Safety communication system

A secure communication and security technology, applied in the Internet field, can solve problems such as hindering informatization and weak authentication mechanisms, and achieve the effects of reducing risks, improving security and reliability, and ensuring safe transmission

Inactive Publication Date: 2015-04-29
BEIJING QIHOO TECH CO LTD +1
View PDF5 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Furthermore, more and more important information is circulating in the network, but the network application authentication mechanism in the browser is wea

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety communication system
  • Safety communication system
  • Safety communication system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0018] Example one:

[0019] Reference figure 1 , Shows a step flow chart of an embodiment of a method for implementing a secure browser according to an embodiment of the present invention, which may specifically include the following steps:

[0020] Step 102: Start an encryption sub-process that communicates with the main service process of the browser in the browser client, where the encryption sub-process is used as a connection agent to implement the conversion from the first encrypted channel to the second encrypted channel, and the data Forward.

[0021] For some websites, such as banking websites, Alipay websites and other websites involving financial services, it is necessary to transmit encrypted data through the HTTP (HTTP-Hypertext transfer protocol) channel aimed at security, but sometimes the main business process of the browser It uses a different encryption protocol or algorithm with the web server, so that the two cannot communicate directly and cannot access the web...

Example Embodiment

[0033] Embodiment two:

[0034] On the basis of the foregoing embodiment, this embodiment continues to discuss the implementation method of the secure browser.

[0035] Reference figure 2 , Shows a step flow chart of an embodiment of a method for implementing a secure browser according to an embodiment of the present invention, which may specifically include the following steps:

[0036] Step 202: Start an encryption sub-process that communicates with the main service process of the browser in the browser client, where the encryption sub-process is used as a connection agent to implement the conversion from the first encrypted channel to the second encrypted channel, and the data Forward.

[0037] In this embodiment, the encryption sub-process that is started in the browser client to communicate with the main service process of the browser can be automatically started by the browser. Specifically, when the main service process of the browser fails to communicate with the web server, ...

Example Embodiment

[0124] Example three

[0125] On the basis of the above embodiment, this embodiment also discloses a secure communication system.

[0126] Reference Figure 5 , Shows a structural block diagram of an embodiment of a secure communication system according to an embodiment of the present invention.

[0127] Reference Image 6 , Shows a structural block diagram of a secure browser device in an embodiment of a secure communication system according to an embodiment of the present invention.

[0128] The secure communication system includes: a secure browser device 504 and a web server 502.

[0129] The network server 502 is configured to establish an encrypted connection communication with the secure browser device; and after the encrypted connection communication is successfully established, perform business data interaction with the secure browser device through a second encrypted channel.

[0130] The secure browser device 504 includes: a browser main service process module 50402 and an enc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a safety communication system. The system comprises a safety browser device and a network server. The safety browser device comprises a browser main service process module and an encryption subprocess module, wherein an encryption subprocess of the encryption subprocess module serves as a connecting agency to achieve conversion from a first encryption channel to a second encryption channel and data forwarding, encryption connection communication is established through the encryption subprocess module and the network server, safety transmission of service data is guaranteed, the risk of service data leakage can be reduced, and the safety and reliability of service data transmission are improved.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a secure communication system. Background technique [0002] A browser refers to a software that can display the content of HTML files on a web server or file system and allow users to interact with these files. The browser mainly interacts with the web server and obtains the web page through the HTTP protocol, and displays images, animations, text, video, sound, and streaming media for the user on the web page. It is one of the most widely used client programs. Common browsers on personal computers include Microsoft's IE, Apple's Safari, Google's Chrome, 360 Safe Browser, Sogou High Speed ​​Browser, etc. [0003] With the rapid development of the Internet, network applications have become a trend, and more and more network applications can be realized in the browser, such as online securities, online banking, e-government, e-commerce, online office, etc. Furthermore, more...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/0478H04L9/40
Inventor 杭程石彦伟贾正强
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products