CN109474615A - A kind of service encryption system and the communication for service method based on ciphering process - Google Patents
A kind of service encryption system and the communication for service method based on ciphering process Download PDFInfo
- Publication number
- CN109474615A CN109474615A CN201811514956.8A CN201811514956A CN109474615A CN 109474615 A CN109474615 A CN 109474615A CN 201811514956 A CN201811514956 A CN 201811514956A CN 109474615 A CN109474615 A CN 109474615A
- Authority
- CN
- China
- Prior art keywords
- server
- service
- encryption
- request
- port
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0478—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Technology Law (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a kind of service encryption system and the communication for service method based on ciphering process, system include encryption server and its external server and internal server for being separately connected.The step of communication for service method includes: internal server port and IP registration;The step of external server sends the port request encrypted by the first Encryption Algorithm to encryption server;The request of encryption server echo port, and the step of issuing request response;The step of external server service request that internally server transmission is encrypted by the second Encryption Algorithm;The step of external server service for checking credentials is requested.Independent encryption server is arranged in the present invention, and information checking and permission (identity) verifying are carried out a point link, point object handles, can effectively improve the security level communicated between server, so that system is not subject to rogue attacks;System simple structure, security level are high, required operand is small.
Description
Technical field
The present invention relates to especially a kind of service encryption system and the communication for service methods based on ciphering process.
Background technique
With the high speed development of network communication, information security is gradually attracted attention, in network communications usually
Along with various attacks, to cope with these attacks, people add communication data by technologies such as cryptography, digital signature
Close or verifying, this is developed rapidly cryptography and digital signature technology.
For the cryptography in network communication, it has been developed that various Hash Encryption Algorithm MD4, MD5, SHA0, SHA1
Deng.But these cryptographic structures are relatively simple, are easy to be decrypted, security level is not high.
Summary of the invention
Goal of the invention of the invention is: in view of the above problems, providing a kind of service encryption that security level is high
System and communication for service method based on ciphering process, to improve in service request, the security level of network communication guarantees service
Secure communication between device.
The technical solution adopted by the invention is as follows:
A kind of service encryption communication system, including external server, encryption server and inner wall server, encryption server difference
Connect external server and internal server, wherein
External server is used to send the port request encrypted by the first Encryption Algorithm, the port request packet to encryption server
Containing required service name;The request for being also used to receive and decrypt encryption server transmission is responded to obtain port and IP information;Also
According to the port and IP information, the service request encrypted by the second Encryption Algorithm, the service request packet are sent to corresponding service
Name information containing external server;
Encryption server is for monitoring internal server and external server;It receives and the port for decrypting external server transmission asks
It asks, and information checking is carried out to solution confidential information;It is also used to send the first Encryption Algorithm to by the external server of information checking
The request of encryption responds, and the request response includes the corresponding port of the required service and IP information;
The port for the service that internal server is used to be provided and IP are registered on encryption server;It is also used to receive simultaneously
The service request that external server is sent is decrypted, and Authority Verification is carried out to solution confidential information;It is also used to by Authority Verification
External server provides corresponding required service.
External request server can be isolated with internal server by independent encryption server, it is ensured that entire
Service request and mailing address are in the environment of a safety.Meanwhile information checking and service Authority Verification are transferred into difference respectively
Server carries out, it can be ensured that the independence between each link of service request avoids interfering with each other, while by the number of each link processing
According to progress decentralized processing, balance system operation pressure.Leading verification for information, can filter out illegal request, so that
In the case where guaranteeing network security, the operation of subsequent unnecessary link is saved.Double authentication mode to information and permission is set,
It may further ensure that the safety of communication system.
Further, the solution confidential information that the encryption server decryption port request obtains are as follows: clothes needed for external server
The service name of business;The information checking are as follows: search the required service in registered service, infused if finding and existing
The service of volume, then it represents that information checking passes through, and otherwise, information checking does not pass through.
The service name of request is retrieved, can be with prestissimo respond request, while checking request is legal
Property.
Further, the solution confidential information that the internal server decryption service request obtains are as follows: send the service request
External server title;The Authority Verification are as follows: verify whether the external server registered on internal server,
If so, Authority Verification passes through, otherwise, Authority Verification does not pass through.
