Unlock instant, AI-driven research and patent intelligence for your innovation.

Establishing secure data exchange channel method, client and computer-readable medium

A data exchange and client-side technology, which is applied in the direction of secure communication devices, digital transmission systems, user identity/authority verification, etc., and can solve problems such as inability to access data

Active Publication Date: 2020-08-04
胡雪松
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Man-in-the-middle (MITM) attacks are a huge challenge for people to accept online data hosting services provided by different providers, because there is no technology to ensure that the service provider itself cannot access the data it hosts

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Establishing secure data exchange channel method, client and computer-readable medium
  • Establishing secure data exchange channel method, client and computer-readable medium
  • Establishing secure data exchange channel method, client and computer-readable medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] Reference is now made in detail to the embodiments and examples illustrated in the accompanying drawings. In the following detailed description, numerous non-limiting specific details are set forth to assist in the understanding of the subject matter presented herein. It will be apparent, however, to one skilled in the art that various alternatives may be employed and the subject matter may be practiced without these specific details without departing from the scope of the claims. Referring now to the figures, exemplary block diagrams of data processing environments in which illustrative embodiments may be implemented are provided. It should be understood that the drawings are exemplary only and are not intended to assert or imply any limitation as to the environments in which different embodiments may be practiced. Many modifications to the depicted environments may be made.

[0014] figure 1 A block diagram of a client-server computer network environment is depicte...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for authenticating a data exchange channel between a first client, a second client and a server is provided. The first client and the second client exchange a sequence of updates to the information item, and each of the first client, the second client and the server maintains a respective copy of a history of the update sequence to the information item. First, the first client sends a security audit query from the first client to the server, the security audit query includes an audit identifier shared by the first client and the second client. After receiving the query response from the server, the first client compares the update sequence history in the query response with a corresponding copy of the update sequence history held by the first client. When the update sequence history in the query response differs from the update sequence history kept by the first client, the first client marks the data exchange channel as unsafe and terminates the exchange of updates to the information item with the second client.

Description

technical field [0001] The present application relates generally to computer security technology, and in particular to establishing a secure data exchange channel that can prevent man-in-the-middle attacks by verifying the security of the channel in an anonymous manner using audit queries from users of the channel. Background technique [0002] In cryptography and computer security, a man-in-the-middle (MITM) attack is an attack in which attackers can surreptitiously intercept and possibly change data that communicates with each other, either directly or indirectly via a third party that does not compromise the security of the data communication. Data exchanged between parties. Man-in-the-middle (MITM) attacks are a huge challenge for people to accept online data hosting services provided by different providers, because there is no technology to guarantee that the service provider itself cannot access the data it hosts. Contents of the invention [0003] The purpose of th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3247H04L63/0442H04L63/08H04L9/002H04L9/083H04L9/0891H04L63/126H04L63/1466
Inventor 胡雪松
Owner 胡雪松