CN108156178A - A kind of SSL/TLS data monitoring systems and method - Google Patents

A kind of SSL/TLS data monitoring systems and method Download PDF

Info

Publication number
CN108156178A
CN108156178A CN201810090708.9A CN201810090708A CN108156178A CN 108156178 A CN108156178 A CN 108156178A CN 201810090708 A CN201810090708 A CN 201810090708A CN 108156178 A CN108156178 A CN 108156178A
Authority
CN
China
Prior art keywords
master key
session master
ssl
data
tls
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810090708.9A
Other languages
Chinese (zh)
Other versions
CN108156178B (en
Inventor
杜匡俊
蔡晓华
杨光辉
贺晓麟
王涛
周育樑
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI NETIS TECHNOLOGIES Co Ltd
Original Assignee
SHANGHAI NETIS TECHNOLOGIES Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI NETIS TECHNOLOGIES Co Ltd filed Critical SHANGHAI NETIS TECHNOLOGIES Co Ltd
Priority to CN201810090708.9A priority Critical patent/CN108156178B/en
Publication of CN108156178A publication Critical patent/CN108156178A/en
Application granted granted Critical
Publication of CN108156178B publication Critical patent/CN108156178B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/22Parsing or analysis of headers

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Technology Law (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention provides a kind of SSL/TLS data monitoring systems and methods, the process that session master key is generated in the SSL/TLS handshake procedures of client and server-side is acted on behalf of by dynamic proxy technology, session master key is obtained, and the session master key of acquisition is subjected to socket or monitoring file;It obtains the session master key of socket or monitoring file and is forwarded;The session master key of forwarding is obtained, by the session master key persistence of forwarding in database;The encryption data transmitted between client and server-side is exported;Corresponding session master key is inquired from database, corresponding decipherment algorithm is selected to decrypt derived encryption data, obtains clear data;Corresponding application layer decoder is selected to parse clear data.The present invention does not interfere with former encrypted link completely, obtains session master key by the direct access application memory of the dynamic proxy technology of each programming language, supports the SSL/TLS agreements of all versions.

