Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network communication subject confirmation method and system

A network communication and main body technology, applied in the transmission system, electrical components, etc., can solve the problems of unfavorable network security protection, handshake process vulnerable to network interception, etc.

Inactive Publication Date: 2014-01-29
冯丽娟
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The above handshake process is vulnerable to network interception, so that malicious programs pretend to be the communication subject to communicate with the target subject, which is not conducive to network security protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network communication subject confirmation method and system
  • Network communication subject confirmation method and system
  • Network communication subject confirmation method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0043] communication handshake process

[0044] The inventor found through analysis that, if figure 1 Shown:

[0045] Among them, the requesting party is referred to as Party A, and the requested party is referred to as Party B;

[0046] (1) At the beginning of TCP communication, Party A will send a control bit (that is, the bit code) syn to 1, and contain the data packet of the random sequence number (ie sequence number) seq=x of the machine to Party B;

[0047] (2) Party B will construct an ack data packet after receiving the data packet whose control bit syn is 1, in which the sequence number field is the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network communication subject confirmation method. The method includes the steps that when a party A starts TCP connection to a party B, an SYN data package to be sent of the party A is intercepted, equal-length encryption is conducted on the SYN data package, and then the SYN data package is sent to the party B; after the party B receives the SYN data package, the SYN data package is decoded; when the party B sends an ACK data package to the party A, the ACK data package to be sent of the party B is intercepted, equal-length encryption is conducted on the ACK data package, and then the ACK data package is sent to the party A; after the party A receives the ACK data package, the ACK data package is decoded; when the party A sends the ACK data package to the party B, the ACK data package to be sent of the party A is intercepted, equal-length encryption is conducted on the ACK data package, and then the ACK data package is sent to the party B; after the party B receives the ACK data package, the ACK data package is decoded. By means of the network communication subject confirmation method, authentication and protection of the data packages are achieved at a handshake stage.

Description

technical field [0001] The invention relates to the field of computer network security, in particular to a network communication subject confirmation method and system. Background technique [0002] Network security protection is a kind of network security technology, which refers to technical solutions such as how to effectively carry out intervention control and how to ensure the security of data transmission, mainly including physical security analysis technology, network structure security analysis technology, system security analysis technology , manage security analysis techniques, and other security services and security mechanism strategies. [0003] TCP (Transmission Control Protocol) is a transmission control protocol that provides reliable connection services. [0004] There are 6 types of TCP flags (bit codes): SYN (synchronous connection establishment), ACK (acknowledgment confirmation), PSH (push transmission), FIN (finish end), RST (reset reset), URG (urgent ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 冯丽娟
Owner 冯丽娟
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products