CN103532956A - Biological information-based authentication method in cloud operation system - Google Patents
Biological information-based authentication method in cloud operation system Download PDFInfo
- Publication number
- CN103532956A CN103532956A CN201310489685.6A CN201310489685A CN103532956A CN 103532956 A CN103532956 A CN 103532956A CN 201310489685 A CN201310489685 A CN 201310489685A CN 103532956 A CN103532956 A CN 103532956A
- Authority
- CN
- China
- Prior art keywords
- operating system
- cloud computing
- user
- authentication
- computing operating
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Collating Specific Patterns (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention provides a biological information-based authentication method in a cloud operation system. Biological information is used for performing identification authentication, the safety of the cloud operation system is ensured, the cloud operation system is prevented from being subjected to hostile attack, the key is that in the cloud operation system, when an attribute certificate is used for authority authentication, a biological certificate related to the attribute certificate is found firstly, then the biological certificate is used for identification authentication, and the attribute certificate is used for performing authority authentication after the authentication is passed. By applying the biological information-based authentication method in the cloud operation system, effective combination between the biological authentication and the authority authentication in the cloud operation system is realized, and the authority authentication is enabled to accurately correspond to the individual identification authentication, so the authentication management is realized.
Description
Technical field
The present invention relates to cloud computing security fields, be specifically related to the authentication method based on biological information in a kind of cloud operating system.
Technical background
At present, cloud computing becomes one of the most popular technology of IT field.The safety problem of cloud computing has occupied the people's sight line for a long time always, and industry generally classifies safety issue as the maximum query of user to cloud computing as.Safety issue under cloud computing environment, relates to the public credibility of cloud computing service provider, the protective capacities of cloud computing data center and cloud security.
Industry is divided into basic platform by cloud computing, service platform and application platform.The position of cloud operating system in basic platform, study its fail safe also tool be of great significance.Langchao Co., Ltd. is devoted to the research and development of cloud computing operating system.
In modern authentication research, personal information is summarized as three levels: knowledge sign, article mark, biological information.Authentication application generally only rests on second level at present, such as user cipher, dynamic password.Recognition technology based on biological information feature is just becoming a development field and research direction.Biological information identification Certificate Authority process generally comprises four basic out processes, is respectively collection, decoding, contrast and coupling.Before authentication, first need biological information to sample, extract its unique feature and convert characteristic template to and save.In the process of authentication, the people who authenticates contrasts and mates with the data template of original preservation at acquisition terminal input personal biological information, thereby whether determines authentication success.Biological information recognition technology mainly contains two classes at present, and one is based on physiological characteristic, and the 2nd, based on behavioural characteristic.Recognition technology based on physiological characteristic comprises fingerprint recognition, iris identification, recognition of face, the identification of palm shape etc.Recognition technology based on behavioural characteristic comprises signature identification, base key identification, voice identification etc.
The identity authorization system of cloud computing operating system, in conjunction with traditional authentication method and advanced biological information recognition technology, will be strengthened the fail safe of cloud operating system.
Summary of the invention
the object of this invention is to provideauthentication method based on biological information in a kind of cloud computing operating system.
The object of the invention is to realize in the following manner, use biological information to carry out authentication, the safety of protection cloud operating system, avoid cloud operating system to suffer malicious attack, concrete steps are: when in cloud computing operating system, use attribute certificate carries out purview certification, the creature certificate that first will find this Attribute certificate to be associated, then apply its creature certificate and first carry out authentication, authentication by after again apply property certificate carry out purview certification, by effective combination of biological identification and purview certification in cloud operating system, guarantee the accurate correspondence of purview certification and personal identification, thereby realize rights management, wherein:
Authentication authorization method step based on fingerprint is as follows:
1) cloud computing operating system gathers user's finger print information, is kept in the database of self;
2) user, when login cloud computing operating system, by finger print information gatherer, inputs individual fingerprint;
3) cloud computing operating system mates the fingerprint of user's input with the fingerprint in fingerprint base, when the match is successful, and user's authentication success;
4), after user's authentication success, cloud computing operating system is given the authority of response according to user's biological attribute information;
5) user successfully logins cloud computing operating system, the resource in operation cloud computing system;
Based on signature authentication authorization method step as follows:
1) cloud computing operating system gathers user's signing messages, is kept in the database of self;
2) user, when login cloud computing operating system, by signing messages gatherer, inputs idiograph;
3) cloud computing operating system mates the signature of user's input with the signature in signature storehouse, when the match is successful, and user's authentication success;
4), after user's authentication success, cloud computing operating system is given the authority of response according to user's biological attribute information;
5) user successfully logins cloud computing operating system, the resource in operation cloud computing system.
