One-time authentication method and system implemented by utilizing intelligent hardware

A technology of intelligent hardware and authentication method, applied in the information field, which can solve the problems of lack of overall planning and lack of user login platform.

Active Publication Date: 2016-11-16
姚锋
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The cause of the problem is not a mistake in system development,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • One-time authentication method and system implemented by utilizing intelligent hardware
  • One-time authentication method and system implemented by utilizing intelligent hardware
  • One-time authentication method and system implemented by utilizing intelligent hardware

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0048] The following description and drawings illustrate specific embodiments of the invention sufficiently to enable those skilled in the art to practice them. Other embodiments may incorporate structural, logical, electrical, process, and other changes. The examples merely represent possible variations. Individual components and functions are optional unless explicitly required, and the order of operations may vary. Portions and features of some embodiments may be included in or substituted for those of other embodiments. The scope of embodiments of the present invention includes the full scope of the claims, and all available equivalents of the claims. These embodiments of the present invention may be referred to herein, individually or collectively, by the term "invention", which is for convenience only and is not...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a one-time authentication method and system implemented by utilizing intelligent hardware. The method comprises the steps of: establishing complete catalogue information of an organization on one or multiple servers, and making a corresponding security policy; carrying out legal embedded equipment registration, recording and issuing an equipment identifier, and allocating equipment to a specific personnel user; and implementing synchronization of a personal catalogue and a complete catalogue of the equipment, and providing biological identification characteristic information of the user for target equipment so as to carry out identity authentication. According to one-time authentication method and system disclosed by the invention, after passing security verification in one application and when accessing protected resources in other applications, the same user who accesses the protected resources in different applications in the same network by a one-time logging-in technology does not need to be subjected to logging-in verification again.

Description

technical field [0001] The invention belongs to the field of information technology, and in particular relates to a one-time authentication method realized by intelligent hardware and a system thereof. Background technique [0002] Existing primary authentication systems are all realized by software, and these softwares themselves are integrated into the network to run, and share server-side and network communication resources with other application systems that require authentication. The disadvantage is that some software methods have limited application scenarios, for example, various one-time authentication systems based on browsers can only be applied to b / s applications; some software methods have compatibility problems, such as agent-based methods Sometimes there is a conflict between the agent program and the application program; what's more, it is very difficult to deploy an authentication system for many computers that have high real-time requirements or cannot be ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3215H04L9/3231H04L9/3234H04L9/3297H04L63/0815H04L63/0853H04L63/0861H04L63/18H04L63/20
Inventor 姚锋詹宇瑶
Owner 姚锋
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products