Authentication method and authentication system

An authentication system and authentication method technology, which is applied in transmission systems, digital transmission systems, electrical components, etc., can solve problems affecting authentication services, upgrade configuration, and IAM's own pressure, and achieve the effect of reducing interaction processes and authentication pressure

Active Publication Date: 2015-10-28
BEIJING BAIDU NETCOM SCI & TECH CO LTD
View PDF5 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the above two technologies have the following risks: 1. Based on the authorization mechanism of key fragments, the interfaces opened by cloud services that support key fragment signatures are fixed. When customers have new needs and need to increase temporary access to the interface , the configuration of the cloud server needs to be upgraded; at the same time, after the malicious user obtains the key fragment, these open interfaces are equivalent to being completely open to it, and there is still the problem that customer data will be destroyed
2. Temporary key mechanism. Every time a web page or application requests a temporary key from the client, the client needs to apply to the cloud’s identity identification and access management system IAM. The customer’s business increases or the customer’s business logic is improper (such as repeatedly applying for temporary keys) key), the pressure on IAM itself is too great, which affects the basic authentication service

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and authentication system
  • Authentication method and authentication system
  • Authentication method and authentication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for the convenience of description, only the parts related to the related invention are shown in the drawings.

[0026] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0027] figure 1 An exemplary system architecture 100 to which embodiments of the present application may be applied is shown.

[0028] like figure 1 As shown, the system architecture 100 may include terminal devices 101 , 102 , a network 103 , a client server 104 , and a c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application discloses an authentication method and an authentication system. The authentication method comprises the steps that: a client transmits assignment request information of a first temporary key to a client server; the client server generates first responding information comprising a user key account, the first temporary key and conversation policy information and transmits to the client after checking the assignment request information; the client transmits cloud service request information generated on base of the first responding information to the cloud server;the cloud service request information carries the user key account, the conversation policy information and a signature of the cloud service request information generated by using the first temporary key; the signature of the cloud service request information is authenticated on base of the user key account and the conversation policy information via the cloud server; after authenticating, second responding information responding to the cloud service request information is transmitted to the client. According to the implementation mode of the application, the authentication method reduces the interactive flow between the client server and the cloud server and debases the authentication press of the cloud server.

Description

technical field [0001] The present application relates to the technical field of computer network, in particular to the technical field of computer network authentication, especially to an authentication method and an authentication system. Background technique [0002] In public cloud services, customers (such as website owners) need to provide users (such as Internet users) with direct access to resources stored in the cloud (such as audio and video) in web pages or applications, so as to avoid unnecessary transfer of data through the customer's server. network transmission. In order to ensure security, the application programming interface provided by cloud storage is implemented by signing requests with public and private keys. When accessing web pages or applications, public and private keys need to be configured to be used. However, web pages or applications are distributed to users (netizens), and there is a risk that malicious users can decipher the customer's key, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/062H04L63/083H04L63/101H04L9/40
Inventor 邓小超
Owner BEIJING BAIDU NETCOM SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products