Information processing method and device and storage medium

An information processing method and equipment technology, applied in the Internet field, can solve problems such as increasing the risk of private key leakage

Active Publication Date: 2020-07-10
CHINA MOBILE COMM LTD RES INST +1
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the increase of edge nodes, the number of private key co

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information processing method and device and storage medium
  • Information processing method and device and storage medium
  • Information processing method and device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] Such as figure 1 As shown, information processing methods include:

[0050] Step 101: Receive the private key file issued by the content distribution network CDN certificate management server;

[0051]Step 102: Generate a corresponding private key service based on the private key file;

[0052] Step 103: Issue the private key service to at least one second device, so that the second device provides encryption or decryption service for the CDN edge node based on the private key service.

[0053] Here, the subject of execution of steps 101 to 103 may be the processor of the first device. The first device is used to generate a private key service, and the second device is used to participate in implementing the SSL / TLS handshake request between the terminal device and the CDN edge node based on the private key service.

[0054] In practical applications, the method for obtaining the private key file corresponding to the domain name includes: sending a private key file r...

Embodiment 2

[0061] In order to better reflect the purpose of the present invention, on the basis of Embodiment 1 of the present invention, further illustrations are made, such as figure 2 As shown, the information processing methods specifically include:

[0062] Step 201: Send a private key file request message to the CDN certificate management server to request a private key file corresponding to at least one domain name.

[0063] Step 202: Receive the private key file issued by the content distribution network CDN certificate management server;

[0064] Step 203: converting the private key file into a corresponding private key service;

[0065] Step 204: Issue the private key service to at least one second device, so that the second device provides encryption or decryption service for the CDN edge node based on the private key service.

[0066] Here, the subject of execution of steps 201 to 204 may be the processor of the first device. The first device is used to generate a private...

Embodiment 3

[0075] Based on the same inventive concept, another information processing method is provided in the embodiment of the present invention, which is applied to the second device, such as image 3 As shown, the information processing method includes:

[0076] Step 301: Receive the private key service generated based on the private key file issued by the first device;

[0077] Step 302: After receiving the message information sent by the CDN edge node, access the private key service to encrypt or decrypt the message information;

[0078] Step 303: Send the encrypted or decrypted message information to the CDN edge node.

[0079] Here, the subject of execution of steps 301 to 303 may be the processor of the second device. The first device is used to generate a private key service, and the second device is used to participate in implementing the SSL / TLS handshake request between the terminal device and the CDN edge node based on the private key service.

[0080] Here, the private...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an information processing method and device and a storage medium. The method comprises: receiving a private key file issued by a CDN certificate management server d; generating a corresponding private key service based on the private key file; and issuing the private key service to at least one second device, so that the second device provides an encryption or decryption service for a CDN edge node based on the private key service.

Description

technical field [0001] The present invention relates to Internet technology, in particular to an information processing method, equipment and storage medium. Background technique [0002] Hypertext Transfer Protocol over SecureSocket Layer (HTTPS) is a combination of Hypertext Transfer Protocol (Hypertext TransferProtocol, HTTP) plus Secure Sockets Layer (Secure Sockets Layer, SSL) / Security Transport Layer ( Transport Layer Security (TLS) is a network protocol for encrypted transmission and identity authentication. In the initial process of encrypted transmission, SSL / TLS negotiation is required. During the negotiation, the server needs to use the private key of the certificate to perform encryption and decryption operations. Therefore, the security of the private key is an important guarantee for the security of HTTPS. [0003] A content delivery network (Content Delivery Network, CDN) needs to use a private key when providing HTTPS acceleration services, and the security ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L29/08H04L29/06
CPCH04L67/02H04L9/0825H04L63/06
Inventor 李琴
Owner CHINA MOBILE COMM LTD RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products