Safe connection establishing method, safe connection establishing system, client, and server

A secure connection and establishment method technology, which is applied to the client and server, and in the field of secure connection establishment, can solve problems such as theft, digital certificates and private keys are easily attacked or stolen, and the security strength of secure connections is reduced, achieving The effect of strengthening security strength

Active Publication Date: 2018-08-21
NEW H3C TECH CO LTD
View PDF5 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the establishment process of the secure connection described above, it can be seen that when establishing a secure connection, the digital certificate and private key used are stored locally, which makes the digital certificate and private key vulnerable to attack or stealing, thus making the above-mentioned The security strength of the secure connection is greatly reduced, for example, it is easy to be stolen by other clients to communicate with the server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe connection establishing method, safe connection establishing system, client, and server
  • Safe connection establishing method, safe connection establishing system, client, and server
  • Safe connection establishing method, safe connection establishing system, client, and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] According to an embodiment of the present application, an embodiment of a method for establishing a secure connection is provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and , although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0029] figure 1 is a flowchart of a method for establishing a secure connection according to an embodiment of the present application, such as figure 1 As shown, the method includes the following steps:

[0030] Step S102, sending a negotiation request to the server, and obtaining response information returned by the server based on the negotiation request, wherein the response information includes information about a national secret cipher suite used for secure connection verification.

[0...

Embodiment 2

[0120] The embodiment of the present application also provides a device for establishing a secure connection. The device for establishing a secure connection is mainly used to implement the method for establishing a secure connection provided in the above-mentioned content of the embodiment of the present application. The following describes the secure connection provided in the embodiment of the present application Create a device for specific introduction.

[0121] Figure 6 is a schematic diagram of an apparatus for establishing a secure connection according to an embodiment of the present application, such as Figure 6 As shown, the device for establishing the secure connection is set at the client, mainly including: a first client sending unit 61, a client determining unit 62 and a second client sending unit 63, wherein:

[0122] The first client sending unit 61 is configured to send a negotiation request to the server, and obtain response information returned by the serve...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a safe connection establishing method, a safe connection establishing system, a client, and a server. The safe connection establishing method comprises steps that a negotiationrequest is transmitted to the server, and response information returned by the server based on the negotiation request is acquired, and comprises related information of commercial cipher code encryption suite used for safe connection verification; a to-be-signed abstract is determined based on the negotiation request and the response information, and is transmitted to USB key equipment, and thenthe USB key equipment is used to sign the to-be-signed abstract by the commercial cipher code encryption suite to acquire signature information; the signature information transmitted by the USB key equipment is acquired, and is transmitted to the server for the verification of the safe connection, and when the verification is passed, the commercial cipher code safe connection between the client and the server is established. According to the invention, a technical problem of low data safety performance of conventional safe connection ways used for establishing the safe connection for the dataexchange is solved.

Description

technical field [0001] The present application relates to the technical field of communications, and in particular to a method and system for establishing a secure connection, as well as a client and a server. Background technique [0002] With the rapid development of the Internet, both parties communicating with each other can easily obtain each other's information. This increases the risk of some sensitive or valuable data being misused, especially in the field of e-commerce. In order to ensure the security of the two parties communicating with each other and prevent fraud during the communication process, a trust mechanism must be established on the Internet. This requires that both parties communicating with each other must have legal identities and be able to be verified effectively and without error on the Internet. [0003] Using digital certificates to establish a secure connection can make network transmission more secure. One way of establishing a secure connec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06H04L29/08
CPCH04L9/3234H04L9/3236H04L9/3247H04L63/0853H04L63/168H04L67/141
Inventor 刘梦岩
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products