Single sign on based grid authentication trust model

A single sign-on, trust model technology, applied in user identity/authority verification, electrical components, transmission systems, etc., can solve problems such as the imperfect authorization function of grid single sign-on system, achieve easy configuration and maintenance, and unified identity Managing and Avoiding the Effects of Entity Deception

Inactive Publication Date: 2010-05-12
NANJING UNIV OF POSTS & TELECOMM
View PDF0 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The problem to be solved in this paper is that the authorization function of the existing grid single sign-on system is not perfect, and t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Single sign on based grid authentication trust model
  • Single sign on based grid authentication trust model
  • Single sign on based grid authentication trust model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The authentication trust model based on identity authentication and single sign-on of the present invention applies objective trust to the grid security platform system, and uses the trust model to solve the problem of grid user identity authentication, specifically as follows:

[0052] 1. Architecture

[0053] (1) In this design, the grid user first obtains the X.509 digital certificate issued by the CA server from the CA server. This certificate is the identity certificate that the user can prove himself in this system, similar to the Our ID card, our ID card is a document with a direction mark added by the government, which is unique. The authentication module adopts the traditional PKI model, and the specific operation process is as follows: figure 1 As shown, after the CA server is running, it will always monitor the issuance request on the network. After receiving the certificate from the client, it will check the identity of the client. Sign, store the signed c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A single sign on (SSO) based grid authentication trust model is a solution for objective authentication of trusted entities under open grid environment and is mainly used for solving the following problem: how users carry out identity authentication and can launch grid application after passing primary authentication. When continuously using the grid resources, users can access various legal resources in the computational grid after passing the identity authentication without repeated authentication. Under the grid computing environment, the invention solves the problems of collaboration between the grid users and the grid entities in the virtual organization and the entities in other virtual organizations, and security and dynamics of the shared resources, and constructs the security architecture for authorizing the users under the grid computing environment.

Description

technical field [0001] The present invention is a solution for objectively authenticating trusted entities in an open grid environment. It is mainly used to solve the problem of how users can perform identity authentication and initiate grid applications through one authentication. When continuing to use grid resources, there is no need to Repeated authentication for users can access various legal resources in the computing grid according to the authority they have after passing the identity authentication. Background technique [0002] In grid computing, users need to conduct mutual authentication with grid services or other grid entities. Authentication and authorization are one of the core contents of grid security. The existing security authentication mechanism of grid computing completely depends on the public key certificate system. During the authentication process, grid users need to use their own private key to encrypt or sign. In order to ensure the security of the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
Inventor 王汝传王芳王海艳王杨张琳邓勇
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products