Request end identity is verified, the camouflage of illegal user can be prevented, prevent server by rogue attacks.
Further, first Encryption Algorithm is different with second Encryption Algorithm.
Encryption to information and different cipher modes is arranged to the encryption of server, system can be reduced and illegally decoded
Probability, improve the safety coefficient of system communication.
Further, first Encryption Algorithm is one of RSA cryptographic algorithms or AES encryption algorithm, second encryption
Algorithm is in RSA cryptographic algorithms and AES encryption algorithm, different from a kind of Encryption Algorithm of the first Encryption Algorithm.
The complexity of system structure can be effectively reduced using mature Encryption Algorithm, reduce construction cost.
Above-mentioned all or part of, the communication for service method based on ciphering process that the present invention provides a kind of to solve the problems, such as,
The following steps are included:
A. encryption server monitors internal server and external server respectively;
B. internal server starting service, and register to encryption server port and the IP of service provided by it;
C. external server sends the port request encrypted by the first Encryption Algorithm to encryption server, and the port request includes
Required service name;
D. encryption server decrypts the port request, and carries out information checking to solution confidential information, after verification passes through, to outside
Server is sent to be responded by the request that the first Encryption Algorithm encrypts, and the request response includes the corresponding port of the required service
With IP information;
E. the response of external server decoding request is to obtain the port and IP information, according to the port and IP information, to correspondence
Service send the service request that encrypt by the second Encryption Algorithm, which includes external server name information;
F. the internal server for providing the service decrypts the service request, carries out Authority Verification to solution confidential information, is verifying
By rear, service needed for being provided to external server.
External request server can be isolated with internal server by independent encryption server, it is ensured that entire
Service request and mailing address are in the environment of a safety.Meanwhile information checking and service Authority Verification are transferred into difference respectively
Server carries out, it can be ensured that the independence between each link of service request avoids interfering with each other, while by the number of each link processing
According to progress decentralized processing, balance system operation pressure.Leading verification for information, can filter out illegal request, so that
In the case where guaranteeing network security, the operation of subsequent unnecessary link is saved.Double authentication mode to information and permission is set,
It may further ensure that the safety of communication system.
Further, in the step D, encryption server carries out information checking to solution confidential information are as follows: encryption server solution
The close port request searches the required service, if searching to obtain the required service name in registered service
To there are registered services, then it represents that information checking passes through, and otherwise, information checking does not pass through.
Further, in the step F, Authority Verification is carried out to external server are as follows: internal server decrypts the clothes
Business request verifies whether the external server registered on internal server to obtain external server title, if
It is that then Authority Verification passes through, otherwise, Authority Verification does not pass through.
Further, the first Encryption Algorithm is different from the second Encryption Algorithm.
Further, first Encryption Algorithm is one of RSA cryptographic algorithms or AES encryption algorithm, second encryption
Algorithm is in RSA cryptographic algorithms and AES encryption algorithm, different from a kind of Encryption Algorithm of the first Encryption Algorithm.
In conclusion by adopting the above-described technical solution, the beneficial effects of the present invention are:
1, the present invention external request server can be isolated with internal server by the way that independent encryption server is arranged,
Ensure entire service request and mailing address in the environment of a safety.Information checking and service Authority Verification are transferred to not respectively
It is carried out with server, it can be ensured that the independence between each link of service request avoids interfering with each other, while by each link processing
Data carry out decentralized processing, balance system operation pressure.
2, the present invention double verification linear to information checking and permission (identity) verification setting, on the one hand, can be effective
Illegal request is filtered out, the pressure of subsequent arithmetic is mitigated;On the other hand, the mode of double authentication, can effectively improve server
Between the safety that communicates, prevent the attack by illegal user.
3, different cipher modes is used for information checking and server authentication, system encryption safety etc. can be increased
Grade, improves the safety of system.
4, for the present invention for the simple structure between server, system building is low with operating cost, and security level is high.
Detailed description of the invention
Examples of the present invention will be described by way of reference to the accompanying drawings, in which:
Fig. 1 is the structural map of service encryption communication system.
In figure, 10 be encryption server, and 20 be external server, and 30 be internal server.
Specific embodiment
All features disclosed in this specification or disclosed all methods or in the process the step of, in addition to mutually exclusive
Feature and/or step other than, can combine in any way.
