Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

58 results about "Cipher suite" patented technology

A cipher suite is a set of algorithms that help secure a network connection that uses Transport Layer Security (TLS) or its now-deprecated predecessor Secure Socket Layer (SSL). The set of algorithms that cipher suites usually contain include: a key exchange algorithm, a bulk encryption algorithm, and a message authentication code (MAC) algorithm.

Transport layer security (TLS) channel constructing method based on cryptographic algorithm

ActiveCN103118027ASignature speed is excellentTransmissionKey exchangeSecure communication
The invention relates to the technical field of network safety and provides a transport layer security (TLS) channel constructing method based on a cryptographic algorithm. The TLS channel constructing method includes steps that: a server side launches a request and a client side respond to a hello message, or the client side launches the hello message; the server side responds to the hello message of the server side; the server side transmits an SM2 certificate to the server side and then transmits a hello completing message; the client side receives the hello completing message and then transmits a secret key exchange message; the client side transmits a cipher suite change message and a finishing message, and the server side transmits the cipher suite change message and the finishing message after receiving the finishing message of the client side; and the server side and the client side perform data safe transmission according to the agreed safety parameters after receiving the finishing messages of each other and passing verification. According to the TLS channel constructing method, the cryptographic algorithm is blended into a TLS protocol to perform safety communication, the signature speed is obviously superior to that of a remote signaling alarm (RSA) algorithm by aid of short secret key length, and the TLS channel constructing method is a data safety method with the 2048-bit safety level of the RSA algorithm.
Owner:CHINA FINANCIAL CERTIFICATION AUTHORITY

Transport layer security (TLS) handshaking method and device, and trusted third party (TTP)

The invention discloses a transport layer security (TLS) handshaking method, a TLS handshaking device and a trusted third party (TTP). The method comprises the following steps that: on the basis of the TLS handshaking process of two parties, a first party sends a question of the first party and a cipher suite list which is supported by the first party to the TTP; the TTP informs the first party of the question of the TTP, a temporary public key of the TTP and a TTP-first-party cipher suite; the first party informs the TTP of a first-party-TTP message authentication code by using a session key which is generated between the first party and the TTP; the TTP identifies the first-party-TTP message authentication code by using the session key which is generated between the first party and the TTP; after the first-party-TTP message authentication code passes identification, the TTP sends a TTP-first-party message authentication code to the first party; the first party identifies the TTP-first-party message authentication code; and if the TTP-first-party message authentication code passes identification, a secure tunnel between the first party and the TTP is established. The invention has the advantages that: on the basis of the TLS handshaking method of the two parties, the secure tunnel is established between the first party and the TTP, the security is improved, and high downward compatibility is realized.
Owner:CHINA IWNCOMM

Handshake method and system based on datagram secure transmission protocol

ActiveCN108650227ASatisfy the needs of safety, autonomy and controllabilityTake advantage ofKey distribution for secure communicationTransmission protocolComputer hardware
The invention refers to a handshake method and a handshake system based on a datagram secure transmission protocol. The handshake method comprises: sending a client greeting message to the server by the client, wherein the client greeting message contains a list of all domestic commercial cipher suites supported by the client; receiving and determining whether the client greeting message carries astateless message authentication code by the server: if so, calculating to obtain a message authentication code by using a domestic hash algorithm, and comparing with the message authentication codecarried by the client greeting message to authenticate the client; sending a server greeting message to the client after the authentication, and informing the client of the domestic commercial ciphersuite selected by the client; and replacing the key specification according to the selected domestic commercial cipher suite by the client and the server, thereby establishing a data transmission link. The invention is capable of meeting the requirement of self-controllable information security in China and fully utilizing the unique advantages of the domestic encryption algorithm, and is compatible with the original DTLS protocol, and convenient for horizontal expansion.
Owner:SUZHOU KEDA TECH

Secure socket layer protocol extension method supporting domestic cipher algorithm

