US 12,348,613 B2
Encrypted packet inspection method and protection device
Xinqian He, Hangzhou (CN)
Assigned to Huawei Technologies Co., Ltd., Shenzhen (CN)
Filed by Huawei Technologies Co., Ltd., Shenzhen (CN)
Filed on Apr. 25, 2023, as Appl. No. 18/306,681.
Application 18/306,681 is a continuation of application No. PCT/CN2021/088501, filed on Apr. 20, 2021.
Claims priority of application No. 202011155469.4 (CN), filed on Oct. 26, 2020; and application No. 202011377786.0 (CN), filed on Nov. 30, 2020.
Prior Publication US 2023/0261858 A1, Aug. 17, 2023
Int. Cl. H04L 9/08 (2006.01)
CPC H04L 9/0825 (2013.01) [H04L 9/0841 (2013.01); H04L 9/0869 (2013.01)] 19 Claims
OG exemplary drawing
 
1. An encrypted packet inspection method, wherein the method comprises:
separately sending, by a protection device, a man-in-the-middle Diffie-Hellman (DH) parameter to a client device and to a server, wherein the protection device is deployed between the client device and the server, and the man-in-the-middle DH parameter is a DH parameter generated by the protection device;
generating, by the protection device, a first session key based on the man-in-the-middle DH parameter and a client DH parameter, wherein the client DH parameter is a DH parameter generated by the client device;
generating, by the protection device, a second session key based on the man-in-the-middle DH parameter and a server DH parameter, wherein the server DH parameter is a DH parameter generated by the server;
receiving, by the protection device, an original encrypted packet; and
when the original encrypted packet originates from the client device, decrypting, by the protection device, the original encrypted packet with the first session key, inspecting plaintext data obtained through decryption, encrypting the inspected plaintext data with the second session key to obtain a target encrypted packet, and sending the target encrypted packet to the server; or
when the original encrypted packet originates from the server, decrypting, by the protection device, the original encrypted packet with the second session key, inspecting plaintext data obtained through decryption, encrypting the inspected plaintext data with the first session key to obtain a target encrypted packet, and sending the target encrypted packet to the client device.