CN102075541A - Safe interoperation method for distributed multi-security domain heterogeneous information system - Google Patents

Safe interoperation method for distributed multi-security domain heterogeneous information system Download PDF

Info

Publication number
CN102075541A
CN102075541A CN201110028633XA CN201110028633A CN102075541A CN 102075541 A CN102075541 A CN 102075541A CN 201110028633X A CN201110028633X A CN 201110028633XA CN 201110028633 A CN201110028633 A CN 201110028633A CN 102075541 A CN102075541 A CN 102075541A
Authority
CN
China
Prior art keywords
interoperability
security
safe
security domain
operation system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201110028633XA
Other languages
Chinese (zh)
Inventor
张遂征
唐堃
袁宝军
葛大伟
齐新华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING HONGDEXIN ZHIYUAN INFORMATION TECHNOLOGY Co Ltd
Original Assignee
BEIJING HONGDEXIN ZHIYUAN INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING HONGDEXIN ZHIYUAN INFORMATION TECHNOLOGY Co Ltd filed Critical BEIJING HONGDEXIN ZHIYUAN INFORMATION TECHNOLOGY Co Ltd
Priority to CN201110028633XA priority Critical patent/CN102075541A/en
Publication of CN102075541A publication Critical patent/CN102075541A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a safe interoperation method for a distributed multi-security domain heterogeneous information system. In the method, a safe interoperation mechanism is disclosed aiming at the requirement of service collaboration safety among a plurality of distributed information systems (can be heterogeneous). In the mechanism, service collaboration of cross-region and cross-section distributed information system can be protected effectively. Each security domain is supposed to be capable of providing complete certificate production, management, releasing and using functions and service such as encryption, decryption, signature and the like, and a safe interoperation function is provided by an independent safe interoperation system. The core of the mechanism is that: interoperation request and service data transmission between safety domains are required to be realized through sequential forwarding between adjacent interoperation domains (a safety interoperation route is formed between adjacent sequences). During transmission, mutual authentication is required to be performed between adjacent safe interoperation systems.

