Movatterモバイル変換


[0]ホーム

URL:


CN107277079A - A kind of across cloud customer certification system towards mixed cloud - Google Patents

A kind of across cloud customer certification system towards mixed cloud
Download PDF

Info

Publication number
CN107277079A
CN107277079ACN201710727800.7ACN201710727800ACN107277079ACN 107277079 ACN107277079 ACN 107277079ACN 201710727800 ACN201710727800 ACN 201710727800ACN 107277079 ACN107277079 ACN 107277079A
Authority
CN
China
Prior art keywords
cloud
service
service requester
authentication
private clound
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710727800.7A
Other languages
Chinese (zh)
Inventor
安森宾
童炜明
陈琳
雷兴民
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Wide Benefit Network Polytron Technologies Inc
Original Assignee
Shanghai Wide Benefit Network Polytron Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Wide Benefit Network Polytron Technologies IncfiledCriticalShanghai Wide Benefit Network Polytron Technologies Inc
Publication of CN107277079ApublicationCriticalpatent/CN107277079A/en
Pendinglegal-statusCriticalCurrent

Links

Classifications

Landscapes

Abstract

The invention provides a kind of across cloud customer certification system towards mixed cloud, including service request terminal, mixed cloud management system, across cloud authentication administrative system, access monitoring system and information storage system.The present invention constructs across the cloud Verification System towards mixed cloud, can meet user under mixing cloud environment and adhere to the authenticated domain of different private clounds, service access frequently demand separately.

