Man in the middle monitoring system adopting configurable way for HTTPS (Hypertext Transfer Protocol over Secure Socket Layer)

A technology of monitoring system and configuration method, applied in the field of Internet security, can solve problems such as difficulty in large-scale application

Inactive Publication Date: 2015-12-23
ANHUI XINHUABO INFORMATION TECH
View PDF4 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This step can only be performed by obtaining the right to use the user's computer or through a Trojan horse, which is difficult to apply on a large scale

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Man in the middle monitoring system adopting configurable way for HTTPS (Hypertext Transfer Protocol over Secure Socket Layer)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0031] The embodiment of the present invention provides a configurable HTTPS man-in-the-middle monitoring system, which is set between the client 1 and the server 3, and includes an encrypted data preprocessing module 21, a man-in-the-middle agent module 22, and a configuration tampering page module 23 , login information parsing module 24; Wherein

[0032] The encrypted data preprocessing module 21 is the most front-end module in the system, and is mainly responsi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a man in the middle monitoring system. The man in the middle monitoring system comprises an enciphered data preprocessing module, a man in the middle proxy module, a configuration tampering page module and a login information resolution module. A man in the middle proxy function from an HTTP (Hyper Text Transport Protocol) to an HTTPS (Hypertext Transfer Protocol over Secure Socket Layer) is implemented through the man in the middle proxy module, and page functions are tempered according to configuration. Moreover, an HTTP man in the middle proxy function can be implemented between a user client and a server, and transformation from HTTP connection to HTTPS connection is supported. Different login interactions can be configured through the configuration tampering page module, so that login cheating of different websites is realized. The page functions are tampered according to configuration, and a login information function is resolved according to configuration.

Description

technical field [0001] The invention relates to the field of Internet security, in particular to a communication network protocol HTTPS protocol monitoring and analysis technology. Background technique [0002] The SSL protocol is one of the most commonly used security protocols on the Internet. It can use certificates to verify the identity of the server and encrypt interactive information to prevent attackers from eavesdropping. SSL was originally released by Netscape in 1995, and IETF (Internet Engineering Task Force) standardized it in 1999, namely TLS (Transport Layer Security). After several revisions, the current TLS1.3 version was proposed in 2008. This version of the standard has been able to prevent many attacks on the protocol, such as CBC (Cipherblockchaining), etc. At the same time, the encryption algorithm and key used by the protocol are becoming more and more secure. . Compared with other security protocols, SSL is relatively simple to deploy and use, and h...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0815H04L67/02H04L67/56
Inventor 张炎季弘叶益群崔春
Owner ANHUI XINHUABO INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products