CN105630519A - Safety boot authentication method based on two-dimensional code - Google Patents

Safety boot authentication method based on two-dimensional code Download PDF

Info

Publication number
CN105630519A
CN105630519A CN201410590073.0A CN201410590073A CN105630519A CN 105630519 A CN105630519 A CN 105630519A CN 201410590073 A CN201410590073 A CN 201410590073A CN 105630519 A CN105630519 A CN 105630519A
Authority
CN
China
Prior art keywords
quick response
response code
opening terminal
safety opening
method based
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410590073.0A
Other languages
Chinese (zh)
Inventor
蒋斐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Wei Dun Network Technology Co Ltd
Original Assignee
Jiangsu Wei Dun Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Wei Dun Network Technology Co Ltd filed Critical Jiangsu Wei Dun Network Technology Co Ltd
Priority to CN201410590073.0A priority Critical patent/CN105630519A/en
Publication of CN105630519A publication Critical patent/CN105630519A/en
Pending legal-status Critical Current

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a safety boot authentication method based on a two-dimensional code, which is characterized by comprising the following steps of: S1, pressing a power button, enabling equipment to carry out self-checking, then loading a network card, and entering a two-dimensional code authentication module to carry out authentication; S2, generating a two-dimensional code by the two-dimensional code authentication module, connecting the two-dimensional code authentication module with a server, returning to reenter the two-dimensional code authentication module if authentication is not passed, and loading hard disk information if authentication is passed; S3, completing safety boot by loading an operation system and starting a two-dimensional code client; and S4, executing a preset strategy. According to the safety boot authentication method based on the two-dimensional code, which is provided by the invention, after the system is booted, the client is started up to execute an access strategy; and interconnection between machines can be achieved only when the machines have the same enterprise sequence number. Safety boot security and network safety are ensured.

