A method and device for identifying the existence of an intermediary
A middleman and identification unit technology, which is applied in the computer field, can solve the problems of information security threats and the inability to identify whether there is a middleman between the client and the server.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0040] In order to solve the problem that the client cannot identify whether there is an intermediary between the client and the server, Embodiment 1 of the present application provides a method for identifying the existence of an intermediary. The specific implementation flow diagram of this method is as follows: figure 2 shown, including the following steps:
[0041] Step 21, obtain the first certificate-related information of the server received by the client during the handshake process between the client and the server, and the second certificate-related information of the server received by the client during the non-handshake process between the client and the server ;
[0042] Step 22, judging whether the first certificate-related information matches the second certificate-related information.
[0043] Wherein, the above "certificate-related information" may include the certificate itself, or information closely related to the certificate, such as a hash value obtain...
Embodiment 2
[0068] Embodiment 2 provides a method for identifying a man-in-the-middle in the SSL layer (that is, the SSL proxy mentioned in the background technology section), thereby preventing users from sending confidential information to the man-in-the-middle, thereby preventing man-in-the-middle attacks.
[0069] A schematic diagram of the system architecture for implementing the method and figure 1 Similar and will not be repeated here. The following focuses on how to prevent man-in-the-middle attacks based on the system architecture.
[0070] Please refer to the attached image 3 , which is a specific implementation flowchart of the method provided in Embodiment 2. The process mainly includes the following steps:
[0071] 1. The client initiates an SSL handshake request to the server;
[0072] 2. The SSL proxy hijacks the SSL handshake request from the client;
[0073] 3. The SSL agent initiates an SSL connection request to the server;
[0074] 4. The server responds to the S...
Embodiment 3
[0086] In order to solve the problem that the client in the prior art cannot identify whether there is an intermediary between the client and the server, Embodiment 3 of the present application provides a device for identifying the existence of an intermediary. The specific structural diagram of the device is as follows Figure 4 As shown, it includes an information obtaining unit 41 and an identifying unit 42 .
[0087] Among them, the information obtaining unit 41 is used to obtain the first certificate-related information of the server received by the client during the handshake process between the client and the server, and the first certificate related information of the server received by the client during the non-handshake process between the client and the server. Information about the second certificate;
[0088] The identifying unit 42 is configured to determine whether the first certificate-related information obtained by the information obtaining unit 41 matches th...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


