Uniform identity authentication method based on social characteristics in power cloud system

An identity authentication and power cloud technology, applied in the field of mobile communications, can solve problems such as forgotten user accounts or passwords, high requirements for system administrators, and inability to apply identity authentication, etc., to achieve low user participation, improve security, and increase resources. The effect of utilization

Inactive Publication Date: 2013-02-27
STATE GRID CHONGQING ELECTRIC POWER
View PDF6 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the user accounts in each business system are relatively independent, the permissions of the same account in different systems are also relatively independent. If all the business systems are simply transplanted to the power cloud, the problems that will be caused are: (1) Users need to register in different business systems. Due to the large number of systems, user accounts or passwords are often forgotten, or a set of simple user names and passwords are used by multiple systems, resulting in reduced confidentiality; (2) User accounts And use rights vary with different business systems, requiring higher requirements for system administrators
(3) The operation of cross-business systems requires multiple identity authentications, which is complex and inefficient
A mobile social authentication protocol based on PKI (Public Key Infrastructure) proposed by Justin Zhan can only be applied to identity authentication when users access the network through mobile phones, but not to identity authentication when other terminals access the network. This brings certain limitations to the identity authentication of users accessing the power cloud system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Uniform identity authentication method based on social characteristics in power cloud system
  • Uniform identity authentication method based on social characteristics in power cloud system
  • Uniform identity authentication method based on social characteristics in power cloud system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] The specific implementation of the present invention will be further explained in detail below in conjunction with the accompanying drawings.

[0016] like figure 1 Shown is the system structure diagram of the present invention. It includes: user Alice and the user's mobile phone friend group, user Alice includes the user's access terminal (such as PC) and user mobile phone A phone , the user friend group such as Bob also includes these two parts; the power cloud system includes different business systems and their corresponding authentication interfaces; the unified authentication platform includes a PKI server and an application server. like figure 2 Shown is a schematic diagram of the principle of the mobile phone (including the user's mobile phone and the friend's mobile phone), including: data communication module (M1), ticket and key security management module (M2), authentication ticket generation module (M3), token management module (M4 ), weight calculation...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a uniform identity authentication mechanism in a power cloud, and relates to a user identity authentication mode of a network terminal. The purpose of authenticating user identity is achieved by transmitting trust between a user and a friend by utilizing the social characteristics of a mobile phone of the user. The mapping relation between a user name and the mobile phone of the user is created, so that when the user uses other terminals to access a business system, the legality of the user identity is authenticated by utilizing the bills of the mobile phone, and the user performs related operations on different business systems of the power cloud in the permission scope by utilizing a grade token issued by an authentication center. The running efficiency of the power cloud is effectively enhanced, the user experience of the user is improved, the stability and the reliability of the business system are enhanced, and the complexity of maintenance is reduced at the same time. Therefore, the uniform identity authentication mechanism can be widely applied to power systems and related fields.

Description

technical field [0001] The invention relates to the technical field of mobile communication, in particular to information encryption and authentication technology in a power cloud system. Background technique [0002] In recent years, the development of smart grid has reached a consensus worldwide. With the full development of smart grid construction characterized by informatization, automation and interaction, how to meet the fast, reliable and safe computing requirements of smart grid and the new control technology and The need for control strategies and measures is a challenge faced by power grid enterprises in the new situation. In the face of these massive, distributed, multi-source and heterogeneous information, conventional data storage and management methods are difficult to meet the requirements of the smart grid. With its ultra-large-scale, highly elastic computing and storage capabilities, high data security, and high cost performance, cloud computing technology ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W12/069
CPCY02D30/70
Inventor 杨云徐焜耀白云庆聂静
Owner STATE GRID CHONGQING ELECTRIC POWER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products