Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and device for identifying the existence of an intermediary

A middleman and identification unit technology, which is applied in the computer field, can solve the problems of information security threats and the inability to identify whether there is a middleman between the client and the server.

Active Publication Date: 2019-04-09
BANMA ZHIXING NETWORK HONGKONG CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0025] The embodiment of the present application provides a method for identifying the existence of an intermediary, which is used to solve the problem that the transmitted information may be subject to potential security threats because the client cannot identify whether there is an intermediary between the client and the server
[0026] The embodiment of the present application also provides a device for identifying the existence of an intermediary, which is used to solve the problem that the transmitted information may be subject to potential security threats because the client cannot identify whether there is an intermediary between the client and the server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for identifying the existence of an intermediary
  • A method and device for identifying the existence of an intermediary
  • A method and device for identifying the existence of an intermediary

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] In order to solve the problem that the client cannot identify whether there is an intermediary between the client and the server, Embodiment 1 of the present application provides a method for identifying the existence of an intermediary. The specific implementation flow diagram of this method is as follows: figure 2 shown, including the following steps:

[0041] Step 21, obtain the first certificate-related information of the server received by the client during the handshake process between the client and the server, and the second certificate-related information of the server received by the client during the non-handshake process between the client and the server ;

[0042] Step 22, judging whether the first certificate-related information matches the second certificate-related information.

[0043] Wherein, the above "certificate-related information" may include the certificate itself, or information closely related to the certificate, such as a hash value obtain...

Embodiment 2

[0068] Embodiment 2 provides a method for identifying a man-in-the-middle in the SSL layer (that is, the SSL proxy mentioned in the background technology section), thereby preventing users from sending confidential information to the man-in-the-middle, thereby preventing man-in-the-middle attacks.

[0069] A schematic diagram of the system architecture for implementing the method and figure 1 Similar and will not be repeated here. The following focuses on how to prevent man-in-the-middle attacks based on the system architecture.

[0070] Please refer to the attached image 3 , which is a specific implementation flowchart of the method provided in Embodiment 2. The process mainly includes the following steps:

[0071] 1. The client initiates an SSL handshake request to the server;

[0072] 2. The SSL proxy hijacks the SSL handshake request from the client;

[0073] 3. The SSL agent initiates an SSL connection request to the server;

[0074] 4. The server responds to the S...

Embodiment 3

[0086] In order to solve the problem that the client in the prior art cannot identify whether there is an intermediary between the client and the server, Embodiment 3 of the present application provides a device for identifying the existence of an intermediary. The specific structural diagram of the device is as follows Figure 4 As shown, it includes an information obtaining unit 41 and an identifying unit 42 .

[0087] Among them, the information obtaining unit 41 is used to obtain the first certificate-related information of the server received by the client during the handshake process between the client and the server, and the first certificate related information of the server received by the client during the non-handshake process between the client and the server. Information about the second certificate;

[0088] The identifying unit 42 is configured to determine whether the first certificate-related information obtained by the information obtaining unit 41 matches th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses a method for identifying the existence of an intermediary, which is used to solve the problem that the transmitted information may be subject to potential security threats because the client cannot identify whether there is an intermediary between the client and the server. The method includes: obtaining information related to the first certificate of the server received by the client during the handshake process between the client and the server, and related information related to the second certificate of the server received by the client during the non-handshake process between the client and the server. information; judging whether the first certificate-related information matches the second certificate-related information. The application also discloses a device for identifying the existence of an intermediary.

Description

technical field [0001] The present application relates to the field of computer technology, and in particular to a method and device for identifying the existence of an intermediary. Background technique [0002] In many cases, Internet users need to use non-private terminals to access the Internet, such as computers provided by companies or Internet cafes. For such terminal owners, their security requirements are not completely consistent with the security requirements of actual terminal users, and sometimes even conflict. For example, for actual users, they hope that their personal privacy, such as bank account and password, will not be prying while surfing the Internet; for enterprises, in order to prevent their internal secrets from being leaked maliciously or to improve the work efficiency of employees, they hope that Scan or audit the actual user's Internet traffic, so as to determine the specific information transmitted by the actual user using the terminal. [0003...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L9/40
Inventor 陈海兵
Owner BANMA ZHIXING NETWORK HONGKONG CO LTD