Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Service gateway and method for realizing message safe process

A security processing and service gateway technology, applied in the field of message security processing, can solve problems such as failure of grid service access points, insufficient computing and storage capabilities of mobile terminals, and difficulty in execution, so as to shorten the average response time, support security protection, The effect of improving service performance

Inactive Publication Date: 2007-09-26
BEIHANG UNIV
View PDF0 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. Resource limitations of mobile terminals: The computing power and storage capacity of mobile terminals are insufficient, and it is difficult to perform security operations with a large amount of calculation such as encryption and signature;
[0005] 2. The dynamics of grid nodes: the dynamic joining and exit of grid nodes makes some grid service access points invalid;

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Service gateway and method for realizing message safe process
  • Service gateway and method for realizing message safe process
  • Service gateway and method for realizing message safe process

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] As shown in Figure 1, the service gateway includes a message interceptor, a security processing module, and a message forwarding module. The message interceptor is used to forward the intercepted user request message and / or service response message to the security processing module, and send the securely processed message returned by the security processing module to the message forwarding module; the message interceptor forwards the intercepted message Together with relevant information, it is encapsulated in the message context and sent to the security processing module. After the chain security processing is completed, the processing result is received, and according to the final processing result, it is decided whether to allow the service gateway to continue its normal message processing; the security processing module and the message The interceptor connection is used to securely process the message forwarded by the message interceptor, and return the securely proc...

Embodiment 2

[0031] Based on Embodiment 1, the security processing module is divided into four levels from the technical architecture level, which are respectively from bottom to top: plug-in layer 1, control layer 2, policy layer 3 and management layer 4, as shown in FIG. 2 .

[0032] The responsibilities of each layer are as follows:

[0033] 1. Plug-in layer, where plug-ins are placed in the service gateway to intercept user requests and service response messages, and realize security control of service access.

[0034] 2. The control layer implements specific security control. The security control supported by the security processing module is mainly communication security. Since the security requirements of the application are diverse, the security processing module adopts an open and configurable chain structure to provide further flexibility in the organization of the security module at runtime.

[0035] 3. Policy layer, customize various communication security policies according ...

Embodiment 3

[0040] Based on the second embodiment, the SOAP specification stipulates how to sign the message. Signed arbitrary digital content is called a data object. The signature result of the data object plus the digital signature information is stored in the document in the form of an extensible markup language (eXtensible Markup Language; hereinafter referred to as: XML) element, which is called a signature element. The signature element is represented by the XML element "Signature". The SOAP specification also specifies how to encrypt messages. The encrypted data content is also referred to as a data object. The encrypted result and encrypted information of the encrypted data object are stored in the document in the form of XML elements, which are called encrypted elements. If an ordinary data object is encrypted, the encrypted element is "EncryptedData", and if the key is encrypted, the encrypted element is "EncryptedData". EncryptedKey". Referring to the relevant provisions o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The related service gateway comprises: a message interceptor to transmit the intercepted user request and / or service response message to the next module and sends message from the next module to a message transmission module; a safe processing module to safe process message from last module and return result; and a message transmission module to transmit the processed message to a grid server. It also relates the corresponding processing method. This invention P2P transmits message safely, and realizes seamless visiting for service resource to mobile terminal.

Description

technical field [0001] The present invention relates to a service gateway, in particular to a service gateway applied in a service grid environment, and a message security processing method, which can complete end-to-end security transmission of messages and realize seamless access of mobile terminals in the grid service resources. Background technique [0002] In recent years, service-oriented computing and grid technology have developed rapidly. The service grid based on hypertext information system (hereinafter referred to as Web) service technology represents the latest stage of grid technology development. It utilizes the openness and standardization of Web service technology With a unified function expansion mechanism, the service grid technology can better solve the interoperability problem between grid applications, and make grid technology be further applied in many aspects such as e-commerce and e-government. [0003] In terms of security, due to the inherent dist...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/66H04L12/28H04L12/58H04L29/06H04L29/08
Inventor 李先贤刘小佩李沁
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products