CN106657098A - Authentication method, apparatus and system for logging in Linux operating system - Google Patents

Authentication method, apparatus and system for logging in Linux operating system Download PDF

Info

Publication number
CN106657098A
CN106657098A CN201611248409.0A CN201611248409A CN106657098A CN 106657098 A CN106657098 A CN 106657098A CN 201611248409 A CN201611248409 A CN 201611248409A CN 106657098 A CN106657098 A CN 106657098A
Authority
CN
China
Prior art keywords
iris
information
authentication
linux
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611248409.0A
Other languages
Chinese (zh)
Inventor
史书伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Yunhai Information Technology Co Ltd
Original Assignee
Zhengzhou Yunhai Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Yunhai Information Technology Co Ltd filed Critical Zhengzhou Yunhai Information Technology Co Ltd
Priority to CN201611248409.0A priority Critical patent/CN106657098A/en
Publication of CN106657098A publication Critical patent/CN106657098A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention discloses an authentication method and apparatus for logging in a Linux operating system. The method comprises the following steps: receiving login information sent by a PAM module of the Linux system, and comparing iris password information of a current login user with iris template information of preset authorized login; and when the iris password information of the current login user is matched and consistent with the iris template information, returning authentication pass result information. The authentication of logging in the Linux operating system is realized based on the hot plug property and the usability of the PAM module. The PAM module can dynamically load a verification module, thereby greatly improving the flexibility of the verification. In addition, according to the authentication method, apparatus and system disclosed by the invention, the identity authentication of users is realized by adopting the biological recognition characteristics of the iris authentication technology. By means of the usability of the PAM and the uniqueness of the iris technology, the security of logging in the operating system is ensured. In addition, the invention further provides an authentication system for logging in the Linux operating system, which has the above technical advantages.

