A Heterogeneous Cross-Domain Authentication Method Based on Trusted Proxy in Cloud Environment
An authentication method and cloud environment technology, applied in the field of heterogeneous cross-domain authentication based on trusted agents, to achieve the effect of simple calculation and reduced burden
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0034] figure 2 A trusted agent-based heterogeneous cross-domain authentication method in a cloud environment is shown, including the following steps:
[0035] (1) Cross-domain authentication: user U randomly selects two values
[0036] (1) Calculate the session key parameter Y=aPK CSP ;
[0037] (2) Test=wTID U , where the temporary identity TID U =H 1 (ID u ||r u P);
[0038] (3)
[0039] Send {TID encrypted to the cloud service provider CSP U ,w,request}P pub2 Access request information, and also send encrypted messages to the third-party certification center CA
[0040] (2) The cloud service provider CSP securely accepts the information request, verifies the legality of the user's identity, and the cloud service provider CSP randomly selects two values
[0041] (1) Calculate the session negotiation parameter Z=bPK u ;
[0042] (2)
[0043] If there is no TID through the user access list U information, will use P pub encrypted message {Test1, Z, ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

