Network security service guarantee method

A network security and security assurance technology, applied in the field of Internet communication, can solve the problems of identity fraud, unequal identities of two or more parties participating in the collaboration, and no high-security general components available, so as to save R&D costs and ensure confidentiality. and integrity effects

Active Publication Date: 2021-07-09
深圳市骑换科技有限公司
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, the security authentication cooperation between cross-organization systems in the public network is still in the original unilateral credit granting stage. The interaction between various organization systems is basically realized by issuing access tokens and there are no high-security general components available. This method exists The following disadvantages: When the business requires cross-organization and cross-system interaction, additional authentication and credit functions need to be developed; when the access token is lost, there is a risk of fraudulent use of its identity; when both parties or even multiple parties in the interactive system need to call each other for collaboration The authentication and credit function must be developed; the authentication and authentication methods of the interactive systems of all parties are different and the configuration of role permissions is different; the identities of the two or more parties involved in the collaboration are not equal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security service guarantee method
  • Network security service guarantee method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] In order to facilitate the understanding of the present invention, the present invention will be described more fully below with reference to the associated drawings. A preferred embodiment of the invention is shown in the drawings. However, the present invention can be embodied in many different forms and is not limited to the embodiments described herein. Rather, these embodiments are provided so that the disclosure of the present invention will be thorough and complete.

[0019] Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the technical field of the invention. The terms used herein in the description of the present invention are for the purpose of describing specific embodiments only, and are not intended to limit the present invention.

[0020] This embodiment provides a network security service guarantee method, which is used to provide equal mutual trust and comm...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a network security service guarantee method, which is used for providing equal mutual trust and communication data security guarantee for transmitting sensitive data and business cooperation on a public network among different organization systems. The network security service guarantee method is implemented by an MSP component, a configuration center and a user-defined transmission protocol. The method comprises the following steps: starting the configuration center and initializing configuration; integrating and starting an MSP component; initializing the MSP component; organizing system node authorization and role permission division; establishing communication connection between the nodes; sending an interactive cooperation request; carrying out identity authentication and data verification on a sender; performing data decryption and role operation authority verification; and executing the business logic of the organization system. The network security service guarantee method provided by the invention has the core positive effects that a traditional single-party credit authentication mode is abandoned, cross-organization and cross-system cooperation is established on the basis of two-party or multi-party equal mutual trust, and the confidentiality and integrity of data transmission in the cooperation process are ensured by an enough security means.

Description

technical field [0001] The invention relates to the technical field of Internet communication, in particular to a network security service guarantee method. Background technique [0002] At present, the security authentication cooperation between cross-organization systems in the public network is still in the original unilateral credit granting stage. The interaction between various organization systems is basically realized by issuing access tokens and there are no high-security general components available. This method exists The following disadvantages: When the business requires cross-organization and cross-system interaction, additional authentication and credit functions need to be developed; when the access token is lost, there is a risk of fraudulent use of its identity; when both parties or even multiple parties in the interactive system need to call each other for collaboration Authentication and credit functions must be developed; the authentication and authentic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0823H04L63/105H04L63/083H04L63/0435H04L63/0442H04L63/123H04L67/141
Inventor 刘阳黄润明郭艳涛
Owner 深圳市骑换科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products