A realization method of cloud security communication based on an HTTP protocol end

An HTTP protocol and secure communication technology, applied in the implementation field of cloud secure communication based on HTTP protocol, can solve problems such as replay attacks, data tampering with plaintext interface data, and affect business operations, etc., and achieve the effect of ensuring security.

Active Publication Date: 2019-05-03
SICHUAN CHANGHONG ELECTRIC CO LTD
View PDF6 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The vigorous development of the Internet is also accompanied by various security issues, especially for the HTTP communication interface, there are great security risks, such as the risk of replay attacks, the risk of data plaintext, the risk of interface data being tampered with, and the risk of identity authentication. With the rapid growth of business, more and more interface security issues are exposed, even affecting business operations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A realization method of cloud security communication based on an HTTP protocol end
  • A realization method of cloud security communication based on an HTTP protocol end
  • A realization method of cloud security communication based on an HTTP protocol end

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0026] A method for implementing secure communication between the terminal and the cloud based on the HTTP protocol, including designing a secure API format, designing a new terminal signature data method in the process of verifying the legitimacy of terminal data in the cloud, and designing a method for verifying terminal signature data in the cloud. In the process of verifying the legitimacy of cloud data, design a new cloud signature process and terminal signature verification process, wherein the terminal signature data method includes the combination method of signature data, the sorting method of body data and the terminal signature process.

[0027] Wherein, when the terminal makes a service request to the cloud, it needs to first sign and the cloud performs signature verification, specifically, the terminal digitally signs the requested service data. When requesting, send the signature value, business data, timestamp, and random number (uuid) to the cloud server. After ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for realizing cloud security communication based on an HTTP protocol end. The method comprises the steps of designing a secure API format, verifying the terminal datalegality at the cloud end; designing a new terminal signature data mode and a cloud verification terminal signature data mode; In the process that the terminal verifies the legality of the cloud data,a new cloud signature process and a new terminal signature verification process are designed, and the terminal signature data mode comprises a signature data combination mode, a body data sorting mode and a terminal signature process. According to the method provided by the invention, through the security design of the interface, security functions of anti-counterfeiting attack, tamper-proofing attack, replay attack prevention, data information leakage prevention and the like can be realized, and the security of WEB interface communication is ensured.

Description

technical field [0001] The invention relates to the technical field of Internet WEB secure communication, in particular to a method for realizing secure communication between cloud and terminal based on HTTP protocol. Background technique [0002] The vigorous development of the Internet is also accompanied by various security issues, especially for the HTTP communication interface, there are great security risks, such as the risk of replay attacks, the risk of data plaintext, the risk of interface data being tampered with, and the risk of identity authentication. With the rapid growth of the business, more and more interface security issues are exposed, and even affect the operation of the business. Contents of the invention [0003] The purpose of the present invention is to overcome the above-mentioned deficiencies in the background technology, and provide a method for realizing secure communication between cloud and terminal based on the HTTP protocol. Through the secu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08H04L29/08
Inventor 肖建常清雪刘剑飞
Owner SICHUAN CHANGHONG ELECTRIC CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products