WO2012083732A1 - 在web中传输数据时进行加解密的方法及系统 - Google Patents

在web中传输数据时进行加解密的方法及系统 Download PDF

Info

Publication number
WO2012083732A1
WO2012083732A1 PCT/CN2011/079634 CN2011079634W WO2012083732A1 WO 2012083732 A1 WO2012083732 A1 WO 2012083732A1 CN 2011079634 W CN2011079634 W CN 2011079634W WO 2012083732 A1 WO2012083732 A1 WO 2012083732A1
Authority
WO
WIPO (PCT)
Prior art keywords
encryption
decryption
decryption information
algorithm
server
Prior art date
Application number
PCT/CN2011/079634
Other languages
English (en)
French (fr)
Inventor
杨谦
肖衡
于涛
Original Assignee
腾讯科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 腾讯科技(深圳)有限公司 filed Critical 腾讯科技(深圳)有限公司
Priority to US13/810,347 priority Critical patent/US8966243B2/en
Publication of WO2012083732A1 publication Critical patent/WO2012083732A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/041Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 using an encryption or decryption engine integrated in transmitted data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/166Implementing security features at a particular protocol layer at the transport layer

Definitions

  • the present invention relates to data transmission techniques, and more particularly to a method and system for performing encryption and decryption when transmitting data in a web. Background of the invention
  • the user terminal performs data transfer between the browser platform and the web server.
  • AJAX technology is used to transmit data between a browser and a web server through a hypertext transmission protocol (HTTP), and Javascrip is an interpretive language, and the code algorithm has no secret, and is inconvenient for transmitting and receiving data.
  • HTTP hypertext transmission protocol
  • Javascrip is an interpretive language
  • the code algorithm has no secret, and is inconvenient for transmitting and receiving data.
  • the encryption and decryption process causes the transmitted data to be leaked.
  • Data transfer between the browser and the web server involves multiple services, such as instant messaging.
  • IM Instant Messaging
  • online payment service online banking business or securities system business.
  • weblM service in the IM service as an example.
  • the service is characterized in that the client does not need to download and install the client. You can log in to the IM web server through the browser on the PC connected to the network and access the server cluster system of the IM.
  • the service is not like the client. In this way, some user data can be stored on the PC, but each time the cluster is accessed, the information such as the buddy list is obtained from the IMweb server, and the HTTP channel is transmitted in plain text, and the information such as the buddy list and the chat record cannot be performed.
  • the encryption and decryption process leads to the risk of information leakage.
  • the security hypertext transfer protocol is often used.
  • HTTPS Hypertext Transfer Protocol over Secure Socket Layer
  • the channel transfers data between the browser and the web server.
  • the HTTPS channel is a security-oriented channel. In terms of the HTTP channel, it is a secure version of the HTTP channel. Specifically, it is added under HTTP.
  • SSL Secure Socket Layer
  • SSL Secure Socket Layer
  • encryption and decryption operations require SSL assistance.
  • Including "HTTPS:" in the Uniform Resource Locator (URL) indicates that the data is transmitted over the HTTPS channel.
  • HTTPS has different default ports with HTTP and an encryption/authentication layer.
  • Fig. 1 is a diagram showing the structure of a system for performing encryption and decryption when data is transmitted in the web.
  • HTTPS has a great impact on the efficiency of the overall architecture. It is roughly 10 times the impact of HTTP on the overall architecture. If you replace HTTP with HTTPS, the overall performance will be reduced by about 90%. That is, existing solutions will increase the load on the HTTPS channel and reduce overall performance. Summary of the invention
  • the present invention provides a method of encrypting and decrypting when transmitting data in the web, which can reduce the load of the HTTPS channel.
  • the present invention provides a system for encrypting and decrypting data as it is transmitted over the web, which system can reduce the load on the HTTPS channel.
  • a method for performing encryption and decryption when transmitting data in a web comprising: the browser sending an encryption and decryption information acquisition request to the encryption/decryption information providing device;
  • the encryption and decryption information providing device sends the encryption and decryption information to the browser through the HTTPS channel.
  • the encryption and decryption information includes an encryption and decryption algorithm and an encryption and decryption index;
  • the browser encrypts the data to be sent by using the encryption and decryption algorithm, and sends the encrypted data and the encryption and decryption index to the web server through an HTTP channel;
  • the web server acquires a corresponding encryption and decryption algorithm from the encryption/decryption information providing device according to the encryption and decryption index, and decrypts the encrypted data.
  • Another method for performing encryption and decryption when transmitting data in the web comprising: the web server sending an encryption and decryption information acquisition request to the encryption and decryption information providing device; and the encryption and decryption information providing device acquiring the encryption and decryption algorithm and the encryption and decryption index Decrypt the information and send it to the web server;
  • the web server encrypts the data to be sent by using the encryption and decryption algorithm in the encryption and decryption information, and sends the encryption and decryption index in the encrypted data and the encryption and decryption information to the browser through the HTTP channel;
  • the browser obtains an encryption and decryption algorithm corresponding to the encryption and decryption index sent by the web server from the encryption/decryption information providing device through the HTTPS channel, and decrypts the encrypted data sent by the web server.
  • a system for encrypting and decrypting data when transmitting data in a web comprising a user terminal, a web server, and an encryption and decryption information providing device;
  • the user terminal sends an encryption and decryption information acquisition request to the encryption/decryption information providing device based on the browser, and receives the encryption and decryption information including the encryption and decryption algorithm and the encryption and decryption index sent by the encryption and decryption information providing device, and the browser adopts the
  • the encryption/decryption algorithm encrypts the transmission data, and sends the encrypted data and the encryption and decryption index to the web server through an HTTP channel;
  • the web server is configured to receive the encrypted data sent by the browser and the encryption and decryption index, obtain a corresponding encryption and decryption algorithm from the encryption and decryption information providing device according to the encryption and decryption index, and perform the encryption and decryption algorithm on the encrypted data.
  • Decrypt The encryption and decryption information providing device is configured to receive an encryption and decryption information acquisition request sent by the browser, send the encryption and decryption information to the browser through an HTTPS channel, and provide an encryption and decryption index according to the request of the web server. Corresponding encryption and decryption algorithm.
  • FIG. 1 is a schematic structural diagram of a system for performing encryption and decryption when transmitting data in a web in the prior art
  • FIG. 2 is a schematic structural diagram of a system for performing encryption and decryption when transmitting data in a web according to the present invention
  • FIG. 3 is a schematic flow chart of a method for performing encryption and decryption when transmitting data in a web according to the present invention
  • the invention provides an encryption and decryption information providing device, and provides encryption and decryption information required for performing encryption and decryption processing to the browser and the web server through the encryption and decryption information providing device, and uses the HTTP channel to transmit encrypted data between the browser and the web server. , so, no need to The HTTPS channel is used between the browser and the web server for data transmission to improve data security. Therefore, on the basis of ensuring the security of the transmitted data, the load of the HTTPS channel is reduced, and the overall performance is improved.
  • FIG. 2 is a schematic diagram of a system structure for encrypting and decrypting data when transmitting data in a web according to the present invention, the system comprising a user terminal, a web server, and an encryption and decryption information providing device;
  • the user terminal sends an encryption and decryption information acquisition request to the encryption/decryption information providing device based on the browser, and receives the encryption and decryption information including the encryption and decryption algorithm and the encryption and decryption index sent by the encryption and decryption information providing device, and the browser adopts the
  • the encryption/decryption algorithm encrypts the transmission data, and sends the encrypted data and the encryption and decryption index to the web server through an HTTP channel;
  • the web server is configured to receive the encrypted data sent by the browser and the encryption and decryption index, obtain a corresponding encryption and decryption algorithm from the encryption and decryption information providing device according to the encryption and decryption index, and perform the encryption and decryption algorithm on the encrypted data.
  • the encryption and decryption information providing device is configured to receive an encryption and decryption information acquisition request sent by the browser, send the encryption and decryption information to the browser through an HTTPS channel, and provide an encryption and decryption index according to the request of the web server. Corresponding encryption and decryption algorithm.
  • the encryption and decryption information providing device can be implemented by a server or by an algorithm server and an HTTPS server; here, the encryption and decryption information providing device is implemented by an algorithm server and an HTTPS server:
  • the HTTPS server is configured to receive an encryption and decryption information acquisition request sent by the browser, and send an encryption and decryption information acquisition request to the algorithm server; and receive the algorithm service.
  • the encrypted and decrypted information fed back by the device is sent to the browser through an HTTPS channel;
  • the algorithm server is configured to receive an encryption and decryption information acquisition request sent by the HTTPS server, obtain corresponding encryption and decryption information, and feed back to the HTTPS server through an intranet.
  • the algorithm server and the web server, as well as the algorithm server and the HTTPS server communicate through the intranet.
  • the encryption and decryption information providing device further includes a management server, configured to perform real-time update on the encryption and decryption information in the algorithm server.
  • the encryption and decryption information may be replaced, or the encryption and decryption algorithm and the encryption and decryption key generation rule may be modified.
  • the real-time update of the encryption and decryption information in the algorithm server can avoid being maliciously taken or analyzed by the outside world to guess the encryption and decryption rules.
  • the web server is further configured to acquire, from the encryption and decryption information providing device, encryption and decryption information including an encryption and decryption algorithm and an encryption and decryption index, and encrypt and encrypt the data to be encrypted by using an encryption and decryption algorithm in the encryption and decryption information, and encrypt the data and add
  • encryption and decryption index in the decryption information is sent to the browser through an HTTP channel;
  • the user terminal further obtains an encryption/decryption algorithm corresponding to the encryption and decryption index sent by the web server from the encryption/decryption information providing device via the HTTPS channel, and decrypts the encrypted data sent by the web server.
  • the present invention also provides a method for performing encryption and decryption when transmitting data in the web.
  • the flow is as shown in FIG. 3, which includes the following steps:
  • Step 301 The browser sends an encryption and decryption information acquisition request to the encryption/decryption information providing device.
  • Step 302 The encryption and decryption information providing device sends the encryption and decryption information to the browser through the HTTPS channel, where the encryption and decryption information includes an encryption and decryption algorithm and an encryption and decryption index.
  • Step 303 the browser uses the encryption and decryption algorithm to encrypt the data to be sent, and The encrypted data and the encrypted decryption index are sent to the web server via an HTTP channel.
  • Step 304 The web server obtains a corresponding encryption and decryption algorithm from the encryption and decryption information providing device according to the encryption and decryption index, and decrypts the received encrypted data.
  • the encryption and decryption algorithm acquired from the algorithm server may be deleted.
  • the encryption/decryption information providing device sends the encryption and decryption information to the browser through the HTTPS channel in the above-mentioned process step 302.
  • the encryption and decryption information providing device includes the HTTPS server receiving and adding. Decrypting the information acquisition request, and transmitting an encryption and decryption information acquisition request to the algorithm server included in the encryption/decryption information providing device; the algorithm server acquires the corresponding encryption and decryption information, and sends the encryption and decryption information to the HTTPS server through the intranet, and the HTTPS server sends the encryption and decryption information to the HTTPS channel.
  • step 304 The web server obtains the encryption and decryption algorithm from the encryption/decryption information providing device according to the encryption and decryption index, and the web server obtains the corresponding encryption and decryption algorithm from the algorithm server through the intranet according to the encryption and decryption index.
  • the encryption/decryption information providing apparatus stores an encryption/decryption algorithm and a corresponding encryption/decryption index, and the encryption/decryption algorithm includes, for example, an encryption/decryption function and an encryption/decryption key.
  • the encryption and decryption information providing device may randomly select a group to provide the requesting party from the stored encryption and decryption information, and may also extract the encryption and decryption information according to a certain specification, for example, if the encryption and decryption information providing device
  • the corresponding domain name stores the encryption and decryption algorithm and the corresponding encryption and decryption index
  • the encryption and decryption information acquisition request received by the encryption/decryption information providing device also includes the domain name, and then the corresponding encryption and decryption information is extracted according to the domain name.
  • the foregoing process further includes: performing real-time update on the encryption and decryption information in the algorithm server.
  • the present invention also encrypts and transmits the data transmitted by the web server to the browser, and specifically includes:
  • the web server sends an encryption and decryption information acquisition request to the encryption and decryption information providing device;
  • the encryption and decryption information providing device acquires the encryption and decryption information including the encryption and decryption algorithm and the encryption and decryption index, and sends the encryption and decryption information to the web server;
  • the web server encrypts the data to be sent by using the encryption and decryption algorithm in the encryption and decryption information, and sends the encryption and decryption index in the encrypted data and the encryption and decryption information to the browser through the HTTP channel;
  • the browser obtains an encryption and decryption algorithm corresponding to the encryption and decryption index sent by the web server from the encryption/decryption information providing device through the HTTPS channel, and decrypts the encrypted data sent by the web server.
  • the data transmission between the browser and the web server involves a variety of services, such as IM services, online payment services, online banking services or securities system services.
  • IM services such as IM services, online payment services, online banking services or securities system services.
  • the following is a detailed description of the method for encrypting and decrypting data transmitted in the web according to the IM web service in the IM service.
  • the method is based on the system implementation of FIG. 3, where the web server is specifically an IM web server, and the encryption and decryption information providing device is provided.
  • the method includes the following steps:
  • Step 401 The browser sends an encryption and decryption information acquisition request to the HTTPS server.
  • step 401 is performed.
  • the complete JavaScript is downloaded from the static page server in the IMweb server, and then the browser uses JavaScript to initiate an encryption and decryption information acquisition request to the HTTPS server.
  • Step 402 The HTTPS server receives the encryption and decryption information acquisition request, and transmits an encryption and decryption information acquisition request to the algorithm server.
  • Step 403 The algorithm server obtains the corresponding encryption and decryption information, and sends the information to the HTTPS server through the intranet, and the HTTPS server sends the encryption and decryption information to the HTTP through the HTTPS channel. Browser.
  • the encryption and decryption information includes an encryption and decryption algorithm and an encryption and decryption index (Index).
  • the encryption and decryption algorithm includes a decryption function and an encryption and decryption key (key).
  • the algorithm server is responsible for maintaining a number of encryption and decryption function pairs (Fun), each encryption and decryption function pair includes an encryption function (EnFun) and a decryption function (DnFun), and generates an encryption and decryption key; then combines Fun and Key into a queue, and gives each The queue sets an Index. When Fun and Key are combined, Fun and Key can be combined correspondingly or cross-combined.
  • the combined queue information is shown in Table 1, for example.
  • Index is used to query the corresponding function
  • EnFun is used to encrypt the data to be transmitted
  • DeFun is used to decrypt the encrypted data
  • EnFun and DeFun use the symmetric encryption algorithm, which can be set by the administrator.
  • the encryption and decryption key can be generated in a large amount, and is not repeated and irreversible.
  • the flag flag can identify whether the team algorithm has been used, whether it has expired, and so on. If the user goes online or offline on the WebIM, the WebIM server notifies the algorithm server to update the Flag field of the queue information in time to make it identify as unused.
  • the browser can also store the encryption and decryption algorithm corresponding to the encryption and decryption index for use in multiple uses. In this way, the browser does not need to request encryption and decryption information from the HTTPS server every time data is sent, and the process is streamlined.
  • Step 404 The browser encrypts the data to be sent by using the received encryption and decryption function and the encryption/decryption key, and sends the encrypted data and the received encryption and decryption index to the IMweb server through the HTTP channel.
  • Step 405 The IMweb server acquires a corresponding encryption and decryption algorithm from the algorithm server according to the encryption and decryption index, and decrypts the received encrypted data.
  • the IMweb server can store and decrypt the encryption and decryption algorithm corresponding to the encryption and decryption index, so as to be used for multiple times. In this way, the IMweb server does not need to request encryption and decryption information from the algorithm server every time data is sent, and the process is compressed.
  • the data can be processed accordingly, for example, performing local calculation, sending UDP data packets to the background server to obtain feedback data, etc., and obtaining processed data, if necessary, returning the processed data to the browser. Then, step 406 is performed.
  • step 406 is performed.
  • Step 406 The IMweb server sends an encryption and decryption information acquisition request to the algorithm server.
  • Step 407 The algorithm server obtains the encryption and decryption information including the encryption and decryption algorithm and the encryption and decryption index, and sends the information to the IMweb server through the intranet.
  • Step 408 The IMweb server encrypts the data to be sent by using an encryption and decryption algorithm in the encryption and decryption information, and sends the encryption and decryption index in the encrypted data and the encryption and decryption information to the browser through an HTTP channel.
  • Step 409 After receiving the encrypted data and the encryption and decryption index, the browser sends an encryption and decryption information acquisition request including an encryption and decryption index to the HTTPS server.
  • Step 410 The HTTPS server receives the encryption and decryption information acquisition request including the encryption and decryption index, and transmits an encryption and decryption information acquisition request including the encryption and decryption index to the algorithm server.
  • Step 411 The algorithm server obtains an encryption and decryption algorithm corresponding to the received encryption and decryption index, and sends the encryption and decryption algorithm to the HTTPS server through the intranet, and the HTTPS server sends the encryption and decryption algorithm to the browser through the HTTPS channel.
  • Step 412 The browser uses the received encryption and decryption algorithm to decrypt the encrypted data sent by the IMweb server. If the encryption and decryption algorithm is stored in the browser corresponding to the encryption/decryption index in step 403, the browser does not need to acquire from the HTTPS server again, but directly decrypts the received encrypted data by using the previously stored encryption and decryption algorithm.
  • Steps 401-405 are processes for encrypting and transmitting data transmitted by the browser to the IMweb server.
  • Steps 406-412 are processes for encrypting and transmitting data transmitted by the IMweb server to the browser, and steps 401 and 406 can be performed out of order.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)
  • Information Transfer Between Computers (AREA)

Description

在 web中传输数据时进行加解密的方法及系统 技术领域
本发明涉及数据传输技术, 尤其涉及在 web中传输数据时进行加解 密的方法及系统。 发明背景
在 web应用中,用户终端基于浏览器平台与 web服务器之间进行数 据传输。一般地,采用 AJAX技术,通过超文件传输协议( HTTP, hypertext transmission protocol )通道在浏览器与 web服务器之间进行数据传输, 而 Javascrip是解释性语言, 代码算法没有秘密, 对于收发的数据不便于 做加解密处理, 导致传输的数据存在泄露的风险。
浏览器与 web服务器之间的数据传输涉及多种业务, 例如即时通讯
( IM, Instant Messaging ) 业务、 在线支付业务、 网银业务或证券系统 业务等。 以 IM业务中的 weblM业务为例, 该业务特点在于不需要下载 和安装客户端,可以在连接网络的 PC上通过浏览器登录 IMweb服务器, 接入 IM的服务器集群系统;该业务不像客户端那样可以在 PC上存储一 些用户资料, 而是在每次接入集群后,从 IMweb服务器获取好友列表等 资料, 而 HTTP通道采用明文传输的方式, 不能对好友列表等资料以及 聊天记录等信息进行加解密处理, 导致存在信息泄露的风险。
为了提高数据传输的安全性, 目前常通过安全超文本传输协议
( HTTPS, Hypertext Transfer Protocol over Secure Socket Layer )通道在 浏览器与 web服务器之间进行数据传输。 HTTPS通道是以安全为目的 的通道, 筒单而言是 HTTP通道的安全版, 具体地, 在 HTTP下加入安 全套接层(SSL, Secure Socket Layer ), HTTPS的安全基础便是 SSL, 加解密操作需要 SSL 协助完成。 在统一资源定位器 (URL, Uniform Resource Locator )地址中包含 "HTTPS:"就表明通过 HTTPS通道进行数 据传输, HTTPS存在不同与 HTTP的默认端口及一个加密 /身份验证层。
现有进行加解密数据传输的方案中, 一般都是全程采用 HTTPS 通 道来进行数据传输, HTTPS通道会对在浏览器与 web服务器之间传输 的数据进行加解密处理, 这样, 即使数据在传输过程中被网关或路由器 上的抓包工具所截获, 由于抓包工具无法获知加解密算法, 也不会造成 数据信息的泄露。 图 1示出了现有在 web中传输数据时进行加解密的系 统结构示意图。
然而, 在浏览器与 web服务器之间通过 HTTPS通道进行数据传输 存在以下缺点:
HTTPS对整体构架的使用效率有很大影响, 大致是 HTTP对整体构 架使用效率影响的 10倍, 如果将 HTTP全部用 HTTPS替换, 将导致整 体性能下降 90 %左右。也就是, 现有的方案将增大 HTTPS通道的负荷, 降低整体性能。 发明内容
本发明提供了在 web中传输数据时进行加解密的方法, 该方法能够 减小 HTTPS通道的负荷。
本发明提供了在 web中传输数据时进行加解密的系统, 该系统能够 减小 HTTPS通道的负荷。
一种在 web中传输数据时进行加解密的方法, 该方法包括: 浏览器向加解密信息提供设备发送加解密信息获取请求;
加解密信息提供设备通过 HTTPS通道将加解密信息发送给浏览器, 所述加解密信息包括加解密算法及加解密索引;
浏览器采用所述加解密算法对待发送数据进行加密, 将加密数据和 所述加解密索引通过 HTTP通道发送给 web服务器;
web服务器根据所述加解密索引从加解密信息提供设备获取对应的 加解密算法, 对所述加密数据进行解密。
另一种在 web中传输数据时进行加解密的方法, 该方法包括: web服务器向加解密信息提供设备发送加解密信息获取请求; 加解密信息提供设备获取包含加解密算法及加解密索引的加解密信 息, 发送给 web服务器;
web 服务器采用加解密信息中的加解密算法对待发送数据进行加 密, 将加密数据和加解密信息中的加解密索引通过 HTTP通道发送给浏 览器;
浏览器通过 HTTPS通道从加解密信息提供设备获取与 web服务器 发送的加解密索引对应的加解密算法,对 web服务器发送的加密数据进 行解密。
一种在 web中传输数据时进行加解密的系统,该系统包括用户终端、 web服务器和加解密信息提供设备;
所述用户终端, 基于浏览器向加解密信息提供设备发送加解密信息 获取请求, 接收所述加解密信息提供设备发送的包含加解密算法和加解 密索引的加解密信息, 所述浏览器采用所述加解密算法对待发送数据进 行加密, 将加密数据和所述加解密索引通过 HTTP通道发送给所述 web 服务器;
所述 web服务器, 用于接收所述浏览器发送的加密数据和所述加解 密索引, 根据所述加解密索引从所述加解密信息提供设备获取对应的加 解密算法, 对所述加密数据进行解密; 所述加解密信息提供设备, 用于接收所述浏览器发送的加解密信息 获取请求, 通过 HTTPS通道将加解密信息发送给所述浏览器; 并根据 所述 web服务器的请求提供与加解密索引对应的加解密算法。
从上述方案可以看出, 本发明中, 浏览器通过安全性较高的 HTTPS 通道向加解密信息提供设备请求加解密信息, 对待发送数据进行加密后 通过 HTTP通道传送给 web服务器, web服务器再从加解密信息提供设 备获取相应的加解密算法对加密数据进行解密。 这样, 通过加解密信息 提供设备向浏览器和 web服务器提供加解密信息, 实现了在浏览器与 web服务器之间采用 HTTP通道进行加密数据的传输, 而不用在浏览器 和 web服务器之间采用 HTTPS通道进行数据传输,减小 HTTPS通道的 负荷, 提高了整体性能。 附图简要说明 图 1 为现有技术在 web 中传输数据时进行加解密的系统结构示意 图;
图 2为本发明在 web中传输数据时进行加解密的系统结构示意图; 图 3 为本发明在 web 中传输数据时进行加解密的方法示意性流程 图;
图 4为本发明在 web中传输数据时进行加解密的方法流程图实例。 实施本发明的方式 为使本发明的目的、 技术方案和优点更加清楚明白, 下面结合实施 例和附图, 对本发明进一步详细说明。
本发明设置加解密信息提供设备, 通过加解密信息提供设备向浏览 器和 web服务器提供进行加解密处理时需要的加解密信息, 并在浏览器 与 web服务器之间采用 HTTP通道进行加密数据的传输, 这样, 无需在 浏览器和 web服务器之间采用 HTTPS通道进行数据传输来提高数据安 全性, 从而, 在保证传输数据安全性的基础上, 减小了 HTTPS通道的 负荷, 提高了整体性能。
参见图 2, 为本发明在 web中传输数据时进行加解密的系统结构示 意图, 该系统包括用户终端、 web服务器和加解密信息提供设备;
所述用户终端, 基于浏览器向加解密信息提供设备发送加解密信息 获取请求, 接收所述加解密信息提供设备发送的包含加解密算法和加解 密索引的加解密信息, 所述浏览器采用所述加解密算法对待发送数据进 行加密, 将加密数据和所述加解密索引通过 HTTP通道发送给所述 web 服务器;
所述 web服务器, 用于接收所述浏览器发送的加密数据和所述加解 密索引, 根据所述加解密索引从所述加解密信息提供设备获取对应的加 解密算法, 对所述加密数据进行解密;
所述加解密信息提供设备, 用于接收所述浏览器发送的加解密信息 获取请求, 通过 HTTPS通道将加解密信息发送给所述浏览器; 并根据 所述 web服务器的请求提供与加解密索引对应的加解密算法。
为了提高安全性,加解密信息提供设备与用户终端之间通过 HTTPS 通道进行信息交互, 通过 HTTPS通道传输的信息都经过加密, 即使在 这段传输中有信息被抓包工具所截获, 抓包工具也无法进行分析以获知 截获的信息。
加解密信息提供设备可以通过一个服务器实现, 也可以通过算法服 务器和 HTTPS服务器实现; 这里, 以加解密信息提供设备通过算法服 务器和 HTTPS服务器实现进行说明:
所述 HTTPS服务器, 用于接收所述浏览器发送的加解密信息获取 请求, 向所述算法服务器传送加解密信息获取请求; 接收所述算法服务 器反馈的加解密信息, 通过 HTTPS通道发送给所述浏览器;
所述算法服务器, 用于接收所述 HTTPS 服务器发送的加解密信息 获取请求, 获取相应的加解密信息, 通过内网反馈给所述 HTTPS服务 器。 为了提高安全性, 算法服务器与 web服务器之间, 以及算法服务器 与 HTTPS服务器, 都通过内网进行通信。
可选地, 所述加解密信息提供设备还包括管理服务器, 用于对算法 服务器中的加解密信息进行实时更新。 具体地, 可以对加解密信息进行 更换, 或者, 对加解密算法、 加解密密钥的生成规则进行修改。 对算法 服务器中的加解密信息进行实时更新, 可避免被外界恶意垃取或分析以 猜测到加解密规律。
进一步地, 为了提高 web服务器向浏览器传输数据的安全性, web 服务器向浏览器进行数据传输时:
所述 web服务器, 还用于从所述加解密信息提供设备获取包含加解 密算法及加解密索引的加解密信息, 采用加解密信息中的加解密算法对 待发送数据进行加密, 将加密数据和加解密信息中的加解密索引通过 HTTP通道发送给所述浏览器;
所述用户终端, 还基于浏览器通过 HTTPS 通道从所述加解密信息 提供设备获取与所述 web服务器发送的加解密索引对应的加解密算法, 对所述 web服务器发送的加密数据进行解密。
本发明还提供了在 web中传输数据时进行加解密的方法, 其流程如 图 3所示, 其包括以下步骤:
步骤 301 ,浏览器向加解密信息提供设备发送加解密信息获取请求。 步骤 302,加解密信息提供设备通过 HTTPS通道将加解密信息发送 给浏览器, 所述加解密信息包括加解密算法及加解密索引。
步骤 303, 浏览器采用所述加解密算法对待发送数据进行加密, 将 加密数据和所述加解密索引通过 HTTP通道发送给 web服务器。
步骤 304, web服务器根据加解密索引从加解密信息提供设备获取 对应的加解密算法, 对接收到的加密数据进行解密。
为了节省 web服务器的存储空间,本步骤 web服务器对所述加密数 据进行解密之后, 可删除从算法服务器获取的加解密算法。
如果加解密信息提供设备由 HTTPS服务器和算法服务器实现, 则 上述流程步骤 302所述加解密信息提供设备通过 HTTPS通道将加解密 信息发送给浏览器包括: 加解密信息提供设备包含的 HTTPS服务器接 收加解密信息获取请求, 向加解密信息提供设备包含的算法服务器传送 加解密信息获取请求; 算法服务器获取相应的加解密信息, 通过内网发 送给 HTTPS服务器, HTTPS服务器通过 HTTPS通道将加解密信息发送 给浏览器; 相应地, 步骤 304web服务器根据加解密索引从加解密信息 提供设备获取加解密算法包括: web服务器根据加解密索引, 通过内网 从算法服务器获取相应的加解密算法。
加解密信息提供设备存储了加解密算法和相应的加解密索引, 所述 加解密算法例如包括加解密函数和加解密密钥。 接收加解密信息获取请 求后, 加解密信息提供设备可以从存储的加解密信息中随机选择一组提 供给请求方, 还可以, 按照一定的规范提取加解密信息, 例如, 若加解 密信息提供设备对应域名存储了加解密算法和相应的加解密索引, 则加 解密信息提供设备接收的加解密信息获取请求中也包含域名, 然后根据 域名提取相应的加解密信息。
可选地, 上述流程还包括: 对算法服务器中的加解密信息进行实时 更新。
进一步地, 为了提高 web服务器向浏览器传输数据的安全性, 本发 明对 web服务器向浏览器传输的数据也进行加密传输, 具体包括: web服务器向加解密信息提供设备发送加解密信息获取请求; 加解密信息提供设备获取包含加解密算法及加解密索引的加解密信 息, 发送给 web服务器;
web 服务器采用加解密信息中的加解密算法对待发送数据进行加 密, 将加密数据和加解密信息中的加解密索引通过 HTTP通道发送给浏 览器;
浏览器通过 HTTPS通道从加解密信息提供设备获取与 web服务器 发送的加解密索引对应的加解密算法,对 web服务器发送的加密数据进 行解密。
浏览器与 web服务器之间的数据传输涉及多种业务,例如 IM业务、 在线支付业务、网银业务或证券系统业务等。下面以 IM业务中的 IMweb 业务为例,对本发明在 web中传输数据时进行加解密的方法进行详细说 明, 该方法基于图 3的系统实现, 其中 web服务器具体为 IMweb服务 器, 加解密信息提供设备包括算法服务器和 HTTPS服务器, 该方法包 括以下步骤:
步骤 401 , 浏览器向 HTTPS服务器发送加解密信息获取请求。
在业务进行过程中, 若浏览器有数据需要发送给 IMweb服务器, 则 执行步骤 401。
在用户个人计算机(PC, Personal Computer ) 的浏览器平台上, 先 从 IMweb服务器中的静态页面服务器上下载到完整的 JavaScript,然后, 浏览器采用 JavaScript向 HTTPS服务器发起加解密信息获取请求。
步骤 402, HTTPS服务器接收加解密信息获取请求, 向算法服务器 传送加解密信息获取请求。
步骤 403 , 算法服务器获取相应的加解密信息, 通过内网发送给 HTTPS服务器, HTTPS服务器通过 HTTPS通道将加解密信息发送给浏 览器。
所述加解密信息包括加加解密算法和加解密索引 (Index ), 本实例 中, 所述加解密算法包括解密函数和加解密密钥 (key )。
算法服务器负责维护若干加解密函数对(Fun ), 每个加解密函数对 包括加密函数 ( EnFun )和解密函数 ( DnFun ), 并生成加解密 Key; 然 后将 Fun和 Key组合成队列, 并给每个队列设置一个 Index。 将 Fun和 Key进行组合时, Fun和 Key可——对应地进行组合, 也可进行交叉组 合, 组合后的一条队列信息例如为表 1所示。
Figure imgf000011_0001
Fun和 Key组合后的队列信息
其中索引 (Index )用来查询对应的函数, EnFun用来加密需要传 输的数据, DeFun用来解密已经加密的数据, EnFun和 DeFun都采用 效率比较高的对称加密算法, 可以由管理人员进行设定, 加解密 Key 可大量生成, 而且不重复、 不可逆, 标志位 Flag 可标识此队算法是 否已经使用, 是否已经过期等等。 如果用户在 WebIM 上下线, 则 WebIM服务器会通知算法服务器及时更新此队列信息的 Flag字段, 使其标识为未使用。
浏览器还可以对应加解密索引存储获取的加解密算法, 以备多次 使用。 这样, 浏览器无需每次发送数据时都向 HTTPS服务器请求加 解密信息, 筒化了流程。
步骤 404, 浏览器用接收到的加解密函数、 加解密 key对待发送 数据进行加密,将加密数据和接收到的加解密索引通过 HTTP通道发 送给 IMweb服务器。
浏览器应用 JavaScript, 采用加解密函数、 加解密 key对待发送 数据进行加密。 步骤 405 , IMweb服务器根据加解密索引从算法服务器获取对应 的加解密算法, 对接收的加密数据进行解密。
IMweb服务器获取加解密算法后,可对应加解密索引存储加解密 算法, 以备多次使用。 这样, IMweb服务器无需每次发送数据时都向 算法服务器请求加解密信息, 筒化了流程。
对加密数据进行解密后, 便可对此数据进行相应处理, 例如进行 本地计算、 向后台服务器发送 UDP数据包以获得反馈数据等, 得到 处理后的数据,若需要向浏览器返回处理后的数据,则执行步骤 406。
在业务进行过程中, 若 IMweb服务器有数据需要发送给浏览器, 则执行步骤 406。
步骤 406, IMweb服务器向算法服务器发送加解密信息获取请求。 步骤 407, 算法服务器获取包含加解密算法及加解密索引的加解 密信息, 通过内网发送给 IMweb服务器。
步骤 408, IMweb服务器采用加解密信息中的加解密算法对待发 送数据进行加密, 将加密数据和加解密信息中的加解密索引通过 HTTP通道发送给浏览器。
步骤 409, 浏览器接收加密数据和加解密索引后, 向 HTTPS服务 器发送包含加解密索引的加解密信息获取请求。
步骤 410, HTTPS服务器接收包含加解密索引的加解密信息获取 请求, 向算法服务器传送包含加解密索引的加解密信息获取请求。
步骤 411 , 算法服务器获取与接收的加解密索引对应的加解密算 法, 通过内网发送给 HTTPS服务器, HTTPS服务器通过 HTTPS通 道将加解密算法发送给浏览器。
步骤 412, 浏览器采用接收到的加解密算法, 对 IMweb服务器发 送的加密数据进行解密。 如果步骤 403中浏览器对应加解密索引存储了加解密算法, 则浏 览器无需再次从 HTTPS服务器获取, 而直接采用之前存储的加解密 算法对接收到的加密数据进行解密。
步骤 401 - 405是对浏览器向 IMweb服务器传输的数据进行加密 传输的流程, 步骤 406 - 412是对 IMweb服务器向浏览器传输的数据 进行加密传输的流程, 步骤 401与 406可无序执行。
采用图 4的方法流程后, 即使浏览器与 IMweb服务器之间通过 HTTP通道传输的数据被抓包工具所截获, 由于抓包工具不知道加解 密算法和加解密 Key, 也就无法获得其中的真实信息。
以上所述仅为本发明的较佳实施例而已, 并不用以限制本发明, 凡在本发明的精神和原则之内,所做的任何修改、等同替换、改进等, 均应包含在本发明保护的范围之内。

Claims

权利要求书
1、 一种在 web 中传输数据时进行加解密的方法, 其特征在于, 该 方法包括:
浏览器向加解密信息提供设备发送加解密信息获取请求;
加解密信息提供设备通过 HTTPS通道将加解密信息发送给浏览器, 所述加解密信息包括加解密算法及加解密索引;
浏览器采用所述加解密算法对待发送数据进行加密, 将加密数据和 所述加解密索引通过 HTTP通道发送给 web服务器;
web服务器根据所述加解密索引从加解密信息提供设备获取对应的 加解密算法, 对所述加密数据进行解密。
2、如权利要求 1所述的方法, 其特征在于, 所述加解密信息提供设 备通过 HTTPS通道将加解密信息发送给浏览器包括:
加解密信息提供设备包含的 HTTPS服务器接收加解密信息获取请 求, 向加解密信息提供设备包含的算法服务器传送加解密信息获取请 求; 算法服务器获取相应的加解密信息, 通过内网发送给 HTTPS服务 器, HTTPS服务器通过 HTTPS通道将加解密信息发送给浏览器。
3、如权利要求 2所述的方法, 其特征在于, 所述加解密算法包括加 解密函数和加解密密钥;
所述 web服务器对所述加密数据进行解密之后, 该方法还包括: web服务器删除从算法服务器获取的加解密算法。
4、 如权利要求 2所述的方法, 其特征在于, 该方法还包括: 加解密信息提供设备对算法服务器中的加解密信息进行实时更新。
5、如权利要求 2所述的方法, 其特征在于, 所述加解密信息获取请 求中包含域名; 所述算法服务器获取相应的加解密信息, 通过内网发送 给 HTTPS服务器包括: 算法服务器提取与所述域名对应的加解密信息, 通过内网发送给 HTTPS服务器。
6、 一种在 web 中传输数据时进行加解密的方法, 其特征在于, 该 方法包括:
web服务器向加解密信息提供设备发送加解密信息获取请求; 加解密信息提供设备获取包含加解密算法及加解密索引的加解密信 息, 发送给 web服务器;
web 服务器采用加解密信息中的加解密算法对待发送数据进行加 密, 将加密数据和加解密信息中的加解密索引通过 HTTP通道发送给浏 览器;
浏览器通过 HTTPS通道从加解密信息提供设备获取与 web服务器 发送的加解密索引对应的加解密算法,对 web服务器发送的加密数据进 行解密。
7、 一种在 web 中传输数据时进行加解密的系统, 其特征在于, 该 系统包括用户终端、 web服务器和加解密信息提供设备;
所述用户终端, 基于浏览器向加解密信息提供设备发送加解密信息 获取请求, 接收所述加解密信息提供设备发送的包含加解密算法和加解 密索引的加解密信息, 所述浏览器采用所述加解密算法对待发送数据进 行加密, 将加密数据和所述加解密索引通过 HTTP通道发送给所述 web 服务器;
所述 web服务器, 用于接收所述浏览器发送的加密数据和所述加解 密索引, 根据所述加解密索引从所述加解密信息提供设备获取对应的加 解密算法, 对所述加密数据进行解密;
所述加解密信息提供设备, 用于接收所述浏览器发送的加解密信息 获取请求, 通过 HTTPS通道将加解密信息发送给所述浏览器; 并根据 所述 web服务器的请求提供与加解密索引对应的加解密算法。
8、 如权利要求 7所述的系统, 其特征在于,
所述 web服务器, 还用于从所述加解密信息提供设备获取包含加解 密算法及加解密索引的加解密信息, 采用加解密信息中的加解密算法对 待发送数据进行加密, 将加密数据和加解密信息中的加解密索引通过 HTTP通道发送给所述浏览器;
所述用户终端, 还基于浏览器通过 HTTPS 通道从所述加解密信息 提供设备获取与所述 web服务器发送的加解密索引对应的加解密算法, 对所述 web服务器发送的加密数据进行解密。
9、权利要求 7所述的系统, 其特征在于, 所述加解密信息提供设备 包括算法服务器和 HTTPS服务器;
所述 HTTPS服务器, 用于接收所述浏览器发送的加解密信息获取 请求, 向所述算法服务器传送加解密信息获取请求; 接收所述算法服务 器反馈的加解密信息, 通过 HTTPS通道发送给所述浏览器;
所述算法服务器, 用于接收所述 HTTPS 服务器发送的加解密信息 获取请求, 获取相应的加解密信息, 通过内网反馈给所述 HTTPS服务 器。
10、 如权利要求 9所述的系统, 其特征在于, 所述加解密信息提供 设备还包括管理服务器, 用于对所述算法服务器中的加解密信息进行实 时更新。
PCT/CN2011/079634 2010-12-22 2011-09-14 在web中传输数据时进行加解密的方法及系统 WO2012083732A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US13/810,347 US8966243B2 (en) 2010-12-22 2011-09-14 Method and system for data encryption and decryption in data transmission through the web

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201010615134.6 2010-12-22
CN2010106151346A CN102546562A (zh) 2010-12-22 2010-12-22 在web中传输数据时进行加解密的方法及系统

Publications (1)

Publication Number Publication Date
WO2012083732A1 true WO2012083732A1 (zh) 2012-06-28

Family

ID=46313114

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2011/079634 WO2012083732A1 (zh) 2010-12-22 2011-09-14 在web中传输数据时进行加解密的方法及系统

Country Status (3)

Country Link
US (1) US8966243B2 (zh)
CN (1) CN102546562A (zh)
WO (1) WO2012083732A1 (zh)

Families Citing this family (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9355389B2 (en) * 2010-12-06 2016-05-31 Voltage Security, Inc. Purchase transaction system with encrypted payment card data
CN102932345B (zh) * 2012-10-26 2015-11-18 山东中创软件商用中间件股份有限公司 一种信息传输方法、装置及系统
CN104142866B (zh) * 2013-05-06 2018-11-06 深圳市腾讯计算机系统有限公司 应用程序与数据平台系统的交互控制方法及系统
CN104519019B (zh) * 2013-09-29 2019-09-13 腾讯科技(深圳)有限公司 一种信息传输方法、装置及系统
CN104954344A (zh) * 2014-03-31 2015-09-30 小米科技有限责任公司 一种基于http协议的数据交互方法及装置
KR20160057873A (ko) * 2014-11-14 2016-05-24 삼성전자주식회사 통신 방법, 전자 장치 및 저장 매체
CN104486321A (zh) * 2014-12-11 2015-04-01 上海斐讯数据通信技术有限公司 一种Web数据交互方法、系统及相应的Web服务器
CN104506517A (zh) * 2014-12-22 2015-04-08 中软信息系统工程有限公司 Mips平台基于http协议加密传输方法
EP3254451B1 (en) * 2015-02-04 2021-11-24 Nokia Solutions and Networks Oy Interception for encrypted, transcoded media
CN105160529B (zh) * 2015-09-30 2019-02-12 北京奇虎科技有限公司 一种安全支付或购物的方法及终端设备
CN105141881B (zh) * 2015-09-30 2018-03-13 北京奇虎科技有限公司 一种进行视频通话的方法及终端设备
CN105208029B (zh) * 2015-09-30 2018-01-16 北京奇虎科技有限公司 一种数据处理方法及终端设备
US9781081B1 (en) * 2015-10-02 2017-10-03 Amazon Technologies, Inc. Leveraging transport-layer cryptographic material
CN105812366B (zh) * 2016-03-14 2019-09-24 携程计算机技术(上海)有限公司 服务器、反爬虫系统和反爬虫验证方法
CN106027646B (zh) * 2016-05-19 2019-06-21 北京云钥网络科技有限公司 一种加速https的方法及装置
CN106899865A (zh) * 2017-03-21 2017-06-27 万维云视(上海)数码科技有限公司 一种加密方法及装置、解密方法及装置以及安全系统
CN107632927A (zh) * 2017-07-28 2018-01-26 北京北信源软件股份有限公司 一种在c/s架构中模拟数据加密的压力测试方法与装置
CN108786115B (zh) * 2018-05-03 2021-06-01 南京赛宁信息技术有限公司 基于透明代理生成CTF动态Flag的方法及系统
CN108600257A (zh) * 2018-05-08 2018-09-28 北京顶象技术有限公司 加解密方法及装置、计算机存储介质以及电子设备
CN108540495A (zh) * 2018-05-08 2018-09-14 北京顶象技术有限公司 加解密方法及装置
CN109165511B (zh) * 2018-08-08 2022-07-15 深圳前海微众银行股份有限公司 Web安全漏洞处理方法、系统及计算机可读存储介质
CN110445764A (zh) * 2019-07-11 2019-11-12 广州朗国电子科技有限公司 一种通信密保系统与方法、及加解密服务器
EP4042630A4 (en) * 2019-10-11 2023-10-11 American Express Travel Related Services Company, Inc. EXECUTION OF AN INSTANCE-SPECIFIC CRYPTOGRAPHIC CODE IN A CRYPTOGRAPHIC COPROCESSOR
CN112087467A (zh) * 2020-09-18 2020-12-15 杭州弗兰科信息安全科技有限公司 一种基于web系统的信息加密传输方法及系统
CN114157646A (zh) * 2021-11-05 2022-03-08 北方工业大学 一种视频监控终端国产密码应用系统及应用方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101304310A (zh) * 2008-07-04 2008-11-12 成都卫士通信息产业股份有限公司 一种加固网络ssl服务的方法
CN101436933A (zh) * 2007-11-16 2009-05-20 华为技术有限公司 一种https加密访问方法、系统及装置
US20090222888A1 (en) * 2008-02-28 2009-09-03 Microsoft Corporation Communicating a password securely
US20090220080A1 (en) * 2008-02-29 2009-09-03 Michael Herne Application-Level Service Access to Encrypted Data Streams

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7454378B1 (en) * 1997-08-22 2008-11-18 Grenex Corp. Exchange method and apparatus
US6665709B1 (en) * 2000-03-27 2003-12-16 Securit-E-Doc, Inc. Method, apparatus, and system for secure data transport
US6978378B1 (en) * 2000-05-12 2005-12-20 Bluetie, Inc. Secure file transfer system
US6986040B1 (en) * 2000-11-03 2006-01-10 Citrix Systems, Inc. System and method of exploiting the security of a secure communication channel to secure a non-secure communication channel
US7996673B2 (en) * 2004-05-12 2011-08-09 Echoworx Corporation System, method and computer product for sending encrypted messages to recipients where the sender does not possess the credentials of the recipient
US7634572B2 (en) * 2004-12-22 2009-12-15 Slipstream Data Inc. Browser-plugin based method for advanced HTTPS data processing
US7865730B2 (en) * 2006-01-30 2011-01-04 Kronos Technology Systems Limited Partnership Bcencryption (BCE)—a public-key based method to encrypt a data stream
US20080072060A1 (en) * 2006-08-28 2008-03-20 Susan Cannon Memory device for cryptographic operations
US20080262970A1 (en) * 2007-04-20 2008-10-23 Info Tech, Inc. System and method of electronic information delivery
CN101127604B (zh) * 2007-09-25 2010-06-23 中兴通讯股份有限公司 信息安全传输方法和系统
US20100037050A1 (en) * 2008-08-06 2010-02-11 Cuneyt Karul Method and apparatus for an encrypted message exchange
US20120023158A1 (en) * 2009-04-14 2012-01-26 Ashwin Kashyap Method for secure transfer of multiple small messages

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101436933A (zh) * 2007-11-16 2009-05-20 华为技术有限公司 一种https加密访问方法、系统及装置
US20090222888A1 (en) * 2008-02-28 2009-09-03 Microsoft Corporation Communicating a password securely
US20090220080A1 (en) * 2008-02-29 2009-09-03 Michael Herne Application-Level Service Access to Encrypted Data Streams
CN101304310A (zh) * 2008-07-04 2008-11-12 成都卫士通信息产业股份有限公司 一种加固网络ssl服务的方法

Also Published As

Publication number Publication date
CN102546562A (zh) 2012-07-04
US8966243B2 (en) 2015-02-24
US20130117555A1 (en) 2013-05-09

Similar Documents

Publication Publication Date Title
WO2012083732A1 (zh) 在web中传输数据时进行加解密的方法及系统
US8925046B2 (en) Device, method, and recording medium
CN113067699B (zh) 基于量子密钥的数据共享方法、装置和计算机设备
KR100867130B1 (ko) 보안 데이터 송수신 시스템 및 방법
US20170317823A1 (en) Zero Knowledge Encrypted File Transfer
Garg et al. An efficient and secure data storage in Mobile Cloud Computing through RSA and Hash function
WO2016086546A1 (zh) 网络保密数据明文的采集方法及系统
CN111818196B (zh) 域名解析方法、装置、计算机设备和存储介质
CN101640682A (zh) 一种改善Web服务安全性的方法
US10063655B2 (en) Information processing method, trusted server, and cloud server
CN104283680A (zh) 一种数据传输的方法、客户端、服务器及其系统
CN104992100B (zh) 用于电子文档流转的虹膜动态加密解密系统及方法
JP2007142504A (ja) 情報処理システム
US20240154944A1 (en) Encrypted data communication and gateway device for encrypted data communication
CN104506530B (zh) 一种网络数据处理方法及装置、数据发送方法及装置
CN109194650B (zh) 基于文件远距离加密传输系统的加密传输方法
Hussain et al. Boost Secure Sockets Layer against Man-in-the-Middle Sniffing Attack via SCPK
US9355274B2 (en) Method and device for archiving a document
JP6125196B2 (ja) ネットワークシステム、ネットワークシステム用電子データの管理方法、そのためのプログラム及び、プログラムの記録媒体
JP2020127084A (ja) 暗号化システム及び暗号化方法
JP6167598B2 (ja) 情報処理装置、情報処理方法、および、コンピュータ・プログラム
Yang Mobile Payment Security in the Context of Big Data: Certificateless Public Key Cryptography.
CN114978564B (zh) 基于多重加密的数据传输方法及装置
Kuntze et al. Trustworthy content push
US20230041783A1 (en) Provision of digital content via a communication network

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11850591

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 13810347

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 08/11/2013)

122 Ep: pct application non-entry in european phase

Ref document number: 11850591

Country of ref document: EP

Kind code of ref document: A1