Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cloud computing secure access method, device and system

A secure access and cloud computing technology, applied in the field of communication, can solve problems such as poor security and achieve the effect of improving security

Active Publication Date: 2012-10-24
GUANGZHOU BINGO SOFTWARE
View PDF7 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Although the existing cloud machine login method has a certain security effect, if the user name and password of the client are leaked, or the user name and password are stolen during the transmission process, then the illegal user can have the authority to log in to the cloud machine, so the existing The method of logging into the cloud machine is less secure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud computing secure access method, device and system
  • Cloud computing secure access method, device and system
  • Cloud computing secure access method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0036] An embodiment of the present invention provides a cloud computing security access method, comprising: obtaining authentication information input by the client, the authentication information including user name, common password, dynamic password and the address of the cloud machine to be accessed; determining the client's A client identification that cannot be changed by itself; when it is judged that the common password corresponding to the user name is...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cloud computing secure access method, a device and a system. The method includes obtaining authentication information input by a client, determining a client identification of the client, which can not be changed voluntarily, when a common password corresponding to a user name is determined to be correct, determining whether a corresponding relationship between the client identification and the address of a cloud machine exists in a data base of a distribution authentication server or not through the distribution authentication server, determining whether a dynamic password is correct or not as well, if the corresponding relationship exists and the dynamic password is correct, informing the client of a successful logging, otherwise, informing the client of a failed logging, and when the password information corresponding to the user name is determined to be incorrect, informing the client of a failed logging. By means of the scheme, even though an illegal user steals the user name and the common password, the illegal user is incapable of establishing the corresponding relationship between the client identification and the address of the cloud machine, and the illegal user can not obtain a permission of logging in the cloud machine through stealing the common password, and thereby the safety of logging in the cloud machine is improved.

Description

technical field [0001] The present invention relates to the technical field of communications, and more specifically, to a cloud computing security access method, device and system. Background technique [0002] Cloud computing is an Internet-based computing method in which shared hardware and software resources and information are provided to computers and other devices on demand. The cloud platform provides services based on cloud computing. It is the supplier who provides the cloud platform, and the customer enjoys the service of the cloud platform provided by the supplier, so that the customer does not have to build his own company's infrastructure, and can completely rely on the cloud platform to create a new mirror instance . [0003] In specific cloud computing services, the provider's infrastructure can conveniently provide users with cloud machines. Users can use remote connection tools to connect to cloud machines, just like using a real physical machine. When t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/083H04L63/0876
Inventor 刘忻袁龙浩
Owner GUANGZHOU BINGO SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products