Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security configuration method of Tomact cipher suite of SSR

An encryption suite and security configuration technology, applied in computer security devices, electrical components, instruments, etc., can solve serious and high-impact problems, achieve safe operation, use with confidence, and ensure safety

Inactive Publication Date: 2016-06-15
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The use of SSL / TLS encrypted communication ensures that the communication content cannot be directly viewed by malicious attackers in plain text at the transport layer, and encryption protects access to the web. However, due to the emergence of some high-risk vulnerabilities in SSL / TLS in recent years, the consequences are also very serious. It has a great impact, and for the use of tomcat, it is necessary to make a reasonable selection of its encryption suite

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security configuration method of Tomact cipher suite of SSR
  • Security configuration method of Tomact cipher suite of SSR
  • Security configuration method of Tomact cipher suite of SSR

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The content of the present invention is described in more detail below:

[0018] A security configuration method for the tomcat cipher suite of SSR, by selecting or adding the default cipher suite, disabling insecure encryption, the format and components of the cipher suite are as follows figure 1 As shown, each suite begins with "SSL" or "TLS", followed by the key exchange algorithm. Use the word "With" to separate the key exchange algorithm, encryption algorithm, and hash algorithm (the separation may not exist), for example: SSL3_DHE_RSA_WITH_DES_CBC_MD5, which means that DHE_RSA (temporary Diffie-HellMan with RSA digital signature) is defined as the encrypted Key exchange algorithm; define DES_CBC as encryption algorithm; define MD5 as hash algorithm.

[0019] But the format is not fixed. For example, there is a writing method like TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, but you can understand its meaning after you are familiar with it. More than 128 refers to the key ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a security configuration method of a Tomact cipher suite of SSR, and relates to the website security configuration field. The security configuration method includes the steps of: (1) checking an SSR cipher suite; (2) performing security analysis on the SSR cipher suite; and (3) modifying the cipher suite in a Tomcat configuration file of the SSR. Through addition and deletion of the cipher suite, the cipher suite wanted to be used is realized, and the SSR self security is increased.

Description

technical field [0001] The invention relates to the field of website security configuration, in particular to a communication security configuration method for SSR Tomact encryption suite. Background technique [0002] With the development of computer technology, web applications are becoming more and more extensive, and the security requirements for B / S architecture software are getting higher and higher. Now it is vigorously developing network security. At the same time, due to the existence of malicious attackers and black industries, the The requirements for network information security are also constantly increasing; how to effectively improve the security of products, ensure the reliability of software and the ease of use of users has become an urgent technical problem to be solved. The solution to this problem can be divided into many parts of security configuration and reinforcement from a technical point of view; here we only talk about the security configuration of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06G06F21/57
CPCH04L63/0428G06F21/57G06F21/577H04L63/166
Inventor 李鹏
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products