Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for negotiating session key

A technology of session secret key and negotiation message, applied in the field of data processing, can solve the problems of affecting user experience, long service request response time, long interaction process between client and server, etc., to meet session privacy and shorten interaction time. , the effect of shortening the response time

Active Publication Date: 2020-11-03
ALIBABA GRP HLDG LTD
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The interaction process between the client and the server is long, resulting in a long response time for the client's business request, which affects the user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for negotiating session key
  • Method and device for negotiating session key
  • Method and device for negotiating session key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] See figure 1 , figure 1 It is a flow chart of a method for negotiating a session key provided by an embodiment of the present invention. The flow chart is described from the perspective of a client, and the method includes steps 101-103.

[0037] Step 101, the client sends a message to the server; the message includes: a data message and a negotiation message, the data message is generated after encrypting business data using first private information, and the first private The information is generated by the client using an asymmetric encryption algorithm.

[0038] In the embodiment of the present invention, the client refers to a device capable of loading an application program and communicating with the server through the application program. Such as mobile phones, notebooks, tablets, wearable devices, computers and other terminal devices. The client can be a mobile terminal or a fixed terminal device.

[0039] The server serves the client, such as providing reso...

Embodiment 2

[0064] See image 3 , image 3 A flow chart of another method for negotiating a session key provided by an embodiment of the present invention is described from the perspective of a client, and the method includes steps 301-303.

[0065] Step 301: The client judges whether the service has a replay attack risk according to the session service type, if not, perform steps 302, 303 and 304; if yes, perform steps 305 and 304.

[0066] Among them, the essence of steps 302-303-304 is that during the negotiation phase of the session key between the client and the server, the client and the server simultaneously perform business data interaction. This communication mode eliminates the need to negotiate the session key The network delay caused by packet interaction; this mode is called 0-RTT mode in the present invention. The implementation process of this mode can refer to figure 2 .

[0067] Among them, the essence of steps 305-304 is that the client first negotiates the session ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and device for negotiating a session secret key. The method includes the following steps that: a client sends a message to a server, wherein the message is generated in manner that the client generates first private information by using an asymmetric encryption algorithm, encrypts service data in a data message through using the first private information and combines the data message with a negotiation message so as to obtain the message; the client receives a response message sent by the server, wherein the response message carries the response packet of the data message and the response packet of the negotiation message, wherein the response packet of the negotiation message carries a second private information ciphertext; and the client decrypts the second private information ciphertext according to the first private information to obtain second private information and generates the session secret key based on the first private information and the second private information and in accordance with the same algorithm which is agreed upon by the client and the server. With the method and device of the invention adopted, network delay caused by message exchange in a negotiation stage can be omitted, the response time of the service request of the client can be shortened, and user experience can be improved.

Description

technical field [0001] The invention relates to the field of data processing, in particular to a method and device for negotiating a session key. Background technique [0002] Information security and privacy protection is one of the major challenges facing the Internet age. On traditional PCs, HTTPS is often used to solve the problems of information security and privacy protection. In order to ensure the confidentiality and reliability of the session, the client must first negotiate a session key with the server when initiating a session, and finally, the client and the server use the session key negotiated by both parties to communicate. [0003] At present, the commonly used method for negotiating session keys is that the client first sends a Hello request to the server, and the server responds to the client's Hello request by sending the client a certificate issued by an authority, which contains the server's public key. The certificate is used to prove to the client t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06
Inventor 陈虓将钟沛华
Owner ALIBABA GRP HLDG LTD