Description

A kind of safety opening terminal authentication method based on Quick Response Code
Technical field
The present invention relates to a kind of safety opening terminal authentication method based on Quick Response Code.
Background technology
Development along with technology, people use the frequency of computer also more and more higher, general computer is required for safety opening terminal before using, safety opening terminal is along with startup item, often the setting of some virus is exactly start operation code in the process of software at safety opening terminal, entrance system is destroyed, prior art does not have the special software or the method that keep safe safety opening terminal in safety opening terminal process.
Therefore, prior art needs to be improved.
Summary of the invention
The present invention is to solve the deficiencies in the prior art, it is provided that a kind of safety opening terminal authentication method based on Quick Response Code, open client after system start-up and access strategy is performed, the interconnection between machine must same enterprise serial number just can intercommunication. Take care of yourself safety opening terminal safety and network security.
For solving above-mentioned technical problem, a kind of safety opening terminal authentication method based on Quick Response Code that the embodiment of the present invention provides, adopt the following technical scheme that
A kind of safety opening terminal authentication method based on Quick Response Code, it is characterised in that comprise the steps:
S1: starting power key, equipment carries out self-inspection, then loads network interface card, enters Quick Response Code authentication module and is authenticated;
S2: Quick Response Code authentication module generates Quick Response Code Connection Service device, certification does not reenter Quick Response Code authentication module by then return, as passed through, then loads hard disk information;
S3: load operating system and complete safety opening terminal, start Quick Response Code client;
S4: performed preset strategy.
Specifically, this method is that one generates Quick Response Code by safety opening terminal, carries out a kind of management method of safety opening terminal by shooting Quick Response Code.
Specifically, this method be a kind of by network management manage all Quick Response Codes carry out security strategy carry out before safety opening terminal concentrate dispose a kind of method.
Specifically, described Quick Response Code is to be managed generating Quick Response Code client by server, carries out switching on and shutting down deployment by installing.
Specifically, this method is a kind of technology being carried out Network Isolation by enterprise's serial number.
A kind of safety opening terminal authentication method based on Quick Response Code provided by the invention, opens client and access strategy is performed after system start-up, the interconnection between machine must same enterprise serial number just can intercommunication. Take care of yourself safety opening terminal safety and network security.
Accompanying drawing explanation
Fig. 1 is the step schematic diagram of a kind of safety opening terminal authentication method based on Quick Response Code described in the embodiment of the present invention.
Detailed description of the invention
The safety opening terminal authentication method based on the Quick Response Code embodiment of the present invention being supplied to below in conjunction with accompanying drawing is described in detail.
As it is shown in figure 1, a kind of safety opening terminal authentication method based on Quick Response Code that the embodiment of the present invention provides, it is characterised in that comprise the steps:
S1: starting power key, equipment carries out self-inspection, then loads network interface card, enters Quick Response Code authentication module and is authenticated;
S2: Quick Response Code authentication module generates Quick Response Code Connection Service device, certification does not reenter Quick Response Code authentication module by then return, as passed through, then loads hard disk information;
S3: load operating system and complete safety opening terminal, start Quick Response Code client;
S4: performed preset strategy.
Specifically, this method is that one generates Quick Response Code by safety opening terminal, carries out a kind of management method of safety opening terminal by shooting Quick Response Code.
Specifically, this method be a kind of by network management manage all Quick Response Codes carry out security strategy carry out before safety opening terminal concentrate dispose a kind of method.
Specifically, described Quick Response Code is to be managed generating Quick Response Code client by server, carries out switching on and shutting down deployment by installing.
Specifically, this method is a kind of technology being carried out Network Isolation by enterprise's serial number.
System designs:
Client:
Link block: be attached with service end, is responsible for two-dimensional code display and returns user profile.
Control module: control the access strategy after login user and perform server policy.
Log pattern: the logon information of record user and policy deployment information.
Server end:
Registering modules: registered enterprise's information also generates enterprise's serial number.
Link block: be responsible for transmission and start the log-on message of module and the transmission of Quick Response Code.
Quick Response Code manages: generate corresponding credible two-dimension code according to user with enterprise serial number.
Start module: generate and possess the pxe startup file that startup comprises Quick Response Code, obtain hard disk right after being issued by pxe, carry out injecting and intercepting operating system when network interface card starts.
Pxe startup file comprises startup network interface card in the link information of server, and two-dimensional code display be passed back to server.
User manages: management needs the user profile started. Can forbid that user starts and opens user to start.
Policy module: distribute access strategy for user, and flushed to client by after the connection of client link block.
System operation instruction: native system is based on the Quick Response Code pxe client by tftp and dhcp distribution, Quick Response Code is generated at user side, after user gets believable user profile by Quick Response Code when shooting safety opening terminal, carry out safety opening terminal, then pass through a kind of safety method that client obtains the relevant access strategy of Quick Response Code.
Two-dimensional code generation method: Quick Response Code generates the coding of user and enterprise's serial number by server, is saved in pxe startup file.
Pxe startup file comprises System startup files and the Quick Response Code content of generation is shown by Quick Response Code display program.
User by shoot get in Quick Response Code be connected to inside server, server confirm active user can safety opening terminal, issue safety opening terminal instruction.
Quick Response Code display program is transferred to control module after getting safety opening terminal instruction, control after user profile and policy information is identified not finding needing loading strategy by module, startup system, as found to have in client server corresponding strategy generating hook program copy in system directory. And in System startup files, add log-on message.
A kind of safety opening terminal authentication method based on Quick Response Code provided by the invention, opens client and access strategy is performed after system start-up, the interconnection between machine must same enterprise serial number just can intercommunication. Take care of yourself safety opening terminal safety and network security.
The above; being only the specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, any those familiar with the art is in the technical scope that the invention discloses; change can be readily occurred in or replace, all should be encompassed within protection scope of the present invention. Therefore, protection scope of the present invention should described be as the criterion with scope of the claims.

Claims (5)

1. the safety opening terminal authentication method based on Quick Response Code, it is characterised in that comprise the steps:
S1: starting power key, equipment carries out self-inspection, then loads network interface card, enters Quick Response Code authentication module and is authenticated;
S2: Quick Response Code authentication module generates Quick Response Code Connection Service device, certification does not reenter Quick Response Code authentication module by then return, as passed through, then loads hard disk information;
S3: load operating system and complete safety opening terminal, start Quick Response Code client;
S4: performed preset strategy.
2. the safety opening terminal authentication method based on Quick Response Code according to claim 1, it is characterised in that this method is that one generates Quick Response Code by safety opening terminal, carries out a kind of management method of safety opening terminal by shooting Quick Response Code.
3. the safety opening terminal authentication method based on Quick Response Code according to claim 1, it is characterised in that this method be a kind of by network management manage all Quick Response Codes carry out security strategy carry out before safety opening terminal concentrate dispose a kind of method.
4. the safety opening terminal authentication method based on Quick Response Code according to claim 1, it is characterised in that described Quick Response Code is to be managed generating Quick Response Code client by server, carries out switching on and shutting down deployment by installing.
5. the safety opening terminal authentication method based on Quick Response Code according to claim 1, it is characterised in that this method is a kind of technology being carried out Network Isolation by enterprise's serial number.
CN201410590073.0A 2014-10-29 2014-10-29 Safety boot authentication method based on two-dimensional code Pending CN105630519A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410590073.0A CN105630519A (en) 2014-10-29 2014-10-29 Safety boot authentication method based on two-dimensional code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410590073.0A CN105630519A (en) 2014-10-29 2014-10-29 Safety boot authentication method based on two-dimensional code

Publications (1)

Publication Number Publication Date
CN105630519A true CN105630519A (en) 2016-06-01

Family

ID=56045509

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410590073.0A Pending CN105630519A (en) 2014-10-29 2014-10-29 Safety boot authentication method based on two-dimensional code

Country Status (1)

Country Link
CN (1) CN105630519A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101154252A (en) * 2006-09-28 2008-04-02 知网生物识别科技股份有限公司 Window login and authentication system and method thereof
US20100070759A1 (en) * 2008-09-17 2010-03-18 Gmv Soluciones Globales Internet, S.A. Method and system for authenticating a user by means of a mobile device
CN101916348A (en) * 2010-08-16 2010-12-15 武汉天喻信息产业股份有限公司 Method and system for safely guiding operating system of user
US8763097B2 (en) * 2011-03-11 2014-06-24 Piyush Bhatnagar System, design and process for strong authentication using bidirectional OTP and out-of-band multichannel authentication
CN103888436A (en) * 2012-12-20 2014-06-25 伊姆西公司 User authentication method and device
CN104092549A (en) * 2014-07-18 2014-10-08 上海众人科技有限公司 Dynamic password authentication implementation method and system and dynamic scrambler

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101154252A (en) * 2006-09-28 2008-04-02 知网生物识别科技股份有限公司 Window login and authentication system and method thereof
US20100070759A1 (en) * 2008-09-17 2010-03-18 Gmv Soluciones Globales Internet, S.A. Method and system for authenticating a user by means of a mobile device
CN101916348A (en) * 2010-08-16 2010-12-15 武汉天喻信息产业股份有限公司 Method and system for safely guiding operating system of user
US8763097B2 (en) * 2011-03-11 2014-06-24 Piyush Bhatnagar System, design and process for strong authentication using bidirectional OTP and out-of-band multichannel authentication
CN103888436A (en) * 2012-12-20 2014-06-25 伊姆西公司 User authentication method and device
CN104092549A (en) * 2014-07-18 2014-10-08 上海众人科技有限公司 Dynamic password authentication implementation method and system and dynamic scrambler

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
本书编委会编著: "《局域网组建与维护》", 31 January 2008 *

Similar Documents

Publication Publication Date Title
CN105474225B (en) Computing resource is monitored automatically in data center based on cloud
US10194321B2 (en) Periodic mobile forensics
US20150373023A1 (en) Enabling User Entropy Encryption in Non-Compliant Mobile Applications
CN105827600B (en) Method and device for logging in client
CN108965480A (en) Cloud desktop login management-control method, device and computer readable storage medium
AU2015358292B2 (en) Computing systems and methods
CN102945337A (en) On-line self-help management method and system of Subversion user password
US20100223558A1 (en) Remote desktop connection to any private desktop to tam e-sso access agent
US10103948B1 (en) Computing devices for sending and receiving configuration information
CN103309721A (en) Virtual machine monitor management system and method
CN105825131A (en) Computer security startup protection method on basis of UEFI (Unified Extensible Firmware Interface)
CN105718171B (en) A kind of data processing method and terminal
CN110221949A (en) Automate operation management method, apparatus, equipment and readable storage medium storing program for executing
CN104392152A (en) Start-up method of embedded equipment, embedded equipment, server and system
CN103997487A (en) Safe network-surfing isolation method based on browser
CN111460410A (en) Server login method, device and system and computer readable storage medium
CN105763638A (en) Cloud terminal reverse control system
CN104270754A (en) SIM authentication method and device
CN105812370A (en) Smart card processing method, device and system
US20230135968A1 (en) Control of access to computing resources implemented in isolated environments
KR20190062797A (en) User terminal for using cloud service, integrated security management server of user terminal and method thereof
EP3085007B1 (en) Push-based trust model for public cloud applications
CN107615293A (en) Platform management method and equipment including expired detection
CN102905052B (en) Scanning method and system and scanner
CN101984585A (en) Centralized management method for server

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160601