(19)
(11)EP 3 503 464 B1

(12)EUROPEAN PATENT SPECIFICATION

(45)Mention of the grant of the patent:
23.09.2020 Bulletin 2020/39

(21)Application number: 17840914.0

(22)Date of filing:  24.07.2017
(51)International Patent Classification (IPC): 
H04L 9/32(2006.01)
H04L 29/06(2006.01)
(86)International application number:
PCT/CN2017/094021
(87)International publication number:
WO 2018/032939 (22.02.2018 Gazette  2018/08)

(54)

NETWORK NODE ENCRYPTION METHOD AND NETWORK NODE ENCRYPTION DEVICE

VERFAHREN ZUR NETZWERKKNOTENVERSCHLÜSSELUNG UND VORRICHTUNG ZUR NETZWERKKNOTENVERSCHLÜSSELUNG

PROCÉDÉ DE CHIFFREMENT DE NOEUD DE RÉSEAU ET DISPOSITIF DE CHIFFREMENT DE NOEUD DE RÉSEAU


(84)Designated Contracting States:
AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

(30)Priority: 19.08.2016 CN 201610692426

(43)Date of publication of application:
26.06.2019 Bulletin 2019/26

(73)Proprietor: Tencent Technology (Shenzhen) Company Limited
Shenzhen, Guangdong 518057 (CN)

(72)Inventor:
  • WEI, Wei
    Shenzhen Guangdong 518057 (CN)

(74)Representative: AWA Sweden AB 
P.O. Box 45086
104 30 Stockholm
104 30 Stockholm (SE)


(56)References cited: : 
CN-A- 101 527 634
CN-A- 106 302 476
US-A1- 2014 269 431
US-A1- 2016 241 405
CN-A- 102 932 762
US-A1- 2008 086 633
US-A1- 2014 269 431
US-B1- 7 334 125
  
      
    Note: Within nine months from the publication of the mention of the grant of the European patent, any person may give notice to the European Patent Office of opposition to the European patent granted. Notice of opposition shall be filed in a written reasoned statement. It shall not be deemed to have been filed until the opposition fee has been paid. (Art. 99(1) European Patent Convention).


    Description

    RELATED APPLICATION



    [0001] The present application claims priority to Chinese Patent Application No. 201610692426.7, entitled "NETWORK NODE ENCRYPTION METHOD AND APPARATUS" filed on August 19, 2016 in the Chinese Patent Office.

    FIELD OF THE TECHNOLOGY



    [0002] The present application relates to the field of Internet, and in particular to a network node encryption method and apparatus.

    BACKGROUND OF THE DISCLOSURE



    [0003] A CDN (Content delivery network) is a computer network system interconnected by the Internet and may send music, pictures, videos, application programs and other files to other users more rapidly and reliably by using a server closest to each user so as to provide network contents with high performance, expandability and low cost. US patent application US7334125 is further prior art.

    [0004] In order to improve the security of a CDN node, a network content provider generally encrypts the CDN node.

    SUMMARY



    [0005] The embodiments of the present application provide a network node encryption method and apparatus capable of automatically encrypting a network node so as to improve the security of the network node.

    [0006] The embodiment of the present application provides a network node encryption method, including: receiving a node encryption request, and acquiring node data information of a network node according to the node encryption request, the node data information including a preset link; transmitting an application to a trusted third party for an encryption certificate using the node data information; receiving a certificate verification request from the trusted third party, the certificate verification request including a verification file to be used to verify authority of the preset link, and the certificate verification request being generated by the trusted third party in response to the application for the encryption certificate; correlating the preset link of the network node to the verification file corresponding to the certificate verification request in response to the certificate verification request, so as to transmit a correlation result to the trusted third party; and receiving the encryption certificate, and deploying the encryption certificate on the network node, the encryption certificate being generated by the trusted third party based on the correlation result.

    [0007] The embodiment of the present application further provides a network node encryption apparatus, including: a memory and a processor, the memory storing a computer-readable instruction, and when being executed by the processor, the computer-readable instruction performing the following steps: receiving a node encryption request, and acquiring node data information of a network node according to the node encryption request, the node data information including a preset link; transmitting an application to a trusted third party for an encryption certificate using the node data information; receiving a certificate verification request from the trusted third party, the certificate verification request including a verification file to be used to verify authority of the preset link, and the certificate verification request being generated by the trusted third party in response to the application for the encryption certificate; correlating the preset link of the network node to the verification file corresponding to the certificate verification request in response to the certificate verification request, so as to transmit a correlation result to the trusted third party; and receiving the encryption certificate, and deploying the encryption certificate on the network node, the encryption certificate being generated by the trusted third party based on the correlation result.

    [0008] A network node encryption method, including: receiving an application for an encryption certificate from a network node encryption apparatus, and generating a certificate verification request in response to the application for the encryption certificate, the application for the encryption certificate including node data information of a network node, the node data information including a preset link, and the certificate verification request including a verification file for verifying authority of the preset link; receiving a correlation result returned from the network node encryption apparatus in response to the certificate verification request; generating a corresponding encryption certificate in response to determining that a correlation relationship exists between the preset link of the network node and the verification file according to the correlation result; and sending the encryption certificate to the network node encryption apparatus.

    [0009] A network node encryption apparatus for a trusted third party, including: a memory and a processor, the memory storing a computer-readable instruction, and when being executed by the processor, the computer-readable instruction performing the following steps: receiving an application for an encryption certificate from a network node encryption apparatus, and generating a certificate verification request in response to the application for the encryption certificate, the application for the encryption certificate including node data information of a network node, the node data information including a preset link, and the certificate verification request including a verification file for verifying authority of the preset link; receiving a correlation result returned from the network node encryption apparatus in response to the certificate verification request; generating a corresponding encryption certificate in response to determining that a correlation relationship exists between the preset link of the network node and the verification file according to the correlation result; sending the encryption certificate to the network node encryption apparatus.

    [0010] A non-volatile computer-readable memory medium, the memory medium storing a computer-readable instruction, and the computer-readable instruction is executed by a processor to perform the steps: receiving an application for an encryption certificate from a network node encryption apparatus, and generating a certificate verification request in response to the application for the encryption certificate, the application for the encryption certificate including node data information of a network node, the node data information including a preset link, and the certificate verification request including a verification file for verifying authority of the preset link; receiving a correlation result returned from the network node encryption apparatus in response to the certificate verification request; generating a corresponding encryption certificate in response to determining that a correlation relationship exists between the preset link of the network node and the verification file according to the correlation result; sending the encryption certificate to the network node encryption apparatus.

    [0011] A non-volatile computer-readable memory medium, the memory medium storing a computer-readable instruction, and the computer-readable instruction is executed by a processor to perform the steps: receiving a node encryption request, and acquiring node data information of a network node according to the node encryption request, the node data information including a preset link; transmitting an application to a trusted third party for an encryption certificate using the node data information; receiving a certificate verification request from the trusted third party, the certificate verification request including a verification file to be used to verify authority of the preset link, and the certificate verification request being generated by the trusted third party in response to the application for the encryption certificate; correlating the preset link of the network node to the verification file corresponding to the certificate verification request in response to the certificate verification request, so as to transmit a correlation result to the trusted third party; and receiving the encryption certificate, and deploying the encryption certificate on the network node; the encryption certificate being generated by the trusted third party based on the correlation result.

    BRIEF DESCRIPTION OF THE DRAWINGS



    [0012] 

    FIG. 1 is a flow diagram of an embodiment of a network node encryption method of the present application;

    FIG. 2 is a flow diagram of the embodiment of the network node encryption method of the present application;

    FIG. 3 is a flow diagram of step S203 in the embodiment of the network node encryption method of the present application;

    FIG. 4 is a flow diagram of step S204 in the embodiment of the network node encryption method of the present application;

    FIG. 5 is a flow diagram of step S206 in the embodiment of the network node encryption method of the present application;

    FIG. 6 is a schematic structural diagram of an embodiment of a network node encryption apparatus of the present application;

    FIG. 7 is a schematic structural diagram of the embodiment of the network node encryption apparatus of the present application;

    FIG. 8 is a schematic structural diagram of a node information acquisition module in the embodiment of the network node encryption apparatus of the present application;

    FIG. 9 is a schematic structural diagram of a certificate application module in the embodiment of the network node encryption apparatus of the present application;

    FIG. 10 is a schematic structural diagram of a correlation module in the embodiment of the network node encryption apparatus of the present application;

    FIG. 11 is an implementation sequence diagram of a specific embodiment of the network node encryption method and apparatus of the present application;

    FIG. 12 is a schematic structural diagram of a working environment of an electronic device where the network node encryption apparatus of the present application is located.


    DESCRIPTION OF EMBODIMENTS



    [0013] Referring to the accompanying drawings, the same component symbols represent for same components, and the principle of the present application is described for exemplary purposes by implementation in an appropriate computing environment. The following description is based on illustrated specific embodiments of the present application and should not be regarded as a limitation to other specific embodiments of the present application not described in detail herein.

    [0014] In the following description, the specific embodiments of the present application will be described by reference to steps and symbols of operations executed by one or more computers, unless otherwise noted. Therefore, the steps and the operations may be known, wherein it is mentioned several times that the operations are executed by the computer including a computer processing unit representing for an electronic signal of data in a structural form. By virtue of the operation, the data is converted or is maintained on a position in a memory system of the computer, the position may be reconfigured, or furthermore, the operation of the computer may be changed in a way well known by a person skilled in the art. A data structure maintained by the data is located on an entity position of the memory and has a specific characteristic defined by a data format. However, the principle of the present application is described by the above texts, but does not represent for a limitation, and the person skilled in the art may know about the following various steps and operations which may also be executed in hardware.

    [0015] In some examples, a process of encrypting a CDN node includes:

    [0016] Firstly, provide, by a network content provider, basic data, such as a network node name, network domain name information and a certificate secure request (CSR), of a network node for a trusted third party so as to apply to the trusted third party for a certificate.

    [0017] Secondly, verify the network domain name information of the network node so as to affirm an ownership of the network content provider to the network node after the trusted third party audits the basic data of the network content provider.

    [0018] Thirdly, send a certificate downloading address to the network content provider so as to be convenient for the network content provider to download an encryption certificate after the trusted third party finishes the verification of the network domain name information of the network node.

    [0019] Fourthly, upload, by the network content provider, the encryption certificate to a console of the CDN node, deploy the certificate on the console of the CDN node by using the encryption certificate, and verify, by the console, the matchability of a public key and a private key in the encryption certificate so as to finish the deployment of the encryption certificate.

    [0020] In the above encryption operation process, the network content provider needs to download and upload the encryption certificate, the risk that the encryption certificate is leaked happens very easily in a process that a user stores and uploads the encryption certificate, and thus, the security of the CDN node is affected.

    [0021] A network node encryption method and apparatus of the present application may be used for various electronic devices, such as a CDN node server, for network node management. The user may automatically finish the application for the encryption certificate to the trusted third party by using the electronic devices and performs an encryption operation process on the CDN node by using the encryption certificate, so that the leakage of the encryption certificate is avoided, and the security of the network node is improved.

    [0022] Referring to FIG. 1, FIG. 1 is a flow diagram of an embodiment of a network node encryption method of the present application. The network node encryption method in the embodiment may be implemented by using the electronic devices and includes:

    Step S101: Receive a node encryption request, and acquire node data information of a network node according to the node encryption request, the node data information including a preset link.

    Step S102: Apply to a trusted third party for an encryption certificate by using the node data information.

    Step S103: Receive a certificate verification request from the trusted third party, the certificate verification request including a verification file to be used to verify authority of the preset link, and the certificate verification request being generated by the trusted third party according to the application for the encryption certificate.

    Step S104: Correlate the preset link of the network node to the verification file corresponding to the certificate verification request in response to the certificate verification request so as to return a correlation result to the trusted third party.

    Step S105: Receive the encryption certificate, and deploy the encryption certificate on the network node, the encryption certificate being generated by the trusted third party according to the correlation result.



    [0023] A detailed process of each step of the network node encryption method in the embodiment is described in detail below.

    [0024] In step S101, the network node encryption apparatus receives the node encryption request of a client terminal, and the node encryption request is a request that the user of the client terminal applies to a network node corresponding to the trusted third party for the encryption certificate so as to encrypt the network node.

    [0025] Then, the network node encryption apparatus acquires the node data information of the network node from a preset database according to the node encryption request. The preset database described herein is configured to prestore the node data information of the network node; the node data information includes, but is not limited to, information such as a node name, network domain name information, a preset link and a certificate secure request of the network node, wherein the preset link of the network node refers to a link correlated to a domain name of a terminal network node in the network node encryption apparatus. The preset link may be a network address or a network memory space and the like. The trusted third party may verify the network node according to the node data information. Then, go to step S102.

    [0026] In step S102, the network node encryption apparatus applies to the trusted third party for the encryption certificate according to the node data information acquired in step S101, the node data information including the preset link.

    [0027] The application for the encryption certificate herein refers to a request that the network node encryption apparatus applies to the trusted third party for the encryption certificate. The trusted third party herein is an entity, trusted by both communication parties, of a PKI (Public Key Infrastructure) system. Then, go to step S103.

    [0028] In step S103, the trusted third party receives the application for the encryption certificate, sent by the network node encryption apparatus, and generates the certificate verification request according to the application for the encryption certificate. The certificate verification request refers to a request that the trusted third party requests verifying the authority to apply for an encryption certificate of the network node encryption apparatus. The certificate verification request should include a verification file, and the trusted third party downloads the verification file via a correlated link to determine a control right of the network node encryption apparatus to the correlated link. The trusted third party sends the certificate verification request to the network node encryption apparatus. Then, go to step S104.

    [0029] In step S104, the network node encryption apparatus receives the certificate verification request, correlates the preset link of the network node to the verification file corresponding to the certificate verification request according to the certificate verification request, and then, returns the correlation result to the trusted third party, so that the trusted third party verifies the authority of the network node of the network node encryption apparatus. The network node encryption apparatus correlates the preset link of the network node to the verification file corresponding to the certificate verification request, namely the network node encryption apparatus uploads the verification file to the network address or the network memory space corresponding to the preset link of the network node. The correlation result shows that the verification file has been uploaded to the network address or the network memory space corresponding to the preset link of the network node. Then, go to step S105.

    [0030] In step S105, the trusted third party receives the correlation result of the network node encryption apparatus and affirms the correlation between the preset link of the network node and the verification file according to the correlation result. Namely, the trusted third party accesses the network address or the network memory space corresponding to the preset link of the network node in the application for the encryption certificate, received in step S103, to affirm whether the verification file may be downloaded from the network address or the network memory space or not after receiving the correlation result returned by the network node encryption apparatus and used for showing that the verification file has been uploaded to the network address or the network memory space corresponding to the preset link of the network node. The corresponding encryption certificate is generated and sent to the network node encryption apparatus if it is determined that the correlation exists between the preset link of the network node and the verification file, namely the trusted third party may access and download the verification file from the network address or the network memory space.

    [0031] The network node encryption apparatus receives the encryption certificate, and then, deploys the encryption certificate on the network node to finish the encryption operation of the network node.

    [0032] Therefore, the encryption operation process of the network node of the network node encryption method in the embodiment is finished.

    [0033] According to the network node encryption method in the embodiment, the encryption certificate is automatically applied for from the trusted third party by using the node data information of the network node, and the network node is encrypted by using the encryption certificate, so that the leakage of the encryption certificate is avoided, and the security of the network node is improved.

    [0034] Referring to FIG. 2, FIG. 2 is a flow diagram of the embodiment of the network node encryption method of the present application. The network node encryption method in the embodiment may be implemented by using the electronic devices and includes:

    Step S201: Receive registration information of the network node, and carry out security verification on the registration information of the network node.

    Step S202: Generate and store corresponding node data information according to the registration information, subjected to security verification, of the network node.

    Step S203: Receive a node encryption request, and acquire the node data information of the network node according to the node encryption request, the node data information including a preset link.

    Step S204: transmit an application to a trusted third party for an encryption certificate by using the node data information.

    Step S205: Receive a certificate verification request from the trusted third party, the certificate verification request including a verification file to be used to verify authority of the preset link, and the certificate verification request being generated by the trusted third party according to the application for the encryption certificate.

    Step S206: Correlate the preset link of the network node to the verification file corresponding to the certificate verification request according to the certificate verification request so as to return a correlation result to the trusted third party, the certificate verification request being generated by the trusted third party according to the application for the encryption certificate.

    Step S207: Receive the encryption certificate, and deploy the encryption certificate on the network node, the encryption certificate being generated by the trusted third party according to the correlation result.

    Step S208: Generate an encryption certificate deployment feedback after finishing the deployment of the encryption certificate, and send the encryption certificate deployment feedback to a corresponding client terminal.



    [0035] A detailed process of each step of the network node encryption apparatus in the embodiment is described in detail below.

    [0036] The network node in the embodiment is, for example, a CDN node, a content provider may generally make a content on a terminal network node, however, the terminal network node is not beneficial to the rapid spread of the content due to flow and territorial limitations. Therefore, the content provider may generally register the CDN node, the CDN node is correlated to the terminal network node, and thus, the content may be rapidly spread by the CDN node hardly having flow and territorial limitations.

