Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Hypertext transfer protocol secure (HTTPS) service deployment method

A server and private key technology, applied in the direction of electrical components, transmission systems, etc., can solve problems such as prolonging the handshake process time, reducing user experience, keyserver reliability and performance bottlenecks, and achieving reduced operation and maintenance costs, high security, and weakened effect of influence

Active Publication Date: 2017-02-15
成都知道创宇信息技术有限公司
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method requires network communication with the keyserver during each handshake process, which prolongs the time of the handshake process and reduces user experience.
At the same time, the reliability and performance of keyserver become the bottleneck of the whole system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hypertext transfer protocol secure (HTTPS) service deployment method
  • Hypertext transfer protocol secure (HTTPS) service deployment method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. The method of the present invention does not deploy the private key at the CDN node, but deploys the encrypted private key on the key server, and the CDN node obtains the encrypted key and the decryption method from the key server, and stores them in the memory. During the handshake process, the private key is decrypted for handshake, and it is cleared from the memory immediately after the handshake is completed. Since there is no plaintext private key deployed on the node, there is only a plaintext private key in the memory at the moment of the handshake, even if it is extremely difficult to obtain the private key when logging in to the node. It does not need to interact with the key server every time it is accessed, and has minimal impact on system performance and reliability.

[0026] Such as figure 1 As shown in , the private key...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a hypertext transfer protocol secure (HTTPS) service deployment method. The method comprises the following steps that a private key server is set, and a content distribution network (CDN) node downloads an encrypted private key and a decryption method from the private key server and stores the encrypted private key and the decryption method in a memory of the CDN node; when a client and a server shake hands, the server uses the private key to decrypt, and uses the decryption method in the memory to decrypt a secret key, so as to complete a handshake process; after the handshake process is completed, a plaintext private key is emptied immediately; after handshake succeeds, the client and the CDN node communicate through symmetrical secret keys; and the CDN node forwards a client request to a source station, and returns a feedback result of the source station to the client, so as to complete an access process. According to the method, the private key is not deployed in the CDN node, the encrypted private key is deployed in the private key server, the private key is encrypted and the encrypted private key and the corresponding decryption method are used as data to transmit and store, the client uses the data in the memory to access without being intervened by the private key server, so that the performance and reliability of the system are improved.

Description

technical field [0001] The invention relates to the field of HTTPS services, in particular to a method for deploying HTTPS services without deploying a source site private key. Background technique [0002] As HTTP services become more and more widely used, HTTP services that transmit content in clear text are facing increasing security issues, especially sensitive information such as payment and transactions. HTTPS emerges as an encrypted transmission protocol application based on public-private key technology. It prevents HTTP service data from being stolen and tampered by adding an SSL encrypted data transmission layer between the TCP and HTTP layers. Currently, most mainstream websites use this technology, and more and more websites use this technology. [0003] The use of this technology requires the deployment of public keys, private keys and certificates on the server side. Data encrypted by the public key can be decrypted by the private key, and vice versa, data en...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/06H04L63/062H04L63/168H04L67/02
Inventor 赵晨晖王小虎罗意石函王春鹏
Owner 成都知道创宇信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products