CN103532956A - Biological information-based authentication method in cloud operation system - Google Patents

Biological information-based authentication method in cloud operation system Download PDF

Info

Publication number
CN103532956A
CN103532956A CN201310489685.6A CN201310489685A CN103532956A CN 103532956 A CN103532956 A CN 103532956A CN 201310489685 A CN201310489685 A CN 201310489685A CN 103532956 A CN103532956 A CN 103532956A
Authority
CN
China
Prior art keywords
operating system
cloud computing
user
authentication
computing operating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310489685.6A
Other languages
Chinese (zh)
Inventor
刘俊朋
张东
刘正伟
郭锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Electronic Information Industry Co Ltd
Original Assignee
Inspur Electronic Information Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Electronic Information Industry Co Ltd filed Critical Inspur Electronic Information Industry Co Ltd
Priority to CN201310489685.6A priority Critical patent/CN103532956A/en
Publication of CN103532956A publication Critical patent/CN103532956A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention provides a biological information-based authentication method in a cloud operation system. Biological information is used for performing identification authentication, the safety of the cloud operation system is ensured, the cloud operation system is prevented from being subjected to hostile attack, the key is that in the cloud operation system, when an attribute certificate is used for authority authentication, a biological certificate related to the attribute certificate is found firstly, then the biological certificate is used for identification authentication, and the attribute certificate is used for performing authority authentication after the authentication is passed. By applying the biological information-based authentication method in the cloud operation system, effective combination between the biological authentication and the authority authentication in the cloud operation system is realized, and the authority authentication is enabled to accurately correspond to the individual identification authentication, so the authentication management is realized.

Description

Authentication method based on biological information in a kind of cloud operating system
Technical field
The present invention relates to cloud computing security fields, be specifically related to the authentication method based on biological information in a kind of cloud operating system.
Technical background
At present, cloud computing becomes one of the most popular technology of IT field.The safety problem of cloud computing has occupied the people's sight line for a long time always, and industry generally classifies safety issue as the maximum query of user to cloud computing as.Safety issue under cloud computing environment, relates to the public credibility of cloud computing service provider, the protective capacities of cloud computing data center and cloud security.
Industry is divided into basic platform by cloud computing, service platform and application platform.The position of cloud operating system in basic platform, study its fail safe also tool be of great significance.Langchao Co., Ltd. is devoted to the research and development of cloud computing operating system.
In modern authentication research, personal information is summarized as three levels: knowledge sign, article mark, biological information.Authentication application generally only rests on second level at present, such as user cipher, dynamic password.Recognition technology based on biological information feature is just becoming a development field and research direction.Biological information identification Certificate Authority process generally comprises four basic out processes, is respectively collection, decoding, contrast and coupling.Before authentication, first need biological information to sample, extract its unique feature and convert characteristic template to and save.In the process of authentication, the people who authenticates contrasts and mates with the data template of original preservation at acquisition terminal input personal biological information, thereby whether determines authentication success.Biological information recognition technology mainly contains two classes at present, and one is based on physiological characteristic, and the 2nd, based on behavioural characteristic.Recognition technology based on physiological characteristic comprises fingerprint recognition, iris identification, recognition of face, the identification of palm shape etc.Recognition technology based on behavioural characteristic comprises signature identification, base key identification, voice identification etc.
The identity authorization system of cloud computing operating system, in conjunction with traditional authentication method and advanced biological information recognition technology, will be strengthened the fail safe of cloud operating system.
Summary of the invention
the object of this invention is to provideauthentication method based on biological information in a kind of cloud computing operating system.
The object of the invention is to realize in the following manner, use biological information to carry out authentication, the safety of protection cloud operating system, avoid cloud operating system to suffer malicious attack, concrete steps are: when in cloud computing operating system, use attribute certificate carries out purview certification, the creature certificate that first will find this Attribute certificate to be associated, then apply its creature certificate and first carry out authentication, authentication by after again apply property certificate carry out purview certification, by effective combination of biological identification and purview certification in cloud operating system, guarantee the accurate correspondence of purview certification and personal identification, thereby realize rights management, wherein:
Authentication authorization method step based on fingerprint is as follows:
1) cloud computing operating system gathers user's finger print information, is kept in the database of self;
2) user, when login cloud computing operating system, by finger print information gatherer, inputs individual fingerprint;
3) cloud computing operating system mates the fingerprint of user's input with the fingerprint in fingerprint base, when the match is successful, and user's authentication success;
4), after user's authentication success, cloud computing operating system is given the authority of response according to user's biological attribute information;
5) user successfully logins cloud computing operating system, the resource in operation cloud computing system;
Based on signature authentication authorization method step as follows:
1) cloud computing operating system gathers user's signing messages, is kept in the database of self;
2) user, when login cloud computing operating system, by signing messages gatherer, inputs idiograph;
3) cloud computing operating system mates the signature of user's input with the signature in signature storehouse, when the match is successful, and user's authentication success;
4), after user's authentication success, cloud computing operating system is given the authority of response according to user's biological attribute information;
5) user successfully logins cloud computing operating system, the resource in operation cloud computing system.
Accompanying drawing explanation
Fig. 1 is the structural representation of cloud computing operating system based on biometric information authentication module;
Fig. 2 is authentication and the mandate execution mode flow chart of cloud computing operating system based on fingerprint;
The authentication that Fig. 3 is cloud computing operating system based on signature and the execution mode flow chart of mandate.
execution mode
With reference to the accompanying drawings 2, content of the present invention is described to the process that realizes this method with an instantiation.Authentication authorization method step based on fingerprint is as follows:
1) cloud computing operating system gathers user's finger print information, is kept in the database of self;
2) user, when login cloud computing operating system, by finger print information gatherer, inputs individual fingerprint;
3) cloud computing operating system mates the fingerprint of user's input with the fingerprint in fingerprint base, when the match is successful, and user's authentication success;
4), after user's authentication success, cloud computing operating system is given the authority of response according to user's biological attribute information;
5) user successfully logins cloud computing operating system, the resource in operation cloud computing system.
With reference to the accompanying drawings 3, content of the present invention is described to the process that realizes this method with an instantiation.Based on signature authentication authorization method step as follows:
1) cloud computing operating system gathers user's signing messages, is kept in the database of self;
2) user, when login cloud computing operating system, by signing messages gatherer, inputs idiograph;
3) cloud computing operating system mates the signature of user's input with the signature in signature storehouse, when the match is successful, and user's authentication success;
4), after user's authentication success, cloud computing operating system is given the authority of response according to user's biological attribute information;
5) user successfully logins cloud computing operating system, the resource in operation cloud computing system.

