RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

IVK Jupiter

Product
Developers: IVK
Last Release Date: 2014/12/15
Technology: Cybersecurity - Authentication,  Means of enciphering are cybersecurity

In May, 2011 it is announced obtaining the patent of Federal Service for Intellectual Property, to patents and trademarks of the Russian Federation for a method of management of identification of users of information resources of the heterogeneous computer network. The patent is registered in the State register of inventions of the Russian Federation (No. 2415466).

Identification of users belongs to the most important subsystems of cybersecurity, its results define to what data and to what functions of information or automated system (the IC and AS, respectively) the user should get access for accomplishment of the job responsibilities and to what – no. The system connecting job responsibilities of the employee with his admissible roles in an information system also relies on identification. At the technical level the subsystem of identification influences practically all elements of infrastructure and the application software since on their use the organization always imposes any restrictions. The problem of reliable identification is sharply complicated both a geographically-distributed structure of the IC, and sharing in them different computing platforms and telecommunication means (heterogeneity).

Application in an information system of backbone software of the class middleware "IVK Jupiter" is the cornerstone of the method of management of identification of users developed by IVK company. In this software, in particular, the high-level model of security whose basic concepts completely correspond to concepts of the job descriptions and other regulating documents regulating different aspects of cybersecurity at the organizational level of the enterprise is implemented. Besides, the management system for identification of users relies on the built-in means of authentication and other guaranteed services "IVK Jupiter".

Management tools identification of users are issued in the form of the specialized subsystem which received the name "IVK Jupiter. IdentityManager" (further: "IVK Jupiter.IM"). In it the principle of single registration (SingleSign-On, or SSO) the official in the IC and AS is implemented. Besides, the subsystem provides the centralized safe storage of the identification parameters necessary for authorization of users in different applied subsystems of the IC and AS. As such parameters any data (passwords, keys, certificates, etc.) can be used, and their transfer to a subsystem to which the user needs to get access is made automatically. In IVK Jupiter.IM also the possibility of tracking of a status of the user sessions in application programs and completion of such sessions is in full implemented at the official's exit from the main controlling system – "IVK Jupiter".

The subsystem of IVK Jupiter.IM has the client-server architecture. The server provides storage of identification parameters and their issue at the request of clients of IVK Jupiter.IM. As a rule, the IVK Jupiter.IM server is combined with a security server of IVK Jupiter, AS working on the main machine of an automation object. In turn, the client software of IVK Jupiter.IM is automatically started after successful authorization of the official in an information backbone of IVK Jupiter. This window application provides to the user the simple interface for start and a stop of all permitted applications and also obtaining the additional information about them. Let's note that interaction of clients and the IVK Jupiter.IM server uses the means of the guaranteed protected data transmission provided by the IVK Jupiter environment.

"IVK Jupiter.IM" is the modular product giving an opportunity of accumulation of functionality using the built-in functional units – plug-ins (plugins). Using this mechanism basic opportunities of IVK Jupiter.IM – administration of accounts of users of IVK Jupiter, providing service of single registration (SSO) – can be expanded feature set of administration of external systems: LDAP, MS Active Directory directories, security subsystems of some DBMS. At the same time IVK Jupiter.IM allows to establish logical relationships between different credentials of one user. Besides, IVK Jupiter.IM provides the program interface (Application Programming Interface, API) which allows to develop specific plug-ins for the solution of non-standard tasks.

Let's emphasize that implementation of a management system for identification of users based on full-function software of the class middleware is extremely user-friendly. On the one hand, it guarantees high security, reliability and performance of a subsystem of identification, and with another, – minimizes work on its administration. Moreover, in geographically distributed heterogeneous information systems softwares IVK Jupiter provides to application programs a number of general-system functions. Among them we will note: a guarantee of delivery of information on any, including wireless links of data transmission, a guarantee of integrity and authenticity of the application and system software, providing the unified access to diverse computing resources. At the same time IVK Jupiter completely isolates applications from each other and from the operating system, forming the unified closed computing environment. At last, a security subsystem of a core of IVK Jupiter "is transparent" interacts with all additional resources of providing Information Security, such as means of data encryption, EDS, etc. For a number of customers essentially important that today software of IVK Jupiter, being completely Russian development, is the only backbone complex certified by FSTEC of the Russian Federation and MO Russian Federation for application in information processing systems which is the state secret.

2015:  "IVK Jupiter" works under control of 32-and 64-bit versions of OS

On July 13, 2015 the company IVK completed the inspection control which confirmed functioning of software  of IVK Jupiter on the platform of 32-and 64-bit versions MSAF Astra Linux of OS 5.0, Special Edition and distribution kits on the basis of the seventh ALT Linux.

Outputs of the company: the current version  of IVK Jupiter is compatible to all widespread Russian OS for state structures and security agencies.  "IVK Jupiter" has the existing FSTEC certificates of Russia and the Russian Defense Ministry confirming a possibility of its application for the protection and information processing containing the data which are the state secret including a signature stamp "top secret".

For July 13, 2015  IVK Jupiter independently or as a part of other products IVK is applied in the information systems of different function implemented in tens of organizations, departments and law enforcement agencies. Such systems integrate thousands of stationary and mobile objects and ensure functioning of hundreds of thousands of users. At the same time  IVK Jupiter creates technology the base of these systems, responsible for such key tasks as integration of the IC elements (new and legacy) and the guaranteed data exchange between them, the guaranteed protection of a system in general and information processed in it, use practically of any communication channels (including satellite, communication on VHF and specialized communication systems and the channel-forming equipment).

 "IVK Jupiter" allows to integrate all stationary and mobile objects of the customer where they were in a common information space. Support of old and latest versions of different OS – the most important line of software  of IVK Jupiter as many real systems created on its basis have life over twenty years and at the same time integrate both newly created and legacy stationary objects and mobile complexes.

 "IVK Jupiter" is postponed for two tens platforms as a part of which: Sun Solaris IBM zOS the machine of a series of the EU of a computer, practically all versions of MS Windows Mac OS X, a set of distribution kits Linux and also on OS MSAF, ALT Linux and Astra Linux. Inclusion in the list of compatibility of current versions of three the last OS important and timely as they are already rather widely applied in Ministry of Defence of the Russian Federation and in other law enforcement agencies. Besides, in connection with import substitution policy, serious interest in them is shown by many state structures and commercial enterprises participating in accomplishment of large state orders.