Unified identity authentication method based on cloud platform

A technology of identity authentication and cloud platform, applied in the field of authentication, can solve the problems of lack of management and control of access rights of computing resources and data resources, and achieve the effect of solving the problems of management and control of access rights of resources

Active Publication Date: 2016-05-11
UNITED ELECTRONICS
View PDF6 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The current unified identity authentication method lacks effective management and control for different users in cloud resources to access different expensive computing resources and data resources
[0009] For this reason, after long-term theoretical research a

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unified identity authentication method based on cloud platform
  • Unified identity authentication method based on cloud platform
  • Unified identity authentication method based on cloud platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0045] It should be noted that the terms "first" and "second" in the specification and claims of the present application and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific order or sequence. It should be understood that the data so used may be interchanged under appropriate circumstances for the embodiments of the application described herein. Furthermore, the terms "comprising" and "having", as well as any variations thereof, are intended to cover a non-exclusive inclusion, for example, a process, method, system, product or device comprising a sequence of steps or elements is not necessarily limited to the expressly listed instead, may include other steps or el...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a unified identity authentication method based on a cloud platform. The method comprises the steps of: managing information, wherein users, virtual calculation resources, virtual software resources and virtual identity objects are integrally managed, and associated relations between the users and the virtual objects are managed; mapping the objects, wherein the managed virtual objects in the information managing step are mapped to entity objects, and mapping relations between the virtual objects and the entity objects are managed; and controlling access, wherein authority of the entity objects after the object mapping step is defined, and data, entity AD domain data, entity NIS domain data used in the information managing step are stored in a preset database of the cloud platform. The unified identity authentication method effectively solves the problems of resource access authority management and control of different coordination after the unified authentication.

Description

technical field [0001] The invention relates to the technical field of authentication, in particular to a unified identity authentication method based on a cloud platform. Background technique [0002] Traditional unified identity authentication can be implemented in multiple application systems. Users only need to log in once to access all mutually trusted application systems. Once logged in, resources can be fully enjoyed. Most unified identity authentication products are based on the unified authentication of traditional applications, so the unified authentication and authorization capabilities for cloud platforms and cloud resources are relatively weak. In addition, the authorization granularity of most unified identity authentication products is only accurate to applications, devices, and hosts. In layman's terms, it means whether the user has the right to connect to a certain IP address + port, and the access rights to internal resources of the entity need to be alloca...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06F21/31
CPCG06F21/31H04L63/08
Inventor 崔成奎彭俊林吴欢
Owner UNITED ELECTRONICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products