Safety structure of all-around protecting mobile proxy network management application

A mobile agent and security technology, applied in the direction of data exchange network, digital transmission system, electrical components, etc., can solve the problems of mobile agent fatality and mobile agent attack, and achieve the effect of preventing replay, comprehensive protection and improving flexibility.

Inactive Publication Date: 2006-10-11
NANJING UNIV OF POSTS & TELECOMM
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the attacker fakes these control information, it is fatal to the mobile agent
[0010] 2. Managed node host resource protection issues
[0012] 3. Security issues of mobile agents on managed nodes
If it happens that the host is malicious, the mobile agent will be attacked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety structure of all-around protecting mobile proxy network management application
  • Safety structure of all-around protecting mobile proxy network management application
  • Safety structure of all-around protecting mobile proxy network management application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] The present invention will be described in more detail according to the drawings and implementation examples below.

[0075] (1) Protect the transmission of the mobile agent

[0076] When an AE (Agent Environment, Agent Execution Environment) is to be sent to a mobile agent before it is sent to other AEs, we hope that the two AEs will authenticate each other and establish a secure channel, and this secure channel can also be used in future communications , there is no need to repeat the authentication process again.

[0077] And it is hoped that the two channels adopt the same security mechanism so as to facilitate implementation. Therefore, a secure channel is established using the SSL3.0 (Secure Socket Layer, a secure communication protocol) model in which both parties are authenticated.

[0078] The SSL3.0 protocol uses public key certificates to authenticate each other, establishes a common session key, and uses symmetric encryption algorithms to encrypt and prote...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The security framework to protect mobile agent network manage application fully comprises: user logs on agent running environment to create mobile agent and assign right according to task request; the agent transfers the protection to be transmission to the target host for execution; while, it should prevent host resource from malicious destroy as well as the agent from malicious host attack. This invention improves network management security, and reduces protection difficulty and source consumption.

Description

technical field [0001] The invention is a security solution for applying distributed computing technology to an open network environment. It is mainly used to solve the security problems of network management based on mobile agents, and belongs to the cross-technical field of computer network, distributed computing and information security. Background technique [0002] In the current network management solution, most of the network management calculations are completed by the network management station. When using this method for network management, a large amount of information exchange between the management station and the managed nodes will cause a great waste of network bandwidth, and this solution cannot dynamically expand the server's ability. The above shortcomings can be alleviated by adopting the distributed computing technology of mobile agent. A mobile agent is a software entity with certain intelligence and judgment capabilities. It can migrate on a heterogen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L29/06
Inventor 王汝传姜波徐小龙
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products