Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Long connection tunnel establishment method based on server hardware information

A hardware information and tunnel establishment technology, applied in the field of information security, can solve the problems of easy interception of transmitted data and hidden dangers of data security, and achieve the effect of ensuring the security of data transmission and improving the security of entry.

Inactive Publication Date: 2017-05-24
上海金融云服务集团安全技术有限公司
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the stateless or connectionless nature of the HTTP protocol, the connection protection applied for by it is a temporary short connection, which makes the transmitted data easy to be intercepted and provides a basis for cracking research for hackers. The authority information of the business server or the login token and other information can pretend to be the user to complete the login, so the existing transmission method leaves a lot of security risks to the security of the data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Long connection tunnel establishment method based on server hardware information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0018] figure 1 A flow chart of the method for establishing a long connection tunnel based on server hardware information provided by the present invention is shown. The method for establishing a long connection tunnel based on server hardware information provided in this embodiment includes the following steps.

[0019] S101. After entering the second server hardware information of the second server, the first server customizes an installation package that can perform persistent connection communication with the first server according to the second server hardware information, and generates persistent connection communication verification information, the The second server hardware information includes the IP address and token lock code of the second server.

[0020] In the step S101, the first server and the second server are two servers that need to interact with each other. For example, when the first server is an authentication server, the second server is a business ser...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of information security, and discloses a long connection tunnel establishment method based on server hardware information. The method has the advantages that two servers requiring interactive communication are bound in a forced manner based on the server hardware information, that is, a private long connection tunnel is established between the two servers, so that information transmission between the two servers can be completed through the long connection tunnel, and high security of data transmission between the two servers can be further guaranteed. The method can be conveniently promoted and applied in practice.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method for establishing a long connection tunnel based on server hardware information. Background technique [0002] In the Internet system, it is often necessary to transmit data synchronously between different servers to complete resource data interaction, such as an authentication server for identity authentication, in order to provide authentication services to other business servers, it is necessary Transmission of information such as authorization information or login tokens used to log in to the business server, so data security between the two is particularly important. [0003] At present, the AS2 protocol (Applicability Statement 2) is mainly used for data security transmission between servers. This protocol is mainly based on digital certificate signature, encryption, and reformatting, and then uses HTTP / HTTPS protocol for transmission in the wide area n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0815H04L63/0823
Inventor 胥寅于道洪
Owner 上海金融云服务集团安全技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products