Description

A kind of across cloud customer certification system towards mixed cloud
Technical field
The present invention relates to field of cloud calculation, and in particular to a kind of across cloud customer certification system towards mixed cloud.
Background technology
With the increase and popularization of private clound quantity, will appear from the interconnection of each private clound turns into mixed cloud, private clound interconnectionAfter mixed cloud, provided relative to private clound service orientation single service domain, mixed cloud exist between a large amount of clouds service collaboration andRequirements of combination, therefore bring the safety problem of across cloud synergistic application service.
The content of the invention
To solve the above problems, the present invention provides a kind of across cloud customer certification system towards mixed cloud.
The purpose of the present invention is realized using following technical scheme:
A kind of across cloud customer certification system towards mixed cloud, including service request terminal, mixed cloud management system, recognize across cloudDemonstrate,prove management system, access monitoring system and information storage system;
The service request terminal is used to provide access interface for the privately owned cloud service in service requester access mixed cloud;
The mixed cloud management system includes mixed cloud identity management module, mixed cloud differentiated control module;The mixingCloud identity management module is used to be managed the private clound for adding mixed cloud based on Certificate Authentication Mechanism, and sets up each private cloundBetween trusting relationship;The mixed cloud differentiated control module is used to private clound is divided into public affairs according to the security classification of private cloundLevel, confidential and confidential are opened, and takes different security strategies to be managed for different brackets;
Across the cloud authentication administrative system includes across cloud authentication module and alarm module;Across the cloud authentication module is used forService requester obtained during across cloud access the attribute token of service requester, and based on customized across cloud authentication protocolRealize that across cloud certification when service of the service requester of local private clound to other private clounds carries out across cloud access provides communicationService;The alarm module is used for the alert when obtaining attribute token failure or decryption failure;
The access monitoring system is used to be monitored service requester across the process that cloud is accessed;
Described information storage system is used for the access information and warning message of storage service requestor.
Beneficial effects of the present invention are:Across the cloud Verification System towards mixed cloud is constructed, can be met under mixing cloud environmentService requester adheres to the authenticated domain of different private clounds, service access frequently demand separately, solves above-mentioned technical problem.
Brief description of the drawings
Using accompanying drawing, the invention will be further described, but the embodiment in accompanying drawing does not constitute any limit to the present inventionSystem, for one of ordinary skill in the art, on the premise of not paying creative work, can also be obtained according to the following drawingsOther accompanying drawings.
Fig. 1 is structure connection diagram of the present invention.
Fig. 2 is the structural representation of mixed cloud identity management module of the present invention.
Reference:
Service request terminal 1, mixed cloud management system 2, across cloud authentication administrative system 3, access monitoring system 4, information storageSystem 5, mixed cloud identity management module 21, mixed cloud differentiated control module 22, across cloud authentication module 31, alarm module 32, cardBookmark bill member 211, Yun Jian authentication proxys unit 212.
Embodiment
The invention will be further described with the following Examples.
Application scenarios 1
Referring to Fig. 1, Fig. 2, across the cloud customer certification system towards mixed cloud of one embodiment of this application scene, includingService request terminal 1, mixed cloud management system 2, across cloud authentication administrative system 3, access monitoring system 4 and information storage system 5;
The service request terminal 1 is used to provide access interface for the privately owned cloud service in service requester access mixed cloud;
The mixed cloud management system 2 includes mixed cloud identity management module 21, mixed cloud differentiated control module 22;It is describedMixed cloud identity management module 21 is used to be managed the private clound for adding mixed cloud based on Certificate Authentication Mechanism, and sets up eachTrusting relationship between private clound;The mixed cloud differentiated control module 22 is used for private clound according to the security classification of private cloundOpen level, confidential and confidential are divided into, and takes different security strategies to be managed for different brackets;
Across the cloud authentication administrative system 3 includes across cloud authentication module 31 and alarm module 32;Across the cloud authentication module31 are used for the attribute token of acquisition service requester during for service requester progress across cloud access, and based on customized across cloudAuthentication protocol realizes across cloud certification when service of the service requester of local private clound to other private clounds carries out across cloud accessCommunication service is provided;The alarm module 32 is used for the alert when obtaining attribute token failure or decryption failure;
The access monitoring system 4 is used to be monitored service requester across the process that cloud is accessed;
Described information storage system 5 is used for the access information and warning message of storage service requestor.
It is preferred that, the attribute token that service requester is obtained when service requester carries out across cloud access, including:
(1) service requester sends to the service S for other private clounds to be accessed across cloud and accesses service request;
(2) service S responses are accessed after service request, and attribute request is sent to service requester;
(3) service requester inputs self-defined password, and the self-defined password digit have to be larger than 6, and will be self-definedPassword and its identity together with the attribute request as message by sending jointly to the certification of private clound after encrypted signatureAgency, authentication proxy message is decrypted checking, after being verified, root by the private key of oneself and the public key of service requesterAccording to extracting corresponding with attribute request attribute in the attribute request dependence memory module of service requester and sign and issue attribute token,Session key is generated, service requester is sent to after encrypted signature together with the attribute token and self-defined password;
(4) service requester is received after message, and message is carried out using the private key of oneself and the public key certificate of authentication proxyDecryption, if containing self-defined password in information, have authenticated the identity of the authentication proxy, while also obtain attribute token.
It is preferred that, the alert when obtaining attribute token failure or decryption failure, including:
(1) service requester sends to the service S for other private clounds to be accessed across cloud and accesses service request;
(2) service S responses are accessed after service request, and attribute request is sent to service requester;
(3) service requester inputs self-defined code error, obtains attribute token failure, and alarm module 32 sends alarm signalBreath, attribute token, which is obtained, to be sent to after service requester, and information can not be decrypted for service requester, it is impossible to is completed identity and is testedCard, the also alert of alarm module 32.
The above embodiment of the present invention devises the acquisition modes of attribute token, improve attribute token acquisition security andEfficiency;Across the cloud Verification System towards mixed cloud is constructed, service requester under mixing cloud environment can be met and adhere to different privates separatelyThere are the authenticated domain of cloud, service access frequently demand, so as to solve above-mentioned technical problem.
It is preferred that, the mixed cloud identity management module 21 includes:
(1) certificate issuance unit 211:For the authentication proxy when private clound adds or exits mixed cloud for the private cloundSign and issue or revoked public key certificate, and the public key certificate signed and issued in mixed cloud is managed collectively;
(2) Yun Jian authentication proxys unit 212:The registration of the private clound newly added for receiving, it is privately owned that management is newly addedThe log-on message of the authentication proxy of cloud, so as to set up its trusting relationship between private clound.
It is preferred that, the authentication proxy of the private clound supports ID authentication mechanism and Certificate Authentication Mechanism, for managing privateThere is signing and issuing for the authentication in cloud and attribute token, and when across cloud authentication module 31 carries out across cloud certification, by the registrationInformation is submitted to mixed cloud identity management module 21 and is managed, and receives the public key card that mixed cloud identity management module 21 is signed and issuedBook;The log-on message of the authentication proxy for managing the private clound newly added, including:Audit the certification generation of the private clound newly addedThe log-on message of reason, receive the private clound newly added authentication proxy log-on message, log-on message is stored in safety database,The log-on message of the private clound exited is deleted when private clound exits mixed cloud.
Above-mentioned two preferred embodiment realizes the management to the private clound in mixed cloud, and the authentication proxy of private clound supportsID authentication mechanism and Certificate Authentication Mechanism, make the more science of the management to the private clound in mixed cloud, safe.
It is preferred that, private clound is divided into open level, confidential and confidential, bag by the security classification according to private cloundInclude:
(1) if certain private clound only allows private clound founder itself to access, the private clound is confidential;
(2) if the service requester that certain private clound allows private clound founder to authorize is accessed, the private clound is secretLevel;
(3) if certain private clound allows to access with all service requesters that the private clound sets up trusting relationship, this is privately ownedCloud is open level.
It is preferred that, the security strategy includes:
(1) for confidential private clound, it is encrypted using elliptic curve cipher system, visitor needs to carry out fingerprint inspectionCard could send access request;
(2) for confidential private clound, it is encrypted using RSA cryptographic algorithms, visitor needs to authorize U-shield to visitAsk;
(3) for open level private clound, it is encrypted using des encryption algorithm, the visitor for setting up trusting relationship can be withDirectly transmit access request.
This preferred embodiment divides security classification to different private clounds and designs corresponding security strategy, is ensureing safetyOn the premise of different private clounds can be conducted interviews.