Any feature disclosed in this specification (including any accessory claim, abstract), unless specifically stated,
It is replaced by other equivalent or with similar purpose alternative features.That is, unless specifically stated, each feature is a series of
An example in equivalent or similar characteristics.
AES encryption algorithm is a symmetry algorithm, uses identical code key (key) encrypting and decrypting;RSA cryptographic algorithms
It is an asymmetrical algorithm, uses different key encrypting and decrypting.
A kind of service encryption communication system, including external server, encryption server and inner wall server, encryption server
It is separately connected external server and internal server, in which:
External server is used to send the port request encrypted by the first Encryption Algorithm, the port request packet to encryption server
Containing required service name;The request for being also used to receive and decrypt encryption server transmission is responded to obtain port and IP information;Also
According to the port and IP information, the service request encrypted by the second Encryption Algorithm, the service request packet are sent to corresponding service
Name information containing external server;
Encryption server is for monitoring internal server and external server;It receives and the port for decrypting external server transmission asks
It asks, and information checking is carried out to solution confidential information;It is also used to send the first Encryption Algorithm to by the external server of information checking
The request of encryption responds, and the request response includes the corresponding port of the required service and IP information;
The port for the service that internal server is used to be provided and IP are registered on encryption server;It is also used to receive simultaneously
The service request that external server is sent is decrypted, and Authority Verification is carried out to solution confidential information;It is also used to by Authority Verification
External server provides corresponding required service.
In one embodiment, encryption server decryption port request obtains the Service name serviced needed for external server
Claim, information checking are as follows: the required service is searched in registered service, there are registered service, tables if finding
Show that information checking passes through, otherwise, information checking does not pass through.
In one embodiment, internal server decryption service request obtains external server title, Authority Verification are as follows: tests
Demonstrate,prove whether the external server registered on internal server, if so, Authority Verification passes through, otherwise, Authority Verification
Do not pass through.
Above-mentioned first Encryption Algorithm and the second Encryption Algorithm may be the same or different.If it is different, then can be improved
The safety coefficient of entire services communication system.In the case of the first Encryption Algorithm is different with the second Encryption Algorithm, in a reality
It applies in example, the first Encryption Algorithm is one of RSA cryptographic algorithms or AES encryption algorithm, and the second Encryption Algorithm then takes another encryption
Algorithm.
Present embodiment discloses another service encryption communication systems, including external server, encryption server and inner wall
Server, encryption server are separately connected external server and internal server, in which:
External server is used to send the port request encrypted by the first Encryption Algorithm, the port request packet to encryption server
Containing required service name;The request for being also used to receive and decrypt encryption server transmission is responded to obtain port and IP information;Also
According to the port and IP information, the service request encrypted by the second Encryption Algorithm, the service request packet are sent to corresponding service
Name information containing external server;
Encryption server for monitoring internal server and external server in real time;Receive and decrypt the end of external server transmission
Mouth request, and information checking is carried out to solution confidential information;It is also used to send the first encryption to the external server by information checking
The request of algorithm for encryption responds, and the request response includes the corresponding port of the required service and IP information;
The port for the service that internal server is used to be provided and IP are registered on encryption server;It is also used to receive simultaneously
The service request that external server is sent is decrypted, and Authority Verification is carried out to solution confidential information;It is also used to by Authority Verification
External server provides corresponding required service.
Present embodiment discloses another service encryption communication systems, including external server, encryption server and inner wall
Server, encryption server are separately connected external server and internal server, in which:
External server is used to send the port request encrypted by RSA Algorithm to encryption server, and the port request includes institute
Need service name;The request for being also used to receive and decrypt encryption server transmission is responded to obtain port and IP information;Also according to
The port and IP information send the service request encrypted by aes algorithm to corresponding service, which includes external service
Device name information;
Encryption server is for monitoring internal server and external server;It receives and the port for decrypting external server transmission asks
It asks, obtains required service name, information checking is carried out to required service: searching the required service in registered service,
If finding, there are registered services, then it represents that information checking passes through;It is also used to send out to by the external server of information checking
The request response for sending RSA Algorithm to encrypt, the request response include the corresponding port of the required service and IP information;
The port for the service that internal server is used to be provided and IP are registered on encryption server;It is also used to receive simultaneously
The service request that external server is sent is decrypted, external server title is obtained, Authority Verification is carried out to external server: verifying
Whether the external server registered on internal server, if so, Authority Verification passes through;It is also used to test by permission
The external server of card provides corresponding required service.
