, and the second encryption algorithm is one of the RSA encryption algorithm and the AES encryption algorithm which is different from the first encryption algorithm.
5. A service communication method based on an encryption process, comprising the steps of:
A. the encryption server monitors an internal server and an external server respectively;
B. the internal server starts the service and registers the port and IP of the service provided by the internal server to the encryption server;
C. an external server sends a port request encrypted by a first encryption algorithm to an encryption server, wherein the port request comprises a required service name;
D. the encryption server decrypts the port request to obtain the required service name, and performs information verification on the decrypted information: searching the required service in the registered service, if the registered service is found, indicating that the information verification is passed, and after the verification is passed, sending a request response encrypted by a first encryption algorithm to an external server, wherein the request response comprises a port and IP information corresponding to the required service;
E. the external server decrypts the request response to obtain the port and IP information, and sends a service request encrypted by a second encryption algorithm to the corresponding service according to the port and IP information, wherein the service request comprises the name information of the external server;
F. and the internal server providing the service decrypts the service request, performs authority verification on the decrypted information, and provides the required service to the external server after the verification is passed.
6. The encryption process based service communication method according to claim 5, wherein in the step F, the authentication of the authority of the external server is: and the internal server decrypts the service request to obtain the name of the external server, verifies whether the external server is registered on the internal server, if so, the permission verification is passed, and otherwise, the permission verification is not passed.
7. A service communication method based on an encryption process according to claim 5 or 6, characterized in that the first encryption algorithm is different from the second encryption algorithm.
8. The encryption process-based service communication method as claimed in claim 7, wherein the first encryption algorithm is one of an RSA encryption algorithm or an AES encryption algorithm, and the second encryption algorithm is one of the RSA encryption algorithm and the AES encryption algorithm, which is different from the first encryption algorithm.
CN201811514956.8A 2018-12-12 2018-12-12 Service encryption system and service communication method based on encryption process Active CN109474615B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811514956.8A CN109474615B (en) 2018-12-12 2018-12-12 Service encryption system and service communication method based on encryption process

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811514956.8A CN109474615B (en) 2018-12-12 2018-12-12 Service encryption system and service communication method based on encryption process

Publications (2)

Publication Number Publication Date
CN109474615A CN109474615A (en) 2019-03-15
CN109474615B true CN109474615B (en) 2021-12-07

Family

ID=65676132

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811514956.8A Active CN109474615B (en) 2018-12-12 2018-12-12 Service encryption system and service communication method based on encryption process

Country Status (1)

Country Link
CN (1) CN109474615B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101662511A (en) * 2009-10-10 2010-03-03 中国电信股份有限公司 Network address distributing method, DHCP server, access system and method thereof
CN104378457A (en) * 2014-11-26 2015-02-25 中国联合网络通信集团有限公司 Method, device and system for distributing IP address
CN105376252A (en) * 2015-12-02 2016-03-02 福建星网锐捷网络有限公司 Distributed architecture data communication device, distributed architecture data communication device authentication method and service board
CN108366132A (en) * 2018-03-13 2018-08-03 平安普惠企业管理有限公司 Service management, device, computer equipment between server and storage medium

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101674587B (en) * 2009-10-14 2012-12-19 成都市华为赛门铁克科技有限公司 Method and system for realizing business monitoring and authentication agent server
CN104243154B (en) * 2013-06-07 2018-07-06 腾讯科技(深圳)有限公司 Server user's permission centralized control system and method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101662511A (en) * 2009-10-10 2010-03-03 中国电信股份有限公司 Network address distributing method, DHCP server, access system and method thereof
CN104378457A (en) * 2014-11-26 2015-02-25 中国联合网络通信集团有限公司 Method, device and system for distributing IP address
CN105376252A (en) * 2015-12-02 2016-03-02 福建星网锐捷网络有限公司 Distributed architecture data communication device, distributed architecture data communication device authentication method and service board
CN108366132A (en) * 2018-03-13 2018-08-03 平安普惠企业管理有限公司 Service management, device, computer equipment between server and storage medium

Also Published As

Publication number Publication date
CN109474615A (en) 2019-03-15

Similar Documents

Publication Publication Date Title
US11743726B2 (en) Access method and system of internet of things equipment based on 5G, and storage medium
CN104796265B (en) A kind of Internet of Things identity identifying method based on Bluetooth communication access
CN101005361B (en) Server and software protection method and system
CN113553574A (en) Internet of things trusted data management method based on block chain technology
CA2913444C (en) System and method for user authentication
CN110990827A (en) Identity information verification method, server and storage medium
CN109951513B (en) Quantum-resistant computing smart home quantum cloud storage method and system based on quantum key card
EP2544117A1 (en) Method and system for sharing or storing personal data without loss of privacy
KR101753859B1 (en) Server and method for managing smart home environment thereby, method for joining smart home environment and method for connecting communication session with smart device
CN105553666B (en) Intelligent power terminal safety authentication system and method
CN102024123B (en) Method and device for importing mirror image of virtual machine in cloud calculation
CN105760764A (en) Encryption and decryption methods and devices for embedded storage device file and terminal
CN111435913A (en) Identity authentication method and device for terminal of Internet of things and storage medium
CN102916970B (en) Network-based PIN cache method
CN111954211B (en) Novel authentication key negotiation system of mobile terminal
CN109347626B (en) Safety identity authentication method with anti-tracking characteristic
WO2014015759A1 (en) Terminal identity verification and service authentication method, system, and terminal
US10091189B2 (en) Secured data channel authentication implying a shared secret
US20180013832A1 (en) Health device, gateway device and method for securing protocol using the same
CN113055882B (en) Efficient authentication method and device for unmanned aerial vehicle network, computer equipment and storage medium
JP2003188874A (en) System for secure data transmission
CN113225330A (en) Electronic information data secure transmission method
CN111740995B (en) Authorization authentication method and related device
KR20200099873A (en) HMAC-based source authentication and secret key sharing method and system for Unnamed Aerial vehicle systems
CN109474615B (en) Service encryption system and service communication method based on encryption process

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant