Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

58 results about "Cipher suite" patented technology

A cipher suite is a set of algorithms that help secure a network connection that uses Transport Layer Security (TLS) or its now-deprecated predecessor Secure Socket Layer (SSL). The set of algorithms that cipher suites usually contain include: a key exchange algorithm, a bulk encryption algorithm, and a message authentication code (MAC) algorithm.

Transport layer security (TLS) channel constructing method based on cryptographic algorithm

ActiveCN103118027ASignature speed is excellentTransmissionKey exchangeSecure communication
The invention relates to the technical field of network safety and provides a transport layer security (TLS) channel constructing method based on a cryptographic algorithm. The TLS channel constructing method includes steps that: a server side launches a request and a client side respond to a hello message, or the client side launches the hello message; the server side responds to the hello message of the server side; the server side transmits an SM2 certificate to the server side and then transmits a hello completing message; the client side receives the hello completing message and then transmits a secret key exchange message; the client side transmits a cipher suite change message and a finishing message, and the server side transmits the cipher suite change message and the finishing message after receiving the finishing message of the client side; and the server side and the client side perform data safe transmission according to the agreed safety parameters after receiving the finishing messages of each other and passing verification. According to the TLS channel constructing method, the cryptographic algorithm is blended into a TLS protocol to perform safety communication, the signature speed is obviously superior to that of a remote signaling alarm (RSA) algorithm by aid of short secret key length, and the TLS channel constructing method is a data safety method with the 2048-bit safety level of the RSA algorithm.
Owner:CHINA FINANCIAL CERTIFICATION AUTHORITY

Transport layer security (TLS) handshaking method and device, and trusted third party (TTP)

The invention discloses a transport layer security (TLS) handshaking method, a TLS handshaking device and a trusted third party (TTP). The method comprises the following steps that: on the basis of the TLS handshaking process of two parties, a first party sends a question of the first party and a cipher suite list which is supported by the first party to the TTP; the TTP informs the first party of the question of the TTP, a temporary public key of the TTP and a TTP-first-party cipher suite; the first party informs the TTP of a first-party-TTP message authentication code by using a session key which is generated between the first party and the TTP; the TTP identifies the first-party-TTP message authentication code by using the session key which is generated between the first party and the TTP; after the first-party-TTP message authentication code passes identification, the TTP sends a TTP-first-party message authentication code to the first party; the first party identifies the TTP-first-party message authentication code; and if the TTP-first-party message authentication code passes identification, a secure tunnel between the first party and the TTP is established. The invention has the advantages that: on the basis of the TLS handshaking method of the two parties, the secure tunnel is established between the first party and the TTP, the security is improved, and high downward compatibility is realized.
Owner:CHINA IWNCOMM

Handshake method and system based on datagram secure transmission protocol

ActiveCN108650227ASatisfy the needs of safety, autonomy and controllabilityTake advantage ofKey distribution for secure communicationTransmission protocolComputer hardware
The invention refers to a handshake method and a handshake system based on a datagram secure transmission protocol. The handshake method comprises: sending a client greeting message to the server by the client, wherein the client greeting message contains a list of all domestic commercial cipher suites supported by the client; receiving and determining whether the client greeting message carries astateless message authentication code by the server: if so, calculating to obtain a message authentication code by using a domestic hash algorithm, and comparing with the message authentication codecarried by the client greeting message to authenticate the client; sending a server greeting message to the client after the authentication, and informing the client of the domestic commercial ciphersuite selected by the client; and replacing the key specification according to the selected domestic commercial cipher suite by the client and the server, thereby establishing a data transmission link. The invention is capable of meeting the requirement of self-controllable information security in China and fully utilizing the unique advantages of the domestic encryption algorithm, and is compatible with the original DTLS protocol, and convenient for horizontal expansion.
Owner:SUZHOU KEDA TECH

Systems and methods for computer digital certificate management and analysis

ActiveUS9531705B1Confirm complianceSecuring communicationDomain nameCommon name
Described herein are methods and systems for updating digital certificates on a computer and testing to confirm that the update was performed correctly. The testing may involve confirming that a server's common name (CN) and / or a server's subject alternative name (SAN) matches the domain name server (DNS) name utilized to access the server, confirming that, for all the certificates sent in chain, each certificate's expiration date is less than or equal to the expiration date of that certificate's parent certificate, confirming that the certificates' authority key identifier (AKI), subject key identifier (SKI), and / or authority information access (AIA) are in compliance, and comparing available cipher suites to a list of pre-approved cipher suites.
Owner:USAA

Cipher device using RC4 algorithm and method thereof

An encryption / decryption device and a method thereof use an RC4 algorithm to reduce a waiting time for encryption / decryption thereby avoiding data process delay. The encryption / decryption device includes a management unit, an encryption / decryption unit, and a first interface. The management unit includes a WEP seed key generator for generating a WEP seed key based on a transmitter address of first data and a cipher suite value representing a cipher protocol type for the transmitter address, an RC4 key scheduler for generating S-Box data using the WEP seed key, and an S-Box data memory storing the S-Box data generated from the RC4 key scheduler for the transmitter addresses. The encryption / decryption unit has a core for performing the RC4 algorithm-corresponding to the cipher suite, encrypting / decrypting the first data using the S-Box data transmitted from the management unit, and transmitting a signal for generating the S-Box data of second data to the management unit. The first interface transmits a control signal and a data signal between the management unit and the encryption / decryption unit.
Owner:ELECTRONICS & TELECOMM RES INST

Secure socket layer protocol extension method supporting domestic cipher algorithm

The invention discloses a secure socket layer protocol extension method supporting a domestic cipher algorithm. The secure socket layer protocol extension method comprises the following steps: adding a cipher suite supporting the domestic cipher algorithm into a secure socket layer extended source code of the secure socket layer protocol; setting corresponding parameters and alias for the cipher suite; establishing an algorithm provider for implementing the domestic cipher algorithm; establishing a corresponding relationship between the alias of the cipher suite and an implementation class of the algorithm provider. According to the secure socket layer protocol extension method provided by the invention, an operating mechanism of the SSL (secure socket layer) protocol is not changed and extra security problems are not caused; after adoption of the cipher suite supporting the domestic cipher algorithm, the domestic cipher algorithm can be used during handshake and interaction of the SSL, so that the safety performance of online banking is enhanced, and thus the secure socket layer protocol extension method has an important significance in autonomy and the product security of an online banking application system and the security of a whole system.
Owner:SHANDONG CVIC SOFTWARE ENG

Method and device for forwarding user datagram protocol message

The embodiment of the invention discloses a method and a device for forwarding a user datagram protocol message. After a proxy server receives the identifier and the secret key authentication code sent by the Internet of Things equipment, when the identifier is consistent with the stored identifier and the secret key authentication code corresponding to the stored identifier is consistent with thesecret key authentication code. The service information of forwarding service is sent to the Internet of Things equipment. Based on the at least one password suite sent by the Internet of Things device, a target password suite is sent to the Internet of Things device. Then, a first UDP message sent by the Internet of Things device is received. After the first UDP message comprises the position information and the first data of the target service server, the first UDP message is decrypted based on the target password suite to obtain the position information and the first data of the target server. Finally, the first data is sent to the target service server corresponding to the position information, thereby realizing forwarding of the UDP message completely based on the UDP protocol, and improving the safety of the UDP message.
Owner:CHINA MOBILEHANGZHOUINFORMATION TECH CO LTD +1

Method and computer for cryptographically protecting control communication in and/or service access to it systems, in particular in connection with the diagnosis and configuration in an automation, control or supervisory system

Automatically and dynamically ascertain by means of autoconfiguration whether used or activated and usable cipher suites and / or key lengths are sufficiently strong for current cryptographic protection of the control communication and / or other service access by virtue of 1) “cipher-suite”-based / -specific information available in the network / system being called up to ascertain reference cipher suites and / or 2) block chain information available in the network / system, containing data records referred to as “proof of work” for solving complex computation tasks, being called up or ascertained, with the ascertainment of block chain difficulty parameters as key length estimation parameters to ascertain appropriate reference key lengths, in particular reference minimum key lengths required for cryptoalgorithms, and 3) the ascertained reference cipher suites and / or the reference key lengths ascertained by the key length estimation parameters being compared with the used or activated and usable cipher suites and / or key lengths.
Owner:SIEMENS AG