The invention discloses a secure socket layer protocol extension method supporting a domestic cipher algorithm. The secure socket layer protocol extension method comprises the following steps: adding a cipher suite supporting the domestic cipher algorithm into a secure socket layer extended source code of the secure socket layer protocol; setting corresponding parameters and alias for the cipher suite; establishing an algorithm provider for implementing the domestic cipher algorithm; establishing a corresponding relationship between the alias of the cipher suite and an implementation class of the algorithm provider. According to the secure socket layer protocol extension method provided by the invention, an operating mechanism of the SSL (secure socket layer) protocol is not changed and extra security problems are not caused; after adoption of the cipher suite supporting the domestic cipher algorithm, the domestic cipher algorithm can be used during handshake and interaction of the SSL, so that the safety performance of online banking is enhanced, and thus the secure socket layer protocol extension method has an important significance in autonomy and the product security of an online banking application system and the security of a whole system.
Owner:SHANDONG CVIC SOFTWARE ENG

Cryptographic policy filters and policy control method and apparatus

An apparatus for an integrated dynamic encryption and/or decryption for use in an application includes a policy filter, a policy filter module coupled to said policy filter, a service module coupled to said policy filter, and a cryptographic module, where the apparatus retrieves the cryptographic module and configures the policy filter in accordance with the cryptographic module and the policy filter module performs a plurality of verification upon the cryptographic module, and further where the service module is configured to generate a plurality of cipher suites and the policy filter is configured to filter the plurality of cipher suites in accordance with a predetermined policy filter parameters to generate a plurality of filtered cipher suites.
Moreover, an apparatus for an integrated dynamic encryption and/or decryption for use in an application includes storage means for storing a plurality of predetermined attributes and corresponding values, and a digital signature, a controller for controlling selective retrieval of said plurality of attributes and values, and said digital signature from said storage means, processing means for selectively processing said plurality of predetermined attributes and values, and said digital signature and in accordance thereto, providing a supportable encryption and/or decryption level to said application, compression means for compressing said plurality of attributes and values and in accordance thereto generating a compressed plurality of attributes and values for storing in said storage means, and decompressing means for decompressing said compressed plurality of attributes and values in accordance to said controller retrieving said compressed plurality of attributes and values.
Owner:META PLATFORMS INC

JSSE-based national secret encryption communication method and device, and storage medium

PendingCN113037480AResolve support issuesKey distribution for secure communicationPasswordEngineering
The invention discloses a JSSE-based national secret encryption communication method and device, and a storage medium. The method comprises the following steps: receiving a handshake request of a client; analyzing the handshake request through a JSSE target server, and generating handshake information; matching national secret information preset in a JSSE target server with the handshake information to obtain a matching result; when the matching result meets the national secret communication condition, enabling handshake operation to continue to be carried out through the reconstructed JSSE handshake process logic, and establishing a handshake relation with the client; and enabling the client side and the target server side to perform handshake so as to facilitate subsequent encryption communication, wherein the preset national password information comprises a national password version number which is expanded in a protocol version of the JSSE in advance and a password suite which is expanded in a JSSE password suite in advance and conforms to a national password specification. By correspondingly processing the handshake request of the client and returning the corresponding response data, national secret encryption communication based on JSSE is realized.
Owner:BEIJING THUNISOFT INFORMATION TECH

Bidirectional authentication method and device

The invention provides a bidirectional authentication method and device. The method comprises the steps: receiving a server certificate, a second random number, a target password suite and a server public key which are sent by a server in response to an authentication request, obtaining data in the server certificate if the server certificate is checked to be signed and issued by a preset signing and issuing mechanism; and if the data are consistent with the data provided by the server, generating a third random number, and generating a first main communication password through a preset key exchange algorithm; encrypting the third random number by using the server public key to obtain an encrypted third random number, and generating a client communication ciphertext by using the first main communication password and the target password suite; sending the encrypted third random number, the client certificate and the client communication ciphertext to the server; and after a server-side communication ciphertext returned by the server side is received, the server-side communication ciphertext is decrypted according to the first main communication password and the target password suite, and if data carried in the server-side communication ciphertext is not tampered, the bidirectional authentication is confirmed to pass.
Owner:中电金信软件有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products