Description

A kind of SSL/TLS data monitoring systems and method
Technical field
The present invention relates to data monitoring technical fields, and in particular, to a kind of monitoring system to SSL/TLS encryption datas And method.
Background technology
Transport Layer Security (Transport Layer Security, TLS) and its predecessor's Secure Socket Layer (Secure Sockets Layer, SSL) is a kind of security protocol, it is therefore an objective to for internet communication, provide safety and data are complete Whole property guarantee.In the application programs such as browser, Email, instant messaging, VoIP, fax through internet, this association is supported extensively View.The industrial standard of secure communication on internet is become at present.
But while safety is provided and data integrity ensures, the monitor mode based on network flow is proposed and is chosen War.To solve the problems, such as to be difficult to monitor using SSL/TLS data on internet, propose to obtain encryption meeting by embedded Agent The mode of master key is talked about to decrypt the encryption data of monitor bypass acquisition.
Now common SSL/TLS data monitorings have following means:
1st, it is serially accessed between server-side and client by go-between's mode, passes through modification in SSL/TLS handshake phases The handshake information of communicating pair transmission obtains the key that communicating pair is used for data encryption, reaches decryption private data.
2nd, the SSL/TLS agreement encryption datas that client-side/server-side is sent are decrypted into plain text, so by proxy server Server/customer end will be sent to after the clear data encryption after audit again afterwards.
Said program is similar, and all there are following defects:
A, communication link can be invaded, initial data is changed, affects to the performance of application program;
B, it when using authentication mechanism between client and server, needs to obtain the certificate of user, there are safeties to ask Topic.
3rd, for non-intruding mode, the scheme of encryption data is obtained with monitor bypass, is solved by load server certificate Close encryption data.The program has following defect:
A, user is needed to provide privacy key, there are safety issues;
B, only support RSA as Diffie-Hellman.
Invention content
For the defects in the prior art, the object of the present invention is to provide a kind of SSL/TLS data monitoring systems and methods.
According to a kind of SSL/TLS data monitoring systems provided by the invention, including:
Key acquisition module:By dynamic proxy technology to being generated in the SSL/TLS handshake procedures of client and server-side The process of session master key is acted on behalf of, and obtains session master key, and the session master key of acquisition is carried out socket or monitoring File;
Forwarding module:It obtains the session master key of socket or monitoring file and is forwarded;
Dump module:The session master key of forwarding is obtained, by the session master key persistence of forwarding in database;
Data acquisition module:The encryption data transmitted between client and server-side is exported;
Deciphering module:Corresponding session master key is inquired from database, selects corresponding decipherment algorithm to decrypt export Encryption data, obtain clear data;
Analysis module:Corresponding application layer decoder is selected to parse clear data.
Preferably, the key acquisition module marks corresponding ID to session master key, and the deciphering module is parsing The ID, ID and the dump module by session master key of the session master key of current sessions are obtained when SSL/TLS shakes hands The query interface of offer inquires corresponding session master key.
Preferably, the forwarding module monitors particular port or file directory as independent process, all close to receive The session master key that key acquisition module is sent.
Preferably, the forwarding module establishes secure link with the dump module, and the session master key received is turned It is sent to the dump module.
Preferably, the data acquisition module is exported encryption data to the deciphering module by network shunt device.
According to a kind of SSL/TLS data monitoring methods provided by the invention, including step:
Key acquisition step:By dynamic proxy technology to being generated in the SSL/TLS handshake procedures of client and server-side The process of session master key is acted on behalf of, and obtains session master key, and the session master key of acquisition is carried out socket or monitoring File;
Forward step:It obtains the session master key of socket or monitoring file and is forwarded;
Dump step:The session master key of forwarding is obtained, by the session master key persistence of forwarding in database;
Data collection steps:The encryption data transmitted between client and server-side is exported;
Decryption step:Corresponding session master key is inquired from database, selects corresponding decipherment algorithm to decrypt export Encryption data, obtain clear data;
Analytical procedure:Corresponding application layer decoder is selected to parse clear data.
Preferably, the key acquisition step marks corresponding ID to session master key, and the decryption step is parsing The ID, ID and the dump module by session master key of the session master key of current sessions are obtained when SSL/TLS shakes hands The query interface of offer inquires corresponding session master key.
Preferably, the forwarding step monitors particular port or file directory as independent process, all close to receive The session master key that key acquisition step is sent.
Preferably, session master key is forwarded by the forwarding step by establishing secure link.
Preferably, the data collection steps are exported encryption data by network shunt device.
Compared with prior art, the present invention has following advantageous effect:
1st, encryption data is acquired by way of monitor bypass, does not interfere with former encrypted link completely;
2nd, session master key is obtained by the direct access application memory of the dynamic proxy technology of each programming language, to Family application program influence is minimum, and there is no limit for the monitored development language applied;
3rd, the SSL/TLS agreements of all versions and wherein all Encryption Algorithm can be supported;
4th, the certificate file of user need not be obtained;
5th, overhead is small, easily disposes.
Description of the drawings
Upon reading the detailed description of non-limiting embodiments with reference to the following drawings, other feature of the invention, Objects and advantages will become more apparent upon:
Fig. 1 is a kind of module relation diagram of SSL/TLS data monitoring systems of the present invention;
Fig. 2 is a kind of system flow chart of SSL/TLS data monitoring systems of the present invention.
Specific embodiment
With reference to specific embodiment, the present invention is described in detail.Following embodiment will be helpful to the technology of this field Personnel further understand the present invention, but the invention is not limited in any way.It should be pointed out that the ordinary skill to this field For personnel, without departing from the inventive concept of the premise, several changes and improvements can also be made.These belong to the present invention Protection domain.
As shown in Figure 1, a kind of SSL/TLS data monitoring systems provided by the invention, including:Key acquisition module, forwarding Module, dump module, data acquisition module, deciphering module and analysis module.
By Diffie-Hellman exchange session master key in SSL/TLS handshake procedures, negotiate in server-side and client After the completion, both sides can hold identical session master key, and carry out symmetric cryptography using the key pair communication data.Therefore, only Session master key can be obtained can just be decrypted the encryption data in communication process.And key exchange process is by password It learns and ensures its safety, final session master key can not be obtained by way of bypass.Therefore dynamic proxy technology is used, Key exchange process can be bypassed, session master key is directly acquired, realizes the decryption to encryption data.
Key acquisition module is set in any one in both client and server-side, passes through dynamic proxy technology The process that session master key is generated in the SSL/TLS handshake procedures of client and server-side is acted on behalf of, to obtain client The session master key that end is created with server-side.Such as the program based on JVM, javaagent mechanism may be used, in original The logic for obtaining master key is woven into the certain logic of program, the session master key of acquisition is passed through into socket or monitoring file Mode is sent to forwarding module, while marks ID to session master key, and reason is:Server may be same with multiple client The a large amount of sessions of Shi Jianli, when obtaining session master key, we need to be labeled each key, to ensure in decryption number According to when the corresponding session master key of the session can be found according to the information in data message, and between the different servers, It is susceptible to session id conflicts, it is therefore desirable to which session master key mark ID is distinguished.