Description

A kind of authentication method for logging in (SuSE) Linux OS, device and system
Technical field
The present invention relates to technical field of security authentication, more particularly to a kind of authentication method for logging in (SuSE) Linux OS, Device and system.
Background technology
Identity identifying technology is an importance of Information Security Theory and technology, and it is that first of system safety is prevented Line, the system resource limited for limiting unauthorized users to access, is the basis of all security mechanisms, and this also just makes hacker The main target of attack.Therefore using the strong effective identity authorization system meaning unusual for network security has Justice.
From the point of view of development with regard to domestic and international identity identifying technology, most traditional identification authentication mode is that account number-fixation is close Code mode.But traditional this mode is easily stolen and cracks, and security is relatively low.
Emerging identification authentication mode includes:Living things feature recognition method, sound authentication method etc..In biometrics identification technology In, the iris of human eye is unique as finger line.John Duo Man of univ cambridge uk Just because of this Doctor has just invented iris identity determination techniques.Briefly, iris determination techniques are that the external appearance characteristic of iris is converted into 512 The iris password of bit, then be stored in template for making to confirm.The reading point of about 266 units of one iris, and other Traditional biological determination techniques can only read 13-16 unit.This has affirmed the levels of precision that iris is determined.Additionally, using this skill Art is very convenient, scanning process only about 1 minute.Now, Great Britain and America has started to this identity confirming technology to be used for bank teller machine. Only iris is installed on ATM and determines camera, bank just can confirm the identity of user moment, it is ensured that the password of user without Method is stolen.
In consideration of it, providing a kind of authentication method of the login (SuSE) Linux OS based on iris technology, device and system It is necessary.
The content of the invention
It is an object of the invention to provide a kind of authentication method for logging in (SuSE) Linux OS, device and system, for solving The relatively low problem of the mode security of certainly conventionally employed account password login authentication.
To solve above-mentioned technical problem, the present invention provides a kind of authentication method for logging in (SuSE) Linux OS, including:
The login authentication information that the PAM modules of linux system send is received, the login authentication information at least includes current The iris encrypted message of login user;
The iris templates information that the iris encrypted message of the currently logged on user is logged in preset authorization is compared;
When the iris encrypted message of the currently logged on user is consistent with the iris templates information matches, return authentication The object information for passing through.
Alternatively, the iris templates for logging in the iris encrypted message by the currently logged on user and preset authorization Information also includes after comparing:
When the iris encrypted message of the currently logged on user is consistent with the iris templates information matches, according to default Strategy determines the operating right information of the currently logged on user.
Alternatively, the login authentication information is also including the IP address information of access end.
Alternatively, it is described to determine that the operating right information of the currently logged on user includes according to preset strategy:
Current login whether within the default addressable time period is judged according to current login time information;
Judge whether the IP address at current accessed end has according to the IP address information and access operating right.
Alternatively, the iris templates for logging in the iris encrypted message by the currently logged on user and preset authorization Information also includes after comparing:
When the iris encrypted message of the currently logged on user is inconsistent with the iris templates information matches, return is recognized The object information of card mistake.
Alternatively, the login authentication information that the PAM modules for receiving linux system send includes:
The login authentication information through encryption is received, the login authentication information is parsed, determine rainbow Film encrypted message.
Present invention also offers a kind of authentication device for logging in (SuSE) Linux OS, including:
Receiver module, the login authentication information that the PAM modules for receiving linux system send, the login authentication letter Breath is at least including the iris encrypted message of currently logged on user;
Authentication module, for the iris templates for logging in the iris encrypted message of the currently logged on user and preset authorization Information is compared;When the iris encrypted message of the currently logged on user is consistent with the iris templates information matches, return Return the object information that certification passes through.
Present invention also offers a kind of Verification System for logging in (SuSE) Linux OS, including:
Iris scan device, for gathering the iris information of currently logged on user, and the iris information is encoded, raw Into iris encrypted message;
(SuSE) Linux OS client, for the login authentication information comprising the iris encrypted message to be sent into rainbow Film certificate server;
The iris authentication server, for receiving the iris encrypted message, by the iris password of currently logged on user The iris templates information that information is logged in preset authorization is compared;Iris encrypted message and institute as the currently logged on user State iris templates information matches it is consistent when, generate the object information that passes through of certification.
