[go: up one dir, main page]

CN119210851A - Information system terminal login security verification method, information system - Google Patents

Information system terminal login security verification method, information system Download PDF

Info

Publication number
CN119210851A
CN119210851A CN202411348133.8A CN202411348133A CN119210851A CN 119210851 A CN119210851 A CN 119210851A CN 202411348133 A CN202411348133 A CN 202411348133A CN 119210851 A CN119210851 A CN 119210851A
Authority
CN
China
Prior art keywords
activation code
workstation
terminal
terminal device
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202411348133.8A
Other languages
Chinese (zh)
Inventor
李朝晖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Tongdahai Software Co ltd
Original Assignee
Nanjing Tongdahai Software Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Tongdahai Software Co ltd filed Critical Nanjing Tongdahai Software Co ltd
Priority to CN202411348133.8A priority Critical patent/CN119210851A/en
Publication of CN119210851A publication Critical patent/CN119210851A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/08Protocols specially adapted for terminal emulation, e.g. Telnet

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention relates to the field of software security, in particular to a method for verifying login security of an interactive system terminal, an interactive system and an interactive system. The method comprises the following steps that a server generates a corresponding activation code for each workstation, the activation code is sent to an administrator of the corresponding workstation, terminal equipment generates an equipment serial number, a login security verification request is sent to the server, the content of the login security verification request comprises hardware information, the equipment serial number, position information and the activation code, and when the server receives the login security verification request sent by one terminal equipment, the login security verification request is verified. The method and the device effectively avoid the user from illegally copying and abusing software on the terminal equipment to perform illegal login.

Description

Information system terminal login security verification method and information system
Technical Field
The invention relates to the field of software security, in particular to a method for verifying login security of an interactive system terminal, an interactive system and an interactive system.
Background
With rapid development of informatization construction, various information systems and terminal software are gradually increased, authorization verification of various terminal software is insufficient, the terminal software is not bound with terminal equipment and workstations where the terminal equipment is located, a user cannot carry out statistical analysis on data submitted by the terminal equipment in each workstation and the running condition of the terminal software, the terminal software cannot be ensured not to be used by other illegal users, and in order to avoid infringement of legal rights of software authorizers caused by illegal copying and abuse of application functions of the terminal software under the condition of unauthorized permission as much as possible, a method for carrying out authorization management on software running on the terminal equipment under the scene is needed.
Disclosure of Invention
Aiming at the problems, the invention provides a technical scheme that:
the invention provides a method for verifying login security of an information system terminal, wherein the information system comprises terminal equipment and a server, the terminal equipment is allowed to login the server only when the position of the terminal equipment is in a specified workstation, and the method comprises the following steps:
S1, the server generates a corresponding activation code for each workstation and sends the activation code to an administrator of the corresponding workstation,
When each activation code only allows one terminal device to be authorized, the number of the activation codes corresponding to one workstation is equal to the number of the terminal devices allowed to log in by the workstation;
When each activation code allows the authorization of a plurality of terminal devices, the number of the activation codes corresponding to one workstation is one, and the server records the maximum number of the terminal devices allowed to be authorized by the activation code;
s2, the terminal equipment generates an equipment serial number by using a preset algorithm according to the hardware information of the terminal equipment;
The terminal equipment generates position information according to the position;
the terminal equipment sends a login security verification request to the server, wherein the content of the login security verification request comprises hardware information, equipment serial numbers, position information and an activation code;
s3, when the server receives a login security verification request sent by a terminal device, verifying whether hardware information is matched with a device serial number or not through a preset algorithm, if not, failing to verify, and if so, continuing to verify;
Verifying whether the workstation corresponding to the activation code is matched with the position information or not, if not, failing to verify, and if so, continuing to verify;
