Identity authentication method and system for linux operating system

An operating system and identity authentication technology, applied in the identity authentication method and system field of the Linux operating system, can solve problems such as low security and fixed password breach, and achieve the effect of strengthening identity authentication security and improving identity authentication security.

Inactive Publication Date: 2016-01-27
INSPUR BEIJING ELECTRONICS INFORMATION IND
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the identity authentication method of existing linux operating system, usually adopt the mode of user account number and fixed password to carry out identity authentication, but, single fixed password is easy to be cracked by criminals, and security is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and system for linux operating system
  • Identity authentication method and system for linux operating system
  • Identity authentication method and system for linux operating system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0034] The core of the present invention is to provide an identity authentication method and system of a linux operating system, so as to realize the purpose of improving the security of identity authentication.

[0035] In order to enable those skilled in the art to better understand the solution of the present invention, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication method and an identity authentication system for a linux operating system. The linux operating system generates and sends an identity authentication request including a dynamic password and a user account which are input when a user logs in; an authentication server receives the identity authentication request, and verifies the dynamic password of the user account; an authentication result indicating that the authentication is successful is sent to the linux operating system when the dynamic password is successfully verified; and the linux operating system receives the authentication result indicating that the authentication is successful, and executes related operations such as successful login. The identity authentication method and the identity authentication system effectively utilize the one-time pad feature of the dynamic password, enhance identity authentication security of the linux operating system, and achieve the purpose of improving identity authentication security.

Description

technical field [0001] The invention relates to the technical field of identity security authentication, in particular to an identity authentication method and system of a linux operating system. Background technique [0002] Today, identity authentication technology is an important aspect of information security theory and technology. It is the first line of defense for system security, used to restrict illegal users from accessing restricted system resources, and is the basis of all security mechanisms. This makes it a prime target for hackers. Therefore, using a strong and effective identity authentication system has extraordinary significance for network security. [0003] In the existing identity authentication methods of the linux operating system, user accounts and fixed passwords are usually used for identity authentication. However, a single fixed password is easily broken by criminals and has low security. [0004] Based on this, there is an urgent need for a new...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0838H04L63/08H04L63/083H04L63/0876
Inventor 史书伟
Owner INSPUR BEIJING ELECTRONICS INFORMATION IND
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products