Cloud service identity authentication method and device

An identity authentication and cloud service technology, applied in the field of cloud service identity authentication methods and equipment, can solve problems such as personal property loss, lack of security, data loss, etc., to avoid waste of network resources, improve user experience, and enhance security. Effect

Active Publication Date: 2016-11-23
三六零数字安全科技集团有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, users need to use the resources provided by the cloud service for their work, but the steps to temporarily apply for an account are cumbersome, and the temporarily applied account does not have long-term use, resulting in a waste of a lot of network resources
In addition, when a user needs to log in to his account in a location that lacks security due to work, if the user fails to log out or delete his login record in time after using it, it is easy to be hacked by illegal personnel, resulting in loss of data, or even damage to personal property
[0003] To sum up, in the prior art, the process steps of account registration and account login that users need to perform when using cloud service resources are cumbersome, and occupy a large amount of network resources, resulting in waste of resources, lack of security, and high efficiency. Ensure the security of user data and even property

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud service identity authentication method and device
  • Cloud service identity authentication method and device
  • Cloud service identity authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] figure 2 The flowchart showing the processing of the cloud service identity authentication method according to a preferred embodiment of the present invention is used to support any of the above cloud service identity authentication methods, so as to make the above cloud service identity authentication method more clear and understandable. It should be noted that, in order to explain this preferred embodiment more concisely and easily, in this preferred embodiment, the terminal is set as a computer. see figure 2 , this preferred embodiment includes at least step S202 to step S216.

[0055] Step S202, read the MAC-Key in the USB device.

[0056]Connect the USB device to the terminal, and a prompt box will pop up in the lower right corner of the computer, prompting that it will take 3 minutes to successfully connect the USB device to the terminal. During the connection process, if the USB device is not compatible with the current system of the computer, a prompt wind...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a cloud service identity authentication method and equipment. Wherein, the method includes: reading the media access control keyword MAC-Key in the Universal Serial Bus USB device connected to the terminal; sending the MAC-Key to the server, receiving the verification result of the MAC-Key returned by the server, wherein , the server stores the USB device identity ID corresponding to the MAC-Key and the user account; it is determined whether the USB device has passed the authentication according to the verification result. The embodiment of the present invention can solve the problem in the prior art that user registration must be performed before using cloud service resources, and avoid the waste of network resources caused by temporary registration when using cloud service resources.

Description

technical field [0001] The invention relates to the field of Internet applications, in particular to a cloud service identity authentication method and device. Background technique [0002] With the development of the information society, people rely more and more on the Internet and on cloud services. However, in the prior art, before users can use various resources provided by cloud services, they first need to register and log in. In addition, users When using resources provided by cloud services on different devices, you need to log in to your own account repeatedly. For example, users need to use resources provided by cloud services for their work, but the steps to temporarily apply for an account are cumbersome, and the temporarily applied account does not have long-term use, resulting in a waste of a lot of network resources. In addition, when a user needs to log in to his account in a location that lacks security due to work, if he fails to log out or delete his log...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/32
Inventor 叶特峰张治洲蒲森
Owner 三六零数字安全科技集团有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products