Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cloud computing-based identity authentication fusion method

A technology of identity authentication and cloud computing, applied in the field of identity authentication, achieves great commercial and social value, good scalability, and solves security risks.

Inactive Publication Date: 2014-05-07
SHANGHAI JUNYUE INTELLIGENT TECH
View PDF9 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] At present, the mainstream strong identity authentication methods mainly include dynamic password, token technology, USB Key digital certificate, biometric authentication technology, etc. These technologies have their own advantages and disadvantages, and the contradiction between convenience and security is difficult to resolve

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud computing-based identity authentication fusion method
  • Cloud computing-based identity authentication fusion method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0035] Such as figure 1 As shown in Fig. 1, a fusion identity authentication method based on cloud computing, this method adopts the unique distributed cluster management of cloud computing, integrates an infinite number of existing strong identity authentication methods through a unified standard interface, and provides users with a single entry The authentication interface, and users can independently choose authentication methods of different security levels according to their immediate needs, so as to realize the effective protection of network identity security through the public cloud and private cloud architecture in the cloud computing environment. The specific steps are as follows:

[0036] In step 101, the user independently selects an authentication method in the client, and then performs step 102;

[0037] In step 102, the request data under different authentication methods are automatically encrypted and packaged, and then step 103 is executed;

[0038] In step 1...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a cloud computing-based identity authentication fusion method. The method comprises a first step in which a client confirms authentication terminal equipment according to the choice of a user; a second step in which the request data are automatically encrypted and packaged by the client; a third step in which the client sends the request data to an application server; a fourth step in which the application server forwards the received request data to an authentication server; a fifth step in which the authentication server judges whether the user exists, if yes, the sixth step is carried out; a sixth step in which the authentication server continues to judge whether the user authentication data are correct or not, if yes, the seventh step is carried out; a seventh step in which the authentication server returns the authentication result to the application server; an eighth step in which the application server judges whether to provide corresponding application service according to the given condition, if yes, and the ninth step is carried out; and a ninth step in which the authentication server records the application execution result from the application server in the database. Compared with the prior art, the cloud computing-based identity authentication fusion method ahs the advantages of effectively solving the contradictory situation between security and convenience of the network identity and the like.

Description

technical field [0001] The invention relates to an identity authentication method, in particular to a cloud computing-based integrated identity authentication method. Background technique [0002] In the era of cloud computing, Internet information security is facing higher threats, but the security protection of the user end needs to be strengthened. It is an increasingly urgent reality to provide every user with a secure, privacy-protected, and reliable computing experience. [0003] In an information system, the protection of a user's identity is inseparable from the quality of the authentication technology. The authentication method only uses one condition to prove a person's identity, which is called single-factor authentication. It is easy to judge the user's identity by using only one condition. To be counterfeited, a person's identity can be proved by combining two different conditions, which is called two-factor authentication. [0004] Identity authentication tec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 叶丹唐荣喜
Owner SHANGHAI JUNYUE INTELLIGENT TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products