System security authentication method and device, computing equipment and storage medium
A technology of system security and authentication method, which is applied in the field of system security authentication method, device and computing equipment, and storage medium, and can solve problems such as inability to perform authentication, limitations of security authentication, and high dependence
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0117] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention.
[0118] Those skilled in the art can understand that various aspects of the present application can be implemented as a system, method or program product. Therefore, various aspects of the present application can be specifically implemented in the following forms, that is: a complete hardware implementation, a complete software implementation (including firmware, microcode, etc.), or a combination of hardware and software implementations, which can be collectively referred to herein as "circuit", "module" or "system".
[0119] As described in the background technology, in the related art, the use of USBKey to authenticate the system security requires the hardwa...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