    [0037] In step S201, the network node encryption apparatus receives the registration information of the network node of the corresponding client terminal, the network node herein is, for example, the CDN node, and thus, the correlation between the terminal network node and the CDN node is realized; of course, the node data information of the terminal network node may also be directly submitted as the registration information of the network node.

    [0038] Then, the network node encryption apparatus carries out security verification on the registration information of the network node so as to guarantee the truth of the registration information of the network node. Then go to step S202.

    [0039] In step S202, the network node encryption apparatus generates and stores the node data information corresponding to the network node according to the registration information, subjected to security verification in step S201, of the network node. The node data information includes, but is not limited to, information such as a node name, network domain name information, a preset link and a certificate secure request of the network node, wherein the preset link of the network node refers to a link correlated to the domain name of the terminal network node in the network node encryption apparatus. Therefore, the network node encryption apparatus may store the node data information of a plurality of network nodes to form a preset database. Then, go to step S203.

    [0040] In step S203, the network node encryption apparatus receives the node encryption request of the client terminal, and the node encryption request is a request that the user of the client terminal applies to the network node corresponding to the trusted third party for the encryption certificate so as to encrypt the network node.

    [0041] Then, the network node encryption apparatus acquires the node data information of the network node from the preset database according to the node encryption request. Specifically, referring to FIG. 3, FIG. 3 is a flow diagram of step S203 in the embodiment of the network node encryption method of the present application. Step S203 includes:
    Step S2031: Receive, by the network node encryption apparatus, the node encryption request, and detect whether a preset link of the network node is correlated to the domain name of the terminal network node or not according to the node encryption request, namely judge whether the node data information in the preset database is valid or not, for example, judge whether a correlated content on the domain name of the terminal network node may be accessed or not by the preset link of the network node, wherein the preset link may be a network address or a network memory space and the like.

    [0042] Go to step S2032 if the preset link of the network node is correlated to the domain name of the terminal network node; and go to step S2033 if the preset link of the network node is not correlated to the domain name of the terminal network node.

    [0043] Step S2032: Correlate the preset link of the network node to the domain name of the terminal network node, determine, by the network node encryption apparatus, that the node data information in the preset database is valid, and acquire other node data information of the network node, wherein the trusted third party may verify the network node according to the node data information. Then, go to step S204.

    [0044] Step S2033: Determine, by the network node encryption apparatus, that the node data information in the preset database is invalid if the preset link of the network node is not correlated to the domain name of the terminal network node, send a domain name correlation prompt to the corresponding client terminal to prompt the user to correlate the domain name of the terminal network node to the preset link of the network node so as to facilitate the automatic application operation of the encryption certificate.

    [0045] In step S204, the network node encryption apparatus applies to the trusted third party for the encryption certificate according to the node data information acquired in step S203, the node data information including the preset link. The application for the encryption certificate herein refers to a request that the network node encryption apparatus applies to the trusted third party for the encryption certificate. The trusted third party herein is an entity, trusted by both communication parties, of a PKI (Public Key Infrastructure) system. Specifically, referring to FIG. 4, FIG. 4 is a flow diagram of step S204 in the embodiment of the network node encryption method of the present application. Step S204 includes:
    Step S2041: Carry out, by the network node encryption apparatus, user registration on the trusted third party by using the node data information acquired in step S203 so as to acquire registered user information.

    [0046] The trusted third party provides service for applying for the encryption certificate for a registered user, and therefore, the network node encryption apparatus carries out user registration on the trusted third party by using the node data information in the step; and the node data information is subjected to security verification and validity verification, and therefore, the success rate of user registration on the trusted third party is very high.

    [0047] Step S2042: Provide, by the network node encryption apparatus, a certificate secure request of the network node for the trusted third party according to the registered user information acquired in step S2041 and the node data information so as to transmit an application to the trusted third party for the encryption certificate. Then, go to step S205.

    [0048] In step S205, the trusted third party receives the application for the encryption certificate, sent by the network node encryption apparatus, and generates a certificate verification request according to the application for the encryption certificate. The certificate verification request refers to a request that the trusted third party requests verifying the authority to apply for an encryption certificate of the network node encryption apparatus. The certificate verification request should include a verification file, and the trusted third party downloads the verification file via a correlated link to determine a control right of the network node encryption apparatus to the correlated link. The trusted third party sends the certificate verification request to the network node encryption apparatus. Then, go to step S206.

    [0049] In step S206, the network node encryption apparatus receives the certificate verification request and correlates the preset link of the network node to the verification file corresponding to the certificate verification request according to the certificate verification request. Specifically, referring to FIG. 5, FIG. 5 is a flow diagram of step S206 in the embodiment of the network node encryption method of the present application. Step S206 includes:

    Step S2061: Receive, by the network node encryption apparatus, the verification file corresponding to the certificate verification request from the trusted third party.

    Step S2062: Upload, by the network node encryption apparatus, the verification file to the memory space corresponding to the preset link so as to realize the correlation between the preset link of the network node and the verification file.



    [0050] Then, the correlation result is returned to the trusted third party, so that the trusted third party verifies the authority of the network node of the network node encryption apparatus. The correlation result shows that the verification file has been uploaded to the network address or the network memory space corresponding to the preset link of the network node. Then, go to step S207.

    [0051] In step S207, the trusted third party receives the correlation result of the network node encryption apparatus and affirms the correlation between the preset link of the network node and the verification file according to the correlation result. Namely, the trusted third party accesses the network address or the network memory space corresponding to the preset link of the network node, received in step S205, to affirm whether the verification file may be downloaded from the network address or the network memory space or not after receiving the correlation result returned by the network node encryption apparatus and used for showing that the verification file has been uploaded to the network address or the network memory space corresponding to the preset link of the network node. The corresponding encryption certificate is generated and sent to the network node encryption apparatus if it is determined that the correlation exists between the preset link of the network node and the verification file, namely the trusted third party may access and download the verification file from the network address or the network memory space.

    [0052] The network node encryption apparatus receives the encryption certificate, and then, deploys the encryption certificate on the network node. Then, go to step S208.

    [0053] In step S208, the network node encryption apparatus generates the encryption certificate deployment feedback after finishing the deployment of the encryption certificate, and sends the encryption certificate deployment feedback to the corresponding client terminal so as to remind a user of finishing the encryption operation of the network node.

    [0054] Therefore, the encryption operation process of the network node of the network node encryption method in the embodiment is finished.

    [0055] The node data information is subjected to security verification and validity verification by using the network node encryption method in the embodiment on the basis of the above embodiments, so that the probability of verification failure of the trusted third party is reduced, and the success rate of encryption operation of the network node is further increased.

    [0056] The present application further provides a network node encryption apparatus, referring to FIG. 6 which is a schematic structural diagram of an embodiment of a network node encryption apparatus of the present application, the network node encryption apparatus in the embodiment may be implemented by using the embodiment of the network node encryption method, and the network node encryption apparatus 60 in the embodiment includes a node information acquisition module 61, a certificate application module 62, a request receiving module 63, a correlation module 64 and a certificate deployment module 65.

    [0057] The node information acquisition module 61 is configured to receive a node encryption request and acquire node data information of a network node according to the node encryption request, the node data information including a preset link; the certificate application module 62 is configured to apply to a trusted third party for an encryption certificate by using the node data information; the request receiving module 63 is configured to receive a certificate verification request of the trusted third party, the certificate verification request including a verification file for verifying authority of the preset link, and the certificate verification request being generated by the trusted third party according to the application for the encryption certificate; the correlation module 64 is configured to correlate the preset link of the network node to the verification file corresponding to the certificate verification request according to the certificate verification request so as to return a correlation result to the trusted third party; and the certificate deployment module 65 is configured to receive the encryption certificate and deploy the encryption certificate on the network node, the encryption certificate being generated by the trusted third party according to the correlation result.

    [0058] When the network node encryption apparatus 60 in the embodiment is used, firstly, the node information acquisition module 61 receives the node encryption request of the client terminal, and the node encryption request is a request that the user of the client terminal applies to the network node corresponding to the trusted third party for the encryption certificate so as to encrypt the network node.

    [0059] Then, the node information acquisition module 61 acquires the node data information of the network node from a preset database according to the node encryption request. The preset database described herein is configured to prestore the node information of the network node; the node data information includes, but is not limited to, information such as a node name, network domain name information, a preset link and a certificate secure request of the network node, wherein the preset link of the network node refers to a link correlated to a domain name of a terminal network node in the network node encryption apparatus. The preset link may be a network address or a network memory space and the like. The trusted third party verifies the network node according to the node data information.

