CN113923031A - Data transmission method, device, equipment and storage medium - Google Patents

Data transmission method, device, equipment and storage medium Download PDF

Info

Publication number
CN113923031A
CN113923031A CN202111186166.3A CN202111186166A CN113923031A CN 113923031 A CN113923031 A CN 113923031A CN 202111186166 A CN202111186166 A CN 202111186166A CN 113923031 A CN113923031 A CN 113923031A
Authority
CN
China
Prior art keywords
data
port
party
transmission
port array
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111186166.3A
Other languages
Chinese (zh)
Inventor
侯俊丞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bigo Technology Singapore Pte Ltd
Original Assignee
Bigo Technology Singapore Pte Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bigo Technology Singapore Pte Ltd filed Critical Bigo Technology Singapore Pte Ltd
Priority to CN202111186166.3A priority Critical patent/CN113923031A/en
Publication of CN113923031A publication Critical patent/CN113923031A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic

Abstract

The embodiment of the invention discloses a method, a device, equipment and a storage medium for data transmission. Wherein, the method comprises the following steps: dynamically updating the data state of each port in the set port array to enable the data state of at least one port in the port array to be a receivable state; and issuing the target port in a receivable state in the port array to a trusted data party, so that the trusted data party utilizes the target port to perform data transmission. According to the technical scheme provided by the embodiment of the invention, a third party attacker is difficult to acquire the target port information in a receivable state in the port array, and the counterfeiting difficulty of data transmission is enhanced, so that the data transmission counterfeited by the third party attacker is accurately prevented, the security of data transmission is further ensured on the basis of simplifying the data transmission structure layout by adopting the port array, and a more efficient anti-counterfeiting attack effect is achieved.

Description

Data transmission method, device, equipment and storage medium
Technical Field
The embodiment of the invention relates to the technical field of data processing, in particular to a data transmission method, a data transmission device, data transmission equipment and a storage medium.
Background
With the rapid development of internet technology, business systems such as merchant systems are developed more and more according to business requirements of a large number of third-party organizations. At this time, when the business system communicates with each third-party mechanism, a communication mechanism corresponding to the asynchronous callback exists, for example, in a payment scenario of the business system, the third-party mechanism sends a corresponding account receipt notification to the business system when payment is successful.
Considering that the service system and the third-party organization usually adopt a public network for communication, the service system provides a network port accessible by the public network to the third-party organization, so that the third-party organization sends a corresponding asynchronous callback notification to the network port. At this time, the attacker may also send the forged asynchronous callback notification to the service system through a network port accessible to the public network, and the service system cannot identify the authenticity of the received asynchronous callback notification.
At present, data transmission is generally performed between a service system and a third-party organization by adopting a digital signature or transmission link binding mode, so as to prevent a false notification attack initiated by an attacker. However, both the service system and the third-party organization need to maintain a reliable key management system for digital signatures, and the binding of transmission links also needs to be maintained in real time, so that the complexity of system layout for anti-counterfeiting attacks by both communication parties is greatly increased, and the keys of the digital signatures are easily leaked or violently broken, thereby reducing the security of data transmission.
Disclosure of Invention
The embodiment of the invention provides a data transmission method, a data transmission device, data transmission equipment and a storage medium, which ensure the safety of data transmission and achieve the effect of more efficient anti-counterfeiting attack on the basis of simplifying the layout of a data transmission structure.
In a first aspect, an embodiment of the present invention provides a method for data transmission, where the method includes:
dynamically updating the data state of each port in the set port array to enable the data state of at least one port in the port array to be a receivable state;
and issuing the target port in a receivable state in the port array to a trusted data party, so that the trusted data party utilizes the target port to perform data transmission.
In a second aspect, an embodiment of the present invention provides an apparatus for data transmission, where the apparatus includes:
the port updating module is used for dynamically updating the data state of each port in the set port array to enable the data state of at least one port in the port array to be a receivable state;
and the data transmission module is used for issuing the target port in the port array in a receivable state to a trusted data party so that the trusted data party utilizes the target port to perform data transmission.
