Unlock instant, AI-driven research and patent intelligence for your innovation.

System security authentication method and device, computing equipment and storage medium

A technology of system security and authentication method, which is applied in the field of system security authentication method, device and computing equipment, and storage medium, and can solve problems such as inability to perform authentication, limitations of security authentication, and high dependence

Active Publication Date: 2020-05-12
NSFOCUS INFORMATION TECHNOLOGY CO LTD +1
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The traditional authentication technology is realized through U-shield (Universal Serial Buskey, USBKey), password, remote authentication and other technical means. USBKey has a certain dependence on hardware, and password is only the user information entered by the user to ensure the safety of the system itself. It cannot play the role of authentication, but remote authentication needs to connect to the cloud server in real time to access the external network for system security authentication, which makes the system security authentication have limitations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System security authentication method and device, computing equipment and storage medium
  • System security authentication method and device, computing equipment and storage medium
  • System security authentication method and device, computing equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0117] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention.

[0118] Those skilled in the art can understand that various aspects of the present application can be implemented as a system, method or program product. Therefore, various aspects of the present application can be specifically implemented in the following forms, that is: a complete hardware implementation, a complete software implementation (including firmware, microcode, etc.), or a combination of hardware and software implementations, which can be collectively referred to herein as "circuit", "module" or "system".

[0119] As described in the background technology, in the related art, the use of USBKey to authenticate the system security requires the hardwa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a system security authentication method and device, computing equipment and a storage medium, and relates to the technical field of computers, and the system works in a local area network environment, and the method comprises the following steps: analyzing the pre-stored feature information of the system from an authentication file stored in the system, wherein the feature information comprises user information of the system and system information; acquiring current feature information of the system, and matching the current feature information with pre-stored feature information; if the matching fails, determining that the system is unsafe; and if matching succeeds, determining that the system is safe. The method comprises the following steps: analyzing an authentication file to obtain pre-stored feature information and comparing the current feature information with the pre-stored feature information to determine the security of the system, so that the dependence on hardware equipment is reduced, and an external network does not need to be accessed in real time to perform security authentication on the system; according to the invention, the security authentication of the system is more convenient, and the security authentication efficiency of the system is further improved.

Description

technical field [0001] The present application relates to the field of computer technology, and in particular to a system security authentication method, device, computing equipment, and storage medium. Background technique [0002] With the development of computer and Internet technology, software products are used in all aspects of production and life. At the same time, software products are also facing more and more security risks, such as: criminals maliciously attack the operating system, causing the operating system to crash and fail to work normally. The existence of software product safety hazards usually brings safety risks to software developers and software users, so software product safety issues have received extensive attention. [0003] Authentication technology is an important way to ensure system security and legality. When increasing system security through authentication means, users who use devices should be authenticated in real time. The traditional a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/33G06F21/44
CPCG06F21/33G06F21/44
Inventor 刘睿穆帅郑维陆文婷赵亚丽王帅孙杨杰
Owner NSFOCUS INFORMATION TECHNOLOGY CO LTD