WO2015188568A1 - Procédé d'authentification basé sur un nuage public, intergiciel d'authentification, de sécurité, et groupe de ressources informatiques en nuage - Google Patents
Procédé d'authentification basé sur un nuage public, intergiciel d'authentification, de sécurité, et groupe de ressources informatiques en nuage Download PDFInfo
- Publication number
- WO2015188568A1 WO2015188568A1 PCT/CN2014/089596 CN2014089596W WO2015188568A1 WO 2015188568 A1 WO2015188568 A1 WO 2015188568A1 CN 2014089596 W CN2014089596 W CN 2014089596W WO 2015188568 A1 WO2015188568 A1 WO 2015188568A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- authentication
- cloud computing
- resource pool
- computing resource
- middleware
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
Definitions
- the invention relates to the field of authentication technology in a public environment, in particular to a public cloud-based authentication method, a security authentication middleware and a cloud computing resource pool.
- Cloud computing is an add-on, use, and delivery model of Internet-based related services that typically involves providing dynamically scalable and often virtualized resources over the Internet. Since cloud computing involves personal and business computing models and involves sensitive information from individuals and businesses, centralized storage of information can easily lead to security issues.
- the embodiment of the invention provides a public cloud-based authentication method, a security authentication middleware and a cloud computing resource pool, so as to at least solve the technical problem that the existing security authentication is difficult to adapt to the security authentication in the cloud computing environment.
- the present invention provides a public cloud-based authentication method, which is applied to a security authentication middleware, and the public cloud-based authentication method includes the following steps:
- the cloud computing resource pool queries the corresponding authentication policy
- the information about the prompting password input corresponding to the authentication policy sent by the cloud computing resource pool is received, and the prompting input password information is sent to the user terminal;
- the authentication service includes: a static password authentication service, a dynamic password authentication service, a USB Key authentication service, a smart card authentication service, a digital certificate authentication service, and a biometric authentication service;
- the public cloud-based authentication method further includes: expanding a corresponding interface in the security authentication middleware according to the authentication service, to communicate with the cloud computing resource pool through the interface.
- the method further includes: receiving an authentication result returned by the authentication server, and transmitting the authentication result to the user terminal.
- the present invention further provides a public cloud-based authentication method, which is applied to a cloud computing resource pool, and the public cloud-based authentication method includes the following steps:
- the query sent by the security authentication middleware corresponds to the query instruction of the authentication policy of the authentication service, and queries the resource in the cloud computing resource pool according to the query instruction;
- the information indicating the password input corresponding to the authentication policy is returned to the security authentication middleware.
- the method further includes: integrating an authentication policy of each authentication service, and adding the integrated authentication policy to the resource of the cloud computing resource pool.
- the present invention further provides a security authentication middleware, where the security authentication middleware includes:
- An obtaining module configured to receive an authentication request of the user terminal, and obtain an authentication service in the authentication request
- a sending module configured to send, to the cloud computing resource pool, a query instruction corresponding to the authentication policy of the authentication service
- the first receiving module is configured to: when the cloud computing resource pool queries the corresponding authentication policy, receive information about the prompting password input corresponding to the authentication policy sent by the cloud computing resource pool, and input the information of the prompting password Sent to the user terminal;
- the second receiving module is configured to receive the input password sent by the user terminal, and send the input password to the authentication server for authentication.
- the authentication service includes: a static password authentication service, a dynamic password authentication service, a USB Key authentication service, a smart card authentication service, a digital certificate authentication service, and a biometric authentication service;
- the security authentication middleware further includes: an expansion module, configured to expand a corresponding interface in the security authentication middleware according to the authentication service, to communicate with the cloud computing resource pool through the interface.
- the security authentication middleware further includes: a third receiving module, configured to receive an authentication result returned by the authentication server, and send the authentication result to the user terminal.
- a third receiving module configured to receive an authentication result returned by the authentication server, and send the authentication result to the user terminal.
