Computer user terminal authentication method

An authentication method and user terminal technology, applied in the field of computer user terminal authentication, can solve the problems of computer security threats, security needs to be further improved, etc., and achieve the effect of improving security

Inactive Publication Date: 2011-04-27
SUN YAT SEN UNIV
View PDF1 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of technology, computers have more and more important functions, but at present, the security of computers is also under more and more threats. Now the most common viruses, worms and unauthorized behaviors have become the highest threat to enterprise and personal information security. Two, although a lot of money is invested in computer security, its security still needs to be further improved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0014] A method for authenticating a computer user terminal, the method comprising the following steps: A. After the computer is turned on, search for surrounding Bluetooth devices through a Bluetooth receiving device; B. If the Bluetooth device is found, the address of the Bluetooth device is compared with the address stored in the computer. If the information matches, the computer works normally; if the Bluetooth device cannot be found, or the address information of the searched Bluetooth device is inconsistent with the address information stored in the computer, the computer will not process the received control signal.

[0015] Among them, since the Bluetooth search will last for 5 to 10 seconds, especially when the user turns on the Bluetooth authentication mode, the computer program will continuously detect the surrounding Bluetooth devices, which...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a computer user terminal authentication method, comprising the steps of: A, searching ambient Bluetooth equipment by using a Bluetooth receiving device after a computer is started; and B, if the Bluetooth equipment is searched, comparing the address of the Bluetooth equipment with address information stored in the computer, if the address and the address information are the same, keeping the computer work normally; and if the Bluetooth equipment cannot be searched, or the address information of the searched Bluetooth equipment is inconsistent to the address information stored in the computer, enabling the computer not to process the received control signals. The method can further improve the computer safety.

Description

technical field [0001] The invention belongs to the field of computer security and relates to a computer user terminal authentication method. Background technique [0002] With the development of technology, computers have more and more important functions, but at present, the security of computers is also under more and more threats. Now the most common viruses, worms and unauthorized behaviors have become the highest threat to enterprise and personal information security. Two, although a lot of money is invested in computer security, its security still needs to be further improved. Contents of the invention [0003] The purpose of the present invention is to overcome the defects of the prior art and provide a computer user terminal authentication method, which can further improve the security of the computer. [0004] Its technical scheme is as follows. [0005] A method for authenticating a computer user terminal, the method comprising the following steps: A. After th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/20G06F21/57G06F21/71
Inventor 姚建帆姚良超李锦标
Owner SUN YAT SEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products