Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure data transmission method and device of middleware based on hybrid cipher suite

A hybrid cipher and cipher suite technology, applied in the field of information security, can solve the problems of uncontrollable data transmission security and uncontrollable security strength of foreign standard cipher algorithms.

Inactive Publication Date: 2017-05-31
BEIJING CHINA POWER INFORMATION TECH +3
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the cipher suites used by the client to establish a secure connection with the middleware all use foreign standard cipher algorithms, and the key length of foreign standard cipher algorithms determines the security strength of foreign standard cipher algorithms. Export restrictions lead to uncontrollable security strength of foreign standard cryptographic algorithms
In addition, some foreign standard cryptographic algorithms have security backdoors, resulting in uncontrollable data transmission security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure data transmission method and device of middleware based on hybrid cipher suite
  • Secure data transmission method and device of middleware based on hybrid cipher suite
  • Secure data transmission method and device of middleware based on hybrid cipher suite

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0095] In order to enable those in the technical field to have a better understanding of the use of mixed cipher suites for middleware and clients to securely transmit data, first introduce in detail how middleware and clients generate symmetric keys according to the SSL / TLS handshake protocol in the embodiment of the present invention process.

[0096] see figure 2 , is a flow chart of the middleware and the client using a mixed cipher suite to generate a symmetric key in the embodiment of the present invention, and the specific steps may include:

[0097] Step S201: The middleware negotiates with the client to use the national commercial asymmetric encryption algorithm in the mixed cipher suite as the algorithm for the middleware to decrypt and encrypt the pre-master key, and generates an encrypted pre-master key with the client key algorithm.

[0098] In order for the middleware and the client to generate a symmetric key, both the middleware and the client must obtain th...

Embodiment 2

[0135] A secure connection needs to be established between the middleware and the client using a mixed cipher suite for secure data transmission. The embodiment of the present invention introduces in detail the process of establishing a secure connection between the middleware and the client. The embodiment of the present invention is based on Embodiment 1, namely On the basis that both the middleware and the client have obtained the symmetric key, the middleware and the client establish a secure connection according to the SSL / TLS handshake protocol.

[0136] see Figure 4 , is a flow chart of establishing a secure connection between the middleware and the client on the basis of obtaining a symmetric key in the embodiment of the present invention, and the specific steps may include:

[0137] Step S400: The middleware decapsulates the encapsulated encrypted data request information sent by the client, and securely connects with the client at the SSL / TLS layer.

[0138] When t...

Embodiment 3

[0149] The embodiment of the present invention introduces in detail the process of establishing a secure connection between the client and the middleware. The embodiment of the present invention is based on Embodiment 1, that is, on the basis that both the client and the middleware have obtained a symmetric key. The SSL / TLS handshake protocol specifies the secure connection established with the middleware.

[0150] see Figure 5 , is a flow chart of the client establishing a secure connection with the middleware on the basis of obtaining the symmetric key in the embodiment of the present invention, and the specific steps may include:

[0151]Step S500: the client sends encapsulated encrypted data request information to the middleware, wherein the key used in the encrypted data request information is the symmetric key obtained by the method in Embodiment 1.

[0152] The client encapsulates the encrypted data request information according to the HTTPS protocol, and sends the en...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secure data transmission method and device of middleware based on a hybrid cipher suite. The secure data transmission method is used by a client to obtain necessary data from a server securely. According to the secure data transmission method provided by the invention, the hybrid cipher suite is adopted during the secure data transmission between the middleware and the client, and the hybrid cipher suite comprises a national commercial asymmetric cryptography algorithm, a digest algorithm and a foreign standard symmetric cryptography algorithm. The secure data transmission between the middleware and the client comprises the following steps: firstly, in a secure connection establishment process of the middleware and the client, generating a symmetric key by using the hybrid cipher suite, and establishing a secure connection by the middleware and the client by comparing the digest values of both parties; and finally, encrypting the data necessary for the client by the middleware on the basis of the secure connection established by the both parties to obtain encrypted data, sending the encrypted data to the client, and decrypting the encrypted data by the client by using a negotiated key to obtain the necessary data.

Description

technical field [0001] The invention relates to the fields of application server middleware and information security, in particular to a data security transmission method and device based on a mixed cipher suite middleware. Background technique [0002] Today, the client can get data from the server on demand. In order to improve the security of data transmission between the client and the server, data can be safely transmitted between the client and the server through middleware (application server middleware). [0003] Middleware is a basic software platform located under the application software and above the network, operating system, and database. It provides services such as name, transaction, security, message, and data access for the application, and provides a development, deployment, operation, and management support environment for the application. , the data is transmitted between the client and the server, and the middleware acts as a transfer station to ensure...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 廖明耀张立新贾冀芳齐志超苑桐牟鹏晋琦苏丹吴佳
Owner BEIJING CHINA POWER INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products