when each activation code only allows one terminal device to be authorized, checking whether the current activation code is authorized to be used by other terminal devices, if so, failing to verify, if not, successful verifying, and recording the corresponding relation between the current activation code and the authorized terminal device;
When each activation code allows the authorization of a plurality of terminal devices, checking whether the number of the terminal devices authorized by the current activation code reaches the maximum number of the terminal devices authorized by the activation code, if so, failing to verify, if not, successful to verify, and updating the number of the terminal devices authorized by the current activation code.
Preferably, the method of sending the activation code to the administrator of the corresponding workstation is email.
Preferably, the activation code is generated based on location information of the corresponding workstation.
Preferably, the location information of the workstation includes a latitude and longitude of the workstation.
Preferably, the hardware information includes a CPU serial number or a disk serial number.
The invention also provides an information system comprising a terminal device and a server, wherein the terminal device only allows the terminal device to log in the server when the position of the terminal device designates a workstation, and the information system is characterized in that the method of any one of claims 1 to 6 is used for log-in security verification between the terminal device and the server.
The beneficial effects are that:
The technical scheme provided by the invention uses a multiple verification method, thereby effectively avoiding users from illegally copying and abusing software on the terminal equipment to perform illegal login.
Drawings
Fig. 1 is a schematic diagram of a usage scenario of a terminal device in an embodiment of the present invention;
Detailed Description
In order to make the objects, features and advantages of the present invention more obvious and understandable, the technical solutions of the embodiments of the present invention will be clearly and completely described below, and it is apparent that the embodiments described below are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
As shown in fig. 1, a method for verifying login security of an information system terminal, wherein the information system comprises a terminal device and a server, the terminal device allows the terminal device to login to the server when the position of the terminal device designates a workstation, and the method comprises the following steps:
The method comprises the steps that S1, a server side generates a corresponding activation code for each workstation and sends the activation code to an administrator of the corresponding workstation, and in the embodiment, the sending mode is an email;
When each activation code only allows one terminal device to be authorized, the number of the activation codes corresponding to one workstation is equal to the number of the terminal devices allowed to log in by the workstation;
When each activation code allows the authorization of a plurality of terminal devices, the number of the activation codes corresponding to one workstation is one, and the server records the maximum number of the terminal devices allowed to be authorized by the activation code;
s2, the terminal equipment generates an equipment serial number by using a preset algorithm according to the hardware information of the terminal equipment;
The terminal equipment generates position information according to the position;
the terminal equipment sends a login security verification request to the server, wherein the content of the login security verification request comprises hardware information, equipment serial numbers, position information and an activation code;
in this embodiment, the hardware information includes a CPU serial number or a disk serial number;
s3, when the server receives a login security verification request sent by a terminal device, verifying whether hardware information is matched with a device serial number or not through a preset algorithm, if not, failing to verify, and if so, continuing to verify;
Verifying whether the workstation corresponding to the activation code is matched with the position information or not, if not, failing to verify, and if so, continuing to verify;
when each activation code only allows one terminal device to be authorized, checking whether the current activation code is authorized to be used by other terminal devices, if so, failing to verify, if not, successful verifying, and recording the corresponding relation between the current activation code and the authorized terminal device;
When each activation code allows the authorization of a plurality of terminal devices, checking whether the number of the terminal devices authorized by the current activation code reaches the maximum number of the terminal devices authorized by the activation code, if so, failing to verify, if not, successful to verify, and updating the number of the terminal devices authorized by the current activation code.
The workstation is a place, as shown in fig. 1, and the terminal equipment only allows the secure login verification with the server at the designated workstation.
The foregoing is merely a preferred embodiment of the present invention and it should be noted that modifications and adaptations to those skilled in the art may be made without departing from the principles of the present invention, which are intended to be comprehended within the scope of the present invention.

Claims (6)

1.一种信息系统终端登录安全验证方法,所述信息系统包括终端设备、服务端,所述终端设备的位置在指定工作站时,所述终端设备才允许登录服务端,其特征在于,方法包括以下步骤:1. A method for terminal login security verification of an information system, wherein the information system comprises a terminal device and a server, wherein the terminal device is allowed to log in to the server only when the terminal device is located at a designated workstation, wherein the method comprises the following steps: S1:服务端为每个工作站生成对应的激活码,并且将激活码发送给对应工作站的管理员,S1: The server generates a corresponding activation code for each workstation and sends the activation code to the administrator of the corresponding workstation. 当每个激活码只允许授权一台终端设备时,一个工作站对应的激活码数量等于该工作站允许登录的终端设备数量;When each activation code is only allowed to authorize one terminal device, the number of activation codes corresponding to a workstation is equal to the number of terminal devices allowed to log in to the workstation; 当每个激活码允许授权多台终端设备时,一个工作站对应的激活码数量为一个,且服务端记录该激活码所允许授权的终端设备的最大数量;When each activation code allows multiple terminal devices to be authorized, one workstation corresponds to one activation code, and the server records the maximum number of terminal devices that the activation code allows to be authorized; S2:终端设备根据自身硬件信息,使用预设的算法生成设备序列号;S2: The terminal device generates a device serial number using a preset algorithm based on its own hardware information; 终端设备根据所在的位置生成位置信息;The terminal device generates location information according to the location; 终端设备向服务端发送登录安全验证请求,登录安全验证请求的内容包括硬件信息、设备序列号、位置信息、激活码;The terminal device sends a login security verification request to the server. The content of the login security verification request includes hardware information, device serial number, location information, and activation code; S3:服务端收到一个终端设备发来的登录安全验证请求时,通过预设的算法验证硬件信息与设备序列号是否匹配,如不匹配则验证失败,如果匹配则继续验证;S3: When the server receives a login security verification request from a terminal device, it verifies whether the hardware information matches the device serial number through a preset algorithm. If they do not match, the verification fails. If they match, the verification continues. 验证激活码对应的工作站与位置信息是否匹配,如果不匹配则验证失败,如果匹配则继续验证;Verify whether the workstation corresponding to the activation code matches the location information. If they do not match, verification fails. If they match, verification continues. 当每个激活码只允许授权一台终端设备时,检查当前激活码是否已经授权了其他终端设备使用,如果是,则验证失败,如果否,则验证成功,并记录当前激活码与授权的终端设备之间的对应关系;When each activation code is only allowed to authorize one terminal device, check whether the current activation code has been authorized for use by other terminal devices. If so, the verification fails. If not, the verification succeeds and the corresponding relationship between the current activation code and the authorized terminal device is recorded; 当每个激活码允许授权多台终端设备时,检查当前激活码授权的终端设备数量是否已经达到了该激活码允许授权的终端设备的最大数量,如果是,则验证失败,如果否,则验证成功,并更新当前激活码授权的终端设备数量。When each activation code allows authorization of multiple terminal devices, check whether the number of terminal devices authorized by the current activation code has reached the maximum number of terminal devices allowed to be authorized by the activation code. If so, the verification fails. If not, the verification succeeds and the number of terminal devices authorized by the current activation code is updated. 2.根据权利要求1所述的一种信息系统终端登录安全验证方法,其特征在于,激活码发送给对应工作站的管理员的方法为电子邮件。2. According to claim 1, a method for secure verification of terminal login in an information system is characterized in that the activation code is sent to the administrator of the corresponding workstation by email. 3.根据权利要求1所述的一种信息系统终端登录安全验证方法,其特征在于,激活码根据对应工作站的位置信息生成。3. According to claim 1, an information system terminal login security verification method is characterized in that the activation code is generated based on the location information of the corresponding workstation. 4.根据权利要求3所述的一种信息系统终端登录安全验证方法,其特征在于,工作站的位置信息包括工作站的经纬度。4. An information system terminal login security verification method according to claim 3, characterized in that the location information of the workstation includes the latitude and longitude of the workstation. 5.根据权利要求1所述的一种信息系统终端登录安全验证方法,其特征在于,硬件信息包括CPU序列号或磁盘序列号。5. An information system terminal login security verification method according to claim 1, characterized in that the hardware information includes a CPU serial number or a disk serial number. 6.一种信息系统,包括终端设备、服务端,所述终端设备的位置在指定工作站时,所述终端设备才允许登录服务端,其特征在于,使用权利要求1至6任一项所述的方法进行终端设备与服务端之间的登录安全验证。6. An information system, comprising a terminal device and a server, wherein the terminal device is allowed to log in to the server only when the terminal device is located at a designated workstation, characterized in that the method described in any one of claims 1 to 6 is used to perform login security verification between the terminal device and the server.
CN202411348133.8A 2024-09-26 2024-09-26 Information system terminal login security verification method, information system Pending CN119210851A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202411348133.8A CN119210851A (en) 2024-09-26 2024-09-26 Information system terminal login security verification method, information system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202411348133.8A CN119210851A (en) 2024-09-26 2024-09-26 Information system terminal login security verification method, information system

Publications (1)

Publication Number Publication Date
CN119210851A true CN119210851A (en) 2024-12-27

Family

ID=94044070

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202411348133.8A Pending CN119210851A (en) 2024-09-26 2024-09-26 Information system terminal login security verification method, information system

Country Status (1)

Country Link
CN (1) CN119210851A (en)

Similar Documents

Publication Publication Date Title
CN107480555B (en) Database access authority control method and device based on block chain
US9047458B2 (en) Network access protection
US9292665B2 (en) Secure serial number
US7093296B2 (en) System and method for dynamically extending a DRM system using authenticated external DPR modules
JP6963609B2 (en) Transparency Multi-Factor Authentication and Security Initiatives Systems and Methods for Posture Checks
US8955077B1 (en) Server-token lockstep systems and methods
US11409872B2 (en) Confirming a version of firmware loaded to a processor-based device
US12432202B1 (en) Authentication for application downloads
CN114186199B (en) License authorization method and device
US11251975B1 (en) Block chain based trusted security infrastructure
KR20110113179A (en) Software application verification
CN110301127B (en) Apparatus and method for predictive token validation
CN101308530A (en) Method for installing software using digital content and device for playing digital content
CN116964586A (en) Authorization encryption
WO2017000648A1 (en) Authentication method and apparatus for reinforced software
JP5013931B2 (en) Apparatus and method for controlling computer login
CN112560009A (en) Authentication method, terminal, client and computer storage medium
US10158623B2 (en) Data theft deterrence
US20050060541A1 (en) Method and apparatus for providing security for a computer system
US7890756B2 (en) Verification system and method for accessing resources in a computing environment
CN101939748A (en) Activation via trust delegation
WO2005086012A1 (en) Electronic terminal device protection system
US20090119475A1 (en) Time based priority modulus for security challenges
CN119210851A (en) Information system terminal login security verification method, information system
CN116260652B (en) Authorized methods, systems, computing devices, and readable storage media

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination