Application cloud safety certification method based on third-party service

A technology of security authentication and service cloud, applied in the field of application cloud security authentication, it can solve the problems of security problems, uncertainty of visitor identity, super privilege of cloud service providers, etc., to strengthen security, ensure non-repudiation, and ensure The effect of authenticity

Inactive Publication Date: 2014-01-01
INSPUR QILU SOFTWARE IND
View PDF3 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] As an emerging network application model, cloud computing has very good application and development prospects. As an emerging business model, cloud computing is still in its infancy, and there are still many problems to be solved. Its security issues Especially prominent, and identity authentication and access control management are one of the main issues of cloud computing security. Cloud services provided on the basis of cloud computing also have security issues that need to be solved urgently. Security issues have become the focus of cloud computing and cloud service promotion. A major obstacle, mainly from the security issues caused by data sharing, the identity uncertainty of visitors and the potential danger caused by super privileges of cloud service providers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application cloud safety certification method based on third-party service
  • Application cloud safety certification method based on third-party service

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] A third-party service-based application cloud security authentication method of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0021] as attached figure 1 , figure 2 As shown, a third-party service-based application cloud security authentication method is now provided, and the specific steps are as follows:

[0022] 1. The cloud user submits the requested service information to the signature authentication service cloud;

[0023] 2. After the signature authentication service cloud receives the cloud user request information, it verifies the validity of the cloud user certificate to the third-party directory authentication service cloud;

[0024] 3. Issue ciphertext user login tokens and digital envelopes through the application portal directory service cloud, and then perform authentication service signatures on the ciphertext user login tokens and digital envelopes issued by the application portal directory s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an application cloud safety certification method based on a third-party service. The application cloud safety certification method based on the third-party service specifically comprises the steps that (1) a cloud user submits service demand information to a signature certification service cloud; (2) the signature certification service cloud receives the service demand information of the cloud user, and verifies validity of a certificate of the cloud user according to a third-party catalogue certification service cloud, carries out sign and issue on a ciphertext user login token and a digital envelope through an application portal catalogue service cloud, carries out certification service sign on the ciphertext user login token signed and issued through the application portal catalogue service cloud and the digital envelope signed and issued through the application portal catalogue service cloud, and sends the ciphertext user login token and the digital envelope back to the cloud user; (3) the cloud user carries out user sign on the obtained ciphertext user login token, the digital envelope and the certification service sign information, and submits the ciphertext user login token, the digital envelope and the certification service sign information to an application service to demand for the corresponding service; (4) the application service provides the corresponding service for the cloud user after being verified. Compared with the prior art, the application cloud safety certification method based on the third-party service ensures authenticity and non-repudiation of information sources, and improves safety of the process of information transmission.

Description

technical field [0001] The invention relates to the technical field of cloud computing, in particular to an application cloud security authentication method applicable to cloud service fields such as e-government, e-commerce, and industry and based on third-party services. Background technique [0002] As an emerging network application model, cloud computing has very good application and development prospects. As an emerging business model, cloud computing is still in its infancy, and there are still many problems to be solved. Its security issues Especially prominent, and identity authentication and access control management are one of the main issues of cloud computing security. Cloud services provided on the basis of cloud computing also have security issues that need to be solved urgently. Security issues have become the focus of cloud computing and cloud service promotion. A major obstacle mainly comes from the security issues caused by data sharing, the uncertainty of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/08
Inventor 李秀芳于治楼罗清彩
Owner INSPUR QILU SOFTWARE IND
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products