In a third aspect, an embodiment of the present invention provides an electronic device, including:
one or more processors;
storage means for storing one or more programs;
when the one or more programs are executed by the one or more processors, the one or more processors implement the method for data transmission according to any embodiment of the present invention.
In a fourth aspect, the present invention provides a computer-readable storage medium, on which a computer program is stored, where the computer program is executed by a processor to implement the method for data transmission according to any embodiment of the present invention.
The method, the device, the equipment and the storage medium for data transmission provided by the embodiment of the invention can locally set the corresponding port array to receive data sent by other data parties, at the moment, the data state of each port in the set port array is dynamically updated to ensure that the data state of at least one port in the port array is in a receivable state, then a target port in the receivable state in the port array is issued to a trusted data party, so that the trusted data party can utilize the target port to carry out data transmission, at the moment, a third party attacker is difficult to know the information of the target port in the receivable state in the port array, the counterfeiting difficulty of data transmission is enhanced, the data transmission forged by the third party attacker is accurately prevented, and the safety of the data transmission is further ensured on the basis of simplifying the layout of a data transmission structure by adopting the port array, and a more efficient anti-counterfeiting attack effect is achieved.
Drawings
Other features, objects and advantages of the invention will become more apparent upon reading of the detailed description of non-limiting embodiments made with reference to the following drawings:
fig. 1A is a flowchart of a data transmission method according to an embodiment of the present invention;
fig. 1B is a schematic diagram of a data transmission process according to an embodiment of the present invention;
fig. 2A is a flowchart of a data transmission method according to a second embodiment of the present invention;
fig. 2B is a schematic diagram of a data transmission process according to a second embodiment of the present invention;
fig. 3 is a schematic structural diagram of a data transmission apparatus according to a third embodiment of the present invention;
fig. 4 is a schematic structural diagram of an electronic device according to a fourth embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting of the invention. It should be further noted that, for the convenience of description, only some of the structures related to the present invention are shown in the drawings, not all of the structures. In addition, the embodiments and features of the embodiments in the present invention may be combined with each other without conflict.
Example one
Fig. 1A is a flowchart of a data transmission method according to an embodiment of the present invention, which is applicable to a scenario in which a third-party attacker is prevented from attacking a service system by forging information when asynchronous callback data transmission is performed between any service system and a large number of service parties. The method for data transmission provided in this embodiment may be performed by a device for data transmission provided in the embodiment of the present invention, where the device may be implemented in a software and/or hardware manner, and is integrated in an electronic device that executes the method, where the device may be a data sending end that participates in data transmission, and the like.
Specifically, referring to fig. 1A, the method may include the steps of:
s110, dynamically updating the data state of each port in the set port array, and enabling the data state of at least one port in the port array to be a receivable state.
The service system provides network ports accessible to the public network for each service party, and a third party attacker can use the network ports to send forged message notifications to the service system to attack the service system. In order to solve the above problem, this embodiment may set a port array on the service system for receiving the asynchronous callback notification sent by each service party. As shown in fig. 1B, in this embodiment, each port (port) in the port array is correspondingly connected to a receiver, and is responsible for receiving data transmitted by each service party through the port connected to the receiver, so that the port array can form a transmission data receiving matrix.
Specifically, in order to ensure the data transmission security between the service system and each service party, in this embodiment, different data states are respectively configured for each port, where the data states may include a receivable state and a reception refusal state. For the data transmitted by the port in the receivable state in the port array, the service system receives the data and performs corresponding data processing, and for the data transmitted by the port in the refusal receiving state in the port array, the service system directly discards the data as the data forged by a third-party attacker.
In this embodiment, in order to prevent a third-party attacker from stealing a port in a receivable state in a port array and using the port to attack a service system, a data state of each port in the port array is typically dynamically configured, so that the ports in the receivable state and the determined receiving state in the port array are continuously dynamically updated, thereby increasing the difficulty that the port in the receivable state in the port array is stolen by the third-party attacker and improving the anti-counterfeiting strength of the service system for the third-party attacker.
