Authentication method and authentication system

An authentication system and session key technology, which is applied in the field of computer networks, can solve problems such as upgrading configurations, affecting authentication services, and high pressure on IAM itself, achieving the effect of reducing authentication pressure and reducing interaction processes

Active Publication Date: 2018-11-27
BEIJING BAIDU NETCOM SCI & TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the above two technologies have the following risks: 1. Based on the authorization mechanism of key fragments, the interfaces opened by cloud services that support key fragment signatures are fixed. When customers have new needs and need to increase temporary access to the interface , the configuration of the cloud server needs to be upgraded; at the same time, after the malicious user obtains the key fragment, these open interfaces are equivalent to being completely open to it, and there is still the problem that customer data will be destroyed
2. Temporary key mechanism. Every time a web page or application requests a temporary key from the client, the client needs to apply to the cloud’s identity identification and access management system IAM. The customer’s business increases or the customer’s business logic is improper (such as repeatedly applying for temporary keys) key), the pressure on IAM itself is too great, which affects the basic authentication service

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and authentication system
  • Authentication method and authentication system
  • Authentication method and authentication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for the convenience of description, only the parts related to the related invention are shown in the drawings.

[0026] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0027] figure 1 An exemplary system architecture 100 to which embodiments of the present application may be applied is shown.

[0028] Such as figure 1 As shown, the system architecture 100 may include terminal devices 101 , 102 , a network 103 , a client server 104 , and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This application discloses an authentication method and an authentication system. The authentication method includes: sending the distribution request information of the first temporary key to the client server through the user terminal, and generating and sending the distribution request information including the user key account number and the first temporary key to the user terminal after the client server verifies the distribution request information. and the first response information of the session policy information, the client sends the cloud service request information generated based on the first response information to the cloud server through the client, and the cloud service request information carries the user key account number, session policy information and generated using the first temporary key The signature of the cloud service request information is authenticated by the cloud server based on the user key account and session policy information, and the second response information in response to the cloud service request information is sent to the client after the authentication is passed. The authentication method in the embodiment of the present application reduces the interaction process between the client server and the cloud server, and reduces the authentication pressure on the cloud server.

Description

technical field [0001] The present application relates to the technical field of computer network, in particular to the technical field of computer network authentication, especially to an authentication method and an authentication system. Background technique [0002] In public cloud services, customers (such as website owners) need to provide users (such as Internet users) with direct access to resources stored in the cloud (such as audio and video) in web pages or applications, so as to avoid unnecessary transfer of data through the customer's server. network transmission. In order to ensure security, the application programming interface provided by cloud storage is implemented by signing requests with public and private keys. When accessing web pages or applications, public and private keys need to be configured to be used. However, web pages or applications are distributed to users (netizens), and there is a risk that malicious users can decipher the customer's key, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/062H04L63/083H04L63/101H04L9/40
Inventor 邓小超
Owner BEIJING BAIDU NETCOM SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products