Cooperative tls acceleration
A security communication and processor technology, applied in the field of cooperative transport layer security acceleration, can solve problems such as disproportionate capacity configuration, inability to match aggregated CPS, etc., to achieve the effect of improving performance
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0029] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. The following description refers to the accompanying drawings, wherein like numerals in different drawings indicate the same or similar elements unless otherwise stated. The implementations set forth in the following description of the exemplary embodiments do not represent all implementations consistent with the invention. Rather, they are merely examples of processing systems, methods, and non-transitory computer-readable media related to the subject matter recited in the appended claims.
[0030] Cryptographic protocols (eg, TLS, SSL, etc.) rely on public key cryptography to establish private session keys agreed between two parties. For example, the TLS handshake is the process by which the server and client authenticate each other and agree on a private session key. Sessions between server and client are encrypted using a private sessi...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


