CN112559312A - Traffic copying method, device, medium and equipment - Google Patents

Traffic copying method, device, medium and equipment Download PDF

Info

Publication number
CN112559312A
CN112559312A CN201910912910.XA CN201910912910A CN112559312A CN 112559312 A CN112559312 A CN 112559312A CN 201910912910 A CN201910912910 A CN 201910912910A CN 112559312 A CN112559312 A CN 112559312A
Authority
CN
China
Prior art keywords
server
random number
client
offline
online server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910912910.XA
Other languages
Chinese (zh)
Inventor
曾劲基
李逸骏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guizhou Baishancloud Technology Co Ltd
Original Assignee
Guizhou Baishancloud Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guizhou Baishancloud Technology Co Ltd filed Critical Guizhou Baishancloud Technology Co Ltd
Priority to CN201910912910.XA priority Critical patent/CN112559312A/en
Publication of CN112559312A publication Critical patent/CN112559312A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3664Environments for testing or debugging software
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3688Test management for test execution, e.g. scheduling of test suites
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

Abstract

The present invention relates to a traffic copying method, apparatus and medium, the traffic copying method includes: receiving a client request; copying the client request to an offline server; sending online server information for decrypting the client request to an offline server so that the offline server decrypts the client request; or receiving an offline server random number sent by the offline server, and generating a second secret key based on the offline server random number. By the method, the flow containing the HTTPS request can be copied to the offline server, and the software on the offline server is tested by using the flow consistent with the online real condition.

