Unlock instant, AI-driven research and patent intelligence for your innovation.

System security authentication method, device, computing device, and storage medium

A system security and authentication method technology, applied in the direction of digital data authentication, etc., can solve the problems of high dependence, limitations of security authentication, and inability to perform authentication, so as to reduce the dependence of hardware devices, facilitate security authentication, and improve efficiency. Effect

Active Publication Date: 2022-05-03
NSFOCUS INFORMATION TECHNOLOGY CO LTD +1
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The traditional authentication technology is realized through U-shield (Universal Serial Buskey, USBKey), password, remote authentication and other technical means. USBKey has a certain dependence on hardware, and password is only the user information entered by the user to ensure the safety of the system itself. It cannot play the role of authentication, but remote authentication needs to connect to the cloud server in real time to access the external network for system security authentication, which makes the system security authentication have limitations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System security authentication method, device, computing device, and storage medium
  • System security authentication method, device, computing device, and storage medium
  • System security authentication method, device, computing device, and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0117] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention.

[0118] Those skilled in the art can understand that various aspects of the present application can be implemented as a system, method or program product. Therefore, various aspects of the present application can be specifically implemented in the following forms, that is: a complete hardware implementation, a complete software implementation (including firmware, microcode, etc.), or a combination of hardware and software implementations, which can be collectively referred to herein as "circuit", "module" or "system".

[0119] As described in the background technology, in the related art, the use of USBKey to authenticate the system security requires the hardwa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application provides a system security authentication method, device, computing device, and storage medium, and relates to the field of computer technology. The system works in a local area network environment, and includes: parsing the pre-stored feature information of the system from the authentication file stored in the system; the feature information Include the user information and system information of the system; obtain the current feature information of the system and match it with the pre-stored feature information; if the match fails, the system is determined to be unsafe; if the match is successful, the system is determined to be safe. This method obtains the pre-stored feature information by parsing the authentication file, compares the current feature information with the pre-stored feature information, and determines the security of the system, which not only reduces the dependence on hardware devices, but also does not require real-time access to the external network For the security authentication of the system, the solution provided by the present application makes the security authentication of the system more convenient, and further improves the efficiency of the security authentication of the system.

Description

technical field [0001] The present application relates to the field of computer technology, and in particular to a system security authentication method, device, computing equipment, and storage medium. Background technique [0002] With the development of computer and Internet technology, software products are used in all aspects of production and life. At the same time, software products are also facing more and more security risks, such as: criminals maliciously attack the operating system, causing the operating system to crash and fail to work normally. The existence of software product safety hazards usually brings safety risks to software developers and software users, so software product safety issues have received extensive attention. [0003] Authentication technology is an important way to ensure system security and legality. When increasing system security through authentication means, users who use devices should be authenticated in real time. The traditional a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/33G06F21/44
CPCG06F21/33G06F21/44
Inventor 刘睿穆帅郑维陆文婷赵亚丽王帅孙杨杰
Owner NSFOCUS INFORMATION TECHNOLOGY CO LTD