CN106161404A - The method of SSL Session state reuse, server and system - Google Patents

The method of SSL Session state reuse, server and system Download PDF

Info

Publication number
CN106161404A
CN106161404A CN201510195144.1A CN201510195144A CN106161404A CN 106161404 A CN106161404 A CN 106161404A CN 201510195144 A CN201510195144 A CN 201510195144A CN 106161404 A CN106161404 A CN 106161404A
Authority
CN
China
Prior art keywords
session identification
client
server
symmetric key
relevant information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510195144.1A
Other languages
Chinese (zh)
Inventor
杨洋
向西西
陈传文
姚伟斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201510195144.1A priority Critical patent/CN106161404A/en
Publication of CN106161404A publication Critical patent/CN106161404A/en
Pending legal-status Critical Current

Links

Landscapes

  • Computer And Data Communications (AREA)

Abstract

The invention discloses method, server and the system of a kind of SSL Session state reuse, belong to communication technical field.Described method includes: server and client carry out in handshake procedure, session identification is generated for described client, described session identification is sent to described client, the pre-main encryption returned according to described client concatenates into symmetrical cipher key related information, is stored in corresponding with described symmetric key relevant information for described session identification in preset memory;Described server and described client are carried out in handshake procedure again, when described server can get described session identification from described client, described server is according to described session identification, and from described preset memory, inquiry obtains the described symmetric key relevant information that described session identification is corresponding;Described server generates symmetric key according to described symmetric key relevant information, utilizes described symmetric key and described client to be encrypted data transmission.The present invention can realize SSL Session state reuse in the cluster.

Description

The method of SSL Session state reuse, server and system
Technical field
The present invention relates to communication technical field, be specifically related to a kind of method of SSL Session state reuse, server And system.
Background technology
SSL (Secure Sockets Layer, SSL)/TLS (Transport Layer Security, Transmission security protocol) agreement is IETF (The Internet Engineering Task Force, international interconnection Net engineering duty group) the secure network transmission agreement that proposes, primarily to protection is transmitted in the Internet Confidential information, this agreement includes two processes: handshake phase and data transfer phase.Handshake phase: Client (client) generates pre-main encryption string (PreMaster Secret word string), with server (server) PKI (public key) pre-main encryption string is encrypted, will encryption after pre-main encryption string be sent to Server;Server receives the pre-main encryption string after encryption, with the private key (private key) with public key match Pre-main encryption string after encryption is decrypted, obtains pre-main encryption string, utilize pre-main encryption to concatenate in pairs Key relevant information (session_info) is claimed (to include that master key (master secret), server are random Number and client random number etc.), utilize symmetrical key relevant information to generate symmetrical key.Data transmission rank Section: the symmetrical secret key pair that server by utilizing handshake phase generates is encrypted in plain text, by the plaintext after encryption It is sent to client;After client receives the plaintext after encryption, the pre-main encryption of client is utilized to concatenate into Symmetrical key relevant information, utilizes symmetrical key relevant information to generate symmetrical key, utilizes symmetrical secret key pair Plaintext after encryption is decrypted i.e. available plaintext and continues with.
In order to improve the efficiency shaken hands, it is proposed that the method for SSL Session state reuse (session reuse), Detailed process is as follows: in client handshake phase first, user end to server sends session identification length (SESSION ID LENGTH) information;After server receives client session identification length information, If supporting that Session state reuse is generated as and replys one session identification of client (SESSION ID);Client End receives session identification, is encrypted pre-main encryption string with the PKI of server, by the pre-master after encryption Encryption string is sent to server;Server receives the pre-main encryption string after encryption, with the private with public key match Pre-main encryption string after encryption is decrypted by key, obtains pre-main encryption string, utilizes pre-main encryption to concatenate into Symmetrical key relevant information, utilizes symmetrical key relevant information to generate symmetrical key;When client again please Ask when shaking hands, send session identification to server;After server receives session identification, reply client phase Same session identification, then directly sends to client and terminates (finish) message;Client and server The pre-main encryption utilizing local terminal concatenates into symmetrical key relevant information, utilizes symmetrical key relevant information to generate Symmetrical key, both sides utilize symmetrical key to carry out Data Encryption Transmission.
The method that can be seen that SSL Session state reuse by said process, can be directly by symmetrical key phase Pass Information recovering goes out symmetrical key and carries out Data Encryption Transmission, the asymmetric encryption procedure of handshake phase is saved Slightly, can save the time, accelerate the speed of SSL session.But, the side of existing SSL Session state reuse Method, symmetrical key relevant information is which server generates, and just by which server is preserved, when running into clothes During business device cluster (being made up of multiple servers), client access each time may be directed to clothes Servers different in business device cluster, such as: when the once access of client is positioned to server cluster In server A, server A generate symmetrical key relevant information, when client accesses next time, Being positioned to again the server B in server cluster, now server B cannot be known and given birth to by server A The symmetrical key relevant information become, thus SSL Session state reuse cannot be realized.
Summary of the invention
In order to solve the problems referred to above, the invention provides a kind of method of SSL Session state reuse, server and System, it will words mark is corresponding with symmetric key relevant information to be stored in preset memory, it is possible to achieve Symmetric key relevant information generates and the separation of storage, and any server in server cluster can be from Preset memory gets symmetric key relevant information, SSL session can be realized in server cluster Reuse.
In order to solve the problems referred to above, a kind of method that the invention discloses SSL Session state reuse, described method Including:
Server and client carry out in handshake procedure, generate session identification for described client, by described Session identification is sent to described client, and the pre-main encryption returned according to described client is concatenated into symmetrical close Key relevant information, presets storage by corresponding with described symmetric key relevant information for described session identification being stored in In device;
Described server and described client are carried out in handshake procedure, again when described server can be from institute Stating client when getting described session identification, described server is according to described session identification, from described pre- If inquiry obtains the described symmetric key relevant information that described session identification is corresponding in memorizer;
Described server generates symmetric key according to described symmetric key relevant information, utilizes described symmetry close Key and described client are encrypted data transmission.
Further, server and client carry out in handshake procedure, generate session mark for described client Know, described session identification is sent to described client, the pre-main encryption string returned according to described client Generate symmetric key relevant information, by corresponding with described symmetric key relevant information for described session identification storage In preset memory, including:
Described server receives the SSL request of described client, obtains and carries in described SSL request Session identification length information;
Described server according to described session identification length information determine session identification a length of zero time, for institute State client and generate described session identification, and described session identification is sent to described client so that institute State client and receive session identification, generate and the described pre-main encryption string after encryption is sent to described service Device;
Described pre-main encryption string after the encryption that described server receives and sends described client is carried out Deciphering obtains described pre-main encryption string, concatenates into the relevant letter of described symmetric key according to described pre-main encryption Breath, is stored in described preset memory by corresponding with described symmetric key relevant information for described session identification In;
Described server generates described symmetric key according to described symmetric key relevant information, and it is described right to utilize Key and described client is claimed to be encrypted data transmission.
Further, described server receives the SSL request of described client, and obtaining described SSL please After seeking the session identification length information carried, also include:
According to described session identification length information, described server determines that described session identification length is not zero Time, determine that described server and described client are carried out in handshake procedure again;
Correspondingly, when described server can get described session identification from described client, described Server is according to described session identification, and from described preset memory, inquiry obtains described session identification correspondence Described symmetric key relevant information, including:
Described server judges whether to carry in described SSL request described session identification;
If carrying described session identification in described SSL request, the most described server obtains described SSL Described session identification in request, described server is according to described session identification, from described preset memory Middle inquiry obtains the described symmetric key relevant information that described session identification is corresponding, is sent out by described session identification Give described client, and send, to described client, ending message of shaking hands.
Further, whether carry during described server judges described SSL request described session identification it After, also include:
If described SSL request does not carry described session identification, then perform to generate for described client Described session identification, and described session identification is sent to the step of described client.
Further, described server, according to described session identification, is inquired about from described preset memory To the described symmetric key relevant information that described session identification is corresponding, including:
Described server, according to described session identification, inquires about session identification pair described in described preset memory Whether the described symmetric key relevant information answered exists;
If the described symmetric key relevant information that session identification described in described preset memory is corresponding is deposited , then perform to be sent to described session identification described client, and send, to described client, knot of shaking hands The step of bundle information;
If described symmetric key relevant information corresponding to session identification described in described preset memory is not Exist, then perform to generate described session identification for described client, and described session identification is sent to institute State the step of client.
Further, described symmetric key relevant information includes: master key master secret, server Random number and client random number.
Further, described server is the arbitrary described server in server cluster, and described presetting is deposited Reservoir is independent of the arbitrary described server in described server cluster.
In order to solve the problems referred to above, the invention also discloses the server of a kind of SSL Session state reuse, described Server includes:
Processing module, for carrying out in handshake procedure, for described client in described server and client Generate session identification, described session identification is sent to described client, returns according to described client Pre-main encryption concatenates into symmetrical cipher key related information, by relevant with described symmetric key for described session identification letter Breath correspondence is stored in preset memory;
Enquiry module, for again carrying out in handshake procedure in described server and described client, works as institute Stating server can be when described client gets described session identification, according to described session identification, from In described preset memory, inquiry obtains the described symmetric key relevant information that described session identification is corresponding;
Transport module, for generating symmetric key according to described symmetric key relevant information, it is described right to utilize Key and described client is claimed to be encrypted data transmission.
Further, described processing module includes:
Processing unit, for receiving the SSL request of described client, obtains in described SSL request and takes The session identification length information of band;
Signal generating unit, for according to described session identification length information determine session identification a length of zero time, Generate described session identification for described client, and described session identification is sent to described client, make Obtaining described client and receive session identification, the described pre-main encryption string after generating and encrypting is sent to described Server;
Memory element, the described pre-main encryption string after the encryption received and send described client enters Row deciphering obtains described pre-main encryption string, concatenates into the relevant letter of described symmetric key according to described pre-main encryption Breath, is stored in described preset memory by corresponding with described symmetric key relevant information for described session identification In;
Transmission unit, for generating described symmetric key according to described symmetric key relevant information, utilizes institute State symmetric key and be encrypted data transmission with described client.
Further, described processing module also includes:
Determine unit, for determining that described session identification length is not according to described session identification length information When zero, determine that described server and described client are carried out in handshake procedure again;
Correspondingly, described enquiry module includes:
Judging unit, is used for judging whether to carry in described SSL request described session identification;
Query unit, if carrying described session identification in described SSL request, then obtains described Described session identification in SSL request, according to described session identification, inquires about from described preset memory Obtain the described symmetric key relevant information that described session identification is corresponding, described session identification is sent to institute State client, and send, to described client, ending message of shaking hands.
Further, described processing module also includes:
Notification unit, if not carrying described session identification in described SSL request, then notifies institute State signal generating unit to perform to generate described session identification for described client, and described session identification is sent to The step of described client.
Further, described query unit includes:
Inquiry subelement, for according to described session identification, inquires about session described in described preset memory Whether the described symmetric key relevant information of mark correspondence exists;
First notice subelement, if corresponding described of session identification described in the described preset memory Symmetric key relevant information exists, then notify that described query unit performs described session identification is sent to institute State client, and send the step of ending message of shaking hands to described client;
Second notice subelement, if corresponding described of session identification described in the described preset memory Symmetric key relevant information does not exists, then notify that described signal generating unit performs as the generation of described client described Session identification, and described session identification is sent to the step of described client.
Further, described symmetric key relevant information includes: master key master secret, server Random number and client random number.
Further, described server is the arbitrary described server in server cluster, and described presetting is deposited Reservoir is independent of the arbitrary described server in described server cluster.
In order to solve the problems referred to above, the invention also discloses the system of a kind of SSL Session state reuse, described system System includes: server and preset memory;Described server includes:
Processing module, for carrying out in handshake procedure, for described client in described server and client Generate session identification, described session identification is sent to described client, returns according to described client Pre-main encryption concatenates into symmetrical cipher key related information, by relevant with described symmetric key for described session identification letter Breath correspondence is stored in described preset memory;
Enquiry module, for again carrying out in handshake procedure in described server and described client, works as institute Stating server can be when described client gets described session identification, according to described session identification, from In described preset memory, inquiry obtains the described symmetric key relevant information that described session identification is corresponding;
Transport module, for generating symmetric key according to described symmetric key relevant information, it is described right to utilize Key and described client is claimed to be encrypted data transmission;
Described preset memory, for depositing corresponding with described symmetric key relevant information for described session identification Storage.
Further, described processing module includes:
Processing unit, for receiving the SSL request of described client, obtains in described SSL request and takes The session identification length information of band;
Signal generating unit, for according to described session identification length information determine session identification a length of zero time, Generate described session identification for described client, and described session identification is sent to described client, make Obtaining described client and receive session identification, the described pre-main encryption string after generating and encrypting is sent to described Server;
Memory element, the described pre-main encryption string after the encryption received and send described client enters Row deciphering obtains described pre-main encryption string, concatenates into the relevant letter of described symmetric key according to described pre-main encryption Breath, is stored in described preset memory by corresponding with described symmetric key relevant information for described session identification In;
Transmission unit, for generating described symmetric key according to described symmetric key relevant information, utilizes institute State symmetric key and be encrypted data transmission with described client.
Further, described processing module also includes:
Determine unit, for determining that described session identification length is not according to described session identification length information When zero, determine that described server and described client are carried out in handshake procedure again;
Correspondingly, described enquiry module includes:
Judging unit, is used for judging whether to carry in described SSL request described session identification;
Query unit, if carrying described session identification in described SSL request, then obtains described Described session identification in SSL request, according to described session identification, inquires about from described preset memory Obtain the described symmetric key relevant information that described session identification is corresponding, described session identification is sent to institute State client, and send, to described client, ending message of shaking hands.
Further, described processing module also includes:
Notification unit, if not carrying described session identification in described SSL request, then notifies institute State signal generating unit to perform to generate described session identification for described client, and described session identification is sent to The step of described client.
Further, described query unit includes:
Inquiry subelement, for according to described session identification, inquires about session described in described preset memory Whether the described symmetric key relevant information of mark correspondence exists;
First notice subelement, if corresponding described of session identification described in the described preset memory Symmetric key relevant information exists, then notify that described query unit performs described session identification is sent to institute State client, and send the step of ending message of shaking hands to described client;
Second notice subelement, if corresponding described of session identification described in the described preset memory Symmetric key relevant information does not exists, then notify that described signal generating unit performs as the generation of described client described Session identification, and described session identification is sent to the step of described client.
Further, described symmetric key relevant information includes: master key master secret, server Random number and client random number.
Further, described server is the arbitrary described server in system cluster, described default storage Device is independent of the arbitrary described server in described server cluster.
Compared with prior art, the present invention can obtain and include techniques below effect:
1) it is stored in corresponding with symmetric key relevant information for session identification in preset memory, Ke Yishi Existing symmetric key relevant information generates and the separation of storage, and any server in server cluster can From preset memory, get symmetric key relevant information, SSL meeting can be realized in server cluster Words are reused.
2) it is stored in corresponding with symmetric key relevant information for session identification in preset memory so that right Claim cipher key related information holding time can be completely independent, from regardless of whether server down machine or stop Sleep, restart, all without the effect duration having influence on symmetric key relevant information, it is achieved that server cluster The high availability of middle SSL Session state reuse.
Certainly, the arbitrary product implementing the present invention must be not necessarily required to reach all the above skill simultaneously Art effect.
Accompanying drawing explanation
Accompanying drawing described herein is used for providing a further understanding of the present invention, constitutes of the present invention Point, the schematic description and description of the present invention is used for explaining the present invention, is not intended that the present invention's Improper restriction.In the accompanying drawings:
Fig. 1 is the method flow diagram of the first SSL Session state reuse of the embodiment of the present invention;
Fig. 2 is a kind of server and the preset memory relation schematic diagram of the embodiment of the present invention;
Fig. 3 is the method flow diagram of the second SSL Session state reuse of the embodiment of the present invention;
Fig. 4 is another kind of server and the preset memory relation schematic diagram of the embodiment of the present invention;
Fig. 5 is the server architecture schematic diagram of a kind of SSL Session state reuse of the embodiment of the present invention;
Fig. 6 is the system structure schematic diagram of a kind of SSL Session state reuse of the embodiment of the present invention.
Detailed description of the invention
Embodiments of the present invention are described in detail, thereby to the present invention below in conjunction with drawings and Examples How application technology means solve technical problem and reach the process that realizes of technology effect and can fully understand And implement according to this.
In a typical configuration, calculating equipment include one or more processor (CPU), input/ Output interface, network interface and internal memory.
Internal memory potentially includes the volatile memory in computer-readable medium, random access memory (RAM) and/or the form such as Nonvolatile memory, such as read only memory (ROM) or flash memory (flash RAM). Internal memory is the example of computer-readable medium.
Computer-readable medium includes that permanent and non-permanent, removable and non-removable media can be by Any method or technology realize information storage.Information can be computer-readable instruction, data structure, The module of program or other data.The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), dynamic random access memory (DRAM), Other kinds of random access memory (RAM), read only memory (ROM), electrically erasable Read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read only memory (CD-ROM), digital versatile disc (DVD) or other optical storage, magnetic cassette tape, tape Magnetic rigid disk storage or other magnetic storage apparatus or any other non-transmission medium, can be used for storage can be by The information that calculating equipment accesses.According to defining herein, computer-readable medium does not include non-temporary electricity Brain readable media (transitory media), such as data signal and the carrier wave of modulation.
As employed some vocabulary in the middle of description and claim to censure specific components.This area skill Art personnel are it is to be appreciated that hardware manufacturer may call same assembly with different nouns.This explanation In the way of book and claim not difference by title is used as distinguishing assembly, but with assembly in function On difference be used as distinguish criterion." bag as mentioned by the middle of description in the whole text and claim Contain " it is an open language, therefore " comprise but be not limited to " should be construed to." substantially " refer to receivable In range of error, those skilled in the art can solve described technical problem, base in the range of certain error Originally described technique effect is reached.Additionally, " coupling " word comprises any directly and indirectly electrical coupling at this Catcher section.Therefore, if a first server is coupled to a second server described in literary composition, then represent described First server can directly be electrically coupled to described second server, or pass through other servers or couple hands Intersegmental ground connection is electrically coupled to described second server.Description subsequent descriptions is the preferable of the enforcement present invention Embodiment, for the purpose of right described description is the rule so that the present invention to be described, is not limited to this The scope of invention.Protection scope of the present invention is when being as the criterion depending on the defined person of claims.
Also, it should be noted term " includes ", " comprising " or its any other variant are intended to non- Comprising of exclusiveness, so that include that the commodity of a series of key element or system not only include that those are wanted Element, but also include other key elements being not expressly set out, or also include for this commodity or be Unite intrinsic key element.In the case of there is no more restriction, statement " including ... " limit Key element, it is not excluded that there is also other identical element in the commodity including described key element or system.
Embodiment describes
With an embodiment, the realization of the inventive method is described further below.As it is shown in figure 1, be this A kind of method flow diagram of the SSL Session state reuse of inventive embodiments, the method includes:
S101: server and client carry out in handshake procedure, generate session identification for client, it will Words mark is sent to client, and the pre-main encryption returned according to client concatenates into the relevant letter of symmetric key Breath, it will words mark is corresponding with symmetric key relevant information to be stored in preset memory.
Specifically, symmetric key relevant information (session_info) including: master key (master secret), Server random number and client random number etc..Wherein, master key is according to pre-main encryption string (PreMaster Secret word string), the generation such as server random number and client random number, the concrete process that generates is with existing Having method to be similar to, here is omitted, and server random number is the random number of server stochastic generation, can To be sent to client in client interaction, client random number is client stochastic generation Random number, can be sent to server during server interaction.Further, the relevant letter of symmetric key Breath can also include the effective time etc. of symmetric key relevant information, in order to monitoring symmetric key relevant information The most expired inefficacy.
Specifically, seeing Fig. 2, server can be any server in server cluster, presets and deposits Reservoir is independent of any server in server cluster, when server cluster includes multiple server Time, multiple servers can be interacted with terminal unit by load equalizer, to realize multiple service Task balance between device.Server can be the server that can provide SSL access service, including but Being not limited to HTTPs, POPs, SMTPs, FTPs, preset memory can be the storage of any high-performance Device.
S102: server and client are carried out in handshake procedure, again when server can obtain from client When getting session identification, server is according to session identification, and from preset memory, inquiry obtains session identification Corresponding symmetric key relevant information.
Specifically, server can be inquired about from preset memory and obtain the symmetric key that session identification is corresponding Relevant information, then explanation symmetric key relevant information has not expired or not because preset memory is restarted Losing efficacy etc. reason, symmetric key relevant information can be used to generate symmetric key.
S103: server generates symmetric key according to symmetric key relevant information, utilizes symmetric key and visitor Family end is encrypted data transmission.
Specifically, when server by utilizing symmetric key and client are encrypted data transmission, client meeting Pre-main encryption string, server random number and client randoms number according to client etc. generate master key, so Generate symmetric key according to master key, server random number and client random number etc. afterwards, utilize symmetrical close Plaintext after what server was sended over by key utilize symmetric key encryption is decrypted, and utilizes symmetric key The plaintext being sent to server is encrypted, it is achieved encrypted data transmission.
Specifically, in a preferred embodiment of the present embodiment, see the side of Fig. 3, SSL Session state reuse Method includes:
S201: server receives the SSL request of client, obtains the session mark carried in SSL request Know length information.
Specifically, the SSL request of client can be client (Client) hello packet.Session Identification length information is probably SESSOIIN ID LENGTH:0 or SESSOIIN ID LENGTH:32 Deng.
Specifically, if not carrying session identification length information in SSL request, server does not obtain The session identification length information carried in SSL request, then prove that client does not accept SSL session weight With, then server is follow-up will not generate session identification, according to existing non-SSL between server and client side The method of Session state reuse carries out handshake procedure and Data Encryption Transmission process.
According to session identification length information, S202: server judges whether session identification length is zero, if Session identification a length of zero, then perform S203;If session identification length is not zero, then perform S206.
Specifically, if session identification length information is SESSOIIN ID LENGTH:32, then session Identification length is not zero, if session identification length information is SESSOIIN ID LENGTH:0, then can Words identification length is zero.
S203: server is that client generates session identification, and session identification is sent to client, makes Obtaining client and receive session identification, the pre-main encryption string after generating and encrypting is sent to server.
Specifically, according to SSL/TLS agreement, session identification (SESSION ID) can be one 32 Byte and the random number of non-zero, random string etc. (SESSION ID:token<32 is long>).
Pre-main encryption string after the encryption that S204: server receives and sends client is decrypted and obtains Pre-main encryption string, concatenates into symmetrical cipher key related information according to pre-main encryption, it will words mark and symmetry are close Key relevant information correspondence is stored in preset memory.
Specifically, concatenating into symmetrical cipher key related information according to pre-main encryption can be according to pre-main encryption String, server random number and client random number etc. generate master key, then by master key, server with Machine number and client random number are as symmetric key relevant information.
Specifically, the pre-main encryption string after the encryption that server receives and sends client is decrypted After pre-main encryption string, it is also possible to first judge that pre-main encryption string is the most perfect, if pre-main encryption string Perfect, concatenate into symmetrical cipher key related information further according to pre-main encryption, it will words mark and symmetry are close Key relevant information correspondence is stored in preset memory;If pre-main encryption string is not perfect, then take Business device sends end message to client, disconnects the connection with client, no longer carries out subsequent operation.
S205: server generates symmetric key according to symmetric key relevant information, utilizes symmetric key and visitor Family end is encrypted data transmission, then terminates.
S206: server judges whether carry session identification in SSL request, if taken in SSL request Band session identification, then perform S207;If SSL request does not carry session identification, then perform S203.
Specifically, when server determines that session identification length is not zero according to session identification length information, really Determine server and client is probably and again carries out in handshake procedure, SSL request may carry server The session identification generated for client in first handshake procedure.
S207: server obtains the session identification in SSL request.
S208: server is according to session identification, and the symmetry that in inquiry preset memory, session identification is corresponding is close Whether key relevant information exists, if the symmetric key relevant information that in preset memory, session identification is corresponding Exist, then perform S209;If the symmetric key relevant information that in preset memory, session identification is corresponding is not Exist, then perform S203.
Specifically, if the symmetric key relevant information that in preset memory, session identification is corresponding exists, then Illustrate that symmetric key relevant information has not expired or not do not loses because preset memory such as restarts at the reason Effect, symmetric key relevant information can be used to generate symmetric key.If session identification in preset memory Corresponding symmetric key relevant information does not exists, then explanation symmetric key relevant information probably due to expired or Preset memory the reason such as is restarted and was lost efficacy.
Session identification is sent to client by S209: server, and sends, to client, ending message of shaking hands, Then S205 is performed.
Specifically, session identification is sent to client by server, and sends end letter of shaking hands to client Breath (such as: finish message), to inform that this handshake procedure of client completes to carry out subsequent flows Journey.
In order to make it easy to understand, when server is any server in server cluster, and preset memory is only When standing on any server in server cluster, see Fig. 4, server in server cluster 1 with Client carries out in handshake procedure, generates session identification for client, it will words mark is sent to client, The pre-main encryption returned according to client concatenates into symmetrical cipher key related information, it will words mark and symmetry are close Key relevant information correspondence is stored in preset memory;Server 2 in server cluster is with client again Secondary carry out in handshake procedure, when server 2 can get session identification from client, server 2 According to session identification, from preset memory, inquiry obtains the relevant letter of symmetric key corresponding to session identification Breath;Server 2 generates symmetric key according to symmetric key relevant information, utilizes symmetric key and client It is encrypted data transmission.
The method of the SSL Session state reuse described in the present embodiment, it will words mark and symmetric key relevant information Correspondence is stored in preset memory, it is possible to achieve symmetric key relevant information generates and the separation of storage, Any server in server cluster can get the relevant letter of symmetric key from preset memory Breath, can realize SSL Session state reuse in server cluster.By relevant with symmetric key for session identification letter Breath correspondence is stored in preset memory so that the holding time of symmetric key relevant information can be the most only Vertical, from regardless of whether server down machine or dormancy, restart, all without having influence on symmetric key phase The effect duration of pass information, it is achieved that the high availability of SSL Session state reuse in server cluster.
As it is shown in figure 5, be the server architecture figure of a kind of SSL Session state reuse of the embodiment of the present invention, should Server includes:
Processing module 301, for carrying out in handshake procedure in server and client, generates for client Session identification, it will words mark is sent to client, concatenates in pairs according to the pre-main encryption that client returns Claim cipher key related information, it will be stored in corresponding with described symmetric key relevant information of words mark presets storage In device;
Enquiry module 302, for again carrying out in handshake procedure in server and client, works as server Can be when client get session identification, according to session identification, inquire about from preset memory and obtain The symmetric key relevant information that session identification is corresponding;
Transport module 303, for generating symmetric key according to symmetric key relevant information, utilizes symmetrical close Key and client are encrypted data transmission.
Further, processing module 301 includes:
Processing unit, for receiving the SSL request of client, obtains the session carried in SSL request Identification length information;
Signal generating unit, for according to session identification length information determine session identification a length of zero time, for visitor Family end generates session identification, and session identification is sent to client so that client receives session identification, Generate and the pre-main encryption string after encryption is sent to server;
Memory element, the pre-main encryption string after the encryption received and send client is decrypted To pre-main encryption string, concatenate into symmetrical cipher key related information according to pre-main encryption, it will words mark and symmetry Cipher key related information correspondence is stored in preset memory;
Transmission unit, for according to symmetric key relevant information generate symmetric key, utilize symmetric key with Client is encrypted data transmission.
Further, processing module 301 also includes:
Determine unit, in time determining that session identification length is not zero according to session identification length information, really Determine server again to carry out in handshake procedure with client;
Correspondingly, enquiry module 302 includes:
Judging unit, is used for judging whether carry session identification in SSL request;
Query unit, if carrying session identification in SSL request, then obtains in SSL request Session identification, according to session identification, the symmetry that inquiry obtains session identification corresponding from preset memory is close Key relevant information, it will words mark is sent to client, and sends, to client, ending message of shaking hands.
Further, processing module 301 also includes:
Notification unit, if not carrying session identification in SSL request, then notice signal generating unit is held Behavior client generates session identification, and session identification is sent to the step of client.
Further, query unit includes:
Inquiry subelement, for according to session identification, corresponding right of session identification in inquiry preset memory Claim whether cipher key related information exists;
First notice subelement, if the symmetric key that session identification is corresponding in preset memory is correlated with Information exists, then notice query unit performs to be sent to session identification client, and sends to client Shake hands the step of ending message;
Second notice subelement, if the symmetric key that session identification is corresponding in preset memory is correlated with Information does not exists, then notice signal generating unit performs to generate session identification for client, and is sent out by session identification Give the step of client.
Further, symmetric key relevant information includes: master key master secret, server are random Number and client random number.
Further, server is any server in server cluster, and preset memory is independent of clothes Any server in business device cluster.
The server of the SSL Session state reuse described in the present embodiment, it will words mark letter relevant with symmetric key Breath correspondence is stored in preset memory, it is possible to achieve what symmetric key relevant information generated and stored divides From, any server in server cluster can get symmetric key from preset memory and be correlated with Information, can realize SSL Session state reuse in server cluster.Session identification is relevant with symmetric key Information correspondence is stored in preset memory so that the holding time of symmetric key relevant information can be complete Independent, from regardless of whether server down machine or dormancy, restart, all without having influence on symmetric key The effect duration of relevant information, it is achieved that the high availability of SSL Session state reuse in server cluster.
As shown in Figure 6, being the system construction drawing of a kind of SSL Session state reuse of the embodiment of the present invention, this is System includes: server 40 and preset memory 50;Server 40 includes:
Processing module 401, for carrying out in handshake procedure in server 40 and client, raw for client Become session identification, it will words mark is sent to client, concatenates into according to the pre-main encryption that client returns Symmetric key relevant information, it will words mark is corresponding with symmetric key relevant information is stored in preset memory In 50;
Enquiry module 402, for again carrying out in handshake procedure in server 40 and client, works as service Device 40 can be when client gets session identification, according to session identification, from preset memory 50 Inquiry obtains the symmetric key relevant information that session identification is corresponding;
Transport module 403, for generating symmetric key according to symmetric key relevant information, utilizes symmetrical close Key and client are encrypted data transmission;
Preset memory 50, for by corresponding with symmetric key relevant information for session identification storage.
Further, processing module 401 includes:
Processing unit, for receiving the SSL request of client, obtains the session carried in SSL request Identification length information;
Signal generating unit, for according to session identification length information determine session identification a length of zero time, for visitor Family end generates session identification, and session identification is sent to client so that client receives session identification, Generate and the described pre-main encryption string after encryption is sent to server 40;
Memory element, the pre-main encryption string after the encryption received and send client is decrypted To pre-main encryption string, concatenate into symmetrical cipher key related information according to pre-main encryption, it will words mark and symmetry Cipher key related information correspondence is stored in preset memory 50;
Transmission unit, for according to symmetric key relevant information generate symmetric key, utilize symmetric key with Client is encrypted data transmission.
Further, processing module 401 also includes:
Determine unit, in time determining that session identification length is not zero according to session identification length information, really Determine server again to carry out in handshake procedure with client;
Correspondingly, enquiry module includes:
Judging unit, is used for judging whether carry session identification in SSL request;
Query unit, if carrying session identification in SSL request, then obtains in SSL request Session identification, according to session identification, from preset memory 50, inquiry obtains corresponding right of session identification Claim cipher key related information, it will words mark is sent to client, and sends, to client, ending message of shaking hands.
Further, processing module 401 also includes:
Notification unit, if not carrying session identification in SSL request, then notice signal generating unit is held Behavior client generates session identification, and session identification is sent to the step of client.
Further, query unit includes:
Inquiry subelement, for according to session identification, in inquiry preset memory 50, session identification is corresponding Symmetric key relevant information whether exist;
First notice subelement, if the symmetric key that session identification is corresponding in preset memory 50 Relevant information exists, then notice query unit performs to be sent to session identification client, and to client Send the step of ending message of shaking hands;
Second notice subelement, if the symmetric key that session identification is corresponding in preset memory 50 Relevant information does not exists, then notice signal generating unit performs to generate session identification for client, and by session mark Know the step being sent to client.
Further, symmetric key relevant information includes: master key master secret, server are random Number and client random number.
Further, server 40 is any server 40 in server cluster, preset memory 50 Independent of any server 40 in server cluster.
The system of the SSL Session state reuse described in the present embodiment, it will words mark and symmetric key relevant information Correspondence is stored in preset memory, it is possible to achieve symmetric key relevant information generates and the separation of storage, Any server in server cluster can get the relevant letter of symmetric key from preset memory Breath, can realize SSL Session state reuse in server cluster.By relevant with symmetric key for session identification letter Breath correspondence is stored in preset memory so that the holding time of symmetric key relevant information can be the most only Vertical, from regardless of whether server down machine or dormancy, restart, all without having influence on symmetric key phase The effect duration of pass information, it is achieved that the high availability of SSL Session state reuse in server cluster.
Server, system describe corresponding with aforesaid method flow, and weak point is with reference to said method flow process Narration, repeat the most one by one.
Described above illustrate and describes some preferred embodiments of the present invention, but as previously mentioned, it should reason Solve the present invention and be not limited to form disclosed herein, be not to be taken as the eliminating to other embodiments, And can be used for various other combination, amendment and environment, and can in invention contemplated scope described herein, It is modified by above-mentioned teaching or the technology of association area or knowledge.And those skilled in the art are carried out changes Move and change is without departing from the spirit and scope of the present invention, the most all should be in the protection of claims of the present invention In the range of.

Claims (21)

1. the method for a SSL Session state reuse, it is characterised in that described method includes:
Server and client carry out in handshake procedure, generate session identification for described client, by described Session identification is sent to described client, and the pre-main encryption returned according to described client is concatenated into symmetrical close Key relevant information, presets storage by corresponding with described symmetric key relevant information for described session identification being stored in In device;
Described server and described client are carried out in handshake procedure, again when described server can be from institute Stating client when getting described session identification, described server is according to described session identification, from described pre- If inquiry obtains the described symmetric key relevant information that described session identification is corresponding in memorizer;
Described server generates symmetric key according to described symmetric key relevant information, utilizes described symmetry close Key and described client are encrypted data transmission.
2. the method for claim 1, it is characterised in that server is shaken hands with client During, generate session identification for described client, described session identification be sent to described client, The pre-main encryption returned according to described client concatenates into symmetrical cipher key related information, by described session identification Corresponding with described symmetric key relevant information it is stored in preset memory, including:
Described server receives the SSL request of described client, obtains and carries in described SSL request Session identification length information;
Described server according to described session identification length information determine session identification a length of zero time, for institute State client and generate described session identification, and described session identification is sent to described client so that institute State client and receive session identification, generate and the described pre-main encryption string after encryption is sent to described service Device;
Described pre-main encryption string after the encryption that described server receives and sends described client is carried out Deciphering obtains described pre-main encryption string, concatenates into the relevant letter of described symmetric key according to described pre-main encryption Breath, is stored in described preset memory by corresponding with described symmetric key relevant information for described session identification In;
Described server generates described symmetric key according to described symmetric key relevant information, and it is described right to utilize Key and described client is claimed to be encrypted data transmission.
3. method as claimed in claim 2, it is characterised in that described server receives described client The SSL request of end, after obtaining the session identification length information carried in described SSL request, also wraps Include:
According to described session identification length information, described server determines that described session identification length is not zero Time, determine that described server and described client are carried out in handshake procedure again;
Correspondingly, when described server can get described session identification from described client, described Server is according to described session identification, and from described preset memory, inquiry obtains described session identification correspondence Described symmetric key relevant information, including:
Described server judges whether to carry in described SSL request described session identification;
If carrying described session identification in described SSL request, the most described server obtains described SSL Described session identification in request, described server is according to described session identification, from described preset memory Middle inquiry obtains the described symmetric key relevant information that described session identification is corresponding, is sent out by described session identification Give described client, and send, to described client, ending message of shaking hands.
4. method as claimed in claim 3, it is characterised in that described server judges described SSL After whether request carries described session identification, also include:
If described SSL request does not carry described session identification, then perform to generate for described client Described session identification, and described session identification is sent to the step of described client.
5. method as claimed in claim 3, it is characterised in that described server is according to described session Mark, from described preset memory inquiry obtain described symmetric key corresponding to described session identification be correlated with Information, including:
Described server, according to described session identification, inquires about session identification pair described in described preset memory Whether the described symmetric key relevant information answered exists;
If the described symmetric key relevant information that session identification described in described preset memory is corresponding is deposited , then perform to be sent to described session identification described client, and send, to described client, knot of shaking hands The step of bundle information;
If described symmetric key relevant information corresponding to session identification described in described preset memory is not Exist, then perform to generate described session identification for described client, and described session identification is sent to institute State the step of client.
6. the method as described in claim 1-5 any claim, it is characterised in that described symmetry is close Key relevant information includes: master key master secret, server random number and client random number.
7. the method as described in claim 1-5 any claim, it is characterised in that described server For the arbitrary described server in server cluster, described preset memory is independent of described server cluster In arbitrary described server.
8. the server of a SSL Session state reuse, it is characterised in that described server includes:
Processing module, for carrying out in handshake procedure, for described client in described server and client Generate session identification, described session identification is sent to described client, returns according to described client Pre-main encryption concatenates into symmetrical cipher key related information, by relevant with described symmetric key for described session identification letter Breath correspondence is stored in preset memory;
Enquiry module, for again carrying out in handshake procedure in described server and described client, works as institute Stating server can be when described client gets described session identification, according to described session identification, from In described preset memory, inquiry obtains the described symmetric key relevant information that described session identification is corresponding;
Transport module, for generating symmetric key according to described symmetric key relevant information, it is described right to utilize Key and described client is claimed to be encrypted data transmission.
9. server as claimed in claim 8, it is characterised in that described processing module includes:
Processing unit, for receiving the SSL request of described client, obtains in described SSL request and takes The session identification length information of band;
Signal generating unit, for according to described session identification length information determine session identification a length of zero time, Generate described session identification for described client, and described session identification is sent to described client, make Obtaining described client and receive session identification, the described pre-main encryption string after generating and encrypting is sent to described Server;
Memory element, the described pre-main encryption string after the encryption received and send described client enters Row deciphering obtains described pre-main encryption string, concatenates into the relevant letter of described symmetric key according to described pre-main encryption Breath, is stored in described preset memory by corresponding with described symmetric key relevant information for described session identification In;
Transmission unit, for generating described symmetric key according to described symmetric key relevant information, utilizes institute State symmetric key and be encrypted data transmission with described client.
10. server as claimed in claim 9, it is characterised in that described processing module also includes:
Determine unit, for determining that described session identification length is not according to described session identification length information When zero, determine that described server and described client are carried out in handshake procedure again;
Correspondingly, described enquiry module includes:
Judging unit, is used for judging whether to carry in described SSL request described session identification;
Query unit, if carrying described session identification in described SSL request, then obtains described Described session identification in SSL request, according to described session identification, inquires about from described preset memory Obtain the described symmetric key relevant information that described session identification is corresponding, described session identification is sent to institute State client, and send, to described client, ending message of shaking hands.
11. servers as claimed in claim 10, it is characterised in that described processing module also includes:
Notification unit, if not carrying described session identification in described SSL request, then notifies institute State signal generating unit to perform to generate described session identification for described client, and described session identification is sent to The step of described client.
12. servers as claimed in claim 10, it is characterised in that described query unit includes:
Inquiry subelement, for according to described session identification, inquires about session described in described preset memory Whether the described symmetric key relevant information of mark correspondence exists;
First notice subelement, if corresponding described of session identification described in the described preset memory Symmetric key relevant information exists, then notify that described query unit performs described session identification is sent to institute State client, and send the step of ending message of shaking hands to described client;
Second notice subelement, if corresponding described of session identification described in the described preset memory Symmetric key relevant information does not exists, then notify that described signal generating unit performs as the generation of described client described Session identification, and described session identification is sent to the step of described client.
13. servers as described in claim 8-12 any claim, it is characterised in that described right Cipher key related information is claimed to include: master key master secret, server random number and client random number.
14. servers as described in claim 8-12 any claim, it is characterised in that described clothes Business device is the arbitrary described server in server cluster, and described preset memory is independent of described server Arbitrary described server in cluster.
The system of 15. 1 kinds of SSL Session state reuse, it is characterised in that described system includes: server and Preset memory;
Described server includes:
Processing module, for carrying out in handshake procedure, for described client in described server and client Generate session identification, described session identification is sent to described client, returns according to described client Pre-main encryption concatenates into symmetrical cipher key related information, by relevant with described symmetric key for described session identification letter Breath correspondence is stored in described preset memory;
Enquiry module, for again carrying out in handshake procedure in described server and described client, works as institute Stating server can be when described client gets described session identification, according to described session identification, from In described preset memory, inquiry obtains the described symmetric key relevant information that described session identification is corresponding;
Transport module, for generating symmetric key according to described symmetric key relevant information, it is described right to utilize Key and described client is claimed to be encrypted data transmission;
Described preset memory, for depositing corresponding with described symmetric key relevant information for described session identification Storage.
16. systems as claimed in claim 15, it is characterised in that described processing module includes:
Processing unit, for receiving the SSL request of described client, obtains in described SSL request and takes The session identification length information of band;
Signal generating unit, for according to described session identification length information determine session identification a length of zero time, Generate described session identification for described client, and described session identification is sent to described client, make Obtaining described client and receive session identification, the described pre-main encryption string after generating and encrypting is sent to described Server;
Memory element, the described pre-main encryption string after the encryption received and send described client enters Row deciphering obtains described pre-main encryption string, concatenates into the relevant letter of described symmetric key according to described pre-main encryption Breath, is stored in described preset memory by corresponding with described symmetric key relevant information for described session identification In;
Transmission unit, for generating described symmetric key according to described symmetric key relevant information, utilizes institute State symmetric key and be encrypted data transmission with described client.
17. systems as claimed in claim 16, it is characterised in that described processing module also includes:
Determine unit, for determining that described session identification length is not according to described session identification length information When zero, determine that described server and described client are carried out in handshake procedure again;
Correspondingly, described enquiry module includes:
Judging unit, is used for judging whether to carry in described SSL request described session identification;
Query unit, if carrying described session identification in described SSL request, then obtains described Described session identification in SSL request, according to described session identification, inquires about from described preset memory Obtain the described symmetric key relevant information that described session identification is corresponding, described session identification is sent to institute State client, and send, to described client, ending message of shaking hands.
18. systems as claimed in claim 17, it is characterised in that described processing module also includes:
Notification unit, if not carrying described session identification in described SSL request, then notifies institute State signal generating unit to perform to generate described session identification for described client, and described session identification is sent to The step of described client.
19. systems as claimed in claim 17, it is characterised in that described query unit includes:
Inquiry subelement, for according to described session identification, inquires about session described in described preset memory Whether the described symmetric key relevant information of mark correspondence exists;
First notice subelement, if corresponding described of session identification described in the described preset memory Symmetric key relevant information exists, then notify that described query unit performs described session identification is sent to institute State client, and send the step of ending message of shaking hands to described client;
Second notice subelement, if corresponding described of session identification described in the described preset memory Symmetric key relevant information does not exists, then notify that described signal generating unit performs as the generation of described client described Session identification, and described session identification is sent to the step of described client.
20. systems as described in claim 15-19 any claim, it is characterised in that described right Cipher key related information is claimed to include: master key master secret, server random number and client random number.
21. systems as described in claim 15-19 any claim, it is characterised in that described clothes Business device is the arbitrary described server in system cluster, and described preset memory is independent of described server set Arbitrary described server in Qun.
CN201510195144.1A 2015-04-22 2015-04-22 The method of SSL Session state reuse, server and system Pending CN106161404A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510195144.1A CN106161404A (en) 2015-04-22 2015-04-22 The method of SSL Session state reuse, server and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510195144.1A CN106161404A (en) 2015-04-22 2015-04-22 The method of SSL Session state reuse, server and system

Publications (1)

Publication Number Publication Date
CN106161404A true CN106161404A (en) 2016-11-23

Family

ID=57347911

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510195144.1A Pending CN106161404A (en) 2015-04-22 2015-04-22 The method of SSL Session state reuse, server and system

Country Status (1)

Country Link
CN (1) CN106161404A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106790285A (en) * 2017-02-27 2017-05-31 杭州迪普科技股份有限公司 A kind of Session state reuse method and device
CN107426193A (en) * 2017-06-30 2017-12-01 重庆大学 For hardware-accelerated novel I/O paths design in a kind of https applications
CN109583220A (en) * 2018-12-03 2019-04-05 北京安华金和科技有限公司 A method of realizing data base encryption protocol analysis
WO2019114703A1 (en) * 2017-12-15 2019-06-20 华为技术有限公司 Secure communication method, apparatus and device
CN111385289A (en) * 2020-02-26 2020-07-07 平安科技(深圳)有限公司 Method, device and storage medium for secure handshake between client and server
CN111416714A (en) * 2020-04-08 2020-07-14 北京信安世纪科技股份有限公司 Method and system for realizing identifier exchange in SM9 algorithm based on SS L protocol
CN112019374A (en) * 2020-07-15 2020-12-01 上海趣蕴网络科技有限公司 Network communication optimization method and system
CN112769868A (en) * 2021-02-07 2021-05-07 深圳市欧瑞博科技股份有限公司 Communication method, communication device, electronic device and storage medium
CN114143108A (en) * 2021-12-08 2022-03-04 中国建设银行股份有限公司 Session encryption method, device, equipment and storage medium
CN115484301A (en) * 2022-08-04 2022-12-16 支付宝(杭州)信息技术有限公司 Data transmission method and device, storage medium and electronic equipment
CN117596076A (en) * 2024-01-18 2024-02-23 北京华耀科技有限公司 Session data transmission method, system, device, equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102946405A (en) * 2011-09-09 2013-02-27 微软公司 SMB2 Scaleout
CN103959735A (en) * 2011-08-25 2014-07-30 网络存储技术公司 Systems and methods for providing secure multicast intra-cluster communication
EP2763374A1 (en) * 2013-02-05 2014-08-06 Nuance Communications, Inc. Method and apparatus for supporting scalable multi-modal dialog application sessions

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103959735A (en) * 2011-08-25 2014-07-30 网络存储技术公司 Systems and methods for providing secure multicast intra-cluster communication
CN102946405A (en) * 2011-09-09 2013-02-27 微软公司 SMB2 Scaleout
EP2763374A1 (en) * 2013-02-05 2014-08-06 Nuance Communications, Inc. Method and apparatus for supporting scalable multi-modal dialog application sessions

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
付亚男: "SSL服务器集群***性能优化的研究", 《中国优秀硕士学位论文全文数据库信息科技辑》 *
张忠林: "《电子商务概论》", 31 August 2006 *

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106790285B (en) * 2017-02-27 2019-09-06 杭州迪普科技股份有限公司 A kind of Session state reuse method and device
CN106790285A (en) * 2017-02-27 2017-05-31 杭州迪普科技股份有限公司 A kind of Session state reuse method and device
CN107426193A (en) * 2017-06-30 2017-12-01 重庆大学 For hardware-accelerated novel I/O paths design in a kind of https applications
CN109936529B (en) * 2017-12-15 2021-12-31 华为技术有限公司 Method, device and system for secure communication
WO2019114703A1 (en) * 2017-12-15 2019-06-20 华为技术有限公司 Secure communication method, apparatus and device
CN109936529A (en) * 2017-12-15 2019-06-25 华为技术有限公司 A kind of methods, devices and systems of secure communication
CN109583220A (en) * 2018-12-03 2019-04-05 北京安华金和科技有限公司 A method of realizing data base encryption protocol analysis
CN111385289A (en) * 2020-02-26 2020-07-07 平安科技(深圳)有限公司 Method, device and storage medium for secure handshake between client and server
CN111416714A (en) * 2020-04-08 2020-07-14 北京信安世纪科技股份有限公司 Method and system for realizing identifier exchange in SM9 algorithm based on SS L protocol
CN112019374A (en) * 2020-07-15 2020-12-01 上海趣蕴网络科技有限公司 Network communication optimization method and system
CN112769868A (en) * 2021-02-07 2021-05-07 深圳市欧瑞博科技股份有限公司 Communication method, communication device, electronic device and storage medium
CN114143108A (en) * 2021-12-08 2022-03-04 中国建设银行股份有限公司 Session encryption method, device, equipment and storage medium
CN114143108B (en) * 2021-12-08 2024-04-26 中国建设银行股份有限公司 Session encryption method, device, equipment and storage medium
CN115484301A (en) * 2022-08-04 2022-12-16 支付宝(杭州)信息技术有限公司 Data transmission method and device, storage medium and electronic equipment
CN117596076A (en) * 2024-01-18 2024-02-23 北京华耀科技有限公司 Session data transmission method, system, device, equipment and storage medium
CN117596076B (en) * 2024-01-18 2024-04-02 北京华耀科技有限公司 Session data transmission method, system, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN106161404A (en) The method of SSL Session state reuse, server and system
CN106059986A (en) Method and server for SSL (Secure Sockets Layer) session reuse
CN106533689B (en) A kind of method and apparatus of the load digital certificates in SSL/TLS communication
US10084760B2 (en) Secure messages for internet of things devices
Ristic Bulletproof SSL and TLS: Understanding and deploying SSL/TLS and PKI to secure servers and web applications
US11303431B2 (en) Method and system for performing SSL handshake
EP3157225A1 (en) Encrypted ccnx
US10142298B2 (en) Method and system for protecting data flow between pairs of branch nodes in a software-defined wide-area network
JP2005312026A (en) Signature and verification method for session origination protocol routing header
US9942050B2 (en) Method and apparatus for bulk authentication and load balancing of networked devices
CN109921898A (en) IPv6 stateless address generation method and device
CN108667933A (en) Device and communication system are established in connection method for building up, connection
Lam et al. Securing SDN southbound and data plane communication with IBC
CN108737446A (en) Multi-party communications method based on dual identity and system
JP2009518955A (en) Address component encapsulation
US10158610B2 (en) Secure application communication system
US20170201493A1 (en) System and method for secure and anonymous communication in a network
Kuntze et al. On the automatic establishment of security relations for devices
Saxena et al. Public key cryptography based approach for securing SCADA communications
Kumar et al. Hash based approach for providing privacy and integrity in cloud data storage using digital signatures
EP2753043B1 (en) Reverse authorized syn cookie
Varela et al. Information security in WSN applied to smart metering networks based on cryptographic techniques
CN111797417A (en) File uploading method and device, storage medium and electronic device
Bolannavar Privacy-Preserving Public Auditing using TPA for Secure Cloud Storage
CN115086069B (en) DDoS attack recognition method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20161123