Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network node encryption method and network node encryption device

A network node and encryption method technology, applied in the Internet field, can solve problems such as poor security of network nodes, easy leakage of encryption certificates, complicated encryption process of network nodes, etc., to achieve the effect of avoiding leakage and improving security

Active Publication Date: 2019-06-25
TENCENT TECH (SHENZHEN) CO LTD +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] Embodiments of the present invention provide a network node encryption method and a network node encryption device that can automatically encrypt network nodes, thereby improving the security of the network node; The encryption process is complex, and because the encryption certificate is easy to leak, the technical problem of poor security of network nodes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network node encryption method and network node encryption device
  • Network node encryption method and network node encryption device
  • Network node encryption method and network node encryption device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Referring to the drawings, wherein like reference numerals represent like components, the principles of the present invention are exemplified when implemented in a suitable computing environment. The following description is based on illustrated specific embodiments of the invention, which should not be construed as limiting other specific embodiments of the invention not described in detail herein.

[0035] In the following description, specific embodiments of the present invention are described with reference to steps and symbols for operations performed by one or more computers, unless otherwise stated. Accordingly, it will be understood that the steps and operations, which at times are referred to as being performed by a computer, include manipulation by a computer processing unit of electronic signals representing data in a structured form. This manipulation transforms the data or maintains it at a location in the computer's memory system that can reconfigure or ot...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network node encryption method, which includes receiving a node encryption request, and obtaining node data information of the network node according to the node encryption request; using the node data information, applying for an encryption certificate to a trusted third party; receiving the certificate verification request, And according to the certificate verification request, associate the preset link of the network node with the verification file corresponding to the certificate verification request, so as to return the association result to the trusted third party; receive the encryption certificate, and deploy the encryption certificate on the network node. The invention also provides a network node encryption device. The network node encryption method and network node encryption device of the present invention can use the node data information of the network node to automatically apply for an encryption certificate from a trusted third party, and use the encryption certificate to perform encryption operations on the network node, avoiding the leakage of the encryption certificate and improving the security of network nodes.

Description

technical field [0001] The invention relates to the Internet field, in particular to a network node encryption method and a network node encryption device. Background technique [0002] CDN (Content delivery network, content distribution network) is a computer network system connected to each other through the Internet, which can use the server closest to each user to deliver music, pictures, videos, applications and other files faster and more reliably. Send to other users, thus providing high-performance, scalable, and low-cost web content. [0003] In order to improve the security of CDN network nodes, network content providers often perform encryption operations on CDN network nodes. The process of this encryption operation includes: [0004] 1. First, the network content provider provides the basic information of the network node to the trusted third party, such as network node name, network domain name information and certificate request file (CSR, Certificate Secure...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/0823H04L9/3268H04L9/321
Inventor 魏伟
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products