For example, as shown in fig. 1B, the port array in this embodiment is connected to a matrix switch controller, and the matrix switch controller periodically controls the data state of each port in the port array, so that the time length of each port in the port array in the receivable state has a certain validity period, and in this embodiment, the validity period of each port in the port array in the receivable state may be represented by a validity time window, which is denoted as W.
Moreover, in order to ensure normal data transmission between the service system and each trusted service party, in this embodiment, when the data state of each port in the port array is dynamically updated, the data state of at least one port in the port array is in a receivable state, so as to avoid a situation that each port in the port array rejects to receive data, which results in a failure of normal data transmission.
In this embodiment, the number of ports in the port array that can be received at the same time can be usually set to at most two, so as to prevent the port array from being easily stolen by a third-party attacker when the number of ports in the receivable state at the same time is too large.
It should be noted that the port array in this embodiment may be a physical array, such as an antenna array or a wireless receiver, or an array composed of a plurality of different domain name addresses, or an array composed of different network ports, and the like, and the type of the port array is not limited in this embodiment, and includes but is not limited to the types provided above.
As an alternative in this embodiment, when the data state of each port in the port array is dynamically updated, a preset random algorithm may be adopted to dynamically update an available port in the port array, set the data state of the available port to a receivable state, and set the data state of the other ports in the port array except for the available port to a rejection state.
That is to say, in this embodiment, any one preset random algorithm may be adopted, each available port of the port array in the dynamic update period is randomly determined in each dynamic update period, the data state of each available port is set to be a receivable state, the data states of the other ports except the available port in the port array are set to be a rejection state, and then a new available port of the port array in the dynamic update period is continuously determined randomly by the preset random algorithm in the next dynamic update period, so that a cycle is performed, and dynamic update of the data state of each port in the port array is achieved.
Preferably, the random seed in the preset random algorithm may be a systematic white noise, such as but not limited to the following two types: and starting a current high-precision time stamp by the system, or randomly carrying out high-precision time of round-trip delay of certain communication and the like.
And S120, issuing the target port in the receivable state in the port array to the trusted data party, so that the trusted data party utilizes the target port to perform data transmission.
The trusted data party is each service party which has real service data transmission requirements with the service system.
After the data state of each port in the port array is dynamically updated, in order to ensure normal data transmission between the service system and each trusted data party, information of each target port in a receivable state after each dynamic update in the port array is respectively issued to each trusted data party, so that each trusted data party can accurately know the latest target port in the receivable state in the port array of the service system, and each trusted data party can perform data transmission with the service system by using each target port in the receivable state in the port array.
For example, to ensure the security issued by the target port, as shown in fig. 1B, in this embodiment, the service system actively establishes a corresponding one-way Secure encryption channel for each trusted data party, where the one-way Secure encryption channel may be a physical dedicated channel, or may also be a software encrypted virtual channel, for example, a Secure Socket Layer (SSL) Layer of a hypertext Transfer Protocol over Secure Socket Layer (HTTPS) that is targeted for security, or a software virtual encryption communication manner implemented in other similar manners, which is not limited in this embodiment, and only the one-way Secure encryption channel is required to enhance the issuing security of the target port.
At this time, the present embodiment may issue the target port in the receivable state in the port array to each trusted data party through the one-way secure encryption channel established for each trusted data party, so as to prevent the target port from being stolen by a third-party attacker. Moreover, the one-way secure encryption channel does not support each trusted data party to actively transmit data to the service system through the channel, so that a third-party attacker is prevented from actively constructing a corresponding secure encryption channel to the service system to transmit data forged by the third-party attacker, and the attack prevention degree of the service system is enhanced.
