Proxy method for improving SSL algorithm intensity of browser

A browser and algorithm technology, applied in the field of network security, can solve problems such as changing the way users use, incompatibility with old and new users, etc., to achieve the effect of expanding algorithm support

Active Publication Date: 2013-07-03
KOAL SOFTWARE CO LTD
View PDF5 Cites 43 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] The present invention aims at the problems existing in the prior art, such as changing the user's usage mode and incompatibility with old and new users, when increasing the strength of the browser's algorithm, and

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Proxy method for improving SSL algorithm intensity of browser
  • Proxy method for improving SSL algorithm intensity of browser
  • Proxy method for improving SSL algorithm intensity of browser

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In order to make the technical means, creative features, goals and effects achieved by the present invention easy to understand, the present invention will be further described below in conjunction with specific illustrations.

[0033] Since the proxy method for HTTPS (that is, SSL) in the HTTP protocol is mainly through the CONNECT method (http: / / tools.ietf.org / html / rfc2616#section-9.9), that is, the proxy server is only responsible for forwarding the browser and TCP packets between target servers without other processing, so when using HTTPS proxy, the actual SSL handshake still occurs between the browser and the server, and the supported algorithms are also determined by the browser.

[0034] Based on the principle of above-mentioned HTTPS proxy agreement, the present invention provides a kind of proxy method that strengthens browser SSL algorithm strength, and this method is a kind of HTTPS relay agent, and its main principle is as follows:

[0035] First install a ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a proxy method for improving SSL (security socket layer) algorithm intensity of a browser, and belongs to the technical field of network security. The method comprises the steps of 1, intercepting an SSL data package initiated by the browser, 2, simulating a remote SSL server to accomplish a low-intensity SSL handshake with the browser, and 3, adopting a higher-intensity algorithm to accomplish formal certification and handshake with the remote SSL server. With the adoption of the method, an algorithm support of the available browser can be expanded effectively, particularly a support for a national standard encryption algorithm can be expanded; complete transparence to a user is achieved; and the user is not required to change a using habit.

Description

technical field [0001] The invention belongs to the network security technology, and in particular relates to the encryption algorithm technology of the network browser. Background technique [0002] HTTPS (HTTP over SSL) technology is widely used in the WEB environment, mainstream browsers such as Internet Explorer, Firefox, Safari, etc. all support the HTTPS protocol. [0003] Among them, the SSL handshake protocol consists of four types of algorithms: [0004] Authentication algorithm A: such as RSA, ECDSA, etc.; [0005] Key exchange algorithm K: such as RSA, ECDH, etc.; [0006] Symmetric encryption algorithm E: such as DES, AES, RC4, etc.; [0007] According to the digest algorithm M: such as MD5, SHA-1, etc. [0008] The SSL algorithms supported by different operating systems and browser versions are different. Due to the export restrictions of the US Department of Commerce, some high-strength algorithms cannot be used in the Chinese version environment, and due t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L29/08
Inventor 掌晓愚杨茂江谭武征应哲峰陈海雷
Owner KOAL SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products