Unlock instant, AI-driven research and patent intelligence for your innovation.

User identity authentication method and system for discovery service

A technology for user identity and service discovery, applied in the field of user identity verification methods and systems, can solve the problem of not meeting application requirements well, increasing the complexity of user access to DS, and user identity verification schemes that cannot well meet the actual needs of users And other issues

Inactive Publication Date: 2014-12-24
COMP NETWORK INFORMATION CENT CHINESE ACADEMY OF SCI
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, DS needs to verify the user's identity based on PKI every time before allowing the user to access, which not only increases the complexity of the user's access to DS, but also consumes a lot of user resources (CPU, bandwidth, etc.)
Therefore, the PKI-based user authentication scheme cannot well meet the actual use needs of users.
To sum up, the two mainstream schemes currently used in DS to authenticate users cannot meet the actual application requirements well.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identity authentication method and system for discovery service
  • User identity authentication method and system for discovery service
  • User identity authentication method and system for discovery service

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to make the above objects, features and advantages of the present invention more obvious and understandable, the present invention will be further described below through specific embodiments and accompanying drawings.

[0027] 1. Introduction to CUIAS system structure

[0028] Aiming at the deficiencies of the two existing mainstream user authentication schemes in DS, a centralized user authentication scheme called CUIAS (Centralized User Identity Authentication Service) based on SAML (Security Assertion Markup Language) and PKI is proposed for Provide DS with user identity verification services on a global scale.

[0029] CUIAS is deployed as a DHT (Distributed Hash Table) network composed of multiple UIASP (User Identity Authentication Service Provider, User Identity Authentication Service Provider) servers, such as figure 1 shown. Since the DHT network can support the dynamic joining and exiting of servers, CUIAS has strong performance scalability. In ad...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a user identity authentication method and system for discovery service. A plurality of user identity authentication servers form a DHT network, and the identification of each server is obtained through a public key for calculating the owner of the server and the Hash value of a random number provided by the public key; each user identity authentication server performs authentication on the identity of a user on the basis of PKI, if the identity authentication passes, a bill packaged in the SAML format is generated, then the bill is divided into a plurality of small data fragments, and the small data fragments are stored; a DS server receives an inquiry quest of the user, the storage positions of the corresponding data fragments are worked out, an original bill is restored, then authentication on the identity of the user is performed according to the restored bill, and after the identity authentication passes, the server address of enterprise information relevant to the RFID identification of an inquired article is fed back. Due to the adoption of the user identity authentication method and system for discovery service, the user can have access to a DS many times in a period of time when authentication on the identity of the user is only performed one time, the procedures for the user to have access to the DS can be simplified, and the resource consumption of the user can be reduced.

Description

technical field [0001] The invention belongs to the field of information technology, and in particular relates to a user identity verification method and system for discovery services. Background technique [0002] In recent years, RFID (Radio-Frequency Identification) has been widely used in the identification of items in manufacturing, logistics, retail and other industries. Discovery Service (Discovery Service, DS), as a key support service for tracking and tracing items in the supply chain, is designed to provide users with information servers (Information Service, IS) mapping service between addresses. The mapping information between the items stored in the DS and the relevant IS server addresses can reflect commercially sensitive information such as the circulation mode of the items and the trade relationship between enterprises. Therefore, DS must first verify the user's identity, and then decide whether to allow the user's access according to its access control pol...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 刘鹏孔宁田野李晓东阎保平
Owner COMP NETWORK INFORMATION CENT CHINESE ACADEMY OF SCI