Accompanying drawing explanation
Fig. 1 is the structural representation of cloud computing operating system based on biometric information authentication module;
Fig. 2 is authentication and the mandate execution mode flow chart of cloud computing operating system based on fingerprint;
The authentication that Fig. 3 is cloud computing operating system based on signature and the execution mode flow chart of mandate.
execution mode
With reference to the accompanying drawings 2, content of the present invention is described to the process that realizes this method with an instantiation.Authentication authorization method step based on fingerprint is as follows:
1) cloud computing operating system gathers user's finger print information, is kept in the database of self;
2) user, when login cloud computing operating system, by finger print information gatherer, inputs individual fingerprint;
3) cloud computing operating system mates the fingerprint of user's input with the fingerprint in fingerprint base, when the match is successful, and user's authentication success;
4), after user's authentication success, cloud computing operating system is given the authority of response according to user's biological attribute information;
5) user successfully logins cloud computing operating system, the resource in operation cloud computing system.
With reference to the accompanying drawings 3, content of the present invention is described to the process that realizes this method with an instantiation.Based on signature authentication authorization method step as follows:
1) cloud computing operating system gathers user's signing messages, is kept in the database of self;
2) user, when login cloud computing operating system, by signing messages gatherer, inputs idiograph;
3) cloud computing operating system mates the signature of user's input with the signature in signature storehouse, when the match is successful, and user's authentication success;
4), after user's authentication success, cloud computing operating system is given the authority of response according to user's biological attribute information;
5) user successfully logins cloud computing operating system, the resource in operation cloud computing system.
Claims (1)
1. the authentication method based on biological information in a cloud computing operating system, it is characterized in that using biological information to carry out authentication, the safety of protection cloud operating system, avoid cloud operating system to suffer malicious attack, concrete steps are: when in cloud computing operating system, use attribute certificate carries out purview certification, the creature certificate that first will find this Attribute certificate to be associated, then apply its creature certificate and first carry out authentication, authentication by after again apply property certificate carry out purview certification, by effective combination of biological identification and purview certification in cloud operating system, guarantee the accurate correspondence of purview certification and personal identification, thereby realize rights management, wherein:
Authentication authorization method step based on fingerprint is as follows:
1) cloud computing operating system gathers user's finger print information, is kept in the database of self;
2) user, when login cloud computing operating system, by finger print information gatherer, inputs individual fingerprint;
3) cloud computing operating system mates the fingerprint of user's input with the fingerprint in fingerprint base, when the match is successful, and user's authentication success;
4), after user's authentication success, cloud computing operating system is given the authority of response according to user's biological attribute information;
5) user successfully logins cloud computing operating system, the resource in operation cloud computing system;
Based on signature authentication authorization method step as follows:
1) cloud computing operating system gathers user's signing messages, is kept in the database of self;
2) user, when login cloud computing operating system, by signing messages gatherer, inputs idiograph;
3) cloud computing operating system mates the signature of user's input with the signature in signature storehouse, when the match is successful, and user's authentication success;
4), after user's authentication success, cloud computing operating system is given the authority of response according to user's biological attribute information;
5) user successfully logins cloud computing operating system, the resource in operation cloud computing system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310489685.6A CN103532956A (en) | 2013-10-18 | 2013-10-18 | Biological information-based authentication method in cloud operation system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310489685.6A CN103532956A (en) | 2013-10-18 | 2013-10-18 | Biological information-based authentication method in cloud operation system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103532956A true CN103532956A (en) | 2014-01-22 |
Family
ID=49934635
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310489685.6A Pending CN103532956A (en) | 2013-10-18 | 2013-10-18 | Biological information-based authentication method in cloud operation system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103532956A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104317362A (en) * | 2014-10-27 | 2015-01-28 | 北京同方时讯电子股份有限公司 | Tablet personal computer with high data security |
