Authentication system used in distributed user service

A user service and distributed technology, applied in the field of information security, can solve the problems of hidden dangers of data leakage and low information security, and achieve the effect of short life cycle

Inactive Publication Date: 2014-03-26
南京中目网络科技有限公司
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, data and key information are transmitted on the network in the form of plain text or simple encryption, which brings great hidden dangers of data leakage and low information security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication system used in distributed user service

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.

[0017] combine figure 1 , the present invention is used for the authentication system between distributed user services, including an authentication center, a client, a server and a customized identity authentication device, the authentication center includes an encrypted storage medium and an encryption chip connected to each other; the authentication center, the client It is connected with the server two by two, and both the client and the server are connected with the customized identity authentication device through the usb interface;

[0018] The encryption chip of the authentication center processes the encryption and decryption request and generates a key, and the encrypted storage medium stores the key information of all customized identity authentication devices; the identity authentication device performs encryption and decr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authentication system used in distributed user service. The system comprises an authentication center, a client, a server and custom made identity authentication devices, wherein the authentication center comprises an encryption storage medium and an encryption chip which are connected mutually; every two of the authentication center, the client and the server are connected, the client and the server are both connected with the custom made identity authentication devices through USB (Universal Serial Bus) ports, the encryption chip of the authentication center is used for processing encryption and decryption requests and generating a key, the encryption storage medium is used for storing the key information of all the custom made identity authentication devices, the identity authentication devices carry out encryption and decryption, and store keys of identity authenticators and keys used in communication, when encryption data communication is performed, two parties in each communication adopt keys to encrypt, the server and the authentication center as well as the client and the authentication center respectively adopt the corresponding keys, and the client and the server adopt a session key newly generated by the authentication center. The system has the advantages of safety and reliability. The hadden danger of data leakage is lowered.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an authentication system for distributed user services. Background technique [0002] With the continuous development of Internet technology, the terminals of each platform began to have operating systems with stronger performance and richer interfaces, and computing resources began to be abundant. On this basis, the security requirements for the platforms began to gradually increase. Information security mainly includes two aspects: system security and data security. System security generally adopts measures such as firewall, anti-virus and other security technologies, which are passive security measures. Data security mainly uses modern cryptographic technology to actively protect data, such as data confidentiality, data integrity, identity authentication and other technologies. [0003] Digital signature technology is a digital string that can only be generated ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/08
Inventor 李千目张晟骁侯君戚湧孙向军
Owner 南京中目网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products