Forwarding module provides the interface for receiving master key, with the key acquisition module that tripartite is supported to realize, to master key Protection is encrypted in communication, receives the collected session master key of all key acquisition modules of the machine, can on same server One or more application program based on SSL/TLS can be simultaneously run, therefore forwarding module can be used as independent process to monitor Particular port or file directory, to receive the session master key that all key acquisition modules of the machine are sent.Verification receives number According to legitimacy and integrality, the session master key received is forwarded to dump module, due to this section communication may pass through Public network transmits, and unreliable, in order to ensure master key hands over the safety of transmission process, it is therefore desirable to establish and pacify with dump intermodule Full link is to avoid sensitive information leakage.In addition, key acquisition module may be for different applications using different specific It realizes, the difference of different realizations can be shielded by forwarding module.
Dump module receives the session master key that different server forwarding comes, and by its persistence in database, and is solution Close module provides query interface, so as to information such as Session ID or the client random according to SSL/TLS sessions Inquire corresponding session master key.
The encryption that data acquisition module will be transmitted by network shunt device (Network Tap) between client and server-side Data are exported to deciphering module.
The encryption data that deciphering module is provided based on SSL/TLS protocol specifications parsing data acquisition module, in parsing SSL/ TLS can obtain the ID of current sessions when shaking hands, the session master key query interface provided by dump module, and inquiry is corresponding Session master key, session information when being shaken hands by SSL/TLS, the session master key obtained with reference to inquiry, it will be able to which selection corresponds to Encryption Algorithm decrypt encryption data, so as to the clear data after being decrypted, and be provided to analysis module.SSL/ Pass through Diffie-Hellman exchange session master key in TLS handshake procedures.After the completion of server-side and client are negotiated, both sides meeting Hold identical session master key, and symmetric cryptography is carried out using the key pair communication data.Therefore, as long as session master can be obtained Key can just be decrypted the encryption data in communication process.And key exchange process is to ensure its safety by cryptography , final session master key can not be obtained by way of bypass.Therefore using dynamic proxy technology, key can be bypassed and handed over Process is changed, directly acquires session master key, realizes the decryption to encryption data.By collecting the cleartext information of handshake phase, By session id or client random/server random come one encryption session of unique mark, key acquisition Module can also be recorded when acquiring key with the corresponding above- mentioned information of key, this makes it possible in decrypting process according to shaking hands Information finds key, to decrypt to obtain in plain text.
The corresponding application layer decoder parsing clear data of analysis module selection, provides monitoring based on application layer message and examines Meter.
As shown in Fig. 2, the main flow of this system is as follows:
1) loading Agent (key acquisition module):Corresponding different platform, the loading correspondence when user's application starts Agent.
2) master key is obtained:Logic is obtained by being woven into master key in personal code work in Agent, when SSL/TLS exists Shake hands it is middle generation master key when, read session master key.Such as the program based on JVM, javaagent machines may be used System is woven into the logic for obtaining master key in the certain logic of original program.
3) master key is received:Forwarding module is responsible for the session master key of Receiving Agent program acquisition, supports socket and prison Listen file two ways.
4) it is sent to dump module:Forwarding module is responsible for establishing secure connection with dump module.It will be main by secure connection Key information encryption is sent to dump module.
5) master key write-in database is received:It is close by the session master that safety chain is sent that dump module receives forwarding module Key, and by master key write-in database for being inquired during decryption.
6) encryption data:By means such as network shunt devices (Network Tap), encryption data is exported to monitoring service Device.
7) handshake information is parsed:Based on SSL/TLS agreements, session information can be obtained by parsing data message.
8) session id is calculated:It needs to inquire corresponding session master key according to session id.For the different meetings of SSL/TLS Reuse mechanism is talked about, specific meeting can be identified using information such as the session id or cl ient random in handshake information Words.
9) master key is inquired:Corresponding session master key is inquired in master key database according to the session id of calculating.
10) query timeout:Since master key acquisition and encryption data parsing all carry out in real time, since some are uncontrollable System delay, master key may be later than data to be decrypted and reach monitoring server.Therefore waiting-timeout mechanism is needed to ensure Session master key can be got during decryption.
11) ciphertext data:Use the encryption data of session master key decryption respective session inquired.
12) clear data is exported:The clear data obtained after decryption is exported to message queue and is done for follow-up monitoring service It is further processed.
By taking the HTTP service for monitoring JBoss as an example, specific implementation is as follows:
1st, key acquisition module is loaded by the javaagent mechanism of JVM in the startup script of JBoss services.The mould Block can be woven into the logic for obtaining session master key when JBoss is serviced and started in its encrypted component, whenever JBoss services and visitor When connection is established at family end, it will will build the successful session master key of connection and be sent to forwarding module.
2nd, start forwarding module process on the host of JBoss services.The process can monitor local port and receive session master Key, and attempt to establish secure link with dump module.It, will be by the session when linking successfully and receiving session master key Master key is sent to dump module.It, can be in daily record if dump module (possible dump module is not actuated) can not be chained The master key received is recorded, for troubleshooting.
3rd, start dump module process on decryption server, master key will be received and stored into database.
4th, start deciphering module process on decryption server, access data acquisition module passes through derived from network shunt device Encryption data.Based on SSL/TLS protocol specifications, the data of access are decoded, by the data of SSL/TLS handshake phases, Calculate the information such as ID, the Encryption Algorithm for obtaining processing session.Inquire corresponding session master key in the database using session id. The data message after building connection can be just decrypted with reference to session master key and Encryption Algorithm.
5th, for the use-case, the clear data after decryption is exactly http protocol.It can be parsed based on the specification of http protocol The clear data of acquisition.Different business information can therefrom be calculated:Such as return code, number of requests, response time etc..
Specific embodiments of the present invention are described above.It is to be appreciated that the invention is not limited in above-mentioned Particular implementation, those skilled in the art can make a variety of changes or change within the scope of the claims, this not shadow Ring the substantive content of the present invention.In the absence of conflict, the feature in embodiments herein and embodiment can arbitrary phase Mutually combination.

