Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Big Data Security Framework System Based on Identity Authentication

An identity authentication and framework system technology, applied in the field of big data security, can solve problems such as password attacks and system overload, and achieve the effect of improving stability

Active Publication Date: 2022-06-28
INSPUR SOFTWARE TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The invention discloses a big data security framework system based on identity authentication, which solves the problem of heavy system load caused by adopting centralized server authentication in the existing big data security authentication, and can prevent messages from being encrypted by using symmetric keys to attack After the attacker collects a large amount of information, the problem of attacking the password in an offline manner through calculation and cryptanalysis

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Big Data Security Framework System Based on Identity Authentication
  • A Big Data Security Framework System Based on Identity Authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention provides a big data security framework system based on identity authentication, comprising at least one big data server,

[0036] And use the big data server to distribute the smart card to the client: the big data server creates the public key, defines the operation rules,

[0037] The big data server obtains the client's identifier and client password, uses the public key and identifier to encrypt the key that the client needs to authenticate, and uses the algorithm to encrypt the identifier and client password, and encrypts random parameters at the same time. The key, encrypted identifier and client password, encrypted random parameters and operation rules are placed in the smart card and sent to the client;

[0038] And use the big data server and the client to conduct mutual authentication through the smart card to establish a session: the big data server accepts the request service from the client and the verification parameters sent by the c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a big data security framework system based on identity authentication, which relates to the technical field of big data security; it includes at least one big data server, and uses the big data server to distribute smart cards to clients: the big data server creates public keys and defines operations According to the rules, the big data server obtains the client's identifier and client password, uses the public key and identifier to encrypt the key that the client needs to authenticate, and uses the algorithm to encrypt the identifier and client password, and at the same time encrypts the random parameters, and the client needs The authenticated key, encrypted identifier and customer password, encrypted random parameters and operation rules are placed in the smart card and sent to the client; and the big data server and the client are mutually authenticated through the smart card to establish a session.

Description

technical field [0001] The invention discloses a big data security framework system based on identity authentication, and relates to the technical field of big data security. Background technique [0002] In the environment of big data in the information age, data security is extremely important. At present, most companies have begun to provide big data services for Internet users, including information retrieval and sharing. These services also bring serious security problems. At present, digital security authentication technology is commonly used in big data. Most systems use asymmetric and traditional public key encryption to provide mutual authentication and ensure data security. However, the existing authentication scheme is usually authenticated on a centralized server, and most of the authentication load is concentrated on the authentication server. With the increase of the system scale, the load of the authentication server also increases, which easily becomes the b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/08H04L67/141
CPCH04L63/0435H04L9/0869H04L63/0853H04L63/083H04L67/141
Inventor 李少杰程林杨培强
Owner INSPUR SOFTWARE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products