Method, apparatus and system based on SSL session

A session table and client technology, applied in the network field, can solve problems such as heavy computing workload and inability to handle delay, and achieve the effect of realizing cluster expansion and improving hit rate.

Inactive Publication Date: 2015-11-25
SINA COM TECH (CHINA) CO LTD
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When the client and the SSL server connect for the first time, both parties need to verify the digital certificate of the other party and negotiate to generate a symmetric key for subsequent communication before data communication can be carried out. The entire negotiation process not only requires multiple interactions, but also requires a huge amount of computing work. It will bring a processing delay of 5~50ms (not including the network part)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, apparatus and system based on SSL session
  • Method, apparatus and system based on SSL session
  • Method, apparatus and system based on SSL session

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0015] Such as figure 1 As shown, it is a flow chart of a method based on a secure socket layer SSL session according to an embodiment of the present invention, and the method includes:

[0016] 101. Receive the customer greeting message sent by the client;

[0017] 102. Judging whether there is session identification content according to the customer greeting message, and obtaining a judging result;

[0018] 103. According to the judgment result, schedule t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiments of the invention provide a method, apparatus and system based on an SSL session. The method comprises the following steps: receiving a client greeting message sent by a client; according to the client greeting message, determining session identification content exists and obtaining a determination result; and according to the determination result, scheduling SSL servers in an SSL cluster of the SSL session of the client, and sending the client greeting message to the corresponding SSL server. By using the technical scheme provided by the invention, the method, apparatus and system have the following advantages: the hit rate of the SSL Session is improved, and cluster expansion is also realized.

Description

technical field [0001] The present invention relates to the field of network technology, in particular to a method, device and system based on SSL (Secure Sockets Layer, Secure Sockets Layer) session. Background technique [0002] HTTPS (HyperTextTransferProtocoloverSecureSocketLayer, Hypertext Transfer Protocol Secure Socket Layer), is a security-oriented HTTP (HyperTextTransferProtocol, Hypertext Transfer Protocol) channel, simply speaking, it is a secure version of HTTP. That is, the SSL layer is added under HTTP, and the security basis of HTTPS is SSL, so the detailed content of encryption requires SSL. Because the SSL protocol requires asymmetric and symmetric large number calculations, it consumes a lot of resources. Large websites need to use SSLterminator (terminator) clusters to process the SSL protocol. [0003] In the current SSL cluster implementation, the active and standby dual-machine mode is generally adopted, or the LVS (Linux Virtual Server, Linux virtual ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/166H04L67/141H04L67/1001
Inventor 李鹏
Owner SINA COM TECH (CHINA) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products