CN107888543A - Based on the method and system that company-data safety is protected under distributed type assemblies environment - Google Patents

Based on the method and system that company-data safety is protected under distributed type assemblies environment Download PDF

Info

Publication number
CN107888543A
CN107888543A CN201610867347.5A CN201610867347A CN107888543A CN 107888543 A CN107888543 A CN 107888543A CN 201610867347 A CN201610867347 A CN 201610867347A CN 107888543 A CN107888543 A CN 107888543A
Authority
CN
China
Prior art keywords
data
cluster
data acquisition
route
current
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610867347.5A
Other languages
Chinese (zh)
Inventor
陶永波
李明津
王斌
田世文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Shenzhouxinyuan System Engineering Co Ltd
Original Assignee
Jiangsu Shenzhouxinyuan System Engineering Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Shenzhouxinyuan System Engineering Co Ltd filed Critical Jiangsu Shenzhouxinyuan System Engineering Co Ltd
Priority to CN201610867347.5A priority Critical patent/CN107888543A/en
Publication of CN107888543A publication Critical patent/CN107888543A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses based on the method and system that company-data safety is protected under distributed type assemblies environment;This method includes:S1, fire wall is provided between cluster and data acquisition person, fire wall obtains taker to the communication link of cluster for isolated data, and opens the communication link between cluster and route and current-limiting apparatus;When S2, data acquisition person ask company-data, need to go to central authentication platform to carry out identity legitimacy verification first;S3, cluster is sent to current-limiting apparatus by route by the request that identity legitimacy verifies, result is sent to route and current-limiting apparatus after cluster statistical result, finally by route and the current-limiting apparatus person that issues data acquisition.The data communication passage that the present invention thoroughly can completely cut off data acquisition between person and company-data;Unified mode is taken to verify the identity of data acquisition side;By central authentication platform to other clusters or other need to carry out unified protection by the system of authentication;Prevent leaking data.

Description

Based on the method and system that company-data safety is protected under distributed type assemblies environment
Technical field
The present invention relates to data security arts, and in particular to one kind is based on protecting company-data peace under distributed type assemblies environment Full method and system.
Background technology
The security component that some clusters are provided by official at present is come the person that verifies data acquisition;Somewhat by the school of itself Test come the person that verifies data acquisition.These modes do not obtain the physical communication link between taker and cluster to isolated data, illegally Data acquisition person can be by the authentication mechanism of camouflage or Brute Force official security component so as to breaking through to its identity Checking so that get data.Further, since being used for of lacking that only both sides mutually know between data acquisition person and cluster encrypts number According to session key, cause in data transmission procedure easily to be intercepted and captured by third party and cause critical data to be divulged a secret;Or the 3rd Side sends the data to message after the data of intercepting and capturing are illegally distorted and obtains taker and cause unsafe data transfer again.
The content of the invention
It is an object of the present invention in order to solve the above technical problems, data transmission security can be effectively improved by providing one kind Property based under distributed type assemblies environment protect company-data safety method and system.
In order to solve the above technical problems, the present invention adopts the following technical scheme that:One kind is based under distributed type assemblies environment The method for protecting data safety, specifically comprises the following steps:
S1, fire wall is provided between cluster and data acquisition person, the fire wall obtains taker to collection for isolated data The communication link of group, and the communication link between the open cluster and route and current-limiting apparatus;
When S2, the data acquisition person ask company-data, need to go to central authentication platform to carry out identity legitimacy first Verification;
S3, by the request that the identity legitimacy verifies by it is described route with current-limiting apparatus be sent to cluster, cluster Result is sent to route and current-limiting apparatus after statistical result, finally by route and the current-limiting apparatus person that issues data acquisition.
Method as the aforementioned based on protection data safety under distributed type assemblies environment, in the step S2, before described Identity legitimacy verification is carried out toward central authentication platform to specifically include:
A, the symmetry algorithm list and asymmetric arithmetic list that the data acquisition person is supported itself are sent to described Central authentication platform;
B, a kind of symmetry algorithm of central authentication platform selecting returns to the data acquisition person with asymmetric arithmetic and used To determine enciphering and deciphering algorithm therebetween;
C, the data acquisition person is obtaining symmetry algorithm with randomly generating a message original text after asymmetric arithmetic, and counts The cryptographic Hash A of message original text is calculated, passes through cryptographic Hash described in the private key encryption of itself using asymmetric arithmetic;It is finally that message is former The digital certificate that the cryptographic Hash and mark data of message original text after text, encryption obtain taker own identification is sent to the center and recognized Demonstrate,prove platform;
D, the cryptographic Hash after the central authentication platform is decrypted and decrypted to the cryptographic Hash after the encryption, so The cryptographic Hash B of message original text is calculated by hash algorithm afterwards, by the cryptographic Hash A and message original text that compare the message original text Cryptographic Hash B uniformity is to determine the identity of the data acquisition person.
As the aforementioned based on the method that data safety is protected under distributed type assemblies environment, the symmetry algorithm bag of the support Include:DES, 3DES and AES;The asymmetric arithmetic includes RSA and DSA.
As the aforementioned based on the method that data safety is protected under distributed type assemblies environment, the central authentication platform is to described Specific method is decrypted in cryptographic Hash after encryption:Using the asymmetric arithmetic in the step c and from digital certificate Hash after encryption is decrypted extraction public key.
Included before based on the method that data safety is protected under distributed type assemblies environment, the step S3 as the aforementioned:Such as Fruit determines the legal of the data acquisition person identity, and it is secret as session that the central authentication platform randomly generates a random number Key, after the public key encryption extracted in digital certificate, it is sent to the data acquisition person.
Also included before based on the method that data safety is protected under distributed type assemblies environment, the step S3 as the aforementioned: If it is determined that the data acquisition person identity is illegal, then the identity legitimacy verification failure, and prompt authentication to lose Lose.
The present invention also provides the system that data safety is protected under a kind of environment based on distributed type assemblies, and described device includes:
Cluster, for externally providing data retrieval;
Fire wall, taker is obtained to the communication link of cluster for isolated data, and the open cluster and route device it Between communication link;
Central authentication platform, for carrying out legitimacy verifies to the identity of data acquisition person, legitimacy verifies are passed through The request of data acquisition person is sent to route and current-limiting apparatus;
Route and current-limiting apparatus, are asked for will be sent to cluster by the request of central authentication platform authentication Ask, and be sent to the concurrent request number of cluster point by current limiting measures guarantee when concurrent request number reaches threshold value.
Compared with prior art, the present invention by S1, fire wall, the fire prevention are provided between cluster and data acquisition person Wall obtains taker to the communication link of cluster for isolated data, and opens the communication between the cluster and route and current-limiting apparatus Link;When S2, the data acquisition person ask company-data, need to go to central authentication platform to carry out identity legitimacy school first Test;The request that S3, identity legitimacy verification pass through is sent to cluster, cluster statistics knot by the route and current-limiting apparatus Result is sent to route and current-limiting apparatus after fruit, finally by route and the current-limiting apparatus person that issues data acquisition, so as to thorough The data communication passage completely cut off between data acquisition person and company-data;Unified side can be taken the identity of data acquisition side Formula is verified;Data safety is reinforced by way of software is together with hardware firewall;Can be by central authentication platform to it His cluster or other need to carry out unified protection by the system of authentication;Unified identity authentication platform can also pass through current limliting Ensure the stability of cluster Deng measure;Prevent leaking data.
Brief description of the drawings
Fig. 1 is the inventive method schematic flow sheet;
Fig. 2 carries out identity legitimacy checking process schematic diagram for central authentication platform in the present invention.
The present invention is further illustrated with reference to the accompanying drawings and detailed description.
Embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention In accompanying drawing, the technical scheme in the embodiment of the present invention is explicitly described, it is clear that described embodiment be the present invention Part of the embodiment, rather than whole embodiments.
The embodiment of the present invention 1, as shown in Fig. 1~2, the side of data safety is protected under a kind of environment based on distributed type assemblies Method, specifically comprise the following steps:
S1, fire wall is provided between cluster and data acquisition person, the fire wall obtains taker to collection for isolated data The communication link of group, and the communication link between the open cluster and route and current-limiting apparatus;
When S2, the data acquisition person ask company-data, need to go to central authentication platform to carry out identity legitimacy first Verification, is specifically included:
A, the symmetry algorithm list and asymmetric arithmetic list that the data acquisition person is supported itself are sent to described Central authentication platform, the symmetry algorithm of the support include:DES, 3DES and AES;The asymmetric arithmetic includes RSA and DSA;
B, a kind of symmetry algorithm of central authentication platform selecting returns to the data acquisition person with asymmetric arithmetic and used To determine enciphering and deciphering algorithm therebetween;
C, the data acquisition person is obtaining symmetry algorithm with randomly generating a message original text after asymmetric arithmetic, and counts The cryptographic Hash A of message original text is calculated, passes through cryptographic Hash described in the private key encryption of itself using asymmetric arithmetic;It is finally that message is former The digital certificate that the cryptographic Hash and mark data of message original text after text, encryption obtain taker own identification is sent to the center and recognized Demonstrate,prove platform;
D, the central authentication platform extracts public key using the asymmetric arithmetic in the step c and from digital certificate Cryptographic Hash after cryptographic Hash after the encryption is decrypted and decrypted, message original text is then calculated by hash algorithm Cryptographic Hash B, by comparing the cryptographic Hash A of the message original text and the cryptographic Hash B of message original text uniformity with described in determining The identity of data acquisition person;
S3, if it is determined that the data acquisition person identity is legal, the central authentication platform randomly generate one it is random Number is used as session key, after the public key encryption extracted in digital certificate, be sent to the data acquisition person;If it is determined that institute Illegal, the then identity legitimacy verification failure, and prompt authentication to fail for person's identity of stating data acquisition;By described The request of identity legitimacy verification is sent to cluster by the route with current-limiting apparatus, is sent to result after cluster statistical result Route and current-limiting apparatus, finally by route and the current-limiting apparatus person that issues data acquisition, after identity legitimacy verification failure, Prompt authentication failure.
The present invention also provides the system that data safety is protected under a kind of environment based on distributed type assemblies, and the system includes:
Cluster, for externally providing data retrieval;
Fire wall, taker is obtained to the communication link of cluster for isolated data, and the open cluster and route device it Between communication link;
Central authentication platform, for carrying out legitimacy verifies to the identity of data acquisition person, legitimacy verifies are passed through The request of data acquisition person is sent to route and current-limiting apparatus;
Route and current-limiting apparatus, are asked for will be sent to cluster by the request of central authentication platform authentication Ask, and be sent to the concurrent request number of cluster point by current limiting measures guarantee when concurrent request number reaches threshold value.
The embodiment of the present invention 2, as shown in Fig. 1~2, the side of data safety is protected under a kind of environment based on distributed type assemblies Method, specifically comprise the following steps:
S1, fire wall is provided between cluster and data acquisition person, the fire wall obtains taker to collection for isolated data The communication link of group, and the communication link between the open cluster and route and current-limiting apparatus;
When S2, the data acquisition person ask company-data, need to go to central authentication platform to carry out identity legitimacy first Verification, is specifically included:
A, the symmetry algorithm list and asymmetric arithmetic list that the data acquisition person is supported itself are sent to described Central authentication platform;
B, a kind of symmetry algorithm of central authentication platform selecting returns to the data acquisition person with asymmetric arithmetic and used To determine enciphering and deciphering algorithm therebetween;
C, the data acquisition person is obtaining symmetry algorithm with randomly generating a message original text after asymmetric arithmetic, and counts The cryptographic Hash A of message original text is calculated, passes through cryptographic Hash described in the private key encryption of itself using asymmetric arithmetic;It is finally that message is former The digital certificate that the cryptographic Hash and mark data of message original text after text, encryption obtain taker own identification is sent to the center and recognized Demonstrate,prove platform;
D, the cryptographic Hash after the central authentication platform is decrypted and decrypted to the cryptographic Hash after the encryption, so The cryptographic Hash B of message original text is calculated by hash algorithm afterwards, by the cryptographic Hash A and message original text that compare the message original text Cryptographic Hash B uniformity is to determine the identity of the data acquisition person;
S3, if it is determined that the data acquisition person identity is legal, the central authentication platform randomly generate one it is random Number is used as session key, after the public key encryption extracted in digital certificate, be sent to the data acquisition person;If it is determined that institute Illegal, the then identity legitimacy verification failure, and prompt authentication to fail for person's identity of stating data acquisition;By described The request of identity legitimacy verification is sent to cluster by the route with current-limiting apparatus, is sent to result after cluster statistical result Route and current-limiting apparatus, finally by route and the current-limiting apparatus person that issues data acquisition.
The present invention also provides the system that data safety is protected under a kind of environment based on distributed type assemblies, and the system includes:
Cluster, for externally providing data retrieval;
Fire wall, taker is obtained to the communication link of cluster for isolated data, and the open cluster and route device it Between communication link;
Central authentication platform, for carrying out legitimacy verifies to the identity of data acquisition person, legitimacy verifies are passed through The request of data acquisition person is sent to route and current-limiting apparatus;
Route and current-limiting apparatus, are asked for will be sent to cluster by the request of central authentication platform authentication Ask, and be sent to the concurrent request number of cluster point by current limiting measures guarantee when concurrent request number reaches threshold value.
The embodiment of the present invention 3, as shown in Fig. 1~2, the side of data safety is protected under a kind of environment based on distributed type assemblies Method, specifically comprise the following steps:
S1, fire wall is provided between cluster and data acquisition person, the fire wall obtains taker to collection for isolated data The communication link of group, and the communication link between the open cluster and route and current-limiting apparatus;
When S2, the data acquisition person ask company-data, need to go to central authentication platform to carry out identity legitimacy first Verification, is specifically included:
A, the symmetry algorithm list and asymmetric arithmetic list that the data acquisition person is supported itself are sent to described Central authentication platform;
B, a kind of symmetry algorithm of central authentication platform selecting returns to the data acquisition person with asymmetric arithmetic and used To determine enciphering and deciphering algorithm therebetween;
C, the data acquisition person is obtaining symmetry algorithm with randomly generating a message original text after asymmetric arithmetic, and counts The cryptographic Hash A of message original text is calculated, passes through cryptographic Hash described in the private key encryption of itself using asymmetric arithmetic;It is finally that message is former The digital certificate that the cryptographic Hash and mark data of message original text after text, encryption obtain taker own identification is sent to the center and recognized Demonstrate,prove platform;
D, the central authentication platform extracts public key using the asymmetric arithmetic in the step c and from digital certificate Cryptographic Hash after cryptographic Hash after the encryption is decrypted and decrypted, message original text is then calculated by hash algorithm Cryptographic Hash B, by comparing the cryptographic Hash A of the message original text and the cryptographic Hash B of message original text uniformity with described in determining The identity of data acquisition person;
S3, by the request that the identity legitimacy verifies by it is described route with current-limiting apparatus be sent to cluster, cluster Result is sent to route and current-limiting apparatus after statistical result, finally by route and the current-limiting apparatus person that issues data acquisition.
The present invention also provides the system that data safety is protected under a kind of environment based on distributed type assemblies, and the system includes:
Cluster, for externally providing data retrieval;
Fire wall, taker is obtained to the communication link of cluster for isolated data, and the open cluster and route device it Between communication link;
Central authentication platform, for carrying out legitimacy verifies to the identity of data acquisition person, legitimacy verifies are passed through The request of data acquisition person is sent to route and current-limiting apparatus;
Route and current-limiting apparatus, are asked for will be sent to cluster by the request of central authentication platform authentication Ask, and be sent to the concurrent request number of cluster point by current limiting measures guarantee when concurrent request number reaches threshold value.
The embodiment of the present invention 4, as shown in Fig. 1~2, the side of data safety is protected under a kind of environment based on distributed type assemblies Method, specifically comprise the following steps:
S1, fire wall is provided between cluster and data acquisition person, the fire wall obtains taker to collection for isolated data The communication link of group, and the communication link between the open cluster and route and current-limiting apparatus;
When S2, the data acquisition person ask company-data, need to go to central authentication platform to carry out identity legitimacy first Verification, is specifically included:
A, the symmetry algorithm list and asymmetric arithmetic list that the data acquisition person is supported itself are sent to described Central authentication platform;
B, a kind of symmetry algorithm of central authentication platform selecting returns to the data acquisition person with asymmetric arithmetic and used To determine enciphering and deciphering algorithm therebetween;
C, the data acquisition person is obtaining symmetry algorithm with randomly generating a message original text after asymmetric arithmetic, and counts The cryptographic Hash A of message original text is calculated, passes through cryptographic Hash described in the private key encryption of itself using asymmetric arithmetic;It is finally that message is former The digital certificate that the cryptographic Hash and mark data of message original text after text, encryption obtain taker own identification is sent to the center and recognized Demonstrate,prove platform;
D, the cryptographic Hash after the central authentication platform is decrypted and decrypted to the cryptographic Hash after the encryption, so The cryptographic Hash B of message original text is calculated by hash algorithm afterwards, by the cryptographic Hash A and message original text that compare the message original text Cryptographic Hash B uniformity is to determine the identity of the data acquisition person
S3, if it is determined that the data acquisition person identity is legal, the central authentication platform randomly generate one it is random Number is used as session key, after the public key encryption extracted in digital certificate, be sent to the data acquisition person;If it is determined that institute Illegal, the then identity legitimacy verification failure, and prompt authentication to fail for person's identity of stating data acquisition;By described The request of identity legitimacy verification is sent to cluster by the route with current-limiting apparatus, is sent to result after cluster statistical result Route and current-limiting apparatus, finally by route and the current-limiting apparatus person that issues data acquisition.
The present invention also provides the system that data safety is protected under a kind of environment based on distributed type assemblies, and described device includes:
Cluster, for externally providing data retrieval;
Fire wall, taker is obtained to the communication link of cluster for isolated data, and the open cluster and route device it Between communication link;
Central authentication platform, for carrying out legitimacy verifies to the identity of data acquisition person, legitimacy verifies are passed through The request of data acquisition person is sent to route and current-limiting apparatus;
Route and current-limiting apparatus, are asked for will be sent to cluster by the request of central authentication platform authentication Ask, and be sent to the concurrent request number of cluster point by current limiting measures guarantee when concurrent request number reaches threshold value.
The embodiment of the present invention 5, as shown in Fig. 1~2, the side of data safety is protected under a kind of environment based on distributed type assemblies Method, specifically comprise the following steps:
S1, fire wall is provided between cluster and data acquisition person, the fire wall obtains taker to collection for isolated data The communication link of group, and the communication link between the open cluster and route and current-limiting apparatus;
When S2, the data acquisition person ask company-data, need to go to central authentication platform to carry out identity legitimacy first Verification;
S3, by the request that the identity legitimacy verifies by it is described route with current-limiting apparatus be sent to cluster, cluster Result is sent to route and current-limiting apparatus after statistical result, finally by route and the current-limiting apparatus person that issues data acquisition.
The present invention also provides the system that data safety is protected under a kind of environment based on distributed type assemblies, and the system includes:
Cluster, for externally providing data retrieval;
Fire wall, taker is obtained to the communication link of cluster for isolated data, and the open cluster and route device it Between communication link;
Central authentication platform, for carrying out legitimacy verifies to the identity of data acquisition person, legitimacy verifies are passed through The request of data acquisition person is sent to route and current-limiting apparatus;
Route and current-limiting apparatus, are asked for will be sent to cluster by the request of central authentication platform authentication Ask, and be sent to the concurrent request number of cluster point by current limiting measures guarantee when concurrent request number reaches threshold value.
The foregoing is only a specific embodiment of the invention, but protection scope of the present invention is not limited thereto, any Those familiar with the art the invention discloses technical scope in, the change or replacement that can readily occur in, all should It is included within the scope of the present invention.Therefore, protection scope of the present invention should it is described using scope of the claims as It is accurate.

Claims (7)

1. the method for data safety is protected under a kind of environment based on distributed type assemblies, it is characterised in that specifically comprise the following steps:
S1, fire wall is provided between cluster and data acquisition person, the fire wall obtains taker to cluster for isolated data Communication link, and the communication link between the open cluster and route and current-limiting apparatus;
When S2, the data acquisition person ask company-data, need to go to central authentication platform to carry out identity legitimacy verification first;
S3, cluster is sent to current-limiting apparatus by the route by the request that the identity legitimacy verifies, cluster statistics As a result result is sent to route and current-limiting apparatus afterwards, finally by route and the current-limiting apparatus person that issues data acquisition.
2. as claimed in claim 1 based on the method that data safety is protected under distributed type assemblies environment, it is characterised in that in institute State in step S2, it is described to go to the progress identity legitimacy verification of central authentication platform to specifically include:
A, the symmetry algorithm list and asymmetric arithmetic list that the data acquisition person is supported itself are sent to the center Authentication platform;
B, a kind of symmetry algorithm of central authentication platform selecting returns to the data acquisition person to true with asymmetric arithmetic Fixed enciphering and deciphering algorithm therebetween;
C, the data acquisition person is obtaining symmetry algorithm with randomly generating a message original text after asymmetric arithmetic, and calculates and disappear The cryptographic Hash A of original text is ceased, passes through cryptographic Hash described in the private key encryption of itself using asymmetric arithmetic;Finally by message original text, plus The digital certificate that the cryptographic Hash and mark data of message original text after close obtain taker own identification is sent to the central authentication and put down Platform;
D, the cryptographic Hash after the central authentication platform is decrypted and decrypted to the cryptographic Hash after the encryption, Ran Houtong The cryptographic Hash B that hash algorithm calculates message original text is crossed, by comparing the cryptographic Hash A of the message original text and the Hash of message original text Value B uniformity is to determine the identity of the data acquisition person.
3. as claimed in claim 2 based on the method that data safety is protected under distributed type assemblies environment, it is characterised in that described The symmetry algorithm of support includes:DES, 3DES and AES;The asymmetric arithmetic includes RSA and DSA.
4. as claimed in claim 2 based on the method that data safety is protected under distributed type assemblies environment, it is characterised in that described Specific method is decrypted to the cryptographic Hash after the encryption in central authentication platform:Use the asymmetric calculation in the step c Method and from digital certificate extract public key the Hash after encryption is decrypted.
5. as claimed in claim 1 based on the method that data safety data are protected under distributed type assemblies environment, it is characterised in that Include before the step S3:If it is determined that the data acquisition person identity is legal, the central authentication platform randomly generates One random number after the public key encryption extracted in digital certificate, is sent to the data acquisition person as session key.
6. as claimed in claim 5 based on the method that data safety data are protected under distributed type assemblies environment, it is characterised in that Also include before the step S3:If it is determined that the data acquisition person identity is illegal, then the identity legitimacy verification Failure, and prompt authentication to fail.
7. the system of data safety is protected under a kind of environment based on distributed type assemblies, it is characterised in that described device includes:
Cluster, for externally providing data retrieval;
Fire wall, taker is obtained to the communication link of cluster for isolated data, and between the open cluster and route device Communication link;
Central authentication platform, for carrying out legitimacy verifies, the data that legitimacy verifies are passed through to the identity of data acquisition person The request for obtaining taker is sent to route and current-limiting apparatus;
Route and current-limiting apparatus, make requests on for will be sent to cluster by the request of central authentication platform authentication, and The concurrent request number of cluster point is sent to by current limiting measures guarantee when concurrent request number reaches threshold value.
CN201610867347.5A 2016-09-30 2016-09-30 Based on the method and system that company-data safety is protected under distributed type assemblies environment Pending CN107888543A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610867347.5A CN107888543A (en) 2016-09-30 2016-09-30 Based on the method and system that company-data safety is protected under distributed type assemblies environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610867347.5A CN107888543A (en) 2016-09-30 2016-09-30 Based on the method and system that company-data safety is protected under distributed type assemblies environment

Publications (1)

Publication Number Publication Date
CN107888543A true CN107888543A (en) 2018-04-06

Family

ID=61769896

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610867347.5A Pending CN107888543A (en) 2016-09-30 2016-09-30 Based on the method and system that company-data safety is protected under distributed type assemblies environment

Country Status (1)

Country Link
CN (1) CN107888543A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109347869A (en) * 2018-11-28 2019-02-15 北京京东金融科技控股有限公司 Generation method, device, medium and the electronic equipment of inter-cluster communication factor of safety
CN110365663A (en) * 2019-06-28 2019-10-22 北京淇瑀信息科技有限公司 Access method, device and electronic equipment between a kind of isolation cluster
CN110519217A (en) * 2019-07-05 2019-11-29 中国平安人寿保险股份有限公司 Across company-data transmission method, device, computer equipment and storage medium
CN114615073A (en) * 2022-03-22 2022-06-10 广州方硅信息技术有限公司 Access flow control method, device, equipment and medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102025503A (en) * 2010-11-04 2011-04-20 北京曙光天演信息技术有限公司 Data security implementation method in cluster environment and high-security cluster
CN102546646A (en) * 2012-01-17 2012-07-04 深圳市乐唯科技开发有限公司 System and method for realizing voice talkback function
CN102868728A (en) * 2012-08-23 2013-01-09 福建升腾资讯有限公司 Network proxy method based on virtual channel in virtual desktop infrastructure (VDI) environment
CN103746997A (en) * 2014-01-10 2014-04-23 浪潮电子信息产业股份有限公司 Network security solution for cloud computing center
US20140122885A1 (en) * 2012-11-01 2014-05-01 Miiicasa Taiwan Inc. Method and system for managing device identification
CN104023085A (en) * 2014-06-25 2014-09-03 武汉大学 Security cloud storage system based on increment synchronization

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102025503A (en) * 2010-11-04 2011-04-20 北京曙光天演信息技术有限公司 Data security implementation method in cluster environment and high-security cluster
CN102546646A (en) * 2012-01-17 2012-07-04 深圳市乐唯科技开发有限公司 System and method for realizing voice talkback function
CN102868728A (en) * 2012-08-23 2013-01-09 福建升腾资讯有限公司 Network proxy method based on virtual channel in virtual desktop infrastructure (VDI) environment
US20140122885A1 (en) * 2012-11-01 2014-05-01 Miiicasa Taiwan Inc. Method and system for managing device identification
CN103746997A (en) * 2014-01-10 2014-04-23 浪潮电子信息产业股份有限公司 Network security solution for cloud computing center
CN104023085A (en) * 2014-06-25 2014-09-03 武汉大学 Security cloud storage system based on increment synchronization

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
梁斌: "基于SaaS模式的电子政务应用架构的分析与设计", 《软件产业与工程》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109347869A (en) * 2018-11-28 2019-02-15 北京京东金融科技控股有限公司 Generation method, device, medium and the electronic equipment of inter-cluster communication factor of safety
CN110365663A (en) * 2019-06-28 2019-10-22 北京淇瑀信息科技有限公司 Access method, device and electronic equipment between a kind of isolation cluster
CN110519217A (en) * 2019-07-05 2019-11-29 中国平安人寿保险股份有限公司 Across company-data transmission method, device, computer equipment and storage medium
CN114615073A (en) * 2022-03-22 2022-06-10 广州方硅信息技术有限公司 Access flow control method, device, equipment and medium

Similar Documents

Publication Publication Date Title
US9544280B2 (en) Utilization of a protected module to prevent offline dictionary attacks
CN106612180B (en) Method and device for realizing session identification synchronization
CN103595721B (en) Network disk file secure sharing method, sharing means and shared system
CN103581173B (en) Safe data transmission method, system and device based on industrial Ethernet
US20170237565A1 (en) Method and apparatus for logging into medical devices
CN103414690B (en) One can openly be verified the high in the clouds data property held method of calibration
CN107613316B (en) Live network push stream verification method and system
CN103001976A (en) Safe network information transmission method
CN109194656A (en) A kind of method of distribution wireless terminal secure accessing
CN101272616B (en) Safety access method of wireless metropolitan area network
WO2017185913A1 (en) Method for improving wireless local area network authentication mechanism
CN111464503B (en) Network dynamic defense method, device and system based on random multidimensional transformation
CN108418691A (en) Dynamic network identity identifying method based on SGX
CN102355663B (en) Credible inter-domain rapid authentication method on basis of separation mechanism network
CN107888543A (en) Based on the method and system that company-data safety is protected under distributed type assemblies environment
CN103701787A (en) User name password authentication method implemented on basis of public key algorithm
TWI526871B (en) Server, user device, and user device and server interaction method
CN107483459A (en) The interface protection method of anti-replay-attack
CN106453362A (en) Data transmission method and apparatus of vehicle-mounted device
CN111740995A (en) Authorization authentication method and related device
CN110035035B (en) Secondary authentication method and system for single sign-on
CN108965310A (en) The anti-tamper encryption implementation method of crossing and device on a kind of batch data
CN116743470A (en) Service data encryption processing method and device
CN109150906A (en) A kind of real-time data communication safety method
CN114024672B (en) Safety protection method and system for power line carrier communication system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180406