Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Fusion identify protection system and fusion identify protection method based on cloud computing

A protection system, cloud computing technology, applied in transmission systems, user identity/authority verification, electrical components, etc., can solve security risks, loss, forgetting, misplacement, impersonation, security depends on digital certificates, passwords or tokens Complexity and other issues to prevent malicious attacks, enhance audit capabilities, and prevent leakage of user sensitive information

Active Publication Date: 2015-01-28
NANJING UNIV OF POSTS & TELECOMM
View PDF13 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The existing identity authentication system is convenient and simple to operate, but the existing identity authentication system is mainly a single-factor authentication method. Restricted by unfavorable factors such as

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fusion identify protection system and fusion identify protection method based on cloud computing
  • Fusion identify protection system and fusion identify protection method based on cloud computing
  • Fusion identify protection system and fusion identify protection method based on cloud computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments.

[0034] The architecture of the integrated identity protection system based on cloud computing is as follows: figure 1 As shown, the system includes a secure cloud terminal, an identity authentication server, and a cloud virtual machine server cluster. The built-in fingerprint sensor and built-in digital certificate can realize the input request of user identity authentication; the controllable WiFi and controllable optical fiber module can realize the encrypted transmission of user identity authentication request information and identity authentication mode update information; the controllable USB interface can realize secure cloud terminal The download of stored data and the local upgrade service of identity authentication methods; the identity authentication server can realize the authentication of user identities; the cloud virtual machine ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a fusion identify protection system and a fusion identify protection method based on cloud computing and aims at realizing effective protection of network identity security through public cloud and private cloud architectures in a cloud computing environment. According to the fusion identify protection system and the fusion identify protection method based on the cloud computing, infinite existing and unknown strong identity authentication methods are fused together by use of a uniform standard interface based on the special distributed cluster management of the cloud computing, an authentication interface with a single portal is provided for a user and the user can select the authentication methods at different security levels according to own instant requirements. Besides, According to the fusion identify protection system and the fusion identify protection method based on the cloud computing, the biological recognition technology and the digital authentication technology are embedded in a security cloud terminal, and therefore, a cloud computing platform and the desk of a user client can be prevented from the invasion of an illegal control machine.

Description

technical field [0001] The invention relates to a cloud technology-based identity authentication system and method, belonging to the field of cloud security operating systems. Background technique [0002] With the gradual improvement of cloud computing technology and the gradual formation of the industrial chain, the demand for cloud security operating systems in various industries in the national economy and society will grow rapidly. The cloud security operating system itself is a virtualized cloud platform. All data and applications are stored in the cloud. Communication connections between the cloud and users are established through encrypted channels to achieve data access and control. Through this isolation system, ensure The security of data storage is ensured, and data loss will not be caused by the failure of the user terminal. However, at the same time, due to the discrete and disordered nature of the cloud, there are extremely high security risks, and user ident...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32H04L29/08
CPCH04L63/0823H04L63/083H04L63/0861H04L63/20
Inventor 何利文李杰陈向东鲁蔚锋孔令军沙乐天黄俊
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products