CN102624749A - Load balancing method and system for safety communication - Google Patents

Load balancing method and system for safety communication Download PDF

Info

Publication number
CN102624749A
CN102624749A CN2012101107524A CN201210110752A CN102624749A CN 102624749 A CN102624749 A CN 102624749A CN 2012101107524 A CN2012101107524 A CN 2012101107524A CN 201210110752 A CN201210110752 A CN 201210110752A CN 102624749 A CN102624749 A CN 102624749A
Authority
CN
China
Prior art keywords
terminal
random number
load
application server
hashed value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012101107524A
Other languages
Chinese (zh)
Other versions
CN102624749B (en
Inventor
毛维波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ningbo Haibo Group Co. Ltd.
Original Assignee
Ningbo Beilun Haibo Precision Machinery Manufacture Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ningbo Beilun Haibo Precision Machinery Manufacture Co Ltd filed Critical Ningbo Beilun Haibo Precision Machinery Manufacture Co Ltd
Priority to CN201210110752.4A priority Critical patent/CN102624749B/en
Publication of CN102624749A publication Critical patent/CN102624749A/en
Application granted granted Critical
Publication of CN102624749B publication Critical patent/CN102624749B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention relates to a load balancing method and a load balancing system for the safety communication. In the process that a load balancer provides communication connection for a terminal and an application server, a discriminative encryption method is utilized, so that the terminal and the application server are in handshaking connection. Compared with the prior art, the load balancing method and the load balancing system for the safety communication have the advantages that due to the adoption of the load balancing method and the load balancing system for the safety communication, which are provided by the invention, unauthorized terminals can be prevented from entering, the safety communication can also be provided for a great amount of authorized terminals, and the calculated amount and the pressure of the load balancer are effectively reduced on the basis of ensuring the communication safe; and the load balancing method and the load balancing system for the safety communication are beneficial for constructing a safety load balancing system with a larger scale.

