Cloud computing resource secure access method, device and system
A resource security and resource access request technology, applied in the field of cloud computing resource security access, to achieve the effect of flexible access to resources, improving efficiency and ensuring security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0047] The basic idea of the present invention is that the server of the resource information entrusting provider provides related information of resources for the login user; after the server of the cloud computing service provider receives the resource access request sent by the user, it confirms whether the resource access request carries the access control certificate of the resource to be accessed, If not, obtain the service provider server information to which the resource to be accessed belongs according to the relevant information of the resource to be accessed carried in the resource access request, and send an authentication request to the service provider server to which the resource to be accessed belongs; the authentication request carries the user's identity Information and resource information to be accessed, the service provider server performs identity authentication and access control on the user according to the identification information of the user, and is...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 