A Unified Identity Authentication Platform Based on Zero Trust and Confidential Computing

An identity authentication and platform technology, applied in the field of unified identity authentication platform, can solve the problems of insecure communication between users and functional platforms, attacks, etc., and achieve the effects of rapid authentication, enhanced reliability, and low overhead.

Active Publication Date: 2022-04-22
LANZHOU UNIVERSITY
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The present invention mainly solves the insecure problem of communication between users and functional platforms in the authentication process, especially for the problem of attacks from internal users, and proposes a unified identity authentication platform based on zero trust and confidential computing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Unified Identity Authentication Platform Based on Zero Trust and Confidential Computing
  • A Unified Identity Authentication Platform Based on Zero Trust and Confidential Computing
  • A Unified Identity Authentication Platform Based on Zero Trust and Confidential Computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] In order to make the purpose, technical solution and advantages of the present invention clearer, the embodiments of the present invention will be further described below in conjunction with the accompanying drawings.

[0075] In order to better explain the innovation of the present invention, the processing process of the traditional method is explained as follows;

[0076] Please refer to figure 1 , figure 1 It is a functional schematic diagram of the platform of the present invention;

[0077] The invention proposes a unified identity authentication platform based on zero trust and confidential computing. The platform is suitable for an identity authentication scenario composed of users, a unified identity authentication platform, and a function platform in an IP network.

[0078] Specifically, it includes four stages, namely: communication establishment stage, user registration stage, function platform registration stage and login and key negotiation stage;

[00...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a unified identity authentication platform based on zero trust and confidential computing, which includes four stages, namely: communication establishment stage, user registration stage, function platform registration stage and login and key negotiation stage; wherein, the communication establishment stage It is used for the negotiation of the symmetric key SK to establish reliable communication between the user and the unified identity authentication platform; the user registration stage and the function platform registration stage realize the registration function verified by the unified identity authentication platform and the confidential computing security area, and build an anonymous authentication relationship table The function of obtaining the legal user and the legal function platform; the login and key negotiation stage realizes the function of negotiating the symmetric session key between the legal user and the legal function platform, and the symmetric session key will be used for the encryption of the subsequent transmission of private data . The invention has the beneficial effects of: ensuring the integrity and confidentiality of data in the "running state"; ensuring low overhead and low time delay in the authentication process, and realizing fast authentication.

Description

technical field [0001] The invention relates to the field of confidential computing, in particular to a unified identity authentication platform based on zero trust and confidential computing. Background technique [0002] With the complexity of the network structure and the diversification of terminal equipment, IP networks are more vulnerable to a large number of new attacks. Insider threats account for nearly 75% of all security breach incidents, and the two major sources of insider threats are data leakage and privilege abuse, which account for 62% and 19% of threats respectively. In practical applications, the application scenario network structure includes three parts: user (U), unified authentication platform (UCP), and functional platform (FP). The request sent by the user to the target FP is legally authenticated by the UCP and then forwarded to the FP for confirmation. In this process, due to the widely dispersed geographical location of users and the considerati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57G06F21/32G06F21/44G06F21/45
CPCG06F21/57G06F21/32G06F21/44G06F21/45
Inventor 刘忻彭博杨晶晶李恩熠焦文静
Owner LANZHOU UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products