Secure communication method, terminal, server and system

A security communication and server technology, applied in transmission systems, electrical components, user identity/authority verification, etc., can solve problems such as man-in-the-middle attacks, and achieve the effect of low cost and convenient implementation

Active Publication Date: 2015-04-29
XFUSION DIGITAL TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0019] The embodiment of the present invention provides a secure communication method, terminal, server and system to solve the problem of man-in-the-middle attack when two modes of "outer layer authentication protocol + inner layer authentication protocol" and "inner layer authentication protocol" exist at the same time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure communication method, terminal, server and system
  • Secure communication method, terminal, server and system
  • Secure communication method, terminal, server and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0057] This embodiment describes the technical solution of the present invention from the perspective of a terminal.

[0058] figure 2 It is a schematic flowchart of a secure communication method according to an embodiment of the present invention. Such as figure 2 As shown, the secure communication method includes the following steps:

[0059] Step 201, the terminal sends a client initial message to the first server, the client initial message carries a flag requesting to enable the inner and outer key binding mechanism, so that the first server responds to the client initial message to determine whether to Enable the inner and outer key binding mechanism;

[0060] Step 202, the terminal receives the server initial message returned by the first server, and judges whether the server initial message carries a flag for enabling the inner and outer key binding mechanism;

[0061] Step 203, if yes, the terminal obtains the outer authentication protocol key by negotiating the...

Embodiment 2

[0096] On the basis of the secure communication method in the above embodiment, the terminal sends a client initial message to the server, and the client initial message carries a flag requesting to enable the inner and outer key binding mechanism, specifically including:

[0097] The terminal sends a client initial message carrying a tunnel key binding extension field to the server;

[0098] Correspondingly, the judging whether the server initial message carries a flag for enabling the inner and outer key binding mechanism specifically includes:

[0099] Judging whether the server initial message carries the tunnel key binding extension field.

[0100] Specifically, by adding a new extension type, Tunnel Key Binding (TKB) Extension, to the client initial message / server initial message, it serves as a mark for enabling the inner and outer key binding mechanisms. That is, the terminal notifies the server that it intends to use the TKB extension by adding the TKB extension fiel...

Embodiment 3

[0107] This embodiment describes the technical solution of the present invention from the perspective of a server supporting the inner and outer key binding mechanism.

[0108] Figure 6 It is a schematic flowchart of a secure communication method according to another embodiment of the present invention. like Figure 6 As shown, the secure communication method includes the following steps:

[0109] Step 601, the first server receives the client initial message sent by the terminal, and the client initial message carries a mark requesting to enable the inner and outer key binding mechanism;

[0110] Step 602, the first server responds to the client initial message, and sends to the terminal a server initial message carrying a flag for enabling the inner and outer key binding mechanism, so that the terminal knows that the Internal and external key binding mechanism;

[0111] Step 603, the first server acquires an outer authentication protocol key by negotiating an outer auth...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a secure communication method, a terminal, a server and a system. The method comprises the following steps that: the terminal sends a client-side initial message to a first server, wherein the client-side initial message carriers a mark requesting to start the inner-layer / outer-layer key binding mechanism so that the first server responds to the client-side initial message and judges whether to start the inner-layer / outer-layer key binding mechanism; the terminal receives the server-side initial message returned by the first server, and judges whether the server-side initial message carriers the mark requesting to start the inner-layer / outer-layer key binding mechanism; if the server-side initial message carriers the mark, the terminal performs outer-layer authentication protocol negotiation with the first server to obtain an outer-layer authentication protocol key, performs inner-layer authentication protocol negotiation with the second server to obtain an inner-layer authentication protocol key, and generates a master key according to the outer-layer authentication protocol key and the inner-layer authentication protocol key; and the terminal performs secure communication by use of the master key.

Description

technical field [0001] The invention relates to encryption technology, in particular to a secure communication method, terminal, server and system, belonging to the technical field of communication. Background technique [0002] Transport layer security (TLS) is a widely used identity authentication and secure transport protocol. The TLS protocol obtains the session key shared by both parties through identity authentication, which is used for encryption and authentication of subsequent communication content, that is, confidentiality and integrity protection. The TLS protocol is usually combined with other authentication protocols for authentication, and is used as the outer tunnel of these authentication protocols, that is, the TLS protocol is used to complete the server authentication, and other authentication protocols are used to complete the client authentication, such as Extensible Authentication Protocol (Extensible Authentication) Protocol, EAP), Protected EAP Protoc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 朱贤栾世鹏
Owner XFUSION DIGITAL TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products