Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Long connection communication processing method and device based on TLS protocol

A processing method and long-connection technology, which are applied in secure communication devices, digital transmission systems, electrical components, etc., and can solve the problems of lack of encryption and identity authentication functions, low security of message transmission, and easy analysis of data information. , to achieve the effect of increasing the difficulty of cracking, improving security, and improving security

Pending Publication Date: 2022-05-17
BANK OF CHINA
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] With the widespread popularization of financial payment scenarios, the requirements for data security are getting higher and higher. However, in the commonly used TCP and UDP data transmission methods, data packets may be intercepted during communication, and data information is easily parsed. It brings great challenges to the financial information security that usually uses the TCP protocol for private line data transmission
[0004] At present, for the communication protocol, the existing methods include: based on the TLS protocol, establishing an HTTPS connection, but does not support long-term connection communication
SOCKET-based persistent connection, using TCP data transmission mode, does not have encryption and identity authentication functions, message transmission security is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Long connection communication processing method and device based on TLS protocol
  • Long connection communication processing method and device based on TLS protocol
  • Long connection communication processing method and device based on TLS protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055]The principle and spirit of the present invention will be described below with reference to several exemplary embodiments. It should be understood that these embodiments are given only to enable those skilled in the art to better understand and implement the present invention, rather than to limit the scope of the present invention in any way. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.

[0056] Those skilled in the art know that the embodiments of the present invention can be implemented as a system, device, device, method or computer program product. Therefore, the present disclosure may be embodied in the form of complete hardware, complete software (including firmware, resident software, microcode, etc.), or a combination of hardware and software.

[0057] According to an embodiment of the present invention, a TLS protocol-based persistent...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a long connection communication processing method and device based on a TLS protocol, and relates to the technical field of financial data security, and the method comprises the steps: building an encryption channel between a client side and a service side based on the TLS protocol, and placing certificates, used for carrying out interaction identity verification, of two communication sides in the encryption channel; when a connection establishment request sent by a client side is obtained, using a certificate to carry out identity authentication on two communication parties, and verifying the integrity of request data sent by the client side; if the identity authentication is passed and the request data verification is passed, establishing a SOCKET long connection in the encryption channel; and the SOCKET long connection is utilized to send the connection establishment request to the application end, the connection between the client side and the application end is established, and message transmission is carried out between the client side and the application end.

Description

technical field [0001] The invention relates to the technical field of financial data security, in particular to a TLS protocol-based long connection communication processing method and device. Background technique [0002] This section is intended to provide a background or context to embodiments of the invention that are recited in the claims. The descriptions herein are not admitted to be prior art by inclusion in this section. [0003] With the widespread popularization of financial payment scenarios, the requirements for data security are getting higher and higher. However, in the commonly used TCP and UDP data transmission methods, data packets may be intercepted during communication, and data information is easily parsed. It brings great challenges to the security of financial information that usually uses the TCP protocol for private line data transmission. [0004] Currently, existing methods for the communication protocol include: establishing an HTTPS connection...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L67/141H04L69/16
CPCH04L63/0823H04L63/0428H04L67/141H04L69/16
Inventor 刘春梅郭玉超
Owner BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products