Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A security authentication method, device and system

A security authentication and authentication failure technology, applied in the field of information security, to achieve the effect of solving security authentication problems

Active Publication Date: 2019-08-30
CEC CYBERSPACE GREAT WALL
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by the present invention is to provide a security authentication method, device and system to solve the security authentication problem of service nodes in the big data platform existing in the prior art in view of the above-mentioned defects existing in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security authentication method, device and system
  • A security authentication method, device and system
  • A security authentication method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] figure 1 A schematic flow chart of the first embodiment of the security authentication method provided by the present invention, as shown in figure 1 The shown flow of the first embodiment of the security authentication method provided by the present invention includes:

[0061] S101. The service node acquires characteristic information, where the characteristic information is information generated by the service node according to system operation characteristics.

[0062] Specifically, the service node needs to obtain characteristic information according to its own operating characteristics, including static information and dynamic information of the service node.

[0063] Among them, the static information includes the current user name and specific software information. The current user name is the user name of the service node that currently has certain permissions, and the specific software is the custom-developed software or other software loaded on the service n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a security authentication method. The security authentication method is applied to a big data platform including a service node, a task management node and an authentication management node. The method comprises the following steps: the service node acquires feature information, wherein the feature information is information generated by the service node according to a system running feature; the service node calculates the feature information with a preset encryption algorithm, and determines a calculation result as fingerprint information of the service node, wherein the fingerprint information is used for performing security authentication on the service node; and the service node transmits the fingerprint information to the authentication management node. Through adoption of the security authentication method, device and system, for the service node in the big data platform, unique fingerprint information can be generated after calculation based on dynamic information and static information generated according to the running feature with a preset confidential algorithm, and is applied to security authentication, so that the problem of security authentication of the service node in the big data platform is solved fundamentally.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a security authentication method, device and system. Background technique [0002] The wave of the information technology revolution has brought about an explosive growth of information, and the amount of data in various industries has expanded rapidly. Various countries have taken big data as a national strategy for long-term planning and technical reserves. With the development of society, more and more enterprises and government agencies will use big data platforms to store and process core business data. Among them, communication, financial, medical and other data contain a large amount of personal privacy data of citizens, government agencies, confidential enterprises, etc. The data is even related to state secrets. [0003] Big data platforms usually adopt a distributed architecture. A single service node in the big data platform can infer the structure and st...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 罗春雨王俊余宝娟
Owner CEC CYBERSPACE GREAT WALL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products