CN109474615A - A kind of service encryption system and the communication for service method based on ciphering process - Google Patents

A kind of service encryption system and the communication for service method based on ciphering process Download PDF

Info

Publication number
CN109474615A
CN109474615A CN201811514956.8A CN201811514956A CN109474615A CN 109474615 A CN109474615 A CN 109474615A CN 201811514956 A CN201811514956 A CN 201811514956A CN 109474615 A CN109474615 A CN 109474615A
Authority
CN
China
Prior art keywords
server
service
encryption
request
port
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811514956.8A
Other languages
Chinese (zh)
Other versions
CN109474615B (en
Inventor
陈剑波
鲍勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Luxingtong Information Technology Co Ltd
Original Assignee
Chengdu Luxingtong Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Luxingtong Information Technology Co Ltd filed Critical Chengdu Luxingtong Information Technology Co Ltd
Priority to CN201811514956.8A priority Critical patent/CN109474615B/en
Publication of CN109474615A publication Critical patent/CN109474615A/en
Application granted granted Critical
Publication of CN109474615B publication Critical patent/CN109474615B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Technology Law (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a kind of service encryption system and the communication for service method based on ciphering process, system include encryption server and its external server and internal server for being separately connected.The step of communication for service method includes: internal server port and IP registration;The step of external server sends the port request encrypted by the first Encryption Algorithm to encryption server;The request of encryption server echo port, and the step of issuing request response;The step of external server service request that internally server transmission is encrypted by the second Encryption Algorithm;The step of external server service for checking credentials is requested.Independent encryption server is arranged in the present invention, and information checking and permission (identity) verifying are carried out a point link, point object handles, can effectively improve the security level communicated between server, so that system is not subject to rogue attacks;System simple structure, security level are high, required operand is small.

