Method and system for realizing resource encrypted access

A resource and ciphertext technology, applied in transmission systems, electrical components, etc., can solve problems such as failure to receive user access requests in a timely manner, low business processing capabilities of business servers, affecting user experience and access quality, and achieve business processing Reduced capacity, reduced risk of leakage, effect of ensuring safety

Active Publication Date: 2021-01-01
TENCENT TECH (SHENZHEN) CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Because the process involved in decryption is very slow, it needs to consume a lot of CPU resources of the business server, and cannot receive more user access requests in a timely manner, resulting in low business processing capabilities of the business server, affecting user experience and access quality

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for realizing resource encrypted access
  • Method and system for realizing resource encrypted access
  • Method and system for realizing resource encrypted access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Typical embodiments that embody the features and advantages of the present invention will be described in detail in the following description. It should be understood that the present invention is capable of various changes in different embodiments without departing from the scope of the present invention, and that the description and illustrations therein are illustrative in nature and not limiting. this invention.

[0033] As mentioned above, the existing security access to resources in the business server is implemented based on the SSL protocol. With the cooperation of the SSL protocol, resource access through the HTTP protocol will first establish a connection between the client and the business server. The secure links between them provide security guarantees for subsequent resource access.

[0034] However, there is still a defect in this secure link, that is, for the business server, the establishment of a secure link with the client needs to consume more CPU r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for realizing resource encrypted access. The method for realizing resource encrypted access comprises the steps of: receiving a primary secret key ciphertext forwarded by a service server through a decryption server, wherein the primary secret key ciphertext is generated during the handshake of the service server and a client; and decrypting the primary secret key ciphertext according to a deployed private key certificate, so as to provide a primary secret key plaintext, wherein the primary secret key plaintext obtained through decryption is used for generating a secret key for resource encrypted access between the service server and the client. The system for realizing resource encrypted access corresponds to the method, and comprises the service server and the decryption server which interacts with the service server, wherein the decryption server comprises a receiving unit and a decryption unit. The method and the system can avoid the defect that the service server has low service processing capacity, and can improve the security of resource access.

Description

technical field [0001] The invention relates to the field of computer application technology, in particular to a method and system for realizing resource encrypted access. Background technique [0002] With the rise of emerging services such as e-commerce and online banking on the World Wide Web, it has greatly facilitated the daily life of users and has been favored by the majority of users. Since these emerging services all need to conduct online transactions on the network, they have higher requirements on the security of network communication than general services. However, the traditional World Wide Web HTTP protocol (Hyper Text Transfer Protocol, Hypertext Transfer Protocol) does not have a security mechanism, which leads to the fact that resource access to this type of emerging business using the traditional HTTP protocol cannot meet the security requirements. [0003] In order to solve the above-mentioned defects of resource access, a common solution is to add the S...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/0823H04L63/10
Inventor 沈坤余子军刘强
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products