A security architecture using secret key
algorithm and vertical authentication mode is proposed. Establish security protocols
in the chip of smart key at network client or mobile phone, and establish key
exchange protocol in the chip of encryption cards at network key management
center. A combined key real-time generation algorithm is used to solve the
update and management problems. Online or offline authentication and documents
encryption transmission protocols are adopted to achieve credible connection
between users. Accordingly, set up security layer over Internet, which provides
convenient encryption ability to each network user, and build credible and
secure network system.
Cite this paper
Hu, X. , Zhao, G. and Xu, G. (2015) A Way to Set up Security Layer over Internet. Journal of Computer and Communications
, 174-181. doi: 10.4236/jcc.2015.35022
 Bai, J. and Jing, J.W. (2012) Look upon the Cryptography Challenge in Cloud. China Information Security, 11, 15-16, 26.
 Shen, C.X. (2012) Cloud Computing Security and Classified Security Protection. China Information Security, 1, 16-17.
 Han, S. (2012) Key Technologies on Cloud Computing Data Security. University of Electronic Science and Technology of China.
 Feng, D.G. (2011) Enter Cloud Computing Security Age. Netinfo Security, 3, 1-2.
 Zhang, W.-K. and Liu, G.-F. (2012) Data Security and Privacy Protection of Cloud Computting. China In-formation Security, 11, 38-40.
 Zhang, Y.Y., Chen, Q.J., Pan, S.B. and Wei, J.W. (2010) Key Security Technolo-gies on Cloud Computing. Telecommunications Science, 26, 64-69.
 Online Privacy Breakthrough as British Re-searchers Claim to Have Developed Way to Give the Internet a “Security Layer”. http://www.dailymail.co.uk/sciencetech/article-2885677/Online-privacy-breakthrough-British-researchers-claim-developed-way-internet-security-layer.html?ITO=1490&ns_mchannel=rss&ns_campaign=1490
 Hu, X.Y. (2014) Patent Title: A Method of Mobile Phone Offline Authentication. Patent Application Number: 201410833988.X.