Check patentability & draft patents in minutes with Patsnap Eureka AI!

Operating system login authentication method and system based on trusted platform

An operating system and login authentication technology, applied in the field of information security, can solve problems such as simple passwords for confirming user identities, unsafe one-way authentication, etc., and achieve the effect of improving security

Active Publication Date: 2017-07-21
SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD
View PDF10 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Both have the unsafe factors of simple password and one-way authentication for confirming user identity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Operating system login authentication method and system based on trusted platform
  • Operating system login authentication method and system based on trusted platform
  • Operating system login authentication method and system based on trusted platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0035] figure 1 A flow chart of registration management processing according to an embodiment of the present invention is shown, and the process starts at block S101. In block S101, on the computer to bind the USBKey and the TCM of the trusted platform, the user first inputs the account information (for example, user name, password, etc.) of the operating system, and then enters the new PIN code, the old PIN code (other The purpose is to prevent malicious registration), and an initialized USBKey is connected to the computer terminal, and the process proceeds to block S102. In block S102, it is judged whether the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an operating system login authentication method based on a trusted platform. The method comprises the steps of registering for a USB key and binding the USB key and a TCM (Trusted Cryptography Module) of the trusted platform; carrying out bidirectional authentication between the USB key and the TCM, thereby logging in an operating system; and monitoring whether the USB key exists or not in real time. The invention also provides an operating system login authentication system based on the trusted platform. The method and the system are characterized in bidirectional authentication and high security.

Description

technical field [0001] The present invention relates to the technical field of information security, and more particularly relates to an operating system login authentication method and system based on a trusted platform. Background technique [0002] With the improvement of the hardware performance of domestic processors, the country pays more and more attention to the development of independent and controllable domestic computers. In terms of hardware, my country currently has a variety of self-developed CPUs (Central Processing Units) (for example, Godson, Phytium, Shenwei), and also has the core technology and mature technology for developing corresponding motherboards, as well as TCM (Trusted Processing Unit) Cryptography Module (trusted cryptographic module) is a core national security trusted component. In addition, other components of some computers (such as memory, hard disk) have already been localized. In terms of software, there is a self-developed BIOS (Basic I...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/0853H04L63/0869
Inventor 冯磊王晓明朱书杉
Owner SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More