Unified identity authentication system based on cloud platform

A technology of identity authentication and cloud platform, applied in the field of unified identity authentication system, can solve the problems of lack of effective management and control of access rights of computing resources and data resources, and achieve the effect of solving management and control problems

Active Publication Date: 2016-03-23
UNITED ELECTRONICS
View PDF5 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These products can easily realize unified login authentication of multiple systems, but for different resources in each subsystem of unified login authentication, there is still a lack of means for further security control of specific business system resources, especially for different users in cloud resources. Lack of effective management and control of access to expe

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unified identity authentication system based on cloud platform
  • Unified identity authentication system based on cloud platform
  • Unified identity authentication system based on cloud platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0039] It should be noted that the terms "first" and "second" in the description and claims of the present application and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It should be understood that the data so used may be interchanged under appropriate circumstances for the embodiments of the application described herein. Furthermore, the terms "comprising" and "having", as well as any variations thereof, are intended to cover a non-exclusive inclusion, for example, a process, method, system, product or device comprising a sequence of steps or elements is not necessarily limited to the expressly listed instead, may include other steps or e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a unified identity authentication system based on a cloud platform, comprising a management subsystem (101) which carries out centralized management to a user, a virtual computing resource, a virtual software resource and a virtual identity object and is responsible for correlation relationship management of the user and the virtual object; a mapping subsystem (102) which maps the virtual object and an entity object managed by the management subsystem (101); an access control subsystem (103) which defines the authority of the mapped entity object; a data storage subsystem (104) which stores the data, the entity AD (active directory) domain data and the entity NIS (network information service) domain data used by the management subsystem (101), wherein the user has an AD domain account and an NIS domain account, the entity object comprises an entity AD group and an entity NIS group, the AD is an active directory, NIS is network information service. Management and control problems of resource access authority after unified authentication are effectively solved by using the unified identity authentication system.

Description

technical field [0001] The invention relates to the technical field of authentication, in particular to a unified identity authentication system based on a cloud platform for authenticating users. Background technique [0002] Traditional unified identity authentication can be implemented in multiple application systems. Users only need to log in once to access all mutually trusted application systems. Once logged in, resources can be fully enjoyed. Most unified identity authentication products are based on the unified authentication of traditional applications, so the unified authentication and authorization capabilities for cloud platforms and cloud resources are relatively weak. In addition, the authorization granularity of most unified identity authentication products is only accurate to applications, devices, and hosts. In layman's terms, it means whether the user has the right to connect to a certain IP address + port, and the access rights to internal resources of the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/083H04L63/0892H04L63/10H04L67/10
Inventor 郭昆山彭俊林李均强
Owner UNITED ELECTRONICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products