Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System and realization method for trusted authentication of user login in operating system

A technology of operating system and implementation method, which is applied in the field of computer security, can solve problems such as insecurity, and achieve the effects of secure two-way authentication, reasonable design, and convenient use

Active Publication Date: 2016-11-16
SHANDONG INSPUR SCI RES INST CO LTD
View PDF7 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The technical task of the present invention is to address the above deficiencies, to provide a system and implementation method for operating system user login trusted authentication, to solve the problem that traditional mainstream operating systems use simple passwords to confirm user identities under the operating system. safety factor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and realization method for trusted authentication of user login in operating system
  • System and realization method for trusted authentication of user login in operating system
  • System and realization method for trusted authentication of user login in operating system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] as attached figure 1 As shown, the operating system user login trusted authentication system of the present invention, its structure includes USBkey and trusted hardware, the USBkey is connected to the trusted hardware through the USB interface, and the USBkey is used to connect to the server through the USB interface to complete the two-way communication between the operating system and the user Authentication; trusted hardware is used to store user identity information and private information related to keys. The trusted hardware includes a trusted module, and the trusted module includes a symmetric cryptographic algorithm engine, an asymmetric cryptographic algorithm engine, a random number generator, a measurement algorithm engine, an execution unit, a non-volatile storage unit, a volatile storage unit, and a trusted interface unit.

Embodiment 2

[0037] as attached figure 2 and 3 As shown, the implementation method of the operating system user login trusted authentication of the present invention, the implementation method is to store the user's identity information and related key information in the trusted hardware, the trusted hardware is connected to the USB key through the USB interface, and the USB key is connected to the USB key through the USB interface. The interface is plugged into the server, and the dynamic password technology is used to realize the two-way authentication between the user and the operating system.

[0038] The process of two-way authentication between the user and the operating system includes the following steps:

[0039](1) When the user logs in to the server operating system, plug the USB key into the server through the USB interface;

[0040] (2) The user enters the PIN code to start the two-way authentication process between the trusted hardware and the USBkey;

[0041] (3) The ope...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a system and realization method for trusted authentication of user login in an operating system, pertaining to the computer security field. The technical problem to be solved is that a host of insecurity factors are caused by the method of utilizing simple passwords to verity users' identities by a traditional mainstream operation system. The adopted technical scheme is characterized in that the system comprises a USBkey and trusted hardware. The USBkey is connected with the trusted hardware through a USBkey interface and used for connecting with a server through the USBkey interface so that mutual authentication between the operation system and a user is achieved. The trusted hardware is used for storing information on users' identities and private information on related keys. The invention further comprises the operation system and the realization method for mutual authentication.

Description

technical field [0001] The invention relates to the field of computer security, in particular to a system and a realization method for trustworthy authentication of operating system user login. Background technique [0002] (1) User login authentication [0003] For the access control model in the operating system, user login identity authentication is still the most important first checkpoint. Before using the operating system, the user must first be identified by the identity authentication system, and the monitor can determine whether the user can access a certain resource according to the user's identity and authorization database. Among them, user login identity authentication plays an extremely important role in the operating system. Once the identity is breached, all security measures of the operating system will be useless. At present, there are mainly two ways of user login, one is local login; the other is remote login. Regardless of the type, the main purpose o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/34G06F21/44G06F21/62
CPCG06F21/34G06F21/44G06F21/6209
Inventor 张卫品戴鸿君于治楼
Owner SHANDONG INSPUR SCI RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products