    [0060] Then, the certificate application module 62 applies to the trusted third party for the encryption certificate according to the node data information acquired by the node information acquisition module 61, the node data information including the preset link. The application for the encryption certificate herein refers to a request that the network node encryption apparatus applies to the trusted third party for the encryption certificate. The trusted third party herein is an entity, trusted by both communication parties, of a PKI (Public Key Infrastructure) system.

    [0061] Next, the trusted third party receives the application for the encryption certificate, sent by the certificate application module 62, and generates the certificate verification request according to the application for the encryption certificate. The certificate verification request refers to a request that the trusted third party requests verifying the authority to apply for an encryption certificate of the network node encryption apparatus. The certificate verification request should include a verification file, and the trusted third party downloads the verification file via a correlated link to determine a control right of the network node encryption apparatus to the correlated link.

    [0062] The trusted third party sends the certificate verification request to the request receiving module 63; the request receiving module 63 receives the certificate verification request, then, the correlation module 64 correlates the preset link of the network node to the verification file corresponding to the certificate verification request according to the certificate verification request, and then, returns a correlation result to the trusted third party, so that the trusted third party verifies the authority of the network node of the network node encryption apparatus. The correlation module 64 correlates the preset link of the network node to the verification file corresponding to the certificate verification request, namely the correlation module 64 uploads the verification file to a network address or a network memory space corresponding to the preset link of the network node. The correlation result shows that the verification file has been uploaded to the network address or the network memory space corresponding to the preset link of the network node.

    [0063] Then, the trusted third party receives the correlation result of the correlation module 64 and affirms the correlation between the preset link of the network node and the verification file according to the correlation result. Namely, the trusted third party accesses the network address or the network memory space corresponding to the preset link of the network node in the received application for the encryption certificate to affirm whether the verification file may be downloaded from the network address or the network memory space or not after receiving the correlation result returned by the correlation module 64 and used for showing that the verification file has been uploaded to the network address or the network memory space corresponding to the preset link of the network node. The corresponding encryption certificate is generated and sent to the certificate deployment module 65 if it is determined that the correlation exists between the preset link of the network node and the verification file, namely the trusted third party may access and download the verification file from the network address or the network memory space.

    [0064] Finally, the certificate deployment module 65 receives the encryption certificate, and then, deploys the encryption certificate on the network node to finish the encryption operation of the network node.

    [0065] Therefore, the encryption operation process of the network node of the network node encryption apparatus 60 in the embodiment is finished.

    [0066] According to the network node encryption apparatus in the embodiment, the encryption certificate is automatically applied from the trusted third party by using the node data information of the network node, and the network node is encrypted by using the encryption certificate, so that the leakage of the encryption certificate is avoided, and the security of the network node is improved.

    [0067] Referring to FIG. 7 which is a schematic structural diagram of the embodiment of the network node encryption apparatus of the present application, the network node encryption apparatus in the embodiment may be implemented by using the embodiment of the network node encryption method. The network node encryption apparatus 70 in the embodiment includes a security verification module 71, a node information memory module 72, a node information acquisition module 73, a certificate application module 74, a request receiving module 75, a correlation module 76, a certificate deployment module 77 and a feedback module 78.

    [0068] The security verification module 71 is configured to receive registration information of the network node and carry out security verification on the registration information of the network node. The node information memory module 72 is configured to generate and store corresponding node data information according to the registration information, subjected to security verification, of the network node. The node information acquisition module 73 is configured to receive a node encryption request and acquire the node data information of the network node according to the node encryption request. The certificate application module 74 is configured to apply to a trusted third party for an encryption certificate by using the node data information. The request receiving module 75 is configured to receive a certificate verification request of the trusted third party, the certificate verification request including a verification file for verifying authority of the preset link, and the certificate verification request being generated by the trusted third party according to the application for the encryption certificate. The correlation module 76 is configured to correlate the preset link of the network node to the verification file corresponding to the certificate verification request according to the certificate verification request so as to return a correlation result to the trusted third party. The certificate deployment module 77 is configured to receive the encryption certificate and deploy the encryption certificate on the network node, the encryption certificate being generated by the trusted third party according to the correlation result. The feedback module 78 is configured to generate an encryption certificate deployment feedback and send the encryption certificate deployment feedback to a corresponding client terminal.

    [0069] Referring to FIG. 8, FIG. 8 is a schematic structural diagram of a node information acquisition module in the embodiment of the network node encryption apparatus of the present application. The node information acquisition module 73 includes a domain name correlation detection unit 81, a node information acquisition unit 82 and a domain name correlation prompt unit 83.

    [0070] The domain name correlation detection unit 81 is configured to receive the node encryption request and detect whether the preset link of the network node is correlated to the domain name of the terminal network node or not according to the node encryption request. The node information acquisition unit 82 is configured to acquire other node data information of the network node if the preset link of the network node is correlated to the domain name of the terminal network node. The domain name correlation prompt unit 83 is configured to send a domain name correlation prompt if the preset link of the network node is correlated to the domain name of the terminal network node.

    [0071] Referring to FIG. 9, FIG. 9 is a schematic structural diagram of the certificate application module in the embodiment of the network node encryption apparatus of the present application. The certificate application module 74 includes a registration unit 91 and a certificate application unit 92.

    [0072] The registration unit 91 is configured to carry out user registration on the trusted third party by using the node data information so as to acquire registered user information. The certificate application unit 92 is configured to provide a certificate secure request of the network node for the trusted third party according to the registered user information and the node data information so as to apply to the trusted third party for the encryption certificate.

    [0073] Referring to FIG. 10, FIG. 10 is a schematic structural diagram of the correlation module in the embodiment of the network node encryption apparatus of the present application. The correlation module 76 includes a verification file receiving unit 101 and a correlation unit 102.

    [0074] The verification file receiving unit 101 is configured to receive the verification file corresponding to the certificate verification request. The correlation unit 102 is configured to upload the verification file to the memory space corresponding to the preset link so as to realize the correlation between the preset link of the network node and the verification file.

    [0075] When the network node encryption apparatus 70 in the embodiment is used, the security verification module 71 receives the registration information of the network node at the corresponding client terminal. The network node herein is, for example, a CDN node, and thus, the correlation between the terminal network node and the CDN node is realized, and of course, the node data information of the terminal network node may also be directly submitted as the registration information of the network node.

    [0076] Then, the security verification module 71 carries out security verification on the registration information of the network node so as to guarantee the truth of the registration information of the network node.

    [0077] Then, the node information memory module 72 generates and stores the node data information corresponding to the network node according to the registration information, subjected to security verification by the security verification module 71, of the network node. The node data information includes, but is not limited to, information such as a node name, network domain name information, a preset link and a certificate secure request of the network node, wherein the preset link of the network node refers to a link correlated to the domain name of the terminal network node in the network node encryption apparatus. Therefore, the network node encryption apparatus may store the node data information of a plurality of network nodes to form a preset database.

    [0078] Next, the node information acquisition module 73 receives the node encryption request of a client terminal, and the node encryption request is a request that the user of the client terminal applies to the network node corresponding to the trusted third party for the encryption certificate so as to encrypt the network node.

    [0079] Then, the node information acquisition module 73 acquires the node data information of the network node from the preset database according to the node encryption request. Specifically:

    [0080] The domain name correlation detection unit 81 of the node information acquisition module 73 receives the node encryption request and detects whether the preset link of the network node is correlated to the domain name of the terminal network node or not according to the node encryption request, namely judge whether the node data information in the preset database is valid or not. The preset link may be a network address or a network memory space and the like.

    [0081] If the preset link of the network node is correlated to the domain name of the terminal network node, the domain name correlation detection unit 81 determines that the node data information in the preset database is valid, the node information acquisition unit 82 acquires other node data information of the network node, and the trusted third party may verify the network node according to the node data information.

    [0082] If the preset link of the network node is not correlated to the domain name of the terminal network node, the domain name correlation detection unit 81 determines that the node data information in the preset database is invalid, the domain name correlation prompt unit 83 sends a domain name correlation prompt to the corresponding client terminal to prompt the user to correlate the domain name of the terminal network node to the preset link of the network node so as to facilitate the automatic application operation of the encryption certificate.

    [0083] Then, the certificate application module 74 applies to the trusted third party for the encryption certificate according to the node data information acquired by the node information acquisition module 73. The application for the encryption certificate herein refers to a request that the network node encryption apparatus applies to the trusted third party for the encryption certificate. The trusted third party herein is an entity, trusted by both communication parties, of a PKI (Public Key Infrastructure) system. Specifically:

    [0084] The registration unit 91 of the certificate application module 74 carries out user registration on the trusted third party by using the node data information acquired by the node data information acquisition module so as to acquire registered user information.