- the present invention further provides a cloud computing resource pool, where the cloud computing resource pool includes:
- the querying module is configured to receive a query command sent by the security authentication middleware corresponding to the authentication policy of the authentication service, and query the resource in the cloud computing resource pool according to the query instruction;
- the returning module is configured to, when the corresponding authentication policy is queried, return information of the prompting input password corresponding to the authentication policy to the security authentication middleware.
- the cloud computing resource pool further includes:
- the module is added to integrate the authentication policy of each authentication service, and the integrated authentication policy is added to the resource of the cloud computing resource pool.
- the invention provides a public cloud-based authentication method, a security authentication middleware and a cloud computing resource pool, and combines the security authentication with the security authentication middleware and the cloud computing resource pool, and uses the existing cloud security authentication center as a cloud computing resource.
- a part of the pool does not require the cloud security authentication center to provide a corresponding database or management portal. Instead, the security authentication middleware expands the corresponding interface according to different authentication services, and communicates with the cloud computing resource pool through the interface.
- security authentication is also open to users as a service resource, enabling security authentication in a cloud computing environment, and providing a variety of security authentication services for individuals or enterprises with increasingly complex services.
- FIG. 1 is a schematic flowchart of a first embodiment of a public cloud-based authentication method according to the present invention
- FIG. 2 is a schematic diagram of interaction between a cloud computing resource pool, a cloud computing resource pool, and a user terminal shown in FIG. 1;
- FIG. 3 is a schematic flowchart of a second embodiment of a public cloud-based authentication method according to the present invention.
- FIG. 4 is a schematic flowchart of a third embodiment of a public cloud-based authentication method according to the present invention.
- FIG. 5 is a schematic flowchart of a fourth embodiment of a public cloud-based authentication method according to the present invention.
- FIG. 6 is a schematic flowchart of a fifth embodiment of a public cloud-based authentication method according to the present invention.
- FIG. 7 is a schematic diagram of functional modules of an embodiment of a security authentication middleware according to the present invention.
- FIG. 8 is a schematic diagram of functional modules of an embodiment of a cloud computing resource pool according to the present invention.
- the present invention provides a public cloud-based authentication method, which is applied to a security authentication middleware.
- the public cloud-based authentication method includes:
- Step S101 Receive an authentication request of the user terminal, and obtain an authentication service in the authentication request.
- middleware is an independent system software or service program, and distributed application software uses middleware to share resources among different technologies. For connected systems, even if the two have different interfaces, they can exchange information with each other through the middleware.
- the security authentication middleware is used for the security authentication of the embodiment.
- different users have different authentication services, and the security authentication middleware communicates with different user terminals to receive authentication requests sent by different user terminals.
- the authentication request includes the authentication service requested by the user.
- the security authentication middleware can obtain the authentication service of the user according to the authentication request, such as a static password authentication service, a dynamic password authentication service, or a USB Key authentication service. and many more.
- Step S102 sending a query instruction corresponding to the authentication policy of the authentication service to the cloud computing resource pool;
- the corresponding authentication service is extended to the corresponding interface in the security authentication middleware, so that after obtaining the authentication service of the user, the security authentication middleware can send the query instruction of the authentication service to the cloud computing resource pool through the corresponding interface.
- the authentication policy is a small part of the resources in the cloud computing resource pool, which is specifically an authentication method corresponding to the authentication service, such as an authentication method of static password authentication or an authentication method of static password authentication.
- step S103 when the cloud computing resource pool queries the corresponding authentication policy, the information about the prompt input password corresponding to the authentication policy sent by the cloud computing resource pool is received, and the prompting input password information is sent to the User terminal
- the related computing tables and related pages required for the authentication of the authentication service are added in advance in the cloud computing resource pool, and the authentication policies of different authentication services are obtained and integrated into the resources of the cloud computing resource pool.
- the cloud computing resource pool after receiving the query instruction, queries the authentication policy corresponding to the authentication service. When the corresponding authentication policy is queried, the cloud computing resource pool sends the information indicating the password input corresponding to the authentication policy to the security authentication middleware, and the security authentication middleware forwards the information indicating the password input to the user terminal.
- the cloud computing resource pool sends the prompt information of the dynamic password that needs to be input to the dynamic authentication middleware when the dynamic password authentication authentication policy is queried.
- Step S104 Receive an input password sent by the user terminal, and send the input password to an authentication server for authentication.
- the security authentication middleware After the security authentication middleware forwards the information indicating the input password to the user terminal, the user inputs an input password according to the information, and sends the input input password to the security authentication middleware, and the security authentication middleware sends the input password. Authenticate the authentication server.
- the embodiment Compared with the prior art, the embodiment combines the security authentication with the security authentication middleware and the cloud computing resource pool, and the prior art cloud security authentication center is used as a part of the cloud computing resource pool, and does not need to be provided by the cloud security certification center.
- Corresponding database or management portal, etc. but add a related table of security authentication in the database of the cloud computing resource pool, and add relevant pages of security authentication in the management portal of the cloud computing resource pool, that is, security authentication is also used as a service.
- Resources are open to users, and they can provide a variety of security authentication services for individuals or businesses that are increasingly complex.
- the security authentication middleware can shield the security authentication device from different security authentication devices, so that the user faces a specific security authentication service instead of a complicated security authentication device; the security authentication middleware can also By expanding the interfaces of security certification devices of different vendors to increase the number of security authentication services, it can provide rich security authentication services to meet the diverse security authentication requirements of users.
- the embodiment further includes:
- step S100 the corresponding interface is extended in the security authentication middleware according to the authentication service, so as to communicate with the cloud computing resource pool through the interface, where the authentication service includes: a static password authentication service, Dynamic password authentication service, USB Key authentication service, smart card authentication service, digital certificate authentication service, and biometric authentication service.
- the authentication service includes: a static password authentication service, Dynamic password authentication service, USB Key authentication service, smart card authentication service, digital certificate authentication service, and biometric authentication service.
- Step S100 of this embodiment may be located before step S101 or between step S101 and step S102.
- the security authentication middleware since the corresponding interface is extended in the security authentication middleware according to the authentication service, the security authentication middleware supports a unified communication mode and message structure when performing security authentication, and can also shield different security authentication device vendors. The difference in security certification capabilities.
- the security authentication middleware can provide a corresponding independent interface based on the security authentication capability, and can interact with the cloud computing resource pool by using a unified communication mode and message structure, and is managed by The ability to add this security authentication capability to the management portal is sufficient.
- the embodiment further includes:
- Step S105 Receive an authentication result returned by the authentication server, and send the authentication result to the user terminal.
- the authentication server receives the input password sent by the security authentication middleware, and matches the input password with the password in the pre-existing authentication server.
- the matching authentication result is sent to the security authentication middleware.
- the security authentication middleware then sends it to the user terminal for display. If the match is unsuccessful, the authentication server also sends the authentication result that matches the failure to the authentication server, and the security authentication middleware sends it to the user terminal.
- the present invention also provides another public cloud-based authentication method, which is applied to a cloud computing resource pool.
- the public cloud-based authentication method includes:
- Step S201 receiving a query instruction sent by the security authentication middleware corresponding to the authentication policy of the authentication service, and querying resources in the cloud computing resource pool according to the query instruction;
- the cloud computing resource pool receives the query instruction of the security authentication middleware, and the authentication policy is a small part of the resource in the cloud computing resource pool, which is specifically an authentication method corresponding to the authentication service, such as static password authentication. Authentication method or authentication method for static password authentication.
- the related computing tables and related pages required for the authentication of the authentication service are added in advance in the cloud computing resource pool, and the authentication policies of different authentication services are obtained and integrated into the resources of the cloud computing resource pool.
- the cloud computing resource pool after receiving the query instruction, the cloud computing resource pool queries the authentication policy corresponding to the authentication service.
- step S202 when the corresponding authentication policy is queried, the information indicating the password input corresponding to the authentication policy is returned to the security authentication middleware.
- the cloud computing resource pool When the corresponding authentication policy is queried, the cloud computing resource pool sends the information indicating the password input corresponding to the authentication policy to the security authentication middleware, so that the security authentication middleware forwards the information prompting the input password to the user terminal.
- the cloud computing resource pool sends the prompt information of the dynamic password that needs to be input to the dynamic authentication middleware when the dynamic password authentication authentication policy is queried.
- the embodiment further includes:
- step S200 the authentication policy of each authentication service is integrated, and the integrated authentication policy is added to the resources of the cloud computing resource pool.
- a related table, a related page, and the like required for different authentication service security authentications are added in advance in the cloud computing resource pool, and authentication policies of different authentication services are obtained, and are integrated and added as a cloud computing resource pool. resource of.
- the security authentication middleware includes:
- the obtaining module 101 is configured to receive an authentication request of the user terminal, and obtain an authentication service in the authentication request.
- middleware is an independent system software or service program, and distributed application software uses middleware to share resources among different technologies. For connected systems, even if the two have different interfaces, they can exchange information with each other through the middleware.
- the security authentication middleware is used for the security authentication of the embodiment.
- different users have different authentication services, and the security authentication middleware communicates with different user terminals to receive authentication requests sent by different user terminals.
- the authentication request includes the authentication service requested by the user.
- the security authentication middleware can obtain the authentication service of the user according to the authentication request, such as a static password authentication service, a dynamic password authentication service, or a USB Key authentication service. and many more.
- the sending module 102 is configured to send, to the cloud computing resource pool, a query instruction corresponding to the authentication policy of the authentication service;
- the corresponding authentication service is extended to the corresponding interface in the security authentication middleware, so that after obtaining the authentication service of the user, the security authentication middleware can send the query instruction of the authentication service to the cloud computing resource pool through the corresponding interface.
- the authentication policy is a small part of the resources in the cloud computing resource pool, which is specifically an authentication method corresponding to the authentication service, such as an authentication method of static password authentication or an authentication method of static password authentication.
- the first receiving module 103 is configured to: when the cloud computing resource pool queries the corresponding authentication policy, receive the information of the prompting input password corresponding to the authentication policy sent by the cloud computing resource pool, and input the prompt into the password Sending information to the user terminal;
- the related computing tables and related pages required for the authentication of the authentication service are added in advance in the cloud computing resource pool, and the authentication policies of different authentication services are obtained and integrated into the resources of the cloud computing resource pool.
- the cloud computing resource pool after receiving the query instruction, queries the authentication policy corresponding to the authentication service. When the corresponding authentication policy is queried, the cloud computing resource pool sends the information indicating the password input corresponding to the authentication policy to the security authentication middleware, and the security authentication middleware forwards the information indicating the password input to the user terminal.
- the cloud computing resource pool sends the prompt information of the dynamic password that needs to be input to the dynamic authentication middleware when the dynamic password authentication authentication policy is queried.
- the second receiving module 104 is configured to receive an input password sent by the user terminal, and send the input password to an authentication server for authentication.
- the security authentication middleware After the security authentication middleware forwards the information indicating the input password to the user terminal, the user inputs an input password according to the information, and sends the input input password to the security authentication middleware, and the security authentication middleware sends the input password. Authenticate the authentication server.
- the security authentication middleware further includes: an expansion module, configured to expand a corresponding interface in the security authentication middleware according to the authentication service, to Communicating with the cloud computing resource pool through the interface.
- the authentication service includes: static password authentication service, dynamic password authentication service, USB Key authentication service, smart card authentication service, digital certificate authentication service, and biometric authentication service.
- the security authentication middleware since the corresponding interface is extended in the security authentication middleware according to the authentication service, the security authentication middleware supports a unified communication mode and message structure when performing security authentication, and can also shield different security authentication device vendors. The difference in security certification capabilities.
- the security authentication middleware can provide a corresponding independent interface based on the security authentication capability, and can interact with the cloud computing resource pool by using a unified communication mode and message structure, and is managed by The ability to add this security authentication capability to the management portal is sufficient.
- the security authentication middleware further includes: a third receiving module, configured to receive an authentication result returned by the authentication server, and send the authentication result To the user terminal.
- the authentication server receives the input password sent by the security authentication middleware, and matches the input password with the password in the pre-existing authentication server.
