External equipment authentication management method, device and electronic equipment

A technology of external equipment and electronic equipment, applied in the direction of digital data authentication, etc., can solve the problems of low reliability, vulnerability to attack or tampering, loss of device list, etc., to improve security and reliability, and not easy to attack or tamper with , the effect of high reliability

Active Publication Date: 2016-07-13
LENOVO SHANGHAI INFORMATION TECH CO LTD
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The device list is saved in the local disk, which is vulnerable to attack or tampering, and the security is not high; and after reinstalling the system, the device list may be lost, and the completed external device authentication will be invalid, so the reliability is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • External equipment authentication management method, device and electronic equipment
  • External equipment authentication management method, device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0021] An embodiment of the present invention provides an external device authentication management method, which is applied to a first electronic device, such as figure 1 As shown, the method includes:

[0022] S11. After the first electronic device is started, it enters the first system, and when the first system detects that an external device is connected to the first electronic device, it obtains the unique identification code of the external device, and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention embodiment provides an external equipment authentication management method, a device and electronic equipment, and relates to the equipment authentication technical field, thus solving the problems in the prior art that external equipment authentication is not high in security and reliability; the method is applied to the first electronic equipment, and comprises the following steps: entering the first system when the first electronic equipment starts, when the first system detects the external equipment is connected with the first electronic equipment, obtaining the unique identification code of the external equipment and storing the code into an equipment list of the first system; entering the second system, when the second system inner nuclear layer detects the external equipment is connected with the first electronic equipment, obtaining the unique identification code of the external equipment and sending the unique identification code to the first system; using the first system to couple the external equipment unique identification code in the equipment list, and sending the coupling result to the second system inner nuclear layer; the second system inner nuclear layer carries out corresponding operations on the external equipment according to the coupling result. The method, device and electronic equipment are suitable for Linux system equipment to carry out authentication for external equipment.

Description

technical field [0001] The invention relates to the technical field of equipment authentication, in particular to an external equipment authentication management method, device and electronic equipment. Background technique [0002] At this stage, external devices are rapidly gaining popularity due to their advantages such as flexible use and easy portability. While external devices bring convenience to use, there are also security risks such as leakage of confidential information and Trojan horse virus transmission, which may cause extremely serious consequences and harm. In order to standardize the management and use of external devices within enterprises, it is necessary to carry out authentication management on external devices. [0003] Take the storage device as an example. At present, the authentication management of the storage device is usually implemented at the user layer. After the storage device is connected, the user layer application program obtains the UID (...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/44
Inventor 吴德天李小丁
Owner LENOVO SHANGHAI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products