Description

A kind of service encryption system and the communication for service method based on ciphering process
Technical field
The present invention relates to especially a kind of service encryption system and the communication for service methods based on ciphering process.
Background technique
With the high speed development of network communication, information security is gradually attracted attention, in network communications usually Along with various attacks, to cope with these attacks, people add communication data by technologies such as cryptography, digital signature Close or verifying, this is developed rapidly cryptography and digital signature technology.
For the cryptography in network communication, it has been developed that various Hash Encryption Algorithm MD4, MD5, SHA0, SHA1 Deng.But these cryptographic structures are relatively simple, are easy to be decrypted, security level is not high.
Summary of the invention
Goal of the invention of the invention is: in view of the above problems, providing a kind of service encryption that security level is high System and communication for service method based on ciphering process, to improve in service request, the security level of network communication guarantees service Secure communication between device.
The technical solution adopted by the invention is as follows:
A kind of service encryption communication system, including external server, encryption server and inner wall server, encryption server difference Connect external server and internal server, wherein
External server is used to send the port request encrypted by the first Encryption Algorithm, the port request packet to encryption server Containing required service name;The request for being also used to receive and decrypt encryption server transmission is responded to obtain port and IP information;Also According to the port and IP information, the service request encrypted by the second Encryption Algorithm, the service request packet are sent to corresponding service Name information containing external server;
Encryption server is for monitoring internal server and external server;It receives and the port for decrypting external server transmission asks It asks, and information checking is carried out to solution confidential information;It is also used to send the first Encryption Algorithm to by the external server of information checking The request of encryption responds, and the request response includes the corresponding port of the required service and IP information;
The port for the service that internal server is used to be provided and IP are registered on encryption server;It is also used to receive simultaneously The service request that external server is sent is decrypted, and Authority Verification is carried out to solution confidential information;It is also used to by Authority Verification External server provides corresponding required service.
External request server can be isolated with internal server by independent encryption server, it is ensured that entire Service request and mailing address are in the environment of a safety.Meanwhile information checking and service Authority Verification are transferred into difference respectively Server carries out, it can be ensured that the independence between each link of service request avoids interfering with each other, while by the number of each link processing According to progress decentralized processing, balance system operation pressure.Leading verification for information, can filter out illegal request, so that In the case where guaranteeing network security, the operation of subsequent unnecessary link is saved.Double authentication mode to information and permission is set, It may further ensure that the safety of communication system.
Further, the solution confidential information that the encryption server decryption port request obtains are as follows: clothes needed for external server The service name of business;The information checking are as follows: search the required service in registered service, infused if finding and existing The service of volume, then it represents that information checking passes through, and otherwise, information checking does not pass through.
The service name of request is retrieved, can be with prestissimo respond request, while checking request is legal Property.
Further, the solution confidential information that the internal server decryption service request obtains are as follows: send the service request External server title;The Authority Verification are as follows: verify whether the external server registered on internal server, If so, Authority Verification passes through, otherwise, Authority Verification does not pass through.
Request end identity is verified, the camouflage of illegal user can be prevented, prevent server by rogue attacks.
Further, first Encryption Algorithm is different with second Encryption Algorithm.
Encryption to information and different cipher modes is arranged to the encryption of server, system can be reduced and illegally decoded Probability, improve the safety coefficient of system communication.
Further, first Encryption Algorithm is one of RSA cryptographic algorithms or AES encryption algorithm, second encryption Algorithm is in RSA cryptographic algorithms and AES encryption algorithm, different from a kind of Encryption Algorithm of the first Encryption Algorithm.
The complexity of system structure can be effectively reduced using mature Encryption Algorithm, reduce construction cost.
Above-mentioned all or part of, the communication for service method based on ciphering process that the present invention provides a kind of to solve the problems, such as, The following steps are included:
A. encryption server monitors internal server and external server respectively;
B. internal server starting service, and register to encryption server port and the IP of service provided by it;
C. external server sends the port request encrypted by the first Encryption Algorithm to encryption server, and the port request includes Required service name;
D. encryption server decrypts the port request, and carries out information checking to solution confidential information, after verification passes through, to outside Server is sent to be responded by the request that the first Encryption Algorithm encrypts, and the request response includes the corresponding port of the required service With IP information;
E. the response of external server decoding request is to obtain the port and IP information, according to the port and IP information, to correspondence Service send the service request that encrypt by the second Encryption Algorithm, which includes external server name information;
F. the internal server for providing the service decrypts the service request, carries out Authority Verification to solution confidential information, is verifying By rear, service needed for being provided to external server.
External request server can be isolated with internal server by independent encryption server, it is ensured that entire Service request and mailing address are in the environment of a safety.Meanwhile information checking and service Authority Verification are transferred into difference respectively Server carries out, it can be ensured that the independence between each link of service request avoids interfering with each other, while by the number of each link processing According to progress decentralized processing, balance system operation pressure.Leading verification for information, can filter out illegal request, so that In the case where guaranteeing network security, the operation of subsequent unnecessary link is saved.Double authentication mode to information and permission is set, It may further ensure that the safety of communication system.
