Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network enciphered data virus detection and elimination system and proxy server and method

A proxy server and virus detection technology, applied in the field of network security, can solve the problems that data cannot be checked and attacked, and achieve the effect of reducing the spread of viruses and eliminating the risk of leakage

Active Publication Date: 2008-03-12
FORTINET
View PDF0 Cites 44 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since protocols based on SSL / TLS (Secure Sockets Layer / Transport Layer Security, Secure Sockets Layer / Transport Layer Security) (such as HTTPS (Hyper Text Transfer Protocol over SSL / TLS), SMTPS (Short Message Transmission Protocol over SSL / TLS), FTPS (FileTransfer Protocol over SSL / TLS), POP3S (Post Office Protocol version 3 overSSL / TLS), etc.), the communication data is encrypted, so security check and content filtering cannot be performed on this kind of data, which leads to The client is vulnerable to network attacks and security threats through SSL / TLS communication tunnels. These attacks and threats include: 1) network attacks and virus propagation targeting browser vulnerabilities through HTTPS, and phishing attacks (Phishing); 2) Spread of spam (Spam) through SMTPS / POP3S / FTPS, which are likely to carry viruses and phishing attack scripts; 3) Reverse connections that violate gateway access policies in SSL / TLS communication tunnels 4) Other possible attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network enciphered data virus detection and elimination system and proxy server and method
  • Network enciphered data virus detection and elimination system and proxy server and method
  • Network enciphered data virus detection and elimination system and proxy server and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0086] In the method for network encrypted data virus detection and elimination in Embodiment 1 of the present invention, when the encrypted FTPS protocol data passes through the FTPS proxy server 10, the FTPS proxy server 10 decrypts it into plaintext data, and performs virus detection on the plaintext data According to the detection result, the connection communication link between the FTPS server and the client is processed; for the plaintext data without virus, the FTPS proxy server 10 encrypts the plaintext data again and transmits it to the FTPS server.

[0087] FTPS is an enhanced TFP protocol that uses the standard FTP protocol and instructions in the secure socket layer, adding SSL security functions to the FTP protocol and data channels. FTPS is also known as "FTP-SSL" and "FTP-over-SSL".

[0088] FTP refers to the file transfer protocol, namely File Transfer Protocol, referred to as FTP, is a protocol used to transfer files from one host to another host. The FTP pr...

Embodiment 2

[0123] The method for network encrypted data virus detection and elimination in the embodiment of the present invention two, when encrypted SMTPS protocol data passes through SMTPS proxy server 10, SMTPS proxy server 10 decrypts it into plaintext data; SMTPS proxy server 10 to described plaintext data Carry out virus detection and removal, and process the connection communication link between the SMTPS server and the client according to the detection and elimination results; For the plaintext data that has no virus or virus elimination, the SMTPS proxy server 10 encrypts the plaintext data again and transmits it to SMTPS server.

[0124] SMTPS (SMTP protocol over TLS / SSL), is a simple mail transfer protocol (SMTP, Simple Mail Transfer Protocol) through the secure socket layer, and is an enhanced SMTP protocol that uses standard SMTP protocols and instructions at the secure socket layer , adding SSL security features to the SMTP protocol and data channels. SMTP provides a reli...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The utility model discloses a virus-detection and removing system, proxy server and method used for network encryption data. The system comprises a client, a server, a proxy server and a anti-virus unit, among which when the proxy server encrypts the data communication between the client and the server, the proxy client and the server will receive the transmitted data pack which is decrypted to the plaintext data and then sent to the anti-virus unit for virus examination and removing, so that the safety plaintext data are re-encrypted and then sent to the server. The anti-virus unit can detect and remove the virus from the plaintext data and inform the examining and removing results to the proxy sever, so as to reduce or even remove the network viral transmission via SSL / TLS cryptographic protocol.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a system, proxy server and method for detecting and eliminating network encrypted data viruses. Background technique [0002] SSL (Secure Sockets Layer, Secure Sockets Layer) is a network security transmission protocol developed by Netscape. It is currently the most important protocol used for secure data communication between point-to-point on the Internet, especially between Web browsers and servers. . It is implemented using data encryption (Encryption) technology. Because SSL has the advantages of wide application, low implementation cost, security and high efficiency, and simple operation, it has become the most widely used protocol in e-commerce systems. For example, most e-commerce application systems in the United States are based on the SSL protocol. [0003] The basic working principle of the SSL security proxy is: the SSL security proxy server and the Web br...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L29/06
Inventor 王磊
Owner FORTINET
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products