Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data encryption communication terminal method and device, terminal, server and storage medium

A technology of data encryption and communication methods, applied in the usage of multiple keys/algorithms, transmission systems, electrical components, etc., can solve the problems of server-side private key leakage, security loopholes, and the urgent need to improve encryption effects, so as to improve data encryption. Effect, encryption effect improved effect

Pending Publication Date: 2021-05-04
EVERSEC BEIJING TECH
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the current transport layer security protocol still has the problem of leaking the server-side private key. Since the certificate carrying the public key can be obtained normally, the attacker can use the leaked server-side private key and public key to construct a fake server-side as The real server side steals the private data of the client
It can be seen that there are security loopholes in encryption according to the current transport layer security protocol, and the encryption effect needs to be improved urgently

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption communication terminal method and device, terminal, server and storage medium
  • Data encryption communication terminal method and device, terminal, server and storage medium
  • Data encryption communication terminal method and device, terminal, server and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] figure 2 It is a flow chart of the data encryption communication method provided by Embodiment 1 of the present invention. This embodiment is applicable to the situation where the client and the server establish a connection based on the transport layer security protocol handshake process, and perform data encryption communication through the connection. The method It can be executed by the client, and specifically includes the following steps:

[0054] Step 210: Continuously execute multiple transport layer security protocol handshake processes with the server to obtain multiple symmetric encryption keys.

[0055] Wherein, the first symmetric encryption key obtained in the first handshake process is used to encrypt the message in the second handshake process, and the second symmetric encryption key is obtained through the second handshake process; the first handshake process and the second handshake process are For any two adjacent handshake processes in the multiple...

Embodiment 2

[0107] image 3 It is a flowchart of the data encryption communication method provided by Embodiment 2 of the present invention. This embodiment is applicable to the situation where the server and the client establish a connection based on the transport layer security protocol handshake process, and perform data encryption communication through the connection. The method It can be executed by the server side, specifically including the following steps:

[0108] Step 310: Obtain multiple symmetric encryption keys in response to multiple consecutive TLS protocol handshake processes initiated by the client.

[0109] Among them, the first symmetric encryption key obtained in the first handshake process is used to decrypt the message in the second handshake process, and the second symmetric encryption key is obtained through the second handshake process; the first handshake process and the second handshake process are For any two adjacent handshake processes in the multiple transp...

Embodiment 3

[0168] Figure 4 It is a schematic diagram of the structure of the data encryption communication device provided by the third embodiment of the present invention. This embodiment is applicable to the situation where the client and the server establish a connection based on the handshake process of the transport layer security protocol, and perform data encryption communication through the connection. The device It may be located at the client side, specifically including: a multiple handshake process initiation module 410 and a first data transmission module 420 .

[0169] The multiple handshake process initiation module 410 is used to continuously execute multiple transport layer security protocol handshake processes with the server to obtain multiple symmetric encryption keys; where the first symmetric encryption key obtained by the first handshake process is used for the second The message in the handshake process is encrypted, and the second symmetric encryption key is obt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data encryption communication terminal method and device, a terminal, a server and a storage medium, and the method comprises the steps: continuously executing a multi-time transport layer security protocol handshake process with a server side, and obtaining a plurality of symmetric encryption keys, wherein the message in the second handshake process is encrypted by using a first symmetric encryption key obtained in the first handshake process, a second symmetric encryption key is obtained through the second handshake process, the first handshake process and the second handshake process are any two adjacently executed handshake processes in multiple transport layer security protocol handshake processes, and the first handshake process is executed before the second handshake process; and according to the execution sequence of the multiple transport layer security protocol handshake processes, sequentially using the plurality of symmetric encryption keys to carry out data transmission with the server side. According to the method and the device, the counterfeited server side can be identified, so the data encryption effect is improved, the counterfeited server side cannot correctly decrypt the received encrypted data, and the data transmission security is improved.

Description

technical field [0001] Embodiments of the present invention relate to network communication security technologies, and in particular to a data encryption communication terminal method, device, terminal, server and storage medium. Background technique [0002] With the vigorous development of the Internet and the updating and upgrading of communication technology, a large amount of information needs to be transmitted through the network, which contains a large amount of private information that needs to be protected. In order to ensure the security of information transmission and prevent these important information from being stolen and maliciously used, Data needs to be encrypted during network communication. [0003] At present, the industry standard protocol for confidential communication on the Internet is the Transport Layer Security protocol (Transport Layer Security, TLS), which can provide security and data integrity protection for Internet communications, browsers, m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/14
CPCH04L63/0435H04L9/14H04L63/1416H04L63/166
Inventor 秦立军梁彧田野傅强王杰杨满智蔡琳金红陈晓光
Owner EVERSEC BEIJING TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products