Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Communication verification method, electronic equipment and storage medium

A verification method and equipment technology, applied in the field of network communication, can solve the problems of APT attacks that are difficult to completely prevent and a large number of border devices

Active Publication Date: 2020-12-15
NOVNET COMPUTING SYST TECH CO LTD
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present invention provides a communication verification method, electronic equipment and storage medium applied to node servers, so as to solve the problem that network security schemes require a large number of border devices and that it is difficult to completely prevent DDOS attacks and APT attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication verification method, electronic equipment and storage medium
  • Communication verification method, electronic equipment and storage medium
  • Communication verification method, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0087] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0088] The existing Internet is networked by various devices produced by different hardware device providers. Various devices do not comply with private and public network protocols according to uniform rules. Therefore, the complexity of the protocols and the complexity of the manufacturers lead to various vulnerabilities in the devices, providing opportunities for hackers . For example, the existing data center software is complex, and various opera...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a communication verification method, electronic equipment and a storage medium, and aims to solve the problems that a network security scheme needs a large amount of boundary equipment and DDOS attacks and APT attacks are difficult to thoroughly prevent. The communication verification method comprises the steps that: a node server receives a service application instruction sent by user equipment; the node server inquires a service type from target equipment according to a target equipment address in the service application instruction; the node server inquires the user equipment whether to receive the service type provided by the target equipment or not according to the inquired service type; after the user equipment selects receiving, the node server generates a pass, wherein the pass is obtained through negotiation between the user equipment and the node server; the user equipment and the target equipment establish indirect connection according to the pass; andthe node server examines communication between the user equipment and the target equipment according to the pass. According to the communication verification method, the security of communication between the user equipment and the target equipment is improved.

Description

technical field [0001] The invention relates to the technical field of network communication, in particular to a communication verification method, electronic equipment and a storage medium. Background technique [0002] With the development of Internet technology, society has entered the information age. But in the network society, people are not absolutely safe. People are faced with all kinds of network attack methods and information leakage problems. And with the rapid development of emerging technologies such as big data, cloud computing, and the Internet of Things, network security issues have become more prominent. In important industries and fields involving national security and public interests, such as energy, transportation, finance, education, and public services, security issues affect the whole body. [0003] In the existing technology, the network security solution is mainly composed of various border devices, such as border firewalls, anti-DDOS products, i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0823H04L63/0876H04L63/123H04L63/126H04L63/1441
Inventor 沈寓实汝聪翀葛强
Owner NOVNET COMPUTING SYST TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products