Alternatively, the login authentication information is also including the IP address information of access end.
Alternatively, the (SuSE) Linux OS client is additionally operable to be encrypted the login authentication information, will encrypt Information afterwards is sent to the iris authentication server.
The authentication method and device for logging in (SuSE) Linux OS provided by the present invention, by receiving linux system The login authentication information that PAM modules send, the iris mould that the iris encrypted message of currently logged on user and preset authorization are logged in Plate information is compared;When the iris encrypted message of currently logged on user is consistent with iris templates information matches, return authentication The object information for passing through.Hot-swappable and ease for use of the present invention based on PAM modules, realizes and logs in (SuSE) Linux OS Certification.PAM modules can dynamic load authentication module, can on demand dynamically to verify content change, greatly improve The flexibility of checking.In addition, the application adopts the bio-identification characteristic of iris authentication technology, the identity for realizing user to recognize Card.By the ease for use and the uniqueness of iris technology of PAM itself, it is ensured that the security of register system.Additionally, this It is bright to additionally provide a kind of Verification System of the login (SuSE) Linux OS with above-mentioned technological merit.
Description of the drawings
For the clearer explanation embodiment of the present invention or the technical scheme of prior art, below will be to embodiment or existing The accompanying drawing to be used needed for technology description is briefly described, it should be apparent that, drawings in the following description are only this Some bright embodiments, for those of ordinary skill in the art, on the premise of not paying creative work, can be with root Other accompanying drawings are obtained according to these accompanying drawings.
Fig. 1 is a kind of stream of specific embodiment of the authentication method of login (SuSE) Linux OS provided by the present invention Cheng Tu;
Fig. 2 is another kind of specific embodiment of the authentication method of login (SuSE) Linux OS provided by the present invention Flow chart;
Fig. 3 is the structured flowchart of the authentication device of login (SuSE) Linux OS provided in an embodiment of the present invention;
Fig. 4 is the schematic diagram of Verification System provided by the present invention.
Specific embodiment
In order that those skilled in the art more fully understand the present invention program, with reference to the accompanying drawings and detailed description The present invention is described in further detail.Obviously, described embodiment is only a part of embodiment of the invention, rather than Whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art are not making creative work premise Lower obtained every other embodiment, belongs to the scope of protection of the invention.
A kind of flow chart of specific embodiment of the authentication method for logging in (SuSE) Linux OS provided by the present invention is such as Shown in Fig. 1, the method includes:
Step S101:The login authentication information that the PAM modules of linux system send is received, the login authentication information is extremely Less including the iris encrypted message of currently logged on user;
It should be noted that the present invention can be applied particularly to iris authentication server.The iris authentication server passes through The network equipment is connected with (SuSE) Linux OS client, and in (SuSE) Linux OS client iris capturing device is arranged, to logging in The iris image of user is acquired.
Login authentication information can specifically include the iris encrypted message of currently logged on user, be specifically as follows when user steps on In record linux system, certification rule is set according to linux system end, the rainbow of currently logged on user is gathered using iris capturing device Film information, generates iris encrypted message after being encoded.The PAM of linux system sends iris encrypted message to the present embodiment Middle iris authentication server, to be authenticated.
Login authentication information can also include the other informations such as other information, the IP address of such as access end.And in order to The security of system authentication is further improved, login authentication information can also do the encryption process and be transmitted again, in order to avoid send out in plain text Send the occurrence of causing information leakage.Iris authentication server after login authentication information is received, to login authentication information It is decrypted, and parses iris encrypted message, or the IP address information of corresponding access end.
Step S102:The iris templates information that the iris encrypted message of the currently logged on user and preset authorization are logged in Compare;
Step S103:When the iris encrypted message of the currently logged on user it is consistent with the iris templates information matches When, the object information that return authentication passes through.
Iris authentication server enters the iris templates information that the iris encrypted message that parsing is obtained is logged in preset authorization Row is compared.Iris templates information is the iris message in cipher of the authorized user that can be conducted interviews to linux system for pre-building Breath, only when at least one of the iris encrypted message and iris templates information matching of currently logged on user is consistent, ability Think that the iris encrypted message of currently logged on user is legal, i.e., currently logged on user is authorized user.After certification passes through, Yong Huke Log in (SuSE) Linux OS.