Further, in the step D, encryption server carries out information checking to solution confidential information are as follows: encryption server solution The close port request searches the required service, if searching to obtain the required service name in registered service To there are registered services, then it represents that information checking passes through, and otherwise, information checking does not pass through.
Further, in the step F, Authority Verification is carried out to external server are as follows: internal server decrypts the clothes Business request verifies whether the external server registered on internal server to obtain external server title, if It is that then Authority Verification passes through, otherwise, Authority Verification does not pass through.
Further, the first Encryption Algorithm is different from the second Encryption Algorithm.
Further, first Encryption Algorithm is one of RSA cryptographic algorithms or AES encryption algorithm, second encryption Algorithm is in RSA cryptographic algorithms and AES encryption algorithm, different from a kind of Encryption Algorithm of the first Encryption Algorithm.
In conclusion by adopting the above-described technical solution, the beneficial effects of the present invention are:
1, the present invention external request server can be isolated with internal server by the way that independent encryption server is arranged, Ensure entire service request and mailing address in the environment of a safety.Information checking and service Authority Verification are transferred to not respectively It is carried out with server, it can be ensured that the independence between each link of service request avoids interfering with each other, while by each link processing Data carry out decentralized processing, balance system operation pressure.
2, the present invention double verification linear to information checking and permission (identity) verification setting, on the one hand, can be effective Illegal request is filtered out, the pressure of subsequent arithmetic is mitigated;On the other hand, the mode of double authentication, can effectively improve server Between the safety that communicates, prevent the attack by illegal user.
3, different cipher modes is used for information checking and server authentication, system encryption safety etc. can be increased Grade, improves the safety of system.
4, for the present invention for the simple structure between server, system building is low with operating cost, and security level is high.
Detailed description of the invention
Examples of the present invention will be described by way of reference to the accompanying drawings, in which:
Fig. 1 is the structural map of service encryption communication system.
In figure, 10 be encryption server, and 20 be external server, and 30 be internal server.
Specific embodiment
All features disclosed in this specification or disclosed all methods or in the process the step of, in addition to mutually exclusive Feature and/or step other than, can combine in any way.
Any feature disclosed in this specification (including any accessory claim, abstract), unless specifically stated, It is replaced by other equivalent or with similar purpose alternative features.That is, unless specifically stated, each feature is a series of An example in equivalent or similar characteristics.
AES encryption algorithm is a symmetry algorithm, uses identical code key (key) encrypting and decrypting;RSA cryptographic algorithms It is an asymmetrical algorithm, uses different key encrypting and decrypting.
A kind of service encryption communication system, including external server, encryption server and inner wall server, encryption server It is separately connected external server and internal server, in which:
External server is used to send the port request encrypted by the first Encryption Algorithm, the port request packet to encryption server Containing required service name;The request for being also used to receive and decrypt encryption server transmission is responded to obtain port and IP information;Also According to the port and IP information, the service request encrypted by the second Encryption Algorithm, the service request packet are sent to corresponding service Name information containing external server;
Encryption server is for monitoring internal server and external server;It receives and the port for decrypting external server transmission asks It asks, and information checking is carried out to solution confidential information;It is also used to send the first Encryption Algorithm to by the external server of information checking The request of encryption responds, and the request response includes the corresponding port of the required service and IP information;
The port for the service that internal server is used to be provided and IP are registered on encryption server;It is also used to receive simultaneously The service request that external server is sent is decrypted, and Authority Verification is carried out to solution confidential information;It is also used to by Authority Verification External server provides corresponding required service.
In one embodiment, encryption server decryption port request obtains the Service name serviced needed for external server Claim, information checking are as follows: the required service is searched in registered service, there are registered service, tables if finding Show that information checking passes through, otherwise, information checking does not pass through.
In one embodiment, internal server decryption service request obtains external server title, Authority Verification are as follows: tests Demonstrate,prove whether the external server registered on internal server, if so, Authority Verification passes through, otherwise, Authority Verification Do not pass through.
Above-mentioned first Encryption Algorithm and the second Encryption Algorithm may be the same or different.If it is different, then can be improved The safety coefficient of entire services communication system.In the case of the first Encryption Algorithm is different with the second Encryption Algorithm, in a reality It applies in example, the first Encryption Algorithm is one of RSA cryptographic algorithms or AES encryption algorithm, and the second Encryption Algorithm then takes another encryption Algorithm.
Present embodiment discloses another service encryption communication systems, including external server, encryption server and inner wall Server, encryption server are separately connected external server and internal server, in which:
External server is used to send the port request encrypted by the first Encryption Algorithm, the port request packet to encryption server Containing required service name;The request for being also used to receive and decrypt encryption server transmission is responded to obtain port and IP information;Also According to the port and IP information, the service request encrypted by the second Encryption Algorithm, the service request packet are sent to corresponding service Name information containing external server;
Encryption server for monitoring internal server and external server in real time;Receive and decrypt the end of external server transmission Mouth request, and information checking is carried out to solution confidential information;It is also used to send the first encryption to the external server by information checking The request of algorithm for encryption responds, and the request response includes the corresponding port of the required service and IP information;
