Method, equipment and system for authenticating identities

An identity authentication and authentication server technology, applied in the field of equipment and systems, identity authentication methods, can solve the problems of lack of user VM authentication, insufficient security, loss of complete control, etc.

Active Publication Date: 2015-05-20
HUAWEI CLOUD COMPUTING TECH CO LTD
View PDF12 Cites 52 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] It can be seen that the above method mainly authenticates the legality and authority of the user's identity. However, due to the virtualization and sharing of the cloud computing environment, the user loses complete control over the VM he uses. For example, the administrator cannot be prevented from Log in and use the VM without authorization
However, the identity authentication method in the prior art lacks the authentication of the user to the VM, so the security is not high enough.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, equipment and system for authenticating identities
  • Method, equipment and system for authenticating identities
  • Method, equipment and system for authenticating identities

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0103] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0104] The cloud computing system includes: a cloud terminal, a host and a cloud management server, wherein the cloud terminal can be a network computer, such as a desktop computer, a notebook computer, a tablet computer, etc., or a central processing unit (CPU). ), memory and hard disk, but only include user interaction and operation interfa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An embodiment of the invention provides a method, equipment and a system for authenticating identities. The method includes enabling a cloud terminal to transmit first secret key K1 to a host; enabling the host to acquire second secret keys K2 corresponding to virtual machines, acquiring first combined secret keys according to the secret keys K2 and the secret keys K1, generating first random numbers N1, encrypting the first random numbers N1 by the aid of the first combined secret keys and then transmitting the encrypted first random numbers N1 to the cloud terminal; enabling the cloud terminal to acquire second combined secret keys according to the secret keys K2 transmitted by the host and the secret keys K1 stored in the cloud terminal, decrypting the first random numbers N1 by the aid of the second combined secret keys, then encrypting the first random numbers N1 again, generating second random numbers N2, encrypting the second random numbers N2 by the aid of the second combined secret keys and transmitting the second random numbers N2 and the first random numbers N1 to the host; enabling the host to decrypt the first random numbers N1 by the aid of the first combined secret keys, and determining whether the cloud terminal is successfully authenticated or not according to the correctness of the first random numbers N1; enabling the host to decrypt the second random numbers N2 by the aid of the first combined secret keys again, decrypting the second random numbers N2 again and then transmitting the second random numbers N2 to the cloud terminal; enabling the cloud terminal to decrypt the second random numbers N2 by the aid of the second combined secret keys and determining whether the virtual machines are successfully authenticated or not according to the correctness of the second random numbers N2.

Description

technical field [0001] The embodiments of the present invention relate to Internet technologies, and in particular to an identity authentication method, device and system. Background technique [0002] In communication networks, identity authentication is the basis of network information security. Especially in the cloud computing environment, shared hardware and software resources and information are provided to users on demand, and users log in to remote virtual machines through cloud terminals. Therefore, a reliable and robust identity authentication system is particularly important for cloud computing environments. [0003] At present, the cloud computing environment usually adopts the smart card (USB Key) authentication technology for identity authentication. The USB Key is a hardware device with a USB interface and a built-in smart chip. The authentication process is as follows: After the user inserts the USB key into the cloud terminal, the cloud terminal recognizes ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/32
CPCH04L9/3226H04L63/083
Inventor 何伟那红旭张焕国王鹃
Owner HUAWEI CLOUD COMPUTING TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products