Description

A kind of load-balancing method of secure communication and system
Technical field
The present invention relates to a kind of load-balancing method and system of secure communication.
Background technology
Along with the increasing of various information terminals, single application server has been difficult to numerous terminals service is provided simultaneously in recent years, and the developing into to address this problem possibility is provided of load balancing and cloud.Load equalizer in the load-balancing technique can be assigned to numerous terminal service requests on a plurality of application server node, thereby is embodied as the purpose that terminal as much as possible provides service.It has highly reliable, scalable, easy expansion and the cheap relatively characteristics of expense.But along with this The Application of Technology, safety problem is also appeared in one's mind out gradually, and wherein secure communication problem is compared traditional single application server communication and had more complex environment.
Usually be applied to secure communication to the SSL technology now; In group system, utilize task equipment or server process data encrypting and deciphering; Handle concrete request by background server again; But equipment or server that this method usually causes carrying out data encrypting and deciphering become bottleneck, can't satisfy the communication of big data quantity.
Summary of the invention
First technical problem to be solved by this invention is the load-balancing method that a kind of secure communication is provided to above-mentioned prior art; This method can prevent that unauthorized terminal from getting into application server request service, can secure communication be provided for a large amount of authorization terminal simultaneously.
Second technical problem to be solved by this invention is the SiteServer LBS that technology provides a kind of secure communication, and this method, system can prevent that unauthorized terminal from getting into application server request service, can secure communication be provided for a large amount of authorization terminal simultaneously.
The present invention solves the technical scheme that above-mentioned first technical problem adopts: the load-balancing method of this secure communication; It is characterized in that: a plurality of terminals, a plurality of load equalizer and a plurality of application server are set; At each terminal stored its corresponding ID and terminal key; The ID of the ID at all terminals of storage, terminal key, all application servers in each load equalizer; The communication key that carries out coded communication at each load equalizer and each application server stored load equalizer and application server is simultaneously with a plurality of load equalizers and a plurality of application server time synchronized; In addition, in each terminal, each load equalizer and each application server, all preserve each other authorization requests order, authentication request order, authentication commands in return, authorization command and the increase authorization command of agreement in advance; The load-balancing method of above-mentioned secure communication comprises the steps:
Step 1, terminal produce a terminal random number and storage, authorization requests order, ID and terminal random number send to load equalizer;
After step 2, load equalizer are received above-mentioned authorization requests order, ID and the terminal random number of sending at the terminal; Search and whether store this ID in the load equalizer; If just do not produce a load balancing random number, preserve this ID and load balancing random number; If load equalizer is preserved this ID, read this ID and the balanced random number of its corresponding load, then authentication request order, ID, terminal random number and load balancing random number send to the terminal;
After above-mentioned authentication request order, ID, terminal random number and the load balancing random number of load equalizer transmission received at step 3, terminal; The comparison terminal random number; If be not inconsistent and just abandon above-mentioned authentication request order, ID, terminal random number and load balancing random number; If meet; Just authentication commands in return, ID, terminal random number, load balancing random number and terminal key are carried out hash, obtain first hashed value, and send to load equalizer to authentication commands in return, ID, terminal random number, load balancing random number and first hashed value;
After step 4, load equalizer are received above-mentioned authentication commands in return, ID, terminal random number, load balancing random number and first hashed value of sending at the terminal; Search and whether store corresponding ID and load balancing random number in the load equalizer; If just do not abandon above-mentioned authentication commands in return, ID, terminal random number, load balancing random number and first hashed value; Otherwise just calculate the hashed value of authentication commands in return, ID, terminal random number, load balancing random number and terminal key with hashing algorithm; Obtain second hashed value; Just abandon above-mentioned authentication commands in return, ID, terminal random number, load balancing random number and first hashed value if first hashed value that send at second hashed value and terminal is different, otherwise just forward next step to;