Claims (10)

1. a kind of SSL/TLS data monitoring systems, which is characterized in that including:
Key acquisition module:By dynamic proxy technology to generating session in the SSL/TLS handshake procedures of client and server-side The process of master key is acted on behalf of, and obtains session master key, and the session master key of acquisition is carried out socket or monitoring file;
Forwarding module:It obtains the session master key of socket or monitoring file and is forwarded;
Dump module:The session master key of forwarding is obtained, by the session master key persistence of forwarding in database;
Data acquisition module:The encryption data transmitted between client and server-side is exported;
Deciphering module:Corresponding session master key is inquired from database, selects corresponding decipherment algorithm to decrypt derived add Ciphertext data obtains clear data;
Analysis module:Corresponding application layer decoder is selected to parse clear data.
2. SSL/TLS data monitoring systems according to claim 1, which is characterized in that the key acquisition module is to meeting It talks about master key and marks corresponding ID, the deciphering module obtains the session master key of current sessions when parsing SSL/TLS and shaking hands ID, pass through the query interface that the ID of session master key and the dump module provide and inquire corresponding session master key.
3. SSL/TLS data monitoring systems according to claim 1, which is characterized in that the forwarding module is as independent Process monitors particular port or file directory, to receive the session master key that all key acquisition modules are sent.
4. SSL/TLS data monitoring systems according to claim 1, which is characterized in that the forwarding module and described turn Storage module establishes secure link, and the session master key received is forwarded to the dump module.
5. SSL/TLS data monitoring systems according to claim 1, which is characterized in that the data acquisition module passes through net Network current divider exports encryption data to the deciphering module.
6. a kind of SSL/TLS data monitoring methods, which is characterized in that including step:
Key acquisition step:By dynamic proxy technology to generating session in the SSL/TLS handshake procedures of client and server-side The process of master key is acted on behalf of, and obtains session master key, and the session master key of acquisition is carried out socket or monitoring file;
Forward step:It obtains the session master key of socket or monitoring file and is forwarded;
Dump step:The session master key of forwarding is obtained, by the session master key persistence of forwarding in database;
Data collection steps:The encryption data transmitted between client and server-side is exported;
Decryption step:Corresponding session master key is inquired from database, selects corresponding decipherment algorithm to decrypt derived add Ciphertext data obtains clear data;
Analytical procedure:Corresponding application layer decoder is selected to parse clear data.
7. SSL/TLS data monitoring methods according to claim 6, which is characterized in that the key acquisition step is to meeting It talks about master key and marks corresponding ID, the decryption step obtains the session master key of current sessions when parsing SSL/TLS and shaking hands ID, pass through the query interface that the ID of session master key and the dump module provide and inquire corresponding session master key.
8. SSL/TLS data monitoring systems according to claim 6, which is characterized in that the forwarding step is as independent Process monitors particular port or file directory, to receive the session master key that all key acquisition steps are sent.
9. SSL/TLS data monitoring systems according to claim 6, which is characterized in that the forwarding step passes through foundation Session master key is forwarded by secure link.
10. SSL/TLS data monitoring systems according to claim 6, which is characterized in that the data collection steps pass through Network shunt device exports encryption data.
CN201810090708.9A 2018-01-30 2018-01-30 SSL/TLS data monitoring system and method Active CN108156178B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810090708.9A CN108156178B (en) 2018-01-30 2018-01-30 SSL/TLS data monitoring system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810090708.9A CN108156178B (en) 2018-01-30 2018-01-30 SSL/TLS data monitoring system and method

