Cloud computing identity authentication method

An identity authentication and cloud computing technology, applied in the field of cloud computing security, to achieve the effect of easy-to-use and friendly, convenient access control, and make up for potential security risks

Active Publication Date: 2015-07-29
中电科网络安全科技股份有限公司
View PDF4 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to provide a cloud computing identity authentication method that can meet the security requirements of access security, channel security, application secu

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud computing identity authentication method
  • Cloud computing identity authentication method
  • Cloud computing identity authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0037] The invention provides a cloud computing identity authentication method based on USBKey and security-enhanced RDP. The method uses USBKey as a password device, uses digital certificate technology, SSL (Secure Socket Layer, secure socket layer) encryption technology, and securely enhances Remote Desktop Protocol RDP (Remote Desktop Protocol, Remote Desktop Protocol), by deploying security components on cloud terminals and cloud servers respectively, realizes strong identity authentication for cloud terminal users logging in to cloud servers and security authentication for virtual desktop users.

[0038] The present invention will use the USBKey in the cloud terminal (TC or traditional PC terminal), use the "USBKEY+PIN code" method to realize "two-factor" strong identity authentication, and combine the digital certificate technology to enhance the security of the existing RDP protocol, Map the USBKey device of the cloud terminal to the virtual desktop in a safe and control...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a cloud computing identity authentication method. The cloud computing identity authentication method comprises the following steps that (1) a cloud terminal identifies inserted cryptographic equipment and sends a login request message to a cloud server after identification; (2) after the cloud server receives the message, the cloud server sends an authentication message to the cloud terminal; (3) the cloud terminal extracts a digital certificate in the cryptographic equipment according to the authentication message, and encrypts the digital certificate and sends the digital certificate to the cloud server; (4) the cloud server verifies the user identity according to the digital certificate, when the verification passes, a virtual machine corresponding to the cloud server is directly connected to the cloud terminal through an RDP (Remote Desktop Protocol). According to the cloud computing identity authentication method, the cryptographic equipment is integrated, so that strong identity authentication of a user of a virtual desktop can be realized, and the potential safety hazard due to the single verification of a user name and a password in the existing cloud computing is made up.

Description

technical field [0001] The invention relates to the technical field of cloud computing security, in particular to a cloud computing identity authentication method. Background technique [0002] At present, cloud computing technology is widely used. The existing cloud computing identity authentication technology mostly relies on Microsoft's AD (Active Directory) domain, combined with the single sign-on technology based on OPenID and other protocols to achieve identity authentication. Username + password" is used to implement identity authentication, but the authentication strength is not enough. This situation is common in mainstream cloud computing platforms such as VMware and Citrix. In addition, the existing cloud computing platforms use remote desktop protocols (RDP, SPICE, etc.) to transmit data, and the unilateral authentication of the cloud terminal by the cloud server is often used, which will lead to the security risk of "man-in-the-middle attack". Contents of the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32H04L29/08
CPCH04L9/3226H04L9/3263H04L63/08H04L63/0823H04L63/10H04L67/025H04L67/08H04L67/1097
Inventor 尹一桦
Owner 中电科网络安全科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products