Method, device and system for encrypting transmission data, controlling and detecting encrypted protocol

An encryption protocol and encrypted transmission technology, applied in the field of Internet data transmission, can solve the problems of lack of control ability on the business server and affect user experience, and achieve the effect of improving experience and improving control ability.

Inactive Publication Date: 2018-06-12
ALIBABA GRP HLDG LTD
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This technology allows clients who want encrypted connections on their own servers (the main technical effect) to connect securely without having direct communication between them or sending an email message that describes how it works over different networks like HTTPS). It also includes methods to efficiently manage session establishment requests from multiple sources while ensuring security during these sessions. Overall, this system enhances network performance and efficiency when connecting users' devices wirelessly at home.

Problems solved by technology

The technical problem addressed in this patented text relates to improving the efficiency and effectiveness of securely transmitting private sensitive information over internet connections (such as credit card numbers). Current methods have limitations due to excessive usage of encryption algorithms during repeated tries when trying new ones without success. Additionally, current solutions require significant resources from both users' own devices like smartphones and tablets.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for encrypting transmission data, controlling and detecting encrypted protocol
  • Method, device and system for encrypting transmission data, controlling and detecting encrypted protocol
  • Method, device and system for encrypting transmission data, controlling and detecting encrypted protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0089] In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. However, the present invention can be implemented in many other ways different from those described here, and those skilled in the art can make similar extensions without violating the connotation of the present invention, so the present invention is not limited by the specific implementations disclosed below.

[0090] The first embodiment of the present application provides a method for encrypting transmission data. Please refer to figure 1 , which shows a flowchart of a method for encrypting transmission data provided according to an embodiment of the present application. The following combination figure 1 Describe in detail. This embodiment is a method for encrypting data transmission provided from the perspective of a client; that is, it is the client that executes the method provided by this embodiment.

[0091] Step S101,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a device for encrypting transmission data, a method and a device for controlling an encrypted protocol and a method and a device for detecting the encrypted protocol; the method for encrypting the transmission data comprises the steps of sending a protocol negotiation request to an encrypted protocol detection server, receiving an encrypted protocol list, whichis returned by the encrypted protocol detection server and supported by a service server; selecting the encrypted protocol to carry out encryption handshaking modelling with the service server in a scheduled rule according to the received encrypted protocol list; and performing data interaction with the service server based on the encrypted handshaking modelling. According to the method, the problems that the existing client encrypted transmission method influences user experience and the service server lacks a control capability are solved.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products