    [0085] The trusted third party only provides service for applying for the encryption certificate for a registered user, and therefore, the certificate application module carries out user registration on the trusted third party by using the node data information in the step; and the node data information is subjected to security verification and validity verification, and therefore, the success rate of user registration is very high.

    [0086] The certificate application unit 92 of the certificate application module 74 provides the certificate secure request of the network node for the trusted third party according to the registered user information acquired by the registration unit and the node data information so as to apply to the trusted third party for the encryption certificate, the node data information including the preset link.

    [0087] Then, the trusted third party receives the application for the encryption certificate, sent by the certificate application module 74, and generates the certificate verification request according to the application for the encryption certificate. The certificate verification request refers to a request that the trusted third party requests verifying the authority to apply for an encryption certificate of the network node encryption apparatus. The certificate verification request should include a verification file, and the trusted third party downloads the verification file via a correlated link to determine a control right of the network node encryption apparatus to the correlated link.

    [0088] The trusted third party sends the certificate verification request to the request receiving module 75; the request receiving module 75 receives the certificate verification request, and then, the correlation module 76 correlates the preset link of the network node to the verification file corresponding to the certificate verification request according to the certificate verification request. Specifically:
    The verification file receiving unit 101 of the correlation module 76 receives the verification file corresponding to the certificate verification request from the trusted third party.

    [0089] The correlation unit 102 of the correlation module 76 uploads the verification file to the memory space corresponding to the preset link so as to realize the correlation between the preset link of the network node and the verification file.

    [0090] Then, the correlation module 76 returns the correlation result to the trusted third party, so that the trusted third party verifies the authority of the network node of the network node encryption apparatus. The correlation result shows that the verification file has been uploaded to the network address or the network memory space corresponding to the preset link of the network node.

    [0091] Next, the trusted third party receives the correlation result of the correlation module 76 and affirms the correlation between the preset link of the network node and the verification file according to the correlation result. Namely, the trusted third party accesses the network address or the network memory space corresponding to the received preset link of the network node to affirm whether the verification file may be downloaded from the network address or the network memory space or not after receiving the correlation result returned by the network node encryption apparatus and used for showing that the verification file has been uploaded to the network address or the network memory space corresponding to the preset link of the network node. The corresponding encryption certificate is generated and sent to the certificate deployment module 77 if it is determined that the correlation exists between the preset link of the network node and the verification file, namely the trusted third party may access and download the verification file from the network address or the network memory space.

    [0092] The certificate deployment module 77 receives the encryption certificate, and then, deploys the encryption certificate on the network node.

    [0093] Finally, the feedback module 78 generates an encryption certificate deployment feedback after finishing the deployment of the encryption certificate, and sends the encryption certificate deployment feedback to the corresponding client terminal so as to remind a user of finishing the encryption operation of the network node.

    [0094] Therefore, the encryption operation process of the network node of the network node encryption apparatus 70 in the embodiment is finished.

    [0095] The node data information is subjected to security verification and validity verification by using the network node encryption apparatus in the embodiment on the basis of the above embodiments, so that the probability of verification failure of the trusted third party is reduced, and the success rate of encryption operation of the network node is further increased.

    [0096] The specific working principles of the network node encryption method and apparatus of the present application are described below in conjunction with a specific embodiment. Referring to FIG. 11 which is an implementation sequence diagram of the specific embodiment of the network node encryption method and apparatus of the present application. A user applies for a CDN node on a CDN node server via a client terminal and applies to the trusted third party for CDN node encryption via the CDN node server. An encryption process of the CDN node includes:

    Step S1101: Register, by the user, the CDN node on the CDN node server via the client terminal, namely send, by the client terminal, the registration information of the CDN node to the CDN node server.

    Step S1102: Carry out security verification, by the CDN node server, on the registration information of the CDN node, and then, store the registration information subjected to security verification as node data information of the CDN node. Therefore, the CDN node server may form a preset database including the node data information of a plurality of network nodes.

    Step S1103: Send, by the user, a node encryption request to the CDN node server via the client terminal so as to encrypt a network content corresponding to the CDN node.

    Step S1104: Detect, by the CDN node server, the validity of the node data information of the CDN node corresponding to the node encryption request.

    Step S1105: Apply, by the CDN node server, to the trusted third party for an encryption certificate by using the node data information of the CDN node if the node data information of the CDN node is valid.

    Step S1106: Send, by the trusted third party, a certificate verification request to the CDN node server according to the application for encryption certificate so as to verify whether the identity of an applicant and a domain name are valid or not. The certificate verification request includes a verification file.

    Step S1107: Correlate, by the CDN node server, the verification file corresponding to the certificate verification request to the preset link of the CDN node, namely upload, by the CDN node server, the verification file to a network address or a network memory space corresponding to the preset link of the CDN node.

    Step S1108: Return, by the CDN node server, a correlation result to the trusted third party. The correlation result shows that the verification file has been uploaded to the network address or the network memory space corresponding to the preset link of the CDN node.

    Step S1109: Download, by the trusted third party, the verification file via the preset link of the CDN node after receiving the correlation result so as to determine a control right of the CDN node server to the CDN node, namely determine that the identify of the applicant and the domain name are valid, and then, send, by the trusted third party, the corresponding encryption certificate to the CDN node server.

    Step S1110: Encrypt, by the CDN node server, the CDN node by using the encryption certificate.

    Step S1111: Send, by the CDN node server, a corresponding encryption certificate deployment feedback to the client terminal after finishing the encryption operation of the CDN node so as to remind the user of finishing the encryption operation of the CDN node.



    [0097] Therefore, the encryption process of the network node of the network node encryption method and apparatus in the specific embodiment is finished.

    [0098] According to the network node encryption method and apparatus of the present application, the encryption certificate may be automatically applied from the trusted third party by using the node data information of the network node, and the network node is encrypted by using the encryption certificate, so that the leakage of the encryption certificate is avoided, and the security of the network node is improved.

    [0099] Terms such as "assembly", "module", "system", "interface" and "process" used in the present application are generally intended to refer to computer-correlated entities: hardware, a combination of hardware and software, software or implementing software. For example, the assembly may include, but is not limited to, a process running on a processor, the processor, an object, an executable application, an executing thread, a program and/or a computer. As shown in the figure, both the application running on a controller and the controller may be assemblies. One or more assemblies may exist in the executing process and/or thread and may be located on one computer and/or distributed between two computers or among more computers.

    [0100] A brief and general description for a working environment of an electronic device where the network node encryption apparatus for realizing the present application is located is provided in DIG. 12 and the subsequent discussion. The working environment of FIG. 12 is merely an example of an appropriate working environment, and is not intended to suggest any limitation on the purpose or function scope of the working environment. Examples of the electronic device 1212 include, but are not limited to, a wearable device, a head-mounted device, a medical and health platform, a personal computer, a server computer, a handheld or laptop device, a mobile device (such as a mobile phone, a personal digital assistant (PDA) and a media player), a multi-processor system, a consumption-type electronic device, a small-sized computer, a large-sized computer, a distributed computing environment including any one of the systems or devices and the like.

    [0101] Although no demands are required, the embodiments are described under a general background that "computer-readable instructions" are executed by one or more electronic devices. The computer-readable instructions may be distributed by computer-readable mediums (discussed below). The computer-readable instructions may be realized as program modules such as a function of executing a specific task or realizing a specific abstract data type, an object, an application program interface (API) and a data structure. Typically, the functions of the computer-readable instructions may be randomly combined or distributed in various environments.

    [0102] FIG. 12 shows an example of the electronic device 1212 including one or more embodiments of the network node encryption apparatus of the present application. In one configuration, the electronic device 1212 includes at least one processing unit 1216 and a memory 1218. The memory 1218 may be a volatile memory (such as RAM), a nonvolatile memory (such as ROM and a flash memory) or a certain combination of the volatile memory and the nonvolatile memory according to the exact configuration and type of the electronic device. The configuration is shown by a dashed line in FIG. 12.

    [0103] In other embodiments, the electronic device 1212 may include additional features and/or functions. For example, the device 1212 may further include an additional memory apparatus (such as a removable memory apparatus and/or a non-removable memory apparatus) which includes, but is not limited to, a magnetic memory apparatus, an optical memory apparatus and the like. The additional memory apparatus is shown as a memory apparatus 1220 in FIG. 12. In one embodiment, the computer-readable instructions for realizing one or more embodiments provided herein may be in the memory apparatus 1220. The memory apparatus 1220 may further store other computer-readable instructions for realizing an operation system, an application program and the like. The computer-readable instructions may be stored into the memory 1218 and executed by, for example, the processing unit 1216.

    [0104] The term "computer-readable mediums" used herein include computer memory mediums. The computer memory mediums include a volatile medium, a nonvolatile medium, a removable medium and a non-removable medium achieved by using any one method or technology of storing information such as the computer-readable instruction or other data. The memory 1218 and the memory apparatus 1220 are examples of the computer memory mediums. The computer memory mediums include, but are not limited to, an RAM, an ROM, an EEPROM, a flash memory or other memory technologies, a CD-ROM, a digital video disk (DVD) or other optical memory apparatuses, a cassette magnetic tape, a magnetic tape, a magnetic disk memory apparatus or other magnetic memory devices, or any other mediums which may be configured to store expected information and accessed by the electronic device 1212. Any one of such computer memory mediums may be a part of the electronic device 1212.

    [0105] The electronic device 1212 may further include a communication connection 1226 allowing the electronic device 1212 to be in communication with other devices. The communication connection 1226 may include, but is not limited to, a modem, a network interface card (NIC), an integrated network interface, a radio-frequency transmitter/receiver, an infrared port, a USB connection or other interfaces configured to connect the electronic device 1212 to other electronic devices. The communication connection 1226 may include a wired connection or a wireless connection. The communication connection 1226 may transmit and/or receive communication mediums.

    [0106] The term "computer-readable mediums" may include the communication mediums. The communication mediums typically include the computer-readable instructions or other data in a "modulated data signal" such as a carrier wave or other transmission mechanisms and include any information transfer mediums. The term "modulated data signal" may include such a signal: one or more of signal features are set or changed in a way of coding information into the signal.

    [0107] The electronic device 1212 may include an input device 1224 such as a keyboard, a mouse, a pen, a voice input device, a touch input device, an infrared camera, a video input device and/or any other input devices. The device 1212 may further include an output device 1222 such as one or more displays, a loudspeaker, a printer and/or any other output devices. The input device 1224 and the output device 1222 may be connected to the electronic device 1212 by the wired connection, the wireless connection or any combinations of the wired connection and the wireless connection. In one embodiment, an input device or an output device from the other electronic device may be used as the input device 1224 or the output device 1222 of the electronic device 1212.

    [0108] Assemblies of the electronic device 1212 may be connected by various interconnections (such as a bus). Such interconnections may include a peripheral assembly interconnection (PCI) (such as a quick PCI), a universal serial bus (USB), a fire wire (IEEE 1394), an optical bus structure and the like. In another embodiment, the assemblies of the electronic device 1212 may be interconnected by a network. For example, the memory 1218 may be composed of a plurality of physical memory units located on different physical positions and interconnected by the network.

    [0109] A person skilled in the art will realize that the memory devices configured to store the computer-readable instructions may be distributed over the network. For example, an electronic device 1230 which may be accessed by virtue of a network 1228 may store the computer-readable instructions for realizing one or more embodiments of the present application. The electronic device 1212 may access the electronic device 1230 and download a part or all of the computer-readable instructions so that the computer-readable instructions are executed. Alternately, the electronic device 1212 may download a plurality of computer-readable instructions as required, or some instructions may be executed at the electronic device 1212, and some instructions may be executed at the electronic device 1230.

    [0110] Various operations of the embodiments are provided herein. In one embodiment, one or more operations may construct the computer-readable instructions stored on one or more computer-readable mediums, and the operations are executed by a computing device when the computer-readable instructions are executed by the electronic device. The sequence for describing some or all the operations should not be explained to hint that the sequences of the operations have to be correlated. A person skilled in the art will understand replaceable rank ordering beneficial to the specification. Moreover, it should be understood that not all operations have to exist in each embodiment provided herein.

    [0111] Moreover, although the present disclosure has been shown and described in one or more implementation ways, a person skilled in the part will have equivalent variations or modifications in the mind on the basis of reading and understanding the specification and the accompanying drawings. The present disclosure includes all the modification and variations and is merely limited by the scope of the appended claims. Particularly, for various functions executed by the assemblies (such as an element and a resource), the terms for describing such assemblies are intended to correspond to any assemblies (unless otherwise specified) executing appointed functions of the assemblies (such as the assemblies with equivalent functions) even if the structures are not equivalent with disclosed structures of the functions in an exemplary implementation way for executing the present disclosure herein. In addition, although the specific feature of the present disclosure has been disclosed relative to only one of a plurality of implementation ways, the feature may be combined with one or more other features of other implementation ways which may be expected and beneficial for a given or specific application. Moreover, the terms "include", "be provided with", "comprise" or variants thereof are intended to cover an inclusion in a way similar to the term "comprise" if being used in description of embodiments or claims.

    [0112] Each functional unit in the embodiment of the present application may be integrated in one processing module, or each unit physically exists alone, or two or more units are integrated in one module. The integrated module may be achieved in a hardware way or a software functional module way. The integrated module may also be stored in one computer-readable access medium if being achieved in the software functional module way and sold or used as an independent product. The memory medium mentioned above may be a read-only memory, a magnetic disk or an optical disk and the like. Each of the apparatuses or systems may execute a method in corresponding method embodiments.

    [0113] In conclusion, although the present application has been disclosed above through the embodiments, the embodiments are not intended to limit the present application. A person of ordinary skilled in the art may make various alterations and modifications without departing from the scope of the present application, and therefore, the protection scope of the present application is subject to the scope defined by claims.


    Claims

    1. A method for network node encryption, characterized by comprising:

    receiving a node encryption request, and acquiring node data information of a network node according to the node encryption request, the node data information including a preset link;

    transmitting an application to a trusted third party for an encryption certificate using the node data information;

    receiving a certificate verification request from the trusted third party, the certificate verification request including a verification file to be used to verify authority of the preset link, and the certificate verification request being generated by the trusted third party in response to the application for the encryption certificate;

    correlating the preset link of the network node to the verification file corresponding to the certificate verification request in response to the certificate verification request, so as to transmit a correlation result to the trusted third party; and

    receiving the encryption certificate, and deploying the encryption certificate on the network node, wherein the encryption certificate is generated by the trusted third party based on the correlation result.


     
    2. The method according to claim 1, further comprising:

    receiving registration information of the network node, and conducting a security verification based on the registration information of the network node; and

    generating and storing the node data information of the network node according to the registration information of the network node when the security verification has been conducted successfully.


     
    3. The method according to claim 2, wherein the receiving a node encryption request, and acquiring node data information of a network node according to the node encryption request comprises:

    receiving the node encryption request, and detecting whether the preset link of the network node is correlated to a domain name of a terminal network node based on the node encryption request; and

    acquiring other node data information of the network node when the preset link of the network node is correlated to the domain name of the terminal network node; or

    sending a prompt to prompt correlating the preset link of the network node to the domain name of the terminal network node when the preset link of the network node is not correlated to the domain name of the terminal network node.


     
    4. The method according to claim 1, wherein the transmitting an application to a trusted third party for an encryption certificate using the node data information comprises:

    performing a user registration in the trusted third party using the node data information, so as to obtain registered user information; and

    providing a certificate secure request of the network node to the trusted third party according to the registered user information and the node data information, the certificate secure request causing the application to the trusted third party for the encryption certificate.


     
    5. The method according to claim 1, wherein the correlating the preset link of the network node to the verification file corresponding to the certificate verification request comprises:

    receiving the verification file corresponding to the certificate verification request; and

    uploading the verification file to a memory space corresponding to the preset link, to correlate the preset link of the network node to the verification file.


     
    6. The method according to claim 1, wherein after the deploying the encryption certificate on the network node, the method further comprises:

    generating a feedback of the deploying the encryption certificate; and

    sending the feedback of the deploying the decryption certificate to a corresponding client terminal.


     
    7. An apparatus for network node encryption, characterized by comprising: a memory and a processor, the memory storing a computer-readable instruction, and when being executed by the processor, the computer-readable instruction performing the method of any of claims 1 to 6.
     
    8. A network node encryption method, characterized by comprising:

    receiving an application for an encryption certificate from a network node encryption apparatus, and generating a certificate verification request in response to the application for the encryption certificate, the application for the encryption certificate including node data information of a network node, the node data information including a preset link, and the certificate verification request including a verification file for verifying authority of the preset link;

    receiving a correlation result returned from the network node encryption apparatus in response to the certificate verification request;

    generating a corresponding encryption certificate in response to determining that a correlation relationship exists between the preset link of the network node and the verification file according to the correlation result; and

    sending the encryption certificate to the network node encryption apparatus.


     
    9. The network node encryption method according to claim 8, wherein the correlation result indicates that the verification file has been uploaded to a network address or a network memory space corresponding to the preset link of the network node.
     
    10. The network node encryption method according to claim 9, wherein the step of determining that a correlation relationship exists between the preset link of the network node and the verification file according to the correlation result comprises:

    accessing the network address or the network memory space corresponding to the preset link of the network node, and

    determining that the correlation relationship exists between the preset link of the network node and the verification file when the verification file is downloaded from the network address or the network memory space successfully .


     
    11. A network node encryption apparatus for a trusted third party, characterized by comprising:
    a memory and a processor, the memory storing a computer-readable instruction, and when being executed by the processor, the computer-readable instruction performing the method of any one of claims 8 to 10.
     
    12. A non-volatile computer-readable memory medium, characterized by the memory medium storing a computer-readable instruction, and the computer-readable instruction is executed by a processor to perform the method of any one of claims 1 to 6.
     
    13. A non-volatile computer-readable memory medium, characterized by the memory medium storing a computer-readable instruction, and the computer-readable instruction is executed by a processor to perform the method of any one of claims 8 to 10.
     


    Ansprüche

    1. Verfahren zur Netzknotenverschlüsselung, dadurch gekennzeichnet, dass es Folgendes umfasst:

    Empfangen einer Knotenverschlüsselungsanfrage und Erfassen von Knotendateninformationen eines Netzknotens gemäß der Knotenverschlüsselungsanfrage, wobei die Knotendateninformationen eine voreingestellte Verbindung beinhalten,

    Übertragen einer Anwendung an einen vertrauenswürdigen Dritten für ein Verschlüsselungszertifikat mit Hilfe der Knotendateninformationen,

    Empfangen einer Zertifikatverifizierungsanfrage von dem vertrauenswürdigen Dritten, wobei die Zertifikatverifizierungsanfrage eine Verifizierungsdatei beinhaltet, die zu verwenden ist, um die Berechtigung der voreingestellten Verbindung zu verifizieren, und wobei die Zertifikatverifizierungsanfrage von dem vertrauenswürdigen Dritten in Reaktion auf den Antrag auf das Verschlüsselungszertifikat erzeugt wird,

    Korrelieren der voreingestellten Verbindung des Netzknotens mit der Verifizierungsdatei, die der Zertifikatverifizierungsanfrage entspricht, in Reaktion auf die Zertifikatverifizierungsanfrage, so dass ein Korrelationsergebnis an den vertrauenswürdigen Dritten übertragen wird, und

    Empfangen des Verschlüsselungszertifikats und Einsetzen des Verschlüsselungszertifikats an dem Netzknoten, wobei das Verschlüsselungszertifikat von dem vertrauenswürdigen Dritten auf Basis des Korrelationsergebnisses erzeugt wird.


     
    2. Verfahren nach Anspruch 1, ferner Folgendes umfassend:

    Empfangen von Registrierungsinformationen des Netzknotens und Durchführen einer Sicherheitsverifizierung, basierend auf den Registrierungsinformationen des Netzknotens, und

    Erzeugen und Speichern der Knotendateninformationen des Netzknotens gemäß den Registrierungsinformationen des Netzknotens, wenn die Sicherheitsverifizierung erfolgreich durchgeführt wurde.


     
    3. Verfahren nach Anspruch 2, wobei das Empfangen einer Knotenverschlüsselungsanfrage und das Erfassen von Knotendateninformationen eines Netzknotens gemäß der Knotenverschlüsselungsanfrage Folgendes umfasst:

    Empfangen der Knotenverschlüsselungsanfrage und Erkennen, ob die voreingestellte Verbindung des Netzknotens mit einem Domänennamen eines Endgerät-Netzknotens korreliert ist, basierend auf der Knotenverschlüsselungsanfrage, und

    Erfassen weiterer Knotendateninformationen des Netzknotens, wenn die voreingestellte Verbindung des Netzknotens mit dem Domänennamen des Endgerät-Netzknotens korreliert ist, oder

    Senden einer Aufforderung, um das Korrelieren der voreingestellten Verbindung des Netzknotens mit dem Domänennamen des Endgerät-Netzknotens zu veranlassen, wenn die voreingestellte Verbindung des Netzknotens nicht mit dem Domänennamen des Endgerät-Netzknotens korreliert ist.


     
    4. Verfahren nach Anspruch 1, wobei das Übertragen eines Antrags auf ein Verschlüsselungszertifikat an einen vertrauenswürdigen Dritten mit Hilfe der Knotendateninformationen Folgendes umfasst:

    Ausführen einer Benutzerregistrierung bei dem vertrauenswürdigen Dritten mit Hilfe der Knotendateninformationen, so dass Informationen zum registrierten Benutzer bezogen werden, und

    Bereitstellen einer Zertifikatsicherheitsanfrage des Netzknotens an den vertrauenswürdigen Dritten gemäß den Informationen zum registrierten Benutzer und den Knotendateninformationen, wobei die Zertifikatsicherheitsanfrage den Antrag auf das Verschlüsselungszertifikat an den vertrauenswürdigen Dritten bewirkt.


     
    5. Verfahren nach Anspruch 1, wobei das Korrelieren der voreingestellten Verbindung des Netzknotens mit der Verifizierungsdatei, die der Zertifikatverifizierungsanfrage entspricht, Folgendes umfasst:

    Empfangen der Verifizierungsdatei, die der Zertifikatsverifizierungsanfrage entspricht, und

    Hochladen der Verifizierungsdatei in einen Speicherraum, entsprechend der voreingestellten Verbindung, um die voreingestellte Verbindung des Netzknotens mit der Verifizierungsdatei zu korrelieren.


     
    6. Verfahren nach Anspruch 1, wobei das Verfahren nach dem Einsetzen des Verschlüsselungszertifikats an dem Netzknoten ferner Folgendes umfasst:

    Erzeugen einer Rückmeldung des Einsetzens des Verschlüsselungszertifikats und

    Senden der Rückmeldung des Einsetzens des Verschlüsselungszertifikats an ein entsprechendes Client-Endgerät.


     
    7. Vorrichtung zur Netzknotenverschlüsselung, dadurch gekennzeichnet, dass sie Folgendes umfasst: einen Speicher und einen Prozessor, wobei der Speicher einen computerlesbaren Befehl speichert, wobei der computerlesbare Befehl bei Ausführung durch den Prozessor das Verfahren nach einem der Ansprüche 1 bis 6 ausführt.
     
    8. Netzknoten-Verschlüsselungsverfahren, dadurch gekennzeichnet, dass es Folgendes umfasst:

    Empfangen einer Anwendung für ein Verschlüsselungszertifikat von einer Netzknoten-Verschlüsselungsvorrichtung und Erzeugen einer Zertifikatsverifizierungsanfrage in Reaktion auf den Antrag auf das Verschlüsselungszertifikat, wobei der Antrag auf das Verschlüsselungszertifikat Knotendateninformationen eines Netzknotens beinhaltet, wobei die Knotendateninformationen eine voreingestellte Verbindung beinhalten und wobei die Zertifikatsverifizierungsanfrage eine Verifizierungsdatei zum Bestätigen der Berechtigung der voreingestellten Verbindung beinhaltet,

    Empfangen eines Korrelationsergebnisses, das von der Netzknoten-Verschlüsselungsvorrichtung in Reaktion auf die Zertifikatsverifizierungsanfrage zurückgesendet wird,

    Erzeugen eines entsprechenden Verschlüsselungszertifikats in Reaktion auf das Bestimmen, dass gemäß dem Korrelationsergebnis ein Korrelationsverhältnis zwischen der voreingestellten Verbindung des Netzknotens und der Verifizierungsdatei besteht, und

    Senden des Verschlüsselungszertifikats an die Netzknoten-Verschlüsselungsvorrichtung.


     
    9. Netzknoten-Verschlüsselungsverfahren nach Anspruch 8, wobei das Korrelationsergebnis angibt, dass die Verifizierungsdatei entsprechend der vorgeingestellten Verbindung des Netzknotens auf eine Netzadresse oder in einen Netzspeicherraum hochgeladen wurde.
     
    10. Netzknoten-Verschlüsselungsverfahren nach Anspruch 9, wobei der Schritt des Bestimmens, dass gemäß dem Korrelationsergebnis ein Korrelationsverhältnis zwischen der voreingestellten Verbindung des Netzknotens und der Verifizierungsdatei besteht, Folgendes umfasst:

    Zugreifen auf die Netzadresse oder den Netzspeicherraum entsprechend der voreingestellten Verbindung des Netzknotens und

    Bestimmen, dass das Korrelationsverhältnis zwischen der voreingestellten Verbindung des Netzknotens und der Verifizierungsdatei besteht, wenn die Verifizierungsdatei erfolgreich von der Netzadresse oder aus dem Netzspeicherraum heruntergeladen wird.


