Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Resource operation safety authentication method and system under cloud calculation environment

A cloud computing environment and operation security technology, applied in the field of information security, can solve problems such as loss and destructiveness, and achieve the effect of protection security, safety and effective protection

Inactive Publication Date: 2015-01-21
北京思特奇信息技术股份有限公司
View PDF5 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example: if a user logs in and does not perform any operations, the valid time of the account is 30 minutes, then during this period, if the user leaves and other people use this user to operate, the loss will be destructive

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Resource operation safety authentication method and system under cloud calculation environment
  • Resource operation safety authentication method and system under cloud calculation environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The principles and features of the present invention are described below in conjunction with the accompanying drawings, and the examples given are only used to explain the present invention, and are not intended to limit the scope of the present invention.

[0043]Such as figure 1 As shown, a resource operation security authentication system in a cloud computing environment includes a Web client 1, a cloud resource background server 2 and an authentication server 3; the client 1 includes an operation request sending module 11, a control module 12 and authentication information Sending module 13, described cloud resource background server 2 includes identity authentication and authentication module 21 and resource operation module 22, and described authentication server 3 includes operation level and authentication mode association module 31 and authentication module 32;

[0044] The operation request sending module 11 is configured to send a resource operation request t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a resource operation safety authentication method and system under a cloud calculation environment. The system comprises a web client side, an authentication server and a cloud resource background server. In the safety authentication process, a user carries out all operation through the web client side, an operation request is sent to the cloud resource background server, and the cloud resource background server verifies and passes the operation request and sends the request information to the authentication server to be authenticated; the authentication server divides the resource operation types into different levels, and different authentication modes are selected according to the levels; the web client side acquires the authentication modes and notifies the user to carry out authentication; after the user inputs authentication information, the web client side sends the authentication information to the authentication server, and corresponding operation is carried out only when the authentication information is authenticated to be valid; meanwhile, the authentication complexity level can be gradually increased according to the increasing of the resource operation sensibility; thus, safe and effective protection is provided for resource operation under the whole cloud calculation environment.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a resource operation security authentication method and system in a cloud computing environment. Background technique [0002] Cloud computing is an Internet-based computing method in which shared hardware and software resources and information are provided to computers and other devices on demand. Typical cloud computing providers often provide general-purpose network business applications, which can be accessed through software such as browsers or other Web services, while software and data are stored on servers. Cloud computing services usually provide general-purpose online business applications accessed through a browser, and software and data can be stored in data centers. [0003] At present, there is no complete product on the market for security authentication of cloud resource operations in a cloud computing environment. In the existing technology, most co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/105H04L63/083H04L67/02
Inventor 史金城
Owner 北京思特奇信息技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products