Unlock instant, AI-driven research and patent intelligence for your innovation.

Cloud computing verification method and system

A verification method and cloud computing technology, applied in the field of cloud computing, can solve the problem of low security of verification methods

Active Publication Date: 2013-06-12
INSPUR BEIJING ELECTRONICS INFORMATION IND
View PDF5 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The invention provides a cloud computing verification method and system, which solves the problem of low security of verification means in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud computing verification method and system
  • Cloud computing verification method and system
  • Cloud computing verification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to solve the problem of low security of verification means in the prior art, an embodiment of the present invention provides a cloud computing verification method and system. Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined arbitrarily with each other.

[0046] First, Embodiment 1 of the present invention will be described with reference to the accompanying drawings.

[0047] The embodiment of the present invention provides a cloud computing verification system, its structure is as followsfigure 1 shown, including:

[0048] Client 101, CS102 and AS103:

[0049] The client 101 is used to obtain a random dynamic password (dc) from the CS102 when the user logs in, encrypt the dc according to the preset k1 of the user to obtain dcc1, and convert the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a cloud computing verification method and a cloud computing verification system, and relates to the field of cloud computing. The cloud computing verification method and the cloud computing verification system resolve the problem that verification means in the prior art are poor in safety. The method comprises that during logging-in, a user obtains a dynamic code (dc) from a cloud computing server (CS) through a client; the client obtains dynamic code ciphertext 1 (dcc1) after encrypting the encrypt dynamic code according to a preset random dynamic code secret key of the user, and the dcc1 and a preset password (p) of the client are sent to the CS; bidirectional authentication is mutually conducted between the CS and an authentication server (AS); and after the bidirectional authentication is successful, the CS utilizes a public key of the AS to encrypt the p and the dcc1 and obtains dcc13, and the dcc13 is sent to the AS. The cloud computing verification method and the cloud computing verification system are suitable for technology security of cloud computing and achieve a user authentication mode based on encrypting.

Description

technical field [0001] The invention relates to the field of cloud computing, in particular to a cloud computing verification method and system. Background technique [0002] With the continuous promotion and application of cloud computing technology, the issue of cloud security has gradually become the focus of users' concern. For service providers, how to build a secure cloud computing environment and how to provide customers with high security guarantees are the focus of their attention; for customers, they are concerned about the security of core data stored or used by their own business systems. Once the data is leaked or lost, it will harm the interests of users. [0003] In the cloud computing environment, the requirements for the access terminal are low, and some new requirements have arisen for users to be able to access it at random and anywhere. Especially after the emergence of the IaaS service model, service providers need to provide each user with a self-servi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/30H04L29/06H04L29/08
Inventor 张龙
Owner INSPUR BEIJING ELECTRONICS INFORMATION IND