- the matching authentication result is sent to the security authentication middleware.
- the security authentication middleware then sends it to the user terminal for display. If the match is unsuccessful, the authentication server also sends the authentication result that matches the failure to the authentication server, and the security authentication middleware sends it to the user terminal.
- the present invention further provides a cloud computing resource pool.
- the cloud computing resource pool includes:
- the querying module 201 is configured to receive a query command sent by the security authentication middleware and query the authentication policy of the authentication service, and query the resource in the cloud computing resource pool according to the query instruction;
- the cloud computing resource pool receives the query instruction of the security authentication middleware, and the authentication policy is a small part of the resource in the cloud computing resource pool, which is specifically an authentication method corresponding to the authentication service, such as static password authentication. Authentication method or authentication method for static password authentication.
- the related computing tables and related pages required for the authentication of the authentication service are added in advance in the cloud computing resource pool, and the authentication policies of different authentication services are obtained and integrated into the resources of the cloud computing resource pool.
- the cloud computing resource pool after receiving the query instruction, the cloud computing resource pool queries the authentication policy corresponding to the authentication service.
- the returning module 202 is configured to, when the corresponding authentication policy is queried, return information of the prompting input password corresponding to the authentication policy to the security authentication middleware.
- the cloud computing resource pool When the corresponding authentication policy is queried, the cloud computing resource pool sends the information indicating the password input corresponding to the authentication policy to the security authentication middleware, so that the security authentication middleware forwards the information prompting the input password to the user terminal.
- the cloud computing resource pool sends the prompt information of the dynamic password that needs to be input to the dynamic authentication middleware when the dynamic password authentication authentication policy is queried.
- the cloud computing resource pool further includes: an adding module, configured to integrate an authentication policy of each authentication service, and add the integrated authentication policy to the The resource of the cloud computing resource pool.
- a related table, a related page, and the like required for different authentication service security authentications are added in advance in the cloud computing resource pool, and authentication policies of different authentication services are obtained, and are integrated and added as a cloud computing resource pool. resource of.
- the public cloud-based authentication method, the security authentication middleware, and the cloud computing resource pool provided by the embodiments of the present invention have the following beneficial effects:
- the prior art cloud security authentication center is used as a part of the cloud computing resource pool.
- the cloud security authentication center does not need to provide a corresponding database or management portal.
- the security authentication middleware expands the corresponding interface according to different authentication services, and communicates with the cloud computing resource pool through the interface, in the cloud computing resource pool.
