Supercharge Your Innovation With Domain-Expert AI Agents!

KEY authentication method and system based on domestic CPU, operating system and database

An operating system and database technology, applied in the field of identity authentication, can solve problems such as difficult technical implementation, poor practicability, and slow response speed, and achieve stable system login solutions, good versatility and compatibility, and improved security Effect

Inactive Publication Date: 2019-09-27
SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are many security risks in the username / password authentication method (such as password leakage, etc.); the biometric authentication method has a very broad prospect, but the technical implementation is difficult, the cost is high, the response speed is slow, and the practicability is not strong

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • KEY authentication method and system based on domestic CPU, operating system and database
  • KEY authentication method and system based on domestic CPU, operating system and database

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work belong to the protection of the present invention. scope.

[0052] When using KEY for identity authentication, it is very convenient to connect the KEY to the USB interface of the user's computer and input the PIN code to complete the authentication. The KEY authentication method realizes two-factor authentication, that is, the user must have a KEY and know its PIN code to complete identity authentication. In t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a KEY authentication method and system based on a domestic CPU, an operating system and a database, belonging to the identity authentication technology field, the method includes a KEY interaction program running on a host based on a domestic CPU and an OS, an application system Web front end, an application system service program running on a server based on the domestic CPU and the OS, and a KEY authentication service. The KEY user registration and authentication method based on the domestic CPU, operating system and database environment is realized.

Description

technical field [0001] The invention relates to the technical field of identity authentication, in particular to a KEY authentication method and system based on a domestic CPU, an operating system and a database. Background technique [0002] With the strong support of the state, nationally produced software and hardware with independent intellectual property rights have developed rapidly, especially in recent years, many basic software and hardware products with independent intellectual property rights have emerged in our country. High-end general-purpose chips with independent intellectual property rights, such as Loongson, Phytium, and Beidazhi, are developing vigorously, and their technical level has reached the world's advanced level of similar products. [0003] At the same time, the development of domestic basic software products is also thriving. Domestic basic software products such as Shentong database, Dameng database, Dongfangtong middleware, Kingdee middleware, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/44G06F21/45
CPCG06F21/44G06F21/45
Inventor 朱宪董桂森李超
Owner SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More