Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Progress authentication method based on password

A technology of password authentication and authentication method, which is applied in digital data authentication, instruments, electrical digital data processing, etc., and can solve the problem of high risk of system process execution and tampering, system process is easy to be controlled and tampered by viruses/trojan horses, etc., and system security Low performance and other issues, to reduce the risk of process execution and tampering, good versatility, and strong scalability

Active Publication Date: 2015-03-11
NAT UNIV OF DEFENSE TECH
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The technical problem to be solved by the present invention is to provide a kind of A password-based process authentication method that can reduce the risk of system process being tampered with, has high security, good versatility, and strong scalability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Progress authentication method based on password
  • Progress authentication method based on password

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Such as figure 1 As shown, the implementation steps of the password-based process authentication method in this embodiment are as follows:

[0029] 1) Set the authentication password for the process, calculate the HMAC value of the process according to the authentication password and store it in the extended attribute of the process; set the password acquisition control switch in the operating system in advance, and configure it according to the startup parameters of the operating system or the settings of privileged users The password obtains the status of the control switch; after receiving the operation request of the process, jump to the next step;

[0030] 2) Determine whether password verification is required according to the password acquisition control switch. When password verification is required, the authentication password is obtained, and the HMAC value of the process is calculated based on the authentication password. The calculated HMAC value and the HMAC...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a progress authentication method based on a password. The method comprises the following steps: setting an authentication password for a progress, calculating the HMAC value of the progress according to the authentication password and storing the HMAC value in extended attributes; presetting a password acquisition control switch in an operating system and configuring password acquisition control switch states; after receiving an operation request of the progress, judging whether to check the password according to the password acquisition control switch, acquiring the authentication password if needing to check the password; calculating the HMAC value of the progress based on the authentication password, comparing the HMAC value obtained by calculation with the HMAC value in the extended attributes of the progress, judging that the password authentication of the progress is successful and continuing the operation request of the progress if the HMAC values are the same, otherwise rejecting the operation request of the progress. The method disclosed by the invention has the advantages of reducing the risk of falsification of the system progress and being high in safety, good in universality and high in extensibility.

Description

technical field [0001] The invention relates to the field of computer security, in particular to a password-based process authentication method. Background technique [0002] At present, with the continuous deepening of informatization, computer viruses such as viruses, Trojan horses, and worms are increasingly damaging information systems. How to protect information systems from damage is imminent. Through analysis, it can be found that almost all computer viruses are caused by users executing malicious programs intentionally or unintentionally. Malicious programs usually pretend to be normal programs or are bound to normal programs, inducing users to execute tampered malicious programs to achieve the purpose of destruction. Therefore, the installation and operation of software with potential safety hazards can easily damage the security of the information system, at least it will damage the stability of the system, affect the normal operation of the system, and at the wor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/51G06F21/46
CPCG06F21/34G06F21/44G06F21/51
Inventor 廖湘科丁滟杨钊陈松政黄辰林魏立峰董攀罗军吴庆波戴华东
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products