Unlock instant, AI-driven research and patent intelligence for your innovation.

General intermediate network service establishing method and system facing encryption data

A technology for encrypting data and intermediate networks, applied in the Internet field, can solve problems such as lack of versatility and huge security risks

Active Publication Date: 2016-03-23
TSINGHUA UNIV
View PDF5 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Even if this method is properly used by network operators, there are still huge security risks, and it is not universal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • General intermediate network service establishing method and system facing encryption data
  • General intermediate network service establishing method and system facing encryption data
  • General intermediate network service establishing method and system facing encryption data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The implementation of the present invention will be described in detail below in conjunction with the drawings and examples.

[0028] Such as figure 1 As shown, in the general encrypted data-oriented intermediate network service architecture, the following modules are included:

[0029] Key Manager (KeyManager): The key manager is deployed in the user equipment. On the one hand, the key manager is responsible for communicating with various applications using data encryption protocols, obtaining session keys from applications to share with intermediate network devices on demand, and providing APIs to allow applications to actively register session keys to key management On the other hand, when the intermediate network device is authenticated and allowed to share the key, the session key is encrypted and sent to the intermediate network device.

[0030] Permission Manager (PermissionManager): The permission manager is deployed in the user device. On the one hand, the a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a general intermediate network service establishing method and system facing encryption data. Internal user equipment shares a communication secret key of itself to trustable intermediate network equipment via secret key sharing protocols, and thus, the trustable intermediate network equipment is allowed to obtain and modify plaintext communication data. According to the invention, the secret key sharing mechanism is used, the network user is allowed to share the session secrete key to the trusted intermediate network device, the communication safety is ensured, and the trusted intermediate service is allowed to read plaintext data to provide high-quality network service.

Description

technical field [0001] The invention belongs to the technical field of the Internet, and in particular relates to a method and system for constructing a general encrypted data-oriented intermediate network service. Background technique [0002] With the rapid development of the Internet, the Internet that was originally designed to have a streamlined core is no longer streamlined, and the complex functions that were originally on the edge began to move to the center. Inside the network, there are more and more network applications or intermediate network devices, which play an important role in the operation of the network, such as firewalls, intrusion detection systems, and so on. Most intermediary network devices require access to cleartext data to function properly. With the frequent occurrence of information leakage incidents in recent years, network content providers increasingly use encrypted transmission protocols to protect users' privacy. Most encrypted transmissi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/062H04L63/08H04L63/083
Inventor 崔勇刘聪范权吴建平
Owner TSINGHUA UNIV