USB identity authentication scheme based on cloud computing
Source: Internet
Author: User
KeywordsCloud computing USB
USB identity authentication scheme based on cloud computing
Shuai is always facing steady Wei Yanfen
A USB key identity authentication scheme based on cloud computing is proposed, which is mainly used to solve the security problems in traditional authentication technology. Using USB key identity authentication technology to log in to cloud Terminal to obtain cloud service can improve the security of user authentication of cloud server. The scheme is mainly discussed in two aspects: a cloud server How to obtain the Cloud Terminal USB key Digital certificate authentication, so as to ensure the security of the cloud computing environment; b. How to authenticate the end-user when acquiring the application service, thereby improving the security of the application service. Through security analysis, the scheme can effectively resist the internal attack risk of cloud computing, the risk of account and service attack and the risk of virtualization technology.
USB identity authentication scheme based on cloud computing
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.