CN111193720A - Trust service adaptation method based on security agent - Google Patents

Trust service adaptation method based on security agent Download PDF

Info

Publication number
CN111193720A
CN111193720A CN201911291442.5A CN201911291442A CN111193720A CN 111193720 A CN111193720 A CN 111193720A CN 201911291442 A CN201911291442 A CN 201911291442A CN 111193720 A CN111193720 A CN 111193720A
Authority
CN
China
Prior art keywords
service
information
adapter
security
registration
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911291442.5A
Other languages
Chinese (zh)
Inventor
周吉
余双波
伍荣
李佳楠
陈佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CETC 30 Research Institute
Original Assignee
CETC 30 Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CETC 30 Research Institute filed Critical CETC 30 Research Institute
Priority to CN201911291442.5A priority Critical patent/CN111193720A/en
Publication of CN111193720A publication Critical patent/CN111193720A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0884Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Abstract

The invention discloses a trust service adaptation method based on a security agent, which comprises a service adapter and the security agent, wherein each service producer and each service consumer comprise one security agent. The invention records, monitors and manages the registered trust service through the service adapter, the service consumer does not need to maintain the specific information of the service, directly obtains the target service information from the service adapter through the security agent and initiates access, the service information is automatically redirected under the condition of changing service parameters, and the self-adaptability and the dynamic expansibility of the service are improved. The invention supports dynamic adaptation of services. The safety agent designed by the invention realizes and simplifies the unified interaction among the service adapter, the service producer and the service consumer, shields the operation details of the interaction process, improves the convenience and the availability of service adaptation, and supports the consistency of a service system in a system.

Description

Trust service adaptation method based on security agent
Technical Field
The invention relates to a trust service adaptation method based on a security proxy.
Background
In current network environments, entities active in the network may be attackers and security threats, and identity authorization management and identity authentication for entities such as users, devices, applications, files, network resources, etc. are generally based on digital certificates, and trust services are provided in a servitization manner. In the construction of an industrial network trust system, each trust related system is independently deployed and respectively provides services, different services are combined together to form a complete authentication and authorization system, and more scenes of a distributed service system are formed. In the face of different trust services, the implementation modes, protocols, parameters and the like of the services generally have differences, and when the services are requested by a client, the information of addresses, ports, protocols and the like of the services needs to be set firstly, and then a service interface is called to access the services.
Therefore, when service information such as service addresses and ports changes, one of the main problems is that a party requesting a service cannot actively know and adjust request parameters at the first time, and falls into a loop state of continuous retry, or passively relocates the service by modifying configuration parameters and codes, and the service is poor in configuration and extensibility. Secondly, when a single service node is disconnected, a service request fails, and for the condition of hot standby, a client needs to maintain a plurality of service information, and a polling mode is adopted until a normal active service is obtained, so that the efficiency is low. Thirdly, the request data exchange between the client and the server in the traditional method lacks security measure guarantee, and lacks an identity authentication process and a data protection means between service provision and invocation.
Disclosure of Invention
In order to overcome the above disadvantages of the prior art, the present invention provides a trust service adaptation method based on a security agent, which mainly solves the technical problems of the trust service adaptation method and the service security, and specifically comprises the following steps:
1) aiming at a distributed trust service system, how to eliminate the maintenance of service information by service consumers is realized, when the service is increased, disappeared and the like, the dynamic acquisition of the service information is realized, the target service can be accessed under the condition of not modifying configuration and codes, and the self-adaptive change of the service state is met.
2) How to establish a unified mechanism for trusting service adaptation, the interaction among a service consumer, a service producer and a service adapter is executed according to the same specification, the interaction among the service consumer, the service producer and the service adapter is simplified, and the availability of service adaptation is improved.
3) Aiming at service adaptation processes such as service release, service access and the like, how to confirm the identities of two interactive parties and ensure the data security in the interaction process.
The technical scheme adopted by the invention for solving the technical problems is as follows: a trust service adaptation method based on a security agent comprises a service adapter and the security agent, wherein each service producer and each service consumer comprises the security agent; wherein:
the service producer initiates a service registration request to the service adapter through the security proxy, the service adapter realizes service registration after successfully verifying the identity of the security proxy, records specific information of the service and monitors the service state;
the service consumer initiates a service query request to the service adapter through the security agent, the service adapter decrypts data and verifies the identity information of the request source according to the received service query request, and after the verification is passed, service information with a corresponding name is queried in a service record information base and the service information is returned to the service consumer; and after receiving the returned service information, the service consumer encrypts the access parameters and then initiates a service request to the target service through the security proxy.
Compared with the prior art, the invention has the following positive effects:
1) the invention designs a service adaptation method based on a service registration-discovery mode under a distributed trust service system, records, monitors and manages each trust service through a service adapter, service consumers do not need to maintain specific information of the service, the service information is automatically redirected under the condition of service parameter change, and the adaptability of the service is improved.
2) The service adaptation method provided by the invention supports dynamic adaptation of services, provides optimal service information in the current state, and service requesters do not need to poll available services in the network, thereby improving service request efficiency and configurable type and supporting dynamic expansion of services.
3) The safety agent designed by the invention realizes and simplifies the unified interaction among the service adapter, the service producer and the service consumer, shields the operation details of the interaction process, improves the convenience and the availability of service adaptation, and supports the consistency of a service system in a system. Meanwhile, the security of the service and the data can be ensured by the asymmetric cryptographic technology based on the basis of a trust service system and in combination with a security and secrecy means of the trust system.
Drawings
The invention will now be described, by way of example, with reference to the accompanying drawings, in which:
FIG. 1 is an overall workflow diagram;
FIG. 2 is a flow diagram of service registration and discovery;
fig. 3 is a flow chart of dynamic service adaptation.
Detailed Description
First, overall work flow
Here we define the entity that provides the service as the service producer and the entity that invokes the service as the service consumer. A trust service adaptation method based on a security agent comprises two important components of a service adapter and the security agent.
Service adapter: the method comprises the steps of uniformly receiving and managing services registered by a service producer, issuing and monitoring each service in a service center mode, recording detailed information of each service, and supporting identity authentication and interactive data encryption and decryption requested by a security agent.
And (4) security agent: as a main body interacting with the service adapter, all requests interacting with the service adapter need to be initiated through the security agent, functions of service registration, service discovery, service request and heartbeat feedback are provided, and identity authentication and interactive data encryption and decryption of adapter interaction are supported. Meanwhile, when the service parameters of the service producer change, the safety agent is responsible for converting the parameters, and the service consumer is ensured to continue accessing the updated service without modifying the original access mode.
The general flow is shown in fig. 1, and comprises the following processes:
(1) each service producer and consumer contains a security agent and the service adapter records service information registered by each service producer and monitors the presence information of the service.
(2) The service producer registers the service, including information such as service name, address, port, etc., with the service adapter through the security proxy.
(3) The service adapter verifies the identity of the security agent, realizes service registration after successful verification and records specific information of the service; the service adapter communicates with the service producer through a heartbeat mechanism to monitor the service status.
(4) The service consumer initiates a service query request through the security agent, and after acquiring the service information, initiates a service request to the target service through the security agent.
(5) The target service verifies the source validity of the request through the security proxy, and processes the service request after the request passes the source validity.
Second, service registration and discovery process
The key of the service adaptation method based on the security agent is service registration and discovery, including how a service producer registers a service into a service adapter, and a service consumer discovers the service from the service adapter and requests access, and the specific flow is shown in fig. 2 and includes the following processes:
(1) service registration initiation: each system inputs parameter data meeting the standard requirements by using a security agent according to the service requirements, initiates registration to the service adapter, encrypts data before sending registration information, and signs.
The parameter information is a combination of various information of a specific service, and is represented by a set T, { code, name, address, port, protocol, publish }.
(2) Service registration and verification: the service adapter receives the registration request data, firstly decrypts the registration request data, authenticates the identity of the initiator security agent, executes service registration after the authentication is passed, and records service information, which is represented by a set Y, wherein Y is T U { state, isAllowed }, and U represents the combination of the set information.
Further, after the registration is successful, the service adapter and the registration service keep communication in a heartbeat mode, the specific implementation is that the service adapter and the security proxy automatically perform, and if the service is abnormal or the node is disconnected, the state information of the service record is updated.
(3) Service inquiry: the service system inquires a certain service from the service adapter through the security agent, and the data security is ensured in the interaction process.
(4) Query and analysis: and the service adapter decrypts the data and verifies the identity information of the request source according to the received service query request, and queries the service information with the corresponding name in the service record information base after the verification is passed.
(5) Returning service information: the service adapter returns the inquired service information to the service consumer;
(6) service access: and the service consumer receives the returned service information, encrypts the access parameters and initiates a service request to the target service through the security agent.
When the information such as the requested service address, port and the like changes, the service adapter can update the service information in the service information recording library, and when a service request is initiated by a client, the new service position can be automatically positioned, so that the self-adaptive configuration of the service is realized.
Third, service dynamic adaptation flow
In the distributed system deployment, aiming at the condition of multi-entity registration of the same service, the active service can be dynamically selected by the service adapter for service access, and the process is not sensible to service consumers. The workflow is shown in fig. 3.
(1) Same service registration: the service producers A1 and A2 register the A service with the service adapter through the security proxy, and the service adapter records two service information in the recording information base at the same time;
(2) service inquiry: the client inquires the service information A through the security agent, the service adapter returns the service information A published by A1 according to the load balancing strategy and the service priority sequence, and the client accesses the service A of the node A1 through the security agent;
(3) and (3) node disconnection processing: the service adapter finds that the A1 service node loses connection through a heartbeat mechanism, and the A service issued by the service adapter fails, the service record library is updated, and the state of the service record library is set to be off.
(4) Service inquiry: the client queries the a service again and the service adapter automatically matches and returns the service with the highest current priority (a service registered at a 2).
(5) Service access: and the client initiates service access through the security proxy according to the inquired service information.
Fourthly, concrete implementation
Service registration and discovery
In a distributed trust service system based on PKI, a service producer providing services comprises three service software, namely user management software, equipment management software and user authorization software, which are respectively deployed on three servers and comprise security agents. The service consumer requesting the service is a desktop terminal that includes the security agent. The service registration, query and access process is now illustrated:
(1) the user management software registers the user authentication service T1 with the service adapter.
T1 ═ EBAT1, user authentication service, 192.168.2.5, 8080, WSDL, user management software };
the device management software adds service T2 to the service adapter registered device.
T2 ═ EBAT2, device add service, 192.168.2.18, 8080, WSDL, device management software };
the authorization management software adds service T3 to the service adapter registered device.
T3 ═ EBAT3, user authorization service, 192.168.2.27, 8080, WSDL, authorization management software };
the user management software, the device management software and the authorization management software call the security agent software to register, before the security agent software initiates a registration application, the security agent software deploys a signature and encryption module of the device in which the security agent software is located, signs and encrypts T1, T2 and T3, and after the registration application is initiated.
(2) After receiving the registration application, the service adapter firstly verifies the data security and the identity information of the applicant through a security proxy, executes service registration after the verification is completed, and records the service information into a record library:
TABLE 1 service records repository-1
Figure BDA0002319181130000071
(3) The client queries the service adapter for "user authentication service" for "user management software", and the service adapter queries "user authentication service" EBAT1 from the service record table and returns.
(4) The client initiates a user authentication request to EBAT1 through the acquired "user authentication service" information.
(5) And after receiving the authentication request, the user management software executes authentication operation after data security processing and returns a result.
(6) The user management software deploys and adjusts or switches servers, the service address is changed into 192.168.2.10, and service change is initiated to the service adapter through the security agent software; the client re-queries the user authentication service, automatically acquires the updated service information EBAT1 { …, 92.168.2.10, … }, and initiates a request.
Dynamic adaptation of services
In a distributed trust service system based on PKI, a service producer providing user authentication service comprises user management software A and user management software B, which are respectively deployed on two servers to provide the same service function, so as to form a dual-computer hot-standby structure. The procedure for dynamic adaptation of the service is now illustrated:
(1) the user management software a registers the user authentication service T1 with the service adapter.
T1 ═ EBAT1, user authentication service, 192.168.2.5, 8080, WSDL, user management software a };
the user management software B registers the user authentication service T2 with the service adapter.
T2 ═ EBAT2, user authentication service, 192.168.2.15, 8080, WSDL, user management software B };
user management software A and user management software B register services T1, T2 with the service adapter through the security agent, respectively.
(2) After receiving the registration application, the service adapter firstly verifies the data security and the identity information of the applicant through a security proxy, executes service registration after the verification is completed, and records the service information into a record library:
TABLE 2 service records repository-2
Figure BDA0002319181130000081
(3) The client inquires the service adapter about the user authentication service, and the service adapter inquires the user authentication service information of the user management software A from the service record table and returns the information.
(4) The client side initiates a user authentication request through the acquired user authentication service information, and after receiving the authentication request, the user management software A executes authentication operation after data security processing and returns a result.
(5) The service adapter monitors that the user management software A is abnormally connected through a heartbeat mechanism, and the EBAT1 service cannot be normally accessed, so the EBAT1 state is updated to 'stop' in the service record base.
Table 3 service adapter service record library-3
Figure BDA0002319181130000091
(6) The client inquires 'user authentication service' from the service adapter again, and the service adapter inquires 'user authentication service' information of 'user management software B' in a normal state and returns the information due to the abnormal user authentication service of 'user management software A'.
The client side initiates a user authentication request through the acquired user authentication service information, and after receiving the authentication request, the user management software B executes authentication operation after data security processing and returns a result.

Claims (7)

1. A trust service adaptation method based on a security agent is characterized in that: the system comprises a service adapter and a security proxy, wherein each service producer and service consumer comprises one security proxy; wherein:
the service producer initiates a service registration request to the service adapter through the security proxy, the service adapter realizes service registration after successfully verifying the identity of the security proxy, records specific information of the service and monitors the service state;
the service consumer initiates a service query request to the service adapter through the security agent, the service adapter decrypts data and verifies the identity information of the request source according to the received service query request, and after the verification is passed, service information with a corresponding name is queried in a service record information base and the service information is returned to the service consumer; and after receiving the returned service information, the service consumer encrypts the access parameters and then initiates a service request to the target service through the security proxy.
2. A security broker based trust service adaptation method according to claim 1, wherein: the service registration process comprises the following steps:
(1) a service producer inputs registration service information through a security agent, the registration service information is represented by a set T, and then data is encrypted, signed and transmitted;
(2) after receiving the registered service information T, the service adapter first decrypts the registered service information T and authenticates the identity of the initiator security agent, executes service registration after the authentication is passed, and records service information, which is represented by a set Y, where Y is T U { state, isAllowed }, where U represents a combination of the set information.
3. A security broker based trust service adaptation method according to claim 2, wherein: after the registration is successful, the service adapter and the service producer keep communication in a heartbeat mode, and if service abnormity or node loss is found, state information of the service record is updated.
4. A security broker based trust service adaptation method according to claim 2, wherein: when the registered service information changes, the service adapter can update the service information in the service information recording library, and can automatically locate a new service position when a client initiates a service request, so that the self-adaptive configuration of the service is realized.
5. A security broker based trust service adaptation method according to claim 1, wherein: when different service producers a1, a2 register the same service a with the service adapter through the security proxy, the service adapter records two service information simultaneously in the recording information base.
6. A security proxy-based trust service adaptation method according to claim 5, characterized in that: when the client initiates the query of the service A information to the service adapter through the security proxy, the service adapter returns the service A information issued by the service producer A1 according to the load balancing strategy and the service priority sequence, and the client accesses the A service of the A1 node through the security proxy.
7. The security broker based trust service adaptation method of claim 6, wherein: when the service adapter finds that the A1 service node loses connection through a heartbeat mechanism and the A service issued by the service adapter is invalid, updating the service record library and setting the state of the service record library to be off; when the client queries the service a again, the service adapter automatically matches and returns the service with the highest current priority: a2, and the client initiates service access through the security proxy according to the inquired service information.
CN201911291442.5A 2019-12-16 2019-12-16 Trust service adaptation method based on security agent Pending CN111193720A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911291442.5A CN111193720A (en) 2019-12-16 2019-12-16 Trust service adaptation method based on security agent

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911291442.5A CN111193720A (en) 2019-12-16 2019-12-16 Trust service adaptation method based on security agent

Publications (1)

Publication Number Publication Date
CN111193720A true CN111193720A (en) 2020-05-22

Family

ID=70707345

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911291442.5A Pending CN111193720A (en) 2019-12-16 2019-12-16 Trust service adaptation method based on security agent

Country Status (1)

Country Link
CN (1) CN111193720A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113765905A (en) * 2021-08-27 2021-12-07 深圳市风云实业有限公司 Data communication method based on trusted service agent
CN113904963A (en) * 2021-09-03 2022-01-07 中国人民解放军军事科学院战争研究院 Service management method based on service directory agent servization and score board method
CN114726652A (en) * 2022-05-20 2022-07-08 北京网藤科技有限公司 Security equipment management method and system based on L7 proxy

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1777190A (en) * 2005-12-08 2006-05-24 普天信息技术研究院 Service quality based web service registration and discovery system and method
CN1860761A (en) * 2003-06-05 2006-11-08 英特特拉斯特技术公司 Interoperable systems and methods for peer-to-peer service orchestration
US20070245000A1 (en) * 2004-04-30 2007-10-18 Huawei Technologies Co., Ltd. System and Method for Providing IpV6 Services
CN101188617A (en) * 2007-12-20 2008-05-28 浙江大学 A flow service registration and discovery method
CN103944883A (en) * 2014-03-19 2014-07-23 华存数据信息技术有限公司 System and method for cloud application access control under cloud computing environment
CN105376225A (en) * 2015-11-02 2016-03-02 亚信科技(南京)有限公司 Software-as-a-service method and device
CN105516308A (en) * 2015-12-09 2016-04-20 国网福建省电力有限公司 Wide-area service-oriented data interaction system and method based on service management center
CN107547661A (en) * 2017-10-12 2018-01-05 福建富士通信息软件有限公司 A kind of container payload balance realizing method of high-performance and High Availabitity
CN108476231A (en) * 2015-10-30 2018-08-31 思杰系统有限公司 System and method for maintaining session via intermediate device

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1860761A (en) * 2003-06-05 2006-11-08 英特特拉斯特技术公司 Interoperable systems and methods for peer-to-peer service orchestration
US20070245000A1 (en) * 2004-04-30 2007-10-18 Huawei Technologies Co., Ltd. System and Method for Providing IpV6 Services
CN1777190A (en) * 2005-12-08 2006-05-24 普天信息技术研究院 Service quality based web service registration and discovery system and method
CN101188617A (en) * 2007-12-20 2008-05-28 浙江大学 A flow service registration and discovery method
CN103944883A (en) * 2014-03-19 2014-07-23 华存数据信息技术有限公司 System and method for cloud application access control under cloud computing environment
CN108476231A (en) * 2015-10-30 2018-08-31 思杰系统有限公司 System and method for maintaining session via intermediate device
CN105376225A (en) * 2015-11-02 2016-03-02 亚信科技(南京)有限公司 Software-as-a-service method and device
CN105516308A (en) * 2015-12-09 2016-04-20 国网福建省电力有限公司 Wide-area service-oriented data interaction system and method based on service management center
CN107547661A (en) * 2017-10-12 2018-01-05 福建富士通信息软件有限公司 A kind of container payload balance realizing method of high-performance and High Availabitity

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
周华锋等: "OS2服务注册容灾方法探究", 《电气技术》 *
段翰聪等: "基于面向服务架构的分布式业务部署平台", 《计算机应用》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113765905A (en) * 2021-08-27 2021-12-07 深圳市风云实业有限公司 Data communication method based on trusted service agent
CN113765905B (en) * 2021-08-27 2023-04-18 深圳市风云实业有限公司 Data communication method based on trusted service agent
CN113904963A (en) * 2021-09-03 2022-01-07 中国人民解放军军事科学院战争研究院 Service management method based on service directory agent servization and score board method
CN114726652A (en) * 2022-05-20 2022-07-08 北京网藤科技有限公司 Security equipment management method and system based on L7 proxy

Similar Documents

Publication Publication Date Title
US6490679B1 (en) Seamless integration of application programs with security key infrastructure
US8086847B2 (en) Computer program product and computer system for peer-to-peer communications
US7823187B2 (en) Communication processing method and system relating to authentication information
Zhu et al. Splendor: A secure, private, and location-aware service discovery protocol supporting mobile services
KR101353725B1 (en) Methods and system for managing security keys within a wireless network
EP3017582B1 (en) Method to enroll a certificate to a device using scep and respective management application
US7356601B1 (en) Method and apparatus for authorizing network device operations that are requested by applications
JP2020080530A (en) Data processing method, device, terminal, and access point computer
US20100154040A1 (en) Method, apparatus and system for distributed delegation and verification
CN112699399B (en) Encryption database system, method and device for realizing encryption database system
KR20040019328A (en) Access control system
US7702923B2 (en) Storage service
US20060206616A1 (en) Decentralized secure network login
CN111193720A (en) Trust service adaptation method based on security agent
US9954839B2 (en) Systems and methods for providing distributed authentication of service requests by identity management components
JP2010535443A (en) Identify and authenticate devices in the network
CN1798021B (en) Communication supporting server, method and system
JP4324197B2 (en) Remote IPSEC security relevance management
CN115758326A (en) Data sharing method, network side device, system, electronic device and storage medium
US7526560B1 (en) Method and apparatus for sharing a secure connection between a client and multiple server nodes
US20090055917A1 (en) Authentication method and authentication system using the same
JP2005304093A (en) Key distribution method and system for encryption communication
KR20030033630A (en) Single Sign-On System with Authentication Agent based Kerberos Protocol
CN115362664B (en) Communication method, device and equipment based on Internet of things
CN113169965B (en) Resource allocation method, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200522