Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Trust service adaptation method based on security agent

A security proxy and adapter technology, applied in electrical components, transmission systems, etc., can solve the problems of lack of service provision and invocation of identity authentication process and data protection means, poor service configuration and scalability, service request failure, etc., to improve service. Request efficiency and configurability, improve convenience and usability, and shield the effect of operational details

Inactive Publication Date: 2020-05-22
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF9 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In this way, there are several main problems. One is that when the service address, port and other service information changes, the requesting party cannot actively know and adjust the request parameters at the first time, and falls into a cycle of continuous retries, or passively passes Modify the configuration parameters and code to relocate the service, and the service configuration and scalability are poor
The second is that when a single service node is disconnected, the service request will fail. For the case of hot standby, the client needs to maintain multiple service information, and at the same time use the polling method until a normal active service is obtained. This method is more efficient Low
The third is that the request data exchange between the client and the server in the traditional method lacks security measures, lacks the identity authentication process and data protection means between service provision and invocation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trust service adaptation method based on security agent
  • Trust service adaptation method based on security agent
  • Trust service adaptation method based on security agent

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] 1. Overall workflow

[0020] Here, we define the entity that provides the service as the service producer, and the entity that invokes the service as the service consumer. A security agent-based trust service adaptation method includes two important components: a service adapter and a security agent.

[0021] Service adapter: receive and manage services registered by service producers in a unified way, publish and monitor each service in the service center mode, record detailed information of each service, and support identity authentication and encryption and decryption of interactive data requested by security agents.

[0022] Security agent: As the subject of interaction with the service adapter, all requests for interaction with the service adapter need to be initiated through the security agent, providing functions of service registration, service discovery, service request, and heartbeat feedback, and supporting identity authentication and interaction data for ada...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a trust service adaptation method based on a security agent, which comprises a service adapter and a security agent, and each service producer and each service consumer comprise one security agent. According to the invention, the registered trust service is recorded, monitored and managed through the service adapter, the service consumer does not need to maintain the specific information of the service, directly obtains the target service information from the service adapter through the security agent and initiates access, and automatically redirects the service information under the condition that the service parameters are changed, thereby improving the adaptability and dynamic expansibility of the service. The method supports dynamic adaptation of services. According to the method, the unified interaction among the service adapter, the service producer and the service consumer is realized and simplified, the operation details of the interaction process are shielded, the convenience and availability of service adaptation are improved, and the consistency of a service system in a system is supported.

Description

technical field [0001] The invention relates to a security agent-based trust service adaptation method. Background technique [0002] In the current network environment, entities active in the network may be attackers and security threats. Identity authorization management and identity authentication for entities such as users, devices, applications, files, and network resources are usually based on digital certificates. way to provide trusted services. In the construction of an industry network trust system, each trust-related system is deployed independently to provide services, and the combination of different services together forms a complete authentication and authorization system, and there are more and more scenarios for forming a distributed service system. Faced with different trust services, there are generally differences in the implementation methods, protocols, and parameters of these services. As a client requesting these services, you first need to set the a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/0884H04L63/083H04L63/08H04L63/10H04L63/20
Inventor 周吉余双波伍荣李佳楠陈佳
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products