     
    11. Netzknoten-Verschlüsselungsvorrichtung für einen vertrauenswürdigen Dritten, dadurch gekennzeichnet, dass sie Folgendes umfasst:
    einen Speicher und einen Prozessor, wobei der Speicher einen computerlesbaren Befehl speichert, wobei der computerlesbare Befehl bei Ausführung durch den Prozessor das Verfahren nach einem der Ansprüche 8 bis 10 durchführt.
     
    12. Nicht-flüchtiges computerlesbares Speichermedium, dadurch gekennzeichnet, dass das Speichermedium einen computerlesbaren Befehl speichert und dass der computerlesbare Befehl von einem Prozessor ausgeführt wird, um das Verfahren nach einem der Ansprüche 1 bis 6 durchzuführen.
     
    13. Nicht-flüchtiges computerlesbares Speichermedium, dadurch gekennzeichnet, dass das Speichermedium einen computerlesbaren Befehl speichert und dass der computerlesbare Befehl von einem Prozessor ausgeführt wird, um das Verfahren nach einem der Ansprüche 8 bis 10 durchzuführen.
     


    Revendications

    1. Procédé de chiffrement de nœud de réseau, caractérisé en ce qu'il comprend :

    la réception d'une requête de chiffrement de nœud, et l'acquisition d'informations de données de nœud d'un nœud de réseau en fonction de la requête de chiffrement de nœud, les informations de données de nœud incluant une liaison préétablie ;

    la transmission d'une demande à une tierce partie fiable pour un certificat de chiffrement en utilisant les informations de données de noeud ;

    la réception d'une requête de vérification de certificat de la part de la tierce partie fiable, la requête de vérification de certificat incluant un fichier de vérification à utiliser pour vérifier l'autorité de la liaison préétablie, et la requête de vérification de certificat étant générée par la tierce partie fiable en réponse à la demande pour le certificat de chiffrement ;

    la mise en corrélation de la liaison préétablie du nœud de réseau avec le fichier de vérification correspondant à la requête de vérification de certificat en réponse à la requête de vérification de certificat de manière à transmettre un résultat de corrélation à la tierce partie fiable ; et

    la réception du certificat de chiffrement, et le déploiement du certificat de chiffrement au niveau du nœud de réseau, dans lequel le certificat de chiffrement est généré par la tierce partie fiable sur la base du résultat de corrélation.


     
    2. Procédé selon la revendication 1, comprenant en outre :

    la réception d'informations d'enregistrement du nœud de réseau, et la réalisation d'une vérification de sécurité sur la base des informations d'enregistrement du nœud de réseau ; et

    la génération et la mise en mémoire des informations de données de nœud du nœud de réseau en fonction des informations d'enregistrement du nœud de réseau lorsque la vérification de sécurité a été réalisée avec succès.


     
    3. Procédé selon la revendication 2, dans lequel la réception d'une requête de chiffrement de nœud et l'acquisition d'informations de données de nœud d'un nœud de réseau en fonction de la requête de chiffrement de nœud comprend :

    la réception de la requête de chiffrement de nœud, et la détection si la liaison préétablie du nœud de réseau est corrélée à un nom de domaine d'un nœud de réseau de terminal sur la base de la requête de chiffrement de nœud ; et

    l'acquisition d'autres informations de données de nœud du nœud de réseau lorsque la liaison préétablie du nœud de réseau est corrélée au nom de domaine du nœud de réseau de terminal ; ou

    l'envoi d'une invite pour inviter à la mise en corrélation de la liaison préétablie du nœud de réseau avec le nom de domaine du nœud de réseau de terminal lorsque la liaison préétablie du nœud de réseau n'est pas corrélée avec le nom de domaine du nœud de réseau de terminal.


     
    4. Procédé selon la revendication 1, dans lequel la transmission d'une demande à une tierce partie fiable pour un certificat de chiffrement en utilisant les informations de données de nœud comprend :

    la réalisation d'un enregistrement d'utilisateur auprès de la tierce partie fiable en utilisant les informations de données de nœud de manière à obtenir des informations d'utilisateur enregistrées ; et

    la fourniture d'une requête de garantie de certificat du nœud de réseau à la tierce partie fiable en fonction des informations d'utilisateur enregistrées et des informations de données de nœud, la requête de garantie de certificat produisant la demande à la tierce partie fiable pour le certificat de chiffrement.


     
    5. Procédé selon la revendication 1, dans lequel la mise en corrélation de la liaison préétablie du nœud de réseau avec le fichier de vérification correspondant à la requête de vérification de certificat comprend :

    la réception du fichier de vérification correspondant à la requête de vérification de certificat ; et

    l'exportation du fichier de vérification vers un espace mémoire correspondant à la liaison préétablie pour mettre la liaison préétablie du nœud de réseau en corrélation avec le fichier de vérification.


     
    6. Procédé selon la revendication 1, dans lequel, après le déploiement du certificat de chiffrement au niveau du nœud de réseau, le procédé comprend en outre :

    la génération d'un feedback du déploiement du certificat de chiffrement ; et

    l'envoi du feedback du déploiement du certificat de déchiffrement à un terminal client correspondant.


     
    7. Appareil pour le chiffrement de nœud de réseau, caractérisé en ce qu'il comprend : une mémoire et un processeur, la mémoire gardant en mémoire une instruction lisible par ordinateur, et lorsqu'elle est exécutée par le processeur, l'instruction lisible par ordinateur mettant en œuvre le procédé selon l'une quelconque des revendications 1 à 6.
     
    8. Procédé de chiffrement de nœud de réseau, caractérisé en ce qu'il comprend :

    la réception d'une demande pour un certificat de chiffrement de la part d'un appareil de chiffrement de nœud de réseau, et la génération d'une requête de vérification de certificat en réponse à la demande pour le certificat de chiffrement, la demande pour le certificat de chiffrement incluant des informations de données de nœud d'un nœud de réseau, les informations de données de nœud incluant une liaison préétablie, et la requête de vérification de certificat incluant un fichier de vérification pour vérifier l'autorité de la liaison préétablie ;

    la réception d'un résultat de corrélation renvoyé par l'appareil de chiffrement de nœud de réseau en réponse à la requête de vérification de certificat ;

    la génération d'un certificat de chiffrement correspondant en réponse à la détermination qu'une relation de corrélation existe entre la liaison préétablie du nœud de réseau et le fichier de vérification en fonction du résultat de corrélation ; et

    l'envoi du certificat de chiffrement à l'appareil de chiffrement de nœud de réseau.


     
    9. Procédé de chiffrement de nœud de réseau selon la revendication 8, dans lequel le résultat de corrélation indique que le fichier de vérification a été exporté vers une adresse réseau ou un espace mémoire de réseau correspondant à la liaison préétablie du nœud de réseau.
     
    10. Procédé de chiffrement de nœud de réseau selon la revendication 9, dans lequel l'étape de détermination qu'une relation de corrélation existe entre la liaison préétablie du nœud de réseau et le fichier de vérification en fonction du résultat de corrélation comprend :

    l'accès à l'adresse réseau ou à l'espace mémoire de réseau correspondant à la liaison préétablie du nœud de réseau, et

    la détermination que la relation de corrélation existe entre la liaison préétablie du nœud de réseau et le fichier de vérification lorsque le fichier de vérification est téléchargé à partir de l'adresse réseau ou de l'espace mémoire de réseau avec succès.


     
    11. Appareil de chiffrement de nœud de réseau pour une tierce partie fiable, caractérisé en ce qu'il comprend :
    une mémoire et un processeur, la mémoire gardant en mémoire une instruction lisible par ordinateur, et lorsqu'elle est exécutée par le processeur, l'instruction lisible par ordinateur mettant en œuvre le procédé selon l'une quelconque des revendications 8 à 10.
     
    12. Support de mémoire non volatile lisible par ordinateur, caractérisé en ce que le support de mémoire garde en mémoire une instruction lisible par ordinateur et que l'instruction lisible par ordinateur est exécutée par un processeur pour mettre en œuvre le procédé selon l'une quelconque des revendications 1 à 6.
     
    13. Support de mémoire non volatile lisible par ordinateur, caractérisé en ce que le support de mémoire garde en mémoire l'instruction lisible par ordinateur et que l'instruction lisible par ordinateur est exécutée par un processeur pour mettre en œuvre le procédé selon l'une quelconque des revendications 8 à 10.
     




    Drawing


























    Cited references

    REFERENCES CITED IN THE DESCRIPTION



    This list of references cited by the applicant is for the reader's convenience only. It does not form part of the European patent document. Even though great care has been taken in compiling the references, errors or omissions cannot be excluded and the EPO disclaims all liability in this regard.

    Patent documents cited in the description