Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

TLS secure communication method and system

A technology of secure communication and counterparty, which is applied in the field of information communication security, can solve problems such as potential safety hazards, and achieve the effect of enhancing security and ensuring security

Active Publication Date: 2020-04-24
TIH MICROELECTRONIC TECH CO LTD +1
View PDF13 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The SSL / TLS protocol is a security protocol that provides security and data integrity for network security communications. A communication process of the SSL / TLS protocol is first initiated by the client, and the client sends the encryption suite supported by the end (including Asymmetric encryption algorithm for key exchange and symmetric encryption algorithm for data encryption), the server selects one of the suites and responds to the client, and then the client and server send key exchange information to each other to negotiate A set of keys for data transmission is issued, and then the key negotiation and data transmission between the two parties are encrypted; however, in this way, the entire key negotiation and key suite selection process is transmitted in plain text, and there is a certain degree of security Hidden danger

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • TLS secure communication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] In one or more implementations, a method for TLS secure communication is disclosed, such as figure 1 shown, including the following process:

[0036] (1) When using it for the first time, exchange the certificates of the server and the client through pre-installed certificates and other means in advance; before communicating with the two parties, first connect to the public cloud server to obtain the certificate (or key) of the other party, and then use the certificate ( key) to communicate with the other party. The certificate contains the public key of the certificate holder. The public key is not afraid of being leaked, and can make the other party confirm that the certificate really belongs to the holder rather than being impersonated.

[0037] Of course, the key exchange can also be realized by manually generating the key by the administrator and then notifying the communicating parties by telephone, email or manual delivery.

[0038] (2) All SSL / TLS plaintext da...

Embodiment 2

[0048] In one or more embodiments, a client is disclosed, which adopts the TLS secure communication method in Embodiment 1, and the client is configured to:

[0049] Get the certificate of the server;

[0050] Use the public key of the server certificate to encrypt the cipher suite and key exchange information and send them to the server;

[0051] Use your own private key to decrypt the received encryption suite selection and key exchange information from the server.

[0052] In other embodiments, a server is disclosed, which adopts the TLS secure communication method in Embodiment 1, and the server is configured as:

[0053] Get the client's certificate;

[0054] Use the public key of the client certificate to encrypt the encryption suite selection and key exchange information and send it to the client;

[0055] For the received client cipher suite and key exchange information, use your own private key to decrypt it.

Embodiment 3

[0057] In one or more implementations, a TLS secure communication system is disclosed, including: a client and a server, wherein,

[0058] The server and the client retrieve the certificates of each other respectively;

[0059] The client and the server respectively use the public key in the other party's certificate to encrypt the information to be sent to the other party;

[0060] Both the client and the server use their own private keys to decrypt the received information sent by the other party to achieve secure data transmission.

[0061] For the specific working mode of the above system, refer to the method disclosed in Embodiment 1, which will not be repeated here.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a TLS secure communication method. The method comprises the following steps: a server and a client call certificates of each other; encrypting an encryption suite and key exchange information sent by the client by adopting the public key of the server certificates; encrypting the encryption suite selection and key exchange information sent by the server by adopting the public keys of the client certificates; allowing the client to decrypt the received encryption suite selection and key exchange information sent by the server by using the private key of the client; and allowing the server to decrypt the received encryption suite selection and key exchange information sent by the client by using the private key of the server. The TLS secure communication method has the beneficial effects that the secure communication method is suitable for occasions with relatively high data transmission security requirements; synchronous updating of certificates of the two parties can also be included in the ciphertext, and safety is higher.

Description

technical field [0001] The present invention relates to the technical field of information communication security, in particular to a method and system for TLS secure communication. Background technique [0002] The statements in this section merely provide background information related to the present invention and do not necessarily constitute prior art. [0003] The SSL / TLS protocol is a security protocol that provides security and data integrity for network security communications. A communication process of the SSL / TLS protocol is first initiated by the client, and the client sends the encryption suite supported by the end (including Asymmetric encryption algorithm for key exchange and symmetric encryption algorithm for data encryption), the server selects one of the suites and responds to the client, and then the client and server send key exchange information to each other to negotiate A set of keys for data transmission is issued, and then the key negotiation and da...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L63/0435H04L63/0442H04L9/0825
Inventor 苏志远李冠卢方勇
Owner TIH MICROELECTRONIC TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products