High-concurrency SSL session management method
A session management and session object technology, applied in electrical components, transmission systems, etc., can solve the problems of SSL server performance degradation, CPU resource consumption, and transmission performance degradation, and achieve the goals of streamlining SSL session structure, reducing search overhead, and flexible management Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
specific Embodiment approach 1
[0024] Specific implementation mode one: combine figure 1 To illustrate, this embodiment is a highly concurrent SSL session management method, comprising the following steps: a step of simplifying the structure of the SSL session object by compressing the data field of the protocol session object; a step of efficiently managing the structure of the SSL session object through a large hash table; Steps to time an SSL session by using a timer trigger mechanism.
specific Embodiment approach 2
[0025] Specific implementation mode two: this implementation mode is a further limitation to specific implementation mode one, and the steps for simplifying the SSL session object structure by compressing the protocol session object data field are as follows:
[0026] Represent each SSL client or server in the network with an SSL session structure;
[0027] Use the standard five-tuple to uniquely represent all sessions;
[0028] To judge the traffic scenario, for the dual-arm traffic scenario, use a pair of session objects to represent the SSL client and server respectively; for the single-arm traffic scenario, use a session object to represent;
[0029] Use ssl_state, tcp_state, type, src_ip, src_port, dst_ip, dst_port, SSL_PCB, TCP_PCB, input and output buffer queue, session timer to represent the basic structure of the session, and the ssl_state and tcp_state are protocol state automata realized based on finite state automata ; The type demarcates the session object class...
specific Embodiment approach 3
[0030] Specific implementation mode three: this implementation mode is a further limitation to specific implementation mode two, and the described steps of efficiently managing the SSL session object structure through a large hash table are:
[0031] Calculate the hash value of the hash table through the five-tuple, and the calculation formula is as follows:
[0032] key=hash(type, src_ip, src_port, dst_ip, dst_port)=(type+src_ip+src_port+dst_ip+dst_port)%
[0033] Locate the hash value to the head of the linked list. If the head of the linked list is empty, it means that there is no corresponding session. If it is not empty, loop through the five-tuple of sessions in the linked list to find the required session.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



