Cloud terminal identity authentication method and system

An identity authentication and cloud terminal technology, applied in the field of cloud computing security, can solve problems such as keyboard input account passwords are vulnerable to Trojan horse program attacks, large information security risks, etc., to reduce the risk of Trojan horse attacks, simple and convenient operation, and high security performance Effect

Inactive Publication Date: 2013-04-24
GCI SCI & TECH
View PDF4 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the traditional way of manually entering the account password information is still adopted to log in to the virtual desktop environment. Entering the account password through the keyboard is easy to be attacked by Trojan horse programs. This traditional login method has a large information security risk.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud terminal identity authentication method and system
  • Cloud terminal identity authentication method and system
  • Cloud terminal identity authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] Such as figure 1 As shown, it is a schematic flow diagram of the cloud terminal identity authentication method in an embodiment of the present invention. In this embodiment, the two-way interaction process between the cloud terminal and the cloud server is used as an example to illustrate, including the following steps:

[0041] S11. The cloud terminal generates a first ciphertext with the user's account number and password through a preset cryptographic algorithm, and then generates a first two-dimensional code image corresponding to the first ciphertext through a two-dimensional code tool;

[0042] Two-dimensional code is to record data symbol information with a specific geometric figure distributed in black and white on a plane (two-dimensional direction) according to a certain rule. . The concept of "1" bit stream, which uses several geometric shapes corresponding to binary to represent text and numerical information, and automatically reads through image input equi...

Embodiment 2

[0059] figure 2 A schematic flowchart of another embodiment of the cloud terminal identity authentication method of the present invention is shown. In this embodiment, the processing process of the cloud terminal is taken as an example for description.

[0060] S21. Generate a first ciphertext with the user's account number and password through a preset cryptographic algorithm, and generate a two-dimensional code image corresponding to the first ciphertext through a two-dimensional code tool;

[0061] S22. Submit the first ciphertext to the server for storage;

[0062] S23. When the user logs in, scan the two-dimensional code image provided by the user, obtain the second ciphertext corresponding to the two-dimensional code image according to the two-dimensional code tool, and send the second ciphertext to the server for processing match.

[0063] According to the scheme in this embodiment, the user's account number and password are first converted to generate the correspond...

Embodiment 3

[0065] image 3 A schematic flowchart of another embodiment of the cloud terminal identity authentication method of the present invention is shown. In this embodiment, the processing process of the server is taken as an example for description.

[0066] S31. Receive the first ciphertext generated by the cloud terminal through a preset cryptographic algorithm according to the user account and password, and save the first ciphertext;

[0067] S33. Receive the second ciphertext corresponding to the two-dimensional code image obtained by scanning the two-dimensional code image provided by the user when the user logs in and scanning the two-dimensional code image sent by the cloud terminal;

[0068] S33. Match the second ciphertext with the saved first ciphertext, and pass the user's identity authentication if the matching is successful;

[0069] According to the solution in this embodiment, the server receives the first ciphertext sent by the cloud terminal, and the first ciphert...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a cloud terminal identity authentication method. The cloud terminal identity authentication method includes that an account and a password of a user are converted to a first cipher text through a preset password algorithm and then converted to a two-dimensional code image corresponding to the first cipher text through a two-dimensional code tool; a cloud terminal submits the first cipher text to a server-side to store; when the user logins, the cloud terminal scans the two-dimensional code image provided by the user and obtains a second cipher text corresponding to the two-dimensional code image through the two-dimensional code tool, and the second cipher text is sent to the server-side; and the second cipher text received by the server-side is matched with the stored first cipher, and if the second cipher text received by the server-side is successfully matched with the stored first cipher, an identity authentication of the user is passed. The invention further provides a corresponding cloud terminal identity authentication system. The cloud terminal identity authentication method and the corresponding cloud terminal identity authentication system can improve the safety performance of the cloud terminal identity authentication, and the risk that user information is disclosed is greatly lowered.

Description

technical field [0001] The invention relates to the technical field of cloud computing security, in particular to a cloud terminal identity authentication method and a cloud terminal identity authentication system. Background technique [0002] Cloud computing is a new type of computing mode: IT resources, data, and applications are provided to users through the Internet as services. Users only need to log in to the server through account passwords, and can automatically log in to the virtual desktop of the server after passing identity authentication. Various services provided by the cloud server are used on the cloud terminal through the virtual desktop. [0003] At present, the traditional method of manually entering the account password information is still adopted to log in to the virtual desktop environment. Entering the account password through the keyboard is easy to be attacked by Trojan horse programs. This traditional login method has a relatively large informatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 郭峰
Owner GCI SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products