Distributed identity authentication method and cloud authentication node
An identity authentication and distributed technology, applied in the field of big data security, to achieve the effect of reliable authentication, high authentication efficiency, and reliable identity authentication
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment example
[0076] A distributed identity authentication demonstration system made by a commercial bank based on the present invention. By combining the customer's existing physical and virtual environments, a set of identity authentication systems for mobile terminals (android), PC terminals (windows) and business systems (Linux) is built. The distributed unit is composed of 10 servers with different configurations. Distributed units can be added at any time. The number of access users is about 5000, and the performance of this set of demonstration system has reached that the identity authentication is still running normally when 50% of the distributed units exit; when the number of concurrent users reaches 2000, the identity authentication of various terminal devices is less than 1s.
[0077] Partners combine client-side products with server-side integration support. On the one hand, they can be used to support new security guarantees for the identity authentication system in new busine...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com