CN105630519A - Safety boot authentication method based on two-dimensional code - Google Patents
Safety boot authentication method based on two-dimensional code Download PDFInfo
- Publication number
- CN105630519A CN105630519A CN201410590073.0A CN201410590073A CN105630519A CN 105630519 A CN105630519 A CN 105630519A CN 201410590073 A CN201410590073 A CN 201410590073A CN 105630519 A CN105630519 A CN 105630519A
- Authority
- CN
- China
- Prior art keywords
- quick response
- response code
- opening terminal
- safety opening
- method based
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a safety boot authentication method based on a two-dimensional code, which is characterized by comprising the following steps of: S1, pressing a power button, enabling equipment to carry out self-checking, then loading a network card, and entering a two-dimensional code authentication module to carry out authentication; S2, generating a two-dimensional code by the two-dimensional code authentication module, connecting the two-dimensional code authentication module with a server, returning to reenter the two-dimensional code authentication module if authentication is not passed, and loading hard disk information if authentication is passed; S3, completing safety boot by loading an operation system and starting a two-dimensional code client; and S4, executing a preset strategy. According to the safety boot authentication method based on the two-dimensional code, which is provided by the invention, after the system is booted, the client is started up to execute an access strategy; and interconnection between machines can be achieved only when the machines have the same enterprise sequence number. Safety boot security and network safety are ensured.
Description
Technical field
The present invention relates to a kind of safety opening terminal authentication method based on Quick Response Code.
Background technology
Development along with technology, people use the frequency of computer also more and more higher, general computer is required for safety opening terminal before using, safety opening terminal is along with startup item, often the setting of some virus is exactly start operation code in the process of software at safety opening terminal, entrance system is destroyed, prior art does not have the special software or the method that keep safe safety opening terminal in safety opening terminal process.
Therefore, prior art needs to be improved.
Summary of the invention
The present invention is to solve the deficiencies in the prior art, it is provided that a kind of safety opening terminal authentication method based on Quick Response Code, open client after system start-up and access strategy is performed, the interconnection between machine must same enterprise serial number just can intercommunication. Take care of yourself safety opening terminal safety and network security.
For solving above-mentioned technical problem, a kind of safety opening terminal authentication method based on Quick Response Code that the embodiment of the present invention provides, adopt the following technical scheme that
A kind of safety opening terminal authentication method based on Quick Response Code, it is characterised in that comprise the steps:
S1: starting power key, equipment carries out self-inspection, then loads network interface card, enters Quick Response Code authentication module and is authenticated;
S2: Quick Response Code authentication module generates Quick Response Code Connection Service device, certification does not reenter Quick Response Code authentication module by then return, as passed through, then loads hard disk information;
S3: load operating system and complete safety opening terminal, start Quick Response Code client;
S4: performed preset strategy.
Specifically, this method is that one generates Quick Response Code by safety opening terminal, carries out a kind of management method of safety opening terminal by shooting Quick Response Code.
Specifically, this method be a kind of by network management manage all Quick Response Codes carry out security strategy carry out before safety opening terminal concentrate dispose a kind of method.
Specifically, described Quick Response Code is to be managed generating Quick Response Code client by server, carries out switching on and shutting down deployment by installing.
Specifically, this method is a kind of technology being carried out Network Isolation by enterprise's serial number.
A kind of safety opening terminal authentication method based on Quick Response Code provided by the invention, opens client and access strategy is performed after system start-up, the interconnection between machine must same enterprise serial number just can intercommunication. Take care of yourself safety opening terminal safety and network security.
Accompanying drawing explanation
Fig. 1 is the step schematic diagram of a kind of safety opening terminal authentication method based on Quick Response Code described in the embodiment of the present invention.
Detailed description of the invention
The safety opening terminal authentication method based on the Quick Response Code embodiment of the present invention being supplied to below in conjunction with accompanying drawing is described in detail.
As it is shown in figure 1, a kind of safety opening terminal authentication method based on Quick Response Code that the embodiment of the present invention provides, it is characterised in that comprise the steps:
S1: starting power key, equipment carries out self-inspection, then loads network interface card, enters Quick Response Code authentication module and is authenticated;
S2: Quick Response Code authentication module generates Quick Response Code Connection Service device, certification does not reenter Quick Response Code authentication module by then return, as passed through, then loads hard disk information;
S3: load operating system and complete safety opening terminal, start Quick Response Code client;
S4: performed preset strategy.