In this embodiment, since each trusted data party does not perform data transmission using the port in the denial of reception state in the port array, if the service system detects data received through the port in the denial of reception state, the data can be directly discarded as data forged by a third-party attacker, thereby enhancing the attack difficulty of the third-party attacker on the service system and improving the security of data transmission.
The technical solution provided in this embodiment may locally set a corresponding port array to receive data sent by other data parties, and at this time, by dynamically updating the data state of each port in the set port array, the data state of at least one port in the port array is made to be a receivable state, then the target port in the receivable state in the port array is issued to the trusted data party, so that the trusted data party can utilize the target port to transmit data, at the moment, a third party attacker is difficult to acquire the information of the target port in the receivable state in the port array, the counterfeiting difficulty of data transmission is enhanced, and the data transmission forged by the third party attacker is accurately prevented, on the basis of simplifying the layout of a data transmission structure by adopting a port array, the security of data transmission is further ensured, and a more efficient anti-counterfeiting attack effect is achieved.
Example two
Fig. 2A is a flowchart of a data transmission method according to a second embodiment of the present invention, and fig. 2B is a schematic diagram of a data transmission process according to the second embodiment of the present invention. The embodiment is optimized on the basis of the embodiment. Specifically, as shown in fig. 2B, the present embodiment mainly explains the specific processing procedure of data security transmission in detail.
Optionally, as shown in fig. 2A, the present embodiment may include the following steps:
s210, dynamically updating the data state of each port in the set port array, so that the data state of at least one port in the port array is a receivable state.
And S220, determining a port issuing cycle in the port array according to the port updating cycle of the port array and the data round-trip delay facing the trusted transmission party.
Optionally, considering that a certain data transmission delay exists when a target port in a receivable state is issued to each trusted data party, so as to avoid a problem that a trusted data party continues to use a failed target port before updating to perform data transmission in the data transmission delay after the port array is dynamically updated, and thus data transmission fails, in this embodiment, a data round-trip delay of the service system facing each trusted data party is determined, and then a port update cycle of the port array is correspondingly reduced by using the data round-trip delay of each trusted data party, so as to obtain a port issue cycle in the port array facing each trusted data party, so that the port issue cycle corresponding to each trusted data party can be smaller than the port update cycle of the port array, so that a corresponding target port can be issued to the trusted data party by using the port issue cycle corresponding to each trusted data party later, each trusted data party can timely know the target port in a receivable state after dynamic updating, and therefore the influence of data round-trip delay of each trusted transmission party when target port data is issued is reduced.
For example, if the port update period of the port array is denoted as W, and the round trip delay of a certain trusted data party is denoted as D, it may be determined that the trusted data party issues a period P < ═ W-6D for the port in the port array.
And S230, issuing the target port in the receivable state in the port array to the trusted data party, so that the trusted data party utilizes the target port to perform data transmission.
S240, if the first transmission data is received through other ports in the port array except the target port, recording data source information of the first transmission data in a preset blacklist.
Because the data transmitted by the third-party attacker and the trusted data party can be distinguished by judging whether the port adopted for data transmission is the target port in the receivable state or the port in the refusing receiving state in the port array, the embodiment can also carry out active defense on the third-party attacker.
Specifically, after receiving each transmission data through the port array, the present embodiment determines which port in the port array the transmission data is received by, so as to analyze the source information of the transmission data in the following. At this time, if the first transmission data is received through the other ports in the port array except the target port, it is indicated that the first transmission data is not sent by the trusted data party, and is most likely to be forged by a third party attacker, so that the data source information of the first transmission data is determined, and as shown in fig. 2B, the data source information is recorded in a preset blacklist as the identification information of the third party attacker, so that the preset blacklist is adopted to actively defend the third party attacker.
S250, if second transmission data are received through the target port in the port array, verifying data source information of the second transmission data by adopting a preset blacklist; and if the data source information of the second transmission data is recorded in the preset blacklist, discarding the second transmission data.