Step 5, load equalizer are selected an application server; Write down ID, IP address and the port numbers of this application server; Produce the authorization code of a random number and the password factor of a random number; Carry out hash to increasing authorization command, application server ID, authorization code, IP address of terminal and current time stamp, obtain the 3rd hashed value; And carry out hash with the communication key and the password factor that application server is preserved, obtain the train value that scatters; With the scatter train value as key to increase authorization command, server ID, authorization code, IP address of terminal, the current time stabs and the 3rd hashed value is encrypted; Obtain first enciphered data, send to application server to the password factor and first enciphered data then; IP address and port numbers to ID, terminal random number, load balancing random number, authorization code and application server are carried out hash; Obtain the 5th hashed value; The IP address of ID, terminal random number, load balancing random number, authorization code, application server and port numbers and the 5th hashed value are encrypted as key with the hashed value of the terminal key and the password factor; Obtain second enciphered data, send to the terminal to authorization command, the password factor and second enciphered data then; The final load equalizer is ID and the deletion of load balancing random number;
After step 6, application server are received the password factor and first enciphered data; Communication key and password factor pair first enciphered data of utilizing application server to preserve are deciphered, if the deciphering failure just abandons, otherwise to data check the 3rd hashed value after the deciphering; If just being inconsistent, the 3rd hashed value do not abandon; Otherwise relatively whether the ID of server meets, and does not abandon if just be inconsistent, and relatively whether the difference of local zone time and timestamp surpasses prescribed limits then; Just abandon if surpass, otherwise preserve the IP address at authorization code and terminal;
After authorization command, the password factor and second enciphered data are received in step 7, terminal; Utilize terminal key and password factor pair second enciphered data to decipher, if the deciphering failure just abandons, otherwise to data check the 5th hashed value after the deciphering; If just being inconsistent, the 5th hashed value do not abandon; Otherwise the comparison terminal random number does not abandon if just be inconsistent, otherwise deletes the terminal random number and obtain the IP address of server and the port numbers of server; Connect application server through SSL/TLS, and upload authorization code through this connection;
Step 8, application server receive that the terminal connects, and judge whether IP address of terminal and authorization code meet, and refusal connects if just be not inconsistent, otherwise successful connection provides application service.
In the said step 2; Receive above-mentioned authorization requests order, ID and the terminal random number of terminal transmission when load equalizer after; Search whether store this ID in the load equalizer,, preserve this ID and load balancing random number if just do not produce a load balancing random number; Start timeout mechanism then, if just accomplish to authorize at the appointed time authorization requests order, ID and the deletion of terminal random number.
In the said step 6, when whether application server surpasses prescribed limits in the difference that compares local zone time and timestamp; Just abandon if be judged as to surpass; Otherwise preserve the IP address at authorization code and terminal; Start timeout mechanism then, if the data that do not have the terminal to connect after just will deciphering at the appointed time remove.
In above-mentioned each step, the hashing algorithm that adopts during hash is MD5 or SHA.
In above-mentioned each step, the AES that adopts during encryption is symmetric encipherment algorithm or asymmetrical encryption algorithm.
And in the above-mentioned steps two, the terminal is selected nearest load equalizer or is selected a load equalizer to communicate through the method for DNS poll when selecting load equalizer to carry out communication.
The present invention solves above-mentioned second technical scheme that technical problem adopted: the SiteServer LBS of this secure communication; It is characterized in that: comprise a plurality of terminals, a plurality of load equalizer and a plurality of application server; Each terminal internal memory contains its corresponding ID and terminal key; Store ID, the terminal key at all terminals, the ID of all application servers in each load equalizer; All store the communication key that load equalizer and application server carry out coded communication in each load equalizer and each application server, simultaneously a plurality of load equalizers and a plurality of application server time are kept synchronously; In addition, all preserve each other authorization requests order, authentication request order, authentication commands in return, authorization command and the increase authorization command of agreement in advance in each terminal, each load equalizer and each application server; And the means of communication of the SiteServer LBS of above-mentioned secure communication adopt the load-balancing method of the secure communication of foregoing description.
