Credential protection handling method facing service

A service-oriented, protection-processing technology, applied in the direction of electrical components, transmission systems, etc., can solve problems such as unfavorable system integration, adoption of new technologies, difficulties in trust certificate management, etc., and achieve the effect of enhancing flexibility

Inactive Publication Date: 2009-01-28
BEIHANG UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the one hand, when other systems comply with the WSRF specification, the protection of the trust certificate adopts the C / S mode, which brings unnecessary difficulties for other systems to manage the trust certificate; on the other hand, due to the new technology They are all service-oriented, and the trust certificate protection still insists on using the C / S mode, so it is inconvenient to adopt new technologies in the system that realizes the trust certificate protection, such as secure communication technology; more importantly, since the C / S mode, Server Proxy for new certificates, when there is a large amount of visits, bottlenecks are prone to occur;
[0017] 2. The secure communication mechanism of the MyProxy system is not flexible
In the MyProxy system, the secure communication between the client and the server is realized through the Secure Socket Layer (Secure socket layer, SSL for short) protocol, which is not configurable, difficult to expand and compatible
This is because secure communication is a basic function, and many existing control systems have secure communication mechanisms that provide corresponding functions. If only to increase the protection and management functions of trust certificates, a SSL secure communication has to be introduced. Mechanism is not conducive to the integration of the system, and it is a kind of duplication; moreover, if some control systems have high requirements for secure communication, such as the resource sharing system of the security department, or special mechanisms must be adopted, such as requiring the use of For a control system that combines multiple security technologies, it is difficult to realize the protection of the trust certificate through the MyProxy system
[0018] 3. The protection of the certificate of trust is too simple
[0019] To sum up, in the existing technical solutions, there is no flexible and service-oriented method for realizing trust certificate protection processing in the grid environment.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Credential protection handling method facing service
  • Credential protection handling method facing service
  • Credential protection handling method facing service

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] see figure 1 , is a schematic diagram of the service-oriented credential protection processing system of the present invention, which consists of a grid user terminal 1, a network server 2, and a plurality of grid terminals 3 connected through the wide area Internet.

[0050] The grid user terminal 1 is the same as the grid terminal 3, the only difference is that figure 1 The grid user terminal in is the grid terminal with the trust certificate in this embodiment, so it is specially named grid user terminal. Taking the grid user terminal 1 as an example, it is composed of a client terminal 11 and a secure communication terminal 12 . The client 11 is a common business processor, such as a desktop computer or a mobile PC or a portable computer, which mainly includes the following processing functions: uploading the proxy certificate (Init), retrieving the proxy certificate (Logon), uploading the trust certificate (Store), retrieving Trust certificate (Retrieve), change ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a protective treatment method for trust certificate faced service. Wherein, the user terminal builds a security communication channel with network server and uploads agent certificate and cipher and security parameter all generated by it self; the server generates and enciphers agent trust certificate to preserve with security parameter; the terminal visits the certificate library and provides cipher; the server checks and validates the cipher, if pass, generates a new agent trust certificate to send to terminal. This invention fuses trust certificate into WSRF frame, and enhances flexibility for protection.

Description

technical field [0001] The invention relates to a service-oriented trust certificate protection processing method, in particular to a method for realizing service-oriented trust certificate protection processing through proxy trust certificates in a grid environment, and a method for uploading trust certificates in a grid environment A method for attesting to the implementation of service-oriented credential-protected processing. Background technique [0002] Since the grid computing (Grid Computing) technology realizes resource sharing and collaborative work in a wide-area network environment, with the increasing development of the Internet, the grid computing technology is also increasingly widely used. [0003] The core content of grid computing is to regard the virtual resource processing grid (Virtual Organization (VO) for short) as infrastructure (Infrastructure) such as computer terminals, and create and maintain it. Since resource sharing is cross-organizational, th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 怀进鹏胡春明李沁刘新刚李建欣
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products