Check patentability & draft patents in minutes with Patsnap Eureka AI!

Cluster authentication method and apparatus

An authentication method and cluster technology, applied in the field of data processing, can solve cumbersome problems

Inactive Publication Date: 2018-12-21
NEW H3C BIG DATA TECH CO LTD
View PDF7 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in the traditional cluster security authentication method, the authentication of each component in the cluster can only be authenticated through asymmetric encryption. When the same user logs in to different components, multiple authentications are required, which is cumbersome

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cluster authentication method and apparatus
  • Cluster authentication method and apparatus
  • Cluster authentication method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. The components of the embodiments of the invention generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations. Accordingly, the following detailed description of the embodiments of the invention provided in the accompanying drawings is not intended to limit the scope of the claimed invention, but merely represents selected embodiments of the invention. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.

[0022] It should be noted that like numerals and let...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a cluster authentication method and a device. The method comprises the following steps: the CAS receives a first authentication request, wherein the first authentication requestis generated by a first component of the cluster based on a first resource acquisition request initiated by a client of the cluster;judging whether the first authentication request carries a login ticket corresponding to an account initiating the first resource acquisition request, wherein the login ticket is dispatched by the account when logging on the second component of the cluster; when it is determined that the first authentication request carries the login ticket, the authentication success information is returned to the first component, and the authentication success information indicates that the account satisfies the login condition of the first component, thereby realizing single sign-on and avoiding repeated login authentication for the same account when logging in different components.

Description

technical field [0001] The invention relates to the field of data processing, in particular to a cluster authentication method and device. Background technique [0002] Big data, or huge amount of data, refers to the amount of data involved is so large that it cannot be captured, managed, processed, and organized within a reasonable time by current mainstream software tools to help enterprises make more positive business decisions. purpose information. With the rapid development of the Internet and mobile Internet, people's lives are being digitized, recorded, disseminated, and tracked, causing people to leave more and more information on the Internet, which forms big data. The information is stored in different components in the cluster, so that registered users in the cluster and cluster development users can obtain it. [0003] However, in the traditional cluster security authentication method, the authentication of each component in the cluster can only be authenticate...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/08H04L63/0815H04L67/10
Inventor 燕鹏举黄雷
Owner NEW H3C BIG DATA TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More