Publications (2)

Publication Number Publication Date
CN108156178A true CN108156178A (en) 2018-06-12
CN108156178B CN108156178B (en) 2021-01-26

Family

ID=62459406

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810090708.9A Active CN108156178B (en) 2018-01-30 2018-01-30 SSL/TLS data monitoring system and method

Country Status (1)

Country Link
CN (1) CN108156178B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110620766A (en) * 2019-09-05 2019-12-27 东南大学 Method for extracting TLS data block in encrypted network flow
CN110990851A (en) * 2019-11-26 2020-04-10 山东三未信安信息科技有限公司 Static data encryption protection method and system
CN111224995A (en) * 2020-01-15 2020-06-02 成都安舟信息技术有限公司 SSL/TLS network encryption communication information real-time decryption method based on memory analysis
CN112468495A (en) * 2020-11-26 2021-03-09 上海天旦网络科技发展有限公司 Degradation monitoring method, system and medium for complete forward secrecy encryption system
CN112487483A (en) * 2020-12-14 2021-03-12 深圳昂楷科技有限公司 Encrypted database flow auditing method and device
CN113055334A (en) * 2019-12-26 2021-06-29 国网山西省电力公司信息通信分公司 Method and device for supervising network behaviors of end users
CN113225354A (en) * 2021-06-02 2021-08-06 郑州信大捷安信息技术股份有限公司 Method and system for analyzing secure channel encrypted data
CN114095195A (en) * 2020-08-24 2022-02-25 瞻博网络公司 Adaptive control of secure socket layer proxy
CN114139192A (en) * 2022-02-07 2022-03-04 奇安信科技集团股份有限公司 Encrypted traffic processing method, encrypted traffic processing apparatus, electronic device, medium, and program
CN115514583A (en) * 2022-11-21 2022-12-23 北京长亭未来科技有限公司 Flow acquisition and blocking method, system, equipment and storage medium
CN117938549A (en) * 2024-03-22 2024-04-26 道普信息技术有限公司 User non-perception decryption method for TLS and SSL encryption connection

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101695038A (en) * 2009-10-27 2010-04-14 联想网御科技(北京)有限公司 Method and device for detecting SSL enciphered data safety
US20160142440A1 (en) * 2014-11-19 2016-05-19 At&T Intellectual Property I, L.P. Method and Apparatus for Decryption of Encrypted SSL Data from Packet Traces
CN106302507A (en) * 2016-08-31 2017-01-04 北京盛世光明软件股份有限公司 A kind of method based on SSL network data analytic technique
CN106790090A (en) * 2016-12-23 2017-05-31 北京奇虎科技有限公司 Communication means, apparatus and system based on SSL

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101695038A (en) * 2009-10-27 2010-04-14 联想网御科技(北京)有限公司 Method and device for detecting SSL enciphered data safety
US20160142440A1 (en) * 2014-11-19 2016-05-19 At&T Intellectual Property I, L.P. Method and Apparatus for Decryption of Encrypted SSL Data from Packet Traces
CN106302507A (en) * 2016-08-31 2017-01-04 北京盛世光明软件股份有限公司 A kind of method based on SSL network data analytic technique
CN106790090A (en) * 2016-12-23 2017-05-31 北京奇虎科技有限公司 Communication means, apparatus and system based on SSL

