Unlock instant, AI-driven research and patent intelligence for your innovation.

File transmission method and device, electronic equipment and storage medium

A file transfer and file technology, applied in the field of information security, can solve problems such as cumbersome steps, keytab file generation errors, and inability to realize the secondary delivery of Keytab files, so as to reduce the difficulty of operation and improve the efficiency of delivery

Pending Publication Date: 2022-01-07
JINGDONG TECH HLDG CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the process of realizing the present invention, it is found that there are the following technical problems in the prior art: at present, the authentication individual principals are only generated for users of all servers in the KDC server manually, but the Keytab file generation process of the corresponding authentication individual is highly repetitive and The steps are cumbersome, which can easily cause errors in Keytab file generation
In addition, since the generated Keytab file is manually copied to the server by the administrator, the Keytab file cannot be effectively maintained during later use. Once the Keytab file in the server is damaged, the administrator can only regenerate a new one on the KDC server. keytab file, the secondary delivery of the Keytab file cannot be realized

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File transmission method and device, electronic equipment and storage medium
  • File transmission method and device, electronic equipment and storage medium
  • File transmission method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] figure 1 It is a flow chart of a file transfer method provided by Embodiment 1 of the present invention. This embodiment is applicable to the case of batch delivery of security authentication files in a large data cluster scenario. The method can be executed by a file transfer device, which can Implemented in hardware and / or software, see figure 1 , the method provided in the embodiment of the present invention specifically includes the following steps:

[0027] Step 110: Obtain at least one request information requesting to issue a security authentication file, where the request information includes at least request terminal information and a request path.

[0028] Wherein, the security authentication file may be a file for verifying the identity of the user. When the user accesses the service server, the security authentication file may be used for identity authentication, and the security authentication file may be composed of security individual information and a p...

Embodiment 2

[0037] figure 2 It is a flow chart of another file transfer method provided by Embodiment 2 of the present invention. The embodiment of the present invention is based on the embodiment of the above invention. Refer to figure 2 , the file transfer method provided by the embodiment of the present invention specifically includes the following steps:

[0038] Step 210: Obtain at least one request information requesting to issue a security authentication file, where the request information includes at least requesting terminal information and a requesting path.

[0039] Further, on the basis of the foregoing embodiments of the invention, the requesting terminal information includes at least one of a Principal security individual and a terminal identifier.

[0040] Wherein, the Principal security individual may be a user under the Kerberos protocol, and the terminal identifier may be a computer name or a computer number.

[0041] In the embodiment of the present invention, the R...

Embodiment 3

[0070] Figure 4 It is a schematic structural diagram of a file transfer device provided in Embodiment 3 of the present invention, which can execute the software installation method provided in any embodiment of the present invention, and has corresponding functional modules and beneficial effects for executing the method. The device can be implemented by software and / or hardware, and specifically includes: a request acquisition module 301 , a file search module 302 and a file delivery module 303 .

[0071] The request obtaining module 301 is configured to obtain at least one request information requesting to issue a security certification file, wherein the request information includes at least request terminal information and a request path.

[0072] The file search module 302 is configured to search locally for corresponding security certification files according to the requesting terminal information, and obtain each of the security certification files according to the sear...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a file transmission method and device, electronic equipment and a storage medium. The method comprises the following steps: obtaining at least one piece of request information for requesting to issue a safety authentication file, the request information at least comprising request terminal information and a request path; searching a corresponding safety authentication file locally according to each piece of request terminal information, and obtaining each safety authentication file according to a search result; and issuing the corresponding safety authentication file to a terminal corresponding to each piece of request terminal information according to each request path. According to the embodiment of the invention, the batch issuing of the safety authentication files of multiple terminals is realized through the request message, the repeated issuing of the files is realized based on the local storage of the safety authentication files, the time overhead of remote collection is reduced, the file issuing efficiency is improved, and the stability of the system can be enhanced.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of information security, and in particular, to a file transmission method, device, electronic equipment, and storage medium. Background technique [0002] Kerberos security authentication is a common method in big data clusters for secure identity authentication of personal communications in non-secure networks. In Kerberos security authentication, the key is placed in a reliable node or client in advance. The key is only Allow restricted access. The client accesses the big data cluster with Kerberos security authentication enabled through the key stored by the reliable node. When the client machine accesses the big data cluster with Kerberos authentication enabled, it needs to pass the Keytab file for authentication. [0003] In the process of realizing the present invention, it is found that there are the following technical problems in the prior art: at present, the authenticat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L67/06H04L9/40H04L67/02G06F21/62
CPCH04L67/06H04L63/08H04L67/02G06F21/6218
Inventor 赵旗
Owner JINGDONG TECH HLDG CO LTD