Method and server for establishing safe connection between client and server

A server security, client technology, applied in the field of mobile communication, to achieve the effect of improving user experience

Active Publication Date: 2012-12-19
BEIJING 58 INFORMATION TECH
View PDF5 Cites 44 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides a method for establishing a secure connection between a client and a server and a server to solve the problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and server for establishing safe connection between client and server
  • Method and server for establishing safe connection between client and server
  • Method and server for establishing safe connection between client and server

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0022] In order to solve the problem in the prior art that the client cannot safely and efficiently implement an encrypted session with the server in an unstable network environment (such as mobile terminals using mobile terminals such as mobile phones using wireless Internet access), the present invention provides a problem in a complex network environment. In the method and server for the client to efficiently establish a secure channel with the server, the technical solution of the embodiment of the present invention ensures that the user can quickly realize the safe exchange of data with the server regardless of the harsh network environment, thereby realizing the Internet service Access greatly improves user experience. The present invention will be further described in detail below in conjunction with the drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, but do not limit the prese...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a server for establishing safe connection between a client and a server. The method includes that the server acquires a connection initializing request sent by the client, determines an encryption key through consultation by an asymmetric encryption algorithm according to the connection initializing request so as to complete handshaking with the client; and the server uses the encryption key to be in communication with the client. By the aid of the technical scheme, safe data exchange between the client and the server can be quickly achieved in any severe network environments, and accordingly access to internet business is achieved. An original conversation can be quickly resumed when the conversation is interrupted accidentally, so that user experience is greatly improved.

Description

technical field [0001] The invention relates to the field of mobile communication, in particular to a method for establishing a secure connection between a client and a server and the server. Background technique [0002] In the prior art, the Secure Sockets Layer (Secure Sockets Layer, SSL for short) protocol is a standard protocol often used in network communication to ensure session security. The SSL protocol and its related protocols such as Secure Electronic Transaction (Secure Electronic Transaction, referred to as SET) and Transport Layer Security (Transport Layer Security, referred to as TLS) all use asymmetric encryption algorithms, symmetric encryption algorithms, and digest algorithms to Realize dynamic session key negotiation and session encryption, and at the same time realize the identity authentication of both communication parties. Among them, the symmetric encryption algorithm is an encryption method that uses the same key for encryption and decryption, and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
Inventor 朱为吴廷鹏沈剑周婧
Owner BEIJING 58 INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products