Compared with prior art; The invention has the advantages that: the load-balancing method and the system that adopt secure communication provided by the invention; Can prevent the entering at unauthorized terminal, the while can provide secure communication for a large amount of authorization terminal, and on the basis that ensures communication safety; Effectively reduce the pressure of amount of calculation and load equalizer, help to make up more massive safe bearing load equalizing system.
Description of drawings
Fig. 1 is the deployment block diagram of the SiteServer LBS of secure communication in the embodiment of the invention.
Embodiment
Embodiment describes in further detail the present invention below in conjunction with accompanying drawing.
At first make up the SiteServer LBS of a secure communication; Referring to shown in Figure 1; This system comprises a plurality of terminals, a plurality of load equalizer and a plurality of application server; Each terminal internal memory contains its corresponding ID and terminal key; Store ID, the terminal key at all terminals, the ID of all application servers in each load equalizer, all store the communication key that load equalizer and application server carry out coded communication in each load equalizer and each application server, a plurality of load equalizers of while and a plurality of application server time synchronized; In addition, all preserve each other authorization requests order, authentication request order, authentication commands in return, authorization command and the increase authorization command of agreement in advance in each terminal, each load equalizer and each application server; Referring to shown in Figure 1.
The means of communication of this system comprise:
Step 1, terminal produce a terminal random number and storage, authorization requests order, ID and terminal random number send to load equalizer; The terminal is selected nearest load equalizer or is selected a load equalizer to communicate through the method for DNS poll when selecting load equalizer to carry out communication;
After step 2, load equalizer are received above-mentioned authorization requests order, ID and the terminal random number of sending at the terminal; Search and whether store this ID in the load equalizer; If just do not produce a load balancing random number, preserve this ID and load balancing random number; If load equalizer is preserved this ID, read this ID and the balanced random number of its corresponding load, then authentication request order, ID, terminal random number and load balancing random number send to the terminal;
After above-mentioned authentication request order, ID, terminal random number and the load balancing random number of load equalizer transmission received at step 3, terminal; The comparison terminal random number; If be not inconsistent and just abandon above-mentioned authentication request order, ID, terminal random number and load balancing random number; If meet; Just authentication commands in return, ID, terminal random number, load balancing random number and terminal key are carried out hash, obtain first hashed value, and send to load equalizer to authentication commands in return, ID, terminal random number, load balancing random number and first hashed value;
After step 4, load equalizer are received above-mentioned authentication commands in return, ID, terminal random number, load balancing random number and first hashed value of sending at the terminal; Search and whether store corresponding ID and load balancing random number in the load equalizer; If just do not abandon above-mentioned authentication commands in return, ID, terminal random number, load balancing random number and first hashed value; Otherwise just calculate the hashed value of authentication commands in return, ID, terminal random number, load balancing random number and terminal key with hashing algorithm; Obtain second hashed value; Just abandon above-mentioned authentication commands in return, ID, terminal random number, load balancing random number and first hashed value if first hashed value that send at second hashed value and terminal is different, otherwise just forward next step to;
Step 5, load equalizer are selected an application server; Write down ID, IP address and the port numbers of this application server; Produce the authorization code of a random number and the password factor of a random number; Carry out hash to increasing authorization command, application server ID, authorization code, IP address of terminal and current time stamp, obtain the 3rd hashed value; And carry out hash with the communication key and the password factor that application server is preserved, obtain the train value that scatters; With the scatter train value as key to increase authorization command, server ID, authorization code, IP address of terminal, the current time stabs and the 3rd hashed value is encrypted; Obtain first enciphered data, send to application server to the password factor and first enciphered data then; IP address and port numbers to ID, terminal random number, load balancing random number, authorization code and application server are carried out hash; Obtain the 5th hashed value; The IP address of ID, terminal random number, load balancing random number, authorization code, application server and port numbers and the 5th hashed value are encrypted as key with the hashed value of the terminal key and the password factor; Obtain second enciphered data, send to the terminal to authorization command, the password factor and second enciphered data then; The final load equalizer is ID and the deletion of load balancing random number;
