Configuration method and device of cipher suite

A technology of cipher suite and configuration method, applied in the field of network communication, can solve the problems of cipher algorithm suite number conflict, SSLVPN equipment cannot be sold to another country, SSLVPN equipment cannot be used universally, etc., to achieve the effect of increasing flexibility

Inactive Publication Date: 2009-10-21
HUAWEI DIGITAL TECH (CHENGDU) CO LTD
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the sensitivity of cryptographic issues, some countries or regions have their own special cryptographic algorithm requirements, and these cryptographic algorithms are different, and when each country or region numbers its own, it may cause conflicts in the numbering of these cryptographic algorithm suites. For example, two different countries have stipulated the same number, but this number represents different cipher algorithm suites, which will cause the SSL VPN devices sold in these two countries

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Configuration method and device of cipher suite
  • Configuration method and device of cipher suite

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] The embodiment of the present invention provides a method for configuring a cipher suite. When the device is used for the first time or needs to be reconfigured, the region code is configured, and the cipher suite corresponding to the region code is selected in the cipher suite list according to the configured region code, so that the device can Through a simple region selection configuration, the configuration of the cipher suite is completed, which solves the problem that each region defines the same suite number for different cipher suites. The devices in this embodiment of the present invention refer to an SSL VPN client and an SSL VPN server.

[0016] Such as figure 1 As shown, it is a flow chart of the configuration method of the cipher suite in the embodiment of the present invention, which specifically includes the following steps:

[0017] Step S101, obtaining a preset cipher suite list, the cipher suite list includes region code table items, and a cipher suit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a configuration method and a device of a cipher suite. The configuration method of a cipher suite comprises the steps: obtaining a preset cipher suite list, wherein the cipher suite list comprises a region code list item, and one cipher suite is uniquely determined by a suite serial number and a region code together; configuring the region code, and selecting the cipher suite corresponding to the region code according to the region code in the cipher suite list. The embodiment selects the cipher suite corresponding to the region code according to the configured region code in the obtained cipher suite list so as to realize the selection of the cipher suite according to the region code, solves the problem that the cipher suite of equipment in different regions can conflict with each other, and increases the flexibility of the equipment.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of network communication, and in particular to a method and device for configuring a cipher suite. Background technique [0002] With the rapid development and popularization of the Internet, more and more businesses rely on network technology, such as e-commerce, e-government and so on. With the development of Web (web page) applications, the increase of remote access, and the highlight of network security issues, VPN (Virtual Private Network, virtual private network) equipment has become a hot spot in the security product market. VPN devices can be classified into SSL (Secure Socket Layer, Secure Socket Layer) VPN, IPsec (Internet Protocol Security, Internet Protocol Security) VPN, etc. according to different technical protocols implemented. Among them, SSL VPN is based on the SSL protocol to realize the application of virtual private network. [0003] IETF (Internet Engineering...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/36H04L9/32
Inventor 黄敏刘利锋
Owner HUAWEI DIGITAL TECH (CHENGDU) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products