Method and system for bypass audit of HTTPS data packets

A data packet and bypass technology, which is applied in the field of security management and WEB business audit, can solve problems such as inability to encrypt sensitive information, information leakage, etc., and achieve the effect of strengthening the security analysis ability of web business

Active Publication Date: 2016-11-16
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF2 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These businesses all involve sensitive information. For example, HTTP plaintext transmission method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for bypass audit of HTTPS data packets
  • Method and system for bypass audit of HTTPS data packets
  • Method and system for bypass audit of HTTPS data packets

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] First of all, it should be explained that the present invention relates to the technical fields of Web auditing and security management, and is an application of computer technology in the technical field of information security. During the implementation of the present invention, the application of multiple software function modules will be involved. The applicant believes that, after carefully reading the application documents and accurately understanding the realization principle and purpose of the present invention, combined with existing known technologies, those skilled in the art can fully implement the present invention by using their software programming skills. All the software functional modules mentioned in the application documents of the present invention belong to this category, and the applicant will not list them one by one.

[0040] Below in conjunction with accompanying drawing and specific embodiment the present invention is described in further deta...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to WEB business audit and the security management technology, and is aimed to provide a method and a system for bypass audit of HTTPS packets. The method for bypass audit of HTTPS data packets comprises a step of acquiring data packets through a bypass, a step of extracting a key, a step of parsing the key, a step of decrypting a pre-master-secret, a step of generating a master secret, a step of generating keys and initiative vectors, and a step of decrypting the coded data packets, thus decrypting the data packets having no need of WEB business audit. The method for decrypting encrypted data packets can help IT organizations to enhance web business security analyzing capability. Furthermore, the method for auditing encrypted data packets includes web accessing behavior analysis and web performance analysis.

Description

technical field [0001] The invention relates to the technical field of WEB business auditing and security management, in particular to a method and system for bypass auditing HTTPS data packets. Background technique [0002] In the WEB application, the user terminal performs data transmission between the browser platform and the WEB server. At present, most WEB applications and websites are transmitted in clear text through the Hypertext Transfer Protocol HTTP. [0003] With the development of WEB applications, data transmission between browsers and WEB servers involves various services, such as instant messaging services, online payment services, online banking services, or securities system services. These businesses all involve sensitive information, such as HTTP plaintext transmission, which cannot be encrypted, resulting in the risk of information leakage. [0004] In order to improve the security of data transmission, data transmission between the browser and the WEB...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08
CPCH04L67/02
Inventor 胡冬范渊王志强
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products