Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

A cloud service authority authentication method, device, equipment and medium

A technology of authority authentication and cloud service, which is applied in the field of cloud computing security, can solve the problems of easy loss, theft, and mistransmission of authentication data, and achieve the effect of ensuring storage security and improving security and reliability

Active Publication Date: 2020-09-04
TENCENT TECH (SHENZHEN) CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the prior art, the authentication data involved in the authentication process (such as the derived signature key) is managed by Internet users. The common authentication methods include the following two types: one is to store the authentication data in plain text In the terminals of Internet users; such means will make the authentication data very easy to lose, such as being mis-distributed or stolen, which has a great security risk, which will affect the security of the authentication process
The other is to encrypt and store the authentication data in the Internet user's terminal, usually through public AES (Advanced Encryption Standard, Advanced Encryption Standard) or white-box encryption; although this method improves security, it also brings The storage of the encryption key (Key). When the Key is hacked and copied or stolen, the authentication data also has security risks, and the security of the authentication process cannot be guaranteed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A cloud service authority authentication method, device, equipment and medium
  • A cloud service authority authentication method, device, equipment and medium
  • A cloud service authority authentication method, device, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0079] specific implementation

[0080] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of this application.

[0081] Cloud technology (Cloud Technology) refers to a hosting technology that unifies a series of resources such as hardware, software, and network in a wide area network or a local area network to realize data calculation, storage, processing, and sharing. Cloud technology is a general term for network technology, information technology, integration technology, management platform technology, application technology, etc. based on cloud computing business...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present application discloses a cloud service authority authentication method, device, equipment, and medium. The cloud service authority authentication method includes: when the target cloud service provided by the cloud server needs to be used, obtain from the trusted area of ​​the terminal Deriving the signature key; the trusted area is one or more secure execution areas divided in the terminal memory; generating an authority authentication request based on the derived signature key, and the authority authentication request carries the derived signature key; sending the authority authentication to the cloud server Request, so that the cloud server performs service authentication according to the derived signature key carried in the permission authentication request; after the service authentication is successful, call the target cloud service. By adopting the embodiment of the present application, by dividing a secure trusted area in the terminal, the trusted area is used to ensure the security of the derived signature key, thereby ensuring the reliability of the authority authentication process based on the derived signature key.

Description

technical field [0001] This application relates to the field of cloud technology, specifically to the field of cloud computing security technology, and in particular to a cloud service authority authentication method, a cloud service authority authentication device, a cloud service authority authentication device, and a computer-readable storage medium. Background technique [0002] In recent years, cloud computing is becoming the strategic focus of the development of the information technology industry. Information technology companies around the world are transforming to cloud computing one after another. More and more Internet users call various cloud computing services provided by cloud servers (cloud services for short). ) to gain the convenience brought by cloud computing. [0003] Before an Internet user (such as an application developer) calls a cloud service, the cloud server needs to perform service authentication on the Internet user. After the authentication is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/32H04L9/08
CPCH04L9/0825H04L9/3297H04L63/0807H04L63/083H04L67/10
Inventor 林委坤
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products