The authentication method for logging in (SuSE) Linux OS provided by the present invention, by the PAM modules for receiving linux system The login authentication information of transmission, the iris templates information that the iris encrypted message of currently logged on user is logged in preset authorization is entered Row is compared;When the iris encrypted message of currently logged on user is consistent with iris templates information matches, the knot that return authentication passes through Fruit information.Hot-swappable and ease for use of the present invention based on PAM modules, realizes the certification for logging in (SuSE) Linux OS.PAM Module can dynamic load authentication module, can on demand dynamically to verify content change, substantially increase checking Flexibility.In addition, the application realizes the authentication of user using the bio-identification characteristic of iris authentication technology.By PAM The ease for use of itself and the uniqueness of iris technology, it is ensured that the security of register system.
When the iris encrypted message of currently logged on user is consistent with iris templates information matches, i.e., active user is mandate During user, different operating rights can be respectively provided with for different authorized users.On the basis of above-described embodiment, the present invention Embodiment is carried out the iris templates information that the iris encrypted message of the currently logged on user is logged in preset authorization described Can further include after comparison:
When the iris encrypted message of the currently logged on user is consistent with the iris templates information matches, according to default Strategy determines the operating right information of the currently logged on user.
Specifically, current whether login in the default addressable time period can be judged according to current login time information It is interior;Judge whether the current IP address for logging in has according to the IP address information and access operating right.
For example, systemic presupposition first user is only on duty the time just with (SuSE) Linux OS is accessed, and so works as user The current accessed time be at 8 points in afternoon, even if be not on duty the time when user be authorized user can not access Linux operate System.Authority Rule of judgment is except including above-mentioned temporal information, including date and time information, or the IP ground of above-mentioned access end Location information, this does not affect the realization of the present invention.
Additionally, on the basis of any of the above-described embodiment, the authenticating party for logging in (SuSE) Linux OS provided by the present invention In method, the iris templates information that the iris encrypted message of the currently logged on user is logged in preset authorization is compared described Also include to after:When the iris encrypted message of the currently logged on user is inconsistent with the iris templates information matches, The object information of return authentication mistake.
With reference to scene is embodied as, to the another of the authentication method for logging in (SuSE) Linux OS provided by the present invention A kind of specific embodiment is described in detail, and with reference to Fig. 2, structure design adopts centralized authentication management, all controlled Linux system send information to the unification of iris authentication server does certification the method includes:
Step S201:When user logs in linux system, certification rule is set according to linux system end, is swept using iris Retouch the iris information of device collection login user and encoded;
When user logs in (SuSE) Linux OS, the iris of registrant are scanned by iris scan device, and iris is believed Breath identification point collection apparatus out, are converted into iris password.
Step S202:The PAM of linux system processes iris information, and iris information is encrypted, then adds the IP of access end Do certification by being sent to iris authentication server together in address;
Iris password and logon information are sent to iris authentication server Jing row certifications by network, and return authentication is believed Breath.
Step S203:Iris authentication server receives authentication information, then parses authentication information, obtain iris encrypted message, IP address information, after parsing is finished, judges whether the iris information is legal, if information is illegal, return authentication mistake letter Breath, if information is legal, judge whether to be limited according to the strategy setting of iris authentication server (including current landing time, Date, log in IP address etc.);
Step S204:The result returns to (SuSE) Linux OS, operating system parsing returning result.If certification is led to Cross, then into operating system;Otherwise certification does not pass through, then directly eject error message.
The authentication device of login (SuSE) Linux OS provided in an embodiment of the present invention is introduced below, is described below Login (SuSE) Linux OS authentication device with it is above-described login (SuSE) Linux OS authentication method can be mutually right Should refer to.
Fig. 3 is the structured flowchart of the authentication device of login (SuSE) Linux OS provided in an embodiment of the present invention, with reference to Fig. 3 Logging in the authentication device of (SuSE) Linux OS can include:
Receiver module 100, the login authentication information that the PAM modules for receiving linux system send, the login authentication Information is at least including the iris encrypted message of currently logged on user;
Authentication module 200, for the iris for logging in the iris encrypted message of the currently logged on user and preset authorization Template Information is compared;When the iris encrypted message of the currently logged on user it is consistent with the iris templates information matches When, the object information that return authentication passes through.
The authentication device of the login (SuSE) Linux OS of the present embodiment is used to realize aforesaid login (SuSE) Linux OS Authentication method, therefore log in (SuSE) Linux OS authentication device in the visible login hereinbefore of specific embodiment The embodiment part of the authentication method of (SuSE) Linux OS, for example, receiver module 100, for realizing above-mentioned login Linux behaviour Make step S101 in the authentication method of system, authentication module 200 is used to realize step S102 and S203 in said method, so, Its specific embodiment is referred to the description of corresponding various pieces embodiment, will not be described here.
