Supercharge Your Innovation With Domain-Expert AI Agents!

Method for authenticating identity under virtualized environment

A virtualized environment and identity authentication technology, applied in transmission systems, electrical components, etc., can solve the problems of insecure virtualized environment, increased risks and exposure, and achieve the effect of preventing expired use.

Active Publication Date: 2016-06-29
HUAZHONG UNIV OF SCI & TECH
View PDF8 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This increases risk and exposure and will require close monitoring of changes to system controls and access control restrictions
[0003] At present, the existing cloud platforms basically provide a method for remote users to remotely connect to the virtual machine, but this method is directly connected without any restrictions on the connecting user, which allows any user to remotely connect to the virtual machine. machine for remote desktop mapping, which makes the virtualized environment extremely insecure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for authenticating identity under virtualized environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not constitute a conflict with each other.

[0023] like figure 1 As shown, the identity authentication method under the virtualization environment of the present invention includes the following steps:

[0024] (1) Set the server virtualization environment to only allow local IP to remotely connect to the virtual machine;

[0025] (2) Register and register the basic information of the remote virtual machine user, and uniquely assign the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention designs a method for authenticating an identity under a virtualized environment.The method specifically comprises the following steps that firstly, a server virtualized environment is set to be only allowed to be remotely connected to a virtual machine through a local IP; then, the basic information of a user of the remote virtual machine is registered and logged in, and a USB Key hardware device corresponding to the user is uniquely allocated to the user; the remote user having the corresponding USB Key sends a user name, a code and other information to a main server to request main server authentication, and after passing the identity authentication of the main server, the main server will return a random number to the remote user and inform an auxiliary server of the random number, and the remote user has to send the random number and the identity information of the remote user to the auxiliary server within valid time to initiate secondary authentication to the auxiliary server.When all authentication passes, the auxiliary server starts the corresponding virtual machine and communicates with the remote user through transmission agency, and in this way, the remote user can successfully log in a remote desktop under the virtualized environment.

Description

technical field [0001] The invention belongs to the technical field of cloud computing, and more specifically relates to an identity authentication method in a virtualized environment. Background technique [0002] Cloud computing represents a new business computing model. There are still many uncertainties in its practical application in various aspects, and it faces many security challenges. Among them, the problem of user data security in the cloud platform is particularly prominent, mainly in the following aspects: the efficiency of virtualization in the cloud requires the virtual machines of multiple organizations to coexist on the same physical resource. While traditional data center security still applies to cloud environments, physical isolation and hardware-based security cannot protect against attacks between virtual machines on the same server. Management access is via the Internet, rather than the controlled and limited direct or on-site connections that have pe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/083H04L63/0846H04L63/0853H04L67/08
Inventor 付才余蓓韩兰胜刘铭崔永泉汤学明骆婷
Owner HUAZHONG UNIV OF SCI & TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More