Network security verification method and system for distributed system

A distributed system and network security technology, applied in the network security verification method and system field of distributed systems, can solve problems such as difficult expansion and maintenance

Active Publication Date: 2014-10-08
BEIJING JINGDONG 360 DEGREE E COMMERCE CO LTD
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the current security network verification of distributed systems such as HBase, there are problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security verification method and system for distributed system
  • Network security verification method and system for distributed system
  • Network security verification method and system for distributed system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0045] For the sake of brevity and intuition in description, the solution of the present invention is described below by describing several representative implementation manners. Numerous details in the embodiments are only used to help the understanding of the solutions of the present invention. But obviously, the technical solutions of the present invention may not be limited to these details when implemented. In order to avoid unnecessarily obscuring the solution of the present invention, some embodiments are not described in detail, but only a framework is given. Hereinafter, "including" means "including but not limited to", and "according to..." means "at least according to, but not limited to only based on...". Due to the language habits of Chinese, when t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network security verification method and system for a distributed system. The method comprises the steps that a key distribution center (KDC) and a KDC-ticket granting service (KDC-TGS) component are integrated to all HBase servers respectively to form all network security verification servers, and Kerberos client sides are integrated to all HBase client sides respectively to form all network security verification client sides; the network security verification client sides send verification requests to any network security verification servers; the network security verification servers establish a login session key (LSK) and a service session key (SSK) after verification is passed and return the LSK and the SSK to the network security verification client slides; the LSK and the SSK are stored in a data center which can be accessed by all the network security verification servers; the network security verification client sides are in request interaction with any network security verification servers through the SSK, and the requested network security verification servers verify the network security verification client sides according to the SSK stored in the data center.

Description

technical field [0001] The invention belongs to the technical field of distributed systems, in particular to a distributed system network security verification method and system. Background technique [0002] With the rapid development of computer technology and network technology, Internet (Internet) technology plays an increasingly important role in people's daily life, study and work. Moreover, with the development of the mobile Internet, the Internet is also developing towards mobile. In today's information age, various information devices have emerged as the times require: fixed telephones and mobile terminals for voice transmission; servers and personal computers for information resource sharing and processing; various TV sets for video data display, etc. Wait. These devices are produced to solve actual needs in specific fields. With the advent of the integration of electronic consumption, computer, and communication (3C), people are paying more and more attention t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32H04L29/08
Inventor 唐平
Owner BEIJING JINGDONG 360 DEGREE E COMMERCE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products