Security certification method and device
A technology for security authentication and security conditions, applied in the field of security authentication methods and devices, can solve problems such as flexibility restrictions, and achieve the effect of improving security performance and reducing the probability of leaking secrets
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0033] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
[0034] figure 1 It is a schematic flowchart of an embodiment of the security authentication method of the present invention.
[0035] The full authentication method provided by the present invention needs to keep an authentication record table in the security device in advance, and the authentication record information of successfully executed external authentication can be written into the authentication record table. If the external authentication fails or the external authentication is canceled, the corresponding authentication record information is deleted. The security device here can specifically be the EsecuCOS intelligent operating system.
[0036] The specific steps are as follows:
[0037] Step S101, receiving an operation instruction, and obtaining safety conditions that need to be satisfied by the opera...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 