Unlock instant, AI-driven research and patent intelligence for your innovation.

Computer safe login method

A computer security, computer technology, applied in computer parts, computing, secure communication devices, etc., can solve problems such as illegal misappropriation of user sensitive information or location information, loss of data transmission security problems, huge cost pressure, etc., to achieve easy technology. Promotion, easy capacity expansion, long life effect

Active Publication Date: 2021-03-02
北京电信易通信息技术股份有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

With the in-depth promotion of RFID technology, its privacy and security issues have become increasingly prominent. Since the general RFID tag directly responds to the query of the reader without the permission of its owner, if the user has a product with an unsafe tag, Then it may be read by a nearby reader without the user's perception, and the risk of illegal embezzlement of user sensitive information or location information is extremely high
[0004] In the actual application of RFID, there are potential safety hazards in RFID tags, networks, data and other links. The reader, RFID tag and data collection end are called the front-end data collection part, and the communication between the data collection terminal and the background data processing is called Back-end data transmission, most of the current research work is concentrated on the front-end data acquisition part, but the security risks in data transmission can still cause major losses
In order to solve the security risks brought by computer login authentication, the industry usually integrates dedicated security hardware circuits, FPGA chips or security SOC chips. In terms of promotion, especially the implementation of security certification for general-purpose computers, it is facing huge cost pressures

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer safe login method
  • Computer safe login method
  • Computer safe login method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present disclosure as recited in the appended claims.

[0044]The terminology used in the present disclosure is for the purpose of describing particular embodiments only, and is not intended to limit the present disclosure. As used in this disclosure and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a computer safe login method. The method comprises the following steps: transmitting a radio frequency identification technology RFID tag to an authentication center through a reader-writer for identity authentication; after the identity verification is passed, performing data encryption transmission by using a Trivium algorithm; carrying out data decryption by using a Trivium algorithm; enabling the authentication center to communicate with the to-be-accessed computer, unlocking the to-be-accessed computer according to the user information and the access permission of the RFID tag, and opening a corresponding permission folder. According to the method, safe and credible application is achieved with low cost, and technical popularization is easy; a unique identity authentication mechanism is used, and the safety of the RFID tag and the reader-writer is guaranteed through two-way authentication; an extensible markup language (XML) is adopted as a storage information format, data expansibility is facilitated, an integrated compression algorithm is adopted for sending data, capacity expansion is facilitated, and a referential scheme is provided for large-capacity data transmission.

Description

technical field [0001] The invention relates to the technical field of data protection, in particular to a method for securely logging in a computer. Background technique [0002] Since the International Telecommunication Union proposed the concept of the Internet of Things, related technologies of the Internet of Things have been widely concerned. Radio Frequency Identification (RFID) is an important technology for implementing perception in Internet of Things applications. RFID technology is a communication technology that identifies specific targets and reads and writes relevant data through radio signals. This method does not require mechanical or optical contact between the identification system and specific targets. It has high accuracy, long service life, low cost, and high temperature resistance. It has been increasingly used in anti-counterfeiting, payment or ticket issuance, book management and multimedia teaching management and other scenarios. [0003] At presen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32G06K17/00
CPCG06K17/0029H04L9/3236H04L63/0428H04L63/08H04L63/10
Inventor 王帅陶子元
Owner 北京电信易通信息技术股份有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More