Specifically, this method is that one generates Quick Response Code by safety opening terminal, carries out a kind of management method of safety opening terminal by shooting Quick Response Code.
Specifically, this method be a kind of by network management manage all Quick Response Codes carry out security strategy carry out before safety opening terminal concentrate dispose a kind of method.
Specifically, described Quick Response Code is to be managed generating Quick Response Code client by server, carries out switching on and shutting down deployment by installing.
Specifically, this method is a kind of technology being carried out Network Isolation by enterprise's serial number.
System designs:
Client:
Link block: be attached with service end, is responsible for two-dimensional code display and returns user profile.
Control module: control the access strategy after login user and perform server policy.
Log pattern: the logon information of record user and policy deployment information.
Server end:
Registering modules: registered enterprise's information also generates enterprise's serial number.
Link block: be responsible for transmission and start the log-on message of module and the transmission of Quick Response Code.
Quick Response Code manages: generate corresponding credible two-dimension code according to user with enterprise serial number.
Start module: generate and possess the pxe startup file that startup comprises Quick Response Code, obtain hard disk right after being issued by pxe, carry out injecting and intercepting operating system when network interface card starts.
Pxe startup file comprises startup network interface card in the link information of server, and two-dimensional code display be passed back to server.
User manages: management needs the user profile started. Can forbid that user starts and opens user to start.
Policy module: distribute access strategy for user, and flushed to client by after the connection of client link block.
System operation instruction: native system is based on the Quick Response Code pxe client by tftp and dhcp distribution, Quick Response Code is generated at user side, after user gets believable user profile by Quick Response Code when shooting safety opening terminal, carry out safety opening terminal, then pass through a kind of safety method that client obtains the relevant access strategy of Quick Response Code.
Two-dimensional code generation method: Quick Response Code generates the coding of user and enterprise's serial number by server, is saved in pxe startup file.
Pxe startup file comprises System startup files and the Quick Response Code content of generation is shown by Quick Response Code display program.
User by shoot get in Quick Response Code be connected to inside server, server confirm active user can safety opening terminal, issue safety opening terminal instruction.
Quick Response Code display program is transferred to control module after getting safety opening terminal instruction, control after user profile and policy information is identified not finding needing loading strategy by module, startup system, as found to have in client server corresponding strategy generating hook program copy in system directory. And in System startup files, add log-on message.
A kind of safety opening terminal authentication method based on Quick Response Code provided by the invention, opens client and access strategy is performed after system start-up, the interconnection between machine must same enterprise serial number just can intercommunication. Take care of yourself safety opening terminal safety and network security.
The above; being only the specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, any those familiar with the art is in the technical scope that the invention discloses; change can be readily occurred in or replace, all should be encompassed within protection scope of the present invention. Therefore, protection scope of the present invention should described be as the criterion with scope of the claims.
Claims (5)
1. the safety opening terminal authentication method based on Quick Response Code, it is characterised in that comprise the steps:
S1: starting power key, equipment carries out self-inspection, then loads network interface card, enters Quick Response Code authentication module and is authenticated;
S2: Quick Response Code authentication module generates Quick Response Code Connection Service device, certification does not reenter Quick Response Code authentication module by then return, as passed through, then loads hard disk information;
S3: load operating system and complete safety opening terminal, start Quick Response Code client;
S4: performed preset strategy.
2. the safety opening terminal authentication method based on Quick Response Code according to claim 1, it is characterised in that this method is that one generates Quick Response Code by safety opening terminal, carries out a kind of management method of safety opening terminal by shooting Quick Response Code.
3. the safety opening terminal authentication method based on Quick Response Code according to claim 1, it is characterised in that this method be a kind of by network management manage all Quick Response Codes carry out security strategy carry out before safety opening terminal concentrate dispose a kind of method.
4. the safety opening terminal authentication method based on Quick Response Code according to claim 1, it is characterised in that described Quick Response Code is to be managed generating Quick Response Code client by server, carries out switching on and shutting down deployment by installing.