After step 6, application server are received the password factor and first enciphered data; Communication key and password factor pair first enciphered data of utilizing application server to preserve are deciphered, if the deciphering failure just abandons, otherwise to data check the 3rd hashed value after the deciphering; If just being inconsistent, the 3rd hashed value do not abandon; Otherwise relatively whether the ID of application server meets, and does not abandon if just be inconsistent, and relatively whether the difference of local zone time and timestamp surpasses prescribed limits then; Just abandon if surpass, otherwise preserve the IP address at authorization code and terminal;
After authorization command, the password factor and second enciphered data are received in step 7, terminal; Utilize terminal key and password factor pair second enciphered data to decipher, if the deciphering failure just abandons, otherwise to data check the 5th hashed value after the deciphering; If just being inconsistent, the 5th hashed value do not abandon; Otherwise the comparison terminal random number does not abandon if just be inconsistent, otherwise deletes the terminal random number and obtain the IP address of server and the port numbers of server; Connect application server through SSL/TLS, and upload authorization code through this connection;
Step 8, application server receive that the terminal connects, and judge whether IP address of terminal and authorization code meet, and refusal connects if just be not inconsistent, otherwise successful connection provides application service.
Below, with the process of the concrete above-mentioned means of communication of example shows:
Authorization requests order, authentication request order, authentication commands in return, authorization command and the increase authorization command of arranging in advance each other of preserving in each terminal, each load equalizer and each application server are respectively: 0x01,0x02,0x03,0x04,0x05;
If the ID of terminal a is A, terminal a produces a terminal random number B and storage, and terminal a orders authorization requests 0x01, ID and terminal random number B to send to load equalizer, and promptly (0x01, A B) send to load equalizer data;
Load equalizer receive the data of sending at the terminal (0x01, A, B) after; Produce load balancing random number C, (A C) preserves data; Start timeout mechanism simultaneously, authentication request order, ID, terminal random number and load balancing random number are sent to the terminal, promptly and data (0x02; A, B C) sends to the terminal;
The terminal receive data (0x02, A, B, C) after; Verification terminal random number B conforms to if test terminal random number B, takes out the key D of terminal a, and authentication commands in return, ID, terminal random number, load balancing random number and terminal key are carried out hash; Promptly to data (0x03, A, B, C; D) carry out MD5 and calculate, obtain the first hashed value E, and send to load equalizer to authentication commands in return, ID, terminal random number, load balancing random number and first hashed value, promptly data (0x03; A, B, C E) sends to load equalizer;
Load equalizer receive data (0x03, A, B, C, E) after; Search whether store corresponding ID and load balancing random number in the load equalizer, promptly search A and C,, take out this terminal key D if find A and C; To data (0x03, A, B, C; D) carry out the MD5 hash, obtain second hashed value,, forward next step to if second hashed value is identical with first hashed value;
Load equalizer is selected an application server, and the ID that writes down this application server is that the IP address and the port numbers of H, application server is I, and load equalizer produces authorization code F and password factor G, and the IP of record terminal a is J; Current time stabs and is K, IP address and port numbers, authorization code, IP address of terminal and the current time stamp that increases authorization command, application server is carried out hash, promptly to data (0x05, H; F, J K) carries out MD5 and calculates, and obtains the 3rd hashed value L; If the communication key of server is M, to data (G M) carries out MD5 and calculates the train value N that scatters, with N to data (0x05; H, F, J, K; L) carry out the AES encryption and obtain the first enciphered data P, (P G) sends to application server data; Then to data (A, B, C, F I) carries out MD5 and calculates five hashed value Q, to data (G D) carries out MD5 and calculates R, with R to data (A, B, C, F, I Q) encrypts and to obtain the second enciphered data S, (0x04, S G) send to the terminal data; Load equalizer is ID and the deletion of load balancing random number;
Application server receive data (P, G) after, take out the communication key M of server, with identical algorithms data decryption P, obtain data (0x05; H, F, J, K, L); Check the 3rd hashed value L to meet, check H, K meet the requirements, and preserve F and J, and start corresponding timeout mechanism;
The terminal receive data (0x04, S, G) after, take out the key D of terminal a, decipher the second enciphered data S with identical algorithms; Obtain data (A, B, C, F; I Q), checks the 5th hashed value Q to meet, and check B meets the requirements; Deletion terminal random number is obtained the IP address of server and the port numbers of server, and the terminal connects application server according to the IP address I of server through SSL/TLS, uploads authorization code F;
Application server inspection terminal IP conforms to J, and authorization code F conforms to, and application service is provided.

Claims (7)

1. the load-balancing method of a secure communication; It is characterized in that: a plurality of terminals, a plurality of load equalizer and a plurality of application server are set; At each terminal stored its corresponding ID and terminal key; The ID of the ID at all terminals of storage, terminal key, all application servers in each load equalizer; The communication key that carries out coded communication at each load equalizer and each application server stored load equalizer and application server is simultaneously with a plurality of load equalizers and a plurality of application server time synchronized; In addition, in each terminal, each load equalizer and each application server, all preserve each other authorization requests order, authentication request order, authentication commands in return, authorization command and the increase authorization command of agreement in advance; The load-balancing method of above-mentioned secure communication comprises the steps:
Step 1, terminal produce a terminal random number and storage, authorization requests order, ID and terminal random number send to load equalizer;
After step 2, load equalizer are received above-mentioned authorization requests order, ID and the terminal random number of sending at the terminal; Search and whether store this ID in the load equalizer; If just do not produce a load balancing random number, preserve this ID and load balancing random number; If load equalizer is preserved this ID, read this ID and the balanced random number of its corresponding load, then authentication request order, ID, terminal random number and load balancing random number send to the terminal;
After above-mentioned authentication request order, ID, terminal random number and the load balancing random number of load equalizer transmission received at step 3, terminal; The comparison terminal random number; If be not inconsistent and just abandon above-mentioned authentication request order, ID, terminal random number and load balancing random number; If meet; Just authentication commands in return, ID, terminal random number, load balancing random number and terminal key are carried out hash, obtain first hashed value, and send to load equalizer to authentication commands in return, ID, terminal random number, load balancing random number and first hashed value;
After step 4, load equalizer are received above-mentioned authentication commands in return, ID, terminal random number, load balancing random number and first hashed value of sending at the terminal; Search and whether store corresponding ID and load balancing random number in the load equalizer; If just do not abandon above-mentioned authentication commands in return, ID, terminal random number, load balancing random number and first hashed value; Otherwise just calculate the hashed value of authentication commands in return, ID, terminal random number, load balancing random number and terminal key with hashing algorithm; Obtain second hashed value; Just abandon above-mentioned authentication commands in return, ID, terminal random number, load balancing random number and first hashed value if first hashed value that send at second hashed value and terminal is different, otherwise just forward next step to;
Step 5, load equalizer are selected an application server; Write down ID, IP address and the port numbers of this application server; Produce the authorization code of a random number and the password factor of a random number; Carry out hash to increasing authorization command, application server ID, authorization code, IP address of terminal and current time stamp, obtain the 3rd hashed value; And carry out hash with the communication key and the password factor that application server is preserved, obtain the train value that scatters; With the scatter train value as key to increase authorization command, server ID, authorization code, IP address of terminal, the current time stabs and the 3rd hashed value is encrypted; Obtain first enciphered data, send to application server to the password factor and first enciphered data then; IP address and port numbers to ID, terminal random number, load balancing random number, authorization code and application server are carried out hash; Obtain the 5th hashed value; The IP address of ID, terminal random number, load balancing random number, authorization code, application server and port numbers and the 5th hashed value are encrypted as key with the hashed value of the terminal key and the password factor; Obtain second enciphered data, send to the terminal to authorization command, the password factor and second enciphered data then; The final load equalizer is ID and the deletion of load balancing random number;
After step 6, application server are received the password factor and first enciphered data; Communication key and password factor pair first enciphered data of utilizing application server to preserve are deciphered, if the deciphering failure just abandons, otherwise to data check the 3rd hashed value after the deciphering; If just being inconsistent, the 3rd hashed value do not abandon; Otherwise relatively whether the ID of server meets, and does not abandon if just be inconsistent, and relatively whether the difference of local zone time and timestamp surpasses prescribed limits then; Just abandon if surpass, otherwise preserve the IP address at authorization code and terminal;
After authorization command, the password factor and second enciphered data are received in step 7, terminal; Utilize terminal key and password factor pair second enciphered data to decipher, if the deciphering failure just abandons, otherwise to data check the 5th hashed value after the deciphering; If just being inconsistent, the 5th hashed value do not abandon; Otherwise the comparison terminal random number does not abandon if just be inconsistent, otherwise deletes the terminal random number and obtain the IP address of server and the port numbers of server; Connect application server through SSL/TLS, and upload authorization code through this connection;
Step 8, application server receive that the terminal connects, and judge whether IP address of terminal and authorization code meet, and refusal connects if just be not inconsistent, otherwise successful connection provides application service.
2. the load-balancing method of secure communication according to claim 1; It is characterized in that: in the said step 2; Receive above-mentioned authorization requests order, ID and the terminal random number of terminal transmission when load equalizer after; Search whether store this ID in the load equalizer,, preserve this ID and load balancing random number if just do not produce a load balancing random number; Start timeout mechanism then, if just accomplish to authorize at the appointed time authorization requests order, ID and the deletion of terminal random number.
3. the load-balancing method of secure communication according to claim 1; It is characterized in that: in the said step 6, when whether application server surpasses prescribed limits in the difference that compares local zone time and timestamp; Just abandon if be judged as to surpass; Otherwise preserve the IP address at authorization code and terminal, start timeout mechanism then, if the data that do not have the terminal to connect after just will deciphering at the appointed time remove.
4. according to the load-balancing method of claim 1 or 2 or 3 described secure communications, it is characterized in that: the hashing algorithm that adopts during hash is MD5 or SHA.
5. according to the load-balancing method of claim 1 or 2 or 3 described secure communications, it is characterized in that: the AES that adopts during encryption is symmetric encipherment algorithm or asymmetrical encryption algorithm.
6. according to the load-balancing method of claim 1 or 2 or 3 described secure communications; It is characterized in that: the terminal is selected nearest load equalizer or is selected a load equalizer to communicate through the method for DNS poll when selecting load equalizer to carry out communication.
7. the SiteServer LBS of a secure communication; It is characterized in that: comprise a plurality of terminals, a plurality of load equalizer and a plurality of application server; Each terminal internal memory contains its corresponding ID and terminal key; Store ID, the terminal key at all terminals, the ID of all application servers in each load equalizer; All store the communication key that load equalizer and application server carry out coded communication in each load equalizer and each application server, simultaneously a plurality of load equalizers and a plurality of application server time are kept synchronously; In addition, all preserve each other authorization requests order, authentication request order, authentication commands in return, authorization command and the increase authorization command of agreement in advance in each terminal, each load equalizer and each application server; And the means of communication of the SiteServer LBS of above-mentioned secure communication adopt the load-balancing method like the secure communication of describing in the claim 1.
CN201210110752.4A 2012-04-13 2012-04-13 Load balancing method and system for safety communication Active CN102624749B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210110752.4A CN102624749B (en) 2012-04-13 2012-04-13 Load balancing method and system for safety communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210110752.4A CN102624749B (en) 2012-04-13 2012-04-13 Load balancing method and system for safety communication