It is preferred that, described information storage system 5 is stored using multilayered model to information, including accumulation layer, management levelAnd interface layer, the accumulation layer be in memory module bottom, be made up of different equipment, the management level be located at accumulation layer itOn, storage device is managed by various softwares, the service-oriented requestor of interface layer provides service, can be according to visitorThere is provided different service interfaces for family demand.
This preferred embodiment is easy to that manager's queried access information and warning message can be easy to, and is easy to subsequent examination.
It is preferred that, customized across the cloud authentication protocol is:
(1) service requester randomly selects self-defined numeral as fresh number, the attribute token obtained with service requesterThe random number of service requester is returned to together as message with S is serviced when carrying out across cloud accesss, and clothes are sent to after encrypted signatureBe engaged in S;
(2) service S is received after message, close to message solution label with the private key of oneself and the public key of service requester, if messageThe random number of service requester is returned to containing the service S, then service requester authentication passes through, service S and then generationAnother random number, carries out encrypted signature to another random number and the self-defined numeral, forms feedback information, be sent to clothesBe engaged in requestor;
(3) service requester is received after the feedback information, with the private key of oneself and service S public key to feedback information solutionLabel are close, if feedback information contains the self-defined numeral, service S identity have authenticated, it is achieved thereby that both sides' mutually recognizes each otherCard.
This preferred embodiment devises customized across cloud authentication protocol, realizes two-way between service requester and serviceCertification, improves the security and the efficiency across cloud certification of system.
It is preferred that, the monitoring system 4 that accesses is by access process vector X=(a1、a2、a3) be indicated, a1Represent reportA situation arises for alert information, a2Represent service requester accesses whether meet security strategy, a2Represent running situation;Work as alarmWhen information does not occur, a11 is taken, 0 is otherwise taken;When service requester access meets security strategy, a21 is taken, 0 is otherwise taken;When system fortuneA when row is normal31 is taken, 0 is otherwise taken;Only when X=(1,1,1), monitoring system identification is accessed successfully;Monitoring system 4 is accessed to existRecorded in work to accessing unsuccessful time and number of times, setting time is reached when accessing unsuccessful number of times in setting time sectionNumber, accesses monitoring system 4 and sends warning information.
This preferred embodiment realizes the monitoring to service requester access process, improves the security of system.
In this application scenarios, the self-defined password digit is 11, and certification speed improves 10%, and security is improved12%.
Application scenarios 2
Referring to Fig. 1, Fig. 2, across the cloud customer certification system towards mixed cloud of one embodiment of this application scene, includingService request terminal 1, mixed cloud management system 2, across cloud authentication administrative system 3, access monitoring system 4 and information storage system 5;
The service request terminal 1 is used to provide access interface for the privately owned cloud service in service requester access mixed cloud;
The mixed cloud management system 2 includes mixed cloud identity management module 21, mixed cloud differentiated control module 22;It is describedMixed cloud identity management module 21 is used to be managed the private clound for adding mixed cloud based on Certificate Authentication Mechanism, and sets up eachTrusting relationship between private clound;The mixed cloud differentiated control module 22 is used for private clound according to the security classification of private cloundOpen level, confidential and confidential are divided into, and takes different security strategies to be managed for different brackets;
Across the cloud authentication administrative system 3 includes across cloud authentication module 31 and alarm module 32;Across the cloud authentication module31 are used for the attribute token of acquisition service requester during for service requester progress across cloud access, and based on customized across cloudAuthentication protocol realizes across cloud certification when service of the service requester of local private clound to other private clounds carries out across cloud accessCommunication service is provided;The alarm module 32 is used for the alert when obtaining attribute token failure or decryption failure;
The access monitoring system 4 is used to be monitored service requester across the process that cloud is accessed;
Described information storage system 5 is used for the access information and warning message of storage service requestor.
It is preferred that, the attribute token that service requester is obtained when service requester carries out across cloud access, including:
(1) service requester sends to the service S for other private clounds to be accessed across cloud and accesses service request;
(2) service S responses are accessed after service request, and attribute request is sent to service requester;
(3) service requester inputs self-defined password, and the self-defined password digit have to be larger than 6, and will be self-definedPassword and its identity together with the attribute request as message by sending jointly to the certification of private clound after encrypted signatureAgency, authentication proxy message is decrypted checking, after being verified, root by the private key of oneself and the public key of service requesterAccording to extracting corresponding with attribute request attribute in the attribute request dependence memory module of service requester and sign and issue attribute token,Session key is generated, service requester is sent to after encrypted signature together with the attribute token and self-defined password;
(4) service requester is received after message, and message is carried out using the private key of oneself and the public key certificate of authentication proxyDecryption, if containing self-defined password in information, have authenticated the identity of the authentication proxy, while also obtain attribute token.
It is preferred that, the alert when obtaining attribute token failure or decryption failure, including:
(1) service requester sends to the service S for other private clounds to be accessed across cloud and accesses service request;
(2) service S responses are accessed after service request, and attribute request is sent to service requester;
(3) service requester inputs self-defined code error, obtains attribute token failure, and alarm module 32 sends alarm signalBreath, attribute token, which is obtained, to be sent to after service requester, and information can not be decrypted for service requester, it is impossible to is completed identity and is testedCard, the also alert of alarm module 32.
The above embodiment of the present invention devises the acquisition modes of attribute token, improve attribute token acquisition security andEfficiency;Across the cloud Verification System towards mixed cloud is constructed, service requester under mixing cloud environment can be met and adhere to different privates separatelyThere are the authenticated domain of cloud, service access frequently demand, so as to solve above-mentioned technical problem.
It is preferred that, the mixed cloud identity management module 21 includes:
(1) certificate issuance unit 211:For the authentication proxy when private clound adds or exits mixed cloud for the private cloundSign and issue or revoked public key certificate, and the public key certificate signed and issued in mixed cloud is managed collectively;
(2) Yun Jian authentication proxys unit 212:The registration of the private clound newly added for receiving, it is privately owned that management is newly addedThe log-on message of the authentication proxy of cloud, so as to set up its trusting relationship between private clound.
It is preferred that, the authentication proxy of the private clound supports ID authentication mechanism and Certificate Authentication Mechanism, for managing privateThere is signing and issuing for the authentication in cloud and attribute token, and when across cloud authentication module 31 carries out across cloud certification, by the registrationInformation is submitted to mixed cloud identity management module 21 and is managed, and receives the public key card that mixed cloud identity management module 21 is signed and issuedBook;The log-on message of the authentication proxy for managing the private clound newly added, including:Audit the certification generation of the private clound newly addedThe log-on message of reason, receive the private clound newly added authentication proxy log-on message, log-on message is stored in safety database,The log-on message of the private clound exited is deleted when private clound exits mixed cloud.
Above-mentioned two preferred embodiment realizes the management to the private clound in mixed cloud, and the authentication proxy of private clound supportsID authentication mechanism and Certificate Authentication Mechanism, make the more science of the management to the private clound in mixed cloud, safe.
It is preferred that, private clound is divided into open level, confidential and confidential, bag by the security classification according to private cloundInclude:
(1) if certain private clound only allows private clound founder itself to access, the private clound is confidential;
(2) if the service requester that certain private clound allows private clound founder to authorize is accessed, the private clound is secretLevel;
(3) if certain private clound allows to access with all service requesters that the private clound sets up trusting relationship, this is privately ownedCloud is open level.
It is preferred that, the security strategy includes:
(1) for confidential private clound, it is encrypted using elliptic curve cipher system, visitor needs to carry out fingerprint inspectionCard could send access request;
(2) for confidential private clound, it is encrypted using RSA cryptographic algorithms, visitor needs to authorize U-shield to visitAsk;
(3) for open level private clound, it is encrypted using des encryption algorithm, the visitor for setting up trusting relationship can be withDirectly transmit access request.
This preferred embodiment divides security classification to different private clounds and designs corresponding security strategy, is ensureing safetyOn the premise of different private clounds can be conducted interviews.
It is preferred that, described information storage system 5 is stored using multilayered model to information, including accumulation layer, management levelAnd interface layer, the accumulation layer be in memory module bottom, be made up of different equipment, the management level be located at accumulation layer itOn, storage device is managed by various softwares, the service-oriented requestor of interface layer provides service, can be according to visitorThere is provided different service interfaces for family demand.
This preferred embodiment is easy to that manager's queried access information and warning message can be easy to, and is easy to subsequent examination.
It is preferred that, customized across the cloud authentication protocol is:
(1) service requester randomly selects self-defined numeral as fresh number, the attribute token obtained with service requesterThe random number of service requester is returned to together as message with S is serviced when carrying out across cloud accesss, and clothes are sent to after encrypted signatureBe engaged in S;
