Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Unified security management system and identity authentication method

A technology for security management and identity authentication, applied in the field of unified security management system and identity authentication, it can solve the problems of inability to reset passwords regularly, huge management overhead, security risks, and heavy workload, so as to reduce the probability of being attacked and realize the The password can be changed at any time and the effect of improving the authentication strength

Active Publication Date: 2021-07-13
中国移动通信集团重庆有限公司 +1
View PDF16 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] First, for an organization with hundreds or even more host systems of various types, adopting decentralized password management will bring huge management overhead and security risks;
[0007] Second, the existing applications all write the host account and password in the program or configuration file. Every time the password is changed, the program side must cooperate with the synchronous modification, otherwise the program will be called abnormally, which will easily cause password leakage and failure. Regularly reset the password; moreover, due to differences in program providers, old versions, personnel updates, etc., there are problems such as high risk and heavy workload every time the password of the program account is changed;
[0008] Third, in the existing authentication methods, the strength of authentication is too low, and the probability of the host being attacked is high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unified security management system and identity authentication method
  • Unified security management system and identity authentication method
  • Unified security management system and identity authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] Exemplary embodiments of the present invention will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present invention are shown in the drawings, it should be understood that the invention may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present invention and to fully convey the scope of the present invention to those skilled in the art.

[0048] The identity authentication scheme provided by the present invention is implemented based on the PAM mechanism under linux and the transformed 4A system. In order to facilitate the understanding of the embodiments of the present invention, before implementing the following embodiments, the PAM mechanism and the existing 4A A brief introduction to the system:

[0049] First, the PAM (Pluggable Authentication Module for linux, referred to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a unified security management system and an identity authentication method. The system comprises a security management portal and a security management center, the security management center further comprises a centralized authentication service, a remote user dialing authentication service, a program account interface and a one-time password service; the remote user dialing authentication service is used for forwarding an authentication request of a host to the centralized authentication service for centralized authentication; and the program account interface and the one-time password service are used for distributing one-time access passwords for the application programs when the application programs log in the host, and the one-time password service is further used for providing the one-time access passwords for the centralized authentication service for identity authentication. Therefore, according to the scheme of the invention, based on the transformed 4A system, the security of the host can be improved, the software complexity is reduced, the user information leakage is effectively prevented, and the possibility that a password is cracked is avoided.

Description

technical field [0001] The invention relates to the technical field of identity authentication, in particular to a unified security management system and an identity authentication method. Background technique [0002] Under the Linux system, there are currently two authentication methods for the remote login system: password authentication and key authentication. figure 1 A schematic diagram of the authentication process of two commonly used Linux authentication methods is shown. Such as figure 1 As shown, the password authentication method is a traditional security strategy. By setting a relatively complex password, it can protect the system security to a certain extent, but it also faces some other problems, such as password brute force cracking, password leakage, Lost passwords, etc. At the same time, passwords that are too complex will also cause a certain burden on the operation and maintenance work. [0003] And, key authentication is a new type of authentication. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3228H04L9/3215H04L63/0838H04L63/18
Inventor 邓秘密杨翔赵立农
Owner 中国移动通信集团重庆有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products