The port for the service that internal server is used to be provided and IP are registered on encryption server;It is also used to receive simultaneously The service request that external server is sent is decrypted, and Authority Verification is carried out to solution confidential information;It is also used to by Authority Verification External server provides corresponding required service.
Present embodiment discloses another service encryption communication systems, including external server, encryption server and inner wall Server, encryption server are separately connected external server and internal server, in which:
External server is used to send the port request encrypted by RSA Algorithm to encryption server, and the port request includes institute Need service name;The request for being also used to receive and decrypt encryption server transmission is responded to obtain port and IP information;Also according to The port and IP information send the service request encrypted by aes algorithm to corresponding service, which includes external service Device name information;
Encryption server is for monitoring internal server and external server;It receives and the port for decrypting external server transmission asks It asks, obtains required service name, information checking is carried out to required service: searching the required service in registered service, If finding, there are registered services, then it represents that information checking passes through;It is also used to send out to by the external server of information checking The request response for sending RSA Algorithm to encrypt, the request response include the corresponding port of the required service and IP information;
The port for the service that internal server is used to be provided and IP are registered on encryption server;It is also used to receive simultaneously The service request that external server is sent is decrypted, external server title is obtained, Authority Verification is carried out to external server: verifying Whether the external server registered on internal server, if so, Authority Verification passes through;It is also used to test by permission The external server of card provides corresponding required service.
As shown in Figure 1, present embodiment discloses a kind of communication for service method based on ciphering process, comprising the following steps:
A. encryption server monitors internal server and external server respectively;
B. internal server starting service, and the port respectively serviced provided by it and IP are registered to encryption server;
C. external server sends the port request encrypted by the first Encryption Algorithm to encryption server, and the port request includes Required service name;To the corresponding port information of service needed for obtaining;
D. encryption server decrypts the port request, and carries out information checking to solution confidential information, after verification passes through, to outside Server is sent to be responded by the request that the first Encryption Algorithm encrypts, and the request response includes clothes needed for (external server) It is engaged in corresponding port and IP information;
E. the response of external server decoding request is to obtain the port and IP information, according to the port and IP information, to correspondence Service send the service request that encrypt by the second Encryption Algorithm, which includes external server name information;
F. the internal server of (port and IP information are corresponding) service described in providing decrypts the service request, to solution confidential information Authority Verification is carried out, after being verified, service needed for being provided to external server.
Above-mentioned first Encryption Algorithm and the second Encryption Algorithm, may be the same or different.If it is different, can make whole The safety coefficient of a services communication system is higher.
Communication for service method present embodiment discloses another kind based on ciphering process, comprising the following steps:
A. encryption server monitors internal server and external server in real time respectively;
B. internal server starting service, and the port respectively serviced provided by it and IP are registered to encryption server;
C. external server sends the port request encrypted by the first Encryption Algorithm to encryption server, and the port request includes Required service name;
D. encryption server (by the decipherment algorithm for corresponding to the first Encryption Algorithm) the decryption port request, obtains required clothes Be engaged in title, the required service is searched in registered service, if finding corresponding service, to external server send by The request response of first Encryption Algorithm encryption, the request response includes the found corresponding port of service and IP information;
E. external server (by the decipherment algorithm for corresponding to the first Encryption Algorithm) decoding request is responded to obtain the port The service request encrypted by the second Encryption Algorithm, the clothes are sent to corresponding service according to the port and IP information with IP information Business request includes external server name information;
F. the internal server serviced needed for (port and IP information are corresponding) described in providing (is calculated by corresponding to the second encryption The decipherment algorithm of method) the decryption service request, external server title is obtained, whether verifies the external server in inside It was registered on server, if registered, service needed for being provided to external server.
Communication for service method present embodiment discloses another kind based on ciphering process, comprising the following steps:
A. encryption server monitors internal server and external server in real time respectively;
B. internal server starting service, and the port respectively serviced provided by it and IP are registered to encryption server;
C. external server sends the port request encrypted by RSA Algorithm to encryption server, and the port request includes required Service name;
D. encryption server decrypts the port request by corresponding to the private key of above-mentioned rsa encryption public key, obtains required service Title searches the required service in registered service, if finding corresponding service, to external server send by The request response of RSA Algorithm encryption, the request response includes the found corresponding port of service and IP information;
E. external server is responded by corresponding to the private key decoding request of above-mentioned rsa encryption public key to obtain the port and IP Information sends the service request encrypted by aes algorithm, the service request packet to corresponding service according to the port and IP information Name information containing external server;
F. the internal server serviced needed for (port and IP information are corresponding) described in providing, by with above-mentioned AES encryption public key Private key decrypt the service request, obtain external server title, whether verify the external server in internal server It is upper to register, if registered, service needed for being provided to external server.
The invention is not limited to specific embodiments above-mentioned.The present invention, which expands to, any in the present specification to be disclosed New feature or any new combination, and disclose any new method or process the step of or any new combination.

