Unlock instant, AI-driven research and patent intelligence for your innovation.

Self-encryption and self-deployment method of enterprise private key based on content distribution network

A content distribution network and private key technology, applied in the encryption field of content distribution network, can solve the problems of enterprises unable to deploy private keys by themselves, security risks, and inability to control deployment time.

Active Publication Date: 2017-02-15
CHINANETCENT TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] The purpose of the present invention is to solve the security risks caused by the private key delivery and use in the process of enterprise SSL acceleration, the problem that the enterprise cannot deploy the private key by itself, and the problem that the deployment time cannot be controlled

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Self-encryption and self-deployment method of enterprise private key based on content distribution network
  • Self-encryption and self-deployment method of enterprise private key based on content distribution network
  • Self-encryption and self-deployment method of enterprise private key based on content distribution network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The detailed features and advantages of the present invention are described in detail below in the specific embodiments, the content of which is sufficient to enable any person skilled in the art to understand the technical content of the present invention and implement it accordingly, and according to the specification, claims and drawings disclosed in this specification , those skilled in the art can easily understand the related objects and advantages of the present invention.

[0057] The technical scheme of the present invention mainly involves the process that the private key encryption client, the content distribution network management center, and the content distribution network server client cooperate with each other to complete the deployment.

[0058] This method includes the following key points:

[0059] (1) Private key encryption The client encrypts the SSL private key and certificate with the encryption password set by the enterprise itself.

[0060] (2...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an enterprise private key self-encryption and self-arrangement method based on a content distribution network. The enterprise private key self-encryption and self-arrangement method comprises the steps of encrypting a content to be arranged by a private key encryption client, and sending the content to a content distribution network management center, wherein the private key encryption client permits a user to self-set an encryption password during encryption; if a ciphertext is successfully sent, generating a ciphertext ID by the content distribution network management center, and returning the ciphertext ID to the private key encryption client; if the user selects to immediately arrange a private key, allowing the user to input the ciphertext ID and the encryption password at the private key encryption client, and connecting the ciphertext ID and the encryption password with a platform of the content distribution network management center for verification; after the content distribution network management center receives an arrangement instruction of the private key encryption client, performing availability verification on a certificate which corresponds to the ciphertext ID and the private key; if the certificate and the private key pass the availability verification, performing self pre-arrangement through the platform of the content distribution network management center; if the pre-arrangement is successful, allowing the user to self-arrange all nodes.

Description

technical field [0001] The invention relates to an encryption technology of a content distribution network (CDN), in particular to a technology of self-set password encryption of an enterprise private key, whole-process ciphertext transmission, automatic deployment, and self-controllable deployment time. Background technique [0002] SSL (Secure Sockets Layer, Secure Sockets Layer) is a security protocol, the purpose of which is to provide security and data integrity guarantee for network communication. SSL technology implements a security protocol on the transmission communication protocol (TCP / IP), adopts public key technology, and provides data encryption, server authentication, message integrity, and optional client authentication for TCP / IP connections. Therefore, SSL is widely used in the transmission encryption of sensitive data on the Internet, and has become the industry standard for secure communication on the Internet. Current web browsers generally combine HTTP ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08
Inventor 洪珂梁龙虎周炬蓉
Owner CHINANETCENT TECH