Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Distributed trust management system and method for obtaining distributed credential chain

A technology of trust management and trust certificate, applied in transmission systems, electrical components, etc., can solve the problems of insufficient attribute constraint support, insufficient attribute information support, affecting system availability and performance, etc., to strengthen information security, enhance description ability, The effect of enhancing flexibility

Inactive Publication Date: 2006-06-21
BEIHANG UNIV
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although GSI uses XACML to support the authorization of comprehensive user attribute information, and encapsulates user attribute information based on SAML, and transfers trust relationships through delegation mechanisms such as MyProxy, this MyProxy provides a method that can be used to map users to their Mechanism of grid credential, but due to the lack of attribute-based trust management mechanism, the ability to support large-scale dynamic collaborative applications across security domains is insufficient
[0006] 2. Insufficient support for attribute information
In the current authentication system in the grid, a certificate chain similar to PKIX is used to construct the trust relationship, but this certificate chain can only constrain relatively simple attribute information, but cannot restrict complex attribute information (general trust certificates). Information such as age in) constraints
[0007] 3. Single trust chain construction mechanism
[0009] 1. RTML mainly considers the agent logic of the role and the trust certificate chain discovery algorithm, and does not take into account the flexibility of security policy requirements in practical applications;
[0010] 2. It does not take into account the depth constraints of the delegation mechanism in practical applications, which is an important security constraint information for typical applications, otherwise the subject will continue to expand the trust chain, affecting the availability and performance of the system;
[0011] 3. Insufficient support for attribute constraints, RTML can only express centralized typical constraints, and cannot support more constraint methods and attribute information;
[0012] 4. So far, there is still no practical trust management system that supports the functions expressed in RTML language

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed trust management system and method for obtaining distributed credential chain
  • Distributed trust management system and method for obtaining distributed credential chain
  • Distributed trust management system and method for obtaining distributed credential chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The present invention expands the role-based trust management language on the basis of RTML, increases the inspection of entrusted depth constraints and attribute constraints, thus increases the expressive ability of policies, and also improves the efficiency of the trust certificate discovery algorithm The present invention also realizes the search of distributed trust certificates. This search method solves the difficult problem of distributed trust certificate discovery, and improves the performance of the system while improving information security.

[0040] Such as figure 1 As shown, it is a schematic diagram of the basic structure of the distributed trust management system of the present invention, including the following modules: attribute authority module 1, trust certificate management module 2, trust certificate graph construction module 3, engine interface module 4 and local trust certificate storage module 5. Compared with the local, the attribute authority ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a distributed trust management system, which comprises: connected by turns, an attribute authorization module, a trust certificate management module, a trust certificate chart construction module, an engine interface module, and local trust certificate storage module. It also relates to a method to acquire distributed trust certificate link: receiving find request for trust certificate link; constructing trust certificate chart; extracting all paths of appointed nodes to output. This invention adds depth and attribute constrain to RTML, and improves algorithm efficiency and system performance.

Description

technical field [0001] The present invention relates to a distributed trust management system and a method for obtaining distributed trust certificate chains, in particular to a trust management system based on attribute delegation and applicable to distributed large-scale network computing environments such as grids and its A method to construct a trust certificate graph and a backward search algorithm to obtain a distributed trust certificate chain. Background technique [0002] Grid computing belongs to large-scale network computing, and has effectively solved the problem of dynamic resource sharing and collaboration across multiple virtual organizations at this stage. With the continuous expansion of the application scale and scope of large-scale network computing, in this Various application entities in the network are distributed more and more widely, and they are often located in different security domains and are not familiar with each other. This kind of trust manag...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 怀进鹏胡春明李建欣卢伟勤李沁
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products