Unlock instant, AI-driven research and patent intelligence for your innovation.

Implementing method and system for ensuring JMS message safety certificate

A technology of security authentication and implementation method, applied in the field of JMS message security authentication, can solve the problems of not being able to authenticate the security of JMS message sources and preventing message replay, and achieve the effects of high efficiency, simple use and strong stability

Inactive Publication Date: 2018-05-01
明博教育科技股份有限公司
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Since the security of third-party applications is uncontrollable, the username / password authentication method commonly used by JMS can only ensure the access of unauthorized users, but cannot authenticate the security of JMS message sources, nor can it prevent message replay problems.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implementing method and system for ensuring JMS message safety certificate
  • Implementing method and system for ensuring JMS message safety certificate
  • Implementing method and system for ensuring JMS message safety certificate

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0073] 1) Prepare the JMS environment, generate an asymmetric key pair, and test the application.

[0074] 2) Encapsulate the message content into a message class, which contains at least two attributes: content (message content) and createTime (transmission timestamp, as a unique identifier).

[0075] 3) Convert the object into a JSON string, perform MD5 operation on the string to obtain a hash, and use the private key to encrypt the hash code to generate signature information.

[0076] 4) Put the JSON string format content into the JMS message content, and add the JMS attribute (_message_sign) whose value is the signature information obtained in (3), and generate it in the TOPIC of JMS

[0077] 5) The test application listens to the TOPIC of JMS. After receiving the message, it first takes out the signature value of the message signature attribute (_message_sign) and compares it with the local persistent message signature library of the application. If it exists, the message...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an implementing method and system for ensuring JMS message safety certificate. The method comprises the following steps: acquiring a JMS message and a message content; calculating a hash value of the message content by a one-way has function; encrypting the hash value by an asymmetric encrypted private key to form signature; transmitting the signature and the message content to a JMS server in a TOPIC mode; after the JMS server receives the signature and the message content, calculating the hash value of the message content by an application in a client end, decryptingthe signature by using an asymmetric encrypted public key, comparing whether the hash value obtained by decryption of the signature and the calculated hash value are consistent or not, if the hash value obtained by decryption of the signature and the calculated hash value are consistent, processing the message content, and if the has value obtained by decryption of the signature and the calculatedhas value are not consistent, discording the message content. The method and system are based on a mature asymmetric encryption and hash algorithm, and are simple to use, high in stability, high in safety and high in efficiency; authentication safety of the JMS message can be ensured; message forging and tampering in a transmitting process are prevented, and safety of data interaction between systems is improved.

Description

technical field [0001] The invention relates to the technical field of Internet security authentication, in particular to a method and system for ensuring JMS message security authentication. Background technique [0002] With the development of information technology, the Internet application system is becoming more and more complex and gradually develops into a platform, which usually accesses third-party applications in an open way. Information synchronization between third-party applications and platforms has also become a basic problem that must be solved. , information synchronization based on JMS messages is one of the common solutions. [0003] Since the security of third-party applications is uncontrollable, the commonly used username / password authentication method of JMS can only ensure the access of unauthorized users, but cannot authenticate the security of JMS message sources, nor can it prevent message replay problems. [0004] Described JMS is Java Message Se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3239H04L9/3247H04L63/0442H04L63/08
Inventor 谭金祥
Owner 明博教育科技股份有限公司