A security optimization method for multi-cluster hadoop system based on public key algorithm and ssl protocol
A technology of public key algorithm and optimization method, which is applied in the field of optimization and can solve problems such as reducing efficiency and tediousness
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0142] The security optimization method proposed by the present invention is implemented as a single plug-in in a multi-cluster Hadoop system in a single-sign-on manner, and can be started by a SHELL device of the multi-cluster Hadoop system. The developed prototype system can be flexibly integrated into or offloaded from the multi-cluster Hadoop system according to the needs of users. The prototype system of the safety optimization method proposed by the present invention includes six main modules: a general module, a security module, a user management module, a CA node module, a master node module and a slave node module. Figure 5 The interaction between the various modules is shown. Each module provides specific functionality, among them:
[0143] (1) The general module is the function library of the security optimization method, which provides the required basic interfaces for other modules, including event listeners, event processors and random message generators, etc.;...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com