Because the third-party attacker may also randomly select the target port in a receivable state to transmit the forged data, when the second transmission data is received through the target port in the port array, the data source information of the second transmission data is also determined, then the data source information of the second transmission data is verified by using the preset blacklist, whether the data source information of the second transmission data is recorded in the preset blacklist is judged, if the data source information of the second transmission data is recorded in the preset blacklist, it is indicated that the second transmission data is also the data forged by the third-party attacker, and therefore the second transmission data is discarded. However, if the data source information of the second transmission data is not recorded in the preset blacklist, which indicates that the second transmission data is not forged by a third-party attacker, the second transmission data is used as data sent by a trusted data party to perform corresponding data processing.
S260, if the second transmission data is received through the target port in the port array, the second transmission data is verified by adopting a defined data anti-counterfeiting algorithm.
Optionally, in view of the fact that the attack difficulty of a third-party attacker on the service system is increased by dynamically updating the data state of each port in the port array in this embodiment, the method belongs to an improvement on a data transmission structure of the port array in the service system, and does not process actual transmission data itself, so that the trusted data party sends second transmission data to the service system through a target port in the port array to realize data security transmission, and performs security encryption processing on the sent second transmission data by using a defined data anti-counterfeiting algorithm, so that after the service system receives the second transmission data through the target port in the port array, the service system can further perform authenticity verification on the second transmission data by using the data anti-counterfeiting algorithm, and further improve the security of data transmission.
It should be noted that the data anti-counterfeiting algorithm in this embodiment may be a message anti-counterfeiting manner such as digital signature, information source binding, and the like. For example, the trusted data party needs to perform secure encryption processing on the second transmission data by using a digital signature technology to avoid tampering; then, after receiving the second transmission data through the port array, the service system needs to check whether the port where the second transmission data is located is legal or not, and further checks whether the signature of the second transmission data is correct or not on the basis that the applicable port is legal, thereby ensuring that the second transmission data is doubly and safely transmitted.
According to the technical scheme provided by the embodiment, for the first transmission data received by other ports except the target port in the port array, the data source information of the first transmission data is recorded in the preset blacklist, so that the preset blacklist is adopted to actively defend the data forged by the third-party attacker, the security of data transmission is further ensured, and the effect of more efficiently preventing the forging attack is achieved.
EXAMPLE III
Fig. 3 is a schematic structural diagram of a data transmission apparatus according to a third embodiment of the present invention, specifically, as shown in fig. 3, the apparatus may include:
a port update module 310, configured to dynamically update a data state of each port in a set port array, so that the data state of at least one port in the port array is a receivable state;
the data transmission module 320 is configured to issue a target port in a receivable state in the port array to a trusted data party, so that the trusted data party performs data transmission by using the target port.
The technical solution provided in this embodiment may locally set a corresponding port array to receive data sent by other data parties, and at this time, by dynamically updating the data state of each port in the set port array, the data state of at least one port in the port array is made to be a receivable state, then the target port in the receivable state in the port array is issued to the trusted data party, so that the trusted data party can utilize the target port to transmit data, at the moment, a third party attacker is difficult to acquire the information of the target port in the receivable state in the port array, the counterfeiting difficulty of data transmission is enhanced, and the data transmission forged by the third party attacker is accurately prevented, on the basis of simplifying the layout of a data transmission structure by adopting a port array, the security of data transmission is further ensured, and a more efficient anti-counterfeiting attack effect is achieved.
The data transmission device provided by the embodiment can be applied to the data transmission method provided by any embodiment, and has corresponding functions and beneficial effects.
Example four
Fig. 4 is a schematic structural diagram of an electronic device according to a fourth embodiment of the present invention, as shown in fig. 4, the electronic device includes a processor 40, a storage device 41, and a communication device 42; the number of the processors 40 in the electronic device may be one or more, and one processor 40 is taken as an example in fig. 4; the processor 40, the storage means 41 and the communication means 42 in the electronic device may be connected by a bus or other means, and fig. 4 illustrates the connection by a bus as an example.
The electronic device provided by this embodiment can be used to execute the data transmission method provided by any of the above embodiments, and has corresponding functions and advantages.
