Security authentication method and system based on computer

A security authentication and computer technology, applied in the field of computer-based security authentication methods and systems, can solve the problems of lack of unified friendly interface, low usability, complicated operation, etc., and achieve real-time authentication, avoid hidden dangers of data security, and simple operation Effect

Pending Publication Date: 2022-07-08
HENAN NORMAL UNIV
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the existing computer security authentication methods are generally based on the double security authentication system combined with the TPM chip and the secure hard disk embedded system. While the operation is complicated, it lacks a unified friendly interface and has low usability.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security authentication method and system based on computer
  • Security authentication method and system based on computer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] like figure 1 As shown, the computer-based security authentication method includes the following steps:

[0029] S1, configure different data division grids based on the authentication results of the user identity characteristics, thereby configuring different data operation rights for different users; the data division grids are used to frame the data of the database in the corresponding data operation rights respectively. In the grid, different data operation permissions include hidden, read-only, transfer only, revision only, and full authority;

[0030] S2. Realize the recording and identification of the currently executed data operation command based on the mode of script recording and monitoring. When the data operation command needs to be executed, the mode of operation authentication-data operation command execution script wake-up and re-execution is adopted; When the operation command is executed, the dynamic identity authentication module is activated and req...

Embodiment 2

[0032] like figure 2 As shown, a computer-based security authentication system includes:

[0033] The identity authentication module is used to complete the identification of the user's biometric identity and obtain the corresponding user identity authentication result;

[0034] Data segmentation grid, which is used to frame the data in the database in grids corresponding to different data operation permissions according to the results of user authentication; different data operation permissions include hidden, read-only, only transfer, only revision, and full authority ;

[0035] The data operation behavior recognition module is used to realize the recognition of user data operation behavior in the way of script recording + behavior recognition model real-time recognition. The operation behavior monitoring module is deployed on the computer in the form of a static jar package;

[0036] The dynamic identity recognition module is activated when a data operation command need...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of data security, in particular to a security authentication method and system based on a computer, and the method comprises the steps: configuring different data segmentation grids based on an authentication result of user identity characteristics, thereby configuring different data operation authorities for different users; and designing a data operation command execution script into an authentication-wake-up-re-execution mode. The data segmentation grids are used for framing the data of the database in the grids corresponding to different data operation permissions respectively. According to the method, safe and intelligent supervision of the computer built-in data can be realized without the help of a dual-safety certification system combining a TPM chip and a safety hard disk embedding system, the operation is simple, and the application range is wide.

Description

technical field [0001] The invention relates to the field of data security, in particular to a computer-based security authentication method and system. Background technique [0002] With the rapid development of computer networks, computer information security issues have gradually penetrated into various industries and become the focus of attention. In order to prevent the occurrence of computer information security incidents in advance and avoid losses, the method of computer security authentication has become a key link to ensure computer information security. [0003] At present, the existing computer security authentication methods are generally implemented based on a dual security authentication system combining a TPM chip and a secure hard disk embedded system, which is complicated in operation, lacks a unified friendly interface, and has low usability. SUMMARY OF THE INVENTION [0004] In order to solve the above technical problems, the present invention provides...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/20H04L63/0861H04L63/10H04L63/145
Inventor 王善侠
Owner HENAN NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products