CN110895511B - Authentication method and equipment of operating system and storage medium - Google Patents

Authentication method and equipment of operating system and storage medium Download PDF

Info

Publication number
CN110895511B
CN110895511B CN201911201465.2A CN201911201465A CN110895511B CN 110895511 B CN110895511 B CN 110895511B CN 201911201465 A CN201911201465 A CN 201911201465A CN 110895511 B CN110895511 B CN 110895511B
Authority
CN
China
Prior art keywords
processor
version
operating system
preset
type
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911201465.2A
Other languages
Chinese (zh)
Other versions
CN110895511A (en
Inventor
徐杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Inspur Intelligent Technology Co Ltd
Original Assignee
Suzhou Inspur Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Inspur Intelligent Technology Co Ltd filed Critical Suzhou Inspur Intelligent Technology Co Ltd
Priority to CN201911201465.2A priority Critical patent/CN110895511B/en
Publication of CN110895511A publication Critical patent/CN110895511A/en
Application granted granted Critical
Publication of CN110895511B publication Critical patent/CN110895511B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3604Software analysis for verifying properties of programs
    • G06F11/3616Software analysis for verifying properties of programs using software metrics

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

The invention discloses an authentication method of an operating system, which comprises the following steps: acquiring the type and version of an operating system and the type and core number of a processor; judging whether the version of the operating system is not less than a preset version corresponding to the type of the operating system; responding to the fact that the version of the operating system is not smaller than the preset version, and judging whether the number of the cores of the processor is not larger than the preset number of the cores corresponding to the type of the processor or not; and responding to the condition that the number of the cores of the processor is not more than the preset number of the cores, and returning a prompt without authentication. The invention also discloses a computer device and a readable storage medium. According to the scheme disclosed by the invention, the version of the operating system and the core number of the processor are respectively compared with the preset version and the preset core number, if the requirements are met, authentication testing is not required, the later maintenance labor cost is reduced, the probability of re-authentication and wrong authentication is reduced, and the working efficiency is improved.

