Unlock instant, AI-driven research and patent intelligence for your innovation.

User authentication processing method and system of cloud computing platform

A cloud computing platform and user authentication technology, applied in the field of information security, can solve the problems of large operation and maintenance costs, use costs, and consumption, and achieve the effect of saving operation and maintenance costs and use costs, and improving processing efficiency

Inactive Publication Date: 2019-04-05
ALIBABA GRP HLDG LTD
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, many system architectures that integrate identity authentication protocols often have their own independent identity management systems. If a system architecture needs to operate and maintain two identity management systems, it often requires large operation and maintenance costs and usage costs.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User authentication processing method and system of cloud computing platform
  • User authentication processing method and system of cloud computing platform
  • User authentication processing method and system of cloud computing platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to enable those skilled in the art to better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described The embodiments are only some of the embodiments of the present application, but not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0031] In order to make it easier for those skilled in the art to understand the technical solutions provided by the embodiments of the present application, the technical environment in which the technical solutions are implemented is first described below.

[0032] In order to clearly express the identity authentication method based on t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a user authentication processing method and system of a cloud computing platform. The system comprises a certificate server and a cloud identity management server; the certificate server receives an identity authentication request, and forwards the identity authentication request to the cloud identity management server; and the cloud identity management server receives theidentity authentication request, analyzes user information from the identity authentication request, implements identity authentication according to the user information, and returns the identity authentication request to the certificate server. Thus, user identity authentication and user identity management are integrated in an original user identity management system of cloud computing, and themaintenance and using cost of the cloud computing platform is reduced.

Description

technical field [0001] The present application relates to the field of information security technology, in particular to a method and system for processing user authentication on a cloud computing platform. Background technique [0002] Identity authentication is the basis of information system security. Identity authentication refers to the process of confirming the identity of a user in a computer and computer network system, so as to determine whether the user has access and use rights to a certain resource, and then make the computer and network system access Policies can be executed reliably and effectively, preventing attackers from impersonating legitimate users to gain access to resources, ensuring system and data security, and legitimate interests of authorized visitors. [0003] Currently, there are many protocols for identity authentication, such as Kerberos protocol, MD5challenge protocol, GTC protocol, EAP-TLS protocol and so on. Among them, the Kerberos protoc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/083H04L63/0876H04L63/10H04L67/10
Inventor 宋军吴威
Owner ALIBABA GRP HLDG LTD