Distributed identity authentication method and system

An identity authentication and distributed technology, applied in the field of big data security, to achieve the effect of reliable authentication, high authentication efficiency, and reliable identity authentication

Inactive Publication Date: 2017-09-22
北京明朝万达科技股份有限公司
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Under such changes, the traditional centralized identity authentication method faces huge challenges, and how to build a new identity authentication method under the decentralized interconnection system is imminent

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed identity authentication method and system
  • Distributed identity authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment

[0051] A distributed identity authentication demonstration system implemented by a bank based on the technical solution of the present invention. By combining the customer's existing physical and virtual environments, a set of identity authentication systems for mobile terminals (android), PC terminals (windows) and business systems (Linux) is built. The authentication cloud distributed unit consists of 10 servers with different configurations Composition, distributed units can be added at any time. The number of access users is about 5000, and the performance of this set of demonstration system has reached that the identity authentication function is still running normally when 50% of the distributed units exit; when the number of concurrent users reaches 2000, the identity authentication of various terminal devices is less than 1s.

[0052] Through client products combined with server-side integration support, on the one hand, it can be used in the new business system to sup...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a distributed identity authentication method and system. The method comprises the following steps that a client sends an authentication request to an authentication server; the client receives returned authentication calculation control and association node information; the client carries out calculation according to the authentication calculation control, thereby obtaining authentication information result CRL; and an authentication access node receives the authentication information result CRL, compares the authentication information result CRL with authentication information SAL and returns an authentication result to the client. Through application of the scheme, the identity authentication efficiency and stability are improved, and local processing resources are saved.

Description

technical field [0001] The invention relates to the field of big data security, in particular to a distributed identity authentication method and system. Background technique [0002] The existing Internet system is changing from a traditional centralized model to a decentralized one. The centralized control points in the traditional interconnected system may face more and more cyber attacks and information theft, and there are more and more decentralized and distributed structures. appear before people's eyes. [0003] Under such changes, the traditional centralized identity authentication method faces great challenges, and how to build a new identity authentication method under the decentralized interconnection system is imminent. Contents of the invention [0004] In order to solve the above-mentioned technical problems, the present invention provides a distributed identity authentication method, comprising the following steps: [0005] 1) The client sends an authenti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/31H04L29/08
CPCH04L63/08G06F21/31H04L67/10
Inventor 秦凯王志海喻波王志华
Owner 北京明朝万达科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products