Implementing method of network security system capable of self-updating letter of representation

A proxy certificate and security system technology, applied in the field of grid computing software security, can solve problems such as inability to submit jobs, inability to transmit data, etc., achieve centralized and efficient management, and avoid updates

Inactive Publication Date: 2008-11-19
NANJING UNIV OF POSTS & TELECOMM
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Users who have not created this proxy cannot submit jobs nor transfer data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implementing method of network security system capable of self-updating letter of representation
  • Implementing method of network security system capable of self-updating letter of representation
  • Implementing method of network security system capable of self-updating letter of representation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031]The specific implementation is divided into two parts, one is the realization of the certificate warehouse, grid security system server and grid security system client, and the other is the realization of the grid security system certificate update module.

[0032] 1. Implementation of the certificate warehouse part

[0033] 1. First, configure the Linux environment, including the installation of Globus Toolkit4 and Eclipse. And assume that the installation directory of Globus Toolkit4 is $GLOBUS_LOCATION

[0034] 2. The host running the grid security system must install a host certificate in the / etc / grid-security directory

[0035] 3. Modify the template of myproxy-server.config provided by $GLOBUS_LOCATION / share / myproxy / myproxy-server.config and copy it to / etc / myproxy-server.config. Activate them by removing the # in front of the features in the myproxy-server.config configuration file.

[0036] 4. Copy $GLOBUS_LOCATION / share / myproxy / etc.init.myproxy to / etc / rc.d / ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Disclosed is an implementation method of a grid security system which can update the proxy certificate automatically; the implementation method is a strategic method and adopts a regular check mechanism to check the proxy certificate of the operation continuously; once the overdue proxy certificate is detected and the proxy is updated automatically to ensure the normal running of the operation. The grid security system which can update the proxy certificate automatically is mainly composed of a grid security system client, a grid security system server, a grid security system certificate updating module and a certificate repository; the proxy updating service uses the function provided by the certificate repository. From the logical viewpoint, the service can be considered as a module of the operation management system; the module records and manages the proxy certificates of the submitted operations and the operations require the proxy to be updated; therefore, the operation maintained by the service remains the validity through the way; the updated proxy is searched back from the certificate repository periodically to replace the proxy which is about to be overdue.

Description

technical field [0001] The invention is oriented to the grid application security field, and is mainly used to solve the security certificate problem in the grid application system. It belongs to the grid computing software security technology field. Background technique [0002] The grid is proposed by referring to the concept of the power grid. The ultimate goal of the grid is to hope that users can use grid computing power to solve problems as conveniently as using electricity. Computing facilities are provided. That is to say, what the grid provides to end users is a general computing capability. [0003] The grid uses the Internet as a communication support platform, and the Internet is a public network with great development and heterogeneity, which makes grid operations running on the Internet face various security threats, such as data interception , The content of the information is tampered with or deleted, fake legitimate users and servers, etc. Therefore, in ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/08G06F15/16
Inventor 王汝传田凯杨明慧季一木任勋益易侃邓松蒋凌云付雄张琳
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products