Claims (1)

1. the authentication method based on biological information in a cloud computing operating system, it is characterized in that using biological information to carry out authentication, the safety of protection cloud operating system, avoid cloud operating system to suffer malicious attack, concrete steps are: when in cloud computing operating system, use attribute certificate carries out purview certification, the creature certificate that first will find this Attribute certificate to be associated, then apply its creature certificate and first carry out authentication, authentication by after again apply property certificate carry out purview certification, by effective combination of biological identification and purview certification in cloud operating system, guarantee the accurate correspondence of purview certification and personal identification, thereby realize rights management, wherein:
Authentication authorization method step based on fingerprint is as follows:
1) cloud computing operating system gathers user's finger print information, is kept in the database of self;
2) user, when login cloud computing operating system, by finger print information gatherer, inputs individual fingerprint;
3) cloud computing operating system mates the fingerprint of user's input with the fingerprint in fingerprint base, when the match is successful, and user's authentication success;
4), after user's authentication success, cloud computing operating system is given the authority of response according to user's biological attribute information;
5) user successfully logins cloud computing operating system, the resource in operation cloud computing system;
Based on signature authentication authorization method step as follows:
1) cloud computing operating system gathers user's signing messages, is kept in the database of self;
2) user, when login cloud computing operating system, by signing messages gatherer, inputs idiograph;
3) cloud computing operating system mates the signature of user's input with the signature in signature storehouse, when the match is successful, and user's authentication success;
4), after user's authentication success, cloud computing operating system is given the authority of response according to user's biological attribute information;
5) user successfully logins cloud computing operating system, the resource in operation cloud computing system.
CN201310489685.6A 2013-10-18 2013-10-18 Biological information-based authentication method in cloud operation system Pending CN103532956A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310489685.6A CN103532956A (en) 2013-10-18 2013-10-18 Biological information-based authentication method in cloud operation system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310489685.6A CN103532956A (en) 2013-10-18 2013-10-18 Biological information-based authentication method in cloud operation system

Publications (1)

Publication Number Publication Date
CN103532956A true CN103532956A (en) 2014-01-22

Family

ID=49934635

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310489685.6A Pending CN103532956A (en) 2013-10-18 2013-10-18 Biological information-based authentication method in cloud operation system

Country Status (1)

