Check patentability & draft patents in minutes with Patsnap Eureka AI!

cpk-based linux operating system login authentication method, equipment, terminal and server

A login authentication and operating system technology, applied in transmission systems, digital transmission systems, user identity/authority verification, etc., to improve login security

Active Publication Date: 2021-02-23
JIN SHANG BO CHUANG BEIJING SCI & TECH CO LTD
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the embodiment of the present invention is to provide a CPK-based Linux operating system login authentication method, device, terminal and server, which solves the problem in the prior art of obtaining the operating system password through network attacks and thus obtaining access control rights. The technology realizes the login security authentication of the Linux operating system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • cpk-based linux operating system login authentication method, equipment, terminal and server
  • cpk-based linux operating system login authentication method, equipment, terminal and server
  • cpk-based linux operating system login authentication method, equipment, terminal and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] figure 2 It is a schematic flowchart of a CPK-based login authentication method for a Linux operating system provided by an embodiment of the present invention. like figure 2 As shown, the method is applied to a terminal, and the method includes the following steps:

[0038] Step 201, obtaining the user ID to be authenticated of the CPK key device, and sending the user ID to be authenticated to the Linux server;

[0039] Step 202, obtaining the password of the CPK key device, and sending the password and the waiting time of the terminal to be signed to the CPK key device;

[0040] Step 203: Receive the signature information sent by the CPK key device, and send the signature information to the Linux server, so that the Linux server can perform login authentication through the signature information, and the signature information includes the The digital signature of the terminal's pending signing time and the user identification corresponding to the CPK key device. ...

Embodiment 2

[0046] image 3 It is a schematic flowchart of a CPK-based login authentication method for a Linux operating system provided by an embodiment of the present invention. like image 3 As shown, the method is applied to a CPK key device, and the method includes the following steps:

[0047] Step 301, receiving the password of the CPK key device sent by the terminal and the time to be signed by the terminal;

[0048] Step 302, verifying whether the password is correct;

[0049] Step 303, when verifying that the password is correct, use the preset private key to digitally sign the time to be signed by the terminal, obtain signature information and send the signature information to the terminal, so that the terminal will The signature information is sent to the Linux server for login authentication.

[0050] Wherein, when the password is verified incorrectly, a password verification error notification is sent to the terminal.

[0051] In addition, the CPK key device stores the ...

Embodiment 3

[0055] Figure 4 It is a schematic flowchart of a CPK-based login authentication method for a Linux operating system provided by an embodiment of the present invention. like Figure 4 Shown, described method is applied to Linux server, and described method comprises the steps:

[0056] Step 401, receiving the user identifier to be authenticated sent by the terminal, and determining whether the user identifier to be authenticated exists in the legal user information of the Linux operating system;

[0057] Step 402: After determining that the user ID to be authenticated exists in the legal user information of the Linux operating system, receive the signature information sent by the terminal, and perform login authentication according to the signature information, the signature information includes The digital signature of the terminal's pending signature time and the user ID corresponding to the CPK key device.

[0058] Wherein, after determining that the user ID to be authen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present invention provides a CPK-based Linux operating system login authentication method, equipment, terminal and server, which belong to the technical field of computer and information security, and solve the problem in the prior art that the network attacks the Linux operating system to obtain access control rights. The method comprises obtaining the user identification to be authenticated of the CPK key device, and sending the user identification to be authenticated to the Linux server; obtaining the password of the CPK key device, and sending the password and the terminal signature time to The CPK key device; receiving the signature information sent by the CPK key device, and sending the signature information to the Linux server, so that the Linux server performs login authentication through the signature information, and the signature information Include the digital signature of the waiting time of the terminal and the user identification corresponding to the CPK key device. The embodiment of the present invention is applicable to the authentication process of logging into the Linux operating system.

Description

technical field [0001] The invention relates to the technical field of computer and information security, in particular to a CPK-based Linux operating system login authentication method, equipment, terminal and server. Background technique [0002] With the development of computer and network applications, a large number of Linux servers are deployed. The daily maintenance and management of the Linux server requires the administrator to log in to the Linux operating system. In the traditional way, the administrator uses the user name and password as the user credentials for logging in. This method has many security risks, such as simple passwords are easy to be attacked, passwords are easy to leak, passwords cannot really confirm the user's identity, and passwords are too complicated and difficult to remember . [0003] Moreover, most modern network attacks illegally obtain access control rights of the operating system by means of guessing passwords, cracking passwords vio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3226H04L9/3247H04L63/0815H04L63/0853H04L63/10
Inventor 李维刚
Owner JIN SHANG BO CHUANG BEIJING SCI & TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More