5. the safety opening terminal authentication method based on Quick Response Code according to claim 1, it is characterised in that this method is a kind of technology being carried out Network Isolation by enterprise's serial number.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410590073.0A CN105630519A (en) | 2014-10-29 | 2014-10-29 | Safety boot authentication method based on two-dimensional code |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410590073.0A CN105630519A (en) | 2014-10-29 | 2014-10-29 | Safety boot authentication method based on two-dimensional code |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105630519A true CN105630519A (en) | 2016-06-01 |
Family
ID=56045509
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410590073.0A Pending CN105630519A (en) | 2014-10-29 | 2014-10-29 | Safety boot authentication method based on two-dimensional code |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105630519A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101154252A (en) * | 2006-09-28 | 2008-04-02 | 知网生物识别科技股份有限公司 | Window login and authentication system and method thereof |
US20100070759A1 (en) * | 2008-09-17 | 2010-03-18 | Gmv Soluciones Globales Internet, S.A. | Method and system for authenticating a user by means of a mobile device |
CN101916348A (en) * | 2010-08-16 | 2010-12-15 | 武汉天喻信息产业股份有限公司 | Method and system for safely guiding operating system of user |
US8763097B2 (en) * | 2011-03-11 | 2014-06-24 | Piyush Bhatnagar | System, design and process for strong authentication using bidirectional OTP and out-of-band multichannel authentication |
CN103888436A (en) * | 2012-12-20 | 2014-06-25 | 伊姆西公司 | User authentication method and device |
CN104092549A (en) * | 2014-07-18 | 2014-10-08 | 上海众人科技有限公司 | Dynamic password authentication implementation method and system and dynamic scrambler |
-
2014
- 2014-10-29 CN CN201410590073.0A patent/CN105630519A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101154252A (en) * | 2006-09-28 | 2008-04-02 | 知网生物识别科技股份有限公司 | Window login and authentication system and method thereof |
US20100070759A1 (en) * | 2008-09-17 | 2010-03-18 | Gmv Soluciones Globales Internet, S.A. | Method and system for authenticating a user by means of a mobile device |
CN101916348A (en) * | 2010-08-16 | 2010-12-15 | 武汉天喻信息产业股份有限公司 | Method and system for safely guiding operating system of user |
US8763097B2 (en) * | 2011-03-11 | 2014-06-24 | Piyush Bhatnagar | System, design and process for strong authentication using bidirectional OTP and out-of-band multichannel authentication |
CN103888436A (en) * | 2012-12-20 | 2014-06-25 | 伊姆西公司 | User authentication method and device |
CN104092549A (en) * | 2014-07-18 | 2014-10-08 | 上海众人科技有限公司 | Dynamic password authentication implementation method and system and dynamic scrambler |
Non-Patent Citations (1)
Title |
---|
本书编委会编著: "《局域网组建与维护》", 31 January 2008 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105474225B (en) | Computing resource is monitored automatically in data center based on cloud | |
US10194321B2 (en) | Periodic mobile forensics | |
US20150373023A1 (en) | Enabling User Entropy Encryption in Non-Compliant Mobile Applications | |
CN105827600B (en) | Method and device for logging in client | |
CN108965480A (en) | Cloud desktop login management-control method, device and computer readable storage medium | |
AU2015358292B2 (en) | Computing systems and methods | |
CN102945337A (en) | On-line self-help management method and system of Subversion user password | |
US20100223558A1 (en) | Remote desktop connection to any private desktop to tam e-sso access agent | |
US10103948B1 (en) | Computing devices for sending and receiving configuration information | |
CN103309721A (en) | Virtual machine monitor management system and method | |
CN105825131A (en) | Computer security startup protection method on basis of UEFI (Unified Extensible Firmware Interface) | |
CN105718171B (en) | A kind of data processing method and terminal | |
CN110221949A (en) | Automate operation management method, apparatus, equipment and readable storage medium storing program for executing | |
CN104392152A (en) | Start-up method of embedded equipment, embedded equipment, server and system | |
CN103997487A (en) | Safe network-surfing isolation method based on browser | |
CN111460410A (en) | Server login method, device and system and computer readable storage medium | |
CN105763638A (en) | Cloud terminal reverse control system | |
CN104270754A (en) | SIM authentication method and device | |
CN105812370A (en) | Smart card processing method, device and system | |
US20230135968A1 (en) | Control of access to computing resources implemented in isolated environments | |
KR20190062797A (en) | User terminal for using cloud service, integrated security management server of user terminal and method thereof | |
EP3085007B1 (en) | Push-based trust model for public cloud applications | |
CN107615293A (en) | Platform management method and equipment including expired detection | |
CN102905052B (en) | Scanning method and system and scanner | |
CN101984585A (en) | Centralized management method for server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20160601 |