Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication methods for distributed storage

A technology of distributed storage and authentication method, applied in the field of distributed storage authentication, can solve problems such as unsolved leakage, and achieve the effects of protecting independence, strong adaptability, and strong fault tolerance

Active Publication Date: 2017-08-11
宁波众享宇联科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Some solutions can defend against attacks such as "credential stuffing" to a certain extent through "salting" and other encryption methods, but they do not solve the disadvantages of leaking secrets once the hash value on the server side is obtained

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication methods for distributed storage
  • Authentication methods for distributed storage
  • Authentication methods for distributed storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Embodiments of the present invention will be described below with reference to the drawings. Elements and features described in one drawing or one embodiment of the present invention may be combined with elements and features shown in one or more other drawings or embodiments. It should be noted that representation and description of components and processes that are not related to the present invention and known to those of ordinary skill in the art are omitted from the drawings and descriptions for the purpose of clarity.

[0022] figure 1 It is a flowchart of an implementation mode of the authentication method applicable to distributed storage in the present invention.

[0023] Such as figure 1 As shown, in this embodiment, authentication methods applicable to distributed storage include:

[0024] S10: The login module sends a login request to the authentication module. Specifically, the login module sends a login request including the login user name to the auth...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an authentication method suitable for distributed storage. The method comprises the steps that an authentication module receives a login request sent by a login module, searches for storage nodes according to the login request, obtains fragmentation information from the storage nodes, and transmits authentication question information in the fragmentation information to the login module, the fragmentation information comprises the authentication question information and authentication answer information, the authentication module receives the authentication calculation result obtained through calculation which is carried out on the authentication question information by the login module through a login secret key, and the authentication module compares the authentication calculation result with the authentication answer information to obtain the authentication result, and transmits the authentication result to the login module. According to the authentication method, the fragmentation information high in independence is distributed and stored in the different nodes, information exchange of the minimum degree is just carried out between the modules, and the method has the advantages of being high in safety and fault tolerance.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an authentication method suitable for distributed storage. Background technique [0002] At present, password-based authentication is one of the most popular authentication methods used to solve the system's confidentiality and security issues. In the traditional password-based authentication scheme model, in order to apply for resources, the user first sends a request message to the remote server, which includes the user's ID and the hashed password value. After receiving the request, the remote server searches the access list in the local database to see if there is a pair that matches the request submitted by the user. If it exists, the server will grant the user ID access rights, otherwise it will deny access. [0003] Existing authentication methods and systems mostly use centralized storage solutions. Usually, the user's authentication information (usually a passw...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/08H04L67/1097
Inventor 吴自立
Owner 宁波众享宇联科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products