Unlock instant, AI-driven research and patent intelligence for your innovation.

A secret key management method and system for token authentication in an openstack system

A management method and secret key technology, which is applied in the field of secret key management, can solve problems such as system compatibility, communication reliability, and poor stability, and achieve the effects of improving stability and reliability, improving efficiency, and avoiding access delays

Active Publication Date: 2022-05-31
INSPUR SUZHOU INTELLIGENT TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] This application provides a key management method and system for token authentication in the openstack system to solve the problems of poor system compatibility, communication reliability and stability caused by the methods in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A secret key management method and system for token authentication in an openstack system
  • A secret key management method and system for token authentication in an openstack system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0080] S1: Determine the master node and the common node when the node is started.

[0081] The node in this embodiment is a keystone node. The keystone service is deployed in multiple sections in the openstack system

[0082] S11: When the keystone service is started, according to the non-load balancing IP, a self-registering node is adopted in a service registration manner.

[0083] That is, when the keystone service starts, the keystone self-registers the endpoint, which is the other section in the subsequent steps.

[0084] Further, after adopting the service registration method to self-register the node, it also includes steps S12 and S13.

[0085] S12: Judge whether the openstack system includes multiple regions.

[0087] If the openstack system does not include multiple regions, but only has one region, step S14 is directly executed.

[0089] S14: Obtain the communication addresses of keystone services of all nodes.

[0090] S15: All nodes preempt the master node in chronol...

Embodiment 2

[0129] The key rotation module includes: a rotation unit, a list pulling unit, a notification unit and a synchronization unit. Among them, the rotation

[0130] The fault handling module includes: a second judgment unit, a third judgment unit, a yield unit, a second preemption unit, a pull

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application discloses a key management method and system for token authentication in the openstack system. The method includes: determining the master node and the common node when the node is started, generating a secret key at the master node and pulling the secret key at the common node; according to the Obtained rotation secret key command, synchronize the secret key store; judge whether the secret key between any two nodes in the openstack system is consistent, if it is judged that there is no token authentication failure, otherwise it is judged that there is a fault, when a token authentication fault occurs, pull Retrieve the keystore. The system includes: a node determination module, a secret key processing module, a judging module and a fault processing module. Through this application, the access delay can be avoided, the synchronization efficiency can be greatly improved, and the phenomenon that the token issued by the A node cannot be verified by the B node can be avoided, which is conducive to improving the compatibility of the system, as well as the stability and communication of the openstack system operation reliability.

Description

A key management method and system for token authentication in openstack system technical field The application relates to the technical field of key management, particularly relate to a secret key of token authentication in a kind of openstack system Key management method and system. Background technique [0002] In the openstack system, keystone components are usually used for authentication operations, and keystone is widely used The fernet token generation form is used to generate the token, and the token information generated in the fernet token form has a short length and is convenient Transmission reduces the space and time complexity of token storage and verification. And the fernet token is generated based on the secret key, the Secret keys are stored in specific folders. When the openstack system is deployed on a large scale, multiple keystone nodes will be deployed to balance Load balance system pressure, therefore, how to synchronize the keys of multipl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08H04L9/40
CPCH04L9/3213H04L9/0861H04L63/0807H04L63/06
Inventor 刘硕
Owner INSPUR SUZHOU INTELLIGENT TECH CO LTD