Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data transmission method and device based on key authentication

A data transmission method and key technology, which is applied in the field of data transmission methods and devices based on key verification, can solve problems such as leaking, increasing private keys, and easy leaking of private keys, so as to ensure security and reduce the probability of leaking Effect

Active Publication Date: 2019-02-01
GUIZHOU BAISHANCLOUD TECH CO LTD
View PDF6 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0045] 1) Copies of the private key widely exist in multiple servers, and the possibility of private key leakage increases due to attacks
[0046] 2) For CDN and other types of network service providers, since the services of the SSL / TLS protocol are provided by these manufacturers, the user provides the private key to the service provider to increase the possibility of private key leakage
[0065] The existing data transmission process applied to the TLS1.3 protocol has the problem that the private key is easily leaked, and the existing process needs to be improved to ensure the security of the private key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data transmission method and device based on key authentication
  • Data transmission method and device based on key authentication
  • Data transmission method and device based on key authentication

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment

[0145] Such as Figure 8 As shown, the data transmission method based on key verification in this specific embodiment includes the following steps:

[0146] Step 801, the client generates a client shared key (key_share) and determines a signature algorithm (signature_algorithm). The client initiates a TLS1.3 handshake, and sends a client hello (ClientHello) message to the server, which includes the client's shared secret key and signature algorithm (signature_algorithm).

[0147]Step 802, the server receives the client hello (ClientHello) message, and parses the client shared key (key_share) and signature algorithm (signature_algorithm) from the message. The server generates a server-side shared secret key, sends a server-side greeting (ServerHello) message to the client, and carries the server-side shared secret key in this message.

[0148] Step 803, the client and the server respectively generate a handshake secret (Handshake Secret) and an application secret (Application...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data transmission method and device based on key authentication. The method comprises the following steps: sending digital certificate information to a client by a server, and sending summary information of the digital certificate information and a combined unique identifier value including a handshake information context information identifier and a digital certificate information identifier to a key server; determining a private key corresponding to the digital certificate information by the key server according to the summary information, signing the combined unique identifier value by using the private key, sending a signature value to the server, and sending the signature value to the client by the server; and after the client verifies that the signature value is valid by using a public key corresponding to the digital certificate information, carrying out data interaction by the client and the server. According to the data transmission method provided bythe invention, the problem of the server that the private key must be deployed at the front end and the client executes TLS 1.3 handshaking is solved, and the private key and a certificate are deployed on different equipment, so that the server cannot read private key contents, thus the probability of private key leakage is reduced, and the safety of the private key is guaranteed.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a data transmission method and device based on key authentication. Background technique [0002] There is a handshake in the current Secure Socket Layer (Secure Socket Layer, SSL) / Transport Layer Security protocol (TransportLayer Security, TLS) protocol (including the following versions: SSL3.0, TLS1.0, TLS1.1, TLS1.2) links. [0003] In some existing related technologies, a "no private key" solution is proposed for the SSL / TLS protocol of TLS1.2 and previous versions (SSL3.0, TLS1.0, TLS1.1). During the protocol handshake process, it is processed based on the flow of the specific protocol, so that the server does not need to deploy the private key text locally. [0004] In other existing related technologies, in the handshake link, the servers of the two parties to the handshake need to use the private key corresponding to the digital certificate to complete the handsha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3247H04L9/3263H04L63/0428H04L63/06H04L63/0823
Inventor 杨洋苗辉
Owner GUIZHOU BAISHANCLOUD TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products