CN105227324A (en) * | 2015-11-03 | 2016-01-06 | 浪潮(北京)电子信息产业有限公司 | The method of a kind of cloud platform user authentication and device |
CN105357197A (en) * | 2015-11-03 | 2016-02-24 | 浪潮集团有限公司 | Cloud computing platform identity authentication and authority management system and method |
CN105550562A (en) * | 2015-12-31 | 2016-05-04 | 北京无线电计量测试研究所 | Iris recognition based identity authentication information management system and method |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101256608A (en) * | 2008-03-25 | 2008-09-03 | 北京飞天诚信科技有限公司 | Safe operation method and system |
CN102110195A (en) * | 2009-12-25 | 2011-06-29 | 中国长城计算机深圳股份有限公司 | Computer system and identification method and device for user |
US20110264919A1 (en) * | 2010-02-17 | 2011-10-27 | Ceelox, Inc. | Dynamic seed and key generation from biometric indicia |
US8200980B1 (en) * | 2001-09-21 | 2012-06-12 | Open Invention Network, Llc | System and method for enrolling in a biometric system |
CN102664885A (en) * | 2012-04-18 | 2012-09-12 | 南京邮电大学 | Identity authentication method based on biological feature encryption and homomorphic algorithm |
CN103237030A (en) * | 2013-04-25 | 2013-08-07 | 深圳市中兴移动通信有限公司 | Biological recognition-based user authentication method and system |
-
2013
- 2013-10-18 CN CN201310489685.6A patent/CN103532956A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8200980B1 (en) * | 2001-09-21 | 2012-06-12 | Open Invention Network, Llc | System and method for enrolling in a biometric system |
CN101256608A (en) * | 2008-03-25 | 2008-09-03 | 北京飞天诚信科技有限公司 | Safe operation method and system |
CN102110195A (en) * | 2009-12-25 | 2011-06-29 | 中国长城计算机深圳股份有限公司 | Computer system and identification method and device for user |
US20110264919A1 (en) * | 2010-02-17 | 2011-10-27 | Ceelox, Inc. | Dynamic seed and key generation from biometric indicia |
CN102664885A (en) * | 2012-04-18 | 2012-09-12 | 南京邮电大学 | Identity authentication method based on biological feature encryption and homomorphic algorithm |
CN103237030A (en) * | 2013-04-25 | 2013-08-07 | 深圳市中兴移动通信有限公司 | Biological recognition-based user authentication method and system |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104317362A (en) * | 2014-10-27 | 2015-01-28 | 北京同方时讯电子股份有限公司 | Tablet personal computer with high data security |
CN105227324A (en) * | 2015-11-03 | 2016-01-06 | 浪潮(北京)电子信息产业有限公司 | The method of a kind of cloud platform user authentication and device |
CN105357197A (en) * | 2015-11-03 | 2016-02-24 | 浪潮集团有限公司 | Cloud computing platform identity authentication and authority management system and method |
CN105227324B (en) * | 2015-11-03 | 2018-07-24 | 浪潮(北京)电子信息产业有限公司 | A kind of method and device of cloud platform authenticating user identification |
CN105550562A (en) * | 2015-12-31 | 2016-05-04 | 北京无线电计量测试研究所 | Iris recognition based identity authentication information management system and method |
CN105550562B (en) * | 2015-12-31 | 2018-05-15 | 北京无线电计量测试研究所 | A kind of information management system and method based on iris recognition identification certification |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105429761B (en) | A kind of key generation method and device | |
US10097994B2 (en) | Mobile touch authentication refresh | |
CN102625303A (en) | A method for WFII/3G router access authentication by using fingerprint | |
MY181564A (en) | System and method for biometric authentication in connection with camera-equipped devices | |
CN101420301A (en) | Human face recognizing identity authentication system | |
CN103607387A (en) | A network login authentication cloud service system based on face identification and a method | |
CN102223233A (en) | Biological code authentication system and biological code authentication method | |
CN102043912A (en) | Method for using fingerprint signature and seal | |
CN201126581Y (en) | Biological personal identification apparatus based on UEFI | |
CN103297392A (en) | Fingerprint identity authentication system and authentication method | |
CN103532956A (en) | Biological information-based authentication method in cloud operation system | |
CN102456102A (en) | Method for carrying out identity recertification on particular operation of information system by using Usb key technology | |
CN103297237B (en) | Identity registration and authentication method, system, personal authentication apparatus and certificate server | |
US11120120B2 (en) | Method and system for secure password storage | |
CN104038509A (en) | Fingerprint authentication cloud system | |
CN107194219A (en) | Intelligent terminal identity identifying method based on similarity | |
CN104703180A (en) | Implicit multiple authentication method based on mobile Internet and intelligent terminal | |
Lee et al. | An fingerprint authentication model of ERM system using private key escrow management server | |
Kovalchuk et al. | A practical proposal for ensuring the provenance of hardware devices and their safe operation | |
CN202535370U (en) | Cloud terminal user identification device | |
CN202563514U (en) | Mobile electronic equipment with multimedia authentication encryption protection function | |
CN110084224A (en) | Finger print safety Verification System and method on a kind of cloud | |
Ussatova et al. | Two-factor authentication algorithm implementation with additional security parameter based on mobile application | |
CN102685124A (en) | Cloud-terminal user recognizer | |
CN211127846U (en) | Authentication terminal for compiling password based on identity authentication digital signature |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20140122 |