Unlock instant, AI-driven research and patent intelligence for your innovation.

Data encryption and transmission method based on HTTP protocol

A technology of HTTP protocol and data encryption, applied in digital transmission systems, transmission systems, and key distribution, it can solve the problems of inability to effectively handle HTTP protocol and lose the advantages of HTTP, and achieve the effect of preventing illegal access to the network and securing data transmission services.

Inactive Publication Date: 2017-10-27
成都蓝码科技发展有限公司
View PDF4 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the use of HTTPS makes the gateway and proxy system unable to effectively handle the HTTP protocol, and loses the advantages of HTTP transmission on the network.
In addition, some authentication mechanisms, including Basic authentication, Digest authentication, OAuth, NTLM, etc., only protect the information in the HTTP header, but do not encrypt and authenticate the data in the HTTP message body.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the embodiments.

[0024] A data encryption transmission method based on HTTP protocol, said method comprising:

[0025] Step 1. A third party generates the key pair (cprivatekey, cpublickey) of the client, where cprivatekey is the private key of the client, cpublickey is the public key of the client, and the key pair (wprivatekey, wpublickey) of the server, where wprivatekey is the service The private key of the terminal, wpublickey is the public key of the server; and the public key in the client’s key pair is sent to the server, and the public key in the server’s key pair is sent to the client, which can be sent by a third party or It can be sent based on the request of the terminal, and the specific method is not limited, as long as the public key of the communication peer is available. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a data encryption and transmission method based on HTTP protocol. The method includes the following steps: a client acquires a parameter, calculates a parameter summary value, signs an abstract value by a client private key, obtains a signature value, encrypts a parameter and the signature value by using a public key of a server to obtain encrypted data and send it to the server; the server decrypts the received information, validates the selected parameters and verifies the signature, to achieve authentication of the client by the server; the same authentication method is used to achieve the authentication of the server by the client; after identity authentication of both parties, the client or server generates a session key and encrypts the contents of the HTTP message with the negotiated session key. Through the interaction of the method of the present invention, the client and the server complete two-way authentication and realize secure data transmission service, preventing users from illegally accessing the network, eavesdropping and stealing, replaying attacks and breaking the data transmitted over the network.

Description

technical field [0001] The invention belongs to the communication field, and in particular relates to an HTTP protocol-based data encryption transmission method. Background technique [0002] The HTTP protocol is a transmission protocol used to transmit hypertext from a WWW server to a local browser. It is a standard for request and response between the client and the server. Currently, most websites and app interfaces use the HTTP protocol. However, there are some deficiencies in the HTTP protocol. For example, the HTTP protocol uses clear text to send content, which itself does not have the function of encryption, and the content may be eavesdropped; neither the server nor the client using the HTTP protocol will verify the identity of the communicating party. May encounter camouflage, that is, it is impossible to determine whether the other party is communicating with the real intention, and it is impossible to identify whether the request is intercepted and replayed, and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/08H04L9/32
CPCH04L9/0869H04L9/3247H04L63/0442H04L63/0869H04L63/0876
Inventor 陈苏
Owner 成都蓝码科技发展有限公司