Country Link
CN (1) CN103532956A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104317362A (en) * 2014-10-27 2015-01-28 北京同方时讯电子股份有限公司 Tablet personal computer with high data security
CN105227324A (en) * 2015-11-03 2016-01-06 浪潮(北京)电子信息产业有限公司 The method of a kind of cloud platform user authentication and device
CN105357197A (en) * 2015-11-03 2016-02-24 浪潮集团有限公司 Identity authentication and authority management system and method for cloud computing platform
CN105550562A (en) * 2015-12-31 2016-05-04 北京无线电计量测试研究所 Iris recognition based identity authentication information management system and method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101256608A (en) * 2008-03-25 2008-09-03 北京飞天诚信科技有限公司 Safe operation method and system
CN102110195A (en) * 2009-12-25 2011-06-29 中国长城计算机深圳股份有限公司 Computer system and identification method and device for user
US20110264919A1 (en) * 2010-02-17 2011-10-27 Ceelox, Inc. Dynamic seed and key generation from biometric indicia
US8200980B1 (en) * 2001-09-21 2012-06-12 Open Invention Network, Llc System and method for enrolling in a biometric system
CN102664885A (en) * 2012-04-18 2012-09-12 南京邮电大学 Identity authentication method based on biological feature encryption and homomorphic algorithm
CN103237030A (en) * 2013-04-25 2013-08-07 深圳市中兴移动通信有限公司 Biological recognition-based user authentication method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8200980B1 (en) * 2001-09-21 2012-06-12 Open Invention Network, Llc System and method for enrolling in a biometric system
CN101256608A (en) * 2008-03-25 2008-09-03 北京飞天诚信科技有限公司 Safe operation method and system
CN102110195A (en) * 2009-12-25 2011-06-29 中国长城计算机深圳股份有限公司 Computer system and identification method and device for user
US20110264919A1 (en) * 2010-02-17 2011-10-27 Ceelox, Inc. Dynamic seed and key generation from biometric indicia
CN102664885A (en) * 2012-04-18 2012-09-12 南京邮电大学 Identity authentication method based on biological feature encryption and homomorphic algorithm
CN103237030A (en) * 2013-04-25 2013-08-07 深圳市中兴移动通信有限公司 Biological recognition-based user authentication method and system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104317362A (en) * 2014-10-27 2015-01-28 北京同方时讯电子股份有限公司 Tablet personal computer with high data security
CN105227324A (en) * 2015-11-03 2016-01-06 浪潮(北京)电子信息产业有限公司 The method of a kind of cloud platform user authentication and device
CN105357197A (en) * 2015-11-03 2016-02-24 浪潮集团有限公司 Identity authentication and authority management system and method for cloud computing platform
CN105227324B (en) * 2015-11-03 2018-07-24 浪潮(北京)电子信息产业有限公司 A kind of method and device of cloud platform authenticating user identification
CN105550562A (en) * 2015-12-31 2016-05-04 北京无线电计量测试研究所 Iris recognition based identity authentication information management system and method
CN105550562B (en) * 2015-12-31 2018-05-15 北京无线电计量测试研究所 A kind of information management system and method based on iris recognition identification certification

Similar Documents

Publication Publication Date Title
CN105429761B (en) A kind of key generation method and device
US9122913B2 (en) Method for logging a user in to a mobile device
CN103607282B (en) A kind of identity fusion authentication method based on biological characteristic
CN102625303A (en) A method for WFII/3G router access authentication by using fingerprint
US9288669B2 (en) Mobile touch authentication refresh
WO2014039732A3 (en) Biometric authentication in connection with camera-equipped devices
CN113452678A (en) Login information input method, login information storage method and related device
CN104158664A (en) Identity authentication method and system
CN103607387A (en) A network login authentication cloud service system based on face identification and a method
CN102223233A (en) Biological code authentication system and biological code authentication method
CN103297392A (en) Fingerprint identity authentication system and authentication method
CN103532956A (en) Biological information-based authentication method in cloud operation system
CN102456102A (en) Method for carrying out identity recertification on particular operation of information system by using Usb key technology
CN104038509A (en) Fingerprint authentication cloud system
CN104009973A (en) Fingerprint detail information hiding and recovering method based on set polynomial conversion and harmonics
US20190108328A1 (en) Method and system for secure password storage
CN202372990U (en) USB (Universal Serial Bus) key with fingerprint identifying function
Lee et al. An fingerprint authentication model of ERM system using private key escrow management server
CN115967581A (en) Login verification method and device, electronic equipment and storage medium
CN203243360U (en) Identity registration system
CN102194067A (en) Method for signing electronic document with fingerprint based on Internet
CN202535370U (en) Cloud terminal user identification device
CN103400435A (en) Fingerprint recognition access control system
Obed-Emeribe Multimodal biometric technology system framework and e-commerce in Emerging Markets
CN202563514U (en) Mobile electronic equipment with multimedia authentication encryption protection function

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20140122