Additionally, present invention also offers a kind of Verification System for logging in (SuSE) Linux OS, such as Fig. 4 is provided by the present invention Verification System schematic diagram shown in, the system includes:
Iris scan device, for gathering the iris information of currently logged on user, and the iris information is encoded, raw Into iris encrypted message;
(SuSE) Linux OS client, for the login authentication information comprising the iris encrypted message to be sent into rainbow Film certificate server;
The iris authentication server, for receiving the iris encrypted message, by the iris password of currently logged on user The iris templates information that information is logged in preset authorization is compared;Iris encrypted message and institute as the currently logged on user State iris templates information matches it is consistent when, generate the object information that passes through of certification.
The characteristics of the application makes full use of iris distinctive uniqueness, in the PAM verification process of linux system, The iris password of 512 bits that appearance of iris feature is converted is forwarded to certificate server and is authenticated, and certificate server is to close Code and certification policy are judged that return authentication result, linux system shows authentication result or enters system by certification.
Wherein, the login authentication information is also including the IP address information of access end.Iris authentication server is used for rainbow Film password is authenticated, and the access strategy to certification user judges, including authenticated time, access end IP address etc..
Used as a kind of specific embodiment, above-mentioned (SuSE) Linux OS client is additionally operable to the login authentication information After being encrypted, the iris authentication server is sent to.
Iris authentication server end, for parsing the information such as iris password, IP address that linux system end sends; Linux system end, for parsing the authentication result that certificate server end sends, including code error, current slot are forbidden Log in.
With reference to Fig. 4, then the course of work of the system that the present invention is provided passes through specifically, iris password is logged first Iris authentication server is sent in PAM, then information is parsed by iris authentication server, judged.After judging to finish again Authentication result information is returned into operating system, authentication result is parsed by operating system, judge whether to proceed to log in.
The Verification System for logging in (SuSE) Linux OS provided by the present invention, by the PAM modules for receiving linux system The login authentication information of transmission, the iris templates information that the iris encrypted message of currently logged on user is logged in preset authorization is entered Row is compared;When the iris encrypted message of currently logged on user is consistent with iris templates information matches, the knot that return authentication passes through Fruit information.Hot-swappable and ease for use of the present invention based on PAM modules, realizes the certification for logging in (SuSE) Linux OS.PAM Module can dynamic load authentication module, can on demand dynamically to verify content change, substantially increase checking Flexibility.In addition, the application realizes the authentication of user using the bio-identification characteristic of iris authentication technology.By PAM sheets The ease for use of body and the uniqueness of iris technology, it is ensured that the security of register system.
Each embodiment is described by the way of progressive in this specification, and what each embodiment was stressed is and other The difference of embodiment, between each embodiment same or similar part mutually referring to.For dress disclosed in embodiment For putting, because it is corresponded to the method disclosed in Example, so description is fairly simple, related part is referring to method part Illustrate.
Professional further appreciates that, with reference to the unit of each example of the embodiments described herein description And algorithm steps, can with electronic hardware, computer software or the two be implemented in combination in, in order to clearly demonstrate hardware and The interchangeability of software, according to function has generally described the composition and step of each example in the above description.These Function is performed with hardware or software mode actually, depending on the application-specific and design constraint of technical scheme.Specialty Technical staff can use different methods to realize described function to each specific application, but this realization should not Think beyond the scope of this invention.
The step of method described with reference to the embodiments described herein or algorithm, directly can be held with hardware, processor Capable software module, or the combination of the two is implementing.Software module can be placed in random access memory (RAM), internal memory, read-only deposit Reservoir (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technology In field in known any other form of storage medium.
The authentication method for logging in (SuSE) Linux OS provided by the present invention, device and system have been carried out in detail above It is thin to introduce.Specific case used herein is set forth to the principle and embodiment of the present invention, and above example is said It is bright to be only intended to help and understand the method for the present invention and its core concept.It should be pointed out that for the ordinary skill of the art For personnel, under the premise without departing from the principles of the invention, some improvement and modification can also be carried out to the present invention, these improvement Also fall into the protection domain of the claims in the present invention with modification.

Claims (10)

1. it is a kind of log in (SuSE) Linux OS authentication method, it is characterised in that include:
The login authentication information that the PAM modules of linux system send is received, the login authentication information at least includes current login The iris encrypted message of user;
The iris templates information that the iris encrypted message of the currently logged on user is logged in preset authorization is compared;
When the iris encrypted message of the currently logged on user is consistent with the iris templates information matches, return authentication passes through Object information.
2. the authentication method of (SuSE) Linux OS is logged in as claimed in claim 1, it is characterised in that worked as described described The iris templates information that the iris encrypted message of front login user is logged in preset authorization also includes after comparing:
When the iris encrypted message of the currently logged on user is consistent with the iris templates information matches, according to preset strategy Determine the operating right information of the currently logged on user.
3. the authentication method of (SuSE) Linux OS is logged in as claimed in claim 2, it is characterised in that the login authentication letter Breath is also including the IP address information of access end.
4. the authentication method of (SuSE) Linux OS is logged in as claimed in claim 3, it is characterised in that the basis presets plan Slightly determining the operating right information of the currently logged on user includes:
Current login whether within the default addressable time period is judged according to current login time information;
Judge whether the IP address at current accessed end has according to the IP address information and access operating right.
5. as described in any one of Claims 1-4 login (SuSE) Linux OS authentication method, it is characterised in that described Also wrap after the iris templates information that the iris encrypted message of the currently logged on user is logged in preset authorization is compared Include:
When the iris encrypted message of the currently logged on user is inconsistent with the iris templates information matches, return authentication is wrong Object information by mistake.
6. the authentication method of (SuSE) Linux OS is logged in as claimed in claim 5, it is characterised in that the reception Linux systems The login authentication information that the PAM modules of system send includes:
The login authentication information through encryption is received, the login authentication information is parsed, determine that iris is close Code information.
7. it is a kind of log in (SuSE) Linux OS authentication device, it is characterised in that include:
Receiver module, the login authentication information that the PAM modules for receiving linux system send, the login authentication information is extremely Less including the iris encrypted message of currently logged on user;
Authentication module, for the iris templates information for logging in the iris encrypted message of the currently logged on user and preset authorization Compare;When the iris encrypted message of the currently logged on user is consistent with the iris templates information matches, return is recognized The object information that card passes through.
8. it is a kind of log in (SuSE) Linux OS Verification System, it is characterised in that include:
Iris scan device, for gathering the iris information of currently logged on user, and the iris information is encoded, and generates rainbow Film encrypted message;
(SuSE) Linux OS client, recognizes for the login authentication information comprising the iris encrypted message to be sent into iris Card server;
The iris authentication server, for receiving the iris encrypted message, by the iris encrypted message of currently logged on user The iris templates information logged in preset authorization is compared;When the iris encrypted message and the rainbow of the currently logged on user When the matching of film Template Information is consistent, the object information that certification passes through is generated.
9. the Verification System of (SuSE) Linux OS is logged in as claimed in claim 8, it is characterised in that the login authentication letter Breath is also including the IP address information of access end.
10. the Verification System of (SuSE) Linux OS is logged in as claimed in claim 9, it is characterised in that the Linux operations System client is additionally operable to be encrypted the login authentication information, and the information after encryption is sent into the iris authentication clothes Business device.
CN201611248409.0A 2016-12-29 2016-12-29 Authentication method, apparatus and system for logging in Linux operating system Pending CN106657098A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611248409.0A CN106657098A (en) 2016-12-29 2016-12-29 Authentication method, apparatus and system for logging in Linux operating system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611248409.0A CN106657098A (en) 2016-12-29 2016-12-29 Authentication method, apparatus and system for logging in Linux operating system

Publications (1)

Publication Number Publication Date
CN106657098A true CN106657098A (en) 2017-05-10

Family

ID=58837132

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611248409.0A Pending CN106657098A (en) 2016-12-29 2016-12-29 Authentication method, apparatus and system for logging in Linux operating system

Country Status (1)

Country Link
CN (1) CN106657098A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109067766A (en) * 2018-08-30 2018-12-21 郑州云海信息技术有限公司 A kind of identity identifying method, server end and client
CN109784022A (en) * 2018-11-27 2019-05-21 天津麒麟信息技术有限公司 System authentication method and device based on bio-identification under a kind of Linux
CN111092870A (en) * 2019-12-11 2020-05-01 国科晋云技术有限公司 Unified authentication method for multiple high-performance computing clusters
CN112334894A (en) * 2018-06-21 2021-02-05 微软技术许可有限责任公司 Account management using account activity usage limits
CN112699355A (en) * 2020-12-22 2021-04-23 湖南麒麟信安科技股份有限公司 Dynamic face authentication method and system with user and host decoupled
CN115085968A (en) * 2022-04-29 2022-09-20 麒麟软件有限公司 Login authentication method based on custom tag under Linux

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103366108A (en) * 2013-04-07 2013-10-23 谢济鸿 Iris login authentication method of computer operating system
CN103748829A (en) * 2011-07-15 2014-04-23 虹膜技术公司 Authentication method and device using single-use password including biometric image information
CN105282166A (en) * 2015-11-04 2016-01-27 浪潮(北京)电子信息产业有限公司 Identity authentication method and system for linux operating system
CN105975831A (en) * 2016-05-05 2016-09-28 北京元心科技有限公司 Method and system for providing unified identity recognition

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103748829A (en) * 2011-07-15 2014-04-23 虹膜技术公司 Authentication method and device using single-use password including biometric image information
CN103366108A (en) * 2013-04-07 2013-10-23 谢济鸿 Iris login authentication method of computer operating system
CN105282166A (en) * 2015-11-04 2016-01-27 浪潮(北京)电子信息产业有限公司 Identity authentication method and system for linux operating system
CN105975831A (en) * 2016-05-05 2016-09-28 北京元心科技有限公司 Method and system for providing unified identity recognition

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112334894A (en) * 2018-06-21 2021-02-05 微软技术许可有限责任公司 Account management using account activity usage limits
CN109067766A (en) * 2018-08-30 2018-12-21 郑州云海信息技术有限公司 A kind of identity identifying method, server end and client
CN109784022A (en) * 2018-11-27 2019-05-21 天津麒麟信息技术有限公司 System authentication method and device based on bio-identification under a kind of Linux
CN111092870A (en) * 2019-12-11 2020-05-01 国科晋云技术有限公司 Unified authentication method for multiple high-performance computing clusters
CN112699355A (en) * 2020-12-22 2021-04-23 湖南麒麟信安科技股份有限公司 Dynamic face authentication method and system with user and host decoupled
CN115085968A (en) * 2022-04-29 2022-09-20 麒麟软件有限公司 Login authentication method based on custom tag under Linux
CN115085968B (en) * 2022-04-29 2023-08-04 麒麟软件有限公司 Login authentication method based on custom tag under Linux

Similar Documents

Publication Publication Date Title
US11223614B2 (en) Single sign on with multiple authentication factors
CN106657098A (en) Authentication method, apparatus and system for logging in Linux operating system
US8683562B2 (en) Secure authentication using one-time passwords
CN111931144B (en) Unified safe login authentication method and device for operating system and service application
TWI592822B (en) Man-machine identification method, network service access method and the corresponding equipment
US10867058B2 (en) Method and system for protecting secure computer systems from insider threats
US20030101348A1 (en) Method and system for determining confidence in a digital transaction
US20110314288A1 (en) Circuit, system, device and method of authenticating a communication session and encrypting data thereof
US20160182491A1 (en) Methods, systems and apparatus to manage an authentication sequence
KR20070024633A (en) Renewable and private biometrics
CN109067766A (en) A kind of identity identifying method, server end and client
TWM623435U (en) System for verifying client identity and transaction services using multiple security levels
CN107733636A (en) Authentication method and Verification System
CN106161442A (en) A kind of system control user login method
CN108881218B (en) Data security enhancement method and system based on cloud storage management platform
CN102571874B (en) On-line audit method and device in distributed system
US11444784B2 (en) System and method for generation and verification of a subject's identity based on the subject's association with an organization
WO2022042745A1 (en) Key management method and apparatus
US9118660B2 (en) Method and system for providing access to encrypted data files for multiple federated authentication providers and verified identities
CN116112242B (en) Unified safety authentication method and system for power regulation and control system
US20090327704A1 (en) Strong authentication to a network
RU2573235C2 (en) System and method for checking authenticity of identity of person accessing data over computer network
Smejkal et al. Strong authentication using dynamic biometric signature
CN110784395B (en) Mail safety login method and system based on FIDO authentication
DE102016225354A1 (en) User authentication with a plurality of features

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170510