(2) service S is received after message, close to message solution label with the private key of oneself and the public key of service requester, if messageThe random number of service requester is returned to containing the service S, then service requester authentication passes through, service S and then generationAnother random number, carries out encrypted signature to another random number and the self-defined numeral, forms feedback information, be sent to clothesBe engaged in requestor;
(3) service requester is received after the feedback information, with the private key of oneself and service S public key to feedback information solutionLabel are close, if feedback information contains the self-defined numeral, service S identity have authenticated, it is achieved thereby that both sides' mutually recognizes each otherCard.
This preferred embodiment devises customized across cloud authentication protocol, realizes two-way between service requester and serviceCertification, improves the security and the efficiency across cloud certification of system.
It is preferred that, the monitoring system 4 that accesses is by access process vector X=(a1、a2、a3) be indicated, a1Represent reportA situation arises for alert information, a2Represent service requester accesses whether meet security strategy, a3Represent running situation;Work as alarmWhen information does not occur, a11 is taken, 0 is otherwise taken;When service requester access meets security strategy, a21 is taken, 0 is otherwise taken;When system fortuneA when row is normal31 is taken, 0 is otherwise taken;Only when X=(1,1,1), monitoring system identification is accessed successfully;Monitoring system 4 is accessed to existRecorded in work to accessing unsuccessful time and number of times, setting time is reached when accessing unsuccessful number of times in setting time sectionNumber, accesses monitoring system 4 and sends warning information.
This preferred embodiment realizes the monitoring to service requester access process, improves the security of system.
In this application scenarios, the self-defined password digit is 10, and certification speed improves 11%, and security is improved11%.
Application scenarios 3
Referring to Fig. 1, Fig. 2, across the cloud customer certification system towards mixed cloud of one embodiment of this application scene, includingService request terminal 1, mixed cloud management system 2, across cloud authentication administrative system 3, access monitoring system 4 and information storage system 5;
The service request terminal 1 is used to provide access interface for the privately owned cloud service in service requester access mixed cloud;
The mixed cloud management system 2 includes mixed cloud identity management module 21, mixed cloud differentiated control module 22;It is describedMixed cloud identity management module 21 is used to be managed the private clound for adding mixed cloud based on Certificate Authentication Mechanism, and sets up eachTrusting relationship between private clound;The mixed cloud differentiated control module 22 is used for private clound according to the security classification of private cloundOpen level, confidential and confidential are divided into, and takes different security strategies to be managed for different brackets;
Across the cloud authentication administrative system 3 includes across cloud authentication module 31 and alarm module 32;Across the cloud authentication module31 are used for the attribute token of acquisition service requester during for service requester progress across cloud access, and based on customized across cloudAuthentication protocol realizes across cloud certification when service of the service requester of local private clound to other private clounds carries out across cloud accessCommunication service is provided;The alarm module 32 is used for the alert when obtaining attribute token failure or decryption failure;
The access monitoring system 4 is used to be monitored service requester across the process that cloud is accessed;
Described information storage system 5 is used for the access information and warning message of storage service requestor.
It is preferred that, the attribute token that service requester is obtained when service requester carries out across cloud access, including:
(1) service requester sends to the service S for other private clounds to be accessed across cloud and accesses service request;
(2) service S responses are accessed after service request, and attribute request is sent to service requester;
(3) service requester inputs self-defined password, and the self-defined password digit have to be larger than 6, and will be self-definedPassword and its identity together with the attribute request as message by sending jointly to the certification of private clound after encrypted signatureAgency, authentication proxy message is decrypted checking, after being verified, root by the private key of oneself and the public key of service requesterAccording to extracting corresponding with attribute request attribute in the attribute request dependence memory module of service requester and sign and issue attribute token,Session key is generated, service requester is sent to after encrypted signature together with the attribute token and self-defined password;
(4) service requester is received after message, and message is carried out using the private key of oneself and the public key certificate of authentication proxyDecryption, if containing self-defined password in information, have authenticated the identity of the authentication proxy, while also obtain attribute token.
It is preferred that, the alert when obtaining attribute token failure or decryption failure, including:
(1) service requester sends to the service S for other private clounds to be accessed across cloud and accesses service request;
(2) service S responses are accessed after service request, and attribute request is sent to service requester;
(3) service requester inputs self-defined code error, obtains attribute token failure, and alarm module 32 sends alarm signalBreath, attribute token, which is obtained, to be sent to after service requester, and information can not be decrypted for service requester, it is impossible to is completed identity and is testedCard, the also alert of alarm module 32.
The above embodiment of the present invention devises the acquisition modes of attribute token, improve attribute token acquisition security andEfficiency;Across the cloud Verification System towards mixed cloud is constructed, service requester under mixing cloud environment can be met and adhere to different privates separatelyThere are the authenticated domain of cloud, service access frequently demand, so as to solve above-mentioned technical problem.
It is preferred that, the mixed cloud identity management module 21 includes:
(1) certificate issuance unit 211:For the authentication proxy when private clound adds or exits mixed cloud for the private cloundSign and issue or revoked public key certificate, and the public key certificate signed and issued in mixed cloud is managed collectively;
(2) Yun Jian authentication proxys unit 212:The registration of the private clound newly added for receiving, it is privately owned that management is newly addedThe log-on message of the authentication proxy of cloud, so as to set up its trusting relationship between private clound.
It is preferred that, the authentication proxy of the private clound supports ID authentication mechanism and Certificate Authentication Mechanism, for managing privateThere is signing and issuing for the authentication in cloud and attribute token, and when across cloud authentication module 31 carries out across cloud certification, by the registrationInformation is submitted to mixed cloud identity management module 21 and is managed, and receives the public key card that mixed cloud identity management module 21 is signed and issuedBook;The log-on message of the authentication proxy for managing the private clound newly added, including:Audit the certification generation of the private clound newly addedThe log-on message of reason, receive the private clound newly added authentication proxy log-on message, log-on message is stored in safety database,The log-on message of the private clound exited is deleted when private clound exits mixed cloud.
Above-mentioned two preferred embodiment realizes the management to the private clound in mixed cloud, and the authentication proxy of private clound supportsID authentication mechanism and Certificate Authentication Mechanism, make the more science of the management to the private clound in mixed cloud, safe.
It is preferred that, private clound is divided into open level, confidential and confidential, bag by the security classification according to private cloundInclude:
(1) if certain private clound only allows private clound founder itself to access, the private clound is confidential;
(2) if the service requester that certain private clound allows private clound founder to authorize is accessed, the private clound is secretLevel;
(3) if certain private clound allows to access with all service requesters that the private clound sets up trusting relationship, this is privately ownedCloud is open level.
It is preferred that, the security strategy includes:
(1) for confidential private clound, it is encrypted using elliptic curve cipher system, visitor needs to carry out fingerprint inspectionCard could send access request;
(2) for confidential private clound, it is encrypted using RSA cryptographic algorithms, visitor needs to authorize U-shield to visitAsk;
(3) for open level private clound, it is encrypted using des encryption algorithm, the visitor for setting up trusting relationship can be withDirectly transmit access request.
This preferred embodiment divides security classification to different private clounds and designs corresponding security strategy, is ensureing safetyOn the premise of different private clounds can be conducted interviews.
It is preferred that, described information storage system 5 is stored using multilayered model to information, including accumulation layer, management levelAnd interface layer, the accumulation layer be in memory module bottom, be made up of different equipment, the management level be located at accumulation layer itOn, storage device is managed by various softwares, the service-oriented requestor of interface layer provides service, can be according to visitorThere is provided different service interfaces for family demand.
This preferred embodiment is easy to that manager's queried access information and warning message can be easy to, and is easy to subsequent examination.
It is preferred that, customized across the cloud authentication protocol is:
(1) service requester randomly selects self-defined numeral as fresh number, the attribute token obtained with service requesterThe random number of service requester is returned to together as message with S is serviced when carrying out across cloud accesss, and clothes are sent to after encrypted signatureBe engaged in S;
(2) service S is received after message, close to message solution label with the private key of oneself and the public key of service requester, if messageThe random number of service requester is returned to containing the service S, then service requester authentication passes through, service S and then generationAnother random number, carries out encrypted signature to another random number and the self-defined numeral, forms feedback information, be sent to clothesBe engaged in requestor;
(3) service requester is received after the feedback information, with the private key of oneself and service S public key to feedback information solutionLabel are close, if feedback information contains the self-defined numeral, service S identity have authenticated, it is achieved thereby that both sides' mutually recognizes each otherCard.
