Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for logging in Windows operating system

An operating system and the only technology, applied in the field of information security, can solve problems such as insecurity, user names and passwords are easy to be stolen, hardware authentication devices cannot log in, and achieve the effect of expanding the scope of application

Active Publication Date: 2021-01-29
FEITIAN TECHNOLOGIES
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the Windows operating system login method of the prior art, the user name and password are usually used to log in, but the user name and password are easy to be stolen. The disadvantage of this login method is that it is not safe. With the development of technology, the use of hardware The combination of the authentication device and the user name and password for login improves the security of login
[0003] However, some hardware authentication devices cannot implement login in a non-domain environment, thus limiting the scope of application of the login method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for logging in Windows operating system
  • Method and system for logging in Windows operating system
  • Method and system for logging in Windows operating system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] This embodiment provides a method for logging into a Windows operating system, including: a binding process and a login process;

[0048] Such as figure 1 As shown, the binding process includes:

[0049] Step 01, the binding tool obtains the security descriptor according to the user name to be bound, and generates key handle generation parameters corresponding to the security descriptor;

[0050] Step 02, the binding tool sends the key handle generation parameters to the authentication device;

[0051] Step 03, the binding tool receives the credential public key returned by the authentication device and the key handle generated according to the key handle generation parameters;

[0052] Step 04, the binding tool saves the key handle, certificate public key and security descriptor correspondingly in a predetermined file;

[0053] Such as figure 2 As shown, the login process includes:

[0054] Step 1, the type declaration interface of the CP device is called by the ...

Embodiment 2

[0091] This embodiment provides a method for logging into a Windows operating system, including: a binding process and a login process, such as image 3 As shown, the binding process includes:

[0092] Step 201, the binding tool is started, and all user names in the system are enumerated;

[0093] In this embodiment, this step may specifically include the following steps:

[0094] Step a1, the binding tool starts, enumerates all user names in the system, and obtains the SIDs of all user names;

[0095] Specifically, in this embodiment, the binding tool calls the NetUserEnum function to enumerate all user names in the system, and calls the API function of the system to obtain the SIDs of all the user names.

[0096] The API function of the above call system to obtain the SID of all user names is as follows: the binding tool uses the user name and Null as input parameters to call the LookupAccountName function to obtain the size of the buffer required for the SID; calls the Lo...

Embodiment 3

[0192] This embodiment provides a method for logging into the Windows operating system, including a binding process and a login process, wherein the binding process adds the following steps after the binding process step 210 in Embodiment 2:

[0193] Step 211, the binding tool generates a unique recovery code related data according to the SID of the user name to be bound, generates a unique recovery code according to the unique recovery code related data and displays the unique recovery code, and combines the unique recovery code related data with the user name to be bound. The SID of the user name is correspondingly saved in the predetermined file;

[0194] In this embodiment, this step is specifically:

[0195] Step c1, the binding tool generates the first random number and the second random number;

[0196] Step c2, the binding tool sequentially concatenates the first random number, the SID and the second random number to generate unique recovery code related data;

[019...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system for logging in a Windows operating system. The method comprises a binding process and a login process. The binding process comprises the steps: enabling the binding tool to send key handle generation parameters obtained according to a user name to be bound to the authentication device; and correspondingly storing a certificate public key returned by the authentication device, a key handle generated according to the key handle generation parameter and the security descriptor in a predetermined file. The login process comprises the following steps: enabling a credential providing device to receive login data, acquiring a security descriptor according to a user name, and retrieving a corresponding key handle and a credential public key from a predetermined file according to the security descriptor; sending the key handle and the to-be-signed data to an authentication device; receiving a signature value returned by the authentication device andgenerated according to the private key corresponding to the key handle and the to-be-signed data; performing signature verification on the signature value by using the certificate public key, and when the signature verification succeeds, forming credential information required for logging in the system according to the user name and the password.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method and system for logging into a Windows operating system. Background technique [0002] A Windows domain is a form of computer networking in which all security principals such as user accounts are registered in a central database located on one or more central computer clusters called domain controllers, where authentication also takes place. Everyone who uses a computer in a domain has a unique user account, which can then be assigned access to resources within the domain. In the Windows operating system login method of the prior art, the user name and password are usually used to log in, but the user name and password are easy to be stolen. The disadvantage of this login method is that it is not safe. With the development of technology, the use of hardware The combination of the authentication device and the user name and password for login improves the security of l...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/31G06F21/44
CPCG06F21/31G06F21/44
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products