Single sign on system and method based on cloud management and key management

A key management and single sign-on technology, applied in the field of cloud computing, can solve problems such as poor security and inconvenient use, and achieve the effect of overcoming poor security, good security, and inconvenient use.

Inactive Publication Date: 2013-03-13
WUXI CHENGDIAN KEDA TECH DEV
View PDF7 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the process of realizing the present invention, the inventor found that at least there are defects such as inconvenient use and poor security in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Single sign on system and method based on cloud management and key management

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The preferred embodiments of the present invention will be described below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0035] System embodiment

[0036] According to an embodiment of the present invention, such as figure 1 As shown, a single sign-on system based on cloud management and key management is provided, mainly including:

[0037] Cloud key login management system: when a user logs in to all relevant application systems through a single identity from a single login portal, centralized identity authentication and audit records are performed at the user login portal according to the user's identity;

[0038] In the cloud key login management system, the operation of audit records specifically includes: accurately record and analyze the user's access to corresponding resour...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a single sign on system and method based on cloud management and key management. The system mainly comprises a cloud key sign on management system, a key user management system and an authority resource and user data supply service system, wherein the cloud key sign on management system is used for performing centralized identity authentication and audit recording at a user sign on inlet according to the user identity; the key user management system is used for merging all user identity information to a centralized storage bank and performing unified management on the user identity in each independent application; and the authority resource and user data supply service system is used for providing services for the user according to authority resources and user data. According to the single sign on system and method based on the cloud management and the key management, the defects of inconvenience for use, low safety and the like in the prior art can be overcome, and the advantages of high flexibility, high expansion capability, convenience for use and high safety are realized.

Description

technical field [0001] The present invention relates to the technical field of cloud computing, in particular to a single sign-on system and method based on cloud management and key management. Background technique [0002] With the rapid development of information technology and network technology, there are more and more application systems in enterprises, and there are many demands on the network in the 21st century, so the complexity of the network is also increasing correspondingly, which brings a lot of inconvenience to people. [0003] For example, in the company's information construction, there are various systems used together. Because these systems are independent of each other, users must log in according to the corresponding system identity before using each system. To this end, users need Remember the user name and password of each system in sequence, which brings a lot of trouble to users, especially as the number of systems increases, the possibility of error...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/32H04L9/08
Inventor 戴元顺
Owner WUXI CHENGDIAN KEDA TECH DEV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products