Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information processing method and device based on secure socket layer protocol authentication

An information processing method and secure socket layer technology, applied in the field of communication, can solve the problems that firewall devices cannot be implemented, data security detection cannot be performed, firewall devices cannot be bidirectionally authenticated, etc.

Active Publication Date: 2019-08-30
NEW H3C SECURITY TECH CO LTD
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But for two-way authentication, its original intention is to enhance the security level of SSL authentication and avoid fake visitors (attackers) in the network. Therefore, no matter from the perspective of the SSL protocol itself or the security requirements of the service provider, Unable to support two-way authentication simply by forging a middleman in a one-way authentication scenario
On the one hand, unless the server installs a firewall certificate, the firewall device cannot complete two-way authentication by forging an intermediary; on the other hand, if the server installs a firewall certificate, it means that the firewall device must have the same certificate security detection capabilities as the server, This is not possible for firewall devices, and for servers, this "authorization" to install firewall certificates is not allowed
[0006] Therefore, during two-way authentication, the firewall device cannot obtain the encryption key negotiated between the user device and the server, and thus cannot decrypt the data transmitted between the user device and the server, and cannot perform security detection on the data.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information processing method and device based on secure socket layer protocol authentication
  • Information processing method and device based on secure socket layer protocol authentication
  • Information processing method and device based on secure socket layer protocol authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0037]SSL protocol authentication is divided into one-way authentication and two-way authentication. One-way authentication is the authentication of the user equipment to the server. Two-way authentication includes authentication of the server by the user equipment and authentication of the user equipment by the server.

[0038] For one-way authentication, a firewall certificate is installed on the user device, and a server certificate is installed on the firewall device. The user...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an information processing method and device based on secure socket layer protocol authentication. The firewall equipment respectively acquires a client randomnumber, a server random number, an encryption algorithm and encryption random data from a first handshake message, a second handshake message and a key exchange message which are interacted between the user equipment and the server. The firewall equipment sends the encrypted random data and the encryption algorithm to the server. the server decrypts the encrypted random data by using the private key of the server and an encryption algorithm to obtain the original random data, and sends the original random data to the firewall equipment. And the firewall equipment generates an encryption key for communication between the user equipment and the server according to the original random data, the client random number and the server random number. By applying the technical scheme provided by theembodiment of the invention, security detection can be carried out on the encrypted data subjected to SSL protocol bidirectional authentication.

Description

technical field [0001] The present application relates to the field of communication technology, and in particular to an information processing method and device based on secure socket layer protocol authentication. Background technique [0002] With the development of Internet technology, more and more devices are connected to the Internet. In order to improve the security of communication between two devices, a Secure Sockets Layer (English: Secure Sockets Layer, SSL for short) protocol is often used for authentication, to establish an SSL connection, and then to encrypt transmitted data. SSL protocol authentication is divided into one-way authentication and two-way authentication. One-way authentication is the authentication of the user equipment to the server. Two-way authentication includes authentication of the server by the user equipment and authentication of the user equipment by the server. [0003] For one-way authentication, the SSL protocol authentication can...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0838H04L9/0869H04L9/0819H04L63/168H04L63/0869H04L63/02H04L63/0435
Inventor 岳炳词乔兴华
Owner NEW H3C SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products