Fusion identify protection system and fusion identify protection method based on cloud computing

A protection system, cloud computing technology, applied in transmission systems, user identity/authority verification, electrical components, etc., can solve security risks, loss, forgetting, misplacement, impersonation, security depends on digital certificates, passwords or tokens Complexity and other issues to prevent malicious attacks, enhance audit capabilities, and prevent leakage of user sensitive information

Active Publication Date: 2015-01-28
NANJING UNIV OF POSTS & TELECOMM
View PDF13 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The existing identity authentication system is convenient and simple to operate, but the existing identity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fusion identify protection system and fusion identify protection method based on cloud computing
  • Fusion identify protection system and fusion identify protection method based on cloud computing
  • Fusion identify protection system and fusion identify protection method based on cloud computing

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0033] The present invention will be further described in detail below with reference to the drawings and embodiments.

[0034] The architecture of the cloud-based integrated identity protection system is as follows figure 1 As shown, the system includes a secure cloud terminal, an identity authentication server, and a cloud virtual machine server cluster. Built-in fingerprint meter and built-in digital certificate can realize the input request of user identity authentication; controllable WiFi and controllable optical fiber module can realize encrypted transmission of user identity authentication request information and identity authentication method update information; controllable USB interface can realize secure cloud terminal Download of stored data and local upgrade service of identity authentication methods; identity authentication server can realize user identity authentication; cloud virtual machine server cluster can realize identity authentication operation authenticati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a fusion identify protection system and a fusion identify protection method based on cloud computing and aims at realizing effective protection of network identity security through public cloud and private cloud architectures in a cloud computing environment. According to the fusion identify protection system and the fusion identify protection method based on the cloud computing, infinite existing and unknown strong identity authentication methods are fused together by use of a uniform standard interface based on the special distributed cluster management of the cloud computing, an authentication interface with a single portal is provided for a user and the user can select the authentication methods at different security levels according to own instant requirements. Besides, According to the fusion identify protection system and the fusion identify protection method based on the cloud computing, the biological recognition technology and the digital authentication technology are embedded in a security cloud terminal, and therefore, a cloud computing platform and the desk of a user client can be prevented from the invasion of an illegal control machine.

Description

technical field [0001] The invention relates to a cloud technology-based identity authentication system and method, belonging to the field of cloud security operating systems. Background technique [0002] With the gradual improvement of cloud computing technology and the gradual formation of the industrial chain, the demand for cloud security operating systems in various industries in the national economy and society will grow rapidly. The cloud security operating system itself is a virtualized cloud platform. All data and applications are stored in the cloud. Communication connections between the cloud and users are established through encrypted channels to achieve data access and control. Through this isolation system, ensure The security of data storage is ensured, and data loss will not be caused by the failure of the user terminal. However, at the same time, due to the discrete and disordered nature of the cloud, there are extremely high security risks, and user ident...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32H04L29/08
CPCH04L63/0823H04L63/083H04L63/0861H04L63/20
Inventor 何利文李杰陈向东鲁蔚锋孔令军沙乐天黄俊
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products