Network safety verification method of distributed system

A distributed system and distributed network technology, applied in the field of network security verification methods and systems for distributed systems, can solve problems such as inability to identify whether data is valid, inability to completely exclude internal leaks, lack of identity authentication, etc., and achieve easy expansion. maintenance effect

Inactive Publication Date: 2019-12-27
NINGDE NORMAL UNIV
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] However, the server as the service provider does not have identifiable identity authentication, nor does it have any digital certificates and keys, so it is impossible to ensure that the services provided by such servers are legal, and it is impossible to identify whether the obtained data is valid.
Although the background server group is in a relatively isolated internal LAN, the security threat is small, but internal leaks, internal hackers and other internal behaviors cannot be completely ruled out
The mutual communication between servers cannot guarantee the security requirements of data, that is, the confidentiality, integrity and non-repudiation of data. It is not enough for the Industrial Internet. Once illegal acts occur, the consequences will be more serious

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network safety verification method of distributed system
  • Network safety verification method of distributed system
  • Network safety verification method of distributed system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0040] to combine Figure 1-Figure 5 : A network security verification method of a distributed system, the distributed network includes at least two servers distributed in different areas, comprising the following steps: when the server in the distributed network acts, the server is authenticated ,

[0041] Integrate the key distribution center KDC and the service ticket license service component KDC-TGS into each HBase server to form each network security authentication server, respectively integrate the Kerberos client into each HBase client to form each network security authentication client; ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network safety verification method of a distributed system. The method comprises the following steps: 1, when a server in the distributed network has a behavior, performing identity authentication on the server; respectively integrating a key distribution center KDC and a service ticket permission service component KDC-TGS to each HBase server to form each network safetyauthentication server, and respectively integrating a Kerberos client to each HBase client to form each network safety authentication client; the network safety authentication client performing request interaction with any network safety authentication server by utilizing the ssk, and the requested network safety authentication server verifies the network safety authentication client according tothe ssk stored in the data center; the digital certificate and the secret key of the server being bound with the server information, so that one server can only correspond to one fixed digital certificate and secret key, and the effectiveness and the integrity of server identity authentication are further ensured.

Description

technical field [0001] The invention belongs to the technical field of distributed systems, in particular to a distributed system network security verification method and system. Background technique [0002] With the rapid development of industrial automation control, more and more industrial enterprises use their internal (or private) network to interconnect their production process special equipment or industrial intelligent equipment (Intelligent Electric Device-IED) to form a production control system network . This kind of internal (or private) network used by industrial enterprises is called the Industrial Internet. [0003] Large-scale enterprises, such as electric power companies, oil and gas transmission companies, and large-scale mining groups that focus on mineral resource exploration and development, often have their holding companies distributed all over the country or even around the world, and their information exchange needs cannot be met by using only inte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08H04L29/08
CPCH04L9/0894H04L9/3297H04L63/0428H04L63/08H04L63/0823H04L63/0876H04L67/10
Inventor 张世良阮群生薛东杨烈君
Owner NINGDE NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products