Method, sending end, receiving end and system for protecting information transmission security

A technology for protecting information and sending ends, applied in the network field, can solve the problems of high transformation costs and high information security costs, and achieve the effects of reducing costs, ensuring security, and saving costs

Active Publication Date: 2015-09-09
HUAWEI TECH CO LTD
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] By using the extended protocol for information encryption, it is necessary to carry out corresponding transformation on each device in the network system. However, in practical applications, the number of devices is large, resulting in high transformation costs, which makes the cost of strengthening information security relatively high.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, sending end, receiving end and system for protecting information transmission security
  • Method, sending end, receiving end and system for protecting information transmission security
  • Method, sending end, receiving end and system for protecting information transmission security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] An embodiment of the present invention provides a method for protecting information transmission security, such as figure 1 As shown, the method includes:

[0037] Step 101, generate a challenge code according to the current time information of the sender.

[0038] Specifically, in this embodiment, the sender can generate a challenge code according to the current time information of the sender, for example:

[0039] The format of the challenge code is: {ClientTime:salt}, where ClientTime is the time information corresponding to the current time of the sender. Optionally, the challenge code can also include salt, which is a sequence number, random number or random string. Adding salt can Increase the complexity of the challenge code, thereby increasing the encryption complexity of the authentication code generated according to the challenge code, and further improving the security of the encryption. Wherein, the sending end may be a sending end receiving end used for s...

Embodiment 2

[0058] An embodiment of the present invention provides a method for protecting information transmission security, such as Figure 2a As shown, the method includes:

[0059] Step 201, receiving a message from the sender that carries the sender authentication code, the challenge code, and the user identity.

[0060] Among them, the challenge code is generated by the sender based on the current time information of the sender, and the authentication code of the sender is based on the challenge code, user ID and user identity authentication credentials saved by the sender, and the user ID is used to identify the currently used sender. For end users, user identity authentication credentials include passwords and digital certificates used to verify the legitimacy of user identity identification.

[0061] Specifically, in this embodiment, the receiving end as the execution subject may be a terminal, receiving end, switch, gateway device, router, etc., which have a data transmission r...

Embodiment 3

[0086] An embodiment of the present invention provides a sending end, such as image 3 shown, including:

[0087] The challenge code generating module 31 is configured to generate a challenge code according to the current time information of the sending end.

[0088] The sending-end authentication code generation module 32 is configured to generate a sending-end authentication code according to the challenge code, the user ID and the user identity authentication credential saved by the sending end.

[0089] Wherein, the user identity is used to identify the user who is currently using the sending end, and the user identity authentication credential includes a password and a digital certificate used to verify the legitimacy of the user identity.

[0090] Sending module 33, configured to send the message carrying the authentication code of the sending terminal, the challenge code and the user identity to the receiving end, so that the receiving end can code and the user identi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a method, a sending end, a receiving end and a system for protecting information transmission safety, which relate to the technical field of network, and can ensure the information transmission safety by a method at low cost, thus lowering the cost needed by enhancing the information safety. The method comprises the steps of: generating a challenging code according to the current time information of a sending end; generating a sending end authentication code according to the challenging code, a user identifier and a user identity authentication evidence stored by the sending end; sending information carrying the sending end authentication code, the challenging code and the user identifier to the receiving end so that the receiving end regenerates an authentication code according to the challenging code and the user identifier, and confirming the safety of the information through comparing whether the regenerated authentication code and the sending end authentication code are the same. The invention is applicable to guarantee on the information transmission safety.

Description

technical field [0001] The invention relates to the field of network technology, in particular to a method for protecting information transmission security, a sending end, a receiving end and a system. Background technique [0002] With the development of network technology, the frequency and data volume of information transmission between various devices in the network system have increased sharply, and the number of intermediate devices (such as gateways, routers, etc.) on the transmission line has gradually increased, which has caused the transmitted information (request message , response messages, etc.) are easily intercepted by attackers or malicious software, so that attackers can forge the request information of the sending end in various ways, thereby embezzling the user information in the receiving end and causing losses to the user. For example: Many network devices use the SOAP (Simple Object Access Protocol) protocol for information exchange, but many systems us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 徐志贤
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products