This preferred embodiment devises customized across cloud authentication protocol, realizes two-way between service requester and serviceCertification, improves the security and the efficiency across cloud certification of system.
It is preferred that, the monitoring system 4 that accesses is by access process vector X=(a1、a2、a3) be indicated, a1Represent reportA situation arises for alert information, a2Represent service requester accesses whether meet security strategy, a3Represent running situation;Work as alarmWhen information does not occur, a11 is taken, 0 is otherwise taken;When service requester access meets security strategy, a21 is taken, 0 is otherwise taken;When system fortuneA when row is normal31 is taken, 0 is otherwise taken;Only when X=(1,1,1), monitoring system identification is accessed successfully;Monitoring system 4 is accessed to existRecorded in work to accessing unsuccessful time and number of times, setting time is reached when accessing unsuccessful number of times in setting time sectionNumber, accesses monitoring system 4 and sends warning information.
This preferred embodiment realizes the monitoring to service requester access process, improves the security of system.HereinIn application scenarios, the self-defined password digit is 9, and certification speed improves 12%, and security improves 10%.
Application scenarios 4
Referring to Fig. 1, Fig. 2, across the cloud customer certification system towards mixed cloud of one embodiment of this application scene, includingService request terminal 1, mixed cloud management system 2, across cloud authentication administrative system 3, access monitoring system 4 and information storage system 5;
The service request terminal 1 is used to provide access interface for the privately owned cloud service in service requester access mixed cloud;
The mixed cloud management system 2 includes mixed cloud identity management module 21, mixed cloud differentiated control module 22;It is describedMixed cloud identity management module 21 is used to be managed the private clound for adding mixed cloud based on Certificate Authentication Mechanism, and sets up eachTrusting relationship between private clound;The mixed cloud differentiated control module 22 is used for private clound according to the security classification of private cloundOpen level, confidential and confidential are divided into, and takes different security strategies to be managed for different brackets;
Across the cloud authentication administrative system 3 includes across cloud authentication module 31 and alarm module 32;Across the cloud authentication module31 are used for the attribute token of acquisition service requester during for service requester progress across cloud access, and based on customized across cloudAuthentication protocol realizes across cloud certification when service of the service requester of local private clound to other private clounds carries out across cloud accessCommunication service is provided;The alarm module 32 is used for the alert when obtaining attribute token failure or decryption failure;
The access monitoring system 4 is used to be monitored service requester across the process that cloud is accessed;
Described information storage system 5 is used for the access information and warning message of storage service requestor.
It is preferred that, the attribute token that service requester is obtained when service requester carries out across cloud access, including:
(1) service requester sends to the service S for other private clounds to be accessed across cloud and accesses service request;
(2) service S responses are accessed after service request, and attribute request is sent to service requester;
(3) service requester inputs self-defined password, and the self-defined password digit have to be larger than 6, and will be self-definedPassword and its identity together with the attribute request as message by sending jointly to the certification of private clound after encrypted signatureAgency, authentication proxy message is decrypted checking, after being verified, root by the private key of oneself and the public key of service requesterAccording to extracting corresponding with attribute request attribute in the attribute request dependence memory module of service requester and sign and issue attribute token,Session key is generated, service requester is sent to after encrypted signature together with the attribute token and self-defined password;
(4) service requester is received after message, and message is carried out using the private key of oneself and the public key certificate of authentication proxyDecryption, if containing self-defined password in information, have authenticated the identity of the authentication proxy, while also obtain attribute token.
It is preferred that, the alert when obtaining attribute token failure or decryption failure, including:
(1) service requester sends to the service S for other private clounds to be accessed across cloud and accesses service request;
(2) service S responses are accessed after service request, and attribute request is sent to service requester;
(3) service requester inputs self-defined code error, obtains attribute token failure, and alarm module 32 sends alarm signalBreath, attribute token, which is obtained, to be sent to after service requester, and information can not be decrypted for service requester, it is impossible to is completed identity and is testedCard, the also alert of alarm module 32.
The above embodiment of the present invention devises the acquisition modes of attribute token, improve attribute token acquisition security andEfficiency;Across the cloud Verification System towards mixed cloud is constructed, service requester under mixing cloud environment can be met and adhere to different privates separatelyThere are the authenticated domain of cloud, service access frequently demand, so as to solve above-mentioned technical problem.
It is preferred that, the mixed cloud identity management module 21 includes:
(1) certificate issuance unit 211:For the authentication proxy when private clound adds or exits mixed cloud for the private cloundSign and issue or revoked public key certificate, and the public key certificate signed and issued in mixed cloud is managed collectively;
(2) Yun Jian authentication proxys unit 212:The registration of the private clound newly added for receiving, it is privately owned that management is newly addedThe log-on message of the authentication proxy of cloud, so as to set up its trusting relationship between private clound.
It is preferred that, the authentication proxy of the private clound supports ID authentication mechanism and Certificate Authentication Mechanism, for managing privateThere is signing and issuing for the authentication in cloud and attribute token, and when across cloud authentication module 31 carries out across cloud certification, by the registrationInformation is submitted to mixed cloud identity management module 21 and is managed, and receives the public key card that mixed cloud identity management module 21 is signed and issuedBook;The log-on message of the authentication proxy for managing the private clound newly added, including:Audit the certification generation of the private clound newly addedThe log-on message of reason, receive the private clound newly added authentication proxy log-on message, log-on message is stored in safety database,The log-on message of the private clound exited is deleted when private clound exits mixed cloud.
Above-mentioned two preferred embodiment realizes the management to the private clound in mixed cloud, and the authentication proxy of private clound supportsID authentication mechanism and Certificate Authentication Mechanism, make the more science of the management to the private clound in mixed cloud, safe.
It is preferred that, private clound is divided into open level, confidential and confidential, bag by the security classification according to private cloundInclude:
(1) if certain private clound only allows private clound founder itself to access, the private clound is confidential;
(2) if the service requester that certain private clound allows private clound founder to authorize is accessed, the private clound is secretLevel;
(3) if certain private clound allows to access with all service requesters that the private clound sets up trusting relationship, this is privately ownedCloud is open level.
It is preferred that, the security strategy includes:
(1) for confidential private clound, it is encrypted using elliptic curve cipher system, visitor needs to carry out fingerprint inspectionCard could send access request;
(2) for confidential private clound, it is encrypted using RSA cryptographic algorithms, visitor needs to authorize U-shield to visitAsk;
(3) for open level private clound, it is encrypted using des encryption algorithm, the visitor for setting up trusting relationship can be withDirectly transmit access request.
This preferred embodiment divides security classification to different private clounds and designs corresponding security strategy, is ensureing safetyOn the premise of different private clounds can be conducted interviews.
It is preferred that, described information storage system 5 is stored using multilayered model to information, including accumulation layer, management levelAnd interface layer, the accumulation layer be in memory module bottom, be made up of different equipment, the management level be located at accumulation layer itOn, storage device is managed by various softwares, the service-oriented requestor of interface layer provides service, can be according to visitorThere is provided different service interfaces for family demand.
This preferred embodiment is easy to that manager's queried access information and warning message can be easy to, and is easy to subsequent examination.
It is preferred that, customized across the cloud authentication protocol is:
(1) service requester randomly selects self-defined numeral as fresh number, the attribute token obtained with service requesterThe random number of service requester is returned to together as message with S is serviced when carrying out across cloud accesss, and clothes are sent to after encrypted signatureBe engaged in S;
(2) service S is received after message, close to message solution label with the private key of oneself and the public key of service requester, if messageThe random number of service requester is returned to containing the service S, then service requester authentication passes through, service S and then generationAnother random number, carries out encrypted signature to another random number and the self-defined numeral, forms feedback information, be sent to clothesBe engaged in requestor;
(3) service requester is received after the feedback information, with the private key of oneself and service S public key to feedback information solutionLabel are close, if feedback information contains the self-defined numeral, service S identity have authenticated, it is achieved thereby that both sides' mutually recognizes each otherCard.
This preferred embodiment devises customized across cloud authentication protocol, realizes two-way between service requester and serviceCertification, improves the security and the efficiency across cloud certification of system.
It is preferred that, the monitoring system 4 that accesses is by access process vector X=(a1、a2、a3) be indicated, a1Represent reportA situation arises for alert information, a2Represent service requester accesses whether meet security strategy, a3Represent running situation;Work as alarmWhen information does not occur, a11 is taken, 0 is otherwise taken;When service requester access meets security strategy, a21 is taken, 0 is otherwise taken;When system fortuneA when row is normal31 is taken, 0 is otherwise taken;Only when X=(1,1,1), monitoring system identification is accessed successfully;Monitoring system 4 is accessed to existRecorded in work to accessing unsuccessful time and number of times, setting time is reached when accessing unsuccessful number of times in setting time sectionNumber, accesses monitoring system 4 and sends warning information.
This preferred embodiment realizes the monitoring to service requester access process, improves the security of system.
In this application scenarios, the self-defined password digit is 8, and certification speed improves 13%, and security is improved9%.
Application scenarios 5
Referring to Fig. 1, Fig. 2, across the cloud customer certification system towards mixed cloud of one embodiment of this application scene, includingService request terminal 1, mixed cloud management system 2, across cloud authentication administrative system 3, access monitoring system 4 and information storage system 5;
The service request terminal 1 is used to provide access interface for the privately owned cloud service in service requester access mixed cloud;
The mixed cloud management system 2 includes mixed cloud identity management module 21, mixed cloud differentiated control module 22;It is describedMixed cloud identity management module 21 is used to be managed the private clound for adding mixed cloud based on Certificate Authentication Mechanism, and sets up eachTrusting relationship between private clound;The mixed cloud differentiated control module 22 is used for private clound according to the security classification of private cloundOpen level, confidential and confidential are divided into, and takes different security strategies to be managed for different brackets;
Across the cloud authentication administrative system 3 includes across cloud authentication module 31 and alarm module 32;Across the cloud authentication module31 are used for the attribute token of acquisition service requester during for service requester progress across cloud access, and based on customized across cloudAuthentication protocol realizes across cloud certification when service of the service requester of local private clound to other private clounds carries out across cloud accessCommunication service is provided;The alarm module 32 is used for the alert when obtaining attribute token failure or decryption failure;
The access monitoring system 4 is used to be monitored service requester across the process that cloud is accessed;
Described information storage system 5 is used for the access information and warning message of storage service requestor.
It is preferred that, the attribute token that service requester is obtained when service requester carries out across cloud access, including:
(1) service requester sends to the service S for other private clounds to be accessed across cloud and accesses service request;
(2) service S responses are accessed after service request, and attribute request is sent to service requester;
(3) service requester inputs self-defined password, and the self-defined password digit have to be larger than 6, and will be self-definedPassword and its identity together with the attribute request as message by sending jointly to the certification of private clound after encrypted signatureAgency, authentication proxy message is decrypted checking, after being verified, root by the private key of oneself and the public key of service requesterAccording to extracting corresponding with attribute request attribute in the attribute request dependence memory module of service requester and sign and issue attribute token,Session key is generated, service requester is sent to after encrypted signature together with the attribute token and self-defined password;
(4) service requester is received after message, and message is carried out using the private key of oneself and the public key certificate of authentication proxyDecryption, if containing self-defined password in information, have authenticated the identity of the authentication proxy, while also obtain attribute token.
It is preferred that, the alert when obtaining attribute token failure or decryption failure, including:
(1) service requester sends to the service S for other private clounds to be accessed across cloud and accesses service request;
(2) service S responses are accessed after service request, and attribute request is sent to service requester;
(3) service requester inputs self-defined code error, obtains attribute token failure, and alarm module 32 sends alarm signalBreath, attribute token, which is obtained, to be sent to after service requester, and information can not be decrypted for service requester, it is impossible to is completed identity and is testedCard, the also alert of alarm module 32.
The above embodiment of the present invention devises the acquisition modes of attribute token, improve attribute token acquisition security andEfficiency;Across the cloud Verification System towards mixed cloud is constructed, service requester under mixing cloud environment can be met and adhere to different privates separatelyThere are the authenticated domain of cloud, service access frequently demand, so as to solve above-mentioned technical problem.
It is preferred that, the mixed cloud identity management module 21 includes:
(1) certificate issuance unit 211:For the authentication proxy when private clound adds or exits mixed cloud for the private cloundSign and issue or revoked public key certificate, and the public key certificate signed and issued in mixed cloud is managed collectively;
(2) Yun Jian authentication proxys unit 212:The registration of the private clound newly added for receiving, it is privately owned that management is newly addedThe log-on message of the authentication proxy of cloud, so as to set up its trusting relationship between private clound.
It is preferred that, the authentication proxy of the private clound supports ID authentication mechanism and Certificate Authentication Mechanism, for managing privateThere is signing and issuing for the authentication in cloud and attribute token, and when across cloud authentication module 31 carries out across cloud certification, by the registrationInformation is submitted to mixed cloud identity management module 21 and is managed, and receives the public key card that mixed cloud identity management module 21 is signed and issuedBook;The log-on message of the authentication proxy for managing the private clound newly added, including:Audit the certification generation of the private clound newly addedThe log-on message of reason, receive the private clound newly added authentication proxy log-on message, log-on message is stored in safety database,The log-on message of the private clound exited is deleted when private clound exits mixed cloud.
Above-mentioned two preferred embodiment realizes the management to the private clound in mixed cloud, and the authentication proxy of private clound supportsID authentication mechanism and Certificate Authentication Mechanism, make the more science of the management to the private clound in mixed cloud, safe.
It is preferred that, private clound is divided into open level, confidential and confidential, bag by the security classification according to private cloundInclude:
(1) if certain private clound only allows private clound founder itself to access, the private clound is confidential;
(2) if the service requester that certain private clound allows private clound founder to authorize is accessed, the private clound is secretLevel;
(3) if certain private clound allows to access with all service requesters that the private clound sets up trusting relationship, this is privately ownedCloud is open level.
It is preferred that, the security strategy includes:
(1) for confidential private clound, it is encrypted using elliptic curve cipher system, visitor needs to carry out fingerprint inspectionCard could send access request;
(2) for confidential private clound, it is encrypted using RSA cryptographic algorithms, visitor needs to authorize U-shield to visitAsk;
(3) for open level private clound, it is encrypted using des encryption algorithm, the visitor for setting up trusting relationship can be withDirectly transmit access request.
This preferred embodiment divides security classification to different private clounds and designs corresponding security strategy, is ensureing safetyOn the premise of different private clounds can be conducted interviews.
It is preferred that, described information storage system 5 is stored using multilayered model to information, including accumulation layer, management levelAnd interface layer, the accumulation layer be in memory module bottom, be made up of different equipment, the management level be located at accumulation layer itOn, storage device is managed by various softwares, the service-oriented requestor of interface layer provides service, can be according to visitorThere is provided different service interfaces for family demand.
This preferred embodiment is easy to that manager's queried access information and warning message can be easy to, and is easy to subsequent examination.
It is preferred that, customized across the cloud authentication protocol is:
(1) service requester randomly selects self-defined numeral as fresh number, the attribute token obtained with service requesterThe random number of service requester is returned to together as message with S is serviced when carrying out across cloud accesss, and clothes are sent to after encrypted signatureBe engaged in S;
(2) service S is received after message, close to message solution label with the private key of oneself and the public key of service requester, if messageThe random number of service requester is returned to containing the service S, then service requester authentication passes through, service S and then generationAnother random number, carries out encrypted signature to another random number and the self-defined numeral, forms feedback information, be sent to clothesBe engaged in requestor;
(3) service requester is received after the feedback information, with the private key of oneself and service S public key to feedback information solutionLabel are close, if feedback information contains the self-defined numeral, service S identity have authenticated, it is achieved thereby that both sides' mutually recognizes each otherCard.
This preferred embodiment devises customized across cloud authentication protocol, realizes two-way between service requester and serviceCertification, improves the security and the efficiency across cloud certification of system.
It is preferred that, the monitoring system 4 that accesses is by access process vector X=(a1、a2、a3) be indicated, a1Represent reportA situation arises for alert information, a2Represent service requester accesses whether meet security strategy, a3Represent running situation;Work as alarmWhen information does not occur, a11 is taken, 0 is otherwise taken;When service requester access meets security strategy, a21 is taken, 0 is otherwise taken;When system fortuneA when row is normal31 is taken, 0 is otherwise taken;Only when X=(1,1,1), monitoring system identification is accessed successfully;Monitoring system 4 is accessed to existRecorded in work to accessing unsuccessful time and number of times, setting time is reached when accessing unsuccessful number of times in setting time sectionNumber, accesses monitoring system 4 and sends warning information.
This preferred embodiment realizes the monitoring to service requester access process, improves the security of system.
In this application scenarios, the self-defined password digit is 7, and certification speed improves 14%, and security is improved8%.
Finally it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention, rather than to present invention guarantorThe limitation of scope is protected, although being explained with reference to preferred embodiment to the present invention, one of ordinary skill in the art shouldWork as understanding, technical scheme can be modified or equivalent substitution, without departing from the reality of technical solution of the present inventionMatter and scope.

Claims (8)

3. a kind of across cloud customer certification system towards mixed cloud according to claim 2, it is characterised in that described privately ownedThe authentication proxy of cloud supports ID authentication mechanism and Certificate Authentication Mechanism, for managing authentication and attribute order in private cloundBoard is signed and issued, and when across cloud authentication module carries out across cloud certification, the log-on message is submitted into mixed cloud Identity Management mouldBlock is managed, and receives the public key certificate that mixed cloud identity management module is signed and issued;The certification for managing the private clound newly addedThe log-on message of agency, including:Audit the log-on message of the authentication proxy of the private clound newly added, receive the private clound newly addedAuthentication proxy log-on message, log-on message is stored in safety database, deletes when private clound exits mixed cloud and exitsThe log-on message of private clound.
8. a kind of across cloud customer certification system towards mixed cloud according to claim 7, it is characterised in that the accessMonitoring system is by access process vector X=(a1、a2、a3) be indicated, a1Represent that a situation arises for warning message, a2Represent serviceWhether requester accesses meet security strategy, a3Represent running situation;When warning message does not occur, a11 is taken, is otherwise taken0;When service requester access meets security strategy, a21 is taken, 0 is otherwise taken;The a when system operation is normal31 is taken, 0 is otherwise taken;OnlyThere is the monitoring system identification when X=(1,1,1) to access successfully;Access monitoring system at work to access unsuccessful time andNumber of times is recorded, and setting number of times is reached when accessing unsuccessful number of times in setting time section, is accessed monitoring system and is sent alarm letterBreath.
CN201710727800.7A2016-08-312017-08-23A kind of across cloud customer certification system towards mixed cloudPendingCN107277079A (en)

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
CN20161079028142016-08-31
CN201610790281.4ACN106375308A (en)2016-08-312016-08-31Hybrid cloud-oriented cross-cloud user authentication system

Publications (1)

Publication NumberPublication Date
CN107277079Atrue CN107277079A (en)2017-10-20

Family

ID=57899722

Family Applications (2)

Application NumberTitlePriority DateFiling Date
CN201610790281.4APendingCN106375308A (en)2016-08-312016-08-31Hybrid cloud-oriented cross-cloud user authentication system
CN201710727800.7APendingCN107277079A (en)2016-08-312017-08-23A kind of across cloud customer certification system towards mixed cloud

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
CN201610790281.4APendingCN106375308A (en)2016-08-312016-08-31Hybrid cloud-oriented cross-cloud user authentication system

Country Status (1)

CountryLink
CN (2)CN106375308A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN109598114A (en)*2018-11-232019-04-09金色熊猫有限公司Cross-platform unification user account management method and system
CN114036480A (en)*2022-01-072022-02-11北京悦游信息技术有限公司Security access control method and system for private application and readable storage medium
CN116015798A (en)*2022-12-152023-04-25南方电网大数据服务有限公司 A virtual cloud platform management system based on hybrid cloud sharing

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN106375308A (en)*2016-08-312017-02-01上海宽惠网络科技有限公司Hybrid cloud-oriented cross-cloud user authentication system
CN107465681B (en)*2017-08-072021-01-26国网上海市电力公司Cloud computing big data privacy protection method
CN108599936A (en)*2018-04-202018-09-28西安电子科技大学A kind of OpenStack increases income the safety certifying method of cloud user
CN109039866A (en)*2018-08-092018-12-18上海织语网络科技有限公司A kind of instant messaging mixing cloud system and its means of communication
CN109413099B (en)*2018-12-042021-06-04北京致远互联软件股份有限公司Certificate-based hybrid cloud encrypted communication method and device and electronic equipment
CN109671005A (en)*2019-01-082019-04-23中金数据(武汉)超算技术有限公司A kind of across government affairs clouds based on safety bridge and public cloud data communications method
CN109922128A (en)*2019-01-082019-06-21中金数据(武汉)超算技术有限公司A kind of data safety exchange method suitable for across cloud service deployment environment
CN112487390B (en)*2020-11-272025-01-17网宿科技股份有限公司Micro-service switching method and system
CN113489695B (en)*2021-06-242023-08-01深圳Tcl新技术有限公司Private cloud networking method, device, system, computer equipment and storage medium
CN115913676B (en)*2022-11-042023-06-02上海申石软件有限公司Access control method and device for cloud native application, electronic equipment and storage medium
CN116032485A (en)*2022-12-152023-04-28南方电网大数据服务有限公司Cross-cloud user authentication system for hybrid cloud
CN116366361A (en)*2023-04-142023-06-30杭州涂鸦信息技术有限公司Data interaction method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20140223507A1 (en)*2013-02-052014-08-07Fortinet, Inc.Cloud-based security policy configuration
CN104113595A (en)*2014-07-092014-10-22武汉邮电科学研究院Mixed cloud storage system and method based on safety grading
CN104246741A (en)*2012-07-312014-12-24惠普发展公司,有限责任合伙企业Orchestrating hybrid cloud services
CN104935606A (en)*2015-07-072015-09-23成都睿峰科技有限公司Terminal login method in cloud computing network
CN106375308A (en)*2016-08-312017-02-01上海宽惠网络科技有限公司Hybrid cloud-oriented cross-cloud user authentication system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN104246741A (en)*2012-07-312014-12-24惠普发展公司,有限责任合伙企业Orchestrating hybrid cloud services
US20140223507A1 (en)*2013-02-052014-08-07Fortinet, Inc.Cloud-based security policy configuration
CN104113595A (en)*2014-07-092014-10-22武汉邮电科学研究院Mixed cloud storage system and method based on safety grading
CN104935606A (en)*2015-07-072015-09-23成都睿峰科技有限公司Terminal login method in cloud computing network
CN106375308A (en)*2016-08-312017-02-01上海宽惠网络科技有限公司Hybrid cloud-oriented cross-cloud user authentication system

Cited By (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN109598114A (en)*2018-11-232019-04-09金色熊猫有限公司Cross-platform unification user account management method and system
CN109598114B (en)*2018-11-232021-07-09金色熊猫有限公司 Cross-platform unified user account management method and system
CN114036480A (en)*2022-01-072022-02-11北京悦游信息技术有限公司Security access control method and system for private application and readable storage medium
CN114036480B (en)*2022-01-072022-04-12北京悦游信息技术有限公司Security access control method and system for private application and readable storage medium
CN116015798A (en)*2022-12-152023-04-25南方电网大数据服务有限公司 A virtual cloud platform management system based on hybrid cloud sharing

Also Published As

Publication numberPublication date
CN106375308A (en)2017-02-01

Similar Documents

PublicationPublication DateTitle
CN107277079A (en)A kind of across cloud customer certification system towards mixed cloud
CN101547095B (en)Application service management system and management method based on digital certificate
CN103856477B (en)A kind of credible accounting system and corresponding authentication method and equipment
CN107231331B (en) Implementation method and device for obtaining and issuing electronic certificates
CN103327084B (en)The cloud storage system of a kind of public and private mixed distribution formula and cloud storage method
JP2021536698A (en) Method and device for managing user identification authentication data
CN110213246A (en) A wide-area multi-factor authentication system
US20010020228A1 (en)Umethod, system and program for managing relationships among entities to exchange encryption keys for use in providing access and authorization to resources
CN108235805A (en)Account unifying method and device and storage medium
CN109067801A (en)A kind of identity identifying method, identification authentication system and computer-readable medium
CN114666168B (en)Decentralized identity certificate verification method and device, and electronic equipment
CN112613006B (en)Power data sharing method and device, electronic equipment and storage medium
CN101409621B (en)Multipart identification authentication method and system base on equipment
CN109981287A (en)A kind of code signature method and its storage medium
CN101540757A (en)Method and system for identifying network and identification equipment
US20170104748A1 (en)System and method for managing network access with a certificate having soft expiration
CN101677272A (en)Center apparatus, terminal apparatus, and authentication system
CN101547097B (en)Digital media management system and management method based on digital certificate
CN106339597A (en)Intelligent medical remote monitor system based on cloud computing
CN108400962A (en)A kind of Authentication and Key Agreement method under multiserver framework
CN101547096A (en)Net-meeting system and management method thereof based on digital certificate
CN114079645A (en) Method and device for registering services
CN101345723A (en) Management authentication method and authentication system of customer gateway
CN106331136A (en)Health record information processing system
CN114495352A (en)Electronic fund payment system and method based on payment terminal identity authentication control mechanism

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
WD01Invention patent application deemed withdrawn after publication

Application publication date:20171020

WD01Invention patent application deemed withdrawn after publication

[8]ページ先頭

©2009-2025 Movatter.jp