Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for identifying identity of user on heterogeneous computer environment

A technology of computer environment and user identity, applied in the field of user identity verification

Inactive Publication Date: 2014-06-11
RES INST OF SUN YAT SEN UNIV & SHENZHEN
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The above difficulties occur when a user or a computer or an application accesses resources in a heterogeneous computing environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for identifying identity of user on heterogeneous computer environment
  • Method for identifying identity of user on heterogeneous computer environment
  • Method for identifying identity of user on heterogeneous computer environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0017] figure 1 A schematic diagram of a typical computer environment with 3 users 1, 3, 5 accessing an application 10 is illustrated. In some embodiments, the computer environment is heterogeneous. For example, users 1, 3, 5 and application program 10 run on different hardware platforms, such as Windows server, UNIX server or mainframe system, or use the same hardware platform but different operating systems. It may also be a homogeneous environment in some com...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for identifying an identity of a user on a heterogeneous computer environment. The method comprises the following steps of defining a group of unique prefixes, and determining one type of user resource base of each prefix; defining a group of abstract resource base names, and enabling the name of each abstract resource base to indicate the address of each user resource base; verifying the user on a heterogeneous computer, and distributing a sequence, wherein the sequence contains one unique prefix, a reference of the name of each abstract resource base, and a unique identifier of each abstract resource base for indicating the user in the resource base.

Description

technical field [0001] The invention relates to a method for user authentication in a heterogeneous computer environment. Background technique [0002] If tasks are authorized to operate in a heterogeneous computer environment, the inconsistency of heterogeneous systems will become a huge problem. For this to work, authentication information for known users must be able to be communicated by some means. This method makes it necessary for the receiving system to recognize these authentication information. So it has to be able to compare specific credentials with other people, which has to be meaningful and not just a blob of data. Only after the recipient understands the authentication information can he take further user authorization actions. Mapping one user ID (part of the computer environment) to another user ID only partially solves the problem, since each mapping process results in a loss of information, i.e., where the user may have authenticated himself once in th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/31H04L9/32
CPCG06F21/31H04L63/08
Inventor 李圳龙罗笑南杨艾琳刘海亮汤武惊吴超如郭江波
Owner RES INST OF SUN YAT SEN UNIV & SHENZHEN