Claims (10)

1. a kind of service encryption communication system, including external server, encryption server and inner wall server, encryption server point It Lian Jie external server and internal server, it is characterised in that:
External server is used to send the port request encrypted by the first Encryption Algorithm, the port request packet to encryption server Containing required service name;The request for being also used to receive and decrypt encryption server transmission is responded to obtain port and IP information;Also According to the port and IP information, the service request encrypted by the second Encryption Algorithm, the service request packet are sent to corresponding service Name information containing external server;
Encryption server is for monitoring internal server and external server;It receives and the port for decrypting external server transmission asks It asks, and information checking is carried out to solution confidential information;It is also used to send the first Encryption Algorithm to by the external server of information checking The request of encryption responds, and the request response includes the corresponding port of the required service and IP information;
The port for the service that internal server is used to be provided and IP are registered on encryption server;It is also used to receive simultaneously The service request that external server is sent is decrypted, and Authority Verification is carried out to solution confidential information;It is also used to by Authority Verification External server provides corresponding required service.
2. service encryption communication system as described in claim 1, which is characterized in that the encryption server decrypts port request Obtained solution confidential information are as follows: the service name serviced needed for external server;The information checking are as follows: in registered service The required service is searched, there are registered services if finding, then it represents that information checking passes through, and otherwise, information checking is not Pass through.
3. service encryption communication system as described in claim 1, which is characterized in that the internal server decrypts service request Obtained solution confidential information are as follows: send the external server title of the service request;The Authority Verification are as follows: verify the outside Whether server registered on internal server, if so, Authority Verification passes through, otherwise, Authority Verification does not pass through.
4. the service encryption communication system as described in one of claim 1-3, which is characterized in that first Encryption Algorithm and institute State the second Encryption Algorithm difference.
5. service encryption communication system as claimed in claim 4, which is characterized in that first Encryption Algorithm is rsa encryption One of algorithm or AES encryption algorithm, second Encryption Algorithm are to be different from first in RSA cryptographic algorithms and AES encryption algorithm A kind of Encryption Algorithm of Encryption Algorithm.
6. a kind of communication for service method based on ciphering process, which comprises the following steps:
A. encryption server monitors internal server and external server respectively;
B. internal server starting service, and register to encryption server port and the IP of service provided by it;
C. external server sends the port request encrypted by the first Encryption Algorithm to encryption server, and the port request includes Required service name;
D. encryption server decrypts the port request, and carries out information checking to solution confidential information, after verification passes through, to outside Server is sent to be responded by the request that the first Encryption Algorithm encrypts, and the request response includes the corresponding port of the required service With IP information;
E. the response of external server decoding request is to obtain the port and IP information, according to the port and IP information, to correspondence Service send the service request that encrypt by the second Encryption Algorithm, which includes external server name information;
F. the internal server for providing the service decrypts the service request, carries out Authority Verification to solution confidential information, is verifying By rear, service needed for being provided to external server.
7. the communication for service method based on ciphering process as claimed in claim 6, which is characterized in that in the step D, encryption Server carries out information checking to solution confidential information are as follows: encryption server decrypts the port request, to obtain the required service Title searches the required service in registered service, if finding, there are registered services, then it represents that information checking Pass through, otherwise, information checking does not pass through.
8. the communication for service method based on ciphering process as claimed in claim 6, which is characterized in that in the step F, externally Portion's server carries out Authority Verification are as follows: internal server decrypts the service request, to obtain external server title, verifies institute State whether external server registered on internal server, if so, Authority Verification passes through, otherwise, Authority Verification is obstructed It crosses.
9. the communication for service method based on ciphering process as described in one of claim 6-8, which is characterized in that described first adds Close algorithm is different from second Encryption Algorithm.
10. the communication for service method based on ciphering process as claimed in claim 9, which is characterized in that first encryption is calculated Method is one of RSA cryptographic algorithms or AES encryption algorithm, and second Encryption Algorithm is RSA cryptographic algorithms and AES encryption algorithm In, different from a kind of Encryption Algorithm of the first Encryption Algorithm.
CN201811514956.8A 2018-12-12 2018-12-12 Service encryption system and service communication method based on encryption process Active CN109474615B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811514956.8A CN109474615B (en) 2018-12-12 2018-12-12 Service encryption system and service communication method based on encryption process

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811514956.8A CN109474615B (en) 2018-12-12 2018-12-12 Service encryption system and service communication method based on encryption process

Publications (2)

Publication Number Publication Date
CN109474615A true CN109474615A (en) 2019-03-15
CN109474615B CN109474615B (en) 2021-12-07

Family

ID=65676132

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811514956.8A Active CN109474615B (en) 2018-12-12 2018-12-12 Service encryption system and service communication method based on encryption process

Country Status (1)

Country Link
CN (1) CN109474615B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101662511A (en) * 2009-10-10 2010-03-03 中国电信股份有限公司 Network address distributing method, DHCP server, access system and method thereof
CN101674587A (en) * 2009-10-14 2010-03-17 成都市华为赛门铁克科技有限公司 Method and system for realizing business monitoring and authentication agent server
CN104378457A (en) * 2014-11-26 2015-02-25 中国联合网络通信集团有限公司 Method, device and system for distributing IP address
US20150113610A1 (en) * 2013-06-07 2015-04-23 Tencent Technology (Shenzhen) Company Limited System and method for centralizedly controlling server user rights
CN105376252A (en) * 2015-12-02 2016-03-02 福建星网锐捷网络有限公司 Distributed architecture data communication device, distributed architecture data communication device authentication method and service board
CN108366132A (en) * 2018-03-13 2018-08-03 平安普惠企业管理有限公司 Service management, device, computer equipment between server and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101662511A (en) * 2009-10-10 2010-03-03 中国电信股份有限公司 Network address distributing method, DHCP server, access system and method thereof
CN101674587A (en) * 2009-10-14 2010-03-17 成都市华为赛门铁克科技有限公司 Method and system for realizing business monitoring and authentication agent server
US20150113610A1 (en) * 2013-06-07 2015-04-23 Tencent Technology (Shenzhen) Company Limited System and method for centralizedly controlling server user rights
CN104378457A (en) * 2014-11-26 2015-02-25 中国联合网络通信集团有限公司 Method, device and system for distributing IP address
CN105376252A (en) * 2015-12-02 2016-03-02 福建星网锐捷网络有限公司 Distributed architecture data communication device, distributed architecture data communication device authentication method and service board
CN108366132A (en) * 2018-03-13 2018-08-03 平安普惠企业管理有限公司 Service management, device, computer equipment between server and storage medium

Also Published As

Publication number Publication date
CN109474615B (en) 2021-12-07

Similar Documents

Publication Publication Date Title
US20230269241A1 (en) Secure multi-party protocol
CN109728909B (en) Identity authentication method and system based on USBKey
EP3257227B1 (en) Confidential communication management
US8904178B2 (en) System and method for secure remote access
US8059818B2 (en) Accessing protected data on network storage from multiple devices
CN106357400B (en) Establish the method and system in channel between TBOX terminal and TSP platform
US10594479B2 (en) Method for managing smart home environment, method for joining smart home environment and method for connecting communication session with smart device
CN107105060A (en) A kind of method for realizing electric automobile information security
CN109951513B (en) Quantum-resistant computing smart home quantum cloud storage method and system based on quantum key card
CN108259407B (en) Symmetric encryption method and system based on timestamp
US11316671B2 (en) Accelerated encryption and decryption of files with shared secret and method therefor
JP2009529832A (en) Undiscoverable, ie secure data communication using black data
CN104935553B (en) Unified identity authentication platform and authentication method
CN100580652C (en) Method and device for fiber-optical channel public transmission secret protection
JPH07325785A (en) Network user identifying method, ciphering communication method, application client and server
JP2003188874A (en) System for secure data transmission
CN114282189A (en) Data security storage method, system, client and server
US8356175B2 (en) Methods and apparatus to perform associated security protocol extensions
CN104820807B (en) A kind of intelligent card data processing method
CN106209384A (en) Use the client terminal of security mechanism and the communication authentication method of charging device
CN106972928B (en) Bastion machine private key management method, device and system
CN104915689B (en) A kind of smart card information processing method
CN112035820B (en) Data analysis method used in Kerberos encryption environment
CN104780049B (en) A kind of method of safe read-write data
CN109474615A (en) A kind of service encryption system and the communication for service method based on ciphering process

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant