One-machine multi-user security access control method

A security access control and multi-user technology, applied in the field of single-machine multi-user security access control, can solve the problems of lack of data security and confidentiality, multi-user information storage insecurity, multi-user, multi-hard disk resource waste, etc., and achieve the effect of reducing costs

Inactive Publication Date: 2011-11-09
SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD
View PDF3 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] The purpose of the present invention is to provide a single-machine multi-user security access control method based on TCM and USBKey, which solves the insecurity of multi-user information storage under the same operating system, the lack of security and confidentiality of data during operation after a user with a legal identity logs in, multi-user, Problems such as resource waste of multiple hard disks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • One-machine multi-user security access control method
  • One-machine multi-user security access control method
  • One-machine multi-user security access control method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to make the purpose, technical method and advantages of the present invention clearer and easier to understand, the present invention will be further described below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0038] As an embodiment of the present invention, initialization work needs to be done before deploying the access control system, as shown in the attached figure 1 The implementation steps of the specific method for initializing a new user of the file security control management system shown are as follows:

[0039] Step I1. The administrator user logs in to the file security management system, and needs to input the user name, password and PIN code. The USBKey internally calculates the number of user information verifications. After the verification is passed, the system is logged i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention aims to provide a one-machine multi-user security access control method based on a trusted computing module (TCM) and a universal serial bus (USB) key, and solves the problems of multi-user information storage insecurity, absence of running data security after the login of a user with legal identity, resource wasting of a plurality of hard disks required by a plurality of users and the like under an identical operating system. In the method, security file access control over the users is realized in a kernel mode by combining USBKey hardware equipment and a TCM chip, user identity information is stored in the security storage area of the USBKey hardware equipment in form of cipher text, an encryption process is finished in the TCM chip by adopting a standard cryptographic algorithm, the security of private keys is protected by an SMK, the USBKey hardware equipment can be carried along by the user, and the security storage of private information of the user is realized.

Description

technical field [0001] The invention belongs to the technical field of computer information security, and in particular relates to a single-machine multi-user security access control method based on a TCM chip and a USBKey device. Background technique [0002] Due to many government agencies, confidential markets and large companies in the country, many people or departments share a secure computer in many cases. In order to meet the independence, security and confidentiality of each user's information data on the same machine , other non-authorized users have no access requirements. On the basis of comprehensive consideration of various security factors, a set of security access control methods based on kernel level for single computer and multiple users is developed. [0003] At present, the security access control for single-machine and multi-user in the market mainly includes: [0004] Authorize access to users based on user passwords and passwords of the operating sys...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/31
Inventor 宋营军赵斌冯磊
Owner SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products