Cryptographic policy filters and policy control method and apparatus

An apparatus for an integrated dynamic encryption and/or decryption for use in an application includes a policy filter, a policy filter module coupled to said policy filter, a service module coupled to said policy filter, and a cryptographic module, where the apparatus retrieves the cryptographic module and configures the policy filter in accordance with the cryptographic module and the policy filter module performs a plurality of verification upon the cryptographic module, and further where the service module is configured to generate a plurality of cipher suites and the policy filter is configured to filter the plurality of cipher suites in accordance with a predetermined policy filter parameters to generate a plurality of filtered cipher suites.
Moreover, an apparatus for an integrated dynamic encryption and/or decryption for use in an application includes storage means for storing a plurality of predetermined attributes and corresponding values, and a digital signature, a controller for controlling selective retrieval of said plurality of attributes and values, and said digital signature from said storage means, processing means for selectively processing said plurality of predetermined attributes and values, and said digital signature and in accordance thereto, providing a supportable encryption and/or decryption level to said application, compression means for compressing said plurality of attributes and values and in accordance thereto generating a compressed plurality of attributes and values for storing in said storage means, and decompressing means for decompressing said compressed plurality of attributes and values in accordance to said controller retrieving said compressed plurality of attributes and values.
Owner:META PLATFORMS INC

Security configuration method for Nginx server cipher suite of SSR

The invention discloses a security configuration method for an Nginx server cipher suite of an SSR, and relates to the field of website security configuration. The cipher suite of an Nginx server is rationally selected, and the cipher suite of an Nginx server of the SSR is increased and decreased to realize an expected encryption accessory. The security configuration method mainly comprises the following steps: 1) checking the SSR cipher suite; 2) carrying out security analysis on the SSR cipher suite; and 3) modifying the cipher suite in an Nginx server configuration file of the SSR. According to the security configuration method disclosed by the invention, different parts of the suites are analyzed and compared; the unsecure cipher suite is selected and forbidden; a client and a server can only use the cipher suite with high security; the transmission security of transmission layer information is guaranteed; and the security of the SSR is enhanced, so that the SSR runs more safely.
Owner:LANGCHAO ELECTRONIC INFORMATION IND CO LTD

Security configuration method of Tomact cipher suite of SSR

The invention provides a security configuration method of a Tomact cipher suite of SSR, and relates to the website security configuration field. The security configuration method includes the steps of: (1) checking an SSR cipher suite; (2) performing security analysis on the SSR cipher suite; and (3) modifying the cipher suite in a Tomcat configuration file of the SSR. Through addition and deletion of the cipher suite, the cipher suite wanted to be used is realized, and the SSR self security is increased.
Owner:LANGCHAO ELECTRONIC INFORMATION IND CO LTD

JSSE-based national secret encryption communication method and device, and storage medium

PendingCN113037480AResolve support issuesKey distribution for secure communicationPasswordEngineering
The invention discloses a JSSE-based national secret encryption communication method and device, and a storage medium. The method comprises the following steps: receiving a handshake request of a client; analyzing the handshake request through a JSSE target server, and generating handshake information; matching national secret information preset in a JSSE target server with the handshake information to obtain a matching result; when the matching result meets the national secret communication condition, enabling handshake operation to continue to be carried out through the reconstructed JSSE handshake process logic, and establishing a handshake relation with the client; and enabling the client side and the target server side to perform handshake so as to facilitate subsequent encryption communication, wherein the preset national password information comprises a national password version number which is expanded in a protocol version of the JSSE in advance and a password suite which is expanded in a JSSE password suite in advance and conforms to a national password specification. By correspondingly processing the handshake request of the client and returning the corresponding response data, national secret encryption communication based on JSSE is realized.
Owner:BEIJING THUNISOFT INFORMATION TECH

Bidirectional authentication method and device

The invention provides a bidirectional authentication method and device. The method comprises the steps: receiving a server certificate, a second random number, a target password suite and a server public key which are sent by a server in response to an authentication request, obtaining data in the server certificate if the server certificate is checked to be signed and issued by a preset signing and issuing mechanism; and if the data are consistent with the data provided by the server, generating a third random number, and generating a first main communication password through a preset key exchange algorithm; encrypting the third random number by using the server public key to obtain an encrypted third random number, and generating a client communication ciphertext by using the first main communication password and the target password suite; sending the encrypted third random number, the client certificate and the client communication ciphertext to the server; and after a server-side communication ciphertext returned by the server side is received, the server-side communication ciphertext is decrypted according to the first main communication password and the target password suite, and if data carried in the server-side communication ciphertext is not tampered, the bidirectional authentication is confirmed to pass.
Owner:中电金信软件有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products