- Security authentication is also open to users as a service resource, enabling security authentication in a cloud computing environment, and providing a wide variety of security authentication services for individuals or businesses with increasingly complex services.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
L'invention concerne un procédé d'authentification basé sur un nuage public, qui est appliqué à un intergiciel d'authentification de sécurité. Le procédé comprend les étapes consistant à : recevoir une demande d'authentification d'un terminal utilisateur, et acquérir un service d'authentification contenu dans la demande d'authentification ; envoyer une instruction d'interrogation correspondant à une politique d'authentification du service d'authentification, à un groupe de ressources informatiques en nuage ; lorsque le groupe de ressources informatiques en nuage interroge la politique d'authentification correspondante, recevoir des informations pour demander un mot de passe d'entrée envoyé par le groupe de ressources informatiques en nuage et correspondant à la politique d'authentification, et envoyer les informations pour demander le mot de passe d'entrée au terminal d'utilisateur ; et recevoir le mot de passe d'entrée envoyé par le terminal d'utilisateur, et envoyer le mot de passe d'entrée à un serveur d'authentification en vue de l'authentification. L'invention concerne également un autre procédé d'authentification basé sur un nuage public, un intergiciel d'authentification de sécurité, et un groupe de ressources informatiques en nuage. La présente invention peut réaliser l'authentification de sécurité dans un environnement informatique en nuage, et les services d'authentification de sécurité sont relativement riches.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410262163.7A CN105207970B (zh) | 2014-06-12 | 2014-06-12 | 基于公有云的认证方法、安全认证中间件及云计算资源池 |
CN201410262163.7 | 2014-06-12 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2015188568A1 true WO2015188568A1 (fr) | 2015-12-17 |
Family
ID=54832833
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2014/089596 WO2015188568A1 (fr) | 2014-06-12 | 2014-10-27 | Procédé d'authentification basé sur un nuage public, intergiciel d'authentification, de sécurité, et groupe de ressources informatiques en nuage |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN105207970B (fr) |
WO (1) | WO2015188568A1 (fr) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105208012A (zh) * | 2015-08-31 | 2015-12-30 | 武汉云通英飞科技有限公司 | 一种基于云计算的云端认证方法和系统 |
CN109547217A (zh) * | 2019-01-11 | 2019-03-29 | 北京中实信达科技有限公司 | 基于动态口令的一对多身份认证系统和方法 |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106411941B (zh) * | 2016-11-24 | 2019-05-07 | 济南浪潮高新科技投资发展有限公司 | 一种云环境下安全认证资源分配和管理方法 |
CN108345801B (zh) * | 2018-02-09 | 2021-09-28 | 南京邮电大学 | 一种面向密文数据库的中间件动态用户认证方法及系统 |
CN113992740B (zh) * | 2021-10-26 | 2024-03-22 | 超越科技股份有限公司 | 一种基于自主可控的中间件及数据传输方法 |
CN114070592A (zh) * | 2021-11-09 | 2022-02-18 | 乐美科技股份私人有限公司 | 一种资源下载方法、装置、终端及服务器 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102045353A (zh) * | 2010-12-13 | 2011-05-04 | 北京交通大学 | 一种公有云服务的分布式网络安全控制方法 |
CN103023986A (zh) * | 2012-11-27 | 2013-04-03 | 中国电信股份有限公司云计算分公司 | 一种对多用户提供rdbms服务的系统和方法 |
CN103401688A (zh) * | 2013-08-09 | 2013-11-20 | 中国人民解放军理工大学 | 基于Eucalyptus云平台的消息中间件传输整合系统 |
WO2013179383A1 (fr) * | 2012-05-29 | 2013-12-05 | 株式会社日立システムズ | Système de gestion de sécurité en nuage |
US20140123028A1 (en) * | 2012-10-27 | 2014-05-01 | Kiran Kamity | Comprehensive multimedia management platform |
CN103780584A (zh) * | 2012-10-22 | 2014-05-07 | 上海俊悦智能科技有限公司 | 一种基于云计算的融合身份认证方法 |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120072972A1 (en) * | 2010-09-20 | 2012-03-22 | Microsoft Corporation | Secondary credentials for batch system |
CN102681899B (zh) * | 2011-03-14 | 2015-06-10 | 金剑 | 云计算服务平台的虚拟计算资源动态管理方法 |
CN102185864B (zh) * | 2011-05-13 | 2014-12-24 | 北京星网锐捷网络技术有限公司 | 安全认证策略配置方法、装置及系统 |
CN202455386U (zh) * | 2011-12-13 | 2012-09-26 | 杭州晟元芯片技术有限公司 | 一种用于云存储的安全系统 |
