Authentication method and device

An authentication and authentication request technology, applied in the field of data communication, can solve problems such as inflexible authentication schemes, potential safety hazards, and changes in authentication schemes

Active Publication Date: 2018-07-03
CHINA MOBILE SUZHOU SOFTWARE TECH CO LTD +1
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In the existing authentication methods, Keystone uses the "Policy.json" file for authentication. This authentication file is common to all users, and the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and device
  • Authentication method and device
  • Authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention.

[0046] figure 1 It is a schematic diagram of the implementation process of the authentication method in the embodiment of the present invention. Such as figure 1 As shown, the authentication method may include the following steps:

[0047] Step 101: Receive an authentication request sent by a user; wherein the authentication request carries Project_ID and Endpoint_ID.

[0048] In the specific embodiment of the present invention, three data tables for authenticating the authentication request can be stored in advance, namely: the Policy data table; the Policy_Association data table and the Policy_Strategy data table. Specifically, the data structure of the Policy data table can be as shown in Table 1 below:

[0049]

[0050] Table 1

[0051] Among them, in the above table 1: ID, used to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authentication method and device. The method comprises the steps that the authentication request sent by a user can be received by a user, wherein the authentication requestcarries along a tenant identification Project_ID and an authentication identification Endpoint_ID; whether the Project_ID is related to the Endpoint_ID or not can be determined; when the Project_ID is related to the Endpoint_ID, the authentication strategy corresponding to the Project_ID can be searched; when the authentication strategy corresponding to the Project_ID is found, the authenticationrequest undergoes authentication based on the authentication strategy corresponding to the Project_ID.

Description

Technical field [0001] The present invention relates to the field of data communication technology, in particular to an authentication method and device. Background technique [0002] Keystone is the module responsible for managing authentication, service rules, and service token functions in the OpenStack cloud platform. Keystone mainly involves the following concepts: User User, Tenant Tenant, Role and Token. Among them, User is a user who uses OpenStack services, and any object that uses OpenStack services can be called a user. Tenant is a tenant of OpenStack services. There can be many users in a tenant. These users can use the resources in the tenant according to the division of permissions. Role is the role of the user, which enables the user to obtain the operation authority corresponding to the role. Token is a string of bit values ​​or character strings used as a token for accessing resources. Token contains the range and effective time of accessible resources. [0003...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0876
Inventor 杨巍巍何磊马琪
Owner CHINA MOBILE SUZHOU SOFTWARE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products