Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication system suitable for distributed storage

A distributed storage and authentication system technology, applied in transmission systems, electrical components, etc., can solve unresolved leaks and other issues, and achieve the effects of protecting independence, improving security, and strong fault tolerance

Active Publication Date: 2015-03-25
江苏众享金联科技有限公司
View PDF3 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Some solutions can defend against attacks such as "credential stuffing" to a certain extent through "salting" and other encryption methods, but they do not solve the disadvantages of leaking secrets once the hash value on the server side is obtained

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication system suitable for distributed storage
  • Authentication system suitable for distributed storage
  • Authentication system suitable for distributed storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] Embodiments of the present invention will be described below with reference to the drawings. Elements and features described in one drawing or one embodiment of the present invention may be combined with elements and features shown in one or more other drawings or embodiments. It should be noted that representation and description of components and processes that are not related to the present invention and known to those of ordinary skill in the art are omitted from the drawings and descriptions for the purpose of clarity.

[0017] figure 1 It is a flow chart of the working principle of an implementation mode of the authentication system applicable to distributed storage of the present invention.

[0018] like figure 1 As shown, in this embodiment, the working principle flow of the authentication system applicable to distributed storage includes:

[0019] S10: The login module sends a login request to the authentication module. Specifically, the login module sends ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an authentication system suitable for distributed storage. The authentication system comprises a login module, a registration module, an authentication module and a storage module, wherein the login module is used for sending a registration request and a login request, and calculating authentication question information through a login secret key to obtain the authentication calculation result, the registration module is used for receiving the registration request, detecting whether a user exists, generating fragmentation information, and distributing and storing the fragmentation information into the storage module, the fragmentation information comprises the authentication question information and authentication answer information, the authentication module is used for receiving the login request, searching for storage nodes, obtaining the fragmentation information, sending the authentication question information, receiving the authentication calculation result, comparing the authentication calculation result with the authentication result information to obtain the authentication result, and sending the authentication result to the login module, and the storage module comprises the storage nodes and is used for storing the fragmentation information into the storage nodes and returning the fragmentation information to the authentication module. According to the authentication system, the fragmentation information high in independence is distributed and stored in the different nodes, information exchange of the minimum degree is just carried out between the modules, and the system has the advantages of being high in safety and fault tolerance.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an authentication system suitable for distributed storage. Background technique [0002] At present, password-based authentication is one of the most popular authentication methods used to solve the system's confidentiality and security issues. In the traditional password-based authentication scheme model, in order to apply for resources, the user first sends a request message to the remote server, which includes the user's ID and the hashed password value. After receiving the request, the remote server searches the access list in the local database to see if there is a pair that matches the request submitted by the user. If it exists, the server will grant the user ID access rights, otherwise it will deny access. [0003] Existing authentication methods and systems mostly use centralized storage solutions. Usually, the user's authentication information (usually a passw...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/06H04L67/1097
Inventor 吴自立
Owner 江苏众享金联科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products