Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A communication encryption method

A technology of communication encryption and encrypted value, applied in the field of communication, can solve the problems of occupying server resources, degrading server performance, slowing down the response speed of smart devices accessing the server, etc., to achieve the effect of communication security and fast verification speed

Active Publication Date: 2020-01-10
环玺信息科技(上海)有限公司
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the rapid development of Internet technology, more and more smart devices can be connected to the Internet to help people live, work and study. On the other hand, network security is getting more and more attention. When reaching the server, the server will authenticate the connection request of the smart device. If the authentication is passed, the smart device has the authority to access the server, thus improving the security of the server. However, the existing verification method will Verification is required, so it will take up a lot of resources on the server, degrade the performance of the server, and cause the response speed of the smart device to access the server to slow down

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A communication encryption method
  • A communication encryption method
  • A communication encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0037] It should be noted that, in the case of no conflict, the embodiments of the present invention and the features in the embodiments can be combined with each other.

[0038] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments, but not as a limitation of the present invention.

[0039] The invention includes a communication encryption method.

[0040] An embodiment of a communication encr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a communication encryption method applied to the authentication of a service terminal to a client, wherein the client is connected with the service terminal. The communication encryption method comprises the following steps that S1 the client sends the information of a communication interface needing to communicate to the service terminal; S2 the service terminal encrypts the received information of the communication interface by a preset method, and returns the encrypted information of the communication interface to the client; S3 the client is communicated with the service terminal via the encrypted information of the communication interface, and the service terminal receives the encrypted information of the communication interface during the communication and then transforms the encrypted information into the information of the communication interface according to an inverse method of the preset method. The beneficial effects of the technical scheme are that: the communication between the client and the service terminal is safe, the verification speed is faster, and the defect in the prior art that the identity of the client needs to be verified every time, so that the performance of a server declines, is overcome.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a communication encryption method. Background technique [0002] With the rapid development of Internet technology, more and more smart devices can be connected to the Internet to help people live, work and study. On the other hand, network security is getting more and more attention. When reaching the server, the server will authenticate the connection request of the smart device. If the authentication is passed, the smart device has the authority to access the server, thus improving the security of the server. However, the existing verification method will Therefore, a large amount of resources of the server will be occupied, and the performance of the server will be reduced, which in turn will cause the response speed of the smart device to access the server to slow down. Contents of the invention [0003] Aiming at the above-mentioned problems in the verification of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0435H04L63/126
Inventor 陈宏亮张伟
Owner 环玺信息科技(上海)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products