Cloud computing terminal authentication method

A terminal authentication and cloud computing technology, applied in user identity/authority verification, electrical components, transmission systems, etc., can solve the problems of cloud terminal security protection, information loss, data theft, etc., to avoid information insecurity and inability to Confidentiality, avoid identity loss, the effect of simple method

Inactive Publication Date: 2015-03-25
上海俊悦光纤网络科技有限公司
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] At present, with the increasing number of terminals connected to the cloud, security risks such as identity loss, da

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud computing terminal authentication method
  • Cloud computing terminal authentication method
  • Cloud computing terminal authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The present invention will be further described in detail with reference to the following specific embodiments and accompanying drawings. Except for the content specifically mentioned below, the process, conditions, experimental methods, etc. for implementing the present invention are all common knowledge and common knowledge in the field, and the present invention is not particularly limited.

[0020] like figure 1 As shown, the system for running the cloud computing terminal authentication method includes a cloud computing terminal 1, the cloud computing terminal 1 is connected with the identity authentication server 2, and the cloud computing terminal 1 is connected with the cloud virtual machine server cluster 3.

[0021] like figure 2 As shown, the cloud computing terminal includes: a casing 17, a mainboard 11 arranged in the casing 17, the mainboard 11 is integrated with a fingerprint authentication unit 13, a digital certificate computing and storage IC unit 12...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a cloud computing terminal authentication method comprising the following steps: step 1, generating a unique device sequence number; step 2, reading a user ID and checking the user ID, if the user does not exist, the cloud computing terminal returns to initial setting, and return to step1; step 3, connecting and staring a cloud virtual machine server cluster through a client side connecting protocol; step 4, determining whether normal starting is carried out or not, if yes, start a step 6, if not, then start a step 5; the step 5, the cloud computing terminal returns to the initial setting and goes back to step 1; step 6, the cloud computing terminal is connected with the cloud virtual machine server cluster. The cloud computing terminal authentication method can effectively solve the problems that the cloud computing terminal is weak in protection, thus causing user information leakage; the cloud computing terminal authentication method can effectively prevent safety troubles like ID leakage, data theft, and information loss.

Description

technical field [0001] The present invention relates to a method for security protection related to cloud technology, in particular to an authentication method for a cloud computing terminal. Background technique [0002] In the era of cloud computing, user-side security needs to be strengthened. It is an increasingly urgent reality to provide every user with a secure, privacy-protected, and reliable computing experience. [0003] With the advent of cloud terminals, many problems have also arisen. The most important one is the security and confidentiality issues that users often care about. The cloud terminal computing platform is similar to the traditional computer system that adopts the master / slave computing architecture. The difference is only that the cloud terminal adopts Very few hardware devices, most of the operations are performed by the server, and the server is also responsible for the storage work. [0004] The purpose of terminal access mode development is to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06H04L29/08
Inventor 唐荣喜叶丹
Owner 上海俊悦光纤网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products