As shown in Figure 1, present embodiment discloses a kind of communication for service method based on ciphering process, comprising the following steps:
A. encryption server monitors internal server and external server respectively;
B. internal server starting service, and the port respectively serviced provided by it and IP are registered to encryption server;
C. external server sends the port request encrypted by the first Encryption Algorithm to encryption server, and the port request includes
Required service name;To the corresponding port information of service needed for obtaining;
D. encryption server decrypts the port request, and carries out information checking to solution confidential information, after verification passes through, to outside
Server is sent to be responded by the request that the first Encryption Algorithm encrypts, and the request response includes clothes needed for (external server)
It is engaged in corresponding port and IP information;
E. the response of external server decoding request is to obtain the port and IP information, according to the port and IP information, to correspondence
Service send the service request that encrypt by the second Encryption Algorithm, which includes external server name information;
F. the internal server of (port and IP information are corresponding) service described in providing decrypts the service request, to solution confidential information
Authority Verification is carried out, after being verified, service needed for being provided to external server.
Above-mentioned first Encryption Algorithm and the second Encryption Algorithm, may be the same or different.If it is different, can make whole
The safety coefficient of a services communication system is higher.
Communication for service method present embodiment discloses another kind based on ciphering process, comprising the following steps:
A. encryption server monitors internal server and external server in real time respectively;
B. internal server starting service, and the port respectively serviced provided by it and IP are registered to encryption server;
C. external server sends the port request encrypted by the first Encryption Algorithm to encryption server, and the port request includes
Required service name;
D. encryption server (by the decipherment algorithm for corresponding to the first Encryption Algorithm) the decryption port request, obtains required clothes
Be engaged in title, the required service is searched in registered service, if finding corresponding service, to external server send by
The request response of first Encryption Algorithm encryption, the request response includes the found corresponding port of service and IP information;
E. external server (by the decipherment algorithm for corresponding to the first Encryption Algorithm) decoding request is responded to obtain the port
The service request encrypted by the second Encryption Algorithm, the clothes are sent to corresponding service according to the port and IP information with IP information
Business request includes external server name information;
F. the internal server serviced needed for (port and IP information are corresponding) described in providing (is calculated by corresponding to the second encryption
The decipherment algorithm of method) the decryption service request, external server title is obtained, whether verifies the external server in inside
It was registered on server, if registered, service needed for being provided to external server.
Communication for service method present embodiment discloses another kind based on ciphering process, comprising the following steps:
A. encryption server monitors internal server and external server in real time respectively;
B. internal server starting service, and the port respectively serviced provided by it and IP are registered to encryption server;
C. external server sends the port request encrypted by RSA Algorithm to encryption server, and the port request includes required
Service name;
D. encryption server decrypts the port request by corresponding to the private key of above-mentioned rsa encryption public key, obtains required service
Title searches the required service in registered service, if finding corresponding service, to external server send by
The request response of RSA Algorithm encryption, the request response includes the found corresponding port of service and IP information;
E. external server is responded by corresponding to the private key decoding request of above-mentioned rsa encryption public key to obtain the port and IP
Information sends the service request encrypted by aes algorithm, the service request packet to corresponding service according to the port and IP information
Name information containing external server;
F. the internal server serviced needed for (port and IP information are corresponding) described in providing, by with above-mentioned AES encryption public key
Private key decrypt the service request, obtain external server title, whether verify the external server in internal server
It is upper to register, if registered, service needed for being provided to external server.
The invention is not limited to specific embodiments above-mentioned.The present invention, which expands to, any in the present specification to be disclosed
New feature or any new combination, and disclose any new method or process the step of or any new combination.
