Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for detecting SSL enciphered data safety

An encrypted data and security technology, which is applied in the field of detecting the security of SSL encrypted data, can solve the problems of encrypted data analysis and inability to detect intrusion behavior, and achieve the effect of ensuring security

Inactive Publication Date: 2010-04-14
BEIJING LEADSEC TECH
View PDF0 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the traditional NIDS cannot recognize the data encrypted by SSL, so it cannot analyze the encrypted data, so it cannot detect the intrusion that exists in the SSL encrypted tunnel.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for detecting SSL enciphered data safety
  • Method and device for detecting SSL enciphered data safety
  • Method and device for detecting SSL enciphered data safety

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In order to enable those skilled in the art to better understand the solutions of the embodiments of the present invention, the embodiments of the present invention will be further described in detail below in conjunction with the drawings and implementations.

[0052] The following first briefly describes the working process of SSL.

[0053] Such as figure 1 As shown, the SSL workflow is mainly divided into the following two processes:

[0054] 1. Session negotiation process:

[0055] 101. The client sends a start message "Hello" to the server to start a new session connection;

[0056] 102. The server determines whether a new master key needs to be generated according to the client's information. If necessary, the server will include the server certificate used to transmit the server public key information when responding to the client's "Hello" message;

[0057] 2. Key exchange process:

[0058] 103. The client generates a session key based on the received server...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the network safety technology, and discloses a method and a device for detecting SSL enciphered data safety, wherein the method comprises identifying conversation-used encryption algorithms through tracing SSL conversation negotiation process, obtaining conversation key for enciphered data through tracing the key exchange process, utilizing the conversation key to decrypt received data to get non-encrypted original data, and conducting inversion detections and analysis for the original data. The invention can be utilized to detect and analysis SSL enciphered data through by-pass arrangement on network key nodes, and guarantees the safety of SSL enciphered data.

Description

technical field [0001] The invention relates to network security technology, in particular to a method and device for detecting the security of SSL encrypted data. Background technique [0002] At present, with the construction and development of network infrastructure and application systems, people's work and life are increasingly inseparable from the network: online banking, online tax declaration, online shopping, online registration and so on. These network applications have changed people's work and lifestyle, and a lot of work can be done without leaving home. But at the same time that the network brings convenience, due to the flaws in the system, software, and protocol itself, some people with ulterior motives will use hacking techniques to attack these systems to obtain user credit card information, corporate confidential information or other sensitive information, and gain economic benefits from it. [0003] SSL (Security Socket Layer, Secure Socket Layer) is a s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/26H04L9/32H04L29/06
Inventor 蔡立军
Owner BEIJING LEADSEC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products