Identity authentication method and system based on industrial internet platform
An industrial Internet and identity authentication technology, applied in transmission systems, digital transmission systems, secure communication devices, etc., to achieve the effects of easy use, avoiding data leakage, and simple login methods
Active Publication Date: 2022-06-10
江苏欧软信息科技有限公司
View PDF15 Cites 0 Cited by
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
The industrial Internet has some defects in its own system structure, and it will bring security problems. For example, illegal users use legal user identities to enter the industrial Internet platform to steal industrial data. At present, common identity authentication schemes include username and password authentication. , dynamic password card and biometric authentication, of which the higher security is the dynamic password card and biometric authentication, however, the dynamic password card authentication is more complicated, the cost is too high, and not universal; biometric authentication such as fingerprint authentication The terminal equipment needs to be equipped with a corresponding authentication module, and the computers used in many factories do not have a biometric authentication module, which is inconvenient to use
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View moreImage
Smart Image Click on the blue labels to locate them in the text.
Smart ImageViewing Examples
Examples
Experimental program
Comparison scheme
Effect test
Embodiment Construction
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More PUM
Login to View More Abstract
The invention is suitable for the technical field of industrial internet, and provides an identity authentication method and system based on an industrial internet platform, and the method comprises the following steps: receiving user identity registration information; a user access data instruction is received, when data needing to be accessed in the user access data instruction is confidential data, login equipment basic information of current login equipment of a user is read, and whether the login equipment basic information is consistent with equipment basic information generating the confidential data or not is judged; if yes, allowing to access the corresponding confidential data; if not, judging whether the basic information of the login equipment belongs to one of the basic information of the office equipment or the basic information of the personal equipment; and if yes, allowing to access the corresponding confidential data. According to the invention, the login equipment basic information of the current login equipment of the user is read and judged, so that the user account corresponds to the login equipment used by the user, and data leakage caused by embezzlement of the user account is avoided.
Description
technical field [0001] The present invention relates to the technical field of industrial Internet, in particular to an identity authentication method and system based on an industrial Internet platform. Background technique [0002] The industrial Internet platform is an industrial platform that meets the needs of digitalization, networking, and intelligence in the manufacturing industry, builds a service system based on massive data collection, aggregation, and analysis, and supports ubiquitous connection, flexible supply, and efficient allocation of manufacturing resources. The industrial Internet has some defects in its own system structure, and it will bring security problems. For example, illegal users use legal user identities to enter the industrial Internet platform to steal industrial data. At present, common identity authentication schemes include username and password authentication. , dynamic password card and biometric authentication, of which the higher securi...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More Application Information
Patent Timeline
Login to View More Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/0876H04L63/107H04L63/123
Inventor 孟德凤刘如心董骊艾群飞
Owner 江苏欧软信息科技有限公司