Description

Authentication method and equipment of operating system and storage medium
Technical Field
The present invention relates to the field of authentication, and in particular, to an authentication method, device, and storage medium for an operating system.
Background
With the improvement of customer experience and technical support appeal, the requirements on compatibility and stability of computer hardware products and operating systems are higher and higher, operating system manufacturers provide operating system certification services, and if the certification services pass through certification tests, the product is proved to be 100% compatible with the operating systems, so that the computer system achieves unprecedented stability.
Both the operating system and the hardware (mainly referred to as CPU) of the computer product are continuously updated, and each update is performed with an authentication test, which requires a large amount of manpower and material resources to support and trigger many repetitive operations.
Disclosure of Invention
In view of this, in order to overcome at least one aspect of the above problems, an embodiment of the present invention provides an authentication method for an operating system, including:
acquiring the type and the version of an operating system and the type and the core number of a processor;
judging whether the version of the operating system is not less than a preset version corresponding to the type of the operating system or not;
responding to the fact that the version of the operating system is not smaller than the preset version, and judging whether the number of cores of the processor is not larger than the preset number of cores corresponding to the type of the processor or not;
and responding to the condition that the number of the cores of the processor is not more than the preset number of the cores, and returning a prompt without authentication.
In some embodiments, further comprising:
acquiring all versions of a plurality of operating systems of different types and a plurality of processors of different types;
respectively determining the lowest version of each type of processor which can be supported by the operating system of each type;
performing authentication test by using the operating system with the lowest version and the processor with the highest core number in the corresponding processor type;
and responding to the passing of the authentication test, and taking the lowest version as a preset version and the core number of the processor with the highest core number as a preset core number.
In some embodiments, further comprising:
and responding to the situation that the version of the operating system is smaller than the preset version, and returning a prompt needing authentication.
In some embodiments, further comprising:
and responding to the condition that the number of the cores of the processor is larger than the preset number of the cores, and returning a prompt which needs to be authenticated.
In some embodiments, obtaining all versions of a number of different types of operating systems further comprises:
judging whether the operating system can be backward compatible according to the type;
in response to the operating system being backward compatible, the subsequent steps are performed.
Based on the same inventive concept, according to another aspect of the present invention, an embodiment of the present invention further provides a computer apparatus, including:
at least one processor; and
a memory storing a computer program operable on the processor, wherein the processor executes the program to perform the steps of:
acquiring the type and version of an operating system and the type and core number of a processor;
judging whether the version of the operating system is not less than a preset version corresponding to the type of the operating system;
responding to the fact that the version of the operating system is not smaller than the preset version, and judging whether the number of cores of the processor is not larger than the preset number of cores corresponding to the type of the processor or not;
and responding to the condition that the number of the cores of the processor is not more than the preset number of the cores, and returning a prompt without authentication.
In some embodiments, further comprising:
acquiring all versions of a plurality of operating systems of different types and a plurality of processors of different types;
respectively determining the lowest version of each type of processor which can be supported by the operating system of each type;
performing authentication test by using the operating system with the lowest version and the processor with the highest core number in the corresponding processor type;
and responding to the passing of the authentication test, and taking the lowest version as a preset version and the core number of the processor with the highest core number as a preset core number.
In some embodiments, further comprising:
and responding to the situation that the version of the operating system is smaller than the preset version, and returning a prompt that the authentication needs to be carried out.
In some embodiments, further comprising:
and responding to the condition that the number of the cores of the processor is larger than the preset number of the cores, and returning a prompt which needs to be authenticated.
Based on the same inventive concept, according to another aspect of the present invention, an embodiment of the present invention further provides a computer-readable storage medium storing a computer program which, when executed by a processor, performs the steps of the authentication method of an operating system as described above.
The invention has one of the following beneficial technical effects: according to the scheme disclosed by the invention, the version of the operating system and the kernel number of the processor are respectively compared with the preset version and the preset kernel number, if the requirements are met, an authentication test is not required, the later maintenance labor cost is reduced, the probability of re-authentication and wrong authentication is reduced, and the working efficiency is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other embodiments can be obtained by using the drawings without creative efforts.
Fig. 1 is a flowchart illustrating an authentication method of an operating system according to an embodiment of the present invention;
FIG. 2 is a schematic structural diagram of a computer device provided in an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a computer-readable storage medium according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the following embodiments of the present invention are described in further detail with reference to the accompanying drawings.
It should be noted that all expressions using "first" and "second" in the embodiments of the present invention are used for distinguishing two entities with the same name but different names or different parameters, and it should be noted that "first" and "second" are merely for convenience of description and should not be construed as limitations of the embodiments of the present invention, and they are not described in any more detail in the following embodiments.
It should be noted that, in the embodiments of the present invention, different types of processors refer to different generations of processors due to architecture and/or manufacturing process.
