JCC  Vol.3 No.5 , May 2015
A Way to Set up Security Layer over Internet
Abstract: A security architecture using secret key algorithm and vertical authentication mode is proposed. Establish security protocols in the chip of smart key at network client or mobile phone, and establish key exchange protocol in the chip of encryption cards at network key management center. A combined key real-time generation algorithm is used to solve the update and management problems. Online or offline authentication and documents encryption transmission protocols are adopted to achieve credible connection between users. Accordingly, set up security layer over Internet, which provides convenient encryption ability to each network user, and build credible and secure network system.
Cite this paper: Hu, X. , Zhao, G. and Xu, G. (2015) A Way to Set up Security Layer over Internet. Journal of Computer and Communications, 3, 174-181. doi: 10.4236/jcc.2015.35022.

[1]   Bai, J. and Jing, J.W. (2012) Look upon the Cryptography Challenge in Cloud. China Information Security, 11, 15-16, 26.

[2]   Shen, C.X. (2012) Cloud Computing Security and Classified Security Protection. China Information Security, 1, 16-17.

[3]   Han, S. (2012) Key Technologies on Cloud Computing Data Security. University of Electronic Science and Technology of China.

[4]   Feng, D.G. (2011) Enter Cloud Computing Security Age. Netinfo Security, 3, 1-2.

[5]   Zhang, W.-K. and Liu, G.-F. (2012) Data Security and Privacy Protection of Cloud Computting. China In-formation Security, 11, 38-40.

[6]   Zhang, Y.Y., Chen, Q.J., Pan, S.B. and Wei, J.W. (2010) Key Security Technolo-gies on Cloud Computing. Telecommunications Science, 26, 64-69.

[7]   Online Privacy Breakthrough as British Re-searchers Claim to Have Developed Way to Give the Internet a “Security Layer”.

[8]   Hu, X.Y. (2014) Patent Title: A Method of Mobile Phone Offline Authentication. Patent Application Number: 201410833988.X.