Application virtualization security communication method in autonomous and controllable environment

A technology that applies virtualization and secure communication. It is applied to secure communication devices and key distribution. It can solve the problems of unable to verify the identity of the server and the integrity of the data package, and the protocol is easy to be attacked and stolen by the middleman.

Active Publication Date: 2019-02-15
BEIJING INST OF COMP TECH & APPL
View PDF7 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Since the RDP protocol is in use, the communication parties only have one-way identity authentication, and the client cannot verify the identity of the server and the integrity of the data packet.
In the process of network transmission, such protocols with only one-way identity authentication mechanism are vulnerable to data theft by man-in-the-middle attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application virtualization security communication method in autonomous and controllable environment
  • Application virtualization security communication method in autonomous and controllable environment
  • Application virtualization security communication method in autonomous and controllable environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the purpose, content, and advantages of the present invention clearer, the specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0036] After analyzing the security mechanism of the existing RDP protocol, it can be seen that the one-way identity authentication mechanism of the RDP protocol cannot resist various types of address spoofing, especially in the process of key exchange. This makes the encryption and decryption layer of the original protocol unable to resist the risks existing in the current network environment and the endless attack software. For its deficiencies, the present invention rebuilds the structure of the original RDP protocol stack, expands a kind of secure socket layer based on domestic commercial cipher suites on the basis of the RDP protocol, and adds the secure socket layer to the network connection layer of the protocol ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an application virtualization security communication method in an autonomous and controllable environment, and relates to the technical field of network security. The invention expands a security socket layer based on the domestic commercial cipher suite based on the RDP protocol by reconstructing the original RDP protocol stack, and adds the security socket layer to the network connection layer of the protocol stack, which can provide a secure transmission service for the client to the server, thereby realizing the dual identity authentication between the client and the server, and completing the identity verification of the client to the server.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an application virtualization security communication method for an autonomous and controllable environment. Background technique [0002] Because the RDP protocol is in use, the communication parties only have one-way identity authentication, and the client cannot verify the identity of the server and the integrity of the data packet. During network transmission, such protocols with only one-way identity authentication mechanism are vulnerable to data theft by man-in-the-middle attacks. Attackers can forge a fake server, use ARP address spoofing, DNS spoofing and other attack methods to transmit the forged server public key to the client, and build a complete RDP session to obtain sensitive information during the transmission. The specific process of man-in-the-middle attack can be determined by figure 1 shown. [0003] In the process of data transmission, the attacke...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L9/085H04L9/0863H04L9/3247H04L63/0435H04L63/08H04L63/0823H04L63/0869H04L67/01
Inventor 李大卫王斌曾颖明石波吴朝雄刘滋润姜琦
Owner BEIJING INST OF COMP TECH & APPL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products