Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Communication link establishment method and device, storage medium, processor and system

A technology for establishing a method and a communication link, which is applied in the field of data encryption, can solve problems such as the anti-VPN technology is easy to be cracked, and achieve the effect of not being easy to be cracked and solving the problem of being easy to be cracked

Active Publication Date: 2021-08-24
ALIBABA GRP HLDG LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide a method, device, storage medium, processor and system for establishing a communication link, so as to at least solve the technical problem that the anti-VPN technology in the prior art is easily cracked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication link establishment method and device, storage medium, processor and system
  • Communication link establishment method and device, storage medium, processor and system
  • Communication link establishment method and device, storage medium, processor and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] According to an embodiment of the present invention, an embodiment of a method for establishing a communication link is also provided. It should be noted that the steps shown in the flowcharts of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0047] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. figure 1 A block diagram of a hardware structure of a computer terminal (or mobile device) for implementing a method for establishing a communication link is shown. Such as figure 1 As shown, the computer terminal 10 (or mobile device) may include one or more (shown by 102a, 102b, ..., 102n in the figure) processor 102 (...

Embodiment 2

[0078] In an embodiment of the present invention, a method for establishing a communication link is provided, image 3 is a flow chart of the second method for establishing a communication link provided according to an embodiment of the present invention, such as image 3 As shown, the process includes the following steps:

[0079] Step S302, receiving the first message sent by the initiator and processing the first message to obtain a first mixed encryption key, which is a mixed encryption key of the first key and the second key;

[0080] Step S304, receiving the third message sent by the initiator and processing the third message to obtain a second mixed encryption key, the third message is a message encrypted with the first mixed encryption key, and the second mixed encryption key is the first mixed encryption key A mixed encryption key and a mixed encryption key of the third key.

[0081] As an optional embodiment, the first mixed encryption key is a mixed encryption key...

Embodiment 3

[0087] In an embodiment of the present invention, a method for establishing a communication link is provided, Figure 4 It is a flow chart of the third method for establishing a communication link provided according to an embodiment of the present invention, such as Figure 4 As shown, the process includes the following steps:

[0088] Step S402, the initiator and the receiver negotiate a first predetermined key, a first predetermined algorithm, and a second predetermined algorithm;

[0089] Step S404, the initiator and the receiver determine the encryption key for the negotiation process according to the first predetermined key, the first predetermined algorithm, and the second predetermined algorithm, and the encryption key is the key obtained by the first predetermined key and the first predetermined algorithm and a mixed encryption key of the key obtained by the second predetermined algorithm.

[0090] As an optional embodiment, the first message and the second message a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a communication link establishment method and device, a storage medium, a processor and a system. The method comprises a secret key negotiation process, the negotiation process is used for determining an encryption secret key, and the negotiation process comprises the following steps: forwarding a first message generated by an initiating end to a receiving end; feeding back a second message returned by the receiving end to the initiating end, wherein the first message and the second message are used for determining the first hybrid encryption key; forwarding a third message sent by the initiating end to the receiving end, wherein the third message is a message encrypted by adopting the first hybrid encryption key and is used for determining a second hybrid encryption key; and feeding back a fourth message returned by the receiving end to the initiating end, the fourth message being a message encrypted by using the second hybrid encryption key. The technical problem that in the prior art, an anti-VPN technology is prone to being cracked is solved.

Description

technical field [0001] The present invention relates to the field of data encryption, in particular to a communication link establishment method, device, storage medium, processor and system. Background technique [0002] Between different data centers (for example, between different data centers of Alibaba Cloud, or between Alibaba Cloud data centers and private networks of government and enterprises) there is a risk of exposing communication data traffic to the public network. The highly sensitive data of the business will be encrypted by VPN and other means. However, in the face of the current rapid development of quantum computers, sensitive data that needs to be stored for a long time still faces threats. For example, eavesdroppers will intercept the sensitive data and save it Come down, and then crack it after the future quantum computer is commercially available. [0003] At present, some anti-quantum VPN schemes have appeared in the prior art, and PQC and classical ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0838H04L9/0891H04L9/0861H04L63/045H04L63/065H04L63/0272
Inventor 冯凯
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products