Differentiated authentication method and differentiated authentication device

An authentication method and a differentiated technology, applied in the computer field, can solve the problems of differentiated security services, low security of application servers, inability to provide application services, etc., and achieve the effect of improving security

Active Publication Date: 2014-03-26
SHENZHEN UNIV
View PDF7 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the embodiments of the present invention is to provide a differentiated authentication method and device, aiming to solve the problem of low ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Differentiated authentication method and differentiated authentication device
  • Differentiated authentication method and differentiated authentication device
  • Differentiated authentication method and differentiated authentication device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0022] figure 1 The implementation flow of the differentiated authentication method provided by Embodiment 1 of the present invention is shown, and the details are as follows:

[0023] In step S101, an authentication request for authenticating a user sent by an application server is received, and the authentication request includes an authentication credit level, network environment parameters accessed by the user, and attack history information of the user.

[0024] In the embodiment of the present invention, the application server is used to provide application services, and when the user requests to access the application server through the application program client, the application server requests the authentication server to authenticate the user. The authentication server is an authentication service provider trusted by the application service provider / application server, for example, a CA center and the like.

[0025] In the embodiment of the present invention, the re...

Embodiment 2

[0038] image 3 The structure of the differentiated authentication device provided by the second embodiment of the present invention is shown, and for the convenience of description, only the parts related to the embodiment of the present invention are shown.

[0039] The algorithm configuration unit 31 is configured to configure corresponding authentication algorithms for different preset authentication strengths.

[0040] An authentication request receiving unit 32, configured to receive an authentication request sent by the application server to authenticate the user, the authentication request including the credit level of authentication, the network environment parameters accessed by the user, and the attack history information of the user;

[0041] An authentication strength calculation unit 33, configured to calculate the authentication strength of the authentication algorithm required for authenticating the user according to the credit rating, the network environment p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a differentiated authentication method and a differentiated authentication device and is applicable to the technical field of computers. The differentiated authentication method includes receiving an authentication request to users from an application server, calculating authentication strength of an authentication algorithm required for authentication of the user according to lever of assurance, network environmental parameter and attack history information of the user, acquiring the authentication algorithm corresponding to the authentication strength from a preset authentication algorithm list, consulting with an application program client side corresponding to the user to acquire the consensus authentication algorithm according to the acquired authentication algorithm, and authenticating the user by the consensus authentication algorithm, thereby performing differentiated authentication to the user according to security status when the user has access to the application server. Security of the application server is improved. The authentication request includes the authentication lever of assurance, the parameter of network environment accessed by the user and the attack history information of the user.

Description

technical field [0001] The invention belongs to the technical field of computers, and in particular relates to a differentiated authentication method and device. Background technique [0002] Federated Identity Management (FIdM) is mainly composed of three parts: users, application servers, and authentication servers. The user registers for authentication on the authentication server in advance. When the user wants to access the application service on an application server, the application server requests the corresponding authentication server to authenticate the user. The authentication server authenticates the user and returns the authentication result information. Finally, the application server Determine whether to authorize the user to access resources based on the authentication result. [0003] However, in the prior art, the authentication method selected by the authentication server is selected through negotiation between the authentication server and the applicati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
Inventor 魏娟陈剑勇张军
Owner SHENZHEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products