Trust-based cross-domain authentication method

An authentication method and trust domain technology, applied in the field of trust-based cross-domain authentication, can solve cumbersome and inefficient problems, achieve the effect of simplifying the cross-domain authentication process and improving the efficiency of cross-domain authentication

Inactive Publication Date: 2010-11-17
浙江省人大常委会办公厅信息中心
View PDF3 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The present invention provides a trust-based cross-domain authentication method aiming at the cumbersome and inefficient problem that the authentication server verifies non-local user credentials in cross-domain authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] A trust-based cross-domain authentication method includes the following steps:

[0013] Step (1) Establish a trust relationship based on the PKI authentication system between authentication servers in different trust domains. The specific method is: assign the authentication servers in different trust domains to the same trusted authentication center CA in the PKI authentication system, and the trusted authentication center CA issues certificates for each authentication server. According to the PKI authentication theory, all of a CA Entities automatically trust all certificates issued by the CA, thus establishing a trust relationship between authentication servers. Here, at least two trust domains may be included, and correspondingly, there are at least two authentication servers. The entity may be a user, an application server, and the like.

[0014] When the entity a of domain A in the above at least two trust domains wants to access the entity b of domain B across ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a trust-based cross-domain authentication method. The conventional method has the disadvantages of poor compatibility and low efficiency. The method comprises that: a first authentication server in a first trust domain performs identity authentication on a first entity, and sends an authentication result to a second authentication server in a second trust domain; the second authentication server verifies whether the first authentication server is lawful by utilizing the pre-established PKI authentication-based trust relationship, if the first authentication server is lawful, the process is continued, and if the first authentication server is not lawful, the process is finished; and finally, the second authentication server judges whether the received authentication result indicates the first authentication server passes the authentication, if the authentication result indicates the first authentication server passes the authentication, the cross-domain authentication is successful, and if the authentication result indicates the first authentication server does not pass the authentication, the cross-domain authentication is failed. The method simplifies the cross-domain authentication flow and improves the cross-domain authentication efficiency.

Description

technical field [0001] The invention belongs to the field of network security, and in particular relates to a trust-based cross-domain authentication method. Background technique [0002] Cross-domain authentication refers to authentication between clients and servers logged in in different domains. In recent years, with the development of informatization and the needs of information security, various departments, industries, and regions have established corresponding certificate management systems and identity authentication systems, and more and more disputes have emerged between enterprises and institutions in different domains. For business transactions, cross-domain secure access has become an inevitable requirement in a large-scale distributed environment, especially in a multi-domain environment. [0003] At present, when an entity in one domain accesses an entity in another trusting domain across domains, cross-domain authentication generally adopts a method in whic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 倪永军金恭华张忠民唐明吴卿张奇锋赵俊杰郁伟炜
Owner 浙江省人大常委会办公厅信息中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products