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
孙恭鑫: "面向公共安全的数据分析系统设计与实现", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110620766A (en) * 2019-09-05 2019-12-27 东南大学 Method for extracting TLS data block in encrypted network flow
CN110620766B (en) * 2019-09-05 2021-12-14 东南大学 Method for extracting TLS data block in encrypted network flow
CN110990851A (en) * 2019-11-26 2020-04-10 山东三未信安信息科技有限公司 Static data encryption protection method and system
CN113055334A (en) * 2019-12-26 2021-06-29 国网山西省电力公司信息通信分公司 Method and device for supervising network behaviors of end users
CN113055334B (en) * 2019-12-26 2023-07-28 国网山西省电力公司信息通信分公司 Method and device for supervising network behavior of terminal user
CN111224995A (en) * 2020-01-15 2020-06-02 成都安舟信息技术有限公司 SSL/TLS network encryption communication information real-time decryption method based on memory analysis
CN114095195B (en) * 2020-08-24 2023-05-30 瞻博网络公司 Method, network device, and non-transitory computer readable medium for adaptive control of secure socket layer proxy
US11777915B2 (en) 2020-08-24 2023-10-03 Juniper Networks, Inc. Adaptive control of secure sockets layer proxy
CN114095195A (en) * 2020-08-24 2022-02-25 瞻博网络公司 Adaptive control of secure socket layer proxy
CN112468495A (en) * 2020-11-26 2021-03-09 上海天旦网络科技发展有限公司 Degradation monitoring method, system and medium for complete forward secrecy encryption system
CN112468495B (en) * 2020-11-26 2022-05-17 上海天旦网络科技发展有限公司 Degradation monitoring method, system and medium for complete forward secrecy encryption system
CN112487483A (en) * 2020-12-14 2021-03-12 深圳昂楷科技有限公司 Encrypted database flow auditing method and device
CN112487483B (en) * 2020-12-14 2024-05-03 深圳昂楷科技有限公司 Encryption database flow auditing method and device
CN113225354A (en) * 2021-06-02 2021-08-06 郑州信大捷安信息技术股份有限公司 Method and system for analyzing secure channel encrypted data
CN114139192B (en) * 2022-02-07 2022-07-05 奇安信科技集团股份有限公司 Encrypted traffic processing method, encrypted traffic processing apparatus, electronic device, medium, and program
CN114139192A (en) * 2022-02-07 2022-03-04 奇安信科技集团股份有限公司 Encrypted traffic processing method, encrypted traffic processing apparatus, electronic device, medium, and program
CN115514583A (en) * 2022-11-21 2022-12-23 北京长亭未来科技有限公司 Flow acquisition and blocking method, system, equipment and storage medium
CN117938549A (en) * 2024-03-22 2024-04-26 道普信息技术有限公司 User non-perception decryption method for TLS and SSL encryption connection

Also Published As

Publication number Publication date
CN108156178B (en) 2021-01-26

Similar Documents

Publication Publication Date Title
CN108156178A (en) A kind of SSL/TLS data monitoring systems and method
US10880732B2 (en) Authentication of phone caller identity
US7992200B2 (en) Secure sharing of transport layer security session keys with trusted enforcement points
CN104618108B (en) Safe communication system
US11303431B2 (en) Method and system for performing SSL handshake
US20100191954A1 (en) Method and apparatus for transmitting message in heterogeneous federated environment, and method and apparatus for providing service using the message
CN109067803A (en) A kind of SSL/TLS encryption and decryption communication means, device and equipment
CN109245993A (en) Instant communication method and device based on block chain
WO2018223777A1 (en) Data exchange system, method, and device
CN102833253A (en) Method and server for establishing safe connection between client and server
CN108566361A (en) A kind of safety parameter negotiation method and system based on SSL/TLS agreements
CN109067739A (en) Encryption of communicated data method and apparatus
CN114338844B (en) Cross-protocol communication method and device between client servers
EP3375133B1 (en) Method for securing and authenticating a telecommunication
CN111131416A (en) Business service providing method and device, storage medium and electronic device
CN106031097A (en) Service processing method and device
CN114586316A (en) Method and system for managing secure IoT device applications
CN105471896B (en) Proxy Method, apparatus and system based on SSL
CN109740319A (en) Digital identity verification method and server
US20200177566A1 (en) Method and system for cooperative inspection of encrypted sessions
CN114726865B (en) Data mortgage method, system, electronic device and storage medium
CN106961439B (en) A kind of HTTPS encrypted transmission method and device
CN115694873A (en) Method, device and equipment for acquiring HTTPS (hypertext transfer protocol secure) plaintext data in container
CN111404901A (en) Information verification method and device
Alhibshi Encryption algorithms for data security in Local Area Network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant