Unified security login authentication method and device for operating system and service application

An operating system and business application technology, applied in the field of information security identity authentication, can solve the problems of inconsistency, virtual account and business application access user authentication discrete, etc., to achieve the effect of password-free high-strength identity authentication, sharing and consistency

Active Publication Date: 2020-11-13
NARI INFORMATION & COMM TECH
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to overcome the deficiencies in the prior art, to provide a unified security login authentication method and device for operating systems and business applications, which solves the problem of virtual accounts of host operating systems and access users of business applications within the entire network in the prior art Certified Discrete and Inconsistent Technical Issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unified security login authentication method and device for operating system and service application
  • Unified security login authentication method and device for operating system and service application
  • Unified security login authentication method and device for operating system and service application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0068] Correspondingly, the present invention provides an operating system and business application unified security login authentication device, which is characterized in that it includes an information registration module, an information association module, an authentication information acquisition module, an authentication module, an operating system login module and an application program login module ,in:

[0069] The information registration module is used to register user information, host device information and business application program information; where the user information includes the user's basic information and identity authentication data, and the host device information includes the virtual account of the operating system;

[0070] An information association module, used for associating user information with a virtual account of the operating system;

[0071] The authentication information acquisition module is used to respond to the operation of the user lo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a unified security login authentication method and device for an operating system user and a service user. The method comprises the steps of carrying out the unified registration and authorization management of identity login authentication information of all persons in a whole network range through a unified centralized management and control mechanism, and achieving the sharing and consistency of the identity authentication information of the user, establishing an association strategy of an operating system virtual account and an entity personnel user, realizing a single sign-on function of logging in an operating system and a service application by the user, and simultaneously realizing password-free high-strength identity authentication by utilizing a UsbKey-based authentication technology and a fingerprint, face, iris and other biological characteristic recognition technologies.

Description

technical field [0001] The invention belongs to the technical field of information security identity authentication, and in particular relates to a unified secure login authentication method for operating systems and business applications, and also relates to a device corresponding to the method. Background technique [0002] User login authentication is the access to the host operating system and business application system, and is the first line of defense for network information security. Reliable identification is crucial to ensure the security and confidentiality of the system and data. [0003] At present, almost all access control models and identity authentication mechanisms at the operating system level are basically independent of business applications, and user identity information cannot be shared. When a user accesses multiple business software on the operating system host, multiple accounts need to be configured and performed multiple times. Repeated login auth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06F21/34G06F21/46
CPCG06F21/32G06F21/34G06F21/46G06F2221/2141
Inventor 颜涛郭子昕朱江韩勇朱世顺刘苇张跃孙圣武
Owner NARI INFORMATION & COMM TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products