Description

A kind of distributed many security domains isomery information system security mutual operation method
1, technical field
The invention belongs to information technology (IT) field, the security management and the support method of interoperability between the particularly a plurality of relevant information system (related a plurality of information systems can be isomorphism or isomery, can require cross-region to distribute according to work organization to dispose or stride tissue deployment).
2, background technology
Along with fast development of information technology, information system has been widely used in each service links such as production, operation, management, and bridging technology has begun to play an increasingly important role aspect business cooperation.Along with the effect of information system in production and management becomes more and more important, safety problem has become the matter of utmost importance of Information System configuration.
In large organization, the information system that covers the production and operation business is made of many autonomous systems usually, because the different in kind of the related business of information system, and in a single day these operating information systems break down to producing and the difference of the influence of management, its security protection requires also different, is reflected in aspects such as safety protection technique that the different business information system adopts and safety grades require and has very big-difference.Because safe class difference, employing technology difference are different with management system, work in coordination with demand although there is a large number of services between the information system of different safety class, but because of there not being the approach of suitable solution business cooperation safety problem, it is fine satisfied that the collaborative demand of corresponding business be can not get always.
For realize in the tissue or between tissue full-service collaborative, can only adopt the security protection system of identical safe class, there is following point in this solution:
(1) if adopts the security protection system of high safety grade, though guaranteed to organize the safety of internal information system, but for the investment that guarantees safety will be very huge, bring very big difficulty also for professional style of opening and autgmentability, the business cooperation between the tissue then still is difficult to realize.
(2) if adopt the security protection system of suitable safe class; then do not obtain enough protections with closely-related operation systems such as production safeties; the risk that security incident takes place improves greatly; the loss that its security incident caused is not only that tissue is difficult to bear, and will bring abominable social influence.
For solving above-mentioned safe interoperability problem of striding the distributed system business cooperation of safe class and security protection system, the present invention makes up a kind of security mechanism of striding the information system interoperability of security domain, makes the business cooperation of information system under this mechanism be able to safety and carries out.
3, summary of the invention
The invention discloses a kind of safe interoperability mechanism at business cooperation between a plurality of distributed information systems (can be isomery), make under this mechanism, the business cooperation of cross-region distributed intelligence system can access effective safeguard protection.
For achieving the above object, information system and information infrastructure thereof that the present invention will adopt same security protection system to cover are referred to as a security domain, in this security domain, all users and equipment (comprising information system) all need to obtain safety system authentication, and services such as complete digital certificate production, management, granting and function of use and encryption, signature are provided.The management of each security domain is autonomous, is not subjected to the influence and the restriction of other information systems or security protection system.
What safe interoperability function was provided among the present invention must be an autonomous system, this system can be made of one or more equipment and related software, be called safe inter-operation system, the information system that this system and each need be carried out business cooperation has and has only an access interface.
Safe inter-operation system constitutes an independently security domain, in this security domain, all are connected to the user of safe inter-operation system and the authentication that equipment must obtain safe inter-operation system, safe inter-operation system also provides services such as independent and complete digital certificate production, management, granting and function of use and encryption, signature except that the interoperability function is provided.Each safe inter-operation system constitutes an independently security domain, and its management is autonomous, is not subjected to the influence and the restriction of other safe inter-operation system or security protection system.
Two safe inter-operation systems directly link to each other by network, be called two adjacent, adjacent safe inter-operation systems and can directly transmit interoperability request and interoperability service data mutually, but two safe inter-operation systems must be by authentication mutually.
The flanking sequence (claiming safe interoperability route) that two safe inter-operation systems are set up by the safe inter-operation system of another or a plurality of adjacent link can transmit interoperability request and interoperability service data mutually, but need to communicate by authenticating mutually, being called between all two adjacent safe inter-operation systems on the flanking sequence.
Safe inter-operation system can have three kinds of operational modes: simple and safe interoperability, symmetrical safe interoperability and branch level security interoperability.
Simple and safe interoperability is made of the individual security inter-operation system, safe inter-operation system only links to each other with customer information system, be directly connected to equipment on the safe inter-operation system and user in the customer information system and must obtain the digital certificate that safe inter-operation system is provided, and the authentication by safe inter-operation system when interoperability; The security protection system of customer information system must be provided digital certificate to the safety inter-operation system, and when interoperability the safety inter-operation system is authenticated.Simple and safe interoperability is applicable to that two information systems of business cooperation are in and manages the position uniformly.The interoperability process of simple and safe interoperability pattern is seen Fig. 1.
The safe interoperability of symmetry is made of two or more adjacent safe inter-operation systems that are defined as symmetrical safe interoperability mode operation, customer information system inserts a safe inter-operation system respectively, also provides digital certificate for the safe interoperability that connects, and when interoperability the safe inter-operation system that connects is authenticated; Correspondingly safe inter-operation system also must be provided digital certificate to the customer information system that connects, and when interoperability the customer information system that inserts is authenticated; Two adjacent safe inter-operation systems of symmetry must be provided digital certificate to the other side, and when interoperability the adjacent inter-operation system of symmetry are authenticated.The safe interoperability of symmetry is applicable to that two information systems of business cooperation are in different geographical position, but the information security of cross-region is given security by the safety inter-operation system.The interoperability process of the safe interoperability pattern of symmetry is seen Fig. 2.
Divide the level security interoperability to constitute by two or more adjacent safe inter-operation systems that are defined as multipole safe interoperability mode operation, customer information system inserts a safe inter-operation system respectively, also provides digital certificate for the safe interoperability that connects, and when interoperability the safe inter-operation system that connects is authenticated; Correspondingly safe inter-operation system also must be provided digital certificate to the customer information system that connects, and when interoperability the customer information system that inserts is authenticated; Two adjacent safe inter-operation systems must be provided digital certificate to the other side, and when interoperability adjacent inter-operation system are authenticated.Divide the level security interoperability to be applicable to that two information systems of business cooperation are to distribute to dispose, but the business cooperation information security of cross-region is given security by the safety inter-operation system.Divide the interoperability process of level security interoperability pattern to see Fig. 3.
Simple and safe interoperability, symmetrical safe interoperability, branch level security interoperability can be mixed use.
According to digital certificate granting and the authentication between above-mentioned safe inter-operation system and the customer information system,, can know because of the management in each security domain and operation are independently:
(1) if each security domain is safe, then whole service is collaborative also is safe;
(2) be unsafe if wherein security domain is arranged, and adjacent security domain is safe, because of this security domain and other security domain be connected and interoperability request and service need obtain the authentication of adjacent security domain, therefore can not destroy the safety of adjacent security domain, otherwise adjacent security domain also is unsafe, with hypothesis contradiction.Therefore other security domain is safe, i.e. the safety of indivedual security domains failure can not cause the safety failure to be propagated by flanking sequence, thereby also can not cause the general safety failure.
Principle of the present invention is: by independently authentication mutual between the security domain, business cooperation information is transmitted between the security domain that interlinks, and be guaranteed to transmit information security.
4, description of drawings
Fig. 1: simple and safe interoperability pattern
Fig. 2: symmetrical safe interoperability pattern
Fig. 3: divide level security interoperability pattern
5, embodiment
The present invention realizes cross-region, the step of operation system interoperability is as follows to stride security domain between (different security protection systems, different safety class):
Step 1: user service information system, each safe inter-operation system that independent security protection system is covered are divided into separate security domain.
Step 2: distribute according to business cooperation and user service information system, according to each security domain principle independently, configuration and deployment secure inter-operation system, and the linking relationship between clear and definite each security domain (flanking sequence or interoperability route).
Step 3:, provide secure digital certificate to the other side for each adjacent security domain configuration the other side's safety certification interface.
Step 4: when carrying out interoperability between the operation system, initiating interoperability requesting users operation system will authenticate the identity of the safe inter-operation system that inserts, by sending the interoperability request of business cooperation after the authentication again; If the safe inter-operation system that inserts by authentication, does not then stop the interoperability request of business cooperation.
Step 5: safe inter-operation system will authenticate the subscriber service system identity that inserts when the interoperability request that receives business cooperation, provides the interoperability service again after authenticating, and is ready to the interoperability service result of business cooperation; , then do not refuse the business cooperation request by authentication.
Step 6:, then need to utilize adjacent safe inter-operation system to generate a safe interoperability route that arrives interoperability targeted customer operating information system if two systems of business cooperation interoperability directly insert same safe inter-operation system.If can not generate safe interoperability route, the interoperability request of business cooperation will be dropped.
Step 7: adjacent safe inter-operation system authenticates mutually, authenticate mutually with targeted customer's operating information system, all authentications are passed through, and then set up a business cooperation interoperability data transmission channel along safe interoperability route between the user service information system of business cooperation interoperability requesting users operating information system and the service of business cooperation interoperability; Any adjacent authentification failure, then the request of business cooperation interoperability is terminated.
Step 8: provide the subscriber service system of business cooperation interoperability service to carry out the interoperability request, and service result is sent to adjacent safe inter-operation system.The process that business cooperation interoperability service result sends is identical with the process that the request of business cooperation interoperability sends, but flanking sequence (safe interoperability route) opposite (the safe interoperability route that sends service result can not be identical flanking sequence with the safe interoperability route that sends the interoperability request), also must authenticate earlier, and then the transmission service result, realize with step 5 to step 7.
Step 9: if business cooperation interoperability service result can not arrive business cooperation interoperability requesting users operating information system, the service of business cooperation interoperability will be abandoned.

Claims (8)

1. distributed many security domains isomery information system security mutual operation method, it is characterized in that, at the business cooperation between a plurality of distributed heterogeneous information systems (a plurality of information systems can be isomorphism or isomery, can require cross-region distribute to dispose or stride tissue deployment) according to work organization, a kind of safe interoperability mechanism is proposed, make under this mechanism, can realize striding the safety of the business cooperation interoperability of safe class and safety system.
2. a kind of distributed many security domains isomery information system security mutual operation method as claimed in claim 1, it is characterized in that, the management of each security domain (by the information system and the information infrastructure thereof of same safety system covering) is independently, be not subjected to the influence and the restriction of other information systems or safety system, the authentication that all users in the security domain and equipment (comprising information system) all must obtain safety system, each security domain provides independently complete certificate production, management, granting and application function, and service such as encryption and decryption, signature.
3. a kind of distributed many security domains isomery information system security mutual operation method as claimed in claim 1, it is characterized in that, provide business cooperation between two or more information systems the interoperability function must be an independently system, this system can be made of one or more equipment and related software, and have services such as safety system needed complete certificate production, management, granting and application function and encryption and decryption, signature, constitute an independently security domain, correspondingly be called safe inter-operation system.
4. as the described a kind of distributed many security domains isomery information system security mutual operation method of claim 1, claim 2 and claim 3, it is characterized in that, can only exist between two security domains adjacent, communicating and being separated by three kinds one of concerns.
Neighbouring relations: have the network interface channel between two security domains, and be defined as adjacent safe inter-operation system mutually, then by this network channel, can carry out the transfer of data of interoperability request and interoperability service between two security domains, and must pass through mutual authentication between two security domains and just can carry out above-mentioned transfer of data; Adjacent security domain needs to provide letter of identity to adjacent the other side respectively, and when transmitting, the data that needs carry out the service of interoperability request and interoperability carry out mutual authentication, that is: it is adjacent with security domain B to establish security domain A, safety system A will equipment and the system of security system A provide letter of identity Ka in safety system B, safety system B will equipment and the system of security system B provide letter of identity Kb in safety system A, when needing to carry out interoperability request or interoperability service data transfer between two security domains, safety system A need authenticate for the letter of identity Ka of security domain B to providing, safety system B also needs to authenticate for the letter of identity Kb of security domain A to providing simultaneously, claim mutual authentication, no matter which side the transfer of data of interoperability request and interoperability service initiated by, and described mutual authentication all must be carried out.
The relation of communicating: establish two security domain A and security domain B and communicate, there is a flanking sequence at least in the neighbouring relations of expression by defining in the safe inter-operation system, and wherein the two ends of flanking sequence are respectively security domain A and security domain B; By the connection in twos of this flanking sequence, can set up a data transmission channel from security domain A to security domain B, make the data that can utilize this channel transfer interoperability request and interoperability service between security domain A and the security domain B; Except that the security domain A and security domain B at two ends, other security domain is safe inter-operation system on the flanking sequence, and the data forwarding function of interoperability request and interoperability service is provided; Two associated security domains of each neighbouring relations in the flanking sequence all must be provided letter of identity (neighbouring right requires the description in 6) to adjacent the other side, when the data of needs transmission or forwarding interoperability request and interoperability service, two associated security domains of each neighbouring relations must carry out mutual authentication on the flanking sequence.
The relation of being separated by: do not have neighbouring relations between two security domains, also do not have flanking sequence, or do not provide letter of identity, can not carry out the transfer of data of interoperability request and interoperability service between described two security domains to adjacent the other side.
5. as the neighbouring relations of claim 3, the described safe inter-operation system of claim 4, the relation of communicating and the relation of being separated by, it is characterized in that, only define and describe safe inter-operation system in each safe inter-operation system with neighbouring relations, search by flanking sequence constitutes the relation of communicating, the relation of determining to be separated by (non-conterminous, do not communicate).
6. as safe inter-operation system as described in the claim 3, it is characterized in that each safe inter-operation system can have three kinds of operational modes according to the needs of business cooperation: simple and safe interoperability, symmetrical safe interoperability and divide the level security interoperability.
Simple and safe interoperability pattern: safe inter-operation system only links to each other with customer information system, and customer information system and safe inter-operation system constitute independently security domain respectively, carry out business cooperation between the customer information system and must be undertaken by the safety inter-operation system.
The safe interoperability pattern of symmetry: the interoperability request of all services must be from the adjacent safe inter-operation system of symmetry or the safe inter-operation system that communicates, and all neighbouring relations are symmetrical neighbouring relations on the flanking sequence of the safe inter-operation system that communicates; Must provide the interoperability service by the safe inter-operation system of symmetry (and adjacent or communicate) from the interoperability request of customer information system (or interoperability request of initiating automatically); Interoperability request from other position will be rejected.
Divide level security interoperability pattern:, can be the tree-shaped or netted deployment that skeleton is realized information system with the inter-operation system according to the needs of information system distribution deployment and different levels business cooperation with the safe inter-operation system of hierarchical pattern operation.
7. as the symmetrical safe interoperability pattern of safe inter-operation system as described in claim 3 and the claim 6 with divide level security interoperability pattern, it is characterized in that, with the safe inter-operation system of the safe interoperability mode operation of symmetry and with minute safe inter-operation system of level security interoperability mode operation except that needs are provided with its operational mode, only its adjacent safe inter-operation system information need be set, the relation of communicating is determined automatically by the flanking sequence search.
8. as the safe inter-operation system in a kind of distributed many security domains isomery information system security mutual operation method as described in claim 1 and the claim 3, it is characterized in that simple and safe interoperability, symmetrical safe interoperability and branch level security interoperability can be used with in distributed heterogeneous information system business cooperation.
CN201110028633XA 2011-01-27 2011-01-27 Safe interoperation method for distributed multi-security domain heterogeneous information system Pending CN102075541A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110028633XA CN102075541A (en) 2011-01-27 2011-01-27 Safe interoperation method for distributed multi-security domain heterogeneous information system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110028633XA CN102075541A (en) 2011-01-27 2011-01-27 Safe interoperation method for distributed multi-security domain heterogeneous information system