According to an aspect of the present invention, an embodiment of the present invention provides an operating system authentication method, as shown in fig. 1, which may include the steps of: s1, acquiring the type and version of an operating system and the type and core number of a processor; s2, judging whether the version of the operating system is not less than a preset version corresponding to the type of the operating system; s3, responding to the fact that the version of the operating system is not smaller than the preset version, and judging whether the number of the cores of the processor is not larger than the preset number of the cores corresponding to the type of the processor or not; and S4, responding to the condition that the core number of the processor is not more than the preset core number, and returning to a prompt without authentication.
According to the scheme disclosed by the invention, the version of the operating system and the kernel number of the processor are respectively compared with the preset version and the preset kernel number, if the requirements are met, an authentication test is not required, the later maintenance labor cost is reduced, the probability of re-authentication and wrong authentication is reduced, and the working efficiency is improved.
In some embodiments, further comprising:
acquiring all versions of a plurality of different types of operating systems and a plurality of different types of processors;
respectively determining the lowest version of each type of processor which can be supported by the operating system of each type;
performing an authentication test by using the operating system with the lowest version and the processor with the highest core number in the corresponding processor type;
and responding to the passing of the authentication test, and taking the lowest version as a preset version and the core number of the processor with the highest core number as a preset core number.
Specifically, in some embodiments, the preset versions corresponding to different types of operating systems and the preset core numbers corresponding to different types of processors may be predetermined, for example, the model of a processor may be used to determine the lowest version of the operating system capable of supporting the processor of the model.
In this way, an authentication test is performed through the lowest version of each type of operating system and the processor of the highest core in each type of processor, and after the authentication is passed, a combination of the lowest version corresponding to the plurality of operating systems and the highest core number corresponding to the processor can be obtained, wherein the core number corresponding to the processor of the highest core of each type can be used as a preset core number, and the lowest version of the operating system of the processor of the type can be supported as the preset version. As long as the current version of the operating system and the current core number of the processor can correspond to the combination, that is, the current version of the operating system is not less than the preset version in the combination and the current core number of the processor is not more than the preset core number in the combination, the authentication test on the current operating system and the processor is not needed, for example, if the combination is the version a of the operating system a and the core number B of the processor B, the current operating system is the version (a + 1) a, and the current processor is the (B-1) core B, the authentication test is not needed.
In some embodiments, further comprising:
and responding to the situation that the version of the operating system is smaller than the preset version, and returning a prompt needing authentication.
Specifically, if the version of the current operating system is lower than the preset version, it indicates that the current operating system cannot correspond to the combination, and therefore the certification test needs to be performed, that is, a prompt for performing the certification test is returned.
In some embodiments, further comprising:
and responding to the condition that the number of the cores of the processor is greater than the preset number of the cores, and returning a prompt needing authentication.
Specifically, if the core number of the current processor is greater than the preset core number, it indicates that the current eating and drinking machine cannot correspond to the combination, and therefore the authentication test needs to be performed, that is, a prompt for performing the authentication test is returned
In some embodiments, obtaining all versions of a number of different types of operating systems further comprises:
judging whether the operating system can be backward compatible according to the type;
in response to the operating system being backward compatible, the subsequent steps are performed.
The following takes the red cap operating system, skylake processor and cascade lake processor as examples to describe the authentication method proposed in the present invention in detail.
Firstly, whether the red-cap operating system can be backward compatible is confirmed, namely, the 7.2 version red-cap system obtains the certification which corresponds to the 7.3,7.4 \8230and7. X subsequent versions thereof automatically obtain the certification.
Then, respectively determining the lowest version of the red cap operating systems capable of supporting the skylake processor and the cascade processor, namely, the 7.3 version of the red cap operating system starts to support the skylake processor, and the 7.6 version of the red cap operating system starts to support the cascade processor, namely, if the authentication of the collocated skylake processor product is executed, selecting the red cap 7.3 as the target operating system version; if the cascade lake processor is collocated, the red cap 7.6 is selected. And then respectively authenticating the 7.3 version red cap operating system collocated with the highest core skylake processor and the 7.6 version red cap operating system collocated with the highest core skylake processor, and if the authentication tests are passed, obtaining the core numbers of a combination 1-version 7.3 and the highest core skylake processor and the core numbers of a combination 2-version 7.6 and the highest core skylake processor.
Therefore, two groups of preset parameters (a preset version and a preset kernel number) can be obtained, then the two groups of preset parameters are used for judging the current operating system and the processor, if the current operating system version and the current processor kernel number are compared with the preset parameters and meet the conditions, the operating system and the processor of the current version do not need to be tested, and if the current operating system version and the current processor kernel number do not meet the conditions, the operating system and the processor of the current version need to be tested.
According to the scheme disclosed by the invention, the version of the operating system and the kernel number of the processor are respectively compared with the preset version and the preset kernel number, if the requirements are met, an authentication test is not required, the later maintenance labor cost is reduced, the probability of re-authentication and wrong authentication is reduced, and the working efficiency is improved.
