User unified authentication method in cloud computing environment

A cloud computing environment and authentication method technology, applied in user identity/authority verification, transmission systems, electrical components, etc., can solve problems that cannot meet user security needs, achieve convenient maintenance, improve security, and reduce password leakage.

Inactive Publication Date: 2013-08-21
NANJING UNIV OF POSTS & TELECOMM
View PDF4 Cites 61 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The traditional identity authentication technology based on a single credential can no longer meet the security needs of users. Many cloud service providers have adopted identity authentication technologies based on multiple security credentials, but there is currently a lack of summary and comparison of these technologies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User unified authentication method in cloud computing environment
  • User unified authentication method in cloud computing environment
  • User unified authentication method in cloud computing environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Cloud computing offers many advantages over traditional models, such as information sharing in a virtual environment, dynamic scalability, virtualization of software, platforms, and storage, and so on. However, in addition to the many benefits that cloud computing has brought to people, many problems have arisen, such as: performance issues, fault tolerance, interoperability, data migration and conversion from legacy systems, etc. The main problem is security, such as virtualization Security, application security, identity management, access control and authentication, and the management of identity authentication and access control are the core requirements of cloud computing. Therefore, the above security issues prompt us to propose a reliable and strong identity authentication for cloud environments Framework diagram to ensure that only authenticated users can enter the cloud environment. To this end, we propose a unified user authentication architecture based on clo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a user unified authentication method in a cloud computing environment. The method is mainly used for solving the authentication problem when a user logs in a cloud platform and carries out related operation on the cloud platform in the cloud environment, reliability of the authentication is ensured, corresponding cloud resources can be operated only by authenticated users, and legitimacy of the user requires reliable authentication before the user enters the cloud environment. The provided frame provides the function of unified user management, the function of mutual authentication and the function of being capable of accessing all application services through one time of login, the user requires mutual authentication with a server, after the authentication is passed, the authentication server generates a certificate identifying successful authentication, and then sends the certificate to a client, after receiving a session key of the authentication server, the client accesses a corresponding cloud application program, the cloud application program examines whether the certificate provided by the user is legal or not through interaction with the authentication server, if the certificate is legal, the cloud application program checks whether the user has an access right, and if the user has the access right, the user can access the corresponding service.

Description

technical field [0001] The present invention provides a solution for user authentication in a cloud environment, which is mainly used to solve the authentication problem of users logging into the cloud platform and performing related operations on the cloud platform in the cloud environment, ensuring the reliability of authentication and only authenticated users It belongs to the field of cloud computing security to operate the corresponding cloud resources and manage and maintain the user information in a unified manner. Background technique [0002] Cloud computing is another major Internet computing model proposed in the computer field after grid computing and distributed computing. Cloud computing can be divided into three service models: IaaS (Infrastructure-as-a-service, infrastructure as a service), consumption Users can obtain services from a complete computer infrastructure through the Internet; PaaS (Platform-as-a-Service, Platform as a Service), Paas actually refe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/08
Inventor 季一木康家邦王汝传孙力娟潘俏羽匡子卓孙延鹏韩志杰付雄张琳
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products