Unlock instant, AI-driven research and patent intelligence for your innovation.

HTTPS transparent protection method for message processing equipment

A packet processing and transparent protection technology, applied in the field of network security, can solve the problems of high deployment location and inconvenient user deployment, and achieve the effect of improving defense capabilities

Active Publication Date: 2020-07-28
南京铱迅信息技术股份有限公司
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this type of HTTPS defense technology has relatively high requirements for deployment locations, and generally requires users to adjust the network topology environment, which is not convenient for users to deploy, and there is a risk of bypassing protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • HTTPS transparent protection method for message processing equipment
  • HTTPS transparent protection method for message processing equipment
  • HTTPS transparent protection method for message processing equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] Such as figure 2 and image 3 As shown, the HTTPS transparent protection method for message processing equipment of the present invention is applied to a specific embodiment. This embodiment intercepts multiple attacks in the local area network, and significantly improves the defense against https website attacks.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an HTTPS transparent protection method for message processing equipment. The method comprises the following steps of: separating https flow to be processed from other flow, transmitting the separated https flow to a two-layer message reorganization engine, removing two-layer information and two-layer information of local equipment, and sending the two-layer information andthe two-layer information of the local equipment to a local virtual network interface; enabling a https processing engine monitors the virtual network interface dev_w to obtain message information, and establishing https connection to obtain plaintext information; enabling the protection engine to detect and filter plaintext information; binding the message information to a local virtual network interface dev_l; and establishing https connection, encrypting the filtered plaintext information, and transmitting the encrypted plaintext information; and finally, enabling the two-layer message reorganization engine to monitor the virtual network interface dev_1 to obtain the transmitted https flow, then removing the two-layer information of the local device, and sending the reorganized https flow to the server by adding the two-layer information of the original message. According to the invention, users in different network environments can be satisfied, and the defense capability against https website attacks is significantly improved.

Description

technical field [0001] The invention belongs to network security technology, and in particular relates to an HTTPS transparent protection method for message processing equipment. Background technique [0002] HTTP is used as a communication protocol. The HTTP protocol is used to transmit information between the WEB browser and the website server. The HTTP protocol sends content in plain text and does not provide any form of data encryption. If an attacker intercepts the information between the web browser and the website server You can directly read the information in the transmission message between them. [0003] The extensive use of HTTPS requires certificates on the server to provide security negotiations between the browser and the server, and to establish a shared security code for subsequent HTTP communications, but in the process of message processing, HTTPS traffic and If other traffic is not detected and filtered, the accuracy and privacy of message processing wil...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L12/46
CPCH04L63/02H04L63/0236H04L67/02H04L63/0823H04L63/168H04L63/0876H04L12/4641
Inventor 魏忠陈春华
Owner 南京铱迅信息技术股份有限公司