Method and device for identity verification and authority management

An identity verification and identity technology, applied in the field of identity authentication and authority control of computer system operators and maintenance personnel, to achieve the effect of security protection

Active Publication Date: 2014-07-23
ZHEJIANG ANKE NETWORK TECH
View PDF5 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] 1. The identity authentication between the user and the host requires the user to perform identity authentication through the client software of the host on the host. For illegal users who can operate the host throu

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for identity verification and authority management
  • Method and device for identity verification and authority management
  • Method and device for identity verification and authority management

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0034] First, register the identity verification device in the invention on the acquisition and control device management software module on the security protection and safety audit server of the invention, and register using the MAC address of the identity verification device;

[0035] The user presses the identity verification device in the invention figure 1 After the connection mode is connected, the device is turned on, and the device authenticates to the security protection and security audit server through the network. After the authentication is passed, the device enters the working state of identity information collection and control;

[0036] Register users through the user management software module on the security protection and security audit server in this invention, including distributing ID cards, collect...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and device for identity verification and authority management, and relates to computer software, hardware and the network communication technology. Identity verification and a host which needs to be entered are separated, an IC card, or an RFID card, or an identity card, or a fingerprint identifier, or a cipherer or other identity identification means can be used, keyboard and mouse operation authorities are given to legal users according to flexible authority configuration, identities are recorded, and logs are checked. The identity verification and authority control device is independent, a computer can be more effectively prevented from being used illegally, and the requirement for operation and maintenance staff safety management and checking of a DCS production control system of important core enterprises like power generation enterprises and the state grid corporation of China and the industry field of petrochemical engineering and the like is met.

Description

technical field [0001] The invention relates to computer software, hardware and network communication technology, and provides a method and equipment for identity authentication and authority control of computer system operation and maintenance personnel. Background technique [0002] For large core enterprises such as banks, power stations, petrochemical and military enterprises, the identity authentication system plays a vital role in ensuring the safe operation of the internal business and production systems of the enterprise. [0003] Authentication is the process of confirming the identity of an operator in a computer network. Identity authentication can be divided into the authentication between the user and the host and the authentication between the host and the host. The authentication between the user and the host can be based on one or more of the following factors: things known to the user, such as passwords, passwords, etc.; things owned by the user, such as se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/32G06F21/34H04L9/32
CPCG06F21/32G06F21/34
Inventor 郁东明
Owner ZHEJIANG ANKE NETWORK TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products