Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for user identity authentication in authentication service cloud

A user identity authentication and authentication service cloud technology, applied in the authentication service cloud for the user identity authentication field, can solve the problems of service interruption, unfavorable resource elastic deployment, safe and reliable operation, etc.

Inactive Publication Date: 2016-06-08
SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The cloud computing system uses virtualization technology to realize the flexible deployment of resources. At present, most security management systems such as identity authentication and authority management run on independent servers, which is not conducive to the flexible deployment and safe and reliable operation of related resources. Once the management system fails, will result in service interruption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for user identity authentication in authentication service cloud

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] The content of the present invention is described in more detail below:

[0014] Before the user uses cloud computing-related applications and services for the first time, user identity information is entered, such as: user identity information M is stored in the authentication service cloud, and before the user accesses cloud computing-related applications and services, the application and service prompts the user Enter the relevant identity information, the application and service will send the user's identity information M' to the authentication service cloud, and the authentication service cloud will complete the comparison with the user's identity information M stored in its own database. If M=M', it will be considered that the user has provided identity information If it is consistent with the storage in the database, the authentication is passed; otherwise, the relevant identity information is deemed to be different, and the authentication fails.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for user identity authentication in authentication service cloud, and relates to the field of cloud computing security and secrecy. With the user identity authentication function provided by the authentication service cloud, the security of applications and services in a whole cloud computing system can be guaranteed, illegal users can be stopped from accessing the applications or services in the cloud computing system, and it can be guaranteed that the related applications and services in the cloud computing system are not accessed beyond authority or malevolently modified in the whole life cycle. When identity information provided by a user is not consistent with identity information stored in the authentication service cloud, information indicating that a related request does not pass identity authentication service authentication is returned, and thus the user is stopped from accessing the related applications or services.

Description

technical field [0001] The invention relates to the field of cloud computing safety and security, in particular to a method for user identity authentication in an authentication service cloud. Background technique [0002] In the past half a century, the development of information technology, especially the progress of computer and Internet technology has greatly changed people's work and life style. A large number of enterprises have begun to adopt the information service model with the data center as the business operation platform. After entering the new century, the data center has become unprecedentedly important and complex, which poses a new challenge to the management work, and a series of problems follow one after another. How can enterprises create services quickly and manage business efficiently through data centers? How to dynamically adjust resources according to demand to reduce operating costs? How to use and manage various resources more flexibly, efficien...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/08H04L67/10
Inventor 赵瑞东元河清李传忠孙大军
Owner SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products