WO2016111407A1 - 단말 세션의 복원 기능을 구비한 네트워크 통신 방법 - Google Patents
단말 세션의 복원 기능을 구비한 네트워크 통신 방법 Download PDFInfo
- Publication number
- WO2016111407A1 WO2016111407A1 PCT/KR2015/000615 KR2015000615W WO2016111407A1 WO 2016111407 A1 WO2016111407 A1 WO 2016111407A1 KR 2015000615 W KR2015000615 W KR 2015000615W WO 2016111407 A1 WO2016111407 A1 WO 2016111407A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- server
- client
- serial number
- message
- transmission data
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/12—Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/062—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying encryption of the keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/168—Implementing security features at a particular protocol layer above the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/141—Setup of application sessions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/143—Termination or inactivation of sessions, e.g. event-controlled end of session
- H04L67/145—Termination or inactivation of sessions, e.g. event-controlled end of session avoiding end of session, e.g. keep-alive, heartbeats, resumption message or wake-up for inactive or interrupted session
Definitions
- the present invention relates to a network communication method having a terminal session restoration function. More particularly, the present invention relates to a network communication method using a serial number indicating a data transmission order and a credential for distinguishing access terminals in a network environment between a server and a client. Even when a disconnection occurs, the present invention relates to a network communication method having a restoration function of a terminal session capable of automatically restoring a connection in a short time without a user being aware of the disconnection.
- an object of the present invention is to use a credential that can distinguish the access terminal in the network environment between the server and the client when the connection between the server and the client is disconnected
- Another object of the present invention is to provide a network communication method having a restoration function of a terminal session capable of automatically recognizing the terminal and restoring a connection without a separate authentication process of the reconnected terminal.
- the present invention provides a serial number indicating the order of data transmitted in the network environment between the server and the client to retransmit the missing data when the connection between the server and the client is disconnected, thereby restoring the terminal session that can prevent data loss It is to provide a network communication method having a function.
- the present invention is to provide a network communication method having a terminal session restoration function that allows the user to transfer the terminal connection to another server in a similar manner as the reconnection recovery process.
- the present invention comprises the steps of: (A) the server and the client is network-connected to share a symmetric key; (B) generating and sharing credentials with the client to enable the server to identify the client through random number generation; (C) generating, by the client, transmission data including a serial number indicating a sequence number of transmission data and transmitting a message to the server; And (D) the server generating transmission data including a serial number indicating the sequence number of transmission data and transmitting a message to the client.
- step (B) (B1) generating a random number in the server, and storing the generated random number block as the credentials of the client; And (B2) encrypting the credentials with a shared symmetric key and transmitting the credentials to the client to share the credentials.
- the (C) step includes: (C1) generating a packet for a message to be transmitted from the client; (C2) assigning a serial number to each generated packet to generate transmission data to which the serial number is assigned; And (C3) after transmitting the transmission data to the server, counting a serial number.
- the (D) step may include: (D1) generating a packet for a message to be transmitted from the server; (D2) generating a serial number assigned transmission data by assigning a serial number to each generated packet; And (D3) after transmitting the transmission data to the client, counting a serial number.
- the serial number may be set in a message unit.
- serial number may be set separately by packet unit.
- the (F) step includes: (F1) the server identifying a client having a matching credential by comparing the credentials received from the client with stored credentials; (F2) confirming the serial number of the last transmission data received before the termination of the connection from the confirmed client and transmitting the serial number to the client; And (F3) the client receiving the final serial number retransmits unreceived transmission data to the server.
- the step (F) may include: (F1) the server checking a client having a matching credential by comparing the credentials received from the client with stored credentials; (F2) the client confirming the serial number of the last transmission data received before the connection is interrupted from the server and transmitting to the server; And (F3) the server receiving the final serial number retransmitting unreceived transmission data to the client.
- the server communicating with the client transmits a session transfer message to transfer the session to the second server; (e) the second server sending a confirmation message to the server; (f) the server sending a connection server change message to the client to change the connection server to the second server; (g) after the client connects to the second server, sharing a new symmetric key with the second server; (h) the client transmitting the stored credentials to the second server; (i) performing a message transmission / reception synchronization in which the client shares the missing message with the second server in a state prior to disconnection with the server; And (j) performing a message transmission / reception between the client and the second server having completed message transmission / reception synchronization.
- the session transfer message includes a credential and a serial number.
- the step (i) may include: (i1) checking whether the second server is a client transferred to the connected client by comparing the credentials received from the client with the credentials received from the server; ; (i2) sending, to the client, the serial number of the last transmission data transmitted from the server, to the client for which the transfer was confirmed; And (i3) the client receiving the final serial number retransmitting unreceived transmission data to the second server.
- step (i1) checking whether the second server is a client transferred to a connected client by comparing the credentials received from the client with the credentials received from the server; (i2) the client confirming the transfer, transmitting a serial number of the last transmission data transmitted to the second server; And (i3) retransmitting unreceived transmission data to the client by the second server having received the last serial number.
- the connection between the server and the client is disconnected by using the credentials that can distinguish the access terminal in the network environment between the server and the client, it is possible to automatically restore the connection without a separate authentication process of the reconnected terminal have.
- the user when the network connection is restored after the network disconnection between the server and the client, the user can restore the connection without recognizing the disconnection.
- the user when the user accesses the terminal of the distributed server system using the reconnection recovery process, the user can restore the connection without recognizing the disconnection. There is.
- 1 is a flow chart of the steps of performing a message transfer according to the prior art.
- FIG. 2 is a block diagram illustrating a network communication system having a restoration function of a terminal session according to the present invention.
- FIG. 3 is a data flow diagram illustrating a connection and data transmission process between a client and a server in a network communication method according to the present invention.
- Figure 4 is a flow chart illustrating in detail the credential sharing method according to the present invention.
- FIG. 5 is a flowchart illustrating a message transmission and reception method according to the present invention in detail.
- FIG. 6 is a data flow diagram illustrating a connection restoration process of a client and a server in a network communication method according to the present invention.
- FIG. 7 is a flowchart illustrating in detail a message transmission and reception synchronization method according to the present invention.
- FIG. 8 is a data flow diagram illustrating a client session transfer process of a server in a network communication method according to the present invention.
- the present invention provides a method comprising: (A) a server and a client connected to a network to share a symmetric key; (B) generating and sharing credentials with the client to enable the server to identify the client through random number generation; (C) generating, by the client, transmission data including a serial number indicating a sequence number of transmission data and transmitting a message to the server; And (D) the server generating transmission data including a serial number indicating the sequence number of transmission data and transmitting a message to the client.
- a network communication system having a restoration function of a terminal session includes a server 100 and a client 200.
- the server 100 may be configured as a distributed server including a plurality of divided servers 100.
- the client 200 refers to a plurality of clients 200 connected to the server 100.
- the client 200 accesses the distributed server system, when excessive traffic occurs in a specific server 100 channel, the client 200 may need to transfer to another server 100 and reconnect.
- such a distributed server system is particularly utilized in game servers, for example, the client 200 is the same game as other clients 200 connected to the server 100 via the server 100 It also executes and exchanges data with each other.
- FIG. 3 is a data flow diagram illustrating a connection and data transfer process between a client and a server in the network communication method according to the present invention.
- FIG. 4 is a flowchart illustrating the credential sharing method according to the present invention in detail.
- the connection between the client and the server and the data transmission process are started by requesting a TCP connection from the client 200 to the server 100 (S110).
- server 100 and the client 200 are connected, and the server 100 and the client 200 share a symmetric key with each other through SSH or other encryption process (S120).
- the client 200 when the public key of the server 100 is transmitted to the client 200, the client 200 generates a symmetric key using the private key, and the public key received from the server 100.
- the symmetric key is encrypted and transmitted to the server 100.
- the server 100 decrypts the private key with its own to obtain the symmetric key.
- the method of sharing the symmetric key between the server 100 and the client 200 may be applied by various publicly disclosed encryption techniques, which will not be described in detail herein.
- the server 100 After sharing the symmetric key, the server 100 generates a credential and transmits to the client 200 (S130).
- the credential means that it is used as an identification notation for distinguishing each of the clients 200 connected to the random number data block of 2 bytes or more.
- a random number having a predetermined length is generated in the server 100, and the generated random number block is designated as the credential of the corresponding client 200 (S131).
- the server 100 encrypts the generated credentials with a symmetric key (S132), transmits them to the client 200 (S133), and stores the credentials (S137).
- the client 200 When the client 200 receives the encrypted credentials (S134), the client 200 decrypts them with a shared symmetric key (S135) and stores the credentials (S136).
- the client 200 and the server 100 share the credentials for recognizing each client 200.
- message transmission and reception between the server 100 and the client 200 is performed by a normal message transmission / reception method (S140).
- S140 message transmission and reception method
- a transmission data packet including a serial number is generated, which will be described in detail with reference to FIG. 5.
- the client 200 to transmit a message generates a data packet by dividing the corresponding message into transmission / reception units according to a communication protocol (S141).
- the data packet includes a sequence number indicating the construction order of the packet.
- serial data is assigned to each packet to generate transmission data (S143).
- the serial number is a serial number for indicating the sequence number of the transmitted data, may be composed of a serial number for separating the message unit, or may be composed of a serial number indicating a number for each individual packet transmitted.
- the serial number when the serial number is set in a message unit, the serial number is all assigned to the packet for the first message, and the serial number is all assigned to the packet for the second message.
- serial number is set to the serial number for each individual packet, sequential numbers are assigned to all packets communicated after connection regardless of the message order.
- the transmission data including the serial number is transmitted to the server 100 (S145), the server 100 receives and processes the transmission data (S149).
- the client 200 counts the serial number together with the transmission data transmission (S147).
- the serial number indicates the sequence number of the message unit
- the serial number is counted by the message unit
- the serial number is the sequence number of the transmitted packet unit
- the server 100 transmits an acknowledgment message (ack knowledge message) to the client 200 confirming the last received message every set time (S150).
- the client 200 may check the message number received by the server 100 at the time of transmitting the confirmation message.
- the message is transmitted not only from the client 200 to the server 100, but also from the server 100 to the client 200.
- the serial number is assigned to the message transmitted from the server 100 to the client 200 and transmitted.
- the serial number is a serial number for indicating the sequence number of the transmitted data, may be composed of a serial number for distinguishing a message unit, or may be composed of a serial number indicating a number for each individual packet transmitted. Is as described above.
- the server 100 when the server 100 also transmits the transmission data, the serial number is counted, and the client 200 transmits to the server 100 an acknowledgment message (ack knowledge message) confirming the last received message every set time.
- the server 100 also transmits the transmission data
- the serial number is counted, and the client 200 transmits to the server 100 an acknowledgment message (ack knowledge message) confirming the last received message every set time.
- the server 100 may check the message number received by the client 200 at the time of transmitting the confirmation message.
- the message transmission process S140 and the confirmation message transmission process S150 are continuously performed while the connection between the client 200 and the server 100 is maintained.
- the client 200 requests the TCP 100 to the server 100 again (S210).
- the client 200 receives a response message for a specific time. If not, the connection is considered disconnected.
- the client 200 may not know exactly what transmission data the server 100 has received.
- the server 100 and the client 200 share a new symmetric key in the same manner as in the aforementioned step 120 (S220).
- the client 200 encrypts the credentials stored with the new symmetric key and transmits the credentials to the server 100 (S230).
- the server 100 checks the received credentials to perform a message transmission and reception synchronization process (S240).
- the message transmission and reception synchronization process refers to a process of restoring a connection by synchronizing the transmitted data and the received data to a point before the connection between the client 200 and the server 100 is disconnected. It will be described in detail with reference to.
- the message transmission and reception synchronization method starts with receiving the credentials from the client 200 in the server 100 (S241).
- the server 100 compares the received credential with the stored credential, and if there is the same credential among the stored credential, checks that the server 200 is the client 200 which has been previously connected (S242).
- the client 200 retransmits unreceived transmission data after the last serial number (S246).
- the server 100 receives the unreceived transmission data (S247), the synchronization process is completed, through which the connection between the client 200 and the server 100 is restored.
- the client 200 of the last transmission data of the transmission data received until the disconnection from the server 100
- the serial number is checked and the final serial number confirmed is transmitted to the server 100, and the server 100 performs the same processes of retransmitting unreceived transmission data to the client 200.
- the message transmission process S250 and the confirmation message transmission process S260 are performed in the same manner as in the above-described steps 140 to 150.
- the client 200 can be automatically reconnected using the credentials without additional approval process when reconnecting after disconnection, and retransmits unreceived data to prevent data loss. can do.
- the user side of the client 200 has an effect that can be reconnected even if the connection interruption and restoration process is not recognized.
- the present invention exhibiting such an effect can also be utilized to transfer a session on a distributed server.
- the process of disconnecting and reconnecting to another server 100 had to be performed separately.
- the session may be transferred to a state not recognized by the user. It can be effective.
- the client session transfer process of the server according to the present invention starts while the client and the server are connected to perform a message transmission and reception process (S320).
- the server transmits a session transfer message to the server 2 to transfer the client's session ( S330).
- the session transfer message includes a serial number included in the last transmission data received from the client, and a credential shared with the client.
- the session transfer message may further include received messages since the last message sent by the server and the client-specific user-defined data.
- the server 2 receiving the session transfer message transmits a confirmation message that the session transfer message has been received to the server (S340).
- the server transmits an access server change message to change the access server to the server 2 to the client (S350).
- the client receiving the access server change message releases the TCP connection with the server (S360).
- the server 2 compares the received credentials with the credentials received from the server, and the credentials received from the server. If the same as, and confirms that the client is transferred from the server and performs a message transmission and reception synchronization process to restore the connection (S400).
- the message transmission process S410 and the confirmation message transmission process S420 are performed in the same manner as in the above-described steps 140 to 150.
- the present invention relates to a network communication method having a terminal session restoration function. More particularly, the present invention relates to a network communication method using a serial number indicating a data transmission order and a credential for distinguishing access terminals in a network environment between a server and a client.
- the present invention relates to a network communication method having a terminal session restoration function capable of automatically restoring a connection in a short time without a user being aware of the disconnection even when a disconnection occurs.
- the connection between the server and the client is disconnected by using the credentials that can distinguish the access terminals in the network environment, the connection can be automatically restored without a separate authentication process of the reconnected terminal.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer And Data Communications (AREA)
- Communication Control (AREA)
Abstract
Description
Claims (13)
- (A) 서버와 클라이언트가 네트워크 접속되어 대칭키를 공유하는 단계와;(B) 상기 서버가 난수 생성을 통해 클라이언트를 식별할 수 있도록 하는 크리덴셜을 생성하여 상기 클라이언트와 공유하는 단계와;(C) 상기 클라이언트가 송신 데이터의 순번을 나타내는 시리얼 넘버가 포함된 송신 데이터를 생성하여 상기 서버에 메시지를 전송하는 단계; 그리고(D) 상기 서버가 송신 데이터의 순번을 나타내는 시리얼 넘버가 포함된 송신 데이터를 생성하여 상기 클라이언트에 메시지를 전송하는 단계를 포함하여 수행됨을 특징으로 하는 단말 세션의 복원 기능을 구비한 네트워크 통신 방법.
- 제 1 항에 있어서,상기 제 (B) 단계는,(B1) 상기 서버에서 난수를 생성하고, 생성된 난수 블록을 해당 클라이언트의 크리덴셜로 저장하는 단계; 그리고(B2) 상기 크리덴셜을 공유된 대칭키로 암호화하여 상기 클라이언트로 전송하여 상기 크리덴셜을 공유하는 단계를 포함하여 수행됨을 특징으로 하는 단말 세션의 복원 기능을 구비한 네트워크 통신 방법.
- 제 2 항에 있어서,상기 제 (C) 단계는,(C1) 상기 클라이언트에서 전송할 메시지에 대하여 패킷을 생성하는 단계와;(C2) 생성된 각각의 패킷에 대하여 시리얼 넘버를 부여하여 상기 시리얼 넘버가 부여된 송신 데이터를 생성하는 단계; 그리고(C3) 상기 송신 데이터를 서버에 송신한 후, 시리얼 넘버를 카운팅하는 단계를 포함하여 수행됨을 특징으로 하는 단말 세션의 복원 기능을 구비한 네트워크 통신 방법.
- 제 2 항에 있어서,상기 제 (D) 단계는,(D1) 상기 서버에서 전송할 메시지에 대하여 패킷을 생성하는 단계와;(D2) 생성된 각각의 패킷에 대하여 시리얼 넘버를 부여하여 상기 시리얼 넘버가 부여된 송신 데이터를 생성하는 단계; 그리고(D3) 상기 송신 데이터를 클라이언트에 송신한 후, 시리얼 넘버를 카운팅하는 단계를 포함하여 수행됨을 특징으로 하는 단말 세션의 복원 기능을 구비한 네트워크 통신 방법.
- 제 3 항 내지 제 4 항에 있어서,상기 시리얼 넘버는 메시지 단위로 구분되어 설정됨을 특징으로 하는 단말 세션의 복원 기능을 구비한 네트워크 통신 방법.
- 제 3 항 내지 제 4 항에 있어서,상기 시리얼 넘버는 패킷 단위로 구분되어 설정됨을 특징으로 하는 단말 세션의 복원 기능을 구비한 네트워크 통신 방법.
- 제 1 항에 있어서,(D) 서버와 클라이언트의 접속이 중단된 후, 상기 클라이언트가 상기 서버에 재접속되어 새 대칭키를 공유하는 단계와;(E) 상기 클라이언트가 저장된 크리덴셜을 상기 서버로 전송하는 단계와;(F) 상기 클라이언트와 상기 서버가 접속 중단 이전 상태로 누락된 메시지를 공유하는 메시지 송수신 동기화를 수행하는 단계; 그리고(G) 메시지 송수신 동기화가 완료된 상기 클라이언트와 상기 서버가 메시지 송수신을 수행하는 단계를 더 포함하여 수행됨을 특징으로 하는 단말 세션의 복원 기능을 구비한 네트워크 통신 방법.
- 제 7 항에 있어서,상기 제 (F) 단계는,(F1) 상기 서버가 상기 클라이언트로부터 수신된 크리덴셜을 저장된 크리덴셜들과 비교하여 일치하는 크리덴셜의 클라이언트를 확인하는 단계와;(F2) 확인된 클라이언트로부터 접속 중단 이전에 수신된 최종 송신 데이터의 시리얼 넘버를 확인하여 상기 클라이언트로 송신하는 단계; 그리고(F3) 상기 최종 시리얼 넘버를 수신한 상기 클라이언트가 미수신 송신 데이터를 상기 서버로 재송신하는 단계를 포함하여 수행됨을 특징으로 하는 단말 세션의 복원 기능을 구비한 네트워크 통신 방법.
- 제 7 항에 있어서,상기 제 (F) 단계는,(F1) 상기 서버가 상기 클라이언트로부터 수신된 크리덴셜을 저장된 크리덴셜들과 비교하여 일치하는 크리덴셜의 클라이언트를 확인하는 단계와;(F2) 클라이언트가 서버로부터 접속 중단 이전에 수신된 최종 송신 데이터의 시리얼 넘버를 확인하여 상기 서버로 송신하는 단계; 그리고(F3) 상기 최종 시리얼 넘버를 수신한 상기 서버가 미수신 송신 데이터를 상기 클라이언트로 재송신하는 단계를 포함하여 수행됨을 특징으로 하는 단말 세션의 복원 기능을 구비한 네트워크 통신 방법.
- 제 1 항에 있어서,(d) 클라이언트와 통신하던 서버가 제 2서버로 세션을 양도하겠다는 세션 양도 메시지를 전송하는 단계와;(e) 상기 제 2서버가 확인 메시지를 상기 서버로 전송하는 단계와;(f) 상기 서버가 상기 클라이언트에 상기 제 2서버로 접속 서버를 변경하라는 접속 서버 변경 메시지를 전송하는 단계와;(g) 상기 클라이언트가 상기 제 2서버에 접속한 후, 상기 제 2서버와 새 대칭키를 공유하는 단계와;(h) 상기 클라이언트가 저장된 크리덴셜을 상기 제 2서버로 전송하는 단계와;(i) 상기 클라이언트가 상기 서버와 접속 단절 이전 상태로 누락된 메시지를 상기 제 2서버와 공유하는 메시지 송수신 동기화를 수행하는 단계; 그리고(j) 메시지 송수신 동기화가 완료된 상기 클라이언트와 상기 제 2서버가 메시지 송수신을 수행하는 단계를 더 포함하여 수행됨을 특징으로 하는 단말 세션의 복원 기능을 구비한 네트워크 통신 방법.
- 제 10 항에 있어서,상기 세션 양도 메시지에는 크리덴셜과 시리얼 넘버를 포함하여 구성됨을 특징으로 하는 단말 세션의 복원 기능을 구비한 네트워크 통신 방법.
- 제 10 항에 있어서,상기 제 (i) 단계는,(i1) 상기 제 2서버가 상기 클라이언트로부터 수신된 크리덴셜을 상기 서버로부터 수신받은 크리덴셜과 비교하여 접속된 클라이언트에 양도된 클라이언트인지 여부를 확인하는 단계와;(i2) 양도가 확인된 클라이언트에 대하여, 상기 서버로부터 전송된 최종 송신 데이터의 시리얼 넘버를 상기 클라이언트로 송신하는 단계; 그리고(i3) 상기 최종 시리얼 넘버를 수신한 상기 클라이언트가 미수신 송신 데이터를 상기 제 2서버로 재송신하는 단계를 포함하여 수행됨을 특징으로 하는 단말 세션의 복원 기능을 구비한 네트워크 통신 방법.
- 제 10 항에 있어서,상기 제 (i) 단계는,(i1) 상기 제 2서버가 상기 클라이언트로부터 수신된 크리덴셜을 상기 서버로부터 수신받은 크리덴셜과 비교하여 접속된 클라이언트에 양도된 클라이언트인지 여부를 확인하는 단계와;(i2) 양도가 확인된 상기 클라이언트가 전송된 최종 송신 데이터의 시리얼 넘버를 제 2서버로 송신하는 단계; 그리고(i3) 상기 최종 시리얼 넘버를 수신한 상기 제 2서버가 미수신 송신 데이터를 상기 클라이언트로 재송신하는 단계를 포함하여 수행됨을 특징으로 하는 단말 세션의 복원 기능을 구비한 네트워크 통신 방법.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/541,482 US10630479B2 (en) | 2015-01-08 | 2015-01-21 | Network communication method having function of recovering terminal session |
CN201580072436.4A CN107113178A (zh) | 2015-01-08 | 2015-01-21 | 具有终端会话恢复功能的网络通信方法 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150002614A KR101627256B1 (ko) | 2015-01-08 | 2015-01-08 | 다수 분산서버를 구비한 네트워크 통신의 세션 이양 방법 |
KR10-2015-0002614 | 2015-01-08 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2016111407A1 true WO2016111407A1 (ko) | 2016-07-14 |
Family
ID=56192564
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2015/000615 WO2016111407A1 (ko) | 2015-01-08 | 2015-01-21 | 단말 세션의 복원 기능을 구비한 네트워크 통신 방법 |
Country Status (4)
Country | Link |
---|---|
US (1) | US10630479B2 (ko) |
KR (1) | KR101627256B1 (ko) |
CN (1) | CN107113178A (ko) |
WO (1) | WO2016111407A1 (ko) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU2018354129B2 (en) * | 2017-10-23 | 2023-11-23 | Notarize, Inc. | System and method for automated online notarization meeting recovery |
TW202019189A (zh) * | 2018-11-05 | 2020-05-16 | 財團法人資訊工業策進會 | 用於裝置連線之雲端平台及裝置連線方法 |
JP7335966B2 (ja) | 2019-02-05 | 2023-08-30 | カーサシステムズ インコーポレイテッド | ネットワーク関連付け情報を回復するための方法及び装置 |
CN110568996A (zh) * | 2019-09-05 | 2019-12-13 | 蒋昊坤 | 基于设备驱动程序的本地存储容量扩充系统 |
US20240202676A1 (en) * | 2021-04-16 | 2024-06-20 | Digital Currency Institute, The People's Bank Of China | Digital Currency Payment Method and Electronic Device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20060120035A (ko) * | 2003-10-10 | 2006-11-24 | 사이트릭스 시스템스, 인크. | 신뢰성 높고 지속적인 통신 세션들을 통한 클라이언트 자동재연결 |
KR20100133882A (ko) * | 2009-06-12 | 2010-12-22 | 엘지전자 주식회사 | CPM 세션에서 이산 미디어 타입(discrete media type)의 메시지 전달 순서를 지키는 방법 및 장치 |
KR20130010522A (ko) * | 2011-07-18 | 2013-01-29 | 순천향대학교 산학협력단 | 스마트폰 분실 및 도난의 피해 방지를 위한 인증방법 |
KR20140036345A (ko) * | 2011-06-30 | 2014-03-25 | 마이크로소프트 코포레이션 | 투명한 장애 극복 기법 |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5517668A (en) * | 1994-01-10 | 1996-05-14 | Amdahl Corporation | Distributed protocol framework |
FI107858B (fi) * | 1998-12-04 | 2001-10-15 | Ericsson Telefon Ab L M | Yhteysvastuun vaihto tietoliikennejärjestelmässä |
US6510144B1 (en) * | 1999-12-07 | 2003-01-21 | Cisco Technology, Inc. | Network layer support to enhance the transport layer performance in mobile and wireless environments |
US8555069B2 (en) * | 2009-03-06 | 2013-10-08 | Microsoft Corporation | Fast-reconnection of negotiable authentication network clients |
CN101765228B (zh) * | 2010-01-29 | 2012-07-11 | 杭州华三通信技术有限公司 | 一种capwap隧道的恢复方法及装置 |
CN101827111A (zh) * | 2010-05-12 | 2010-09-08 | 中兴通讯股份有限公司 | Tcp链接方法、网络系统、客户端和服务器 |
US8631277B2 (en) * | 2010-12-10 | 2014-01-14 | Microsoft Corporation | Providing transparent failover in a file system |
CN102833253B (zh) * | 2012-08-29 | 2015-09-16 | 五八同城信息技术有限公司 | 建立客户端与服务器安全连接的方法及服务器 |
CN103687053A (zh) * | 2012-09-20 | 2014-03-26 | 电信科学技术研究院 | 一种连接重建的方法及设备 |
-
2015
- 2015-01-08 KR KR1020150002614A patent/KR101627256B1/ko active IP Right Grant
- 2015-01-21 CN CN201580072436.4A patent/CN107113178A/zh active Pending
- 2015-01-21 WO PCT/KR2015/000615 patent/WO2016111407A1/ko active Application Filing
- 2015-01-21 US US15/541,482 patent/US10630479B2/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20060120035A (ko) * | 2003-10-10 | 2006-11-24 | 사이트릭스 시스템스, 인크. | 신뢰성 높고 지속적인 통신 세션들을 통한 클라이언트 자동재연결 |
KR20100133882A (ko) * | 2009-06-12 | 2010-12-22 | 엘지전자 주식회사 | CPM 세션에서 이산 미디어 타입(discrete media type)의 메시지 전달 순서를 지키는 방법 및 장치 |
KR20140036345A (ko) * | 2011-06-30 | 2014-03-25 | 마이크로소프트 코포레이션 | 투명한 장애 극복 기법 |
KR20130010522A (ko) * | 2011-07-18 | 2013-01-29 | 순천향대학교 산학협력단 | 스마트폰 분실 및 도난의 피해 방지를 위한 인증방법 |
Also Published As
Publication number | Publication date |
---|---|
US20170359178A1 (en) | 2017-12-14 |
KR101627256B1 (ko) | 2016-06-03 |
US10630479B2 (en) | 2020-04-21 |
CN107113178A (zh) | 2017-08-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2016111407A1 (ko) | 단말 세션의 복원 기능을 구비한 네트워크 통신 방법 | |
CN100596062C (zh) | 分布式报文传输安全保护装置和方法 | |
WO2010128747A1 (ko) | 지그비 무선 통신 프로토콜상에서의 보안성 강화 방법 및 장치 | |
WO2012074198A1 (en) | Terminal and intermediate node in content oriented networking environment and communication method of terminal and intermediate node | |
CN104601550B (zh) | 基于集群阵列的反向隔离文件传输系统及其方法 | |
WO2015105402A1 (ko) | 이동 통신 시스템에서 서비스 발견 및 그룹 통신을 위한 보안 지원방법 및 시스템 | |
WO2022108087A1 (ko) | 차량용 can 통신 보안 장치 및 방법 | |
WO2012050293A1 (en) | Method and apparatus for sharing contents using information of group change in content oriented network environment | |
WO2010019021A2 (ko) | 이동 통신 시스템의 비계층 프로토콜 처리 방법 및 이동통신 시스템 | |
WO2022080784A1 (ko) | 양자 암호키 분배 방법 및 장치 | |
KR100431700B1 (ko) | 에스지에스엔과 지지에스엔간의 시각 동기화 시스템 및 방법 | |
WO2018004114A2 (ko) | 프록시 서비스 제공을 위한 프록시 인증시스템 및 인증방법 | |
WO2019045424A1 (ko) | 보안을 위한 보안 소켓 계층 복호화 방법 | |
CN108322330B (zh) | 一种ipsec vpn序列号及抗重放窗口同步方法及设备 | |
WO2018128264A1 (ko) | 멀티캐스트 환경의 보안 시스템에서 키를 관리하는 방법 | |
WO2021107389A1 (ko) | 네트워크 시스템 및 그것의 메시지 보안 방법 | |
WO2013151376A1 (ko) | 듀얼 os를 이용한 보안 시스템 및 그 방법 | |
WO2011160390A1 (zh) | 代理网络设备的管理方法和系统 | |
WO2017111202A1 (ko) | 사물 인터넷 환경에서의 컨텍스트 기반 보안방법 및 그에 따른 시스템 | |
CN113923046B (zh) | 一种分布式防火墙安全通信的实现方法及系统 | |
WO2019107794A1 (ko) | 통신 관리 장치 및 방법 | |
WO2023249320A1 (ko) | Dds 통신 방법, 장치 및 시스템 | |
WO2016127317A1 (zh) | 一种私有云系统的资源共享方法及装置 | |
KR101005870B1 (ko) | 미인증 장비의 티시피 세션 차단 방법 | |
WO2012043918A1 (ko) | 링 네트워크에서의 데이터 패킷 송/수신 방법 및 이를 위한 링 네트워크 노드 단말 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15877128 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 15541482 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 10.11.2017) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 15877128 Country of ref document: EP Kind code of ref document: A1 |