Identity authentication login method in cloud environment

An identity authentication and login method technology, applied in the field of identity authentication and login, can solve the problems of easy identity fraud, difficult dynamic security boundary protection, easy to suffer from man-in-the-middle attacks, etc., and achieve the effect of improving security.

Inactive Publication Date: 2020-01-07
JIANGSU HENGBAO INTELLIGENT SYST TECH CO LTD
View PDF8 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, cloud computing technology is widely used, and the flexible resource allocation and on-demand access of cloud computing also bring many security problems: first, dynamic security boundaries make protection more difficult; second, identities are vulnerable to fraudulent use and man-in-the-middle attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication login method in cloud environment
  • Identity authentication login method in cloud environment
  • Identity authentication login method in cloud environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] Examples of the present disclosure will now be described more fully with reference to the accompanying drawings. The following description is merely exemplary in nature and is not intended to limit the disclosure, application or uses.

[0044] Example embodiments are provided so that this disclosure will be thorough, and will fully convey the scope to those who are skilled in the art. Numerous specific details are set forth such as examples of specific components, devices and methods, to provide a thorough understanding of embodiments of the present disclosure. To those skilled in the art, specific details need not be employed, example embodiments may be embodied in many different forms, and neither should be construed to limit the scope of the disclosure. In some example embodiments, well-known processes, well-known structures, and well-known technologies are not described in detail.

[0045] The technical problems raised by the present disclosure will be described i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an identity authentication login method in a cloud environment. Before a cloud terminal user accesses a virtual machine in a cloud server, firstly, identity authentication iscarried out, after the authentication is passed, a connection request monitoring module of the cloud server accesses a unified user management module, and whether a user has permission to access required virtual desktop resources is determined according to the authorization condition of the user, so that the cloud login security of a cloud terminal user is improved. The invention also relates to an identity authentication system in the cloud environment, and by using the method and the system provided by the invention, the legality of the user identity can be verified, and a secure data transmission channel is provided.

Description

technical field [0001] The invention relates to the field of cloud security, in particular to an identity authentication login method in a cloud environment. Background technique [0002] Cloud computing is an Internet-based computing method in which shared hardware and software resources and information are provided to computers and other devices on demand. The cloud platform provides services based on cloud computing. It is the supplier who provides the cloud platform, and the customer enjoys the service of the cloud platform provided by the supplier, so that the customer does not have to build his own company's infrastructure, and can completely rely on the cloud platform to create a new mirror instance . [0003] Although cloud computing offers many advantages, data security is a major concern. In particular, companies that desire to deploy their enterprise applications within a cloud environment often maintain and manage critical business information associated with s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/34G06F9/451G06F21/33
CPCG06F21/33G06F21/34G06F9/452
Inventor 钱京陆道如崔可
Owner JIANGSU HENGBAO INTELLIGENT SYST TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products