CN119210851A - Information system terminal login security verification method, information system - Google Patents
Information system terminal login security verification method, information system Download PDFInfo
- Publication number
- CN119210851A CN119210851A CN202411348133.8A CN202411348133A CN119210851A CN 119210851 A CN119210851 A CN 119210851A CN 202411348133 A CN202411348133 A CN 202411348133A CN 119210851 A CN119210851 A CN 119210851A
- Authority
- CN
- China
- Prior art keywords
- activation code
- workstation
- terminal
- terminal device
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012795 verification Methods 0.000 title claims abstract description 33
- 238000000034 method Methods 0.000 title claims abstract description 22
- 230000004913 activation Effects 0.000 claims abstract description 55
- 238000013475 authorization Methods 0.000 claims description 7
- 230000002452 interceptive effect Effects 0.000 abstract description 6
- 230000006978 adaptation Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000007619 statistical method Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/107—Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/08—Protocols specially adapted for terminal emulation, e.g. Telnet
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention relates to the field of software security, in particular to a method for verifying login security of an interactive system terminal, an interactive system and an interactive system. The method comprises the following steps that a server generates a corresponding activation code for each workstation, the activation code is sent to an administrator of the corresponding workstation, terminal equipment generates an equipment serial number, a login security verification request is sent to the server, the content of the login security verification request comprises hardware information, the equipment serial number, position information and the activation code, and when the server receives the login security verification request sent by one terminal equipment, the login security verification request is verified. The method and the device effectively avoid the user from illegally copying and abusing software on the terminal equipment to perform illegal login.
Description
Technical Field
The invention relates to the field of software security, in particular to a method for verifying login security of an interactive system terminal, an interactive system and an interactive system.
Background
With rapid development of informatization construction, various information systems and terminal software are gradually increased, authorization verification of various terminal software is insufficient, the terminal software is not bound with terminal equipment and workstations where the terminal equipment is located, a user cannot carry out statistical analysis on data submitted by the terminal equipment in each workstation and the running condition of the terminal software, the terminal software cannot be ensured not to be used by other illegal users, and in order to avoid infringement of legal rights of software authorizers caused by illegal copying and abuse of application functions of the terminal software under the condition of unauthorized permission as much as possible, a method for carrying out authorization management on software running on the terminal equipment under the scene is needed.
Disclosure of Invention
Aiming at the problems, the invention provides a technical scheme that:
the invention provides a method for verifying login security of an information system terminal, wherein the information system comprises terminal equipment and a server, the terminal equipment is allowed to login the server only when the position of the terminal equipment is in a specified workstation, and the method comprises the following steps:
S1, the server generates a corresponding activation code for each workstation and sends the activation code to an administrator of the corresponding workstation,
When each activation code only allows one terminal device to be authorized, the number of the activation codes corresponding to one workstation is equal to the number of the terminal devices allowed to log in by the workstation;
When each activation code allows the authorization of a plurality of terminal devices, the number of the activation codes corresponding to one workstation is one, and the server records the maximum number of the terminal devices allowed to be authorized by the activation code;
s2, the terminal equipment generates an equipment serial number by using a preset algorithm according to the hardware information of the terminal equipment;
The terminal equipment generates position information according to the position;
the terminal equipment sends a login security verification request to the server, wherein the content of the login security verification request comprises hardware information, equipment serial numbers, position information and an activation code;
s3, when the server receives a login security verification request sent by a terminal device, verifying whether hardware information is matched with a device serial number or not through a preset algorithm, if not, failing to verify, and if so, continuing to verify;
Verifying whether the workstation corresponding to the activation code is matched with the position information or not, if not, failing to verify, and if so, continuing to verify;
when each activation code only allows one terminal device to be authorized, checking whether the current activation code is authorized to be used by other terminal devices, if so, failing to verify, if not, successful verifying, and recording the corresponding relation between the current activation code and the authorized terminal device;
When each activation code allows the authorization of a plurality of terminal devices, checking whether the number of the terminal devices authorized by the current activation code reaches the maximum number of the terminal devices authorized by the activation code, if so, failing to verify, if not, successful to verify, and updating the number of the terminal devices authorized by the current activation code.
Preferably, the method of sending the activation code to the administrator of the corresponding workstation is email.
Preferably, the activation code is generated based on location information of the corresponding workstation.
Preferably, the location information of the workstation includes a latitude and longitude of the workstation.
Preferably, the hardware information includes a CPU serial number or a disk serial number.
The invention also provides an information system comprising a terminal device and a server, wherein the terminal device only allows the terminal device to log in the server when the position of the terminal device designates a workstation, and the information system is characterized in that the method of any one of claims 1 to 6 is used for log-in security verification between the terminal device and the server.
The beneficial effects are that:
The technical scheme provided by the invention uses a multiple verification method, thereby effectively avoiding users from illegally copying and abusing software on the terminal equipment to perform illegal login.
