Communication method, device and system

A communication method and technology of a communication system, applied to the public key and key distribution of secure communication, can solve problems such as inability to encrypt headers, and achieve the effect of ensuring anonymity and protecting transmission security.

Inactive Publication Date: 2009-07-01
HUAWEI TECH CO LTD
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] In the process of realizing the present invention, the inventor found that there are at least the following problems in the prior art: in the existing end-to-end encryption method, although each intermediate node on the channel does not decrypt the message, it is necessary to transmit the message to the destination. , the routing information must be checked, so only the packet, not the header, can be encrypted

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication method, device and system
  • Communication method, device and system
  • Communication method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The embodiment of the present invention provides a communication method that uses the public key of the destination node to encrypt the transmitted data information. Since the transit node does not know the private key of the destination node, the data information cannot be decrypted, and only the destination node can access the data. The information is decrypted using the private key of the destination node, so as to realize the anonymous transmission of the communicating parties to the transit node and ensure the security of communication. The embodiment of the present invention takes communication in a P2P network as an example for description.

[0026] Such as figure 2 Shown is a flowchart of a communication method according to an embodiment of the present invention, which specifically includes the following steps:

[0027] Step S201: Receive data information, which is information encrypted with the public key of the destination node. When the source node sends data in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a communication method, which comprises the steps as follows: data information is received, wherein, the data information is the information that is encrypted by utilizing a public key of a destination node; whether an identity parameter of the destination node carried by the data information is identical with the identity parameter of a present node; and the data information is decrypted by utilizing a private key of the present node if the identity parameter of the destination node is identical with the identity parameter of the present node. By the embodiment of the invention, the sent data information is encrypted by utilizing the public key of the destination node, and the received data information is decrypted by utilizing the private key of the destination node after the destination node receives the encrypted data information, thereby ensuring the anonymity of both communication sides on a transferring node, and protecting the transmission security of the data information.

Description

Technical field [0001] The present invention relates to the field of network communication technology, in particular to a communication method, device and system. Background technique [0002] P2P SIP (Peer to Peer Session Initiation Protocol) is a set of protocols related to SIP (Session Initiation Protocol, Session Initiation Protocol). The protocol uses P2P technology to parse the target of SIP requests and provide SIP message transmission. And provide other SIP related services. Such as figure 1 Shown is the flow chart of the communication between node A and node C in the P2P SIP system, where the data sent by A is as follows: [0003] P2PSIP call (invite): [0004] INVITE sip:alice@p2psip.org SIP / 2.0 [0005] To:<sip:alice@p2psip.org> [0006] From:<sip:bob@p2psip.org> [0007] Contact:<sip:bob@10.0.0.10> [0008] DHT-PeerID:<sip:10@10.0.0.10; user=peer>; algorithm=sha1; overlay=chat; expires=800 [0009] Supported:dht [0010] From the header field ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/08
Inventor 吕晓雨朱贤刘经及李朋金洪波
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products