Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure network establishment method and system based on secure module

A security module and security network technology, which is applied in the field of SE-based security network construction, can solve problems such as high security, higher user knowledge requirements, and insufficient security, so as to reduce operating costs, ensure safe transmission, and reduce the risk of leakage Effect

Inactive Publication Date: 2018-11-13
WATCHDATA SYST +1
View PDF10 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Disadvantages of VPN virtual private network: (1) Operator support is required, and the cost is high; (2) Most of them are soft implementations, and the security is not high enough; (3) Users are required to have certain computer knowledge
[0007] Disadvantages of IPSec: (1) It is usually established on top of VPN, and its security is higher than that of VPN; (2) VPN has disadvantages, but requires higher knowledge of users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure network establishment method and system based on secure module
  • Secure network establishment method and system based on secure module
  • Secure network establishment method and system based on secure module

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] Such as figure 1 As shown, a security network construction system based on the SE security module includes a client and a server, and the system also includes:

[0039] The security module SE is set between the client / server and the network, and is used to encrypt or decrypt the message data transmitted between the client and the server;

[0040] The distribution module is used to distribute a key to the security module according to the distribution factor.

[0041] Such as figure 2 As shown, a method for building a secure network based on a security module includes the following steps:

[0042] (1) disperse a key into the security module according to the dispersal factor, step S21;

[0043] (2) Deploy the security modules respectively between the client / server and the network, step S22;

[0044] (3) Encrypt or decrypt message data transmitted between the client and the server through the security module, step S23.

[0045] In the present embodiment, in step (1), ...

Embodiment 2

[0068] In this embodiment, the IPv4 message before encryption is as follows Figure 5 Shown (refer to rfc791).

[0069] in:

[0070] data is plain text

[0071] After encryption, Total Length and Header Checksum should be modified according to the specification.

[0072] The encrypted message such as Figure 6 shown.

[0073] in:

[0074] 1) The overall structure conforms to international standards (refer to rfc791).

[0075] 2) The Data field contains the following contents: dispersion factor, plaintext length, ciphertext (including plaintext padding characters), signature (optional).

[0076] 3) The value of Total Length is the original plaintext length + dispersion factor length + plaintext padding characters.

[0077] 4) Header Checksum is recalculated with the new value (refer to rfc791).

[0078] It can be seen from the above embodiments that the method and system of the present invention can ensure the security of data in network transmission through the encrypt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a secure network establishment method and system based on a secure module and belongs to the technical field of Internet security. The method provided by the invention comprises the following steps of (1), scattering a key to the secure module according to a scattering factor; (2), deploying the secure module between a client / server and a network; and (3), encrypting or decrypting message data transmitted between the client and the server through the secure module. Through adoption of the method and the system provided by the invention, on the basis of an encryption / decryption function of the secure module, the security of the data in network transmission is ensured, and the cost for establishing a transitional VPN (Visual Private Network) is reduced.

Description

technical field [0001] The invention belongs to the technical field of Internet security, and in particular relates to a secure network construction method and system based on SE (Secure Element, security module). Background technique [0002] At present, there are two main solutions to achieve secure transmission on the public network: [0003] The technical scheme of prior art 1: VPN (Visual Private Network virtual private network). [0004] VPN is a remote access technology, simply speaking, it is to use a public network to set up a private network. For example, if an employee of a company goes on a business trip and wants to access server resources on the intranet, this type of access is remote access. The function of the VPN virtual private network is: to establish a private network on the public network for encrypted communication. It is widely used in enterprise network. The VPN gateway realizes remote access by encrypting the data packet and converting the destin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32H04L9/30H04L9/06
CPCH04L9/0625H04L9/0631H04L9/302H04L9/3247H04L9/3249H04L63/0435H04L63/0442
Inventor 陆勇王幼君
Owner WATCHDATA SYST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products