Publications (1)

Publication Number Publication Date
CN102075541A true CN102075541A (en) 2011-05-25

Family

ID=44033884

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110028633XA Pending CN102075541A (en) 2011-01-27 2011-01-27 Safe interoperation method for distributed multi-security domain heterogeneous information system

Country Status (1)

Country Link
CN (1) CN102075541A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103376800A (en) * 2012-04-30 2013-10-30 通用电气公司 System and method for securing controllers
CN110263138A (en) * 2019-06-04 2019-09-20 能人网络科技有限公司 Internet product user address list is classified by industry (occupation) and lookup method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050262232A1 (en) * 2004-05-20 2005-11-24 Alcatel Architecture for configuration and management of cross-domain network services
CN101106458A (en) * 2007-08-17 2008-01-16 华中科技大学 A distributed access control method based on risk
CN101754221A (en) * 2008-12-19 2010-06-23 ***通信集团山东有限公司 Data transmission method between heterogeneous systems and data transmission system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050262232A1 (en) * 2004-05-20 2005-11-24 Alcatel Architecture for configuration and management of cross-domain network services
CN101106458A (en) * 2007-08-17 2008-01-16 华中科技大学 A distributed access control method based on risk
CN101754221A (en) * 2008-12-19 2010-06-23 ***通信集团山东有限公司 Data transmission method between heterogeneous systems and data transmission system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
金莉: "面向多域的安全互操作机制研究", 《中国博士学位论文全文数据库》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103376800A (en) * 2012-04-30 2013-10-30 通用电气公司 System and method for securing controllers
CN103376800B (en) * 2012-04-30 2016-06-29 通用电气公司 For protecting the system and method for controller
CN110263138A (en) * 2019-06-04 2019-09-20 能人网络科技有限公司 Internet product user address list is classified by industry (occupation) and lookup method

Similar Documents

Publication Publication Date Title
Nguyen et al. Blockchain for 5G and beyond networks: A state of the art survey
CN110071969B (en) Data security sharing method based on multi-chain architecture
CN103763099B (en) Electric power security communication network based on quantum key distribution technology
CN106134152B (en) For method, equipment and the device of social WI-FI mesh network to be added
CN109741068B (en) Online banking cross-row signing method, device and system
CN107453868A (en) A kind of safe and efficient quantum key method of servicing
CN101931613B (en) Centralized authenticating method and centralized authenticating system
CN108429759A (en) Decentralization stores safety implementation method
CN102006276A (en) Licensing and certificate distribution via secondary or divided signaling communication pathway
CN103327084A (en) Public and private hybrid distributed cloud storage system and cloud storage method
CN103269332A (en) Safeguard system for power secondary system
CN111106930B (en) Block chain network construction method and device and block chain network system
CN113079215B (en) Block chain-based wireless security access method for power distribution Internet of things
CN109617875A (en) A kind of the secure accessing platform and its implementation of terminal communication network
CN109905371A (en) Two-way encrypted authentication system and its application method
CN108848111A (en) A kind of decentralization Virtual Private Network construction method based on block chain technology
CN109714166A (en) A kind of mobile distribution method, system, terminal and storage medium based on quantum key
CN104065485A (en) Power grid dispatching mobile platform safety guaranteeing and controlling method
CN103916363A (en) Communication security management method and system for encryption machine
CN113779607A (en) Industrial data asset management method, system and equipment
CN108964897A (en) Identity authorization system and method based on group communication
CN106027473A (en) Identity card reading terminal and cloud authentication platform data transmission method and system
CN104660583A (en) Encryption service method based on Web encryption service
CN112422500A (en) Cross-platform data transmission method and device, storage medium and electronic device
JP2022548185A (en) Blockchain device with restricted transactions

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20110525