Resource operation safety authentication method and system under cloud calculation environment
A cloud computing environment and operation security technology, applied in the field of information security, can solve problems such as loss and destructiveness, and achieve the effect of protection security, safety and effective protection
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0042] The principles and features of the present invention are described below in conjunction with the accompanying drawings, and the examples given are only used to explain the present invention, and are not intended to limit the scope of the present invention.
[0043]Such as figure 1 As shown, a resource operation security authentication system in a cloud computing environment includes a Web client 1, a cloud resource background server 2 and an authentication server 3; the client 1 includes an operation request sending module 11, a control module 12 and authentication information Sending module 13, described cloud resource background server 2 includes identity authentication and authentication module 21 and resource operation module 22, and described authentication server 3 includes operation level and authentication mode association module 31 and authentication module 32;
[0044] The operation request sending module 11 is configured to send a resource operation request t...
PUM

Abstract
Description
Claims
Application Information

- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com