Check patentability & draft patents in minutes with Patsnap Eureka AI!

A method for carrying out remote multi-party authentication on user identities

A user identity and user technology, applied in the field of cloud computing security, can solve the problems of login authentication difficulties, unpredictable login location and login environment of cloud service applicants, etc.

Active Publication Date: 2019-05-03
BEIJING JIUZHOU YUNTENG TECH CO LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the login location and login environment of cloud service applicants are unpredictable, it is difficult to authenticate the real identity and application motivation of the applicant

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for carrying out remote multi-party authentication on user identities
  • A method for carrying out remote multi-party authentication on user identities
  • A method for carrying out remote multi-party authentication on user identities

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0044] Those skilled in the art will understand that unless otherwise stated, the singular forms "a", "an", "said" and "the" used herein may also include plural forms. It should be further understood that the word "comprising" used in the description of the present invention refers to the presence of said features, integers, steps, operations, elements and / or components, but does not exclude the presence or addition of one or more other features, Integers, steps, operations, elements, components, and / or groups thereof. It will be understoo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for carrying out remote multi-party authentication on a user identity. According to the method, before the application user applies for the sensitive service, the identity of the application user and the motivation are confirmed to be legal only when the application user and the trusted user log in the system at the same time besides user identity verification, andthe application user is allowed to use the sensitive service. According to the method, the addition homomorphism of a Paillier encryption system is utilized, salt adding is carried out when login information is sent, so that the login information of a user is protected, and the login information is prevented from being leaked; The re-encryption technology is utilized to realize that the application user and the trusted user can be decrypted by the same set of secret keys through re-encryption under the condition that the application user and the trusted user have different secret keys; Attackmodes such as insider attacks and replay attacks can be resisted, and high safety is achieved.

Description

technical field [0001] The invention relates to the field of cloud computing security, in particular to a method for performing remote multi-party authentication on user identities. Background technique [0002] The emergence of cloud computing provides people with a new way of working. Based on the services provided by cloud computing, staff can apply for various services on demand, so as to improve their work efficiency and work flexibility. [0003] However, while cloud computing provides convenience to the staff, criminals will also use the loopholes in the cloud system to cause harm to some organizations. A typical way is that criminals steal the user's login information in advance, such as stealing the login password, stealing the smart card required for the user's login, and copying the user's biological characteristics, so as to achieve the purpose of counterfeiting a legitimate user to log in and apply for services. Since the login location and login environment of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00H04L29/06H04L29/08
Inventor 曾剑隽王越李胜钊
Owner BEIJING JIUZHOU YUNTENG TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More