Description

Traffic copying method, device, medium and equipment
Technical Field
The present disclosure relates to the field of testing, and more particularly, to a method, an apparatus, and a medium for copying traffic.
Background
In the related technology, the tcpcopy technology can copy http traffic from an online server machine to a test server, install software to be tested on the test server, and test the software by using the http traffic consistent with the online real condition without affecting users. However, the requests on cdn servers are basically http traffic and http traffic, but tcp copy only http traffic and not https traffic. With the increasing https traffic, the existing tcp copy technology can copy less traffic, and therefore the purpose of truly simulating the online situation cannot be achieved.
Disclosure of Invention
To overcome the problems in the related art, a traffic copying method, apparatus, medium, and device are provided.
According to a first aspect of the present disclosure, there is provided a traffic copying method applied to an online server, including:
receiving a client request;
copying the client request to an offline server;
sending online server information for decrypting the client request to an offline server so that the offline server decrypts the client request; or receiving an offline server random number sent by an offline server, and generating a second secret key based on the offline server random number; wherein the client request comprises an HTTPS request.
The sending the online server information for decrypting the client request to the offline server comprises:
sending an on-line server random number generated in a handshake process with a client to the off-line server;
or sending a first secret key generated after handshaking with the client to the offline server.
The generating a second secret key based on the offline server random number comprises: and replacing the random number of the online server with the random number of the offline server, and generating the second secret key based on the random number of the offline server and the random number of the client.
A traffic copying method is applied to an offline server and comprises the following steps:
receiving a client request copied by an online server, wherein the client request comprises an HTTPS request;
and sending the offline server random number to the online server, and generating a third secret key based on the offline server random number and the client random number. Or, receiving online server information sent by an online server;
when the client request is an HTTPS request, decrypting the HTTPS request by using the third secret key; or based on the online server information, decrypting the HTTPS request.
The online server information is an online server random number or a first secret key generated after handshaking between the online server and the client, and the decrypting the HTTPS request based on the online server information includes:
when the online server information is an online server random number, generating a fourth secret key based on the online server random number, and decrypting the HTTPS request by using the fourth secret key;
and when the online server information is a first key, decrypting the HTTPS request by using the first key.
The generating a fourth key based on the online server random number comprises:
and replacing the random number of the offline server with the random number of the online server, and generating the fourth secret key based on the random number of the online server and the random number of the client.
According to another aspect herein, there is provided a traffic copying apparatus comprising:
the request receiving module is used for receiving a client request;
the flow copying module is used for copying the client request to an offline server;
the first information exchange module is used for sending online server information used for decrypting the client request to an offline server so that the offline server decrypts the client request; or receiving an offline server random number sent by an offline server, and generating a second secret key based on the offline server random number; wherein the client request comprises an HTTPS request.
The online server information is an online server random number or a first secret key generated after handshaking with the client, and the sending the online server information to the offline server includes:
sending an on-line server random number generated in a handshake process with a client to the off-line server;
or sending a first secret key generated after handshaking with the client to the offline server.
The generating a second secret key based on the offline server random number comprises: and replacing the random number of the online server with the random number of the offline server, and generating the second secret key based on the random number of the offline server and the random number of the client.
A traffic copying apparatus comprising:
the system comprises a flow receiving module, a flow receiving module and a flow control module, wherein the flow receiving module is used for receiving a client request copied by an online server, and the client request comprises an HTTPS request;
and the second information exchange module is used for sending the offline server random number to the online server and generating a third secret key based on the offline server random number and the client random number. Or, receiving online server information sent by an online server;
the traffic processing module is used for decrypting the HTTPS request by using the third secret key when the client request is the HTTPS request; or, based on the online server information, decrypting the HTTPS request.
The online server information is an online server random number or a first secret key generated after the online server and the client handshake; the traffic processing module, based on the online server information, decrypting the HTTPS request includes:
when the online server information is an online server random number, generating a fourth secret key based on the online server random number, and decrypting the HTTPS request by using the fourth secret key;
and when the online server information is a first key, decrypting the HTTPS request by using the first key.
The generating a fourth key based on the online server random number comprises:
and replacing the random number of the offline server with the random number of the online server, and generating the fourth secret key based on the random number of the online server and the random number of the client.
According to another aspect herein, there is provided a computer readable storage medium having stored thereon a computer program which, when executed, performs the steps of the traffic copy method.
According to another aspect herein, there is provided a computer device comprising a processor, a memory and a computer program stored on the memory, the steps of the traffic copy method being implemented when the processor executes the computer program.
The method can copy the traffic containing the HTTPS request to a test server by a traffic copy method, and test the software on the test server by using the traffic consistent with the real situation on line.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention as claimed.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, are included to provide a further understanding of the disclosure, and are incorporated in and constitute a part of this specification. In the drawings:
fig. 1 is a flow chart illustrating a traffic copying method according to an example embodiment.
Fig. 2 is a flow chart illustrating a traffic copying method according to an example embodiment.
Fig. 3 is a block diagram illustrating a traffic copying apparatus according to an example embodiment.
Fig. 4 is a block diagram illustrating a traffic copying apparatus according to an example embodiment.
FIG. 5 is a block diagram illustrating a computer device according to an example embodiment.
Detailed Description
To make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the drawings of the embodiments of the present invention, and it is obvious that the described embodiments are some but not all of the embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments herein without making any creative effort, shall fall within the scope of protection. It should be noted that the embodiments and features of the embodiments may be arbitrarily combined with each other without conflict.
When software on a server is tested, real traffic of an online server is generally copied to a test server by using a tcp copy, and the software is sufficiently tested by simulating the real traffic, but in reality, a client request includes an http request and an http request, and the http request is a stateless request, so the tcp copy can smoothly copy traffic of the http request to the test server, but for the http request, the traffic of the http request cannot be simply copied to the test server due to the use of an encryption technology.
A traffic copying method is provided herein, fig. 1 is a flowchart of the traffic copying method applied to an online server, and referring to fig. 1, the traffic copying method applied to the online server includes:
step S11, receiving a client request;
step S12, copying the client request to the offline server;
step S13, sending online server information for decrypting the client request to an offline server, so that the offline server decrypts the client request; or receiving an offline server random number sent by an offline server, and generating a second secret key based on the offline server random number; wherein the client request comprises an HTTPS request.
The request of the client can be an HTTP request or an HTTPS request, and the client request is copied to the offline server after the online server receives the client request. In response to the HTTP request, the offline server can respond directly to the HTTP request due to the characteristics of HTTP itself. For the HTTPS request, the HTTPS protocol is used, and is constructed by SSL + HTTP protocol, and the data transmission thereof is encrypted data. The encryption mode is agreed by both the client and the server, and the key for encryption is generated based on the random number of the client and the random number of the online server, so that even if the offline server uses the same certificate as the online server and has the same configuration, the random number of the server is different, and the random number of the offline server and the random number of the client generate the key different from that of the online server, so that the traffic data copied by the online server cannot be decrypted. Thus, in the method described herein, in order for the online server and the offline server to be able to decrypt the same HTTPS request, the relevant settings and operations need to be performed, the online server and the offline server use the same server random number line, or use the same key, and therefore the online server also needs to send online server information for decrypting the client request to the offline server so that the offline server can decrypt the client request. Or receiving an offline server random number sent by the offline server, and generating a second secret key based on the offline server random number.
The online server information comprises an online server random number or a first secret key generated after handshaking with the client, and the sending of the online server information used for decrypting the client request to the offline server comprises the following steps:
sending an on-line server random number generated in a handshake process with a client to an off-line server;
or sending a first secret key generated after handshaking with the client to the offline server.
In order to enable the offline server to decrypt the encrypted request of the client, the online server may send its own server random number to the offline server in a handshake with the client, and the offline server may generate a key based on the online server random number and the client random number to decrypt the client request.
Alternatively, the online server may send the generated first secret key to the offline server after handshaking with the client, and the offline server may decrypt the client request using the first secret key.
Similarly, the online server may also generate a second secret key based on the offline server random number, including: and replacing the random number of the online server with the random number of the offline server, and generating a second secret key based on the random number of the offline server and the random number of the client. The offline server also generates a secret key identical to the second secret key based on the random number of the offline server and the random number of the client, so that the HTTPS request sent by the client to the online server and encrypted by using the second secret key can be decrypted.
Fig. 2 is a flowchart of a traffic copy method applied to an offline server, and referring to fig. 2, the traffic copy method includes:
step S21, receiving a client request copied by the online server, wherein the client request comprises an HTTPS request;
step S22, sending the offline server random number to the online server, and generating a third key based on the offline server random number and the client random number. Or receiving online server information sent by the online server.
Step S23, when the client request is an HTTPS request, decrypting the HTTPS request using the third secret key; or based on the online server information, the HTTPS request is decrypted.
After receiving the client request copied by the online server, the offline server sends a random number of the offline server to the online server, so that the online server generates a second secret key based on the offline server random number and the client random number, and simultaneously, the online server generates a third secret key based on the offline server random number and the client random number.
Or, the offline server receives the online server information sent by the online server while receiving the client request copied by the online server, and the offline server can decrypt the HTTPS request in the client traffic copied by the online server.
The online server information is an online server random number or a first secret key generated after handshaking between the online server and the client, and the decrypting the HTTPS request comprises the following steps of:
when the online server information is an online server random number, generating a fourth secret key based on the online server random number, and decrypting the HTTPS request of the client by using the fourth secret key;
and when the online server information is the first key, decrypting the HTTPS request of the client by using the first key.
Generating the fourth key based on the online server random number includes:
and replacing the random number of the offline server with the random number of the online server, and generating a fourth secret key based on the random number of the online server and the random number of the client.
Likewise, the first key and the fourth key are also generated based on the same random number, and thus the first key and the fourth key are identical, enabling the offline server to decrypt the HTTPS request copied by the online server.
If the online server information sent by the online server is the first key, the traffic server may respond to the request of the client based on the random number of the traffic server after receiving the handshake request of the client, but in the stage of generating the key, the first key is used as the generated key, or replaces the generated key, to decrypt the HTTPS traffic of the client.
By the method, in the process of copying the flow of the online server, the HTTP flow and the HTTPS flow do not need to be distinguished, and the information of the online server is sent to the test server, so that the test server can decrypt the HTTPS flow smoothly, and the purpose of truly simulating the online flow is achieved.
Fig. 3 is a block diagram of a traffic copying apparatus, and referring to fig. 3, the traffic copying apparatus includes: a request receiving module 301, a traffic copying module 302 and a first information exchange module 303.
The request receiving module 301 is configured to receive a client request.
The traffic copy module 302 is configured to copy client requests to an offline server.
The first information exchange module 303 is configured to send online server information for decrypting a client request to an offline server, so that the offline server decrypts the client request; or receiving an offline server random number sent by an offline server, and generating a second secret key based on the offline server random number; wherein the client request comprises an HTTPS request.
The online server information is an online server random number or a first secret key generated after handshaking with the client, and the first information exchange module sends the online server information to the offline server and comprises the following steps:
sending an on-line server random number generated in a handshake process with a client to the off-line server;
or sending a first secret key generated after handshaking with the client to the offline server.
Generating the second secret key based on the offline server random number includes: and replacing the random number of the online server with the random number of the offline server, and generating the second secret key based on the random number of the offline server and the random number of the client.
Fig. 4 is a block diagram of a traffic copying apparatus, and referring to fig. 4, the traffic copying apparatus includes: a traffic receiving module 401, a second information exchange module 402, and a traffic processing module 403.
The traffic receiving module 401 is configured to receive client requests of the online server copy, the client requests including HTTPS requests.
The second information exchange module 402 is configured to send the offline server random number to the online server, and generate a third key based on the offline server random number and the client random number. Or, receiving online server information sent by an online server;
the traffic handling module 403 is configured to, when the client request is an HTTPS request, decrypt the HTTPS request using the third secret key; or, based on the online server information, decrypting the HTTPS request.
The online server information is an online server random number or a first secret key generated after the online server and the client handshake; the traffic processing module decrypts the HTTPS request based on the online server information, including:
when the online server information is an online server random number, generating a fourth secret key based on the online server random number, and decrypting the HTTPS request by using the fourth secret key;
and when the online server information is the first key, decrypting the HTTPS request by using the first key.
Generating the fourth key based on the online server random number includes:
and replacing the random number of the offline server with the random number of the online server, and generating the fourth secret key based on the random number of the online server and the random number of the client.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
Fig. 5 is a block diagram illustrating a computer device 500 for traffic copying in accordance with an example embodiment. For example, the computer device 500 may be provided as a server. Referring to fig. 5, the computer device 500 includes a processor 501, and the number of the processors may be set to one or more as necessary. The computer device 500 further comprises a memory 502 for storing instructions, such as an application program, executable by the processor 501. The number of the memories can be set to one or more according to needs. Which may store one or more application programs. The processor 501 is configured to execute instructions to perform the above-described method.
As will be appreciated by one skilled in the art, the embodiments herein may be provided as a method, apparatus (device), or computer program product. Accordingly, the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present disclosure may take the form of a computer program product embodied on one or more computer-usable storage media having computer-usable program code embodied in the medium. Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, including, but not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, Digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by the computer, and the like. In addition, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media as known to those skilled in the art.
The present disclosure is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (devices) and computer program products according to embodiments herein. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that an article or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such article or apparatus. Without further limitation, an element defined by the phrase "comprising … …" does not exclude the presence of additional like elements in the article or device comprising the element.
While the preferred embodiments herein have been described, additional variations and modifications of these embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. It is therefore intended that the following appended claims be interpreted as including the preferred embodiments and all such alterations and modifications as fall within the scope of this disclosure.
It will be apparent to those skilled in the art that various changes and modifications may be made herein without departing from the spirit and scope thereof. Thus, it is intended that such changes and modifications be included herein, provided they come within the scope of the appended claims and their equivalents.

Claims (14)

1. A flow copying method is applied to an online server and is characterized by comprising the following steps:
receiving a client request;
copying the client request to an offline server;
sending online server information for decrypting the client request to an offline server so that the offline server decrypts the client request; or receiving an offline server random number sent by an offline server, and generating a second secret key based on the offline server random number; wherein the client request comprises an HTTPS request.
2. The traffic copying method according to claim 1, wherein the online server information includes an online server random number or a first key generated after handshaking with a client, and the sending the online server information for decrypting the client request to the offline server includes:
sending an on-line server random number generated in a handshake process with a client to the off-line server;
or sending a first secret key generated after handshaking with the client to the offline server.
3. The traffic copying method of claim 1, wherein the generating a second secret key based on the offline server random number comprises: and replacing the random number of the online server with the random number of the offline server, and generating the second secret key based on the random number of the offline server and the random number of the client.
4. A flow copying method is applied to an offline server and is characterized by comprising the following steps:
receiving a client request copied by an online server, wherein the client request comprises an HTTPS request;
sending the offline server random number to the online server, and generating a third secret key based on the offline server random number and the client random number; or receiving online server information sent by the online server.
When the client request is an HTTPS request, decrypting the HTTPS request by using the third secret key; or based on the online server information, decrypting the HTTPS request.
5. The traffic copying method according to claim 4, wherein the online server information is an online server random number or a first key generated after a handshake between the online server and the client, and the decrypting the HTTPS request based on the online server information includes:
when the online server information is an online server random number, generating a fourth secret key based on the online server random number, and decrypting the HTTPS request by using the fourth secret key;
and when the online server information is a first key, decrypting the HTTPS request by using the first key.
6. The traffic copying method of claim 5, wherein the generating a fourth key based on the online server random number comprises:
and replacing the random number of the offline server with the random number of the online server, and generating the fourth secret key based on the random number of the online server and the random number of the client.
7. A traffic copying apparatus, comprising:
the request receiving module is used for receiving a client request;
the flow copying module is used for copying the client request to an offline server;
the first information exchange module is used for sending online server information used for decrypting the client request to an offline server so that the offline server decrypts the client request; or receiving an offline server random number sent by an offline server, and generating a second secret key based on the offline server random number; wherein the client request comprises an HTTPS request.
8. The traffic copying apparatus according to claim 7, wherein the online server information is an online server random number or a first key generated after handshaking with the client, and the sending the online server information to the offline server includes:
sending an on-line server random number generated in a handshake process with a client to the off-line server;
or sending a first secret key generated after handshaking with the client to the offline server.
9. The traffic copying apparatus of claim 7, wherein the generating a second secret key based on the offline server random number comprises: and replacing the random number of the online server with the random number of the offline server, and generating the second secret key based on the random number of the offline server and the random number of the client.
10. A traffic copying apparatus, comprising:
the system comprises a flow receiving module, a flow receiving module and a flow control module, wherein the flow receiving module is used for receiving a client request copied by an online server, and the client request comprises an HTTPS request;
and the second information exchange module is used for sending the offline server random number to the online server and generating a third secret key based on the offline server random number and the client random number. Or, receiving online server information sent by an online server;
the traffic processing module is used for decrypting the HTTPS request by using the third secret key when the client request is the HTTPS request; or, based on the online server information, decrypting the HTTPS request.
11. The traffic copying apparatus according to claim 10, wherein the online server information is an online server random number or a first key generated after a handshake between the online server and the client; the traffic processing module, based on the online server information, decrypting the HTTPS request includes:
when the online server information is an online server random number, generating a fourth secret key based on the online server random number, and decrypting the HTTPS request by using the fourth secret key;
and when the online server information is a first key, decrypting the HTTPS request by using the first key.
12. The traffic copying apparatus of claim 11, wherein the generating a fourth key based on the online server random number comprises:
and replacing the random number of the offline server with the random number of the online server, and generating the fourth secret key based on the random number of the online server and the random number of the client.
13. A computer-readable storage medium, on which a computer program is stored, characterized in that the computer program, when executed, implements the steps of the method according to any one of claims 1-6.
14. A computer arrangement comprising a processor, a memory and a computer program stored on the memory, characterized in that the steps of the method according to any of claims 1-6 are implemented when the computer program is executed by the processor.
CN201910912910.XA 2019-09-25 2019-09-25 Traffic copying method, device, medium and equipment Pending CN112559312A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910912910.XA CN112559312A (en) 2019-09-25 2019-09-25 Traffic copying method, device, medium and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910912910.XA CN112559312A (en) 2019-09-25 2019-09-25 Traffic copying method, device, medium and equipment

Publications (1)

Publication Number Publication Date
CN112559312A true CN112559312A (en) 2021-03-26

Family

ID=75029499

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910912910.XA Pending CN112559312A (en) 2019-09-25 2019-09-25 Traffic copying method, device, medium and equipment

Country Status (1)

Country Link
CN (1) CN112559312A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20230078096A1 (en) * 2021-09-10 2023-03-16 Assa Abloy Ab Offline delegation of authorization data

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030212660A1 (en) * 2002-05-10 2003-11-13 Kerwin Douglas W. Database scattering system
US20050210251A1 (en) * 2002-09-18 2005-09-22 Nokia Corporation Linked authentication protocols
CN101001183A (en) * 2007-01-10 2007-07-18 网之易信息技术(北京)有限公司 Test method and system for network application software
CN104410542A (en) * 2014-11-18 2015-03-11 小米科技有限责任公司 Method and device for simulation test
CN106131207A (en) * 2016-08-03 2016-11-16 杭州安恒信息技术有限公司 A kind of method and system bypassing audit HTTPS packet
CN109716345A (en) * 2016-04-29 2019-05-03 普威达有限公司 Computer implemented privacy engineering system and method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030212660A1 (en) * 2002-05-10 2003-11-13 Kerwin Douglas W. Database scattering system
US20050210251A1 (en) * 2002-09-18 2005-09-22 Nokia Corporation Linked authentication protocols
CN101001183A (en) * 2007-01-10 2007-07-18 网之易信息技术(北京)有限公司 Test method and system for network application software
CN104410542A (en) * 2014-11-18 2015-03-11 小米科技有限责任公司 Method and device for simulation test
CN109716345A (en) * 2016-04-29 2019-05-03 普威达有限公司 Computer implemented privacy engineering system and method
CN106131207A (en) * 2016-08-03 2016-11-16 杭州安恒信息技术有限公司 A kind of method and system bypassing audit HTTPS packet

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20230078096A1 (en) * 2021-09-10 2023-03-16 Assa Abloy Ab Offline delegation of authorization data

Similar Documents

Publication Publication Date Title
US11706026B2 (en) Location aware cryptography
JP2019525350A (en) Authentication method, apparatus and authentication client
US9954900B2 (en) Automating the creation and maintenance of policy compliant environments
US11568066B2 (en) Incorporating at-rest data encryption into a cloud-based storage architecture
US10728232B2 (en) Method for authenticating client system, client device, and authentication server
CN110049032A (en) A kind of the data content encryption method and device of two-way authentication
CN104869103A (en) Method for searching multimedia file, terminal equipment and server
US11206145B2 (en) Integrated circuit personalisation
CN109408486B (en) File distribution method and system, distribution server and file generation device
US20200236104A1 (en) Methods and apparatus to verify encrypted handshakes
CN110149312B (en) Data processing method, device, system and computer readable storage medium
CN111431957B (en) File processing method, device, equipment and system
CN110046000B (en) Applet running method and device
CN112559312A (en) Traffic copying method, device, medium and equipment
JP2023526793A (en) Identifying the Creator of Encrypted Objects
US20110019820A1 (en) Communication channel claim dependent security precautions
CN111861462A (en) Financial product transaction method and device based on block chain
CN111464295A (en) Bank card making method and device
CN111221903A (en) Data tracing method, system and computer storage medium
US20190147150A1 (en) Digital certificate containing multimedia content
WO2021192992A1 (en) Entity, gateway device, information processing device, information processing system, and information processing method
CN107241341A (en) Access control method and device
CN111988356A (en) File transmission method, equipment and medium
CN110175036A (en) The upgrade method and device of soft-lock license
CN113824555B (en) Key processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination