Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User identity authentication method suitable for transparent computing system and system configuration method

A user identity authentication and transparent computing technology, which is applied in the configuration field of transparent computing systems, can solve problems such as inability to identify user identities in real time, user data leakage, etc., and achieve the effects of improving user experience, expanding the scope of application, and facilitating investigation and positioning

Active Publication Date: 2017-03-29
CENT SOUTH UNIV
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The purpose of the present invention is to provide a user identity authentication method suitable for a transparent computing system and a configuration method of a transparent computing system using the user identity authentication method, so as to solve the problem that the current single identity authentication of transparent computing easily causes user data leakage and requires assistance from a third party and technical problems that cannot identify users in real time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identity authentication method suitable for transparent computing system and system configuration method
  • User identity authentication method suitable for transparent computing system and system configuration method
  • User identity authentication method suitable for transparent computing system and system configuration method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] figure 1 Shows the overall structural block diagram of the transparent computing system of this embodiment, the client hardware platform is a mobile tablet with x86 architecture, and its hard disk is pre-burned with a network boot program NBP (a network boot program written according to an open source project); the server side includes Two parts: the authentication server responsible for user rights information management (that is, the Web authentication server) and the storage server responsible for user operating system image storage. The storage server needs to be configured with iSCSI service and DHCP service, and the web authentication server needs to be configured with MySQL service and Tomcat service (see Example 3).

[0040] see figure 2 , the user identity authentication method applicable to the transparent computing system of this embodiment includes the following steps:

[0041] S201: The client is powered on and logged in, and first performs network confi...

Embodiment 2

[0052] see Figure 5 , the user identity authentication method applicable to the transparent computing system of this embodiment includes the following steps:

[0053] When the user boots up and logs in, the following authentication steps are performed:

[0054] S1: The client sends a login request packet to the authentication server, the login request information (see image 3 ) including the authentication server address, username and password.

[0055] S2: The authentication server queries the background database, obtains the operating system permission list that the user can start, writes text information and sends it to the client, and the text information (see Figure 4 ) includes the user ID, OS number, OS name, and terminator.

[0056] S3: The user selects the operating system to be remotely loaded through the client, and initiates a remote loading request to the storage server. The loading request information includes the user name, password, storage server address...

Embodiment 3

[0062] see Figure 6 , using the system configuration method of the transparent computing system of the user identity authentication method of embodiment 1 or embodiment 2, comprising the following steps:

[0063] 1) Add network configuration and user authentication policy codes to the bootloader NBP source code, and recompile to generate the NBP bootloader;

[0064] 2) Erase the main boot partition MBR in BIOS mode on the client's hard disk, and burn the compiled NBP boot program to the original main boot partition MBR location;

[0065] 3) Configure the MySQL and Tomcat services of the authentication server, and deploy the identity authentication background program on the Tomcat of the Web authentication server;

[0066] 4) Configure the iSCSI service of the storage server, bind the user operating system image to the user name and password, modify the access rights of the operating system image, and set the IP address that can be accessed;

[0067] 5) Modify the configurat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a user identity authentication method suitable for a transparent computing system and a system configuration method. The user identity authentication method comprises: when a user boots up and logs in, a client transmits a login requesting information to an authentication server, and the authentication server queries a background database, acquires an operating system authority list bootable by the user and transmits the list to the client; the user selects the operating system and invokes a remote loading request to a storage server; and the storage server authenticates a user name and passwords of the client, checks a mirror image configuration file of the operating system of the user after the authentication passes, and judges whether the authentication succeeds according to the IP of the client and mirror image IP settings of an operating system to be booted up. The system configuration method is used for configuring the transparent computing system using the user identity authentication method. According to the user identity authentication method suitable for the transparent computing system and the system configuration method, which are provided by the invention, the authority management of the user is achieved, a plurality of individual services can be provided, and the user experience is perfected.

Description

technical field [0001] The invention relates to the field of transparent computing systems, in particular to a user identity authentication method suitable for a transparent computing system and a configuration method of a transparent computing system using the user identity authentication method. Background technique [0002] Transparent computing is a kind of user does not need to perceive the specific location of the computer operating system, middleware, application program and communication network, but only needs to use the network from various clients (including fixed, mobile, and home) according to their own needs. The computing mode that selects and uses corresponding services (such as computing, telephone, TV, Internet access and entertainment, etc.) The characteristics of the transparent computing system mainly include the following points: [0003] Ⅰ. Separation of storage and computing. The transparent computing system is divided into two parts, the client and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/083H04L63/0876H04L63/102H04L63/20
Inventor 郑瑾李俊张尧学胡小龙张祖平
Owner CENT SOUTH UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products