General intermediate network service establishing method and system facing encryption data
A technology for encrypting data and intermediate networks, applied in the Internet field, can solve problems such as lack of versatility and huge security risks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0027] The implementation of the present invention will be described in detail below in conjunction with the drawings and examples.
[0028] Such as figure 1 As shown, in the general encrypted data-oriented intermediate network service architecture, the following modules are included:
[0029] Key Manager (KeyManager): The key manager is deployed in the user equipment. On the one hand, the key manager is responsible for communicating with various applications using data encryption protocols, obtaining session keys from applications to share with intermediate network devices on demand, and providing APIs to allow applications to actively register session keys to key management On the other hand, when the intermediate network device is authenticated and allowed to share the key, the session key is encrypted and sent to the intermediate network device.
[0030] Permission Manager (PermissionManager): The permission manager is deployed in the user device. On the one hand, the a...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 