Web communication encrypting method

An encryption method and cryptographic algorithm technology, applied in the field of encryption for Web communications, can solve the problems of difficult to effectively protect the confidentiality of sensitive data and user privacy, failure of handshake, and high cost of key negotiation, and achieve business flow optimization. And other web communication security applications, preventing third-party monitoring, easy to promote the effect of realization

Inactive Publication Date: 2007-08-22
PEKING UNIV
View PDF0 Cites 43 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Repeated negotiations directly lead to a sharp increase in the computing load of the server, and the increase in processing delays leads to handshake failures, which prevents the establishment of secure connections and seriously affects service quality.
Due to the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Web communication encrypting method
  • Web communication encrypting method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The specific implementation manner of the present invention will be described in more detail below in conjunction with the accompanying drawings.

[0040] Referring to Figure 2, the communication encryption method between the client (Client) and the server (Server) for the first time access user is as follows:

[0041] Step 1: Client -> Server: The client sends a ClientHello message to initiate a session connection.

[0042] The fields contained in ClientHello are shown in Figure 4. The message contains fields "ClientID", "Connect_Num", "random", and "ciphersuite". The "ClientID" field is the client ID, and it is "Null" for the first login; the "Connect_Num" field identifies the connection times of the client, and the value is 0 at the first login; the "random" field contains a random number (a one-time random number is used as a communication freshness identification character), the data is randomly generated by the client, including time stamp Tc and random query va...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for enciphering web-communication includes obtaining communication master cipher key provided from service end an storing said communication master cipher key by client end when first communication is carried out, only requiring to generate cipher key locally by calculation at service end when communication is carried out again, utilizing locally stored communication master cipher key to realize transmission of conversation cipher key by client end then using said conversation cipher key to carry out enciphering/deciphering on communication data by both parties for realizing secret communication.

Description

technical field [0001] The invention belongs to the fields of computer, communication and information security, and in particular relates to an encryption method for Web communication. Background technique [0002] With the rapid popularization of applications based on the World Wide Web, e-commerce has become a part of people's daily work and life. The growth of the Web has also brought us threats in terms of security and personal privacy. In general situations, web communication processes such as browsing web pages and sending and receiving emails are not able to provide sufficient security protection, which directly leads to the fact that communication data streams can be easily monitored and intercepted, tampered with, and replayed without knowing it, resulting in Serious consequences such as user sensitive information leakage, loss, and Web service failure. [0003] In order to ensure the security of the Web service, the security of the service flow between the client...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/12
Inventor 韦韬毛剑邹维王铁磊李佳静王伟
Owner PEKING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products