An authentication method and device

A technology for authentication and authentication request, applied in the field of data communication, which can solve problems such as hidden dangers, inflexible authentication schemes, and changes in authentication schemes.

Active Publication Date: 2020-10-30
CHINA MOBILE SUZHOU SOFTWARE TECH CO LTD +1
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In the existing authentication methods, Keystone uses the "Policy.json" file for authentication. This authentication file is common to all users, and the authentication scheme is not flexible enough; and once the file is modified, all users' The authentication scheme will change, and there is a big security risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An authentication method and device
  • An authentication method and device
  • An authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the drawings in the embodiments of the present invention.

[0046] figure 1It is a schematic diagram of the implementation flow of the authentication method in the embodiment of the present invention. Such as figure 1 As shown, the authentication method may include the following steps:

[0047] Step 101. Receive an authentication request sent by a user; wherein, the authentication request carries Project_ID and Endpoint_ID.

[0048] In a specific embodiment of the present invention, three data tables for authenticating the authentication request may be stored in advance, namely: Policy data table; Policy_Association data table and Policy_Strategy data table. Specifically, the data structure of the Policy data table may be as shown in Table 1 below:

[0049]

[0050] Table 1

[0051] Among them, in the above Table 1: ID is used ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authentication method and device. The method comprises the steps that the authentication request sent by a user can be received by a user, wherein the authentication requestcarries along a tenant identification Project_ID and an authentication identification Endpoint_ID; whether the Project_ID is related to the Endpoint_ID or not can be determined; when the Project_ID is related to the Endpoint_ID, the authentication strategy corresponding to the Project_ID can be searched; when the authentication strategy corresponding to the Project_ID is found, the authenticationrequest undergoes authentication based on the authentication strategy corresponding to the Project_ID.

Description

technical field [0001] The present invention relates to the technical field of data communication, in particular to an authentication method and device. Background technique [0002] Keystone is a module in the OpenStack cloud platform responsible for managing authentication, service rules and service token functions. Keystone mainly involves the following concepts: user User, tenant Tenant, role Role and token Token. Wherein, User is a user who uses OpenStack services, and any object that uses OpenStack services can be called a user. Tenant is the tenant of the OpenStack service. A tenant can have many users, and these users can use the resources in the tenant according to the division of permissions. Role is the role of the user, enabling the user to obtain the operation permissions corresponding to the role. Token is a string of bit values ​​or character strings used as a token to access resources. Token contains the scope and valid time of accessible resources. [00...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0876
Inventor 杨巍巍何磊马琪
Owner CHINA MOBILE SUZHOU SOFTWARE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products