Claims (10)
1. a kind of service encryption communication system, including external server, encryption server and inner wall server, encryption server point
It Lian Jie external server and internal server, it is characterised in that:
External server is used to send the port request encrypted by the first Encryption Algorithm, the port request packet to encryption server
Containing required service name;The request for being also used to receive and decrypt encryption server transmission is responded to obtain port and IP information;Also
According to the port and IP information, the service request encrypted by the second Encryption Algorithm, the service request packet are sent to corresponding service
Name information containing external server;
Encryption server is for monitoring internal server and external server;It receives and the port for decrypting external server transmission asks
It asks, and information checking is carried out to solution confidential information;It is also used to send the first Encryption Algorithm to by the external server of information checking
The request of encryption responds, and the request response includes the corresponding port of the required service and IP information;
The port for the service that internal server is used to be provided and IP are registered on encryption server;It is also used to receive simultaneously
The service request that external server is sent is decrypted, and Authority Verification is carried out to solution confidential information;It is also used to by Authority Verification
External server provides corresponding required service.
2. service encryption communication system as described in claim 1, which is characterized in that the encryption server decrypts port request
Obtained solution confidential information are as follows: the service name serviced needed for external server;The information checking are as follows: in registered service
The required service is searched, there are registered services if finding, then it represents that information checking passes through, and otherwise, information checking is not
Pass through.
3. service encryption communication system as described in claim 1, which is characterized in that the internal server decrypts service request
Obtained solution confidential information are as follows: send the external server title of the service request;The Authority Verification are as follows: verify the outside
Whether server registered on internal server, if so, Authority Verification passes through, otherwise, Authority Verification does not pass through.
4. the service encryption communication system as described in one of claim 1-3, which is characterized in that first Encryption Algorithm and institute
State the second Encryption Algorithm difference.
5. service encryption communication system as claimed in claim 4, which is characterized in that first Encryption Algorithm is rsa encryption
One of algorithm or AES encryption algorithm, second Encryption Algorithm are to be different from first in RSA cryptographic algorithms and AES encryption algorithm
A kind of Encryption Algorithm of Encryption Algorithm.
6. a kind of communication for service method based on ciphering process, which comprises the following steps:
A. encryption server monitors internal server and external server respectively;
B. internal server starting service, and register to encryption server port and the IP of service provided by it;
C. external server sends the port request encrypted by the first Encryption Algorithm to encryption server, and the port request includes
Required service name;
D. encryption server decrypts the port request, and carries out information checking to solution confidential information, after verification passes through, to outside
Server is sent to be responded by the request that the first Encryption Algorithm encrypts, and the request response includes the corresponding port of the required service
With IP information;
E. the response of external server decoding request is to obtain the port and IP information, according to the port and IP information, to correspondence
Service send the service request that encrypt by the second Encryption Algorithm, which includes external server name information;
F. the internal server for providing the service decrypts the service request, carries out Authority Verification to solution confidential information, is verifying
By rear, service needed for being provided to external server.
7. the communication for service method based on ciphering process as claimed in claim 6, which is characterized in that in the step D, encryption
Server carries out information checking to solution confidential information are as follows: encryption server decrypts the port request, to obtain the required service
Title searches the required service in registered service, if finding, there are registered services, then it represents that information checking
Pass through, otherwise, information checking does not pass through.
8. the communication for service method based on ciphering process as claimed in claim 6, which is characterized in that in the step F, externally
Portion's server carries out Authority Verification are as follows: internal server decrypts the service request, to obtain external server title, verifies institute
State whether external server registered on internal server, if so, Authority Verification passes through, otherwise, Authority Verification is obstructed
It crosses.
9. the communication for service method based on ciphering process as described in one of claim 6-8, which is characterized in that described first adds
Close algorithm is different from second Encryption Algorithm.
