Distributed identity authentication method and cloud authentication node

An identity authentication and distributed technology, applied in the field of big data security, to achieve the effect of reliable authentication, high authentication efficiency, and reliable identity authentication

Inactive Publication Date: 2018-08-24
北京明朝万达科技股份有限公司
View PDF10 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Under such changes, the traditional centralized identity authentication method faces huge challenges, and how to build a new identity authentication method under the decentralized interconnection system is imminent

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed identity authentication method and cloud authentication node
  • Distributed identity authentication method and cloud authentication node
  • Distributed identity authentication method and cloud authentication node

Examples

Experimental program
Comparison scheme
Effect test

Embodiment example

[0076] A distributed identity authentication demonstration system made by a commercial bank based on the present invention. By combining the customer's existing physical and virtual environments, a set of identity authentication systems for mobile terminals (android), PC terminals (windows) and business systems (Linux) is built. The distributed unit is composed of 10 servers with different configurations. Distributed units can be added at any time. The number of access users is about 5000, and the performance of this set of demonstration system has reached that the identity authentication is still running normally when 50% of the distributed units exit; when the number of concurrent users reaches 2000, the identity authentication of various terminal devices is less than 1s.

[0077] Partners combine client-side products with server-side integration support. On the one hand, they can be used to support new security guarantees for the identity authentication system in new busine...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a distributed identity authentication cloud node and authentication method. The node comprises a subscriber object interacting with an authentication system, an object controller, an authenticator, an authorization manager, a session management device, and a cache management device, wherein the object controller controls all interaction, manages all subscriber objects and is used for managing subscriber authentication, authorization, session and cache, the authenticator is used for authenticating login and checking whether a subscriber identity is legal, the authorization manager verifies all rights related to user operations, receives a Permission instance that the subscriber requests to upload and compares the rights with a role/right corresponding to the subscriber that acquired by invoking Ldap Realm in background, the session management device manages and operates sessions, and the cache management device is used for packaging RedisDao and executing base operations targeting cache server Redis. Through adoption of the method and node, identity authentication is more efficient and stable, and fewer resources are processed in local.

Description

technical field [0001] The invention relates to the field of big data security, in particular to a distributed identity authentication method and system. Background technique [0002] The existing Internet system is changing from a traditional centralized model to a decentralized one. The centralized control points in the traditional interconnected system may face more and more cyber attacks and information theft, and there are more and more decentralized and distributed structures. appear before people's eyes. [0003] Under such changes, the traditional centralized identity authentication method faces great challenges, and how to build a new identity authentication method under the decentralized interconnection system is imminent. Contents of the invention [0004] In order to solve the above technical problems, the present invention provides a distributed identity authentication cloud node, including: [0005] User objects for authentication system interactions; [0...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0815H04L63/10H04L67/10
Inventor 徐冬梅王志华喻波王志海秦凯王玮
Owner 北京明朝万达科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products