A Method for Constructing Security Protocol Messages
A security protocol and construction method technology, applied in the field of information security, can solve the problems of low abstraction accuracy of security protocol specifications, incomplete understanding of security protocol implementation, inaccurate analysis results, etc., to achieve high accuracy, high efficiency and accuracy. rate, accurate results
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0027] In order to facilitate those of ordinary skill in the art to understand and implement the present invention, the present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the implementation examples described here are only used to illustrate and explain the present invention, and are not intended to limit this invention.
[0028] In order to analyze the implementation (protocol deployment code) security of the security protocol deployed in the network application system based on the B / S mode, a method based on message construction is proposed to analyze the implementation security of the security protocol. Here, the message construction means automatically generating a legal security protocol client message, which is sent to the security protocol server. The response message of the server is analyzed later, so as to analyze the security of the security protocol implementation. ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