10. the communication for service method based on ciphering process as claimed in claim 9, which is characterized in that first encryption is calculated
Method is one of RSA cryptographic algorithms or AES encryption algorithm, and second Encryption Algorithm is RSA cryptographic algorithms and AES encryption algorithm
In, different from a kind of Encryption Algorithm of the first Encryption Algorithm.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811514956.8A CN109474615B (en) | 2018-12-12 | 2018-12-12 | Service encryption system and service communication method based on encryption process |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811514956.8A CN109474615B (en) | 2018-12-12 | 2018-12-12 | Service encryption system and service communication method based on encryption process |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109474615A true CN109474615A (en) | 2019-03-15 |
CN109474615B CN109474615B (en) | 2021-12-07 |
Family
ID=65676132
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811514956.8A Active CN109474615B (en) | 2018-12-12 | 2018-12-12 | Service encryption system and service communication method based on encryption process |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109474615B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101662511A (en) * | 2009-10-10 | 2010-03-03 | 中国电信股份有限公司 | Network address distributing method, DHCP server, access system and method thereof |
CN101674587A (en) * | 2009-10-14 | 2010-03-17 | 成都市华为赛门铁克科技有限公司 | Method and system for realizing business monitoring and authentication agent server |
CN104378457A (en) * | 2014-11-26 | 2015-02-25 | 中国联合网络通信集团有限公司 | Method, device and system for distributing IP address |
US20150113610A1 (en) * | 2013-06-07 | 2015-04-23 | Tencent Technology (Shenzhen) Company Limited | System and method for centralizedly controlling server user rights |
CN105376252A (en) * | 2015-12-02 | 2016-03-02 | 福建星网锐捷网络有限公司 | Distributed architecture data communication device, distributed architecture data communication device authentication method and service board |
CN108366132A (en) * | 2018-03-13 | 2018-08-03 | 平安普惠企业管理有限公司 | Service management, device, computer equipment between server and storage medium |
-
2018
- 2018-12-12 CN CN201811514956.8A patent/CN109474615B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101662511A (en) * | 2009-10-10 | 2010-03-03 | 中国电信股份有限公司 | Network address distributing method, DHCP server, access system and method thereof |
CN101674587A (en) * | 2009-10-14 | 2010-03-17 | 成都市华为赛门铁克科技有限公司 | Method and system for realizing business monitoring and authentication agent server |
US20150113610A1 (en) * | 2013-06-07 | 2015-04-23 | Tencent Technology (Shenzhen) Company Limited | System and method for centralizedly controlling server user rights |
CN104378457A (en) * | 2014-11-26 | 2015-02-25 | 中国联合网络通信集团有限公司 | Method, device and system for distributing IP address |
CN105376252A (en) * | 2015-12-02 | 2016-03-02 | 福建星网锐捷网络有限公司 | Distributed architecture data communication device, distributed architecture data communication device authentication method and service board |
CN108366132A (en) * | 2018-03-13 | 2018-08-03 | 平安普惠企业管理有限公司 | Service management, device, computer equipment between server and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN109474615B (en) | 2021-12-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20230269241A1 (en) | Secure multi-party protocol | |
CN109728909B (en) | Identity authentication method and system based on USBKey | |
EP3257227B1 (en) | Confidential communication management | |
US8904178B2 (en) | System and method for secure remote access | |
US8059818B2 (en) | Accessing protected data on network storage from multiple devices | |
CN106357400B (en) | Establish the method and system in channel between TBOX terminal and TSP platform | |
US10594479B2 (en) | Method for managing smart home environment, method for joining smart home environment and method for connecting communication session with smart device | |
CN107105060A (en) | A kind of method for realizing electric automobile information security | |
CN109951513B (en) | Quantum-resistant computing smart home quantum cloud storage method and system based on quantum key card | |
CN108259407B (en) | Symmetric encryption method and system based on timestamp | |
US11316671B2 (en) | Accelerated encryption and decryption of files with shared secret and method therefor | |
JP2009529832A (en) | Undiscoverable, ie secure data communication using black data | |
CN104935553B (en) | Unified identity authentication platform and authentication method | |
CN100580652C (en) | Method and device for fiber-optical channel public transmission secret protection | |
JPH07325785A (en) | Network user identifying method, ciphering communication method, application client and server | |
JP2003188874A (en) | System for secure data transmission | |
CN114282189A (en) | Data security storage method, system, client and server | |
US8356175B2 (en) | Methods and apparatus to perform associated security protocol extensions | |
CN104820807B (en) | A kind of intelligent card data processing method | |
CN106209384A (en) | Use the client terminal of security mechanism and the communication authentication method of charging device | |
CN106972928B (en) | Bastion machine private key management method, device and system | |
CN104915689B (en) | A kind of smart card information processing method | |
CN112035820B (en) | Data analysis method used in Kerberos encryption environment | |
CN104780049B (en) | A kind of method of safe read-write data | |
CN109474615A (en) | A kind of service encryption system and the communication for service method based on ciphering process |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |