Network node encryption method and network node encryption device

A network node and encryption method technology, applied in the Internet field, can solve problems such as poor security of network nodes, easy leakage of encryption certificates, complicated encryption process of network nodes, etc., to achieve the effect of improving security and avoiding leakage

Active Publication Date: 2017-01-04
TENCENT TECH (SHENZHEN) CO LTD +1
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] Embodiments of the present invention provide a network node encryption method and a network node encryption device that can automatically encrypt network nodes, thereby improving the security of the network node; The encryption process is complex, and because the encryption certificate is easy to leak, the technical problem of poor security of network nodes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network node encryption method and network node encryption device
  • Network node encryption method and network node encryption device
  • Network node encryption method and network node encryption device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Please refer to the drawings, in which the same reference numerals represent the same components, and the principles of the present invention are exemplified by being implemented in a suitable computing environment. The following description is based on illustrated embodiments of the invention and should not be construed as limiting other embodiments of the invention not detailed herein.

[0035] In the following description, specific embodiments of the present invention will be described with reference to steps and symbols of operations performed by one or more computers, unless otherwise stated. Thus, it will be appreciated that the steps and operations, which are mentioned several times as being performed by a computer, include manipulation by a computer processing unit of electronic signals representing data in a structured format. This manipulation transforms the data or maintains it in a location in the computer's memory system, which can be reconfigured or otherw...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network node encryption method. The network node encryption method comprises the following steps: receiving a node encryption request, and obtaining node data information of a network node according to the node encryption request; using the node data information to propose an encryption certificate request for a trusted third party; receiving a certificate verification request, associating a preset link of the network node with a verification file corresponding to the certificate verification request according to the certificate verification request so as to return an association result to the trusted third party; and receiving an encryption certificate, and deploying the encryption certificate on the network node. The invention further provides a network node encryption device. By adopting the network node encryption method and the network node encryption device provided by the invention, the encryption certificate can be automatically applied for the trusted third party by using the node data information of the network node, and the network node is encrypted by using the encryption certificate, thereby avoiding the leakage of the encryption certificate and improving the security of the network node.

Description

technical field [0001] The invention relates to the Internet field, in particular to a network node encryption method and a network node encryption device. Background technique [0002] CDN (Content delivery network, content distribution network) is a computer network system connected to each other through the Internet, which can use the server closest to each user to deliver music, pictures, videos, applications and other files faster and more reliably. Send to other users, thus providing high-performance, scalable, and low-cost web content. [0003] In order to improve the security of CDN network nodes, network content providers often perform encryption operations on CDN network nodes. The process of this encryption operation includes: [0004] 1. First, the network content provider provides the basic information of the network node to the trusted third party, such as network node name, network domain name information and certificate request file (CSR, Certificate Secure...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/0823H04L9/3268H04L9/321
Inventor 魏伟
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products