Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network security authentication method

An authentication method and network security technology, applied in the field of computer software security authentication, can solve problems such as no monitoring scheme, difficulty for users to master, KDC server stability bottleneck, etc., achieve high security level and effective monitoring effect

Active Publication Date: 2016-11-23
华云工业互联网有限公司
View PDF3 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Because the installation and configuration of Kerberos is extremely complicated, and there are many parameters to be configured, it is difficult for ordinary users to fully grasp it. The configuration environment is also in the Linux environment shell, and the operation is not very convenient and clear, and there is no monitoring plan
Therefore, there is also the problem of a unified management user interface, which makes users unable to truly grasp the internal running status of the KDC server. All operations need to be performed by the user through the command line, and the user experience is poor.
[0006] In addition, the existing technology is not highly integrated with Hadoop or cloud computing, and users need to do additional configuration work. There are certain difficulties and risks in configuration and operation and maintenance.
At the same time, because there is no monitoring method, the stability of the KDC server has become an important bottleneck, and there are hidden dangers in security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security authentication method
  • Network security authentication method
  • Network security authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The present invention will be described in detail below in conjunction with the implementations shown in the drawings, but it should be noted that these implementations are not limitations of the present invention, and those of ordinary skill in the art based on the functions, methods, or structural changes made by these implementations Equivalent transformations or substitutions all fall within the protection scope of the present invention.

[0028] Please refer to Figure 1 to Figure 7 An embodiment of a network security authentication method of the present invention is shown. In the present embodiment, a kind of network security authentication method, it is based on Apache Kerby security authentication framework, and this network security authentication method comprises the following steps:

[0029] First, step S1 is executed, and the administrator configures the KDC server based on the Kerberos authentication service from the web client.

[0030] Based on the esta...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network security authentication method. The network security authentication method comprises the following steps: S1, configuring a KDC server based on Kerberos authentication service from a web client by an administrator; S2, correlating resources with a user Id, a role, a Token Id and a Token state to construct correlation information by the KDC server; S3, acquiring a token value and token information from the web client by a user, saving the token information in a persistent node, and binding a token to the resources; S4, according to the token information and the correlation information in the step S2, determining the right for the user to access the resources. The user can configure the KDC server through a web browser, so that one-key data deployment security service is achieved, and effective monitoring on the running state of the KDC server is achieved, deep integration with large data and cloud computation is achieved, and thus a protecting mechanism with a higher security level is provided for the resources of the user.

Description

technical field [0001] The invention relates to the technical field of computer software security authentication, in particular to a network security authentication method. Background technique [0002] Apache Kerby is a set of open source security authentication framework developed by java. It appears as a sub-project of Apache Directory. Through kerby developers can develop their own Kerberos authentication server KDC Server, and it also supports a variety of security protocols, such as X509, oauth2 With good support, it can build an excellent security shield for Hadoop big data and cloud computing environments. [0003] Based on the Apache Kerby security authentication framework, it can independently complete the KDC server environment setup through web configuration, provide Kerberos authentication services, and do not require third-party services, and provide auto-failover functions without a single point of failure. Support a variety of security authentication protoco...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/08H04L67/02
Inventor 许广彬郑军张银滨强亮周曙纲
Owner 华云工业互联网有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products