Cloud computing-based cloud authentication method and system

An authentication method and cloud computing technology, applied in the transmission system, electrical components, etc., can solve the problems of cloud terminal security that needs to be strengthened urgently, identity loss, data theft and information loss, etc. The effect of declassification

Inactive Publication Date: 2015-12-30
WUHAN YUNTONG YINGFEI TECH CO LTD
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, as the number of terminals connected to the cloud continues to increase, security risks such as identity loss, da

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud computing-based cloud authentication method and system
  • Cloud computing-based cloud authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0022] The present invention will be further described below with reference to the drawings and specific embodiments.

[0023] Such as figure 1 As shown, a cloud authentication system based on cloud computing includes a cloud computing terminal, the cloud computing terminal is connected to an identity authentication server, and the cloud computing terminal is connected to a cloud virtual machine server cluster.

[0024] The cloud computing terminal includes: a shell, a motherboard set in the shell, the motherboard integrates a fingerprint authentication unit, a digital certificate operation storage IC unit, a network signal processing unit, a USB interface, and an optical fiber optic converter; the cloud computing terminal passes through the USB interface and the network The signal processing unit and the optical fiber photoelectric converter are respectively connected to the identity authentication server and the cloud virtual machine server cluster.

[0025] In this embodiment, the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a cloud computing-based cloud authentication method. The method includes the following steps that: A, a cloud computing terminal generates a unique equipment serial number; B, the identity of a user is read, and an identity authentication server connected with the cloud computing terminal verifies the identity of the user, if the user does not exist, the cloud computing terminal restores initial settings, the method returns the step A; and the cloud computing terminal is connected with and starts a cloud virtual machine cluster server through a client end connection protocol; D, whether the cloud virtual machine cluster server is started normally is judged, if the cloud virtual machine cluster server is started normally, step F is executed, if the cloud virtual machine cluster server is started abnormally, step E is operated. With the cloud computing-based cloud authentication method of the invention adopted, the problem of user information weak caused by weak protective measures of the cloud computing terminal can be effectively solved, and potential safety hazards in various aspects, such as identity confidentiality loss, data interception and information loss can be effectively avoided; a complete cloud identity and cloud data trusted protection chain can be formed; and the problem of unsafety of information and the problem of incapability of realizing confidentiality of the information under a cloud computing environment can be effectively avoided.

Description

technical field [0001] The invention relates to a cloud computing-based cloud authentication method and system. Background technique [0002] With the advent of cloud terminals, many problems have emerged. The most important ones are the security and protection issues that users often care about, including the protection of user privacy, user data protection, and cloud computing terminal facilities. These issues Both require stronger technical means to solve them. The terminal is often the weakest link in the entire enterprise. Many hackers and intruders often use the terminal as a springboard to attack the cloud. The new generation of high persistent security threats (APT) are all It starts from the terminal to steal user intellectual property and sensitive information, and even attack important livelihood infrastructure. Therefore, terminal security is a part that cannot be ignored in the security protection of cloud computing environment. [0003] The biggest obstacle t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0876H04L63/0853H04L67/10
Inventor 张连发
Owner WUHAN YUNTONG YINGFEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products