Based on the same inventive concept, according to another aspect of the present invention, as shown in fig. 2, an embodiment of the present invention further provides a computer apparatus 501, comprising:
at least one processor 520; and
a memory 510, the memory 510 storing a computer program 511 operable on the processor, the processor 520 executing the program to perform the steps of any of the above operating system authentication methods.
Based on the same inventive concept, according to another aspect of the present invention, as shown in fig. 3, an embodiment of the present invention further provides a computer-readable storage medium 601, where the computer-readable storage medium 601 stores computer program instructions 610, and the computer program instructions 610, when executed by a processor, perform the steps of the authentication method of any one of the above operating systems.
Finally, it should be noted that, as will be understood by those skilled in the art, all or part of the processes of the methods of the above embodiments may be implemented by a computer program to instruct related hardware to implement the methods. The storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), a Random Access Memory (RAM), or the like. The embodiments of the computer program may achieve the same or similar effects as any of the above-described method embodiments.
In addition, the apparatuses, devices, and the like disclosed in the embodiments of the present invention may be various electronic terminal devices, such as a mobile phone, a Personal Digital Assistant (PDA), a tablet computer (PAD), a smart television, and the like, or may be a large terminal device, such as a server, and the like, and therefore the scope of protection disclosed in the embodiments of the present invention should not be limited to a specific type of apparatus, device. The client disclosed by the embodiment of the invention can be applied to any one of the electronic terminal devices in the form of electronic hardware, computer software or a combination of the electronic hardware and the computer software.
Furthermore, the method disclosed according to an embodiment of the present invention may also be implemented as a computer program executed by a CPU, which may be stored in a computer-readable storage medium. The computer program, when executed by the CPU, performs the functions defined above in the methods disclosed in the embodiments of the present invention.
Further, the above method steps and system elements may also be implemented using a controller and a computer readable storage medium for storing a computer program for causing the controller to implement the functions of the above steps or elements.
Further, it should be understood that the computer-readable storage medium herein (e.g., memory) can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory. By way of example, and not limitation, nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM), which can act as external cache memory. By way of example and not limitation, RAM may be available in a variety of forms such as synchronous RAM (DRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchlink DRAM (SLDRAM), and Direct Rambus RAM (DRRAM). The storage devices of the disclosed aspects are intended to comprise, without being limited to, these and other suitable types of memory.
Those of skill would further appreciate that the various illustrative logical blocks, modules, circuits, and algorithm steps described in connection with the disclosure herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as software or hardware depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present disclosure.
The various illustrative logical blocks, modules, and circuits described in connection with the disclosure herein may be implemented or performed with the following components designed to perform the functions herein: a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination of these components. A general purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP, and/or any other such configuration.
The steps of a method or algorithm described in connection with the disclosure herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an ASIC. The ASIC may reside in a user terminal. In the alternative, the processor and the storage medium may reside as discrete components in a user terminal.
In one or more exemplary designs, the functions may be implemented in hardware, software, firmware, or any combination thereof. If implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer. By way of example, and not limitation, such computer-readable media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a general-purpose or special-purpose computer, or a general-purpose or special-purpose processor. Also, any connection is properly termed a computer-readable medium. For example, if the software is transmitted from a website, server, or other remote source using a coaxial cable, fiber optic cable, twisted pair, digital Subscriber Line (DSL), or wireless technologies such as infrared, radio, and microwave, then the coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, and microwave are included in the definition of medium. Disk and disc, as used herein, includes Compact Disc (CD), laser disc, optical disc, digital Versatile Disc (DVD), floppy disk, blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media.
The foregoing is an exemplary embodiment of the present disclosure, but it should be noted that various changes and modifications could be made herein without departing from the scope of the present disclosure as defined by the appended claims. The functions, steps and/or actions of the method claims in accordance with the disclosed embodiments described herein need not be performed in any particular order. Furthermore, although elements of the disclosed embodiments of the invention may be described or claimed in the singular, the plural is contemplated unless limitation to the singular is explicitly stated.
It should be understood that, as used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly supports the exception. It should also be understood that "and/or" as used herein is meant to include any and all possible combinations of one or more of the associated listed items.
The numbers of the embodiments disclosed in the embodiments of the present invention are merely for description, and do not represent the merits of the embodiments.
It will be understood by those skilled in the art that all or part of the steps of implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, and the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
Those of ordinary skill in the art will understand that: the discussion of any embodiment above is meant to be exemplary only, and is not intended to intimate that the scope of the disclosure, including the claims, of embodiments of the invention is limited to these examples; within the idea of an embodiment of the invention, also combinations between technical features in the above embodiments or in different embodiments are possible, and there are many other variations of the different aspects of the embodiments of the invention as described above, which are not provided in detail for the sake of brevity. Therefore, any omissions, modifications, substitutions, improvements, and the like that may be made without departing from the spirit and principles of the embodiments of the present invention are intended to be included within the scope of the embodiments of the present invention.