CN102647432B (zh) * | 2012-05-17 | 2016-04-20 | 湖南神州祥网科技有限公司 | 一种认证信息传输方法、装置及认证中间件 |
CN102752319B (zh) * | 2012-07-31 | 2015-02-11 | 广州市品高软件开发有限公司 | 一种云计算安全访问方法、装置及系统 |
CN103095720B (zh) * | 2013-01-30 | 2016-03-23 | 中国科学院自动化研究所 | 一种基于会话管理服务器的云存储系统的安全管理方法 |
CN103428298A (zh) * | 2013-08-30 | 2013-12-04 | 华南理工大学 | 一种基于云存储的多方电子邮件附件共享的管理方法 |
-
2014
- 2014-06-12 CN CN201410262163.7A patent/CN105207970B/zh active Active
- 2014-10-27 WO PCT/CN2014/089596 patent/WO2015188568A1/fr active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102045353A (zh) * | 2010-12-13 | 2011-05-04 | 北京交通大学 | 一种公有云服务的分布式网络安全控制方法 |
WO2013179383A1 (fr) * | 2012-05-29 | 2013-12-05 | 株式会社日立システムズ | Système de gestion de sécurité en nuage |
CN103780584A (zh) * | 2012-10-22 | 2014-05-07 | 上海俊悦智能科技有限公司 | 一种基于云计算的融合身份认证方法 |
US20140123028A1 (en) * | 2012-10-27 | 2014-05-01 | Kiran Kamity | Comprehensive multimedia management platform |
CN103023986A (zh) * | 2012-11-27 | 2013-04-03 | 中国电信股份有限公司云计算分公司 | 一种对多用户提供rdbms服务的系统和方法 |
CN103401688A (zh) * | 2013-08-09 | 2013-11-20 | 中国人民解放军理工大学 | 基于Eucalyptus云平台的消息中间件传输整合系统 |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105208012A (zh) * | 2015-08-31 | 2015-12-30 | 武汉云通英飞科技有限公司 | 一种基于云计算的云端认证方法和系统 |
CN109547217A (zh) * | 2019-01-11 | 2019-03-29 | 北京中实信达科技有限公司 | 基于动态口令的一对多身份认证系统和方法 |
CN109547217B (zh) * | 2019-01-11 | 2021-10-22 | 北京中实信达科技有限公司 | 基于动态口令的一对多身份认证系统和方法 |
Also Published As
Publication number | Publication date |
---|---|
CN105207970A (zh) | 2015-12-30 |
CN105207970B (zh) | 2019-09-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11736469B2 (en) | Single sign-on enabled OAuth token | |
US11089023B2 (en) | Computer readable storage media for tiered connection pooling and methods and systems for utilizing same | |
WO2015188568A1 (fr) | Procédé d'authentification basé sur un nuage public, intergiciel d'authentification, de sécurité, et groupe de ressources informatiques en nuage | |
WO2020151322A1 (fr) | Procédé, appareil et dispositif de gestion d'identité basés sur une chaîne de blocs, et support de stockage | |
US10484385B2 (en) | Accessing an application through application clients and web browsers | |
US9787659B2 (en) | Techniques for secure access management in virtual environments | |
US10320773B2 (en) | Validation for requests | |
US9053306B2 (en) | Authentication system, authentication server, service providing server, authentication method, and computer-readable recording medium | |
CN111212075B (zh) | 业务请求的处理方法、装置、电子设备及计算机存储介质 | |
EP2963884B1 (fr) | Système, client, et procédé d'autorisation bidirectionnelle | |
US11570165B2 (en) | Single sign-on service authentication through a voice assistant | |
US10091179B2 (en) | User authentication framework | |
AU2017275376B2 (en) | Method and apparatus for issuing a credential for an incident area network | |
WO2017041562A1 (fr) | Procédé et dispositif d'identification d'une identité d'utilisateur d'un dispositif terminal | |
WO2021013056A1 (fr) | Procédé et appareil de traitement de données basés sur un microservice, dispositif, et support de stockage lisible | |
WO2020140914A1 (fr) | Procédé d'authentification de client, appareil et support de stockage lisible par ordinateur | |
US10749868B2 (en) | Registration of the same domain with different cloud services networks | |
WO2017092385A1 (fr) | Procédé d'authentification de portail, serveur de portail et terminal | |
US20180322183A1 (en) | Systems and methods for normalizing identity claims across disparate identity directories | |
US10257263B1 (en) | Secure remote execution of infrastructure management | |
TWI768307B (zh) | 開源軟體整合方法 | |
TWM495053U (zh) | 於智慧型手機產生一次性密碼(otp)及身分驗證之裝置 | |
CN118077173A (zh) | 应用作为资源主体或服务主体 | |
KR20130140483A (ko) | 통합 인증 시스템 및 가입자 단말 | |
TW201512887A (zh) | 智慧型手機app產生一次性密碼(otp)及身分驗證的方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14894404 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 14894404 Country of ref document: EP Kind code of ref document: A1 |