Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Distributed authentication method and system in restricted environment

An authentication method and an authentication system technology, which are applied in the field of distributed authentication methods and systems in a restricted environment to achieve the effects of enhancing mutual trust, improving offline autonomy, and improving access security.

Active Publication Date: 2022-05-31
SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in the face of increasingly widespread distributed computing requirements, edge computing resources have certain limitations in terms of facilities, networks, and environments. To fully utilize the effectiveness of edge computing, release the computing aggregation of limited resources such as edge servers and terminal devices. Capability, based on user trust and security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed authentication method and system in restricted environment
  • Distributed authentication method and system in restricted environment
  • Distributed authentication method and system in restricted environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0059]

[0060] Wherein, α and β represent weights, α+β=1, according to the statistics and analysis of operation and maintenance data, α adopts 0.45, and β adopts 0.55;

[0061] f

[0062] f

[0063] Among them, i represents the weight of high-risk vulnerabilities, a represents the number of high-risk vulnerabilities, j represents the weight of medium-risk vulnerabilities, and b represents

[0064] f

[0065] f

[0066] Among them, m represents the number of attack behaviors, and n represents the number of attack behaviors.

Embodiment 2

[0073] The client is used to initiate a token request, and the token request includes an edge server ID, a system user name and a password.

[0075] There are multiple edge servers, each edge server is connected to the client, and the edge server receives the application access.

[0078]

[0080] f

[0081] f

[0082] Among them, i represents the weight of high-risk vulnerabilities, a represents the number of high-risk vulnerabilities, j represents the weight of medium-risk vulnerabilities, and b represents

[0083] f

[0084] f

[0085] Among them, m represents the number of attack behaviors, and n represents the number of attack behaviors.

[0087] In this embodiment, the authentication server generates a JWT token through a custom secret.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a distributed authentication method and system in a restricted environment, which belongs to the technical field of safety authentication, and the technical problem to be solved is how to realize safety authentication in a restricted environment. It includes the following steps: the client sends a token request to the authentication server; after receiving the token request, the authentication server judges whether the edge server is credible through the credible evaluation model; if the edge server is credible, generates a token through a custom secret, and returns the token to the client If the edge server is untrustworthy, an error message will be returned to the client; the client will carry the token token to initiate an application access request to the edge server; after receiving the application access request, the edge server will verify it through a custom secret. If the verification passes, Return the verification pass information to the client, and return the verification failure information to the client if the verification fails.

Description

Distributed authentication method and system in restricted environment technical field [0001] The present invention relates to the technical field of security authentication, in particular to a distributed authentication method and system in a restricted environment. Background technique [0002] With the development of cloud computing, big data, Internet of Things, 5G and other core technologies, as well as new infrastructure, industrial Internet policies With the promotion of the edge, huge nearby computing demands and massive edge data will be generated. In the future, edge computing will be combined with cloud computing Computing coexists, showing a distributed cloud situation. Edge computing aggregates edge servers with strong computing power and widely distributed A wide range of terminal equipment is connected with the data center through the network to realize resource sharing, so as to achieve the purpose of resource optimization. [0003] However, in the face...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/0807H04L63/083H04L63/10
Inventor 高传集冷静江燕孙兴艳
Owner SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products