System security authentication method, device, computing device, and storage medium
A system security and authentication method technology, applied in the direction of digital data authentication, etc., can solve the problems of high dependence, limitations of security authentication, and inability to perform authentication, so as to reduce the dependence of hardware devices, facilitate security authentication, and improve efficiency. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0117] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention.
[0118] Those skilled in the art can understand that various aspects of the present application can be implemented as a system, method or program product. Therefore, various aspects of the present application can be specifically implemented in the following forms, that is: a complete hardware implementation, a complete software implementation (including firmware, microcode, etc.), or a combination of hardware and software implementations, which can be collectively referred to herein as "circuit", "module" or "system".
[0119] As described in the background technology, in the related art, the use of USBKey to authenticate the system security requires the hardwa...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