Drawings
Fig. 1 is a schematic diagram of a usage scenario of a terminal device in an embodiment of the present invention;
Detailed Description
In order to make the objects, features and advantages of the present invention more obvious and understandable, the technical solutions of the embodiments of the present invention will be clearly and completely described below, and it is apparent that the embodiments described below are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
As shown in fig. 1, a method for verifying login security of an information system terminal, wherein the information system comprises a terminal device and a server, the terminal device allows the terminal device to login to the server when the position of the terminal device designates a workstation, and the method comprises the following steps:
The method comprises the steps that S1, a server side generates a corresponding activation code for each workstation and sends the activation code to an administrator of the corresponding workstation, and in the embodiment, the sending mode is an email;
When each activation code only allows one terminal device to be authorized, the number of the activation codes corresponding to one workstation is equal to the number of the terminal devices allowed to log in by the workstation;
When each activation code allows the authorization of a plurality of terminal devices, the number of the activation codes corresponding to one workstation is one, and the server records the maximum number of the terminal devices allowed to be authorized by the activation code;
s2, the terminal equipment generates an equipment serial number by using a preset algorithm according to the hardware information of the terminal equipment;
The terminal equipment generates position information according to the position;
the terminal equipment sends a login security verification request to the server, wherein the content of the login security verification request comprises hardware information, equipment serial numbers, position information and an activation code;
in this embodiment, the hardware information includes a CPU serial number or a disk serial number;
s3, when the server receives a login security verification request sent by a terminal device, verifying whether hardware information is matched with a device serial number or not through a preset algorithm, if not, failing to verify, and if so, continuing to verify;
Verifying whether the workstation corresponding to the activation code is matched with the position information or not, if not, failing to verify, and if so, continuing to verify;
when each activation code only allows one terminal device to be authorized, checking whether the current activation code is authorized to be used by other terminal devices, if so, failing to verify, if not, successful verifying, and recording the corresponding relation between the current activation code and the authorized terminal device;
When each activation code allows the authorization of a plurality of terminal devices, checking whether the number of the terminal devices authorized by the current activation code reaches the maximum number of the terminal devices authorized by the activation code, if so, failing to verify, if not, successful to verify, and updating the number of the terminal devices authorized by the current activation code.
The workstation is a place, as shown in fig. 1, and the terminal equipment only allows the secure login verification with the server at the designated workstation.
The foregoing is merely a preferred embodiment of the present invention and it should be noted that modifications and adaptations to those skilled in the art may be made without departing from the principles of the present invention, which are intended to be comprehended within the scope of the present invention.
Claims (6)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202411348133.8A CN119210851A (en) | 2024-09-26 | 2024-09-26 | Information system terminal login security verification method, information system |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202411348133.8A CN119210851A (en) | 2024-09-26 | 2024-09-26 | Information system terminal login security verification method, information system |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN119210851A true CN119210851A (en) | 2024-12-27 |
Family
ID=94044070
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202411348133.8A Pending CN119210851A (en) | 2024-09-26 | 2024-09-26 | Information system terminal login security verification method, information system |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN119210851A (en) |
-
2024
- 2024-09-26 CN CN202411348133.8A patent/CN119210851A/en active Pending
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN107480555B (en) | Database access authority control method and device based on block chain | |
| US9047458B2 (en) | Network access protection | |
| US9292665B2 (en) | Secure serial number | |
| US7093296B2 (en) | System and method for dynamically extending a DRM system using authenticated external DPR modules | |
| JP6963609B2 (en) | Transparency Multi-Factor Authentication and Security Initiatives Systems and Methods for Posture Checks | |
| US8955077B1 (en) | Server-token lockstep systems and methods | |
| US11409872B2 (en) | Confirming a version of firmware loaded to a processor-based device | |
| US12432202B1 (en) | Authentication for application downloads | |
| CN114186199B (en) | License authorization method and device | |
| US11251975B1 (en) | Block chain based trusted security infrastructure | |
| KR20110113179A (en) | Software application verification | |
| CN110301127B (en) | Apparatus and method for predictive token validation | |
| CN101308530A (en) | Method for installing software using digital content and device for playing digital content | |
| CN116964586A (en) | Authorization encryption | |
| WO2017000648A1 (en) | Authentication method and apparatus for reinforced software | |
| JP5013931B2 (en) | Apparatus and method for controlling computer login | |
| CN112560009A (en) | Authentication method, terminal, client and computer storage medium | |
| US10158623B2 (en) | Data theft deterrence | |
| US20050060541A1 (en) | Method and apparatus for providing security for a computer system | |
| US7890756B2 (en) | Verification system and method for accessing resources in a computing environment | |
| CN101939748A (en) | Activation via trust delegation | |
| WO2005086012A1 (en) | Electronic terminal device protection system | |
| US20090119475A1 (en) | Time based priority modulus for security challenges | |
| CN119210851A (en) | Information system terminal login security verification method, information system | |
| CN116260652B (en) | Authorized methods, systems, computing devices, and readable storage media |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination |