KR100319256B1 - 통신 프로토콜 운용 방법 - Google Patents
통신 프로토콜 운용 방법 Download PDFInfo
- Publication number
- KR100319256B1 KR100319256B1 KR1019990066105A KR19990066105A KR100319256B1 KR 100319256 B1 KR100319256 B1 KR 100319256B1 KR 1019990066105 A KR1019990066105 A KR 1019990066105A KR 19990066105 A KR19990066105 A KR 19990066105A KR 100319256 B1 KR100319256 B1 KR 100319256B1
- Authority
- KR
- South Korea
- Prior art keywords
- server
- client
- message
- master secret
- key
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 19
- 238000004891 communication Methods 0.000 title claims abstract description 11
- 238000011017 operating method Methods 0.000 claims description 3
- 230000006870 function Effects 0.000 description 10
- 238000010586 diagram Methods 0.000 description 7
- 238000010295 mobile communication Methods 0.000 description 2
- 238000000605 extraction Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/24—Radio transmission systems, i.e. using radiation field for communication between two or more posts
- H04B7/26—Radio transmission systems, i.e. using radiation field for communication between two or more posts at least one of which is mobile
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/04—Protocols specially adapted for terminals or networks with limited capabilities; specially adapted for terminal portability
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (1)
- 클라이언트(client)와 서버(Server)간 제공되는 통신 프로토콜 운용에서,상기 서버가 상기 클라이언트로부터 전송된 메시지를 받고 사용자 식별자 (id)에서 예비-마스터 시크리트(pre-master secret)를 검출하는 단계와;상기 서버가 상기 클라이언트에게 서버 랜덤(server random) 값을 전송하기 위해서 ServoHello 메시지를 생성하는 단계와;상기 서버가 검출한 예비-마스터 시크리트와 클라이언트 랜덤(client random), 서버 랜덤(server random) 값을 바탕으로 마스터 시크리트를 생성하는 단계와;상기 서버가 생성된 마스터 시크리트와 클라이언트 랜덤, 서버 랜덤 값을 바탕으로 키 블록(key block)을 생성하는 단계와;상기 서버가 상기 생성된 키 블록으로부터 최종적으로 암호(encryption), 해독(decryption) 알고리즘과 MAC(Message Authentication Code) 알고리즘에서 사용할 키 값을 생성하는 단계와;상기 서버가 다음 메시지부터는 암호화해서 보낼 것이라는 사실을 알리기 위한 제 1 ChangeCipherSpec 레코드를 생성하는 단계와;상기 서버가 상기 클라이언트가 서버와 동일한 마스터 시크리트를 생성했다는 것을 확인할 수 있는 종료(Finished) 메시지를 생성하는 단계와;상기 서버가 생성한 메시지를 집중화하여 상기 클라이언트로 전송하는 단계와;상기 클라이언트가 자신이 가지고 있는 상기 예비-마스터 시크리트와 클라이언트 랜덤, 상기 서버로부터 받은 서버 랜덤 값으로부터 서버와 동일한 방식으로 마스터 시크리트, 키 블록, 최종 암호와 키와 맥 키 값을 각각 계산하는 단계와;상기 클라이언트가 상기 레코드를 처리한 후, 상기 서버가 보내는 메시지가 암호화되어 전송된 것을 확인하는 단계와;상기 클라이언트에서 종료 메시지를 검사해서 상기 서버와 동일한 마스터 시크리트를 생성한 것을 확인하고, 상기 클라이언트가 보내는 메시지가 서로 합의한 키 값으로 처리하여 전송할 것이라는 것을 알리는 제 2 ChangeCipherSpec 레코드를 전송하는 단계를 포함하는 것을 특징으로 하는 통신 프로토콜 운용 방법.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1019990066105A KR100319256B1 (ko) | 1999-12-30 | 1999-12-30 | 통신 프로토콜 운용 방법 |
US09/750,921 US7096352B2 (en) | 1999-12-30 | 2001-01-02 | Security protocol structure in application layer |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1019990066105A KR100319256B1 (ko) | 1999-12-30 | 1999-12-30 | 통신 프로토콜 운용 방법 |
Publications (2)
Publication Number | Publication Date |
---|---|
KR20010058744A KR20010058744A (ko) | 2001-07-06 |
KR100319256B1 true KR100319256B1 (ko) | 2002-01-05 |
Family
ID=19633254
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1019990066105A KR100319256B1 (ko) | 1999-12-30 | 1999-12-30 | 통신 프로토콜 운용 방법 |
Country Status (2)
Country | Link |
---|---|
US (1) | US7096352B2 (ko) |
KR (1) | KR100319256B1 (ko) |
Families Citing this family (40)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FI20001837L (fi) * | 2000-08-18 | 2002-02-19 | Nokia Corp | Autentikointi |
EP1356653B1 (en) * | 2001-01-24 | 2011-07-20 | Broadcom Corporation | Method for processing multiple security policies applied to a data packet structure |
CN1138366C (zh) * | 2001-07-12 | 2004-02-11 | 华为技术有限公司 | 适用于移动通信系统终端加密的网络及其实现方法 |
US6986045B2 (en) * | 2001-08-17 | 2006-01-10 | Pitney Bowes Inc. | Single algorithm cipher suite for messaging |
US20030105830A1 (en) * | 2001-12-03 | 2003-06-05 | Duc Pham | Scalable network media access controller and methods |
US7496957B2 (en) * | 2002-01-02 | 2009-02-24 | Hewlett-Packard Development Company, L.P. | System and method for preventing use of a wireless device |
US7400733B1 (en) * | 2002-02-27 | 2008-07-15 | Atheros Communications, Inc. | Key refresh at the MAC layer |
US7529933B2 (en) * | 2002-05-30 | 2009-05-05 | Microsoft Corporation | TLS tunneling |
US6678828B1 (en) * | 2002-07-22 | 2004-01-13 | Vormetric, Inc. | Secure network file access control system |
US7334124B2 (en) * | 2002-07-22 | 2008-02-19 | Vormetric, Inc. | Logical access block processing protocol for transparent secure file storage |
US6931530B2 (en) | 2002-07-22 | 2005-08-16 | Vormetric, Inc. | Secure network file access controller implementing access control and auditing |
US7143288B2 (en) | 2002-10-16 | 2006-11-28 | Vormetric, Inc. | Secure file system server architecture and methods |
US7454785B2 (en) * | 2002-12-19 | 2008-11-18 | Avocent Huntsville Corporation | Proxy method and system for secure wireless administration of managed entities |
US7313687B2 (en) * | 2003-01-10 | 2007-12-25 | Microsoft Corporation | Establishing a secure context at an electronic communications end-point |
US7644275B2 (en) | 2003-04-15 | 2010-01-05 | Microsoft Corporation | Pass-thru for client authentication |
US7394761B2 (en) * | 2003-04-29 | 2008-07-01 | Avocent Huntsville Corporation | System and method for delivering messages using alternate modes of communication |
US7603557B2 (en) * | 2004-04-15 | 2009-10-13 | Panasonic Corporation | Communication device, communication system and authentication method |
US7555783B2 (en) * | 2005-01-21 | 2009-06-30 | Cisco Technology, Inc. | Wireless network credential provisioning |
US8078740B2 (en) | 2005-06-03 | 2011-12-13 | Microsoft Corporation | Running internet applications with low rights |
US7783756B2 (en) * | 2005-06-03 | 2010-08-24 | Alcatel Lucent | Protection for wireless devices against false access-point attacks |
US8185737B2 (en) * | 2006-06-23 | 2012-05-22 | Microsoft Corporation | Communication across domains |
CA2590989C (en) * | 2007-06-05 | 2014-02-11 | Diversinet Corp. | Protocol and method for client-server mutual authentication using event-based otp |
US20080306875A1 (en) * | 2007-06-11 | 2008-12-11 | Ebay Inc. | Method and system for secure network connection |
US10019570B2 (en) * | 2007-06-14 | 2018-07-10 | Microsoft Technology Licensing, Llc | Protection and communication abstractions for web browsers |
US7591013B2 (en) * | 2007-07-31 | 2009-09-15 | Cisco Technology, Inc. | System and method for client initiated authentication in a session initiation protocol environment |
JP4519935B2 (ja) * | 2008-12-26 | 2010-08-04 | 株式会社東芝 | 情報通信方法、通信端末装置および情報通信システム |
US8296567B2 (en) * | 2009-07-15 | 2012-10-23 | Research In Motion Limited | System and method for exchanging key generation parameters for secure communications |
US9015469B2 (en) | 2011-07-28 | 2015-04-21 | Cloudflare, Inc. | Supporting secure sessions in a cloud-based proxy service |
PL2792100T3 (pl) * | 2011-12-15 | 2021-03-22 | Intel Corporation | Sposób i urządzenie do bezpiecznej komunikacji w sieci przy użyciu sprzętowego silnika bezpieczeństwa |
CN104094267B (zh) | 2011-12-15 | 2020-04-07 | 英特尔公司 | 安全共享来自源装置的媒体内容的方法、装置和系统 |
KR20140052703A (ko) * | 2012-10-25 | 2014-05-07 | 삼성전자주식회사 | 프록시 서버를 이용한 웹 서비스 가속 방법 및 장치 |
US8782774B1 (en) | 2013-03-07 | 2014-07-15 | Cloudflare, Inc. | Secure session capability using public-key cryptography without access to the private key |
US8996873B1 (en) * | 2014-04-08 | 2015-03-31 | Cloudflare, Inc. | Secure session capability using public-key cryptography without access to the private key |
US8966267B1 (en) | 2014-04-08 | 2015-02-24 | Cloudflare, Inc. | Secure session capability using public-key cryptography without access to the private key |
US9184911B2 (en) | 2014-04-08 | 2015-11-10 | Cloudflare, Inc. | Secure session capability using public-key cryptography without access to the private key |
US10158487B2 (en) | 2015-07-16 | 2018-12-18 | Cisco Technology, Inc. | Dynamic second factor authentication for cookie-based authentication |
US10171441B2 (en) * | 2016-09-28 | 2019-01-01 | International Business Machines Corporation | System and method for transforming Channel ID communications in man-in-the-middle context |
US10545940B2 (en) * | 2017-02-22 | 2020-01-28 | Red Hat, Inc. | Supporting secure layer extensions for communication protocols |
US10320842B1 (en) * | 2017-03-24 | 2019-06-11 | Symantec Corporation | Securely sharing a transport layer security session with one or more trusted devices |
US10903990B1 (en) | 2020-03-11 | 2021-01-26 | Cloudflare, Inc. | Establishing a cryptographic tunnel between a first tunnel endpoint and a second tunnel endpoint where a private key used during the tunnel establishment is remotely located from the second tunnel endpoint |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5825890A (en) * | 1995-08-25 | 1998-10-20 | Netscape Communications Corporation | Secure socket layer application program apparatus and method |
KR19990056431A (ko) * | 1997-12-29 | 1999-07-15 | 전주범 | 디지탈 오디오 부호화장치에 있어서 비트할당방법 |
KR20010056418A (ko) * | 1999-12-15 | 2001-07-04 | 서평원 | 왑 상에서의 종단 간의 보안 방법 |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5535276A (en) * | 1994-11-09 | 1996-07-09 | Bell Atlantic Network Services, Inc. | Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography |
US6182220B1 (en) * | 1998-03-30 | 2001-01-30 | International Business Machines Corporation | System and method for building and exchanging encrypted passwords between a client and server |
US6654806B2 (en) * | 1999-04-09 | 2003-11-25 | Sun Microsystems, Inc. | Method and apparatus for adaptably providing data to a network environment |
US6694431B1 (en) * | 1999-10-12 | 2004-02-17 | International Business Machines Corporation | Piggy-backed key exchange protocol for providing secure, low-overhead browser connections when a server will not use a message encoding scheme proposed by a client |
-
1999
- 1999-12-30 KR KR1019990066105A patent/KR100319256B1/ko not_active IP Right Cessation
-
2001
- 2001-01-02 US US09/750,921 patent/US7096352B2/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5825890A (en) * | 1995-08-25 | 1998-10-20 | Netscape Communications Corporation | Secure socket layer application program apparatus and method |
KR19990056431A (ko) * | 1997-12-29 | 1999-07-15 | 전주범 | 디지탈 오디오 부호화장치에 있어서 비트할당방법 |
KR20010056418A (ko) * | 1999-12-15 | 2001-07-04 | 서평원 | 왑 상에서의 종단 간의 보안 방법 |
Also Published As
Publication number | Publication date |
---|---|
US7096352B2 (en) | 2006-08-22 |
KR20010058744A (ko) | 2001-07-06 |
US20010016907A1 (en) | 2001-08-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR100319256B1 (ko) | 통신 프로토콜 운용 방법 | |
EP1811744B1 (en) | Method, system and centre for authenticating in End-to-End communications based on a mobile network | |
US6965992B1 (en) | Method and system for network security capable of doing stronger encryption with authorized devices | |
JP4603043B2 (ja) | シンクml同期データを送信するための方法 | |
CN110995414B (zh) | 基于国密算法在tls1_3协议中建立通道的方法 | |
US8392968B2 (en) | Stateless cryptographic protocol-based hardware acceleration | |
CN112422507B (zh) | 一种基于标识算法的国密ssl加密方法 | |
WO2022111102A1 (zh) | 建立安全连接的方法、系统、装置、电子设备和机器可读存储介质 | |
US20030097592A1 (en) | Mechanism supporting wired and wireless methods for client and server side authentication | |
CN106788989B (zh) | 一种建立安全加密信道的方法及设备 | |
US20080065777A1 (en) | Method and system for establishing a secure over-the-air (ota) device connection | |
US20040236965A1 (en) | System for cryptographical authentication | |
JP2010259074A (ja) | ワイヤレスアプリケーションプロトコルに基づく機密セッションの設定 | |
JP2001524777A (ja) | データ接続の機密保護 | |
CN110247803B (zh) | 一种针对网络管理协议SNMPv3的协议优化架构及其方法 | |
CN112565302A (zh) | 基于安全网关的通信方法、系统及设备 | |
CN114760093B (zh) | 通信方法及装置 | |
CN112205018A (zh) | 监控网络中的加密连接的方法、设备和计算机程序产品 | |
CN113422753B (zh) | 数据处理方法、装置、电子设备及计算机存储介质 | |
CN115664725A (zh) | 基于国密算法的tls密钥交换方法及系统 | |
CN116366262A (zh) | 双SSL证书web服务器设置方法和web服务系统 | |
CN114707158A (zh) | 基于tee的网络通信认证方法以及网络通信认证系统 | |
CN115567195A (zh) | 安全通信方法、客户端、服务器、终端和网络侧设备 | |
Badra et al. | Adding identity protection to eap-tls smartcards | |
CN116017346A (zh) | 一种v2x通信方法及系统 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
PA0109 | Patent application |
Patent event code: PA01091R01D Comment text: Patent Application Patent event date: 19991230 |
|
PA0201 | Request for examination | ||
PG1501 | Laying open of application | ||
E701 | Decision to grant or registration of patent right | ||
PE0701 | Decision of registration |
Patent event code: PE07011S01D Comment text: Decision to Grant Registration Patent event date: 20011127 |
|
GRNT | Written decision to grant | ||
PR0701 | Registration of establishment |
Comment text: Registration of Establishment Patent event date: 20011217 Patent event code: PR07011E01D |
|
PR1002 | Payment of registration fee |
Payment date: 20011218 End annual number: 3 Start annual number: 1 |
|
PG1601 | Publication of registration | ||
PR1001 | Payment of annual fee |
Payment date: 20040924 Start annual number: 4 End annual number: 4 |
|
PR1001 | Payment of annual fee |
Payment date: 20050929 Start annual number: 5 End annual number: 5 |
|
PR1001 | Payment of annual fee |
Payment date: 20061127 Start annual number: 6 End annual number: 6 |
|
PR1001 | Payment of annual fee |
Payment date: 20071116 Start annual number: 7 End annual number: 7 |
|
PR1001 | Payment of annual fee |
Payment date: 20081128 Start annual number: 8 End annual number: 8 |
|
PR1001 | Payment of annual fee |
Payment date: 20091127 Start annual number: 9 End annual number: 9 |
|
PR1001 | Payment of annual fee |
Payment date: 20101109 Start annual number: 10 End annual number: 10 |
|
PR1001 | Payment of annual fee |
Payment date: 20111110 Start annual number: 11 End annual number: 11 |
|
FPAY | Annual fee payment |
Payment date: 20121115 Year of fee payment: 12 |
|
PR1001 | Payment of annual fee |
Payment date: 20121115 Start annual number: 12 End annual number: 12 |
|
FPAY | Annual fee payment |
Payment date: 20131115 Year of fee payment: 13 |
|
PR1001 | Payment of annual fee |
Payment date: 20131115 Start annual number: 13 End annual number: 13 |
|
FPAY | Annual fee payment |
Payment date: 20141117 Year of fee payment: 14 |
|
PR1001 | Payment of annual fee |
Payment date: 20141117 Start annual number: 14 End annual number: 14 |
|
FPAY | Annual fee payment |
Payment date: 20151112 Year of fee payment: 15 |
|
PR1001 | Payment of annual fee |
Payment date: 20151112 Start annual number: 15 End annual number: 15 |
|
LAPS | Lapse due to unpaid annual fee | ||
PC1903 | Unpaid annual fee |
Termination category: Default of registration fee Termination date: 20170927 |