Login verification method for data centre integrated management system

A technology for comprehensive management and login verification, which is applied in the field of login verification of the data center comprehensive management system, can solve problems such as limiting application scalability, reducing communication efficiency, and increasing server computing burden, so as to achieve easy maintenance and management, improve authentication efficiency, and improve The effect of operational management efficiency

Inactive Publication Date: 2018-06-08
ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
View PDF7 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the digital certificate authentication method needs to request, send and proofread the certificate, which reduces the communication efficiency, increases the computing burden of the server, and limits the application scalability.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Login verification method for data centre integrated management system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments.

[0039] This embodiment adopts a two-way authentication mechanism to improve system security. When performing fingerprint identification authentication, the encryption protocol is first used to make the handshake between the client and the cloud successful, and after two-way verification of their legitimacy, a secure link is established and a shared key is obtained. Next, according to the user's business needs, user fingerprint registration and fingerprint login authentication are performed.

[0040] Each client must go through fingerprint login reg...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a login verification method for a data centre integrated management system. A bidirectional authentication mechanism is adopted in the method, so that the security of the system is improved; when fingerprint identification and identity authentication are carried out, an encryption protocol is adopted at first, so that shaking between a client side and a cloud side is successful; after bidirectional verification of respective validities is carried out, a secure link is established; furthermore, a shared key is obtained; then, according to user service requirements, userfingerprint registration and fingerprint login authentication are carried out; high-security-level requirements of the data centre integrated management system are satisfied; to improve the securitylevel of an authentication system, an authentication threshold value can be set in an authentication process; and thus, the service support capability of the data centre integrated management system is improved.

Description

technical field [0001] The invention relates to a login verification method, in particular to a login verification method for a data center comprehensive management system. Background technique [0002] When a user enters the system or accesses system resources with different protection levels, the system needs to use certain authentication means to verify the attributes of the authenticated object to confirm whether it is authentic, valid and unique. Based on the attributes of the authentication object, the current terminal authentication methods mainly include password authentication, smart card authentication, and digital certificate. [0003] Password authentication is one of the most common and simplest cloud security authentication technologies, mainly in the form of static passwords, dynamic passwords, and PIN codes. The authentication system records each user's ID and corresponding passphrase, and determines the user's access authority by judging whether the ID and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24H04L9/32
CPCH04L9/3231H04L9/3273H04L41/28H04L63/0442H04L63/0815H04L63/0861H04L63/0869
Inventor 李俊山
Owner ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products