Publications (2)

Publication Number Publication Date
CN102624749A true CN102624749A (en) 2012-08-01
CN102624749B CN102624749B (en) 2014-06-04

Family

ID=46564433

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210110752.4A Active CN102624749B (en) 2012-04-13 2012-04-13 Load balancing method and system for safety communication

Country Status (1)

Country Link
CN (1) CN102624749B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106230593A (en) * 2016-07-19 2016-12-14 乐视控股(北京)有限公司 ID generates method and device
CN107896224A (en) * 2017-12-04 2018-04-10 宁波升维信息技术有限公司 A kind of Web information issuance method based on dual link safety check
CN108462681A (en) * 2017-02-22 2018-08-28 中国移动通信集团公司 A kind of communication means of heterogeneous network, equipment and system
WO2020037577A1 (en) * 2018-08-22 2020-02-27 袁振南 Communication channel encrypting, decrypting, and establishing methods and apparatuses, memory, and terminal

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020194342A1 (en) * 2001-06-18 2002-12-19 Transtech Networks Usa, Inc. Content-aware application switch and methods thereof
CN101384042A (en) * 2008-10-15 2009-03-11 东南大学 Mobile phone ciphering method based on safe digital interface ciphering card

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020194342A1 (en) * 2001-06-18 2002-12-19 Transtech Networks Usa, Inc. Content-aware application switch and methods thereof
CN101384042A (en) * 2008-10-15 2009-03-11 东南大学 Mobile phone ciphering method based on safe digital interface ciphering card

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106230593A (en) * 2016-07-19 2016-12-14 乐视控股(北京)有限公司 ID generates method and device
CN108462681A (en) * 2017-02-22 2018-08-28 中国移动通信集团公司 A kind of communication means of heterogeneous network, equipment and system
CN108462681B (en) * 2017-02-22 2020-12-29 中国移动通信集团公司 Communication method, device and system of heterogeneous network
CN107896224A (en) * 2017-12-04 2018-04-10 宁波升维信息技术有限公司 A kind of Web information issuance method based on dual link safety check
WO2020037577A1 (en) * 2018-08-22 2020-02-27 袁振南 Communication channel encrypting, decrypting, and establishing methods and apparatuses, memory, and terminal

Also Published As

Publication number Publication date
CN102624749B (en) 2014-06-04

Similar Documents

Publication Publication Date Title
CN107094155B (en) Data security storage method and device based on alliance block chain
CN109614818B (en) Authorized identity-based keyword search encryption method
CN104980477B (en) Data access control method and system under cloud storage environment
CN102983965B (en) Transformer station's quantum communications model, quantum key distribution center and model implementation method
CN107846282A (en) A kind of electronic data distribution keeping method and system based on block chain technology
US11265170B2 (en) Vehicle information collection system, vehicle-mounted computer, vehicle information collection device, vehicle information collection method, and computer program
US10824744B2 (en) Secure client-server communication
WO2013139079A1 (en) Storage method, system and device
CN103023920B (en) Secure virtual machine guard method and device
CN106899406B (en) A kind of method of proof of cloud data storage integrality
CN114422152B (en) Industrial environment authentication method based on PUF and block chain
CN102685086A (en) File access method and system
CN102098157A (en) A system and method for designing secure client-server communication protocols based on certificateless public key infrastructure
CN105721153A (en) System and method for key exchange based on authentication information
CN107995148B (en) File tamper-proofing method, system, terminal and trusted cloud platform
CN111552270B (en) Safety authentication and data transmission method and device for vehicle-mounted diagnosis
CN102624749B (en) Load balancing method and system for safety communication
CN103873233A (en) Digital film secret key distributing method, device and system based on management website
CN103475477A (en) Safe authorized access method
CN104967693A (en) Document similarity calculation method facing cloud storage based on fully homomorphic password technology
CN105227309B (en) Encryption method for internet-of-things terminal and cloud communication
CN112861157A (en) Data sharing method based on decentralized identity and proxy re-encryption
US20110010544A1 (en) Process distribution system, authentication server, distribution server, and process distribution method
CN104125239A (en) Network authentication method and system based on data link encryption transmission
CN112732695A (en) Cloud storage data security deduplication method based on block chain

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: 315800 Songshan Road, Beilun District, Zhejiang, No. 1299, No.

Patentee after: Ningbo Haibo Group Co. Ltd.

Address before: 315800 Songshan Road, Beilun District, Zhejiang, No. 1299, No.

Patentee before: Beicang Haibo Fine Machinery Mfg. Co., Ltd., Ningbo

CP01 Change in the name or title of a patent holder