EXAMPLE five
Fifth, an embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, can implement the method for data transmission in any of the above embodiments.
Of course, the storage medium provided by the embodiment of the present invention contains computer-executable instructions, and the computer-executable instructions are not limited to the method operations described above, and may also perform related operations in the method for data transmission provided by any embodiment of the present invention.
From the above description of the embodiments, it is obvious for those skilled in the art that the present invention can be implemented by software and necessary general hardware, and certainly, can also be implemented by hardware, but the former is a better embodiment in many cases. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which can be stored in a computer-readable storage medium, such as a floppy disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a FLASH Memory (FLASH), a hard disk or an optical disk of a computer, and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device) to execute the methods according to the embodiments of the present invention.
It should be noted that, in the embodiment of the data transmission apparatus, the included units and modules are only divided according to functional logic, but are not limited to the above division as long as the corresponding functions can be implemented; in addition, specific names of the functional units are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present invention.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A method of data transmission, comprising:
dynamically updating the data state of each port in the set port array to enable the data state of at least one port in the port array to be a receivable state;
and issuing the target port in a receivable state in the port array to a trusted data party, so that the trusted data party utilizes the target port to perform data transmission.
2. The method of claim 1, wherein issuing the target port in the port array in a receivable state to a trusted data party comprises:
and issuing a target port in a receivable state in the port array to the trusted data party through a one-way secure encryption channel established for the trusted data party.
3. The method of claim 1, further comprising, before issuing the target port in the port array that is in a receivable state to the trusted data party:
and determining a port issuing period in the port array according to the port updating period of the port array and the data round-trip delay facing the trusted transmission party.
4. The method of claim 1, further comprising:
and if first transmission data are received through other ports except the target port in the port array, recording data source information of the first transmission data in a preset blacklist.
5. The method of claim 4, wherein after issuing the target port in the port array in the receivable state to the trusted data party, further comprising:
if second transmission data are received through a target port in the port array, verifying data source information of the second transmission data by adopting the preset blacklist;
and if the data source information of the second transmission data is recorded in the preset blacklist, discarding the second transmission data.
6. The method of claim 1, wherein after issuing the target port in the port array in the receivable state to the trusted data party, further comprising:
and if second transmission data are received through the target ports in the port array, verifying the second transmission data by adopting a defined data anti-counterfeiting algorithm.
7. The method of claim 1, wherein dynamically updating the data state of each port in the configured port array comprises:
and dynamically updating the available ports in the port array by adopting a preset random algorithm, setting the data state of the available ports to be a receivable state, and setting the data states of other ports except the available ports in the port array to be a refusing receiving state.
8. An apparatus for data transmission, comprising:
the port updating module is used for dynamically updating the data state of each port in the set port array to enable the data state of at least one port in the port array to be a receivable state;
and the data transmission module is used for issuing the target port in the port array in a receivable state to a trusted data party so that the trusted data party utilizes the target port to perform data transmission.
9. An electronic device, characterized in that the electronic device comprises:
one or more processors;
storage means for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement a method of data transmission as claimed in any one of claims 1-7.
10. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method of data transmission according to any one of claims 1 to 7.
CN202111186166.3A 2021-10-12 2021-10-12 Data transmission method, device, equipment and storage medium Pending CN113923031A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111186166.3A CN113923031A (en) 2021-10-12 2021-10-12 Data transmission method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111186166.3A CN113923031A (en) 2021-10-12 2021-10-12 Data transmission method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN113923031A true CN113923031A (en) 2022-01-11

Family

ID=79239579

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111186166.3A Pending CN113923031A (en) 2021-10-12 2021-10-12 Data transmission method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113923031A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103414597A (en) * 2013-08-30 2013-11-27 上海寰创通信科技股份有限公司 Status updating system and status updating method of logical ports
CN105682146A (en) * 2016-01-08 2016-06-15 努比亚技术有限公司 Data transmission method and device and user equipment
CN110365538A (en) * 2019-07-18 2019-10-22 北京百度网讯科技有限公司 Port status control method, device, equipment and computer readable storage medium
CN110569163A (en) * 2019-07-24 2019-12-13 无锡华云数据技术服务有限公司 method, device, equipment and medium for monitoring health state of cloud host in telescopic group
CN110874297A (en) * 2019-11-15 2020-03-10 江苏芯盛智能科技有限公司 Data access method, device and host
CN111464395A (en) * 2020-03-31 2020-07-28 腾讯科技(深圳)有限公司 Method and device for creating block chain and readable storage medium
US10812988B1 (en) * 2019-06-18 2020-10-20 Verizon Patent And Licensing Inc. Method and device for mapping ports of a network device
CN112995316A (en) * 2021-02-25 2021-06-18 深信服科技股份有限公司 Data processing method and device, electronic equipment and storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103414597A (en) * 2013-08-30 2013-11-27 上海寰创通信科技股份有限公司 Status updating system and status updating method of logical ports
CN105682146A (en) * 2016-01-08 2016-06-15 努比亚技术有限公司 Data transmission method and device and user equipment
US10812988B1 (en) * 2019-06-18 2020-10-20 Verizon Patent And Licensing Inc. Method and device for mapping ports of a network device
CN110365538A (en) * 2019-07-18 2019-10-22 北京百度网讯科技有限公司 Port status control method, device, equipment and computer readable storage medium
CN110569163A (en) * 2019-07-24 2019-12-13 无锡华云数据技术服务有限公司 method, device, equipment and medium for monitoring health state of cloud host in telescopic group
CN110874297A (en) * 2019-11-15 2020-03-10 江苏芯盛智能科技有限公司 Data access method, device and host
CN111464395A (en) * 2020-03-31 2020-07-28 腾讯科技(深圳)有限公司 Method and device for creating block chain and readable storage medium
CN112995316A (en) * 2021-02-25 2021-06-18 深信服科技股份有限公司 Data processing method and device, electronic equipment and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
闵高阳: "基于标识的可控传输机制研究", 《中国优秀硕士论文全文数据库》, pages 25 *

Similar Documents

Publication Publication Date Title
US10903986B2 (en) Cryptographic key management for end-to-end communication security
US11271727B2 (en) End-to-end communication security
EP3879784A1 (en) Client authentication and access token ownership validation
US8856525B2 (en) Authentication of email servers and personal computers
US20010042200A1 (en) Methods and systems for defeating TCP SYN flooding attacks
US20200366479A1 (en) Communication device and method using message history-based security key by means of blockchain
US9490986B2 (en) Authenticating a node in a communication network
US11757911B2 (en) Method and system for providing security on in-vehicle network
CN101404576A (en) Network resource query method and system
CN112994892A (en) Cross-chain interaction method, device and system and electronic equipment
CN112968910B (en) Replay attack prevention method and device
CN110852745A (en) Block chain distributed dynamic network key automatic updating method
US10122755B2 (en) Method and apparatus for detecting that an attacker has sent one or more messages to a receiver node
CN111245778B (en) Method and system for providing a workload proving concept in a vehicle and vehicle
US20120167212A1 (en) Methods for inspecting security certificates by network security devices to detect and prevent the use of invalid certificates
CN113301028B (en) Gateway protection method and data labeling method
CN113612616A (en) Vehicle communication method and device based on block chain
CN111756698A (en) Message transmission method, device, equipment and computer readable storage medium
CN113923031A (en) Data transmission method, device, equipment and storage medium
KR20200020515A (en) Controller area network system and message authentication method
CN114697088A (en) Method and device for determining network attack and electronic equipment
WO2020246989A1 (en) Cryptographic key management for end-to-end communication security
CN113922953B (en) Data processing method and device
US20150319188A1 (en) Canonical Network Isolator Component
CN116094755A (en) Bidirectional identity authentication method, first electronic device and second electronic device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination