Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Big data security framework system based on identity authentication

A big data and security technology, applied in the field of big data security, can solve problems such as password attacks and system overload

Active Publication Date: 2020-01-17
INSPUR SOFTWARE TECH CO LTD
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The invention discloses a big data security framework system based on identity authentication, which solves the problem of heavy system load caused by adopting centralized server authentication in the existing big data security authentication, and can prevent messages from being encrypted by using symmetric keys to attack After the attacker collects a large amount of information, the problem of attacking the password in an offline manner through calculation and cryptanalysis

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Big data security framework system based on identity authentication
  • Big data security framework system based on identity authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention provides a big data security framework system based on identity authentication, including at least one big data server,

[0036] And use the big data server to distribute the smart card to the client: the big data server creates a public key, defines the operation rules,

[0037] The big data server obtains the client's identifier and client password, uses the public key and identifier to encrypt the key that the client needs to authenticate, uses the algorithm rules to encrypt the identifier and client password, and encrypts random parameters at the same time, and encrypts the client's authentication key. Key, encrypted identifier and customer password, encrypted random parameters and operation rules are placed in the smart card and sent to the client;

[0038] And use the big data server and the client to conduct mutual authentication through the smart card to establish a session: the big data server accepts the client's request service and the v...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a big data security framework system based on identity authentication, and relates to the technical field of big data security. The system comprises at least one big data server, the big data server is utilized to distribute the intelligent cards to the clients; the big data server creates a public key, defines operational rules, the big data server acquires an identifier and a client password of the client; a secret key needing to be authenticated of the client is encrypted by utilizing the public secret key and the identifier, the identifier and the client password are encrypted by utilizing an operation rule, the random parameter is simultaneously encrypted, and the secret key needing to be authenticated of the client, the encrypted identifier and the client password, the encrypted random parameter and the operation rule are put into the intelligent card to be sent to the client; and the big data server and the client are used for mutual authentication through the intelligent card so as to establish a session.

Description

technical field [0001] The invention discloses a big data security framework system based on identity authentication, and relates to the technical field of big data security. Background technique [0002] In the environment of big data in the information age, data security is extremely important. At present, most companies have begun to provide Internet users with big data services, including information retrieval and sharing, and these services will also bring serious security problems. At present, digital security authentication technology is commonly used for big data. Most systems use asymmetric and traditional public key encryption to provide mutual authentication and ensure data security. However, the existing authentication schemes are usually authenticated on a centralized server, and most of the authentication load is concentrated on the authentication server. With the increase of the system scale, the load on the authentication server will also increase, which wil...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/08H04L29/08
CPCH04L63/0435H04L9/0869H04L63/0853H04L63/083H04L67/141
Inventor 李少杰程林杨培强
Owner INSPUR SOFTWARE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products