Data communication method based on trusted service agent

A data communication and service agent technology, applied in electrical components, transmission systems, etc., can solve problems such as attacks and detection, and achieve the effects of improving security, enhancing access control, and protecting sensitive services

Active Publication Date: 2021-12-07
SHENZHEN FORWARD IND CO LTD
View PDF14 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Aiming at the above-mentioned deficiencies in the prior art, a data communication method based on a trusted service agent provided by the present invention solves the problem that sensitive services are exposed in the network for a long time, are easily detected by network attackers, and then attack, and improve business system security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data communication method based on trusted service agent

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The specific embodiments of the present invention are described below so that those skilled in the art can understand the present invention, but it should be clear that the present invention is not limited to the scope of the specific embodiments. For those of ordinary skill in the art, as long as various changes Within the spirit and scope of the present invention defined and determined by the appended claims, these changes are obvious, and all inventions and creations using the concept of the present invention are included in the protection list.

[0041] like figure 1 As shown, a data communication method based on a trusted service agent includes the following steps:

[0042] S1. Deploy the communication control component M1 on the server, register the service with the trusted agent component M2 through the communication control component M1, and obtain the registration content;

[0043] S2. Deploy the communication request component M3 on the client, and automatica...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data communication method based on a trusted service agent, and the method comprises the following steps: S1, deploying a communication control component M1 at a server side, and carrying out service registration on a trusted agent component M2 through the communication control component M1 to obtain registration content; S2, deploying a communication request component M3 at a client, and automatically initiating an access application to the trusted agent component M2 through the communication request component M3; S3, after the trusted agent component M2 receives the access application, performing identity authentication on the communication request component M3 through the trusted agent component M2 to obtain authentication information; S4, monitoring the access of the communication request component M3 according to the authentication information, and accessing the service provided by the server through the communication request component M3 based on the registration content to complete data communication. According to the invention, the problem that the sensitive service is exposed in the network for a long time, is easily detected by a network attacker and then attacks is solved, and the security of a service system is improved.

Description

technical field [0001] The invention relates to the field of network communication security, in particular to a data communication method based on a trusted service agent. Background technique [0002] In the modern network environment, service providers generally provide external services by means of fixed public network addresses and well-known protocol port numbers. For example, WEB service generally works on TCP port 80 or 443, and FTP service generally works on TCP port 21 and 22. The network address and protocol port of the service provider have been directly exposed in the public environment for a long time, and are easily detected by network attackers to initiate network attacks. Some service providers support providing external services in the form of dynamic network addresses, but most of them realize it through the dynamic resolution of DNS domain names. An attacker can easily obtain the real network address of the service provider, and then launch a network att...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0281H04L63/08H04L63/0823H04L63/10Y02D30/50
Inventor 张晋陈世伟詹晋川芦伟张帆
Owner SHENZHEN FORWARD IND CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products