Claims (10)

1. An authentication method of an operating system, comprising the steps of:
acquiring the type and version of an operating system and the type and core number of a processor;
judging whether the version of the operating system is not less than a preset version corresponding to the type of the operating system;
responding to the fact that the version of the operating system is not smaller than the preset version, and judging whether the number of cores of the processor is not larger than the preset number of cores corresponding to the type of the processor or not;
and responding to the condition that the number of the cores of the processor is not more than the preset number of the cores, and returning a prompt without authentication.
2. The authentication method of claim 1, further comprising:
acquiring all versions of a plurality of different types of operating systems and a plurality of different types of processors;
respectively determining the lowest version of each type of processor which can be supported by the operating system of each type;
performing an authentication test by using the operating system with the lowest version and the processor with the highest core number in the corresponding processor type;
and responding to the passing of the authentication test, and taking the lowest version as a preset version and the core number of the processor with the highest core number as a preset core number.
3. The authentication method of claim 1, further comprising:
and responding to the situation that the version of the operating system is smaller than the preset version, and returning a prompt that the authentication needs to be carried out.
4. The authentication method of claim 1, further comprising:
and responding to the condition that the number of the cores of the processor is greater than the preset number of the cores, and returning a prompt needing authentication.
5. The authentication method of claim 2, wherein obtaining all versions of a number of different types of operating systems, further comprises:
judging whether the operating system can be backward compatible according to the type;
in response to the operating system being backward compatible, the subsequent steps are performed.
6. A computer device, comprising:
at least one processor; and
a memory storing a computer program operable on the processor, wherein the processor executes the program to perform the steps of:
acquiring the type and version of an operating system and the type and core number of a processor;
judging whether the version of the operating system is not less than a preset version corresponding to the type of the operating system;
responding to the fact that the version of the operating system is not smaller than the preset version, and judging whether the number of cores of the processor is not larger than the preset number of cores corresponding to the type of the processor or not;
and responding to the condition that the number of the cores of the processor is not more than the preset number of the cores, and returning a prompt without authentication.
7. The computer device of claim 6, further comprising:
acquiring all versions of a plurality of different types of operating systems and a plurality of different types of processors;
respectively determining the lowest version of each type of processor which can be supported by the operating system of each type;
performing authentication test by using the operating system with the lowest version and the processor with the highest core number in the corresponding processor type;
and responding to the passing of the authentication test, and taking the lowest version as a preset version and the core number of the processor with the highest core number as a preset core number.
8. The computer device of claim 6, further comprising:
and responding to the situation that the version of the operating system is smaller than the preset version, and returning a prompt needing authentication.
9. The computer device of claim 6, further comprising:
and responding to the condition that the number of the cores of the processor is larger than the preset number of the cores, and returning a prompt which needs to be authenticated.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the authentication method according to any one of claims 1 to 5.
CN201911201465.2A 2019-11-29 2019-11-29 Authentication method and equipment of operating system and storage medium Active CN110895511B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911201465.2A CN110895511B (en) 2019-11-29 2019-11-29 Authentication method and equipment of operating system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911201465.2A CN110895511B (en) 2019-11-29 2019-11-29 Authentication method and equipment of operating system and storage medium

Publications (2)

Publication Number Publication Date
CN110895511A CN110895511A (en) 2020-03-20
CN110895511B true CN110895511B (en) 2022-11-29

Family

ID=69786792

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911201465.2A Active CN110895511B (en) 2019-11-29 2019-11-29 Authentication method and equipment of operating system and storage medium

Country Status (1)

Country Link
CN (1) CN110895511B (en)

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107463427A (en) * 2017-06-29 2017-12-12 北京北信源软件股份有限公司 The acquisition methods and device of a kind of VME operating system type and version
CN108920936B (en) * 2018-06-26 2021-11-26 郑州云海信息技术有限公司 Method and device for achieving vmware authentication based on Purley platform
CN110336807A (en) * 2019-06-28 2019-10-15 苏州浪潮智能科技有限公司 A kind of identity identifying method based on Web service, equipment and storage medium

Also Published As

Publication number Publication date
CN110895511A (en) 2020-03-20

Similar Documents

Publication Publication Date Title
TW202046107A (en) User terminal hardware detection method, device, computer device and storage medium
US20090164995A1 (en) Managing tasks in a distributed system
EP3565370B1 (en) Wireless fidelity (wi-fi) connection method and related product
CN103765936B (en) The method and apparatus managed for privacy policy
CN105701122A (en) Log collection method, apparatus and system
CN112685709B (en) Authorization token management method and device, storage medium and electronic equipment
CN114467320A (en) System, method and computer program for transferring Subscriber Identity Module (SIM) information for SIM card or ESIM activation
CN110659165A (en) Multi-node server automatic testing method and device
CN109783367B (en) Interface testing method, device, computer device and storage medium
CN110727534B (en) Method, equipment and storage medium for repairing file system
CN111090453A (en) Equipment configuration method, equipment and storage medium
TW202117540A (en) User terminal failure detection method, device, computer device and storage medium
CN110895511B (en) Authentication method and equipment of operating system and storage medium
US20160295416A1 (en) Method and apparatus for performing a message integrity check
CN110674505A (en) Vulnerability scanning remaining time estimation method and device
CN115118625B (en) Data verification method and device
CN111047146A (en) Risk identification method, device and equipment for enterprise users
CN114285657B (en) Firewall security policy change verification method and device
CN110875895A (en) Method, system, equipment and vehicle for realizing intelligent terminal software login
CN110502296B (en) Method, equipment and storage medium for displaying firmware upgrading command
CN114296651A (en) Method and equipment for storing user-defined data information
CN110266546B (en) Method, equipment and readable medium for configuring switch port
CN114064505A (en) Test method, system, device and storage medium for decoding unit
CN113434423A (en) Interface test method and device
US11399067B2 (en) Network access method and apparatus for speech recognition service based on artificial intelligence

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant