Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cloud computing access method based on cross domain identity authentication

An identity authentication and access method technology, applied in the field of identity authentication and cloud computing technology, can solve the problems of complex data, inconvenient management of cross-domain identity authentication, etc., and achieve the effect of ensuring confidentiality

Inactive Publication Date: 2017-05-10
JINAN INSPUR HIGH TECH TECH DEV CO LTD
View PDF2 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when the number of management domains is relatively large, the data that each management domain needs to maintain will be very complicated, which will bring great inconvenience to the management of cross-domain identity authentication.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud computing access method based on cross domain identity authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] Configure the cloud computing access system based on cross-domain authentication:

[0031] The system consists of a local identity authentication module, a local authorization decision-making module, a local identity and authority management module, a cross-domain authority query module, a third-party identity authentication module, and a third-party authority service module.

[0032] The local identity authentication module completes the identity authentication function of the visited entity, if the entity belongs to the management domain, then directly identify the identity and authority of the entity; if the entity is an entity of other management domains, it needs to pass The cross-domain permission query module performs cross-domain identity authentication and authorization.

[0033] The local identity and rights management module manages user identities and their access rights, including changes in user identities and changes in user rights.

[0034] The local au...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cloud computing access method based on cross domain identity authentication. The method is realized by a local identity authentication module, a local authorization decision module, a local identity and authority management module, a cross domain authority inquiring module, a third-party identity authentication module and a third-party authority service module. The cloud computing access method based on cross domain identity authentication has the following characteristics: (1) subject identity, attribute and authority information are described in a standard manner, and certification authority of a subject, authentication validity, the attribute of the subject and the authority of the subject in a targeted organization can be clear by the standard description; (2) request query related to identity authentication and response messages in cross domain identity authentication are abstracted, a standard format for different types of messages is defined, and identity information which is transmitted among different domains can be understood; and (3) confidentiality, integrity, reliability and identifiability of transmitted messages are guaranteed by a high-reliability encryption transmission mechanism, and information of authentication of users cannot be wiretapped or tampered.

Description

technical field [0001] The invention relates to the fields of cloud computing technology, identity authentication, etc., and specifically relates to a cloud computing access method based on cross-domain identity authentication. Background technique [0002] The main purpose of identity authentication technology is to verify the real identities of both communication parties and prevent illegal users from pretending to be legitimate users to access sensitive information resources. In secure network communication, all parties involved in the communication must prove their identities through some form of authentication mechanism, and verify that the user's identity is consistent with what he claims, and then the user access control and records can be realized. Cross-domain authentication means that in a cloud computing environment, resource providers and users may span different management domains, so cross-domain authentication is needed to solve the problem of mutual use of re...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/08H04L9/3271H04L63/0428H04L63/10H04L63/102H04L63/108
Inventor 王金超于治楼罗清彩李秀芳
Owner JINAN INSPUR HIGH TECH TECH DEV CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products