Data analysis method used in Kerberos encryption environment

A technology of data analysis and environment, applied in the field of data analysis, can solve the problems of not being able to audit user operation behaviors, and unable to analyze client and server traffic, so as to achieve the effect of improving communication security and strengthening security

Pending Publication Date: 2020-12-04
北京中安星云软件技术有限公司
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The Kerberos protocol is mainly used for user authentication in important network production environments such as banking, government affairs, and telecommunications. It ensures data privacy and integrity by encrypting all connection information. It is impossible to analyze the traffic between the client and the server, and the user's operation behavior cannot be audited, which is also a big challenge to the security of the server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data analysis method used in Kerberos encryption environment
  • Data analysis method used in Kerberos encryption environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0028] see Figure 1 ~ Figure 2 , Figure 1 ~ Figure 2 Shown is a data parsing method used in the Kerberos encryption environment provided by the embodiment of the present application. A data parsing method used in a Kerberos encryption environment,

[0029] Including Kerberos server, application client, application server and decryption device, the specific steps are as follows:

[0030] The embodiment of the present application provides a data parsing method used in a Kerberos encryption environment, including a Kerberos server, an application client, an application server, and a decryption device. The specific steps are as follows:

[0031] The above-mentioned Kerberos server registers an account for the above-mentioned application client and creates a client password, and the above-mentioned Kerberos server registers an account for the above-mentioned application server and creates a server-side password;

[0032] The above-mentioned Kerberos server generates a key file a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data analysis method used in a Kerberos encryption environment, and relates to the field of Kerberos encryption and decryption. A data analysis method used in a Kerberos encryption environment comprises the following specific steps: a Kerberos server registers an account for an application client and creates a client password, and the Kerberos server registers an account for the application server and creates a server password; the Kerberos server generates a key file according to the client password and the server password and sends the key file to the decryption device; the application client generates a communication key; the Kerberos server generates an authentication key, and encrypts the authentication key through a client password to generate a first bill. According to the invention, the problem that the communication content between the client and the server cannot be supervised in a Kerberos authentication environment is solved.

Description

technical field [0001] The invention relates to the field of Kerberos encryption and decryption, in particular to a data parsing method used in a Kerberos encryption environment. Background technique [0002] Kerberos is a network authentication protocol implemented based on symmetric cryptography. The Kerberos protocol is mainly used for user authentication in important network production environments such as banking, government affairs, and telecommunications. It ensures data privacy and integrity by encrypting all connection information. It is impossible to analyze the traffic between the client and the server, and the user's operation behavior cannot be audited, which is also a great challenge to the security of the server. The invention aims to solve the problem of analyzing and auditing encrypted data by a third party under the Kerberos authentication environment. Contents of the invention [0003] The purpose of the present invention is to provide a data parsing m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/33G06F21/60H04L29/06
CPCG06F21/335G06F21/602H04L63/0807
Inventor 唐更新张群宋辉赵卫国
Owner 北京中安星云软件技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products